In our last VoIP installment, we looked at the main reasons why SIP has become a widely adopted protocol, but we left details of the protocol’s inner workings fairly vague. This article will drill ...
Whether you are working with Avaya, Cisco, Microsoft, or BroadSoft, you will encounter proxies, registrars, and back-to-back user agents. Enterprise Connect is a just a month away, and I am in the ...
In this chapter, we start putting into practice some of the SIP concepts learned so far. We will show some very simple programming examples that illustrate how SIP works. As was stated in previous ...
There are a few SIP relics that continue to go unused. Is it time for a bit of spring cleaning? Holding on to anger is like grasping a hot coal with the intent of throwing it at someone else; you are ...
In Part 1 of our SIP primer, I covered the SIP foundation layers starting from the message structure and ending with the SIP transactions. We saw how phone registrations and proxies could work using ...