Implementing Automatic Callback Using Session Initiation Protocol
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 5
Abstract
TheSession Initiation Protocol (SIP), is an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. SIP is developed by SIP working group specified by the Internet Engineering Task Force (IETF), peer-to-peer communication protocol to establish, manipulate, and tear down communication sessions at application layer. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. SIP invitations used to create sessions, carry session descriptions that allow participants to agree on a set of compatible media types. The Automatic Callback feature sends a priority ring on phone, indicating the previously busy or unanswered extension you dialed is now available. Callback feature allows to receive Callback notification when a called party line becomes available. Callback provides the ability of the system to suspend the call completion service if the user, who originated Callback, is currently busy and receives call-back notification when the called party becomes available. When the originating user then becomes available, the call completion service resumes for that user
Authors and Affiliations
Lisha Singh
A Study on Mobile Telecom Network Traffic Using Mobility Pattern
Abstract: In the present the Gradient Adaptive protocol is to efficiently maintain a sequence at a particular geographic location in a light network of highly mobile nodes without using infrastructure networks. To...
“Software Theft Detection for JavaScript programs based ondynamic birthmark extracted from runtime heap graph”
Abstract: Software’s, programs are valuable assets to developer companies. However, the source code ofprograms can be theft and JavaScript programs whose code is easily available which is a serious threat to theind...
A Logical Issue for the Internet Community to Address Is That of Effective Cryptography Standards for the Conduct of Business and Personal Communications
Many organizations are working hard to secure themselves from the growing threats of message hacking through various trends in cryptography. Yet the headlines are dominated with the latest news of message pass...
MAC Protocols: A Review
Mobile adhoc networks (MANETS) are infrastructureless networks which uses radio signals, to establish communication among mobile nodes. MANET media is open shared media, multiple mobile nodes may access the...
Auto Secured Text Monitor in Natural Scene Images
Abstract: Monitoring the text in content based images is an important task. An accurate and robust method to monitor texts in natural scene images. In this paper fast and effective decision tree algorithm (MSERs) is used...