Understanding and Taking Advantage of VoIP Protocols
Autor: | Scott Paladino, Craig A. Schiller, Dan Dunkel, Robert 'RSnake' Hansen, Anton Rager, Michael Gregg, Anton Chuvakin, Larry Chaffin, Jeremiah Grossman, Petko 'pdp' D. Petkov, Champ Clark, Seth Fogie |
---|---|
Rok vydání: | 2008 |
Předmět: |
Session Initiation Protocol
Voice over IP business.industry computer.internet_protocol Network packet Computer science ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS Request for Comments Signaling protocol User Datagram Protocol business Protocol (object-oriented programming) computer Computer network Asterisk |
Popis: | Publisher Summary Understanding how VoIP protocols function is important as it helps debug problems, assists in generating attacks in a security audit, and helps protect one against attacks targeting one Asterisk system. It involves a set of guidelines, which are covered in various request for comments (RFCs) and describe, in detail, how a protocol functions. VoIP data is transferred using small user datagram protocol (UDP) packets. Developers follow and use these RFCs to assist in development to help build applications. There are multiple RFCs covering various VoIP protocols. These describe how signaling works, how audio and video data is transferred, and various other features. Reading and understanding these RFCs can help unlock the “magic” of how VoIP works. This chapter shows two major functions with Inter-Asterisk eXchange (IAX2) and Session Initiation Protocol (SIP) is signaling and passing the audio/video data. Signaling handles the call build up, tear down, and modification of the call. The two protocols handle passing the audio data and signaling differently. While SIP is a signaling protocol in itself and uses RTP to pass the audio/video data, IAX2 chose to build both into one protocol. |
Databáze: | OpenAIRE |
Externí odkaz: |