World Library  

QR link for Control of Service Context Using Sip Request-Uri
Add to Book Shelf
Flag as Inappropriate
Email this Book

Control of Service Context Using Sip Request-Uri

By Campbell, B.

Click here to view

Book Id: WPLBN0000693372
Format Type: PDF eBook
File Size: 74.52 KB.
Reproduction Date: 2005
Full Text

Title: Control of Service Context Using Sip Request-Uri  
Author: Campbell, B.
Volume:
Language: English
Subject: Technology, Language
Collections: Technical eBooks Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Campbell, B. (n.d.). Control of Service Context Using Sip Request-Uri. Retrieved from http://cn.ebooklibrary.org/


Description
Technical Reference Publication

Excerpt
Introduction: A communication service should make use of the information it has at hand when being accessed. For example, in most current voice mail implementations, a subscriber retrieving messages from his own desk does not have to reenter his voice mailbox number - the service assumes that the store being accessed is the one associated with the endpoint being used to access the service. Some services allow the user to validate this assumption using IVR techniques before prompting for a PIN. This concept of context-awareness can be captured in a voice mail service implementing SIP as defined in RFC 2543[1], without modification, through the standard use of that protocol's Request- URI. Furthermore, the concept is applicable to any SIP-based service where initial application state should be determined from context. This concept is a usage convention of standard SIP as defined in RFC 2543[1] and does not modify or extend that protocol in any way.

Table of Contents
Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . 3 2. Example Application . . . . . . . . . . . . . . . . . . . 3 2.1 Using URIs to Control Voice Mail Service Behavior . . . . 3 3. Voice Mail Scenario Descriptions . . . . . . . . . . . . . 5 3.1 Deposits . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.1.1 Direct Request to Deposit to a particular mailbox . . . . 5 3.1.1.1 SIP source . . . . . . . . . . . . . . . . . . . . . . . . 5 3.1.1.2 Arbitrary PSTN source . . . . . . . . . . . . . . . . . . 5 3.1.1.3 Recognized PSTN source . . . . . . . . . . . . . . . . . . 6 3.1.2 Direct Request to Deposit, mailbox to be determined . . . 6 3.1.2.1 SIP source . . . . . . . . . . . . . . . . . . . . . . . . 6 3.1.2.2 PSTN source . . . . . . . . . . . . . . . . . . . . . . . 6 3.1.2.3 Indirect Request to Deposit, due to find-me proxy decision 6 3.2 Retrievals . . . . . . . . . . . . . . . . . . . . . . . . 7 3.2.1 Request to Retrieve from a particular mailbox . . . . . . 7 3.2.1.1 Trusted SIP source . . . . . . . . . . . . . . . . . . . . 7 3.2.1.2 Authenticated SIP source . . . . . . . . . . . . . . . . . 7 3.2.1.3 Unauthenticated SIP source . . . . . . . . . . . . . . . . 7 3.2.1.4 PSTN source . . . . . . . . . . . . . . . . . . . . . . . 7 3.2.2 Request to Retrieve, mailbox to be determined . . . . . . 7 3.2.2.1 SIP source . . . . . . . . . . . . . . . . . . . . . . . . 7 3.2.2.2 Arbitrary PSTN source . . . . . . . . . . . . . . . . . . 8 3.2.2.3 Recognized PSTN source . . . . . . . . . . . . . . . . . . 8 4. Voice Mail Call Flow Examples . . . . . . . . . . . . . . 8 4.1 Generic Scenario . . . . . . . . . . . . . . . . . . . . . 8 4.1.1 Direct call to the voice mail system . . . . . . . . . . . 8 4.2 Message Deposit Scenarios . . . . . . . . . . . . . . . . 13 4.2.1 Call to known subscriber forwarded on no answer . . . . . 13 4.2.2 Call to known subscriber forwarded on busy . . . . . . . . 19 4.2.3 Direct call to a subscriber's mailbox . . . . . . . . . . 24 4.3 Message Retrieval Scenarios . . . . . . . . . . . . . . . 29 4.3.1 Call to retrieve messages believed to be from a known subscriber . . . . . . . . . . . . . . . . . . . . . . . . 29 4.3.2 Call to retrieve messages from an authenticated subscriber 33 5. Security Considerations . . . . . . . . . . . . . . . . . 38 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . 38 References . . . . . . . . . . . . . . . . . . . . . . . . 38 Authors' Addresses . . . . . . . . . . . . . . . . . . . . 38 Full Copyright Statement . . . . . . . . . . . . . . . . . 39

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.