Question 1. What Is Sip?
The Session Initiation Protocol (SIP) is a signaling, presence and instant messaging protocol developed to set up, modify, and tear down multimedia sessions, request and deliver presence and instant messages over the Internet. SIP is a text-encoded protocol.
Question 2. What Is Request-uri?
The Request-URI is a special form of SIP URI and indicates the resource to which the request is being sent, also known as the request target.
Question 3. What Is The Significance Of The Via Header Field?
Each SIP device that originates or forwards a SIP message stamps its own address in a “Via” header field, usually written as a host name that can be resolved into an IP address using a DNS query. The Via header field contains the SIP version number (2.0), a “/”, then UDP for UDP transport, a space, then the hostname or address, a colon, then a port number. And also contain “branch” parameter.
Question 4. Where The Branch Parameter Is Used And What Is Its Significance?
A “branch” parameter is used in “Via” header field. It is signified as the transaction identifier used to correlate the reponses to the request.
Question 5. What Is The Significance Of Max-forwards Header Field?
Max-Forwards header field is used for simple loop detection. It is initialized to some large integer and decremented by each SIP server which receives and forwards the request.
Question 6. What Are The Significance Of To And From Header Fields?
To and From header fields show the originator and destination of the SIP request.
Question 7. Why The Name Labels Will Be Used In To And From Header Fields?
When a name label is used, the SIP URI is enclosed in brackets and used for routing the request.The name label could be displayed during alerting, but is not used by the protocol.
Question 8. What Is The Sigificance Of The Call-id Header Field?
The Call-ID header field is an identifier used to keep track of a particular SIP session. The originator of the request creates a locally unique string, then usually adds an “@” and its host name to make it globally unique. In addition to the Call-ID, each party in the session also contributes a random identifier, unique for each call. These identifiers, called tags, are included in the To and From header fields as the session is established.
The user agent that generates the initial INVITE to establish the session generates the unique Call-ID and From tag. In the response to the INVITE, the user agent answering the request will generate the To tag. The combination of the local tag (contained in the From header field), remote tag (contained in the To header field), and the Call-ID uniquely identifies the established session, known as a “dialog.” This dialog identifier is used by both parties to identify this call because they could have multiple calls set up between them. Subsequent requests within the established session will use this dialog identifier.
Question 9. What Is Dialog Identifier?
The combination of the local tag (contained in the From header field), remote tag (contained in the To header field), and the Call-ID uniquely identifies the established session, known as a “dialog.” This dialog identifier is used by both parties to identify this call because they could have multiple calls set up between them. Subsequent requests within the established session will use this dialog identifier.
Question 10. When The Cseq Header Field Value Will Be Incremented? Or What Is The Significance Of Cseq Header Field?
CSeq or Command Sequence contains a number followed by method name.This number is incremented for each new request sent.
Question 11. What Are The Minimum Required Header Fields In Any Sip Message? Or What Are The Mandatory Header Fields In Sip Message?
Via, Max-Forwards, To, From, Call-ID and CSeq are the minimum required header fields.
Question 12. What Is The Significance Of Contact Header Field?
Contact header field contains the device-URI where the originator of request or response can be directly reached. Usually contains IP address of the device which generated the request or response.
Question 13. What Is Received Parameter And In Which Header Field It Will Be Appeared?
Usually the received parameter can be found in Via header field of the response message. This parameter contains the literal IP address that the request was received from, which typically is the same address that the URI in the Via resolves using DNS.
Question 14. Is The To And From Header Fields Define The Direction Of The Sip Message?
No, the To and From header fields in SIP are defined to indicate the direction of the request, not the direction of the message.
Question 15. Is The Branch Parameter In Via Header Field Of The Ack Sent For 200ok Would Be Same As That Of Invite In A Session?
No, branch parameter in Via header field of the ACK would be different than the INVITE message of that session because ACK sent to acknowledge the 200OK is considered as a seperate transaction.
Question 16. Is The Branch Parameter In Via Header Field Of The Bye Message Would Be Same As Ack Sent For 200ok And That Of Invite In A Session?
No, because BYE message is considered as a new transaction.
Question 17. What Is Dialog?
A dialog is a peer-to-peer SIP relationship between two UAs that persists for some time. A dialog is established by SIP messages, such as a 2xx response to an INVITE request. A dialog is identified by a call identifier, local tag, and a remote tag. A dialog was formerly known as a call leg in RFC2543.
Question 18. What Is A Session?
A multimedia session is a set of multimedia senders and receivers and the data streams flowing from senders to receivers. A multimedia conference is an example of a multimedia session.
Question 19. What Is The Difference Between Dialog And Session?
A dialog is a sip relationship. A session is a media relationship. Dialog mean a “call has already been setup” in the signaling sense, while a session mean the “media has already been setup” in the media sense.
Question 20. What Does “part Of A Dialog” Mean? Are “invite”, “ack” And The Responses Considered “part Of A Dialog”?
Dialog represents state, which includes sequence numbers, route sets, and URIs. A request sent as part of a dialog means that it includes route headers from the route set of the dialog, and uses the next highest sequence number in the dialog.’
Question 21. What Does “outside The Dialog” Mean Then? Is A Request Is Outside The Dialog, Does It Still Affect Or Change Anything “inside The Dialog” Then?
Outside the dialog means that it is not within the context of a dialog. It doesnt use the callid, cseq, or route sets of any existing dialogs, and when such a reuqest is set, it has no impact on the state of an existing dialog.
Question 22. What Is The Difference Between Transaction, Dialog And Session?
A transaction refers to a fundamental unit of message exchange. It basically includes a request-response cycle.
A Dialog represents a peer-to-peer relationship between two user agents.It is usually created through generation of “non-failure” responses to request.
A session refers to the exchange of media between two or more Endpoints. Also, there can be dialogs without SIP sessions.
Question 23. What Is The Advantage Of Using Sip Uris? Over Ip Address?
A request routed using only IP addresses will reach only one end point—only one device. Since communication is typically user-to-user instead of device-to-device, a more useful addressing scheme would allow a particular user to call another particular user, which would result in the request reaching the target user regardless of which he is currently using, or if he has multiple devices.SIP URI is a name that is resolved to an IP address by using SIP proxy server and DNS lookups at the time of the call.
Question 24. What Is Sip Uri?
SIP URI is a name that is resolved to an IP address by using SIP proxy server and DNS lookups at the time of the call.
Question 25. What Is Sip Proxy Server?
A SIP proxy server sits in the middle of SIP message exchange, receives messages and forwards them, but it does not set up or terminate sessions. A proxy server typically has access to a database or a location service to aid it in processing the request (determining the next hop). Databases could contain SIP registrations, presence information, or any other type of information about where a user is located.
Question 26. What Is Stateful Proxy?
A stateful proxy server keeps track of requests and responses received in the past and uses that information in processing future requests and responses. For example, a stateful proxy server starts a timer when a request is forwarded. If no response to the request is received within the timer period, the proxy will retransmit the request, relieving the user agent of this task. A stateful proxy usually sends a 100 Trying response when it receives an INVITE.
Question 27. What Is Stateless Proxy?
A stateless proxy server processes each SIP request or response only based on the message contents. Once the message has been parsed, processed, and forwarded or responded to, no information about the message is stored—no dialog information is stored. A stateless proxy never retransmits a message, and does not use any SIP timers.A stateless proxy never sends a 100 Trying response.
Question 28. What Is Transaction Stateful Proxy?
A transaction stateful proxy keeps state about a transaction but only for the duration that the request is pending. For example, a transaction stateful proxy would keep state when it receives an INVITE request until it received a 200 OK or a final failure response (e.g., 404 Not Found). After that, it would destroy the state information. This allows a proxy to perform useful search services but minimize the amount of state storage required.
Question 29. How The Proxy Server Is Different From A User Agent Or Gateway?
A proxy server is different from a gateway or user agent in three key ways:
- A proxy does not issue request, it only responds to requests from user agents. (A CANCEL request is an exception to this rule)
- A proxy server has no media capabilities.
- A proxy server does not parse message bodies, it relies exclusively on message header fields.
Question 30. What Is Outbound Proxy Server?
The proxy server to which the user agent sends the SIP request is called the outbound proxy server. This proxy server will authenticate the user agent and may pull up a profile of the user and apply outbound routing services.
Question 31. What Is Inbound Proxy Server?
The proxy server from which the user agent recieves the SIP request is called the inbound proxy server.
Question 32. What Is Forking Proxy Server?
a proxy server that receives an INVITE request, then forwards it to a number of locations at the same time. This “forking” proxy server keeps track of each of the outstanding requests and the response to each. This is useful if the location service or database lookup returns multiple possible locations for the called party that need to be tried. For example forking proxy F1 is received from UA1 which forks to two user agents UA2 & UA3. Each user agent begins alerting and sending back two provisional resposes(180 Ringing) to F1. The two responses are identical except for having different To tags and Contact URIs. Finally, one of the two UAs answers and sends a 200 OK response. The forking proxy server sends a CANCEL to the second UA to stop that phone alerting. If both UAs had answered, the forking proxy would have forwarded both 200 OK responses back to the caller who then would have had to choose which one, probably accepting one and sending a BYE to the other one.
Question 33. Explain About Session-expires Header Field?
A SIP session timer has been proposed to limit the time period over which a stateful proxy must maintain state information. In the initial INVITE request, a Session-Expires header field indicates a timer interval after which stateful proxies may discard state information about the session. User agents must tear down the call after the expiration of the timer. The caller can send re-INVITEs to refresh the timer, enabling a “keep alive” mechanism for SIP. This solves the problem of how long to store state information in cases where a BYE request is lost or misdirected.
Question 34. What Is Redirect Server?
A redirect server is a type of SIP server that responds the requests but does not forwards the requests. Like proxy server, a redirect server uses a database or location service to look up a user. The location information, however, is sent back to the caller in a redirection class response (3xx), which, after the ACK, concludes the transaction.
Question 35. Is The Ack Sent To Non-2xx Final Response Is Considered To Be Part Of The Same Transaction As Invite?
Yes, the ACK sent to non-2xx final response is considered to be part of the same transaction as INVITE. ACK request reuses the same branch ID as INVITE. Only an ACK sent in response to a 200 OK is considered a separate transaction with a unique branch ID. Also an ACK to a non-2xx final response is a hop-by-hop response, not an end-to-end response.
Question 36. How Would You Describe Its Potential?
Henderson -IMS, with its universal appeal to both wireline and wireless carriers, will form the basis for achieving the ultimate goal of telecommunication carrier operations: a single enhanced services architecture for delivering any service, using any media, to reach any customer, regardless of how they connect to the network.
Longhenry -It is very likely that IMS will be deployed, in some fashion, by most major carriers over the next five years. It is the only standards-based method of addressing the fundamental challenge with which carriers struggle when considering application roadmaps. That is, how to minimize the cost of new application deployments so that they can profitably address the opportunities available in micro-segments of their subscriber base.
McCracken -The potential for IMS is one of simplification for the service provider and end customer. Simplification for the service provider lies in the fact that IMS will establish a horizontal set of capabilities that can be applied to all the networks they run and to all the services they want to deploy. For well established service providers, reaching this potential will not happen overnight because it may not make business sense to take existing services and migrate them to IMS. But IMS will help new services tremendously. Customers will enjoy a simplified communications experience because they will have a single profile to manage and they will enjoy the same services across any network and device, so they can focus on the task at hand, as opposed to figuring out the technology.
Hluchyj -The potential for IMS is enormous, as it fundamentally changes the communications paradigm. Voice, data, and video can all be converged in an IMS landscape. From a service provider perspective, the delivery model is far more efficient and dynamic. From a subscriber perspective, they have access to an experience that is simply not available with today’s legacy technology.
Burger -IP will continue to be a disruptive technology to traditional telecom operators for years to come and help to transform operator business models from voice-driven to service-driven businesses. Operators require more applications to meet competitive threats and will need a better environment for creating and deploying high value multimedia services. IMS addresses this need.
Scott Erickson, President, IMS Service Delivery Solutions, Telcordia -IMS has the potential to change communications as we know it. Carriers now have the opportunity to cast themselves free of the costly underlying network hardware and exert direct and flexible control over their services through software. IP-based communications provide carriers with the flexibility and openness to quickly offer new revenue generating services, while enabling carriers to lower their total cost of doing business, increase their revenue potential, realize higher productivity and reduce churn.
Marinho -Lucent’s primary market research indicated a pent up demand for the type of blended lifestyle services that IMS can enable. For example, U.S. service providers have a potential market for converged services worth an estimated $10 billon dollars, with that figure being potentially reached five years after such services are introduced to the consumer and enterprise markets.
Gray -Ubiquity believes that IMS will have significant potential based on the enhanced services it will enable. It has potential to enrich the personal lives of consumers and potential to enrich the productivity of business and enterprise users, changing the world of communications as we know it. This change has the potential to drive new economic growth in our industry.
Question 37. What Are Some Potential “killer Apps” That Ims Might Enable?
Henderson -IMS will facilitate new multimedia services, accelerate the migration of legacy TDM services to IP, and make any telecom service more seamless and ubiquitous using any type of access device. Services involving multimedia, presence, and follow-me features will no longer have the technical barriers between access networks that existed before IMS.
Longhenry -There are no true “killer apps” for IMS, as any application that can be delivered over IMS can also be delivered via a stand alone proprietary application server. Rather, the “killer ROI case” is that IMS can enable carriers to deploy ten applications from a common standardized (i.e., cost competitive) platform, instead of from ten distinct platforms requiring ten separate integration efforts.
McCracken -Some of the most compelling applications will be ones that capitalize on the ability of IMS networks to bring voice, video, and data streams together to deliver so called “rich media services” across multiple access networks and devices. These services will bring these traditionally separate capabilities together and enable more compelling person-to-person communications than were ever possible on separate networks. IMS provides a common framework that can be leveraged across all the access methods and devices that people want to use for their personal and business communications. It breaks down the proprietary “service silos” that have existed for years.
Hluchyj -It doesn’t really matter what the next “killer app” is -that is something that is always going to change. What’s great about IMS is that it employs a distributed model where application creation mirrors Web application development. In the old telecom world, introducing new services was expensive and risky. In an IMS world, the cost of experimentation is driven way down, and when the cost of experimentation is lowered, the opportunity for innovation expands exponentially. The next killer app will always be right around the corner.
Burger -IMS is all about SIP-based applications. Potential applications include audio and video conferencing, video messaging, hosted services, multi-player gaming, and ubiquitous services/personalized content. By providing a standard communications infrastructure based on IP, IMS allows multimedia application convergence
Scott Erickson, President, IMS Service Delivery Solutions, Telcordia -For carriers, the real ‘killer app’ is the ability to provide a myriad of exciting IP-enabled next generation services quickly, such as push-to-video, mobile TV, multi-party gaming, presence and location-based services, TV Caller ID, and converged VPNs. IMS provides carriers with the agility, flexibility and speed-to-delivery that is critical for them to drive increased revenue from these new offers and secure their future growth and viability.
Marinho -The search for the “killer app” may not be applicable to a broad market, as we traditionally might think. The key is identifying the “right” combination of services that addresses demand in specific market segments. IMS-based services, for example, can enable friends to plan a night out in real-time, including discussing the possibilities, viewing a movie trailer and purchasing tickets, picking a restaurant and making the reservation, and receiving custom directions to the restaurant.
Gray -IMS not only enables the killer app, but it enables the “Killer Capability”, meaning that multiple applications or blended applications are enabled by IMS. Given Ubiquity’s role in enabling application development and rapid service creation, we see “Instant Multimedia Sharing” applications such as music, video, and voice being widely adaopted.
Question 38. Who Stands To Benefit The Most From Ims? Carriers? Equipment Manufacturers? End Users?
Henderson -IMS is a positive for the entire telecommunications industry. Carriers, and eventually enterprise organizations, will benefit from unified service architecture. Equipment manufacturers will become more efficient, focusing resources on a single IMS product line, rather then different products for different markets. End users, particularly business users, will benefit from seamless services, regardless of access or device.
Longhenry -End users will ultimately benefit most from IMS, as they will gain access to exponentially more applications could be commercially viable in a non-IMS world. The best analogy is probably the user experience available from DoCoMo and iMode, as third party applications can be quickly developed, integrated, and delivered to a fad-oriented subscriber base. IMS enables this in a standardized fashion.
McCracken -The ones who will benefit most are the service providers and the end customers. Service providers will have a core network that finally separates session control from the bearer path and the services. This creates an architecture more suited to bringing new applications to market more quickly, and reduces a lot of traditional duplication. End users will benefit because they will have simplified communications that will be personalized across any network and device. They will be able to enjoy a much richer multimedia communications experience that will no longer be dependent on a specified access method tied to a specific device. Equipment manufacturers will face greater competition as proprietary architectures are broken apart with IMS, opening up new opportunities for nimble companies to shine with innovative services.
Hluchyj -The benefits really extend across the industry. By standardizing the different network components, service providers can pick the pieces we want and manufacturers can focus on their core competency areas. The result is lower cost infrastructure and a much greater variety of services that can be rapidly deployed, which benefits the consumers.
Burger -If everyone can agree to standardize on IMS, then the whole industry benefits. Carriers will be able take advantage of all of the benefits of open systems equipment, such improved ROI, faster time to deployment, and best of breed solutions. End users will benefit from new and innovative personalized services, accessible anytime and anywhere. Equipment manufacturers will benefit from supplying products that enable the deployment of new services
Scott Erickson, President, IMS Service Delivery Solutions, Telcordia -Carriers. Wireless carriers will speed new services to market. Wireline carriers will be able to increase customer satisfaction through bundled offers. MVNOs will launch themselves more rapidly into niche markets while simplifying service creation. MSOs will evolve by using IMS to compete with both wireline and wireless carriers. All will benefit from the added revenue from new services and increased customer satisfaction.
Marinho -End users benefit from an improved communications experience geared to their personal needs and requirements. Carriers benefit from the pent up demand, market opportunity, and “stickiness” of IMS services. Manufacturers benefit from the adoption of the technology and increased network capacity demand that is driven by IMS based services.
Gray -Many stakeholders will benefit from IMS. First, and foremost, End Users will benefit by having new services, more services, and more choice in services. Moreover, End Users will benefit by the personal and professional productivity provided by enhanced services. Once successful business models are established, the pull through effect will benefit carriers, equipment providers, and application developers.
Question 39. What Is The Timeline For Real Commercial Deployments Of Ims?
Henderson -Carriers are already purchasing IMS-compatible components and systems, and realizing early benefits from IMS architecture principles in small pilot deployments and specific services. However, fully interoperating, standards-based, multi-vendor IMS solutions are probably still a few years out.
Longhenry -IMS deployments would be happening across the telecommunications environment today if IMS client architecture was on par with IMS server infrastructure. Unfortunately, the concept of an IMS client has not yet gained sufficient momentum in the standardization process and, therefore, advanced client-server IMS applications cannot yet be seamlessly delivered to subscribers. As this is addressed in the next 24 months, IMS deployments will rapidly accelerate.
McCracken -Technically, there are commercial deployments today for some initial IMS components, like a barebones CSCF (Call Session Control Function) in support of push-to-talk services, but these deployments are only starting to whet the appetite for what’s to come later in 2006 and into 2007. Once SIP-based session control is used for more services than PTT, that’s when other elements, like a Home Subscriber Server (HSS), will start to show their value. IMS will co-exist with today’s networks for many years to come, and services will be migrated as the business evolves. Ironically, IMS may see quicker deployment by fixed service providers because they can leverage their broadband access networks and more powerful devices to deliver some of the multimedia capabilities sooner than wireless providers.
Hluchyj -Some solutions are IMS-ready today, and network operators are already laying the groundwork of their IMS deployments. That said, we anticipate that the delivery of enhanced applications built on IMS will be a 2007/2008 event.
Burger -Early commercial deployments are actually happening now. Brooktrout/Excel worked with TMN, the largest provider in Portugal, to deliver one of the first live 3G video messaging services. The goal was to deliver real-time video services in time for the European soccer championships. For TMN, this was an opportunity for a new revenue-generating service, since voice is rapidly becoming a commodity.
Scott Erickson, President, IMS Service Delivery Solutions, Telcordia -IMS is already seeing significant global momentum. Some carriers have already begun to make inroads in IMS-ready deployments. The beauty of IMS is that carriers can proceed at the pace that is right for them, their business, and their customers, based on their existing network investments and customers’ needs.
Marinho -We expect to see commercial services based on IMS solutions begin to roll out later this year, and the momentum will pick up in 2007.
Gray -Based on evaluations and lab trials, we would expect to see real deployments in the next 12 – 24 months. Ubiquity is involved now in helping carriers plan, develop and deploy new services, even pre-IMS, to realize revenues and services today that will be IMS-ready when IMS networks are deployed, regardless of the timeframe.
Question 40. What Is The Significance Of Update Method?
The UPDATE method is used to modify the state of a session without changing the state of the dialog. A session is established in SIP using an INVITE request in an offer/answer manner. Typically, a session offer is made in the INVITE and an answer made in a response to the INVITE. In an established session, a re-INVITE is used to update session parameters. However in pending session (INVITE sent but no final response received) UPDATE is used to update session parameters. Basically UPDATE is used to perform QoS and negotiate end-to-end attributes prior to session establishment.
Question 41. What Is The Significance Of Prack Method?
The PRACK method is used to acknowledge receipt of reliably transported provisional responses (1xx). The reliability of 2xx, 3xx, 4xx, 5xx, and 6xx responses to INVITEs is achieved using the ACK method. However, in cases where a provisional response, such as 180 Ringing, is critical in determining the call state, it may be necessary for the receipt of a provisional response to be confirmed. The PRACK method applies to all provisional responses except the 100 Trying response, which is never reliably transported. A PRACK is generated by a UAC when a provisional response has been received containing a RSeq reliable sequence number and a Supported: 100rel header. The PRACK copy the number in the RSeq and the CSeq of the response in a RAck header.
Question 42. What Is The Significance Of Info Method?
The INFO method is used by a user agent to send call signaling information to another user agent with which it has an established media session. This is different from a re-INVITE since it does not change the media characteristics of the call. The request is end-to-end, and is never initiated by proxies. A proxy will always forward an INFO request—it is up to the UAS to check to see if the dialog is valid. INFO requests for unknown dialogs receive a 481 Transaction/Dialog Does Not Exist response.
Question 43. What Is The Significance Of Message Method?
The MESSAGE method is used to transport instant messages (IM) using SIP. IM usually consists of short message exchanged in near-real time by participants engaged in a “conversation.” MESSAGEs may be sent within a dialog or outside a dialog, but they do not establish a dialog by themselves.
Question 44. What Is The Significance Of Notify Method?
The NOTIFY method is used by a user agent to convey information about the occurrence of a particular event. A NOTIFY is always sent within a dialog when a subscription exists between the subscriber and the notifier. A NOTIFY request normally receives a 200 OK response to indicate that it has been received. If a 481 Dialog/Transaction Does Not Exist response is received, the subscription is automatically terminated and no more NOTIFYs are sent. NOTIFY requests contain an Event header field indicating the package and a Subscription-State header field indicating the current state of the subscription.
Question 45. What Is The Significance Of Subscribe Method?
The SUBSCRIBE method is used by a user agent to establish a subscription for the purpose of receiving notifications (via the NOTIFY method) about a particular event. A successful subscription establishes a dialog between the UAC and the UAS. The subscription request contains an Expires header field, which indicates the desired duration of the existence of the subscription. After this time period passes, the subscription is automatically terminated. The subscription can be refreshed by sending another SUBSCRIBE within the dialog before the expiration time.
A server accepting a subscription returns a 200 OK response also containing an Expires header field. The expiration timer can be the same as the request, or the server may shorten the interval, but it may not lengthen the interval. There is no “UNSUBSCRIBE” method used in SIP—instead a SUBSCRIBE with Expires:0 requests the termination of a subscription and hence the dialog. A terminated subscription (either due to timeout out or a termination request) will result in a final NOTIFY indicating that the subscription has been terminated.
Question 46. What Is The Significance Of Refer Method?
The REFER method is used by a user agent to request another user agent to access a URI or URL resource. The resource is identified by a URI or URL in the required Refer-To header field. A REFER request can be sent either inside or outside an existing dialog.
Question 47. What Is The Significance Of Options Method?
The OPTIONS method is used to query a user agent or server about its capabilities and discover its current availability.
Question 48. What Is The Significance Of Cancel Method?
The CANCEL method is used to terminate pending searches or call attempts. It can be generated by either user agents or proxy servers provided that a 1xx response containing a tag has been received, but no final response has been received. The branch ID for a CANCEL matches the INVITE that it is canceling. A CANCEL only has meaning for an INVITE since only an INVITE may take several seconds (or minutes) to complete. All other SIP requests complete immediately. A user agent confirms the cancellation with a 200 OK response to the CANCEL and replies to the INVITE with a 487 Request Terminated response.
Question 49. What Is The Significance Of Ack Message?
The ACK method is used to acknowledge final responses to INVITE requests. Final responses to all other requests are never acknowledged.An ACK may contain an application/sdp message body. This is permitted if the initial INVITE did not contain a SDP message body. If the INVITE contained a message body, the ACK may not contain a message body. For 2xx responses, the ACK is end-to-end, but for all other final responses it is done on a hop-by-hop basis when stateful proxies are involved. A hop-by-hop ACK reuses the same branch ID as the INVITE since it is considered part of the same transaction. An end-to-end ACK uses a different branch ID as it is considered a new transaction.
Question 50. What Is The Significance Of Bye Message?
The BYE method is used to terminate an established media session. A BYE is sent only by user agents participating in the session, never by proxies or other third parties. It is an end-to-end method, so responses are only generated by the other user agent.
Question 51. How To Cancel All The Registrations Using A Single Register Message?
The contact header field is equal to * and Expires: 0
Question 52. What Is Third Party Registration?
If the UA sending the registration request on behalf of other UA it is called third party registration. In this case, the From header will contain the URI of the party submitting the registration on behalf of the party identified in the To header.
Question 53. What Is The Significance Of The Expires Header In Register Message?
The presence of an Expires header sets the expiration of Contacts with no expires parameter. If an expires parameter is present, it sets the expiration time for that Contact only.
Question 54. What Is The Registration And Why It Is Required?
The registration creates a temporary binding between the Address of Record (AOR) URI in the To header and the device URI in the Contact header.The binding of Registration is not required to enable a user agent to use a proxy server for outgoing calls. It is necessary, however, for a user agent to register to receive incoming calls from proxies that serve that domain unless some non-SIP mechanism is used by the location service to populate the SIP URIs and Contacts of end-points.
Question 55. What Is The Significance Of The Register Message?
The REGISTER method is used by a user agent to notify a SIP network of its current Contact URI (IP address).
Question 56. What Is The Significance Of Invite Message?
The INVITE method is used to establish media sessions between user agents. An INVITE usually has a message body containing the media information of the caller. If an INVITE does not contain media information, the ACK contains the media information of the UAC. If the media information contained in the ACK is not acceptable, then the called party must send a BYE to cancel the session—a CANCEL cannot be sent because the session is already established.
Question 57. What Is The Significance Of The Expires Header In An Invite Message?
An Expires header in an INVITE indicates to the UAS how long the call request is valid. For example, the UAS could leave an unanswered INVITE request displayed on a screen for the duration of specified in the Expires header. Once a session is established, the Expires header has no meaning—the expiration of the time does not terminate the media session. Instead, a Session-Expires header can be used to place a time limit on an established session.
Question 58. If The Re-invite Is Failed Or Refused, Will The Call/session Discontinued?
No, If a re-INVITE is refused or fails in any way, the session continues as if the INVITE had never been sent.
Question 59. Can You List Out The Sip Methods?
The INVITE, REGISTER, BYE, ACK, CANCEL, and OPTIONS methods are the original six methods in SIP. The REFER, SUBSCRIBE, NOTIFY,MESSAGE, UPDATE, INFO, and PRACK methods are described in separate RFCs.
Question 60. What Is Turn Protocol?
Traversal Using Relay NAT (TURN) protocol allows a client to obtain a transport IP address and port that it can receive packets sent from a single IP address in the public Internet. For some NAT topologies such as a client behind a symmetric NAT, using a relay located in the public Internet is the only approach that allows communication to take place.
C Interview Questions
Linux Interview Questions
Linux Embedded systems Interview Questions
Telecommunication Project Management Interview Questions
Linux Embedded systems Tutorial
Voice Over Internet Protocol (VOIP) Interview Questions
C Interview Questions
Unix/Linux Interview Questions
LTE Interview Questions
Linux Interview Questions
Telecom Billing Tutorial
Voip Telephony Interview Questions
Telecom Billing Interview Questions
Linux Embedded systems Interview Questions
Telecommunication Project Management Interview Questions
Voice Over Internet Protocol (VOIP) Interview Questions
Unix/Linux Interview Questions
LTE Interview Questions
Voip Telephony Interview Questions