Session Initiation Protocol Tutorial
Session Initiation Protocol Tutorial
Session Initiation Protocol Tutorial
Audience
This tutorial has been prepared for professionals aspiring to learn the basics of
SIP and make a career in telecom testing.
Prerequisites
Before proceeding with this tutorial, you should have a good grasp over
preliminary networking concepts including some of the basic protocols such as
TCP, UDP, HTTP, SMTP, and VoIP.
Table of Contents
About this Tutorial ................................................................................................................................. i
Audience ................................................................................................................................................ i
Prerequisites .......................................................................................................................................... i
Copyright & Disclaimer ........................................................................................................................... i
Table of Contents .................................................................................................................................. ii
1.
INTRODUCTION ...................................................................................................................... 1
VoIP Technology .................................................................................................................................... 1
SIP Overview....................................................................................................................................... 2
Where Does SIP Fit In?........................................................................................................................... 2
2.
3.
4.
SIP MESSAGING..................................................................................................................... 10
Request Methods ................................................................................................................................ 10
Core Methods ...................................................................................................................................... 10
Extension Methods .............................................................................................................................. 14
5.
ii
6.
7.
SDP ............................................................................................................................................ 40
Purpose of SDP .................................................................................................................................... 40
Session Description Parameters .......................................................................................................... 41
An SDP Example .................................................................................................................................. 44
SDP Extensions .................................................................................................................................... 44
8.
9.
iii
14. B2BUA...................................................................................................................................... 67
B2BUA How it Works? ...................................................................................................................... 67
Functions of B2BUA ............................................................................................................................. 67
Example of B2BUA ............................................................................................................................... 67
iv
1. INTRODUCTION
Session Initiation Protocol (SIP) is one of the most common protocols used in
VoIP technology. It is an application layer protocol that works in conjunction with
other application layer protocols to control multimedia communication sessions
over the Internet.
VoIP Technology
Before moving further, let us first understand a few points about VoIP.
Low cost
Portability
No extra cables
Flexibility
Video conferencing
SIP Overview
Given below are a few points to note about SIP:
SIP is incorporated with two widely used internet protocols: HTTP for web
browser and SMTP used for email. From HTTP, SIP borrowed the clientserver architecture and the use of URL and URI. From SMTP, it borrowed a
text encoding scheme and a header style.
SIP takes the help of SDP (Session Description Protocol) which describes a
session and RTP (Real Time Transport Protocol) used for delivering voice
and video over IP network.
Typically, the SIP protocol is used for internet telephony and multimedia
distribution between two or more endpoints. For example, one person can
initiate a telephone call to another person using SIP, or someone may create a
conference call with many participants.
The SIP protocol was designed to be very simple, with a limited set of
commands. It is also text-based, so anyone can read a SIP message passed
between the endpoints in a SIP session.
2. NETWORK ELEMENTS
There are some entities that help SIP in creating its network. Inside SIP, every
network element is identified by a SIP URI (Uniform Resource Identifier) which
is like an address or identification. Following are the network elements:
User Agent
Proxy Server
Registrar Server
Redirect Server
Location Server
User Agent
It is the endpoint and one of the most important network elements of a SIP
network. An endpoint can initiate, modify, or terminate a session. User agents
are the most intelligent device or network element of a SIP network. It could be
a softphone, a mobile, or a laptop.
User agents are logically divided into two parts:
User Agent Client (UAC): The entity that sends a request and receives a
response.
User Agent Server (UAS): The entity that receives a request and sends
a response.
Proxy Server
It is the network element that takes a request from a user agent and forwards it
to another user.
Stateful Proxy Server: This type of proxy server keeps track of every
request and response received and can use it in future if required. It can
retransmit the request, if there is no response from the other side in time.
Registrar Server
The registrar server accepts registration requests from user agents. It helps
users to authenticate themselves within the network. It stores the URI and the
location of users in a database to help other SIP servers within the same
domain.
Take a look at the following example that shows the process of a SIP
Registration.
TMC
Registrar
Phone/Client
REGISTER
200 OK
Redirect Server
The redirect server receives requests and looks up the intended recipient of the
request in the location database created by the registrar.
The redirect server uses the database for getting location information and
responds with 3xx (Redirect response) to the user. We will discuss response
codes later in this tutorial.
Location Server
The location server provides information about a caller's possible locations to the
redirect and proxy servers.
Only a proxy server or a redirect server can contact a location server.
Transaction
User
Transaction
Layer
Transport
Layer
Syntax
&
Encoding
Layer
The lowest layer of SIP is its syntax and encoding. Its encoding is
specified using an augmented Backus-Naur Form grammar (BNF).
At the second level is the transport layer. It defines how a Client sends
requests and receives responses and how a Server receives requests and
sends responses over the network. All SIP elements contain a transport
layer.
The layer above the transaction layer is called the transaction user.
Each of the SIP entities, except the stateless proxy, is a transaction
user.
SIP Trapezoid
How does a proxy help to connect one user with another? Let us find out with
the help of the following diagram.
The topology shown in the diagram is known as a SIP trapezoid. The process
takes place as follows:
1. When a caller initiates a call, an INVITE message is sent to the proxy
server. Upon receiving the INVITE, the proxy server attempts to resolve the
address of the callee with the help of the DNS server.
2. After getting the next route, callers proxy server (Proxy 1, also known as
outbound proxy server) forwards the INVITE request to the callees proxy
server which acts as an inbound proxy server (Proxy 2) for the callee.
3. The inbound proxy server contacts the location server to get information
about the callees address where the user registered.
4. After getting information from the location server, it forwards the call to its
destination.
5. Once the user agents get to know their address, they can bypass the call,
i.e., conversations pass directly.
4. SIP MESSAGING
SIP messages are of two types: requests and responses.
The opening line of a request contains a method that defines the request,
and a Request-URI that defines where the request is to be sent.
Request Methods
SIP requests are the codes used to establish a communication. To complement
them, there are SIP responses that generally indicate whether a request
succeeded or failed.
There are commands known as METHODS that make a SIP message workable.
Extension Methods
Core Methods
There are six core methods as discussed below.
INVITE
INVITE is used to initiate a session with a user agent. In other words, an INVITE
method is used to establish a media session between the user agents.
INVITE can contain the media information of the caller in the message
body.
10
UAC
UAS
180 Ringing
200 OK (SDP Answer)
ACK
Media Session
INVITE Example
The following code shows how INVITE is used.
INVITE sips:[email protected] SIP/2.0
Via: SIP/2.0/TLS client.ANC.com:5061;branch=z9hG4bK74bf9
Max-Forwards: 70
From: Alice<sips:[email protected]>;tag=1234567
To: Bob<sips:[email protected]>
Call-ID: [email protected]
CSeq: 1 INVITE
Contact: <sips:[email protected]>
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY
Supported: replaces
Content-Type: application/sdp
Content-Length: ...
v=0
o=Alice 2890844526 2890844526 IN IP4 client.ANC.com
s=Session SDP
c=IN IP4 client.ANC.com
t=3034423619 0
m=audio 49170 RTP/AVP 0
a=rtpmap:0 PCMU/8000
11
BYE
BYE is the method used to terminate an established session. This is a SIP
request that can be sent by either the caller or the callee to end a session.
BYE request normally routes end to end, bypassing the proxy server.
REGISTER
REGISTER request performs the registration of a user agent. This request is sent
by a user agent to a registrar server.
It carries the AOR (Address of Record) in the To header of the user that is
being registered.
One user agent can send a REGISTER request on behalf of another user
agent. This is known as third-party registration. Here, the From tag
contains the URI of the party submitting the registration on behalf of the
party identified in the To header.
CANCEL
CANCEL is used to terminate an unestablished session. User agents use this
request to cancel a pending call attempt initiated earlier.
CANCEL
PROXY
UAS
CANCEL
200 OK
200 OK
ACK
ACK is used to acknowledge the final responses to an INVITE method. An ACK
always goes in the direction of INVITE. ACK may contain SDP body (media
characteristics), if it is not available in INVITE.
UAC
INVITE
UAS
180 Ringing
200 OK (SDP Offer)
ACK (SDP Answer)
Media Session
(SDP exchange in ACK)
ACK may not be used to modify the media description that has already
been sent in the initial INVITE.
A stateful proxy receiving an ACK must determine whether or not the ACK
should be forwarded downstream to another proxy or user agent.
For 2xx responses, ACK is end to end, but for all other final responses, it
works on hop by hop basis when stateful proxies are involved.
13
OPTIONS
OPTIONS method is used to query a user agent or a proxy server about its
capabilities and discover its current availability. The response to a request lists
the capabilities of the user agent or server. A proxy never generates an
OPTIONS request.
Extension Methods
Subscribe
SUBSCRIBE is used by user agents to establish a subscription for the purpose of
getting notification about a particular event.
It has a time period in the Expires header field that indicates the desired
duration of existence of a subscription.
SUBSCRIBE
PROXY
UAS
SUBSCRIBE
200 OK
200 OK
NOTIFY
200 OK
14
NOTIFY
NOTIFY is used by user agents to convey the occurrence of a particular event. A
NOTIFY is always sent within a dialog when a subscription exists between the
subscriber and the notifier.
NOTIFY requests contain an Event header field indicating the package and
a subscription-state header field indicating the current state of the
subscription.
PUBLISH
PUBLISH is used by a user agent to send event state information to a server
known as an event state compositor.
UA1
PROXY
SUBSCRIBE
UA2
UA3
SUBSCRIBE
200 OK
200 OK
NOTIFY
200 OK
PUBLISH
NOTIFY
200 OK
200 OK
A PUBLISH request must contain an Expires header field and a MinExpires header field.
15
REFER
REFER is used by a user agent to refer another user agent to access a URI for
the dialog.
A 202 Accepted will trigger a REFER request which indicates that other
user agent has accepted the reference.
INFO
INFO is used by a user agent to send call signalling information to another user
agent with which it has established a media session. This is an end-to-end
request and never generate by proxies. A proxy will always forward an INFO
request.
UPDATE
UPDATE is used to modify the state of a session without changing the state of
the dialog. UPDATE is used if a session is not established and the user wants to
change the codec.
PRACK
PRACK is used to acknowledge the receipt of a reliable transfer of provisional
response (1XX).
16
MESSAGE
It is used to send an instant message or IM using SIP. An IM usually consists of
short messages exchanged in real time by participants engaged in text
conversation.
17
5. RESPONSE CODES
1xx to 5xx has been borrowed from HTTP and 6xx is introduced in SIP.
Informational (1xx)
Informational responses are used to indicate call progress. Normally the
responses are end to end (except 100 Trying). The main objective of
informational responses is to stop retransmission of INVITE requests.
Informational responses include the following responses:
100 Trying
18
180 Ringing
This response is used to indicate that the call has been forwarded to
another endpoint.
This response is used to indicate that the INVITE has been received and
will be processed in a queue.
Success (2xx)
This class of responses is meant for indicating that a request has been accepted.
It includes the following responses:
200 OK
202 Accepted
202 Accepted indicates that the UAS has received and understood the
request, but that the request may not have been authorized or processed
by the server.
19
Redirection (3xx)
Generally these class responses are sent by redirect servers in response to
INVITE. They are also known as redirect class responses. It includes the
following responses:
This redirection response contains a Contact header field with the new
permanent URI of the called party.
This redirection response contains a URI that is currently valid but is not
permanent.
That is, the location is valid for the duration of the time specified.
This response could be sent by a UAS issuing a proxy for incoming call
screening.
This response returns a URI that indicates the type of service the called
party would like.
20
Request might be missing required header fields such as To, From, CallID, or CSeq.
401 Unauthorized
Phone
REGISTER
401(WWW-Authenticate)
REGISTER
200 OK
A subsequent REGISTER will trigger from the User Agent with correct
credentials.
403 Forbidden
403 Forbidden is sent when the server has understood the request, found
the request to be correctly formulated, but will not service the request.
404 Not Found indicates that the user identified by the SIP URI in the
Request-URI cannot be located by the server or that the user is not
currently signed on with the user agent.
It indicates that the server or user agent has received and understood a
request but is not willing to fulfil the request.
An Allow field must be present to inform the UAC as to what methods are
acceptable.
21
The Accept header field in the request did not contain any options
supported by the UAS.
This request sent by a proxy indicates that the UAC must first
authenticate itself with the proxy before the request can be processed.
The request can be resubmitted with the proper credentials in a ProxyAuthorization header field.
The calling party may retry the request without the Session-Expires
header field or with a value less than or equal to the specified minimum.
This response indicates that the request has reached the correct
destination, but the called party is not available for some reason.
22
This response indicates that the request has been forwarded the
maximum number of times as set by the Max-Forwards header in the
request.
This indicates the user agent is busy and cannot accept the call.
This response can be sent by a UA that has received a CANCEL request for
a pending INVITE request.
500 indicates that the server has experienced some kind of error that is
preventing it from processing the request.
It is one kind of server failure that indicates the client to retry the request
again at this server after several seconds.
23
The request can be retried after a few seconds, or after the expiration of
the Retry-After header field.
This response comes when the request failed due to a timeout occurred in
the other network to which the gateway connects.
The server denies a request when it comes with a different SIP version
number. The denial is indicated in this message.
This response is used by a UAS to indicate that the request size was too
large for it to process.
This response indicates that the call to the specified Request-URI could be
answered in other locations.
603 Decline
This response could indicate the called party is busy, or simply does not
want to accept the call.
This response is similar to the 404 Not Found response but indicates that
the user in the Request-URI cannot be found anywhere.
This response should only be sent by a server having access to all the
information about the user.
This response indicates that some aspect of the desired session is not
acceptable to the UAS, and as a result, the session cannot be established.
The response may contain a Warning header field with a numerical code
describing exactly what was not acceptable.
25
6. SIP HEADERS
26
The header field describes media types using the format type/sub-type
commonly used in the Internet.
A list of media types can have preferences set using q value parameters.
Accept-Encoding
The Accept-Encoding header field is used to specify acceptable message body
encoding schemes.
Encoding can be used to ensure a SIP message with a large message body
fits inside a single UDP datagram.
27
The use of q value parameters can set preferences. If none of the listed
schemes are acceptable to the UAC, a 406 Not Acceptable response is
returned. If not included, the assumed encoding will be text/plain.
To
To indicates the final recipient of the request. Any response generated by a UA
will contain this header field with the addition of a tag. It is a mandatory header.
From
From header field indicates the originator of the request. It is one of two
addresses used to identify a dialog.
A From header field may contain a tag used to identify a particular call.
It may contain a display name, in which case the URI is enclosed in <>.
It is a mandatory header.
Call - ID
The Call-ID header field is mandatory in all SIP requests and responses. It is
used to uniquely identify a call between two user agents.
All registrations for a user agent should use the same Call-ID.
Via
Via is used to record the SIP route taken by a request which helps to route a
response back to the originator.
A proxy forwarding the request adds a Via header field containing its own
address to the top of the list of Via header fields.
28
A proxy receiving a response checks the top Via header field and matches
its own address.
The top Via header field is then removed, and the response forwarded to
the address specified in the next Via header field.
Via header fields contain protocol name, version number, and transport
(SIP/2.0/UDP, SIP/2.0/TCP, etc.) and may contain port numbers and
parameters such as received, rport, branch, maddr, and ttl.
CSeq
The CSeq header field is a required header field in every request. It contains a
decimal number that increases for each request.
The CSeq header field is used by UACs to match a response to the request
it references.
For example, a UAC that sends an INVITE request then a CANCEL request
can tell by the method in the CSeq of a 200 OK response if it is a response
to the invitation or cancellation request.
Contact
The Contact header field is used to convey the other user about the address of
the request originator. Once a Contact header field has been received, the URI
can be cached and used for routing future requests within a dialog.
29
Record - Route
The Record-Route header field is used to force routing through a proxy for all
subsequent requests in a session (dialog) between two UAs.
Normally, the presence of a Contact header field allows UAs to send messages
directly bypassing the proxy chain used in the initial request.
A proxy wishing to implement this inserts the header field containing its
own URI, or adds its URI to an already present Record-Route header field.
The URI is constructed so that the URI resolves back to the proxy server.
The UAS copies the Record-Route header field into the 200 OK response
to the request.
The header field is forwarded unchanged by proxies back to the UAC. The
UAC then stores the Record-Route proxy list plus a Contact header field if
present in the200 OK for use in a Route header field in all subsequent
requests.
Organization
The Organization header field is used to indicate the organization to which the
originator of the message belongs.
Like all SIP header fields, it can be used by proxies for making routing
decisions and by UAs for making call screening decisions.
Retry - After
It is used to indicate when a resource or service may be available again.
In 404 Not Found, 600 Busy Everywhere, and 603 Decline responses, it
indicates when the called UA may be available again.
30
Subject
The optional Subject header field is used to indicate the subject of the media
session.
The contents of the header field can also be displayed during alerting to aid the
user in deciding whether to accept the call.
Example:
Subject: How are you?
Supported
The Supported header field is used to list one or more options implemented by a
UA or server.
If the option must be used or supported, the Require header field is used
instead.
Example:
Supported: rel100
Expires
The Expires header field is used to indicate the time interval in which the request
or message contents are valid.
When present in an INVITE request, the header field sets a time limit on
the completion of the INVITE request.
That is, the UAC must receive a final response (non-1xx) within the time
period or the INVITE request is automatically cancelled with a 408
Request Timeout response.
Once the session is established, the value from the Expires header field in
the original INVITE has no effectthe Session-Expires header field must
be used for this purpose.
If present in a REGISTER request, the header field sets the time limit on
the URIs in Contact header fields that do not contain an expires
parameter.
31
User - Agent
This header field is used to convey information about the UA originating the
request.
Event
This header field is used in a SUBSCRIBE or NOTIFY method to indicate which
event package is being used by the method.
In a SUBSCRIBE, it lists the event package to which the client would like
to subscribe.
In a NOTIFY, it lists the event package that the notification contains state
information about.
Join
The Join header field is used in an INVITE to request that the dialog (session) be
joined with an existing dialog (session).
The parameters of the Join header field identify a dialog by the Call-ID, To
tag, and From tag in a similar way to the Replaces header field.
32
Proxy-Authorization
The Proxy-Authorization header field is to carry the credentials of a UA in a
request to a server.
If the credentials are correct, any remaining entries are kept in the
request when it is forwarded to the next proxy.
Proxy - Require
The Proxy-Require header field is used to list features and extensions that a UA
requires a proxy to support in order to process the request.
Max - Forwards
The Max-Forwards header field is used to indicate the maximum number of hops
that a SIP request may take.
The value of the header field is decremented by each proxy that forwards
the request.
A proxy receiving the header field with a value of zero discards the
message and sends a 483 Too Many Hops response back to the originator.
Priority
The Priority header field is used by a UAC to set the urgency of a request. Values
are non-urgent, normal, urgent, and emergency.
Refer - To
The Refer-To header field is a mandatory header field in a REFER request, which
contains the URI or URL resource that is being referenced. It may contain any
type of URI from a sip or sips to a telURI.
33
Referred - By
The Referred-By header field is an optional header field in a REFER request and a
request triggered by a REFER.
Replaces
Replaces is used for replacing an existing call with a new call.
Request - Disposition
The Request-Disposition header field can be used to request servers to either
proxy, redirect.
Example:
Request-Disposition: redirect
Require
The Require header field is used to list features and extensions that a UAC
requires a UAS to support in order to process the request.
A 420 Bad Extension response is returned by the UAS listing any unsupported
features in an Unsupported header field.
Example:
Require: rel100
Route
The Route header field is used to provide routing information for requests.
34
RFC 3261 introduces two types of routing: strict routing and loose
routing, which have similar meaning as the IP routing modes of the same
name.
In strict routing, a proxy must use the first URI in the Route header field
to rewrite the Request-URI, which is then forwarded.
In loose routing, a proxy does not rewrite the Request-URI, but either
forwards the request to the first URI in the Route header field or to
another loose routing element.
In loose routing, the request must route through every server in the
Route list before it may be routed based on the Request-URI.
In strict routing, the request must only route through the set of servers in
the Route header field with the Request-URI being rewritten at each hop.
A proxy or UAC can tell if the next element in the route set supports loose
routing by the presence of an lr parameter.
Example:
Route: sip:[email protected];lr
RAck
The RAck header field is used within a response to a PRACK request to reliably
acknowledge a provisional response that contained an RSeq header field.
Its value is combination ofCSeq and the RSeq from the provisional
response.
Session - Expires
The Session-Expires header field is used to specify the expiration time of the
session.
35
SIP - If - Match
The SIP-If-Match header field is part of the SIP publication mechanism. It is
included in a PUBLISH request meant to refresh, modify, or remove previously
published state.
The header field contains the entity tag of the state information that was
returned in a SIP-ETag header field in a 2xx response to an earlier
PUBLISH.
If the entity-tag is no longer valid, the server will return a 412 Conditional
Request Failed response.
Example:
SIP-If-Match: 56jforRr1pd
Subscription - State
The Subscription-State header field is a required header field in a NOTIFY
request. It indicates the current state of a subscription. Values defined include
active, pending, or terminated.
Example:
Subscription-State: terminated; reason=rejected
A client receiving this header field can update the expiration intervals of
the registration request accordingly and resend the REGISTER request.
Min - SE
The Min-SE header field is a required header field in a 422 Session Timer
Interval Too Small response.
36
Proxy - Authenticate
The Proxy-Authenticate header field is used in a 407 Proxy Authentication
Required authentication challenge by a proxy server to a UAC.
It contains the nature of the challenge so that the UAC may formulate
credentials in a Proxy- Authorization header field in a subsequent request.
SIP - ETag
The SIP-ETag header field is part of the SIP publication mechanism. The SIPETag header field is returned in a 2xx response to a PUBLISH request.
It contains an entity tag uniquely identifying the state information that
has been processed.
This entity tag can then be used to do conditional publications on this data
including refreshing, modifying, and removing.
Unsupported
The Unsupported header field is used to indicate features that are not
supported by the server.
The header field is used in a 420 Bad Extension response to a request containing
an unsupported feature listed in a Require header field.
Example:
Unsupported: rel100
WWW - Authenticate
The WWW-Authenticate header field is used in a 401
authentication challenge by a UA or registrar server to a UAC.
Unauthorized
It contains the nature of the challenge so that the UAC may formulate
credentials in a Proxy-Authorization header field in a subsequent request.
RSeq
The RSeq header field is used in provisional (1xx class) responses to INVITEs to
request reliable transport.
The header field may only be used if the INVITE request contained the
Supported: rel100 header field.
Each subsequent provisional response sent reliably for this dialog will have
a monotonically increasing RSeq number.
The UAS will retransmit a reliably sent response until a PRACK is received
with a RAck containing the reliable sequence number and CSeq.
Content - Disposition
The Content-Disposition header field is used to describe the function of a
message body. Values include session, icon, alert, and render.
The value session indicates that the message body contains information to
describe a media session.
Content - Language
The Content-Language header field is used to indicate the language of a
message body. It contains a language tag, which identifies the language.
Example:
Content-Language: en
Content - Length
The Content-Length is used to indicate the number of octets in the message
body.
38
Content - Type
The Content-Type header field is used to specify the Internet media type in the
message body.
MIME - Version
The MIME-Version header field is used to indicate the version of MIME protocol
used to construct the message body.
SIP, like HTTP, is not considered MIME compliant because parsing and semantics
are defined by the SIP standard, not the MIME specification. Version 1.0 is the
default value.
Example:
MIME-Version: 1.0
39
7. SDP
Purpose of SDP
The purpose of SDP is to convey information about media streams in multimedia
sessions to help participants join or gather info of a particular session.
It conveys the name and purpose of the session, the media, protocols,
codec formats, timing and transport information.
The format has entries in the form of <type>= <value>, where the
<type>defines a unique session parameter and the <value>provides a
specific value for that parameter.
The line begins with a single lower-case letter, for example, x. There are
never any spaces between the letter and the =, and there is exactly one
space between each parameter. Each field has a defined number of
parameters.
40
v= (protocol version)
o= (owner/creator and session identifier)
s= (session name)
i=* (session information)
u=* (URI of description)
e=* (email address)
p=* (phone number)
c=* (connection information -not required if included in all media)
b=* (bandwidth information)
z=* (time zone adjustments)
k=* (encryption key)
a=* (zero or more session attribute lines)
Protocol Version
The v= field contains the SDP version number. Because the current version of
SDP is 0, a valid SDP message will always begin with v=0.
Origin
The o= field contains information about the originator of the session and session
identifiers. This field is used to uniquely identify the session.
The version is a numeric field that is increased for each change to the
session, also recommended to be a NTP timestamp.
41
URI
The optional u= field contains a uniform resource indicator (URI) with more
information about the session.
Connection Data
The c= field contains information about the media connection.
The address-type is defined as IP4 for IPv4 addresses and IP6 for IPv6
addresses.
Bandwidth
The optional b= field contains information about the bandwidth required. It is of
the form:
b = modifier:bandwidth-value
42
Media Announcements
The optional m= field contains information about the type of media session. The
field contains:
m = media port transport format-list
One of these three codecs can be used for the audio media session. If the
intention is to establish three audio channels, three separate media fields would
be used.
Attributes
The optional a= field contains attributes of the preceding media session. This
field can be used to extend SDP to provide more information about the media. If
not fully understood by a SDP user, the attribute field can be ignored. There can
be one or more attribute fields for each media payload type listed in the media
field.
Attributes in SDP can be either
session level, or
media level.
Session level means that the attribute is listed before the first media line in the
SDP. If this is the case, the attribute applies to all the media lines below it.
Media level means it is listed after a media line. In this case, the attribute only
applies to this particular media stream.
SDP can include
attribute appears
attribute for that
can also be either
43
An SDP Example
Given below is an example session description, taken from RFC 2327:
v=0
o=mhandley2890844526 2890842807 IN IP4 126.16.64.4
s=SDP Seminar
i=A Seminar on the session description protocol
u=http://www.cs.ucl.ac.uk/staff/M.Handley/sdp.03.ps
[email protected](Mark Handley)
c=IN IP4 224.2.17.12/127
t=2873397496 2873404696
a=recvonly
m=audio 49170 RTP/AVP 0
m=video 51372 RTP/AVP 31
m=application 32416udp wb
a=orient:portrait
SDP Extensions
There are a number of SDP extensions that have been defined. Common ones
are summarized in the following table.
44
The a=setup and a=connection attributes are used for connection oriented
media, such as TCP.
The first m= media line is for a BFCP stream running over TLS over TCP.
45
The use of SDP with SIP is given in the SDP offer answer RFC 3264. The default
message body type in SIP is application/sdp.
The calling party lists the media capabilities that they are willing to
receive in SDP, usually in either an INVITE or in an ACK.
The called party lists their media capabilities in the 200 OK response to the
INVITE.
A typical SIP use of SDP includes the following fields: version, origin, subject,
time, connection, and one or more media and attribute.
The subject and time fields are not used by SIP but are included for
compatibility.
In the SDP standard, the subject field is a required field and must contain
at least one character, suggested to be s=- if there is no subject.
The time field is usually set to t=00. SIP uses the connection, media, and
attribute fields to set up sessions between UAs.
The version is incremented each time the SDP is changed. If the SDP
being sent is unchanged from that sent previously, the version is kept the
same.
As the type of media session and codec to be used are part of the
connection negotiation, SIP can use SDP to specify multiple alternative
media types and to selectively accept or decline those media types.
Example
In the following example, the caller Tesla wants to set up an audio and video call
with two possible audio codecs and a video codec in the SDP carried in the initial
INVITE:
46
v=0
o=Tesla 2890844526 2890844526 IN IP4 lab.high-voltage.org
s=c=IN IP4 100.101.102.103
t=0 0
m=audio 49170 RTP/AVP 0 8
a=rtpmap:0 PCMU/8000
a=rtpmap:8 PCMA/8000
m=video 49172 RTP/AVP 32
a=rtpmap:32 MPV/90000
The codecs are referenced by the RTP/AVP profile numbers 0, 8, and 32.
The called party Marconi answers the call, chooses the second codec for the first
media field, and declines the second media field, only wanting a PCM A-Law
audio session.
v=0
o=Marconi 2890844526 2890844526 IN IP4 tower.radio.org
s=c=IN IP4 200.201.202.203
t=0 0
m=audio 60000 RTP/AVP 8
a=rtpmap:8 PCMA/8000
m=video 0 RTP/AVP 32
If this audio-only call is not acceptable, then Tesla would send an ACK then a BYE
to cancel the call. Otherwise, the audio session would be established and RTP
packets exchanged.
As this example illustrates, unless the number and order of media fields is
maintained, the calling party would not know for certain which media sessions
were being accepted and declined by the called party.
The offer/answer rules are summarized in the following sections.
47
The answer must have the same number of m= lines in the same order as
the answer.
The listed payloads for each media type must be a subset of the payloads
listed in the offer.
For dynamic payloads, the same dynamic payload number does not need
to be used in each direction. Usually, only a single payload is selected.
The origin (o=) line version number must either be the same as the last
one sent, which indicates that this SDP is identical to the previous
exchange, or it may be incremented by one, which indicates new SDP that
must be parsed.
The offer must include all existing media lines and they must be sent in
the same order.
Additional media streams can be added to the end of the m= line list.
Call Hold
One party in a call can temporarily place the other on hold. This is done by
sending an INVITE with an identical SDP to that of the original INVITE but with
a=sendonly attribute present.
The call is made active again by sending another INVITE with the a=sendrecv
attribute present. The following illustration shows the call flow of a call hold.
48
INVITE
PROXY
180 Ringing
UAS
INVITE
180 Ringing
200 OK
200 OK
ACK
ACK
Media/RTP
INVITE (Hold)
INVITE (Hold)
200 OK
200 OK
ACK
(a= sendonly)
ACK
NO RTP
NO RTP
===========//============
INVITE
200 OK
INVITE
200 OK
ACK
(a= sendrecv)
ACK
Media/RTP
49
9. SIP MOBILITY
The first registration is with the new service provider, which binds the
Contact URI of the device with the new service providers AOR URI.
As shown later in the call flow, when a request comes in to the original service
providers network, the INVITE is redirected to the new service provider who
then routes the call to the user.
50
Performs a re-INVITE to allow the signaling and media flow to the new IP
address.
If the UA can receive media from both networks, the interruption is negligible. If
this is not the case, a few media packets may be lost, resulting in a slight
interruption to the call.
52
54
The existing dialog between Bowditch and Laplace includes the old visited
proxy server.
The new dialog using the new wireless network requires the inclusion of
the new visited proxy server.
Service Mobility
Services in SIP can be provided in either proxies or in UAs. Providing service
mobility along with personal mobility can be challenging unless the users
devices are identically configured with the same services.
SIP can easily support service mobility over the Internet. When connected to
Internet, a UA configured to use a set of proxies in India can still use those
proxies when roaming in Europe. It does not have any impact on the quality of
the media session as the media always flows directly between the two UAs and
does not traverse the SIP proxy servers.
Endpoint resident services are available only when the endpoint is connected to
the Internet. A terminating service such as a call forwarding service
implemented in an endpoint will fail if the endpoint has temporarily lost its
Internet connection. Hence some services are implemented in the network using
SIP proxy servers.
55
SIP forking refers to the process of forking a single SIP call to multiple SIP
endpoints. This is a very powerful feature of SIP. A single call can ring many
endpoints at the same time.
With SIP forking, you can have your desk phone ring at the same time as your
softphone or a SIP phone on your mobile, allowing you to take the call from
either device easily. No forwarding rules would be necessary as both devices
would ring.
In the same manner, SIP forking can be used in an office and allow the secretary
to answer calls to the extension of his/her boss when he is away or unable to
take the call.
Note that a forking SIP proxy cannot be stateless because it needs to perform a
filtering operation, returning one response out of the many it receives.
We have two types of forking:
Parallel Forking
Sequential Forking
Parallel Forking
In this scenario, the proxy server will fork the INVITE to, say, two devices (UA2,
UA3) at a time. Both the devices will generate 180 Ringing and whoever receives
the call will generate a 200 OK. The response (suppose UA2) that reaches the
Originator first will establish a session with UA2. For the other response, a
CANCEL will be triggered.
56
UA1
INVITE
PROXY
UA2
UA3
INVITE
INVITE
180 Ringing
180 Ringing
180 Ringing
200 OK
200 OK
ACK
ACK
Media/RTP
CANCEL
200 OK
487 Req.Terminate
ACK
If the originator receives both the responses simultaneously, then based on qvalue, it will forward the response.
Sequential Forking
In this scenario, the proxy server will fork the INVITE to one device (UA2). If
UA2 is unavailable or busy at that time, then the proxy will fork it to another
device (UA3).
57
UA1
PROXY
UA2
UA3
INVITE
INVITE
486 Busy
ACK
181 Call being forwarded
INVITE
180 Ringing
180 Ringing
200 OK
200 OK
ACK
Media/RTP
A call is thus a group of call legs. A call leg refers to end-to-end connection
between UAs.
The CSeq spaces in the two directions of a call leg are independent. Within a
single direction, the sequence number is incremented for each transaction.
UA1
PROXY
UA2
UA3
INVITE
INVITE
180 Ringing
408 Req. Timeout
CANCEL
200 OK
487 Req. Terminated
ACK
180 Ringing
200 OK
200 OK
ACK
Media/RTP
Voicemail
Voicemail is a messaging service commonly associated with telephony
applications. It can be implemented as a service in a network (as provided by
mobile phone providers), in a separate device such as a home answering
machine, or incorporated in a telephony device such as an enterprise PBX or key
system.
59
60
Stateless proxies forget about the SIP request once it has been forwarded.
Stateless proxies scale very well, and can be very fast. They are good for
network cores.
Stateful proxies can fork and provide services that stateless ones can't
(call forward busy, for example).
Neither stateful nor stateless proxies need to maintain call state, although they
can.
61
Via
Via headers are inserted by servers into requests to detect loops and to allow
responses to find their way back to the client. They have no influence on the
routing of future requests (or responses).
A proxy forwarding the request adds a Via header field containing its own
address to the top of the list of Via header fields.
A proxy receiving a response checks the top Via header field and matches
its own address. If it does not match, the response has been discarded.
The top Via header field is then removed, and the response forwarded to
the address specified in the next Via header field.
Via header fields contain protocol name, version number, and transport
(SIP/2.0/UDP, SIP/2.0/TCP, etc.) and may contain port numbers and parameters
such as received, rport, branch, maddr, and ttl.
62
Let us take an example to show how a SIP phone places a telephone call to a
PSTN through PSTN gateway.
63
64
There are many codecs available in the market some are free while others
require licensing. Codecs vary in the sound quality, the bandwidth required, the
computational requirements, etc.
Hardware devices such as phones and gateways support several different
codecs. While talking to each other, they negotiate which codec they will use.
Here, in this chapter, we will discuss a few popular SIP audio codecs that are
widely used.
G.711
G.711 is a codec that was introduced by ITU in 1972 for use in digital telephony.
The codec has two variants: A-Law is being used in Europe and in international
telephone links, u-Law is used in the U.S.A. and Japan.
The bitrate is 64 kbit/s for one direction, so a call consumes 128 kbit/s.
G.711 is the same codec used by the PSTN network, hence it provides the
best voice quality. However it consumes more bandwidth than other
codecs.
G.729
G.729 is a codec with low bandwidth requirements; it provides good audio
quality.
The codec algorithm encodes each frame into 10 bytes, so the resulting
bitrate is 8 kbit/s in one direction.
65
G.729 is a licensed codec. End-users who want to use this codec should
buy a hardware that implements it (be it a VoIP phone or gateway).
G.723.1
G.723.1 is the result of a competition that ITU announced with the aim to design
a codec that would allow calls over 28.8 and 33 kbit/s modem links.
The bitrate of the first variant is 6.4 kbit/s, while for the second variant, it
is 5.3 kbit/s.
The encoded frames for the two variants are 24 and 20 bytes long,
respectively.
GSM 06.10
GSM 06.10 is a codec designed for GSM mobile networks. It is also known as
GSM Full Rate.
This variant of the GSM codec can be freely used, so you will often find it
in open source VoIP applications.
The codec operates on audio frames 20 ms long (i.e. 160 samples) and it
compresses each frame to 33 bytes, so the resulting bitrate is 13 kbit/.
66
14. B2BUA
Functions of B2BUA
A B2BUA provides the following functions:
Often, B2BUAs are also implemented in media gateways to bridge the media
streams for full control over the session.
Example of B2BUA
Many private branch exchange (PBX) enterprise telephone systems incorporate
B2BUA logic.
Some firewalls have ALG functionality built in, which allows a firewall to permit
SIP and media traffic while still maintaining a high level of security.
Another common type of B2BUA is known as a Session Border Controller (SBC).
67