Session Initiated sip

36
SESSION INITIATED PROTOCOL(SIP) GC MUNEEB ILYAAS GC HASSAN IRSHAD GC AHMAD RAZA

Transcript of Session Initiated sip

Page 1: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 1/36

SESSION INITIATED

PROTOCOL(SIP)

GC MUNEEB ILYAAS

GC HASSAN IRSHADGC AHMAD RAZA

Page 2: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 2/36

Page 3: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 3/36

What is SIP?

� An Application-layer control (signaling)

protocol for creating, modif ying and

terminating sessions with one or more 

participants

� Text based , Model similar to HTTP.

� Sessions include Internet multimedia 

conf erences, Internet telephone calls and

multimedia distribution.

Page 4: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 4/36

SIP HISTORY

� Encompasses many protocols

� Missing part..sip

� Example

Page 5: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 5/36

Session invitation protocol (sipv1)

� Mmcc (multimedia conf erence control)

� Used ccp

� One request , one response� Ccp used udp

� 1996, sipv1

� Used udp

� Text based

Page 6: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 6/36

Scip

� Email identifiers

� Sipv2 evolved

� Incorporate f eatures of sipv1 and scip

Page 7: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 7/36

Functionality provided by sip

� Session establishment, modification and

termination.

User mobility

Page 8: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 8/36

Session establishment, modification

and termination

� Used to invite new members or to create 

brand new sessions

Independent of multimedia session handledand the mechanism used to describe the 

session.

� Sip distributes the session , can be used to

negotiate.

Page 9: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 9/36

Page 10: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 10/36

User mobility

� Cant deliver a session description until user hasbeen located.

� Sip urls (uniform resource locators)

� User name and a domain name

� E.g sip: [email protected]

� Consult sip server, anas url may be 

sip:[email protected]� Register several locations with same server 

or.

Page 11: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 11/36

Registration

� User register their current location to a server 

if they wish to be found.

Two modes of operation, redirect servers andproxy servers

Page 12: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 12/36

Sip entities

� User agent (UA), interact with user and has an

interf ace towards the user.

Example:

Page 13: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 13/36

Redirect servers

� Provide alternative locations of users to sip

UAs.

Example� return the address of another server..

� Return the list..

Page 14: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 14/36

Page 15: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 15/36

� Two redirect servers:

server with more knowledge

Page 16: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 16/36

Proxy servers

Page 17: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 17/36

Forking proxies(proxy servers)

� When a proxy server tries more than 1

location for a user, it is said to fork the 

invitation.

Page 18: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 18/36

Group addresses(proxy servers)

Page 19: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 19/36

Registrars

� Ref ers to sip server accepting registrations

� Co-located with a proxy server or a redirect 

server

Page 20: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 20/36

Location servers

� A location server is used by a SIP redirect or proxy 

server to obtain information about a called partys

possible location(s).

� Stores and returns possible location for users.

� Most registrars upload location updates to a 

location server upon receipt.

Page 21: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 21/36

Page 22: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 22/36

SIP Negotiations:

The process of negotiating the 

sessions extensions is conductedusing two headers

� Required header

Supported header

Page 23: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 23/36

� The server decides which extensions will be used in the session based upon these twoheaders.

� The server lists the extensions that will be used in the required header and the ones it supports in the supported header.

In this way the server reciprocates the clientsinformation about which extensions it supports.

Page 24: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 24/36

Example

� Bobs UA supports extensions foo1,foo2,foo3 andfoo4.Bob wants to use extension foo1 in the session , so he adds it to the required header of his INVITE.

� Laura wants to use extension foo2 as well . She knows it is supported by Bob so it is possible touse this extension.

� Therefore, she adds foo2 to the required header.

� However foo1,foo3 and foo 4 will not be used for session as they are supported by only one of the end systems.

Page 25: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 25/36

Page 26: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 26/36

Design principles for SIP extensions

Why principles are necessary ??

� Spirit of SIP is kept alive.

�It is used for the purpose it is developed

� Efficient working of SIP.

� Avoiding complex and huge protocol.

Page 27: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 27/36

Do not break tool kit approach.

� Extensions to SIP should not broaden the 

scope of SIP.� SIP should not be used for tasks that are 

handled better by other internet protocols ,

even if at the moment , it appears SIP

would do the job.

Page 28: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 28/36

Q uestion !!!

Using SIP to download web pages f rom

a server ??It wont be wise to use SIP for this purpose because :

� HTTP already exists for this purpose.

� It might do our work but protocol will become very complex and huge which is against the 

Philosophy of IETF(Internet Engineering Task

Force).

� The IETF standardization process ensures that SIP

is kept simple and manageable.

Page 29: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 29/36

Peer to peer relationship:

� SIP entities usually have a peer to peer relationship.

� When server receives a request f rom client it 

performs some tasks and returns the response with the result of the request.

� Client does not tell server continuously telling it how to proceed.

� Thus,SIP is not really eff ective in a master/slave architecture where the master has a lot of controlover the slave.

Page 30: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 30/36

Advantages of peer to peer 

relationship:

� It makes the protocol highly suitable for inter-

domain communications.

Master/slave protocols have been provenineff ective for inter-domain communications

where domain owners typically want to

prevent the owner of a diff erent domain f rom

controlling their resources.

Page 31: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 31/36

SIP security:

� Internet users protect their transmission against potential hackers in many ways . SIP users are noexception.

Encryption is used for SIP security� SIP security should not be confused with the security of a SIP enabled session.

� Muneeb can send an encrypted INVITE to Anas so that nobody knows what kind of session they are establishing but once the session is established , if they transmit unencrypted packets ,any potential hacker willbe able to hear the whole conversation .

Page 32: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 32/36

Security measures:

� A ma jor aspect of security is authentication.

When Muneeb receives a SIP request f romsomebody claiming to be Anas , he wants to

be sure that Anas is really the one sending the 

request.

� He needs a mechanism to check the identity 

of caller.

Page 33: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 33/36

1.Basic authentication

� In this scheme ,the client provides a user ID

and a password as credentials.

Drawback:

� Both user ID and password are sent in clear 

text.

� Thus, anyone can readily obtain them just by 

sniffing the network.

Page 34: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 34/36

2.Digestion authentication

� It is also based on user IDs and passwords with the diff erence that they are never sent through the network.

� The server challenges the client sending a nonce value.

� The client calculates a checksum of the nonce value ,the request URI, the SIP method , the user 

ID and password and sends it to server.� Server thus confirms the user ID and password

without ever exposing them.

Page 35: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 35/36

End-to-end and hop-by-hop security:

� Headers need to be examined to route 

requests and responses properly so ,they cant be encrypted end to end.

� Instead it is possible to use hop-by-hop

encryption.

Page 36: Session Initiated sip

8/6/2019 Session Initiated sip

http://slidepdf.com/reader/full/session-initiated-sip 36/36

� A secure channel can be established betweena UA and a proxy or between two proxies.

� Everything sent through this secure channel is

encrypted.

� However a UA using a secure channel towardsa SIP proxy cannot be sure that latter will use 

another secure channel towards the next hop.� End-to-end and hop-by-hop security are 

complementary and should be used together.