Abstract sip, sap, and SDP are important protocols involved in NGN and 3tnet. Based on introduction and analysis of SIP, sap, and SDP protocols, this paper provides a multimedia conference application instance based on the combination of the three protocols.
Key words: SIP sap SDP
1 Introduction
Session Initiation Protocol (
1 Introduction
SIPSession Initiation Protocol, Session Initiation Protocol), SAPSession Announcement Protocol, Session notification Protocol), SDPSession Description Protocol, Session Description Protocol) are three sessions) related RFC protocols are connected and differentiated. In this article, we will make a simple analysis of the three protocols and provide a multimedia application that has some practical value to achieve with these three protocols.
2 protocol analysis
2.1 introduction and
Before learning MPLS, you should know that MPLS has two modes of operation.
1, Frame mode--gt; in the third-level group header (such as IP packet header) before the tag to forward.
2.---gt; in the MPLS network composed of ATM LSR, MPLS is used to exchange Vpi/vci information in the control plane instead of using ATM
MPLS label distribution protocols include:1. LDP (Label Distribution Protocol)2. TDP (CISCO private)3. RSVP Resource Reservation Protocol4. CE-LDP5. MP-BGP (Multi-Protocol extensions for BGP-4)6. Labeled BGP (BGPV4 with label distribution capability)LDP (Label Distribution Protocol) Label Distribution ProtocolLDP operations mainly include the following four stages:(1) discovery stage(2) session establishment and maintenance(3) LSP establishment and ma
VPN instance changes, the changed PE device should take the initiative to send the BGP refresh packet to refresh the VPN route, and use the new RT attribute to filter the route.
Different from RD, We can configure multiple RT attributes for a VPN instance, and the RT attributes are released in the extended group attributes of the bgp update message. The format is similar to that of common group attributes. When a route carries multiple extended group attributes and RT attributes at the same tim
Let's talk about the "things" Of The osx sip mechanism"I. Preface
OSX is an exclusive operating system developed by Apple for Mac products. It is the first FreeBSD-based system to adopt an object-oriented operating system.
From the OSX V10.0-V10.8 version, OSX systems are all codenamed big cats, maybe old Joe is also a fan of cats (I am also a loyal fan of cats, haha ), the OSX system is evolved as follows:
2001Mac OSX 10.0 Cheeta Cheetah
2001Mac O
Session Initiation Protocol,sip is a signaling protocol that establishes, modifies, and terminates a session between two endpoints. SIP can be used to establish a multicast session for two-party calls, multiparty calls, or even Internet calls, multimedia calls, and multimedia distribution. The JSR 116:sip Servlet API is a server-side interface that describes cont
In the traffic engineering of MPLS TE, it is divided into the following aspects:
1, the release of information
2, the calculation and establishment of the path
3, traffic forwarding in the tunnel.
So here to understand the path calculation and build, first of all to understand how SPF is working, and then see what is CSPF (constrained SPF). In order to establish the calculation of the path is a good understanding. In detail, why do you want to lea
The principle of the protection of TE is already mentioned. Today's focus is to explain how the Frr-fast-reroute in Te Protection is configured, and how to look at the state.
Before introducing the configuration, it is important to note that FRR fast rerouting is a protection mechanism.
Imagine if the R2 to R6 is an ordinary IGP network. After the middle link down, what is the situation?
It should be the first problem the router sends the LSA through the other interface and then reddening to
Cea1:r01 (R01---E0/2---R06)
CEB1:R07 (R07---e0/0---R06) temporarily end with this CE end
ISP:R06---E1/1---R02---e1/0---R08
CEA2:R03 (R03---E0/2---R08)
CEB2:S09 (R08---e0/0---S09) temporarily end with this CE end
1, the core of the SP to run a IGP first, so that the core of the routers within the route to reach
2, the SP's PE end runs between the MP-BGP (VPNV4,MP-BGP neighbor must use the ring back to establish)
3, the SP PE end to create VRF, and CE-connected interface into the VRF
4, in
There are many tools used in Python in the swig (in English meaning: booze), sip (in English), and Boost.python. SIP is developed from Swig, and is specifically designed for Python to call C + + modules (see SIP naming to see, very interesting).SIP usage, in the official website of the
SIP is a tool for generating C + + interface code for Python, similar to SWIG, but using a different interface format. The idea originated in Swig, primarily to create the QT package for Python, which was used to create PyQt and Pykde , and to support the QT Signal/slot system. This article mainly introduces the compilation and installation of SIP and the birth of C + + code into Python under the window pla
For multi-user communications, there are also common protocols for standardized management, such as the previously mentioned SDP and SIP (Session initiation Protocol), which is a control protocol belonging to the application layer, primarily used to create, modify, and abort sessions between one or more participants ( Sessions). The types of sessions include IP telephony, multimedia streaming, and multimedia conferencing.SIP IntroductionSIP invitation
A technology, especially network-centric and communication-centric technology, has its own transmission protocol. Now we will introduce some knowledge about Cisco Unified Communication Protocols. So what is SIP when Cisco's unified communication protocol is used? Why is it used?
Support for the SIP protocol in Cisco Unified CommunicationThe SIP Protocol provides
MPLS default MTU is 1500, do not make any changes, I ping full package does not fragment, why can pass! It adds MPLS information altogether is 1504 bytes, how can transmit?
Here is my reply:
It has been verified, what you need to do is to study your network topology again, if you have a ready-made environment, put your detailed topology map, as well as the configuration of each device sent to me, I can he
Sip nat/FW
Default font9pt10pt11pt12pt13pt14pt15pt16pt17pt18pt20pt25pt30pt35pt40pt45pt50pt
Basic Principles of NAT and FirewallFirst, there are several Nat methods:
Full Cone: when a private network host sends a packet to the public network, its local address and port are {A: B}, Nat will set its private address {: b} convert to public address {X: y} and bind it. Any package can be sent to the host's {A: B} address through the address {X: y}. Nat w
, which is intercepted by the owner proxy and encapsulated through a IPv6-in-IPv6) tunnel to the current transfer address of the mobile node. When a mobile node receives a packet encapsulated by a IPv6-in-IPv6, it sends a binding update message. If the entry LER receives the Binding Update message from the mobile node, it initiates the LSP operation between the entry LER and the exit LER.
The IP-in-IP tunneling technology of the original Mobile IP protocol has a high header overhead and heavy lo
MPLS, IPSEC, and SSL analysis MPLS leased line MPLS (Multi-Protocol Label Switching), Multi-Protocol Label Switching. * Multi-Protocol refers to MPLS's support for multiple network layer protocols, such as IP, IPv6, and IPX. It is also compatible with multiple link layer technologies, including ATM, frame relay, Ethernet, and PPP; * label exchange is to attach a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.