In Part 1 of our SIP primer, I covered the SIP foundation layers starting from the message structure and ending with the SIP transactions. We saw how phone registrations and proxies could work using ...
RFC 4474 implements Public Key Infrastructure (PKI). This provides an authenticated identity for the originator of a VoIP call. There is a security hole in the SIP protocol. According to John Nix, VP, ...
The session initiation protocol (SIP) is one of the most popular signaling protocols used in applications that require a session setup and parameter negotiation before actual communication, as well as ...
This excerpt is from CCIE Voice Exam Quick Reference Sheets (Digital Short Cut), by Mark Lewis and published by Cisco Press. ISBN-10: 1-58705-333-0 Read Mark Lewis’ blog for Cisco Subnet here. More ...
In our last VoIP installment, we looked at the main reasons why SIP has become a widely adopted protocol, but we left details of the protocol’s inner workings fairly vague. This article will drill ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results