没有合适的资源?快使用搜索试试~ 我知道了~
首页SIP协议开发详解:网络多媒体通信与IPTelephony
SIP协议开发详解:网络多媒体通信与IPTelephony
需积分: 10 1 下载量 92 浏览量
更新于2024-07-18
收藏 4.19MB PDF 举报
"Handbook on Session Initiation Protocol(part1)是一部深入探讨SIP协议的开发手册,专注于网络多媒体通信在IP电话中的应用。该书详细阐述了SIP协议的各个方面,包括路由机制、媒体能力协商策略以及SIP的安全措施,为SIP协议的开发者提供了宝贵的参考资料。"
SIP(Session Initiation Protocol)是一种应用层控制协议,主要用于建立、修改和终止多媒体通信会话,如语音通话、视频会议和即时消息等。在IP电话领域,SIP扮演着核心角色,使得网络通信变得更加高效和灵活。
1. **SIP路由**:SIP路由是SIP协议中至关重要的部分,它决定了SIP消息如何在互联网上从一个用户代理(UA)传递到另一个UA。SIP路由涉及到多个概念,如SIP URI(统一资源标识符)、Route、Record-Route、Via头域等。这些元素共同工作,确保消息沿着正确的路径传递,同时允许服务提供商实现复杂的路由策略,如负载均衡、故障转移和增值服务插入。
2. **媒体能力协商**:SIP协议支持会话初始化时的媒体能力协商,允许通信双方确定最佳的音频和视频编码格式、带宽需求以及其他媒体参数。这个过程通常通过SDP(Session Description Protocol)进行,确保双方都能支持并同意使用的媒体类型,从而实现高质量的多媒体通信。
3. **SIP安全机制**:由于SIP处理敏感的通信数据,因此必须考虑安全性问题。SIP安全涵盖多个方面,包括认证、授权、隐私保护和消息完整性。常见的安全措施有使用TLS(Transport Layer Security)加密传输,通过SIP Servlets或访问控制列表(ACL)进行访问控制,以及使用SRTP(Secure Real-time Transport Protocol)对媒体流进行加密。此外,SIP还支持基于证书的身份验证,以防止中间人攻击和消息篡改。
除了上述内容,该手册可能还会涉及以下主题:
- SIP信令流程:详述SIP请求和响应的交互过程,如INVITE、ACK、BYE、CANCEL等消息的作用。
- SIP服务器和代理:解释注册服务器、代理服务器和重定向服务器的角色和功能。
- 错误处理和重试策略:讨论SIP协议如何处理错误情况,以及如何设计有效的重试机制。
- 实现与部署:提供SIP系统设计和部署的最佳实践,可能包括软交换、IMS(IP Multimedia Subsystem)架构等。
- 兼容性和互操作性:探讨不同SIP实现之间的兼容性问题,以及如何实现跨供应商的互操作性。
"Handbook on Session Initiation Protocol(part1)"为读者提供了一个全面的SIP学习平台,无论是对于初学者还是经验丰富的开发者,都是深入了解和掌握SIP协议的宝贵资源。通过阅读此手册,读者将能够理解SIP的工作原理,解决实际开发中的挑战,并为构建可靠的IP电话和多媒体通信系统奠定坚实基础。
Contents ◾ xv
16.3.1 Overview ..........................................................................................................................................575
16.3.2 Diversion and History-Info Header Interworking in SIP ..................................................................576
16.4 Call Services Using Session Border Controller ...............................................................................................582
16.4.1 Overview ..........................................................................................................................................582
16.4.2 Distributed SBC Architecture ...........................................................................................................583
16.4.3 Conclusion ........................................................................................................................................587
16.5 Referring Call to Multiple Resources ............................................................................................................. 588
16.5.1 Overview ..........................................................................................................................................588
16.5.2 Operation .........................................................................................................................................588
16.5.3 Multiple-Refer SIP Option Tag ......................................................................................................... 588
16.5.4 Suppressing REFER’s Implicit Subscription ......................................................................................588
16.5.5 URI-List Format ...............................................................................................................................589
16.5.6 Behavior of SIP REFER-Issuers ........................................................................................................590
16.5.7 Behavior of REFER-Recipients .........................................................................................................590
16.5.8 Example ............................................................................................................................................590
16.6 Call Services with Content Indirection ..........................................................................................................591
16.6.1 Overview ..........................................................................................................................................591
16.6.2 Use-Case Examples ...........................................................................................................................592
16.6.3 Requirements ....................................................................................................................................593
16.6.4 Application of MIME-URI Standard to Content Indirection ...........................................................593
16.6.5 Examples ...........................................................................................................................................596
16.7 Transcoding Call Services .............................................................................................................................596
16.7.1 Transcoding Services Framework ...................................................................................................... 596
16.7.2 ird-Party Transcoding Services .....................................................................................................597
16.7.3 Conference Bridging Transcoding Call Control Flows .................................................................... 604
16.8 INFO Method—Mid-Call Information Transfer ..........................................................................................607
16.8.1 Overview ..........................................................................................................................................607
16.8.2 Motivation ........................................................................................................................................607
16.8.3 UAs Are Allowed to Enable Both Legacy INFO Usages and Info .................................................... 608
16.8.4 INFO Method ................................................................................................................................. 608
16.8.5 INFO Packages ................................................................................................................................ 609
16.8.6 Formal INFO Method Definition and Header Fields ....................................................................... 611
16.8.7 INFO Package Considerations ..........................................................................................................611
16.8.8 Alternative Mechanisms ....................................................................................................................611
16.8.9 INFO Package Requirements ...........................................................................................................612
16.8.10 Examples ...........................................................................................................................................614
16.9 SIP Call Control UUI Transfer Services ........................................................................................................616
16.9.1 Overview ..........................................................................................................................................616
16.9.2 Requirements for UUI Transport .....................................................................................................616
16.9.3 Possible Approaches for UUI Transport in SIP ................................................................................. 617
16.9.4 SIP Extensions for UUI Transport ....................................................................................................619
16.9.5 Normative Definition .......................................................................................................................619
16.9.6 Guidelines for UUI Packages ............................................................................................................ 621
16.9.7 Use Cases ..........................................................................................................................................622
16.10 Call Services Using DTMF ...........................................................................................................................623
16.11 Emergency Call Services in SIP .....................................................................................................................624
16.11.1 Overview ..........................................................................................................................................624
16.11.2 Emergency Services Uniform Resource Name ..................................................................................625
16.11.3 Multilevel Precedence and Preemption .............................................................................................625
16.12 Summary .......................................................................................................................................................626
References ................................................................................................................................................................627
xvi ◾ Contents
17 Media Server Interfaces in SIP ........................................................................................................................ 629
17.1 Introduction ..................................................................................................................................................629
17.2 SIP Interface to VoiceXML Media Server ...................................................................................................... 630
17.2.1 Overview ..........................................................................................................................................630
17.2.2 Use Cases ..........................................................................................................................................630
17.2.3 VoiceXML Session Establishment and Termination .........................................................................632
17.2.4 Media Support ..................................................................................................................................637
17.2.5 Returning Data to the Application Server .........................................................................................639
17.2.6 Outbound Calling ........................................................................................................................... 640
17.2.7 Call Transfer .................................................................................................................................... 640
17.3 Summary ...................................................................................................................................................... 642
References ............................................................................................................................................................... 643
18 Multiparty Conferencing in SIP .....................................................................................................................645
18.1 Introduction ..................................................................................................................................................645
18.2 Multiparty Multimedia Conferencing ...........................................................................................................645
18.3 ird-Party Multiparty Conferencing .......................................................................................................... 646
18.3.1 3PCC Call Establishment ................................................................................................................ 646
18.3.2 Recommendations for 3PCC Call Setups .........................................................................................649
18.3.3 Multiparty Call Establishment Error Handling ................................................................................649
18.3.4 Continued Call Processing in 3PCC ................................................................................................. 650
18.3.5 3PCC and Early Media ..................................................................................................................... 650
18.3.6 3PCC and SDP Preconditions ..........................................................................................................651
18.3.7 3PCC Service Examples ....................................................................................................................652
18.3.8 3PCC Implementation Recommendations ........................................................................................ 654
18.3.9 Concluding Remarks ........................................................................................................................654
18.4 Summary ....................................................................................................................................................... 654
19 Security Mechanisms in SIP ............................................................................................................................ 657
19.1 Introduction ..................................................................................................................................................657
19.2 Multilevel Security Characteristics in SIP......................................................................................................658
19.2.1 Overview ..........................................................................................................................................658
19.2.2 Session-Level Security .......................................................................................................................658
19.2.3 Media-Level Security ........................................................................................................................672
19.3 Security Mechanisms Negotiation .................................................................................................................679
19.3.1 Security Mechanisms Negotiation ................................................................................................... 680
19.3.2 Backwards Compatibility .................................................................................................................. 683
19.3.3 Security Algorithms Negotiation Example ........................................................................................683
19.3.4 Security Considerations ................................................................................................................... 684
19.3.5 Syntax of IPsec–3GPP Security Headers ...........................................................................................685
19.4 Authentication in SIP ................................................................................................................................... 686
19.4.1 Background ..................................................................................................................................... 686
19.4.2 Framework ........................................................................................................................................687
19.4.3 User-to-User Authentication .............................................................................................................688
19.4.4 Proxy-to-User Authentication ...........................................................................................................689
19.4.5 Digest Authentication Scheme ..........................................................................................................690
19.4.6 Domain Certificates over TLS for Authentication in SIP ..................................................................690
19.4.7 Authenticated Identity Body Format in SIP ......................................................................................697
19.4.8 Cryptographic Authentication Scheme .............................................................................................701
19.4.9 HTTP Digest Authentication Using AKA in SIP .............................................................................716
19.4.10 Key-Derivation Authentication Scheme in SIP .................................................................................721
19.4.11 DNS-Based Authentication for TLS Sessions in SIP .........................................................................723
Contents ◾ xvii
19.5 Authorization in SIP ......................................................................................................................................725
19.5.1 Trait-Based Authorization in SIP ......................................................................................................725
19.5.2 Authorization through Dialog Identification in SIP ..........................................................................732
19.5.3 Media Authorization in SIP ..............................................................................................................737
19.5.4 Early-Media Authorization in SIP ..................................................................................................... 742
19.5.5 Framework for Session Setup with Media Authorization ..................................................................742
19.6 Integrity and Confidentiality in SIP ..............................................................................................................743
19.6.1 S/MIME Certificates ........................................................................................................................743
19.6.2 S/MIME Key Exchange .................................................................................................................... 743
19.6.3 Securing MIME Bodies ....................................................................................................................744
19.6.4 SIP Header Confidentiality and Integrity Using S/MIME: Tunneling SIP .......................................745
19.7 Security for SIP URI-List Services .................................................................................................................748
19.7.1 Objective ...........................................................................................................................................748
19.7.2 Requirements ....................................................................................................................................748
19.7.3 Framework ........................................................................................................................................ 748
19.7.4 Security Considerations ....................................................................................................................749
19.8 Consent-Based Communications for Enhancing Security in SIP ...................................................................750
19.8.1 Objective ...........................................................................................................................................750
19.8.2 Definitions and Terminology ............................................................................................................ 751
19.8.3 Relays and Translations .....................................................................................................................751
19.8.4 Architecture ......................................................................................................................................752
19.8.5 Framework Operations .....................................................................................................................754
19.8.6 Security Considerations ....................................................................................................................761
19.9 SIP Forking Proxy Security ...........................................................................................................................762
19.9.1 Overview ..........................................................................................................................................762
19.9.2 Vulnerability: Leveraging Forking to Flood a Network ..................................................................... 762
19.9.3 Security Considerations ....................................................................................................................764
19.10 Nonrepudiation Services in SIP .....................................................................................................................764
19.11 Call Flows Explaining SIP Security Features ................................................................................................. 765
19.11.1 Registration.......................................................................................................................................765
19.11.2 Session Setup ....................................................................................................................................765
19.12 reat Model and Security Usage Recommendations in SIP .........................................................................767
19.12.1 Attacks and reat Models ...............................................................................................................768
19.12.2 Security Mechanisms ........................................................................................................................769
19.12.3 Implementing Security Mechanisms .................................................................................................771
19.12.4 Limitations .......................................................................................................................................774
19.13 Summary .......................................................................................................................................................775
References ............................................................................................................................................................... 777
20 Privacy and Anonymity in SIP ........................................................................................................................ 779
20.1 Introduction ..................................................................................................................................................779
20.2 Privacy Mechanism in SIP ............................................................................................................................. 780
20.2.1 Background ......................................................................................................................................780
20.2.2 Varieties of Privacy ............................................................................................................................781
20.2.3 UA Behavior .....................................................................................................................................782
20.2.4 UA Behavior Constructing Private Messages ....................................................................................782
20.2.5 UA Behavior Expressing Privacy Preferences .....................................................................................783
20.2.6 UA Behavior Routing Requests to Privacy Services ...........................................................................784
20.2.7 UA Behavior Routing Responses to Privacy Services .........................................................................784
20.2.8 Privacy Service Behavior ...................................................................................................................785
20.2.9 Location Information Privacy ...........................................................................................................787
20.2.10 Security Considerations ....................................................................................................................787
xviii ◾ Contents
20.3 Asserted and Preferred Identity for Privacy in SIP .........................................................................................788
20.3.1 Background ......................................................................................................................................788
20.3.2 P-Asserted-Identity and P-Preferred-Identity for Privacy ...................................................................788
20.3.3 Proxy Behavior ..................................................................................................................................789
20.3.4 Hints for Multiple Identities .............................................................................................................789
20.3.5 Requesting Privacy ............................................................................................................................ 789
20.3.6 UAS Behavior ...................................................................................................................................790
20.3.7 Examples ...........................................................................................................................................790
20.3.8 Example of Spec(T) ..........................................................................................................................792
20.3.9 Security Considerations ....................................................................................................................792
20.4 Connected Identity for Privacy in SIP ...........................................................................................................793
20.4.1 Overview ..........................................................................................................................................793
20.4.2 Terminology .....................................................................................................................................793
20.4.3 Overview of Solution ........................................................................................................................793
20.4.4 UA Behavior outside the Context of an Existing Dialog ...................................................................794
20.4.5 Behavior of a UA Whose Identity Changes .......................................................................................794
20.4.6 General UA Behavior ........................................................................................................................795
20.4.7 Authentication Service Behavior .......................................................................................................795
20.4.8 Verifier Behavior ...............................................................................................................................795
20.4.9 Proxy Behavior ..................................................................................................................................795
20.4.10 Examples ........................................................................................................................................... 796
20.4.11 Security Considerations ................................................................................................................... 800
20.5 Guidelines for Using Privacy Mechanism in SIP ...........................................................................................801
20.5.1 Definition .........................................................................................................................................801
20.5.2 Semantics of Existing Priv-Values .....................................................................................................801
20.5.3 Target for Each Priv-Value ................................................................................................................801
20.5.4 Recommended Treatment of User Privacy-Sensitive Information .....................................................803
20.6 Anonymity in SIP ..........................................................................................................................................810
20.6.1 Overview ..........................................................................................................................................810
20.6.2 UA-Driven Anonymity .....................................................................................................................810
20.6.3 Rejecting Anonymous Requests ........................................................................................................813
20.7 Summary .......................................................................................................................................................814
Appendix A: ABNF................................................................................................................................................... 815
Appendix B: Reference RFCs ................................................................................................................................... 821
Index ........................................................................................................................................................................ 839
xix
List of Figures
Figure 2.1 Relationship of multimedia session control layer to other layers .....................................................................18
Figure 2.2 SIP and its relationship to other protocols ......................................................................................................20
Figure 2.3 Example SIP request message format .............................................................................................................39
Figure 2.4 Example SIP response message format .......................................................................................................... 40
Figure 2.5 Logical view of a SIP network and its functional entities .............................................................................. 40
Figure 2.6 SIP network with trapezoid operation with signaling and media: (a) SIP network with two UAs and two
proxies with SIP trapezoid operation, (b) URIs and IP addresses for SIP entities, and (c) SIP session
establishment and termination .......................................................................................................................61
Figure 2.7 PoC behavior and operation—(a) expected behavior, (b) network behavior, and (c) operational view ..........155
Figure 3.1 SIP registration: (a) SIP trapezoidal network, (b) SIP URIs and IP addresses of functional entities,
and (c) registration call flows ........................................................................................................................ 177
Figure 3.2 Multiple-AOR registration by SIP–PBX with SSP. .......................................................................................182
Figure 3.3 Basic bulk SIP REGISTER transaction .......................................................................................................191
Figure 3.4 Bulk REGISTER transaction with SSP making use of path header .............................................................191
Figure 3.5 Example of early dialog state in UAs ............................................................................................................201
Figure 3.6 Forking proxy generating 199 Early Dialog Terminated ...................................................................................205
Figure 3.7 Forking proxy receiving 200 OK ................................................................................................................ 206
Figure 3.8 Two forking proxies, one of them generating 199 ........................................................................................207
Figure 3.9 SIP session setup ......................................................................................................................................... 208
Figure 3.10 UPDATE call flow .....................................................................................................................................215
Figure 3.11 SDP indicating capabilities ....................................................................................................................... 222
Figure 3.12 Rejection of a re-INVITE ..........................................................................................................................225
Figure 3.13 Automatic rejection of a video stream ........................................................................................................225
Figure 3.14 Manual rejection of a video stream by user ............................................................................................... 226
Figure 3.15 Rejection of a video stream by user ........................................................................................................... 228
Figure 3.16 Message flow with race condition ...............................................................................................................229
Figure 3.17 SIP message carrying a body ......................................................................................................................233
Figure 3.18 SIP message carrying two bodies ............................................................................................................... 234
Figure 3.19 Stateful proxy model ..................................................................................................................................240
www.ebook3000.com
剩余446页未读,继续阅读
2018-05-27 上传
2013-12-16 上传
2010-11-15 上传
2009-04-13 上传
2008-06-09 上传
2008-06-27 上传
2009-04-13 上传
2009-01-15 上传
2009-01-15 上传
milan_coder
- 粉丝: 0
- 资源: 3
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 构建基于Django和Stripe的SaaS应用教程
- Symfony2框架打造的RESTful问答系统icare-server
- 蓝桥杯Python试题解析与答案题库
- Go语言实现NWA到WAV文件格式转换工具
- 基于Django的医患管理系统应用
- Jenkins工作流插件开发指南:支持Workflow Python模块
- Java红酒网站项目源码解析与系统开源介绍
- Underworld Exporter资产定义文件详解
- Java版Crash Bandicoot资源库:逆向工程与源码分享
- Spring Boot Starter 自动IP计数功能实现指南
- 我的世界牛顿物理学模组深入解析
- STM32单片机工程创建详解与模板应用
- GDG堪萨斯城代码实验室:离子与火力基地示例应用
- Android Capstone项目:实现Potlatch服务器与OAuth2.0认证
- Cbit类:简化计算封装与异步任务处理
- Java8兼容的FullContact API Java客户端库介绍
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功