This article is from csdn lidp and reposted the famous source. Thank you.
For information and technology trends in the VoIP industry, see www.voip123.cn.
For the registration function, Asterisk SIP protocol stack provides two services,
1. Asterisk is used as the SIP client and registered with other sip servers.2. Asterisk is used as the
1.1 SIP Message Classification
SIP protocol is formed in the form of layer protocol, that is, its behavior is described in a set of relatively independent processing stages, the relationship between each phase is not very close.
The SIP protocol divides the messages between the server and the user agent into two categories: the request message and the response me
In the process of building PYQT I met a very disgusting problem, in the installation of the SIP after compiling the source code after the installation process has been prompted me: Operation not permitted , I even reinstall the system is useless, finally through the data to overcome the problem.
Installing SIPDownload the SIP source code package after extracting it into its folder:python configure
In a conversation, there are other correlations that will be sent. A conversation is an end-to-end sip relationship between two users that lasts a certain amount of time. The dialog process requires that the information between the two user agents be ordered and that the request be routed properly. In this specification, only invite requests can be used to establish a session. When a UAC makes a request in a conversation, it follows not only the gener
The SIP protocol is an application-layer control protocol used to establish, modify, and terminate multimedia sessions. It draws a lot from mature HTTP protocols (such as text format encoding and method in request messages ), the text-based UTF-8 encoding method can be used to carry the UDP or TCP protocol (UDP preferred ). Similar to the Diameter protocol, SIP also has a basic protocol and many extension p
Rfc3261 Chinese translation [version D]
Parallel search: Parallel search. In parallel search, a proxy server sends multiple requests to a possible user location to receive the request response. Serial search: waits for the final response of the previous request before sending the next request. Different from serial search, parallel search sends multiple requests without waiting for the results of previous requests.
Provisional response: temporary response. The server is used to indicate the prog
In the dialog, other related information will be sent. A conversation is an end-to-end sip relationship between two users that lasts for a certain period of time. The dialog process requires that the information between the two user proxies is ordered and the request is transmitted through the correct route. In this specification, only the invite request can be used to establish a session. When a UAC sends a request in a dialog, it not only follows th
1.1.1. Route/record-route
? Record-route can be used:
-Ensures firewall proxy stays in Path
? A firewall proxy adds record-Route Header
-Clients and servers copy record-route and put in Route Header for all messages
Request Routing
Example: only proxy 3 remains in route
1. ua1 is being ucted to invite "SIP: ua2 @ proxy1"
2. The message shocould be sent to proxy 1
3. The message shocould be sent to proxy 2
4. The message shocould be sent to proxy
RTP/RTCP/RTSP/SIP/SDP RelationshipRTP (real-time transport protocol, Transport layer)Real-time Transport Protocol) is a Transport layer protocol for multimedia traffic on the Internet. The RTP protocol details the standard packet format for transmitting audio and video over the Internet. RTP protocols are commonly used in streaming media systems (with the RTCP protocol), video conferencing and a Push-to-talk system (with either a/p or
I. background and functions of the SIP protocolSIP (Session Initiation Protocol) is developed to help provide advanced telephone services that span the internet. Internet telephone IP telephone) is evolving to a formal business telephone model, and SIP is an important member of the series of protocols to ensure the implementation of this evolution.SIP is part of the IETF standard process. It is built based
1. There are four Nat models for the SIP protocol.A) Full cone full coneB) Restricted cone of restricted coneC) Restricted cone of port restricted portD) symmetric ricA, B, and C are also called asymmetric Nat.
2. If the SIP terminal is behind Nat, problems may occur in its work. The reason is that the path of the sip signaling is different from that of the media
The original link (also reproduced) http://blog.csdn.net/yetyongjin/article/details/6881491. I have modified some typos. SIPWhat kind of problems do you encounter from the private network to the public network? 1. Address translation of the package.2. SIP address translation inside SIP messages.3. The RTP address translation in the SDP in the SIP message.The exis
Tags: blog http os ar using file data on artOriginal: Asterisk real-time add SIP number--sqliteAsterisk real-time add SIP number--sqliteToday, I tried to use Asterisk's real-time mode to add a SIP account to SQLite without restartingAsterisk, no need to reload, you can successfully register a SIP account, the following
The previous article briefly analyzes the imsdroid project. This article continues the previous article. Continue to analyze the IMS Private Identity (IMPI) Identity authentication user id for example: banketreeIMS Public Identity (IMPU) Public authentication such as: sip: 33446677887@doubango.org service settings: [java] // Sets IP address final String proxyHost = "192.168.0.1"; mConfigurationService (ConfigurationEntry. NETWORK_PCSCF_HOST, proxyHost
http://blog.csdn.net/noiile/article/details/115436
What are the problems with SIP from private network to public network?
Address translation of the package.
SIP address Translation inside the SIP message.
The RTP address translation in the SDP inside the SIP message.
The existing structure of the network is complex
Document directory
Registering multiple user devices
The via header, forking, loop prevention
An example using proxies
User location
Let's step out of the SIP layers and see what we have so far: using the layers, we can now create and receive sip transactions.
One basic requirement in SIP is for phone devices to be able to register their location with a regi
Transferred from: blog.csdn.net/boy8239/article/details/1799542Author: boy8239 has already introduced sip-related knowledge about important SIP header domains, registration processes, and session processes. Now let's introduce the Routing Mechanism in SIP. In general, there are two routing scenarios in SIP: 1. Request
I. SIP Concept
Session Initiation Protocol (SIP) is an application-layer control Protocol used to establish, modify, and terminate multimedia sessions. sessions can be IP phones, multimedia distribution, and multimedia meetings. It is the core protocol of the IETF multimedia data and control architecture (RFC3261 is the latest RFC document ). The main purpose is to solve the signaling control in the IP netw
Address: http://www.linphone.org/eng/documentation/guide/
What is sip? (What is Sip)
SIP is a protocol for establishing voice over ip cils. it is an open standard, published by the IETF organization, who made the vast majority of Internet protocols. it is too red from e-mail and HTTP. the following section describes the base principlesSIP from the user's standpoi
I'm afraid you know more about the Unified Communication Protocol. If you are not clear about it, don't worry. Next, Let's explain the content. How does the SIP Protocol promote unified communication? Next, let's take a look at some of the characteristics of the SIP protocol. Let's see how it provides support in this regard.
Support for the SIP protocol in Unifie
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.