New Sip

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 53

Sip Protocol

秘密▲

Objectives

 Upon the completion of this chapter, you will be able to:


 Understand the concept of SIP protocol
 Understand the components of SIP protocol
 Describe the Call Flow Scenario (CFS)
秘密▲
Outline

 SIP introduction

 SIP components

 SIP message structure

 Call scenario analysis

 SIP-T introduction
秘密▲

What is SIP? (1/3)


 Internet Telephony
 Transport

RTP: Real-time transport protocol
 Qos:

RSVP: Resource reservation protocol
 Authentication
 Gateway location
 Directory service
 …
 Telephony signaling

Is the target station busy? (“busy tone”)

Is the target circuit overloaded? (“all circuits are busy”)

How to locate another user?

How to make the phone ring?
秘密▲

What is SIP (2/3)


 Defined by IETF Like internet protocols
 Request and reply messages
 General interoperability
 Intelligence in the edge handset device
 Highly scalable
秘密▲
What is SIP (3/3)

SIP was designed to be a flexible, general-purpose way to set up real-time


multimedia sessions between groups of participants.   For example, in addition to
simple telephone calls, SIP can also be used to set up video and audio multicast
meetings, or instant messaging conferences
秘密▲

SIP’s application

 Instant message
 Presence service
 User roaming
 Number with U
 Third Party controlled service
 ……
秘密▲

What does SIP do?


 An internet signaling protocol needs to provide the following :
 Name translation and user location

Name -> ID -> location

id@ip_addr:port
 Feature negotiation

Media type, codec
 Call participant management

Invite, end call, call waiting
 Call feature changes

Change of media, codec, etc.
 Separation of signaling and data
秘密▲

SIP properties
 Bottom-up approach
 Modular design
 Generic session establishment
 Text messages
 Email address-like addressing
 Re-use of DNS entries for address resolution
 Re-use of HTTP and SMTP headers
 S/MIME for message body
 …
秘密▲
Outline

 SIP introduction

 SIP components

 SIP message structure

 Call scenario analysis

 SIP-T introduction
秘密▲

SIP Components – distributed architecture

LDAP SIP

LDAP
Location Redirect Registrar
Server Server SIP Server SIP

SIP SIP

PSTN

User Agent Gateway


Proxy Proxy
Server Server
秘密▲

Basic SIP components (1/5)


 User agents
 User agent client (UAC)

A user agent client is a logical entity that creates a new
request, and then uses the client transaction state
machinery to send it.
 User agent server (UAS)

A user agent server is a logical entity that generates a
response to a SIP request. The response accepts,
rejects, or redirects the request.
秘密▲

Basic SIP components (2/5)


 Network servers
 Redirect server

reduce the processing load on proxy servers

improve signaling path robustness

push routing information for a request back in a
response to the client
秘密▲

Basic SIP components (3/5)


 Network Servers
 Proxy server

An intermediary entity that acts as both a server and a
client for the purpose of making requests on behalf of
other clients

ensure that a request is sent to another entity "closer" to
the targeted user
秘密▲

Basic SIP components (4/5)


 Network servers
 Registrar server

accepts REGISTER requests

places the information it receives in those requests into
the location service
秘密▲

Basic SIP components (5/5)


 Network servers
 location server

is used by a SIP redirect or proxy server

store information about a callee's possible location(s).

a list of bindings of address-of- record keys to zero or m
ore contact addresses

The bindings can be created and removed in many way
秘密▲
Outline

 SIP introduction

 SIP components

 SIP message structure

 Call scenario analysis

 SIP-T introduction
秘密▲

SIP Message – Request/Reply

SIP components rely on the interaction of SIP


messages to communicate with each other, the
messaging mechanism is based on Client/Server, and
can be divided into two categories (request and
reply)
秘密▲

SIP Request

Message Function

INVITE Initialize a conversation

ACK Acknowledge the invite message

BYE End conversation

CANCEL Cancel the unsuccessful request

REGISTER Registration

OPTIONS Query the server capacity

INFO Pass the interaction contents of a certain call


秘密▲
SIP reply message

Message Function

1XX Temporary response

2XX Success

3XX Redirect

4XX Client error

5XX Server error

6XX Global error


秘密▲
SIP request message sample
START INVITE sip:[email protected] SIP/2.0
Via: SIP/2.0/UDP 202.202.41.8:5060
From: "iwf" <sip:[email protected]>;tag=aab7090044b2-195254e9
To: <sip:[email protected]>
Call-ID: [email protected]
CSeq: 101 INVITE
Expires: 180
Header User-Agent: Cisco-SIP-IP-Phone/2
Accept: application/sdp
Contact: sip:[email protected]:5060
Content-Type: application/sdp
Content-Length: 224

v=0
o=CiscoSystemsSIP-IPPhone-UserAgent 17052 15931 IN IP4 202.202.41.8
s=SIP Call
c=IN IP4 202.202.41.8
BODY t=0 0
m=audio 17522 RTP/AVP 0 8 18 101
a=rtpmap:0 pcmu/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-11
秘密▲
SIP Reply message sample

START SIP/2.0 180 Ringing


Via: SIP/2.0/UDP 202.202.41.8:5060
To: <sip:[email protected]>;tag=caca1501-15112
From: "iwf"<sip:[email protected]>;tag=aab7090
HEADER 044b2-195254e9
Call-ID: [email protected]
02.41.8
CSeq: 101 INVITE
User-Agent: ZTE Softswitch/1.0.0
Content-Length: 0
秘密▲
Outline

 SIP introduction

 SIP components

 SIP message structure

 Call scenario analysis

 SIP-T introduction
秘密▲

Call establishment (redirect 1/5)

redirect Server A redirect Server B


b
Bo
ng
ll
Ca
1

UAC UAS

Alice Bob
秘密▲

Call establishment (redirect 2/5)

redirect Server A redirect Server B


b
Bo

2
ng

B
m
ll
Ca

ig htk
no
1
w

UAC UAS

Alice Bob
秘密▲

Call establishment (redirect 3/5)

redirect Server A redirect Server B


b
Bo

ob
ng

g B
m
ll

llin
Ca

ig

Ca
htk

3
no
1
w

UAC UAS

Alice Bob
秘密▲

Call establishment (redirect 4/5)

redirect Server A redirect Server B


b
Bo

ob 0.1
ng

g B 0.
m

0.
ll

llin
Ca

1
i

at
g

Ca
h

is
tk

b
3 Bo
no
1
w

UAC UAS

Alice Bob
秘密▲

Call establishment (redirect 5/5)

redirect Server A redirect Server B


b
Bo

ob 0.1
ng

g B 0.
m

0.
ll

llin
Ca

1
i

at
g

Ca
h

is
tk

b
3 Bo
no
1
w

5 Bob, talk to me!

UAC UAS

Alice Bob
秘密▲

Call establishment (proxy 1/5)

redirect Server A redirect Server B


b
Bo
ng
ll
Ca
1

UAC UAS

Alice Bob
秘密▲

Call establishment (proxy 2/5)

2 Callng Bob

redirect Server A redirect Server B


b

2
Bo

Ca
ng

lln
ll
Ca

g
Bo
b
1

UAC UAS

Alice Bob
秘密▲

Call establishment (proxy 3/5)

2 Callng Bob

redirect Server A redirect Server B


b

2
4
Bo

Ca
Ca
ng

lln
ll
ll
Ca

Bo

g
Bo
b
at

b
1

10.
0.
0.
1
UAC UAS

Alice Bob
秘密▲

Call establishment (proxy 4/5)

2 Callng Bob

redirect Server A redirect Server B

1
. 0.
0.0
b

2
4
Bo

t1

Ca
ba

Ca
ng

lln
ll
ll

Bo
Ca

Bo

g
Bo
ng

b
at

b
all
1

1
5 C

0.
0.
0.
1
UAC UAS

Alice Bob
秘密▲

Call establishment (proxy 5/5)

2 Callng Bob

redirect Server A redirect Server B

1
. 0.
0.0
b

2
4
Bo

t1

Ca
ba

Ca
ng

lln
ll
ll

Bo
Ca

Bo

g
Bo
ng

b
at

b
all
1

1
5 C

0.
0.
0.
1
6 Bob, Talk to me!

UAC UAS

Alice Bob
秘密▲
SIP Call establishment/release
100.1.0.252 100.1.0.25 100.2.0.2 100.2.0.8
事务 1
网元
User Agent Proxy Server Proxy Server User Agent
1 INVITE
2 100 (Trying) 3 INVITE
4 100 (Trying)
5 INVITE
呼叫建立
6 100 (Trying)
9 180 (Ringing) 8 180 (Ringing) 7 180 (Ringing)

12 200 (OK) 11 200 (OK) 10 200 (OK)

13 ACK 14 ACK

事务 2
媒体通道 RTP MEDIA PATH

18 BYE 17 BYE
呼叫拆除
19 200 (OK) 20 200 (OK)

事务 3
秘密▲

Registrar and user mobility

ZTE
Registrar
Register

Alice [email protected]

ZTE
Proxy
秘密▲

Registrar and user mobility

ZTE
Registrar
Register

Where is Bob?

Alice [email protected]
Invite

ZTE
Proxy
秘密▲

Registrar and user mobility

ZTE
Registrar

[email protected]

Alice [email protected]
Invite

ZTE
Proxy
秘密▲

Registrar and user mobility

ZTE
Registrar

Alice [email protected]
Invite

ZTE Invite

Proxy
秘密▲
Registrar and user mobility

ZTE
Registrar
Register

Alice [email protected]

ZTE
Proxy
秘密▲

Registrar and user mobility

ZTE
Registrar
Register

Where is Bob?

Alice [email protected]
Invite

ZTE
Proxy
秘密▲

Registrar and user mobility

ZTE
Registrar

[email protected]

Alice [email protected]
Invite

ZTE
Proxy
秘密▲

Registrar and user mobility

ZTE
Registrar

Alice [email protected]
Invite

ZTE Invite

Proxy
秘密▲
SIP in ZXSS10

ZXSS10 SS1A/B
ZXSS10 SS1A/B
Proxy server
Proxy server
Registrar server
Registrar server

Core Packet Network

Video-phone

Soft-phone
秘密▲
Outline

 SIP introduction

 SIP components

 SIP message structure

 Call scenario analysis

 SIP-T introduction
秘密▲
SIP-T introduction

Softswitch network is an integrated servce network, apart from providing serv


ice for IAD, SIP subscribers, it also has to consider to inherit the existing PS
TN subscribers without losing certain service properties

SS SS

Core Packet Network


SG

MG

PSTN
Video-phone
秘密▲
SIP-T introduction
SIP-T means "SIP for Telephones", which is an expansion of SIP protocol

SS SIP-T SS

Core Packet Network


SG

MG

PSTN
Video-phone
秘密▲

Essentials of SIP-T
SIP-T is trying to provide a framework to incorporate the
traditional PSTN signals into SIP message. SIP-T uses encapsulation
and translation to achieve the two essentials for SIP network:
transparency and routable

In the inter-connecting node of PSTN and SIP network, SS7 ISUP


message has been encapsulated into SIP message to make sure that the
service content will remain intact, while the associating specific
message has been extracted and translated into corresponding SIP
header to make the routing possible
秘密▲

SIP-T sample

SS-1 SIP-T SS-2

Core Packet Network


SG-1
SG-2
MG-1 MG-2

LS-1
LS-2
秘密▲

SIP-T sample analysis


1. After the SS1 receives the ISUP message coming from LS1, it w
ill encapsulate and translate the package into SIP form. Fir
stly, it will finish the header according to the caller/calle
e information in ISUP, such as the From/TO domain and Reques
t-URI domain.
2. For SS2, as the callee has been analyzed to be a PSTN subscri
ber, the ss2 will extract the ISUP message from SIP and route
the call according to the local information
3. As for the intermediate message, such as SUS or INR, they hav
e been encapsulated into Info. Message in SIP
秘密▲
SIP-T sample analysis

SIP 消息 ISUP 消息

Invite IAM
180 Ring ACM
200 OK ANM
Bye/Cancel REL
秘密▲

SIP-T sample analysis

LS-1 SS-1 SS-2 LS-2

IAM
Invite (SDP+IAM)
IAM
ACM
180 (ACM)
ACM

200 (ANM+SDP) ANM

Ack
ANM

通话

REL Bye (REL)


REL

RLC 200 RLC


秘密▲
SIP in ZXSS10

ZXSS10 SS1A/B
ZXSS10 SS1A/B
Proxy server
Proxy server
Registrar server
Registrar server

Core Packet Network

Video-phone

Soft-phone
秘密▲

Thanks

Questions?

You might also like