SIP network discovery by using SIP message probing

Jin Zhou, Jie Li, Yin Ben Xia, Bin Cai, Chun Ying

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Currently more and more SIP based networks have been deployed in enterprises and communication carriers' domain to provide NGN services. With the widely adoption of SIP, information discovery in SIP network, which is the first step of SIP management, becomes a key challenge to operators and service providers. To address the problem, this paper presents an automated SIP network discovery approach based on SIP message probing. With our approach, minimal number of SIP request messages will be sent out to probe SIP entities and then targeted information could be obtained by wrapping and parsing the received responses. Experiment results show that the approach can effectively obtain SIP information for management while it costs limited probing messages.

Original languageEnglish (US)
Title of host publicationNOMS 2008 - IEEE/IFIP Network Operations and Management Symposium
Subtitle of host publicationPervasive Management for Ubiquitous Networks and Services
Pages791-794
Number of pages4
DOIs
StatePublished - 2008
Externally publishedYes
EventNOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services - Salvador - Bahia, Brazil
Duration: Apr 7 2008Apr 11 2008

Publication series

NameNOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services

Conference

ConferenceNOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services
Country/TerritoryBrazil
CitySalvador - Bahia
Period4/7/084/11/08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'SIP network discovery by using SIP message probing'. Together they form a unique fingerprint.

Cite this