The problem is that RFC 3261 that defines SIP has become "everything to everyone" and bloated in both size and in flexibility. For those of you that have deployed SIP-based solutions or SIP Trunking, ...
Secure SIP is a security mechanism defined by SIP RFC 3261 for sending SIP messages over a Transport Layer Security-encrypted channel. Originally used for securing HTTP sessions, TLS can be repurposed ...
RFC 4474 implements Public Key Infrastructure (PKI). This provides an authenticated identity for the originator of a VoIP call. There is a security hole in the SIP protocol. According to John Nix, VP, ...
In this chapter, we start putting into practice some of the SIP concepts learned so far. We will show some very simple programming examples that illustrate how SIP works. As was stated in previous ...
In our last VoIP installment, we looked at the main reasons why SIP has become a widely adopted protocol, but we left details of the protocol’s inner workings fairly vague. This article will drill ...
The session initiation protocol (SIP) is one of the most popular signaling protocols used in applications that require a session setup and parameter negotiation before actual communication, as well as ...
Session initiation protocol (SIP)-based voice-over-IP (VoIP) designs certainly provide some interesting benefits over today's Class 5 switching systems. SIP enables capabilities like presence, instant ...
MONTREAL--(BUSINESS WIRE)--March 9, 2006--Eicon Networks Corporation ("Eicon"), a global leader in providing world class products and technologies for media processing, today announced the ...