In this chapter, we start putting into practice some of the SIP concepts learned so far. We will show some very simple programming examples that illustrate how SIP works. As was stated in previous ...
In our last VoIP installment, we looked at the main reasons why SIP has become a widely adopted protocol, but we left details of the protocol’s inner workings fairly vague. This article will drill ...
Secure SIP is a security mechanism defined by SIP RFC 3261 for sending SIP messages over a Transport Layer Security-encrypted channel. Originally used for securing HTTP sessions, TLS can be repurposed ...
This is the sixth and last in a series of newsletters devoted to the standards process. We will use this newsletter to wrap up the discussion of standards by looking at Session Initiation Protocol. We ...
The session initiation protocol (SIP) is one of the most popular signaling protocols used in applications that require a session setup and parameter negotiation before actual communication, as well as ...
Let's move past the technical issues and talk about a far more difficult challenge--the politics of SIP Interoperability. Earlier this week I shared with you a few thoughts on SIP Interoperability, ...
Session initiation protocol (SIP)-based voice-over-IP (VoIP) designs certainly provide some interesting benefits over today's Class 5 switching systems. SIP enables capabilities like presence, instant ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results