Session Initiation Protocol (SIP): Controlling Convergent Networks

  • ISBN13:


  • ISBN10:


  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2008-06-30
  • Publisher: McGraw-Hill Education
  • Purchase Benefits
  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $89.00 Save up to $13.35
  • Buy New
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.


From a leading expert on the topic of SIP Session Initiation Protocol (SIP) provides you with a comprehensive implementation guide to maintaining and troubleshooting an SIP network and understanding its operations. SIP is a signaling protocol used for VoIP, instant messaging, online games, and other multimedia elements. This practical guide covers registration procedures within an SIP network, security, SIP Response Codes, extending SIP to support new functions, and more.

Author Biography

Travis Russell has been in the telecommunicationsindustry since 1977. He is a senior manager in Tekelec’sCommunications Software Solutions Group. Travis is the author ofSignaling System #7 (978-0-07-146879-4), now in its fifth edition.

Table of Contents

Acknowledgmentsp. xiii
Introductionp. xv
Architecture of a SIP Networkp. 1
The Traditional Voice Networkp. 2
Wireline Network Architecturep. 2
Wireless Network Architecturep. 5
Network Elements in a Voice over IP Networkp. 7
Media Gateway (MG)p. 9
Media Gateway Control Function (MGCF)p. 10
Signaling Gatewayp. 10
Application Servers (ASs)p. 11
The Domain Name System (DNS)p. 11
Electronic Numbering (ENUM)p. 12
SIP-Specific Entitiesp. 13
User Agents (UAs)p. 14
Proxy Serversp. 16
Redirect Serversp. 18
Registrarsp. 19
Location Serversp. 19
Structure of the SIP Protocolp. 21
SIP Messages and Formatsp. 21
Concept of a Dialogp. 23
Requestsp. 25
Responsesp. 26
Header Fieldsp. 28
SIP Identitiesp. 42
Private User Identityp. 44
Public User Identityp. 45
Session Description Protocol (SDP)p. 46
Session Descriptionsp. 48
Time Descriptionsp. 50
Media Descriptionsp. 51
Attributesp. 52
SIP Status Codesp. 55
1xx Provisional Codesp. 57
2xx Successful Status Codesp. 59
3xx Redirection Status Codesp. 60
4xx Client Failure Status Codesp. 61
5xx Server Failure Status Codesp. 69
6xx Global Failure Status Codesp. 70
Registration Procedures in a SIP Networkp. 73
Basic Registrationp. 74
Event Notificationp. 77
Message Waiting Indication (MWI)p. 77
Interworking with the PSTNp. 79
Establishing a Session in SIPp. 91
Accessing the Networkp. 92
Initiating a Dialogp. 93
Client Requestp. 97
Server Responsep. 99
Emergency Session Establishmentp. 101
SIP Routingp. 102
Loose Routingp. 103
Strict Routingp. 108
SIP Session Modificationp. 111
SIP Session Terminationp. 112
Extending SIP to Support New Functionsp. 115
The Concept of SIP Extensionsp. 116
How Extensions are Documentedp. 117
How Extensions are Treatedp. 117
Some Examples of Extensionsp. 118
P-Access-Network-Infop. 119
P-Answer-Statep. 120
P-Asserted-Identityp. 121
P-Associated-URIp. 121
P-Called-Party-IDp. 122
P-Charging-Function-Addressesp. 122
P-Charging-Vectorp. 123
P-Early Mediap. 124
P-Media-Authorizationp. 125
P-Preferred-Identityp. 125
P-Profile-Keyp. 126
P-User-Databasep. 126
P-Visited-Network-ID Headerp. 127
Packet Cable Extensionsp. 128
P-DCS-Trace-Party-IDp. 128
P-DCS-OSPSp. 128
P-DCS-Billing-Infop. 129
P-DCS-LAESp. 130
P-DCS-Redirectp. 131
Security in a SIP Networkp. 133
Types of Network Attacksp. 134
Registration Hijackingp. 135
Session Hijackingp. 136
Impersonating a Serverp. 137
Tampering with Message Bodiesp. 138
Tearing Down Sessionsp. 138
Denial of Service and Amplificationp. 139
Bots and DDoS Attacksp. 140
Security Measuresp. 141
Password and Access Controlsp. 145
Encryptionp. 146
Authentication and Authorizationp. 149
Strict Routingp. 150
Security Solutionsp. 151
Intrusion Detectionp. 152
Intrusion Protectionp. 156
SIP-Related RFCsp. 159
IETF SIP Requests for Comments (RFCs)p. 159
Methods and Parametersp. 163
ACK Methodp. 164
BYE Methodp. 165
CANCEL Methodp. 170
INVITE Methodp. 172
MESSAGE Methodp. 178
NOTIFY Methodp. 182
OPTIONS Methodp. 186
REGISTER Methodp. 191
SUBSCRIBE Methodp. 196
UPDATE Methodp. 201
Methods and Parameters from a Proxy Perspectivep. 207
ACK Methodp. 208
BYE Methodp. 209
CANCEL Methodp. 213
INVITE Methodp. 215
MESSAGE Methodp. 220
NOTIFY Methodp. 224
OPTIONS Methodp. 229
REGISTER Methodp. 233
SUBSCRIBE Methodp. 238
UPDATE Methodp. 243
Bibliographyp. 247
Indexp. 251
Table of Contents provided by Ingram. All Rights Reserved.

Rewards Program

Write a Review