O'Reilly logo

Building Telephony Systems with OpenSIPS - Second Edition by Bogdan-Andrei Iancu, Flavio E. Goncalves

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The SIP dialog flow

Let's examine this message sequence between two user agents as shown in the following figure. You can see several other flows associated with the session establishment in RFC 3665:

The SIP dialog flow

The messages are labeled in sequence. In this example, userA uses an IP phone to call another IP phone over the network. To complete the call, two SIP proxies are used.

The userA calls userB using its SIP identity called the SIP URI. The URI is similar to an e-mail address, such as . A secure SIP URI can be used too, such as . A call made using sips: (Secure SIP) will use a secure transport, Transport Layer Security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required