Session Initiation Protocol
|
|
|
- Gilberto Nanni
- 10 anni fa
- Просмотров:
Транскрипт
1 12. SIP-1 Pag. 1 Session Initiation Protocol SIP is a signaling protocol standardized by the IETF; it is used together with other protocols such as Session Description Protocol (SDP), Real Time Streaming Protocol (RTSP) and Session Announcement Protocol (SAP) SIP handles the setup, tear down e management of IP multimedia sessions SIP usually adopts RTP as a transport for media streams SIP signaling has a dedicated logical channel, different from the logical channels used for the transport of media on the user plane
2 12. SIP-1 Pag. 2 SIP entities SIP defines two types of entity: client Called also user agent client, it is an applications sending SIP requests servers Applications committed to the establishment of connections; serves respond to SIP requests from clients A SIP call involves at least two remote entities user agent client user agent server
3 12. SIP-1 Pag. 3 SIP entities A SIP device can host both user agent client and server, this is the typical case of a user s device There are four basic types of SIP server proxy server redirect server registrar server user agent server A physical device can host multiple servers
4 12. SIP-1 Pag. 4 Proxy (redirect) server A proxy server can implement multiple types of SIP server It can colloquiate both with user devices and other SIP servers in the network Through proxy servers it is possible to implement many value-added services such as call forwarding time-of-day routing [email protected] Request: [email protected] response response proxy server Request: [email protected] [email protected] The example shows a simple use case of redirect service. Luca is at home and Marco calls him at work. The proxy redirects the call to the current Luca s location
5 12. SIP-1 Pag. 5 Proxy (redirect) server The redirect server can also provide the calling terminal with an alternative address to call, instead of redirecting the call automatically [email protected] Request: [email protected] response Contact: [email protected] ACK redirect server Request: [email protected] [email protected]
6 12. SIP-1 Pag. 6 SIP applications (example) Find-Me-Follow-Me: By using a web interface, a user can specify where calls should be forwarded to him, also in a time-dependent fashion The user can ask the system to ring concurrently multiple terminals, or to scan a list of terminals sequentially With IVR (interactive voice response): incoming calls can be redirected to an automatic responder Click-to-Dial: It is a web browser-based application by which SIP calls are triggered by clicking an hyperlink in a web page Contact Manager Access to a centralized contact list, from any user terminal and independently on the current geographic location of the user
7 12. SIP-1 Pag. 7 User agent server It is the server usually installed on user terminals User terminals host also the user agent client The client is used to send signaling requests The user agent server receives incoming requests and responds
8 12. SIP-1 Pag. 8 Registrar server The registrar server handles SIP REGISTER requests SIP REGISTER requests are used by devices to register into the SIP network After a successful registration, a SIP device is operative
9 12. SIP-1 Pag. 9 SIP base call without proxy The INVITE message is used to start a call In the simplest case shown in the figure, the user agent client sends the INVITE directly to the called device The remore user server sends a RINGING message to let the calling device know that the called terminal is ringing When the call is accepted at the called end, the OK message is sent The call is teared down with the BYE/OK pair of messages INVITE RINGING OK ACK... call... BYE OK
10 12. SIP-1 Pag. 10 SIP features
11 12. SIP-1 Pag. 11 Caratteristiche di SIP SIP is a simple and flexible signaling protocol The parameters for media negotiation are carried in the body of SIP messages The figure shows an example of deferred call hour 16:00 INVITE BUSY (try at 16:00) ACK INVITE RINGING OK ACK... call... BYE OK
12 12. SIP-1 Pag. 12 SIP messages SIP messages can be either requests or responses SIP messages are in textual format In this way, it is simpler to analyze the behavior of signaling just parsing exchanges IP packets This is an advantage over binary signaling protocols However, textual messages usually consumes more bandwidth than binary protocols message = start-line *message header CRLF [message-body] start-line = request-line status-line
13 12. SIP-1 Pag. 13 SIP messages The request-line specifies the type of request and its parameters The status line specifies the type of response and its parameters The message-header carries information such as source and destination identification message = start-line *message header CRLF [message-body] start-line = request-line status-line
14 12. SIP-1 Pag. 14 SIP messages The message-body carries information such as type of session format of media altra caratterizzazione SIP does not standardize the message body; in the case of media format information, the structure of the message body is standardized by the Session Description Protocol (SDP) The message body can also carry messages of other sugnaling systems: this is useful for signaling interworking message = start-line *message header CRLF [message-body] start-line = request-line status-line
15 12. SIP-1 Pag. 15 SIP requests SIP requests start with the request-line, consisting of blankseparated tokens: method Type of requests Request-URI Destination address of the request SIP-Version Basic methods are (RFC 3261) INVITE ACK OPTIONS BYE CANCEL REGISTER request-line = method SP Request-URI SP SIP- Version CRLF
16 12. SIP-1 Pag. 16 SIP requests INVITE To establish a call; it specified involved users and also the format of media ACK Messages are usually ACKed; the ACK message must refer explicitly to the message it acknowledges BYE To close a call CANCEL To terminate an ongoing transaction REGISTER Used to register a device
17 12. SIP-1 Pag. 17 Example: one-number Luca is registered with multiple SIP addresses Anna calls Luca: the call is forwarded to all active registrations of Luca When one of the called terminal responds, the call is started REGISTER OK REGISTER Registrar/ proxy OK OK INVITE INVITE TRYING INVITE CANCEL OK(for invite) OK(for cancel) ACK ACK anna
18 12. SIP-1 Pag. 18 Additional methods The INFO method is useful to transmit informnation when a call is already active For example, this can be used to transport multifrequency tones
19 12. SIP-1 Pag. 19 SIP response The status code is a three-digit number specifying the type of message The reason-phrase is a text field carrying additional information, depending of the type of message Status codes range from 100 to 699 The first digit indicates the category of the rsponse 1xx: provisional (eg: 181 call forwarded) 2xx: success (eg 200) 3XX: redirect (eg, 302: retry calling the address specified in the reason phrase) 4XX: failure 5XX: Server failure 6XX: Global failure (eg: called user does not exist) status-line = SIP version SP status code SP reason-phrase CRLF NOTE: all responses, with the exception of the 1XX Provisional responses, must be ACKed
20 12. SIP-1 Pag. 20 SIP response Provisional 100 trying 180 ringing 181 call forwarded 182 call queued 183 session in progress Success 200 OK Redirection 301 user moved permanently 302 user mover temporarily Request failure 400 bad request 401 user not authorized 415 unsupported media 486 busy Server failure 500 server internal error Global failure 604 does not exist anywhere status-line = SIP version SP status code SP reason-phrase CRLF
21 12. SIP-1 Pag. 21 SIP addressing SIP addresses are URIs (Uniform Resource Indicator) SIP URI:
22 12. SIP-1 Pag. 22 Message headers There are multiple header types To e From headers identify called and calling users Header can be: general header request header response header entity header
23 12. SIP-1 Pag. 23 Message headers General header They are used for both requests and response, e.g.: To, From,Call ID... The Contact header is used for the redirection of calls Request Header Used only for requests Response Header Used only for responses
24 12. SIP-1 Pag. 24 Message headers Entity Header The main purpose of the entity header is to describe the content of the message body Frequently used fieds are Content-length (content length in bytes) Content-type (e.g. application/sdp) Content-encoding Content-disposition To specify, for example, if the contents of the body must be displayed for the user Content-language
25 12. SIP-1 Pag. 25 Registration example Via header The Via header specifies the SIP route followed by the message The branch parameter is used to identify univocally the message, if proxies are used From header Specifies the URI of the requesting entity The tag field is used to help identifying univocally the user and user s transaction To: header In this case, the To header coincides with the From header: this is to specify that Anna is registering herself [email protected] registrar REGISTER sip:registrar.lavoro.it SIP/2.0 Via: SIP/2.0/UDP pippo.lavoro.it; branch = h739fhry Max-Forwards: 70 From: sip:[email protected]; tag = To: sip:[email protected] CALL-ID: @pippo.lavoro.it CSeq: 1 REGISTER Contact: sip:[email protected] Expires: 7200 Content-Length: 0
26 12. SIP-1 Pag. 26 Registration example CALL-ID header To help identifying univocally the registration transaction Cseq header Has the purpose of mapping correctly responses to requests Contact header Specifies who is to be contacted to deliver responses In this case, the message body is empty, thus we have Content-Length: 0 [email protected] registrar REGISTER sip:registrar.lavoro.it SIP/2.0 Via: SIP/2.0/UDP pippo.lavoro.it; branch = h739fhry Max-Forwards: 70 From: sip:[email protected]; tag = To: sip:[email protected] CALL-ID: @pippo.lavoro.it CSeq: 1 REGISTER Contact: sip:[email protected] Expires: 7200 Content-Length: 0
27 12. SIP-1 Pag. 27 Registration example The figure plots a possible response to the registration request [email protected] registrar REGISTER sip:registrar.lavoro.it SIP/2.0 Via: SIP/2.0/UDP pippo.lavoro.it; branch = h739fhry Max-Forwards: 70 From: sip:[email protected]; tag = To: sip:[email protected] CALL-ID: @pippo.lavoro.it CSeq: 1 REGISTER Contact: sip:[email protected] Expires: 7200 Content-Length: 0 SIP/ OK VIA: SIP/2.0/UDP pippo.lavoro.it; branch = h739fhry From: sip:[email protected], tag = To: sip:[email protected] CALL-ID: @pippo.lavoro.it CSeq: 1 REGISTER Contact: sip:[email protected] Expires: 3600 Content-length: 0
28 12. SIP-1 Pag. 28 INVITE This example shows a direct call, thus the complete address of the destination host must be specified In case of proxy servers, the host indication can be omitted as it can be solved automatically by the proxy The nicks annie e luke are the display names, they are optional [email protected] [email protected] INVITE: sip:[email protected] SIP/2.0 VIA: SIP/2.0/UDP pippo.lavoro.it; branch = 34f65g Max-Forwards: 70 From: annie<sip:[email protected]>; tag = Contact: sip:[email protected] To: luke<sip:[email protected]> Call-ID: @pippo.lavoro.it CSeq: 1 INVITE Subject: shell we go to the restaurant tonight? Content-length: xxx Content-type: application/sdp Content-disposition: session
29 12. SIP-1 Pag. 29 Response to INVITE The triplet (From, To, Call-ID) is the dialog ID which identifies a transaction between two remote user terminals At this point of the signaling transaction, the dialog is established but the call is not set up; the dialog is in the early status The dialog becomes confirmed when the call is set up [email protected] [email protected] SIP/ RINGING Via: SIP/2.0/UDP pippo.lavoro.it; branch = 34f65g From: annie<sip:[email protected]>; tag = To: luke<sip:[email protected]>; tag = Contact: sip:[email protected] Call-ID: @pippo.lavoro.it CSeq: 1 INVITE Content-Length: 0
30 12. SIP-1 Pag. 30 Confirmation to INVITE With the OK message the call is established and the dialog is confirmed SIP/ OK VIA: SIP/2.0/UDP pippo.lavoro.it; branch = 34f65g From: annie<sip:[email protected]>; tag = To: luke<sip:[email protected]>; tag = Contact: sip:[email protected] Call-ID: @pippo.lavoro.it CSeq: 1 INVITE Subject: cosa fai stasera Content-Length: xxx Content-Type: application/sdp Content-Disposition: session message body ACK: sip:[email protected] SIP/2.0 VIA: SIP/2.0/UDP/pluto.lavoro.it; branch = 34f65g MAx-Forwards: 70 From: annie<sip:[email protected]>; tag = To: luke<sip:[email protected]>; tag = Call-ID: @pippo.lavoro.it CSeq: 1 ACK Content length 0
31 12. SIP-1 Pag. 31 Tear down BYE: SIP/2.0 VIA: SIP/2.0/UDP/pluto.lavoro.it; branch = 34f65g MAx-Forwards: 70 From: annie<sip:[email protected]>; tag = To: luke<sip:[email protected]>; tag = Call-ID: @pippo.lavoro.it CSeq: 2 BYE Content length: 0 SIP/ OK VIA: SIP/2.0/UDP pippo.lavoro.it; branch = 34f65g From: annie<sip:[email protected]>; tag = To: luke<sip:[email protected]>; tag = Contact: sip:[email protected] Call-ID: @pippo.lavoro.it CSeq: 2 BYE Content length: 0
32 12. SIP-1 Pag. 32 Proxy server Proxy serversroute SIP messages to the proper destinations More than one proxy can be inviolved in the setup of a connection For example, the setup of a SIP call may involve two proxies: the local proxy of the calling user and the local proxy of the called user
33 12. SIP-1 Pag. 33 Example (proxy) sip:server.work.com INVITE SIP/2.0 Via: SIP 2/0/UDP pc1.work.net; branch z9hg4bk7890 Max-Forwards: 70 From: Contact: To: Call-ID: CSeq: 1 INVITE SIP/ Trying Via: SIP 2/0/UDP pc1.work.net; branch z9hg4bk7890 From: boss<sip:[email protected]>;tag=ab12 To: daniel<sip:[email protected]> Call-ID: @pc1.home.net CSeq: 1 INVITE SIP/ OK Via: SIP 2/0/UDP pc1.work.net; branch z9hg4bk7890 Record-route: <sip:server.work.com;lr> From: boss<sip:[email protected]>; tag=ab12 To: daniel<sip:[email protected]>; tag=xy45 Call-ID: @pc1.home.net CSeq: 1 INVITE Contact: sip:[email protected] INVITE sip:[email protected] SIP/2.0 Via: SIP 2/0/UDP server.work.com; branch z9hg4bkxyz1 Via: SIP 2/0/UDP pc1.work.net; branch z9hg4bk7890 Record-route: <sip:server.work.com;lr> Max-Forwards: 69 From: boss<sip:[email protected]>;tag=ab12 Contact: boss<sip:[email protected]> To: daniel<sip:[email protected]> Call-ID: @pc1.home.net CSeq: 1 INVITE SIP/ OK Via: SIP 2/0/UDP server.work.com; branch z9hg4bkxyz1 Via: SIP 2/0/UDP pc1.work.net; branch z9hg4bk7890 Record-route: <sip:server.work.com;lr> From: boss<sip:[email protected]>; tag=ab12 To: daniel<sip:[email protected]>; tag=xy45 Call-ID: @pc1.home.net CSeq: 1 INVITE Contact: sip:[email protected]
34 12. SIP-1 Pag. 34 Example (proxy) sip:server.work.com ACK SIP/2.0 Via: SIP 2/0/UDP pc1.work.net; branch z9hg4bk7891 Max-Forwards: 70 Route: <sip:server.work.com;lr> From: tag=ab12 To: tag=xy45 Call-ID: CSeq: 1 ACK ACK sip:[email protected] SIP/2.0 Via: SIP 2/0/UDP server.work.com; branch z9hg4bkxyz2 Via: SIP 2/0/UDP pc1.work.net; branch z9hg4bk7891 Max-Forwards: 69 From: boss<sip:[email protected]>; tag=ab12 To: daniel<sip:[email protected]>; tag=xy45 Call-ID: @pc1.home.net CSeq: 1 ACK
35 12. SIP-1 Pag. 35 Comments The Via header is important when proxies are involved in signaling Each SIP device touched by a SIP message adds a Via header carrying its address In this way, the path of SIP devices crossed by a message is explicitly written in the message header It is easy to detect SIP routing loops Moreover, it is easy to force response messages to follows in the reverse direction the path followed by request messages
36 12. SIP-1 Pag. 36 Comments In the backward path of responses, Via header are stripped from the message at each SIP hop The function of the branch parameter is to identify univocally the signalling transaction at each SIP entity crossed by messages A stateful proxy must be always in the path followed by all requests and all responses The Via header is not enough, because its scope is limited to one request-response interaction This is why also the record-route header is used
Tutto il VoIP in 45 minuti!! Giuseppe Tetti. Ambiente Demo. VoIP IP PBX SIP
Tutto il in 45 minuti!! Giuseppe Tetti Ambiente Demo 1 Ambiente Demo Ambiente Demo 2 Ambiente Demo ATA Ambiente Demo Internet ATA 3 Ambiente Demo Internet ATA Rete Telefonica pubblica Ambiente Demo Internet
Il VoIP parla Wireless. Giuseppe Tetti. Ambiente Demo. VoIP IP PBX SIP. Internet. Soft Phone
Il VoIP parla Wireless Giuseppe Tetti Ambiente Demo VoIP IP PBX SIP Internet Soft Phone 1 Obiettivi Realizzare un sistema di comunicazione vocale basato interamente su tecnologie VoIP utilizzando: Trasporto
Session Description Protocol
14. SIP-2 Pag. 1 Session Description Protocol SDP is used for the description of the format of media streams For each media stream of a session, an SDP description is needed Note that SDP does not transport
Interfaccia Web per customizzare l interfaccia dei terminali e
SIP - Session Initiation Protocol Il protocollo SIP (RFC 2543) è un protocollo di segnalazione e controllo in architettura peer-to-peer che opera al livello delle applicazioni e quindi sviluppato per stabilire
REGISTRATION GUIDE TO RESHELL SOFTWARE
REGISTRATION GUIDE TO RESHELL SOFTWARE INDEX: 1. GENERAL INFORMATION 2. REGISTRATION GUIDE 1. GENERAL INFORMATION This guide contains the correct procedure for entering the software page http://software.roenest.com/
Copyright 2012 Binary System srl 29122 Piacenza ITALIA Via Coppalati, 6 P.IVA 01614510335 - [email protected] http://www.binarysystem.
CRWM CRWM (Web Content Relationship Management) has the main features for managing customer relationships from the first contact to after sales. The main functions of the application include: managing
IP multimedia services in the NGN
4. Servizi NGN Pag. 1 IP multimedia services in the NGN In the ETSI the working group TISPAN (Telecommunications and Internet converged Services and Protocols for Advanced Networking) has already defined
Single-rate three-color marker (srtcm)
3. Markers Pag. 1 The Single Rate Three Color Marker (srtcm) can be used as component in a Diffserv traffic conditioner The srtcm meters a traffic stream and marks its packets according to three traffic
User Guide Guglielmo SmartClient
User Guide Guglielmo SmartClient User Guide - Guglielmo SmartClient Version: 1.0 Guglielmo All rights reserved. All trademarks and logos referenced herein belong to their respective companies. -2- 1. Introduction
Session Initiation Protocol (SIP)
Session Initiation Protocol (SIP) SIP 1 Outline Signalling generalities Signalling in packet networks SIP generalities SIP functionality and architecture SIP components SDP SIP-T SIP 2 Signalling generalities
IP TV and Internet TV
IP TV e Internet TV Pag. 1 IP TV and Internet TV IP TV e Internet TV Pag. 2 IP TV and Internet TV IPTV (Internet Protocol Television) is the service provided by a system for the distribution of digital
Motivazioni Integrazione dei servizi Vantaggi e problemi aperti. Architettura di riferimento
INDICE Motivazioni Integrazione dei servizi Vantaggi e problemi aperti Architettura di riferimento La codifica vocale Il trasporto RTP e RTCP QoS in reti IP e requirements La segnalazione H.323 SIP Cenni
CONFIGURATION MANUAL
RELAY PROTOCOL CONFIGURATION TYPE CONFIGURATION MANUAL Copyright 2010 Data 18.06.2013 Rev. 1 Pag. 1 of 15 1. ENG General connection information for the IEC 61850 board 3 2. ENG Steps to retrieve and connect
WELCOME UNIPA REGISTRATION:
WELCOME This is a Step by Step Guide that will help you to register as an Exchange for study student to the University of Palermo. Please, read carefully this guide and prepare all required data and documents.
Introduzione Kerberos. Orazio Battaglia
Orazio Battaglia Il protocollo Kerberos è stato sviluppato dal MIT (Massachusetts Institute of Tecnology) Iniziato a sviluppare negli anni 80 è stato rilasciato come Open Source nel 1987 ed è diventato
WELCOME. Go to the link of the official University of Palermo web site www.unipa.it; Click on the box on the right side Login unico
WELCOME This is a Step by Step Guide that will help you to register as an Exchange for study student to the University of Palermo. Please, read carefully this guide and prepare all required data and documents.
UNIVERSITÀ DEGLI STUDI DI TORINO
STEP BY STEP INSTRUCTIONS FOR COMPLETING THE ONLINE APPLICATION FORM Enter the Unito homepage www.unito.it and click on Login on the right side of the page. - Tel. +39 011 6704425 - e-mail [email protected]
How to use the WPA2 encrypted connection
How to use the WPA2 encrypted connection At every Alohawifi hotspot you can use the WPA2 Enterprise encrypted connection (the highest security standard for wireless networks nowadays available) simply
WEB OF SCIENCE. COVERAGE: multidisciplinary TIME RANGE: DOCUMENT TYPES: articles, proceedings papers, books
WEB OF SCIENCE COVERAGE: multidisciplinary TIME RANGE: 1985- DOCUMENT TYPES: articles, proceedings papers, books WEB OF SCIENCE: SEARCH you can add one or more search field you can limit results to a specific
INTERNET e RETI di CALCOLATORI A.A. 2014/2015 Capitolo 4 DHCP Dynamic Host Configuration Protocol Fausto Marcantoni fausto.marcantoni@unicam.
Laurea in INFORMATICA INTERNET e RETI di CALCOLATORI A.A. 2014/2015 Capitolo 4 Dynamic Host Configuration Protocol [email protected] Prima di iniziare... Gli indirizzi IP privati possono essere
TNCguide OEM Informativa sull introduzione di documentazione aggiuntiva nella TNCguide
Newsletter Application 4/2007 OEM Informativa sull introduzione di documentazione aggiuntiva nella APPLICABILITÀ: CONTROLLO NUMERICO itnc 530 DA VERSIONE SOFTWARE 340 49x-03 REQUISITI HARDWARE: MC 420
Guida alla configurazione Configuration Guide
Guida alla configurazione Configuration Guide Configurazione telecamere IP con DVR analogici, compatibili IP IP cameras configuration with analog DVR, IP compatible Menu principale: Fare clic con il pulsante
UNIVERSITÀ DEGLI STUDI DI TORINO
How to register online for exams (Appelli) Version updated on 18/11/2016 The academic programs and the career plan Incoming students can take exams related to the courses offered by the Department where
UNIVERSITÀ DEGLI STUDI DI TORINO. Instructions to apply for exams ONLINE Version 01 updated on 17/11/2014
Instructions to apply for exams ONLINE Version 01 updated on 17/11/2014 Didactic offer Incoming students 2014/2015 can take exams of courses scheduled in the a.y. 2014/2015 and offered by the Department
I rischi e le misure per rendere sicure le reti VoIP. Stefano Sotgiu
VIP(i VoIP (in)security I rischi e le misure per rendere sicure le reti VoIP Stefano Sotgiu Agenda Il VoIP e la rete telefonica tradizionale Il VoIP più in dettaglio (SIP) Le minacce nel VoIP Cosa e come
A.A. 2006/2007 Laurea di Ingegneria Informatica. Fondamenti di C++ Horstmann Capitolo 3: Oggetti Revisione Prof. M. Angelaccio
A.A. 2006/2007 Laurea di Ingegneria Informatica Fondamenti di C++ Horstmann Capitolo 3: Oggetti Revisione Prof. M. Angelaccio Obbiettivi Acquisire familiarità con la nozione di oggetto Apprendere le proprietà
PROTOCOLLO DI COMUNICAZIONE MODBUS MODBUS COMMUNICATION PROTOCOL. MANUALE ISTRUZIONI / INSTRUCTION MANUAL IM163-IU v0.61
MANUALE ISTRUZIONI / INSTRUCTION MANUAL IM163-IU v0.61 COMPALARM C2C Annunciatore d allarme PROTOCOLLO DI COMUNICAZIONE MODBUS COMPALARM C2C Alarm annunciator MODBUS COMMUNICATION PROTOCOL Compalarm C2C
Laboratorio di Amministrazione di Sistema (CT0157) parte A : domande a risposta multipla
Laboratorio di Amministrazione di Sistema (CT0157) parte A : domande a risposta multipla 1. Which are three reasons a company may choose Linux over Windows as an operating system? (Choose three.)? a) It
Portale Materiali Grafiche Tamburini. Grafiche Tamburini Materials Portal
Portale Materiali Grafiche Tamburini Documentazione utente italiano pag. 2 Grafiche Tamburini Materials Portal English user guide page 6 pag. 1 Introduzione Il Portale Materiali è il Sistema Web di Grafiche
DICHIARAZIONE DI RESPONSABILITÀ
- 0MNSWK0082LUA - - ITALIANO - DICHIARAZIONE DI RESPONSABILITÀ Il produttore non accetta responsabilità per la perdita di dati, produttività, dispositivi o qualunque altro danno o costo associato (diretto
Enel App Store - Installation Manual - Mobile
Model Design Digital Revolution Enel App Store - Installation Manual - Mobile V 1.1 Manual Questo documento contiene informazioni di proprietà di Enel SpA e deve essere utilizzato esclusivamente dal destinatario
Real Time Streaming Protocol. Akshat Sikarwar - Columbia University Traduzione e adattamento di Massimo De Santo, Università di Salerno
Real Time Streaming Protocol Akshat Sikarwar - Columbia University Traduzione e adattamento di Massimo De Santo, Università di Salerno Sommario Introduzione Proprietà del protocollo messaggi di RTSP Messaggi
SIP - Session Initiation Protocol
SIP - Session Initiation Protocol courtesy of Marco Sommani CNR-IIT, Pisa [email protected] 1/44 SIP SIP (Session Initiation Protocol) è un protocollo utilizzato per iniziare, modificare o terminare
CCTV DIVISION GUIDA RAPIDA PER LA CONFIGURAZIONE DELL IP STATICO SU SISTEMI TVCC QUICK GUIDE FOR STATIC IP CONFIGURATION ABOUT CCTV SYSTEM
CCTV DIVISION GUIDA RAPIDA PER LA CONFIGURAZIONE DELL IP STATICO SU SISTEMI TVCC QUICK GUIDE FOR STATIC IP CONFIGURATION ABOUT CCTV SYSTEM ITALIANO Principali Step per la configurazione I dispositivi di
Marco Sommani Il Session Initiation Protocol
Il Session Initiation Protocol Marco Sommani CNR-IIT, Pisa [email protected] GARR-WS9, Roma GARR-WS9, 15 giugno 2009 1/44 SIP SIP (Session Initiation Protocol) è un protocollo utilizzato per iniziare,
www.aylook.com -Fig.1-
1. RAGGIUNGIBILITA DI AYLOOK DA REMOTO La raggiungibilità da remoto di Aylook è gestibile in modo efficace attraverso una normale connessione ADSL. Si presentano, però, almeno due casi: 1.1 Aylook che
Servizi Applicativi su Internet SIP. Session Initiation Protocol Ing. Pierluigi Gallo
Servizi Applicativi su Internet SIP Session Initiation Protocol Introduzione 1/2 2 Protocollo di segnalazione basato su IP Standard IETF (poi accettato anche da 3GPP) Utilizza alcuni paradigmi e strumenti
STATO IMPLEMENTAZIONE ONVIF SU TELECAMERE MUNDUS SECURUS
IMPLEMENTAZIONE ONVIF SU TELECAMERE MUNDUS SECURUS 1. Ambiente di sviluppo Sono stati analizzati diversi linguaggi e framework differenti utilizzabili per implementare i WebServices ONVIF. Il risultato
La Sua banca dovrá registrare il mandato di addebito nei propri sistemi prima di poter iniziare o attivare qualsiasi transazione
To: Agenti che partecipano al BSP Italia Date: 28 Ottobre 2015 Explore Our Products Subject: Addebito diretto SEPA B2B Informazione importante sulla procedura Gentili Agenti, Con riferimento alla procedura
EML-16 EML-16. Pulses concentrator. Concentratore impulsi MODBUS COMMUNICATION PROTOCOL PROTOCOLLO DI COMUNICAZIONE MODBUS
MANUALE OPERATIVO / INSTRUCTION MANUAL IM-IU v0.1 EML-16 Concentratore impulsi PROTOCOLLO DI COMUNICAZIONE MODBUS EML-16 Pulses concentrator MODBUS COMMUNICATION PROTOCOL PROTOCOLLO MODBUS Il concentratore
TLR05S-350. Extender in corrente costante, 3 x 350mA per TLR04M_
TLR05S-350 Extender in corrente costante, 3 x 350mA per TLR04M_350-500 IT DATI TECNICI Alimentazione Uscita Tipo di carico Sistema di collegamento master/slave/slave Distanza massima delle connessioni
Apriti Sesamo Plus Client per Windows
Apriti Sesamo Plus Client per Windows 1. username e password per il logon di Windows 2. Username e password sono corretti. Windows è OK ma non quella al sistema Windows Domain Controller Utente finale
Sezione 1 / Section 1. Elementi d identità: il marchio Elements of identity: the logo
Sezione 1 / Section 1 2 Elementi d identità: il marchio Elements of identity: the logo Elements of identity: the logo Indice 2.01 Elementi d identità 2.02 Versioni declinabili 2.03 Versioni A e A1, a colori
Dema S.p.A. SUPPLIER QUALITY REQUIREMENTS FOR AVIO PROGRAMS REQUISITI QUALITÀ FORNITORI PER PROGRAMMI AVIO
1 Dema S.p.A. REQUISITI QUALITÀ FORNITORI PER PROGRAMMI AVIO SUPPLIER QUALITY REQUIREMENTS FOR AVIO PROGRAMS www.demaspa.it Rev.: 0 Pag. 1 / 6 2 EMISSIONE ISSUE E R Data/e Descrizione / Description Firme
Il VoIP. Ing. Mario Terranova
Il VoIP Ing. Mario Terranova Ufficio Servizi sicurezza e Certificazione Centro Nazionale per l Informatica nella Pubblica Amministrazione [email protected] SOMMARIO Le tecnologie La convergenza Problematiche
SERVIZIO TELEFONICO INTEGRATO D'ATENEO INSTALLAZIONE (WINDOWS) Scaricare il software X-Lite dal sito: http://www.counterpath.com
SERVIZIO TELEFONICO INTEGRATO D'ATENEO luglio 2010 INSTALLAZIONE (WINDOWS) Scaricare il software X-Lite dal sito: http://www.counterpath.com Alla schermata License Agreement, selezionare I Accept the agreement
Guida utente User Manual made in Italy Rev0
Guida utente User Manual Rev0 made in Italy Indice/Index Informazioni generali General Info... 3 Guida Rapida per messa in funzione Start Up procedure... 3 Login Login... 3 Significato dei tasti Botton
College Algebra. Logarithms: Denitions and Domains. Dr. Nguyen November 9, Department of Mathematics UK
College Algebra Logarithms: Denitions and Domains Dr. Nguyen [email protected] Department of Mathematics UK November 9, 2018 Agenda Logarithms and exponents Domains of logarithm functions Operations
Corso di Applicazioni Telematiche
Tecniche e protocolli per l attraversamento di NAT (Network Address Translator) Corso di Applicazioni Telematiche A.A. 2009-10 Prof. Simon Pietro Romano Università degli Studi di Napoli Federico II Facoltà
ZyXEL Prestige 2602R GUIDA ALLA CONFIGURAZIONE EUTELIAVOIP
ZyXEL Prestige 2602R GUIDA ALLA CONFIGURAZIONE EUTELIAVOIP ZyXEL Prestige 2602R-61 Guida alla configurazione EUTELIAVOIP pag.2 INDICE SCOPO...3 ACCESSO ALLA USER INTERFACE...3 CONFIGURAZIONE EUTELIAVOIP
Graphs: Cycles. Tecniche di Programmazione A.A. 2012/2013
Graphs: Cycles Tecniche di Programmazione Summary Definitions Algorithms 2 Definitions Graphs: Cycles Cycle A cycle of a graph, sometimes also called a circuit, is a subset of the edge set of that forms
Technical Guidelines GON % Italian production. sports car oriented
The rubber nozzle mod GON (Gas Oval Nozzle) has the intake with 210 mm x 105 mm dimensions and has been developed by WORKY in order to be more SPORTS CAR oriented. It has been studied for vehicles with
GstarCAD 2010 Features
GstarCAD 2010 Features Unrivaled Compatibility with AutoCAD-Without data loss&re-learning cost Support AutoCAD R2.5~2010 GstarCAD 2010 uses the latest ODA library and can open AutoCAD R2.5~2010 DWG file.
Quando mi collego ad alcuni servizi hosting ricevo un messaggio relativo al certificato di protezione del sito SSL, come mai?
IT FAQ-SSL Quando mi collego ad alcuni servizi hosting ricevo un messaggio relativo al certificato di protezione del sito SSL, come mai? Il certificato SSL relativo ai servizi hosting è stato rinnovato
LABELLING Labelling System FIP Formatura Iniezione Polimeri
Set LSE - Personalizzazione e stampa etichette LSE Set - Label Design and Print Modulo LCE - Tappo di protezione trasparente con piastrina porta etichette LCE Module - Transparent service pug with tag
INTERNET & MARKETING INNOVATIVE COMMUNICATION.
INTERNET & MARKETING INNOVATIVE COMMUNICATION www.sunet.it Passion Our passion to what we do every day allows us to have a special creativity and constantly improve the process of realization and execution.
Resources and Tools for Bibliographic Research. Search & Find Using Library Catalogues
Resources and Tools for Bibliographic Research Search & Find Using Library Catalogues November 28, 2011 Donata Pieri Index Definition University of Padova Library System Catalogue CaPerE E-journals Catalogue
SRT064 BTH SRT051 BTH SRT052 BTH
KIT FOR TRUCK BRAKE TESTERS SRT051 BTH SRT052 BTH OPERATOR S MANUAL SRT064BTH SRT051BTH SRT052BTH CONTENTS 1. INTRODUCTION...1 2. Description of SRT064BTH Kit...2 3. Description of SRT051BTH Kit...2 4.
LA SACRA BIBBIA: OSSIA L'ANTICO E IL NUOVO TESTAMENTO VERSIONE RIVEDUTA BY GIOVANNI LUZZI
Read Online and Download Ebook LA SACRA BIBBIA: OSSIA L'ANTICO E IL NUOVO TESTAMENTO VERSIONE RIVEDUTA BY GIOVANNI LUZZI DOWNLOAD EBOOK : LA SACRA BIBBIA: OSSIA L'ANTICO E IL NUOVO Click link bellow and
Posta elettronica per gli studenti Email for the students
http://www.uninettunouniverstiy.net Posta elettronica per gli studenti Email for the students Ver. 1.0 Ultimo aggiornamento (last update): 10/09/2008 13.47 Informazioni sul Documento / Information on the
LA SACRA BIBBIA: OSSIA L'ANTICO E IL NUOVO TESTAMENTO VERSIONE RIVEDUTA BY GIOVANNI LUZZI
Read Online and Download Ebook LA SACRA BIBBIA: OSSIA L'ANTICO E IL NUOVO TESTAMENTO VERSIONE RIVEDUTA BY GIOVANNI LUZZI DOWNLOAD EBOOK : LA SACRA BIBBIA: OSSIA L'ANTICO E IL NUOVO Click link bellow and
Sicurezza dei servizi Voice over IP con SIP e RTP
Sicurezza dei servizi Voice con Program Manager: Francesco Limone [email protected] Project Manager: Emilio Tonelli Team Members CONSEL: Sebastiano Di Gregorio Matteo Mogno Alessandro Tatti Contents Introduzione
Abraham Gebrehiwot CNR Istituto di Informatica e Telematica - Pisa. Attività di TERENA sulla SIP identity
Abraham Gebrehiwot CNR Istituto di Informatica e Telematica - Pisa 1 Attività di TERENA sulla SIP identity Problema da risolvere: Si vuole accertare l identità del chiamante integrità e autenticità dei
Virtualizzazione con Microsoft Tecnologie e Licensing
Microsoft Virtualizzazione con Microsoft Tecnologie e Licensing Profile Redirezione dei documenti Offline files Server Presentation Management Desktop Windows Vista Enterprise Centralized Desktop Application
Corso di Laurea in Ingegneria Informatica. Corso di Reti di Calcolatori I
Corso di Laurea in Ingegneria Informatica Corso di Reti di Calcolatori I Roberto Canonico ([email protected]) Giorgio Ventre ([email protected]) Virtual LAN: VLAN I lucidi presentati al corso
Finite Model Theory / Descriptive Complexity: bin
, CMPSCI 601: Recall From Last Time Lecture 19 Finite Model Theory / Descriptive Compleity: Th: FO L DSPACE Fagin s Th: NP SO. bin is quantifier-free.!#"$&% ('*), 1 Space 0 1 ) % Time $ "$ $ $ "$ $.....
Data Alignment and (Geo)Referencing (sometimes Registration process)
Data Alignment and (Geo)Referencing (sometimes Registration process) All data aquired from a scan position are refered to an intrinsic reference system (even if more than one scan has been performed) Data
