SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
SIP & its application
What is SIP
(Session Initiation Protocol) ?

 • A signaling protocol for setting up multimedia sessions
   between endpoints .
 • SIP is end-to-end, client-server session signaling protocol
   similar to HTTP.
 • SIP designed in line with other Internet protocols by the
   IETF.
SIP Basic Functionality
    Supports 5 facets of communication:
•   User location: determination of the end system to be used for
    communication;
•   User capabilities: determination of the media and media
    parameters to be used;
•   User availability: determination of the willingness of the
    called party to engage in communications;
•   Call setup: "ringing", establishment of call parameters at both
    called and calling party;
•   Call handling: including transfer and termination of calls.
SIP Deployment Architecture
SIP Entities
• User Agent (UA)
     User Agent Client (UAC) – initiates a SIP request
     User Agent Server (UAS) – handles and eventually
                               sends a response to a request
• Proxy server – routing of SIP requests
• Registar server – registration of user's contact addresses
• Location server – providing of user location details
• Redirect server – return callee's addresses to caller
• Application server – providing advanced services for users
SIP Request Syntax
SIP methods
•   INVITE :initiate call
•   ACK :confirm final response
•   BYE :terminate (and transfer) call
•   CANCEL: cancel searches and “ringing”
•   OPTIONS: features support by other side
•   REGISTER: register with location service
•   INFO: mid-call information (ISUP)
•   COMET :precondition met
•   PRACK: provisional acknowledgement
•   SUBSCRIBE: subscribe to event
•   NOTIFY: notify subscribers
•   REFER: ask recipient to issue SIP request (call transfer)
SIP Response Syntax
The response types

• 1xx   -   Provisional response
• 2xx   -   Successful response
• 3xx   -   Redirect response
• 4xx   -   Client error
• 5xx   -   Server error
• 6xx   -   Global error
Via Field in Header
•   The Request headers include a Via field
•   The Via field indicates the path taken by the request so
    far.
•   Every proxy adds a Via Header with its address to make
    sure that responses within a transaction take the same
    path (to avoid loops, or to make sure that same firewall
    will be hit on the way back)
•   This prevents request looping and ensures replies take
    the same path as the requests.
SIP Transaction
             • User agent A contacts
               DNS server to map
               domain name in SIP
               request to IP address.
             • User agent A sends a
               INVITE message to
               proxy server that uses
               location server to find
               the location of user
               agent B.
             • Call is established
               between A and B.
               Then media session
               begins.
             • Finally, B terminates
               the call by sending a
               BYE request
SIP Registration
SIP Proxying
SIP Redirection
Instant Messaging and SIMPLE
• Session Initiation Protocol for Instant Messaging
  and Presence Leveraging Extensions.
• Instant messaging (IM) ,the most common and
  popular methods of communicating over IP
  networks.
• IM applications:-
■ AIM, America Online Instant Messenger
■ Google talk
■ Yahoo Messenger
■ MSN Messenger
WHAT IS VOIP
• Voice over IP (VoIP) is any technology that facilitates the voice
  communication and video conferencing uses live images and
  sound, over an IP network, such as the Internet.

• The two (or more) endpoints - often referred to as terminals
  or clients - could be any device with a microphone and
  speaker, such as a normal PC computer or something
  resembling a traditional phone.

• Session Initiation Protocol (SIP) is standard used in Voice over
  IP (VoIP).
VoIP APPLICATIONS
VoIP APPLICATIONS
References
• RFC 2543: “SIP: Session Initiation Protocol”
   http://www.cis.ohio-state.edu/cgi-bin/rfc/rfc2543.html
• Papers on IP Telephony
  http://www.cs.columbia.edu/~hgs/sip/papers.html
• http://www.iptel.org/sip
• http://www.cs.columbia.edu/sip/
• http://www.iptel.org/sip/
Thank You

Mais conteúdo relacionado

Mais procurados (20)

Voip
VoipVoip
Voip
 
Voip
VoipVoip
Voip
 
VOIP
VOIPVOIP
VOIP
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMING
 
VOIP
VOIPVOIP
VOIP
 
Voip introduction
Voip introductionVoip introduction
Voip introduction
 
SIP Trunking overview
SIP Trunking overviewSIP Trunking overview
SIP Trunking overview
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
VOIP security
VOIP securityVOIP security
VOIP security
 
Voip
VoipVoip
Voip
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunking
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
What is SIP Trunking?
What is SIP Trunking?What is SIP Trunking?
What is SIP Trunking?
 
Voip
VoipVoip
Voip
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056
 
Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllers
 
Sip trunking - future of tomorrow communications
Sip trunking  -  future of tomorrow communicationsSip trunking  -  future of tomorrow communications
Sip trunking - future of tomorrow communications
 
Aarti sip
Aarti sipAarti sip
Aarti sip
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP)
 
SIP vs PRI
SIP vs PRISIP vs PRI
SIP vs PRI
 

Destaque

Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation ProtocolMatt Bynum
 
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)William Lee
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...ALTANAI BISHT
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolLivePerson
 
Genesys SIP Server Architecture
Genesys SIP Server ArchitectureGenesys SIP Server Architecture
Genesys SIP Server ArchitectureRanjit Patel
 

Destaque (8)

Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
 
SIP - The Basics
SIP - The BasicsSIP - The Basics
SIP - The Basics
 
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
 
Icmp
IcmpIcmp
Icmp
 
5. icmp
5. icmp5. icmp
5. icmp
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
 
Genesys SIP Server Architecture
Genesys SIP Server ArchitectureGenesys SIP Server Architecture
Genesys SIP Server Architecture
 

Semelhante a Sip & its application

CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overviewCCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overviewFaisal Khan
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip OverviewMayank Vora
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P OverviewMayank Vora
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacksEditor IJCATR
 
Mobile Dialer by Voxvalley
Mobile Dialer by VoxvalleyMobile Dialer by Voxvalley
Mobile Dialer by VoxvalleyVoxvalley .
 
FutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesFutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesRADVISION Ltd.
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]William Giba
 

Semelhante a Sip & its application (20)

SIP security in IP telephony
SIP security in IP telephonySIP security in IP telephony
SIP security in IP telephony
 
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overviewCCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
 
VOIP services
VOIP servicesVOIP services
VOIP services
 
Scall
ScallScall
Scall
 
Sip
SipSip
Sip
 
What is session initiation protocol
What is session initiation protocolWhat is session initiation protocol
What is session initiation protocol
 
Aarti Sip
Aarti SipAarti Sip
Aarti Sip
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Indroduction to SIP
Indroduction to SIPIndroduction to SIP
Indroduction to SIP
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P Overview
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
Mobile Dialer by Voxvalley
Mobile Dialer by VoxvalleyMobile Dialer by Voxvalley
Mobile Dialer by Voxvalley
 
SIP Presentation
SIP PresentationSIP Presentation
SIP Presentation
 
Sip summary
Sip summarySip summary
Sip summary
 
FutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom ServicesFutureComm 2010: Scaling Advanced VoIP Telecom Services
FutureComm 2010: Scaling Advanced VoIP Telecom Services
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]
 
Matrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentationMatrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentation
 

Último

Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 

Último (20)

Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 

Sip & its application

  • 1. SIP & its application
  • 2. What is SIP (Session Initiation Protocol) ? • A signaling protocol for setting up multimedia sessions between endpoints . • SIP is end-to-end, client-server session signaling protocol similar to HTTP. • SIP designed in line with other Internet protocols by the IETF.
  • 3. SIP Basic Functionality Supports 5 facets of communication: • User location: determination of the end system to be used for communication; • User capabilities: determination of the media and media parameters to be used; • User availability: determination of the willingness of the called party to engage in communications; • Call setup: "ringing", establishment of call parameters at both called and calling party; • Call handling: including transfer and termination of calls.
  • 5. SIP Entities • User Agent (UA) User Agent Client (UAC) – initiates a SIP request User Agent Server (UAS) – handles and eventually sends a response to a request • Proxy server – routing of SIP requests • Registar server – registration of user's contact addresses • Location server – providing of user location details • Redirect server – return callee's addresses to caller • Application server – providing advanced services for users
  • 7. SIP methods • INVITE :initiate call • ACK :confirm final response • BYE :terminate (and transfer) call • CANCEL: cancel searches and “ringing” • OPTIONS: features support by other side • REGISTER: register with location service • INFO: mid-call information (ISUP) • COMET :precondition met • PRACK: provisional acknowledgement • SUBSCRIBE: subscribe to event • NOTIFY: notify subscribers • REFER: ask recipient to issue SIP request (call transfer)
  • 9. The response types • 1xx - Provisional response • 2xx - Successful response • 3xx - Redirect response • 4xx - Client error • 5xx - Server error • 6xx - Global error
  • 10. Via Field in Header • The Request headers include a Via field • The Via field indicates the path taken by the request so far. • Every proxy adds a Via Header with its address to make sure that responses within a transaction take the same path (to avoid loops, or to make sure that same firewall will be hit on the way back) • This prevents request looping and ensures replies take the same path as the requests.
  • 11. SIP Transaction • User agent A contacts DNS server to map domain name in SIP request to IP address. • User agent A sends a INVITE message to proxy server that uses location server to find the location of user agent B. • Call is established between A and B. Then media session begins. • Finally, B terminates the call by sending a BYE request
  • 15. Instant Messaging and SIMPLE • Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions. • Instant messaging (IM) ,the most common and popular methods of communicating over IP networks. • IM applications:- ■ AIM, America Online Instant Messenger ■ Google talk ■ Yahoo Messenger ■ MSN Messenger
  • 16. WHAT IS VOIP • Voice over IP (VoIP) is any technology that facilitates the voice communication and video conferencing uses live images and sound, over an IP network, such as the Internet. • The two (or more) endpoints - often referred to as terminals or clients - could be any device with a microphone and speaker, such as a normal PC computer or something resembling a traditional phone. • Session Initiation Protocol (SIP) is standard used in Voice over IP (VoIP).
  • 19. References • RFC 2543: “SIP: Session Initiation Protocol” http://www.cis.ohio-state.edu/cgi-bin/rfc/rfc2543.html • Papers on IP Telephony http://www.cs.columbia.edu/~hgs/sip/papers.html • http://www.iptel.org/sip • http://www.cs.columbia.edu/sip/ • http://www.iptel.org/sip/