Communications and Networking by John Cowley
Author:John Cowley
Language: eng
Format: epub
Publisher: Springer London, London
Method
Description
INVITE
Request that a session be created
ACK
Acknowledge that a session has been created
BYE
Request that a session be terminated
CANCEL
Cancel a request that is pending
REGISTER
Register a user’s location (URL)
OPTIONS
Query a host to find out its capabilities
For VoIP sessions, SIP works as follows. Callers and callees are identified by SIP addresses, which are URLs such as ‘sip: [email protected]’. A SIP caller first locates a server and then sends a SIP request (an invitation). A SIP request may reach the callee directly. Otherwise, it may be redirected or may start off a chain of new SIP requests, which are carried out by proxy servers (intermediary systems involved in call set-up). Users are able to register their location with SIP location servers. Interaction between a SIP server and clients is illustrated in Fig. 7.26.
Fig. 7.26Interaction between a SIP server and clients
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7648)
Grails in Action by Glen Smith Peter Ledbrook(7561)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(5755)
Azure Containers Explained by Wesley Haakman & Richard Hooper(5698)
Running Windows Containers on AWS by Marcio Morales(5224)
Kotlin in Action by Dmitry Jemerov(4917)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4452)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4322)
Combating Crime on the Dark Web by Nearchos Nearchou(4017)
The Age of Surveillance Capitalism by Shoshana Zuboff(3769)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(3675)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(3474)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3401)
Python for Security and Networking - Third Edition by José Manuel Ortega(3255)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3219)
Mastering Python for Networking and Security by José Manuel Ortega(3218)
Blockchain Basics by Daniel Drescher(3178)
The Ultimate Docker Container Book by Schenker Gabriel N.;(2934)
TCP IP by Todd Lammle(2863)
