⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc3087.txt

📁 RFC 的详细文档!
💻 TXT
📖 第 1 页 / 共 5 页
字号:






Network Working Group                                        B. Campbell
Request for Comments: 3087                                     R. Sparks
Category: Informational                                      dynamicsoft
                                                              April 2001


            Control of Service Context using SIP Request-URI

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2001).  All Rights Reserved.

Abstract

   This memo provides information for the Internet community.  It
   describes a useful way to conceptualize the use of the standard SIP
   (Session Initiation Protocol) Request-URI (Uniform Resource
   Identifier) that the authors and many members of the SIP community
   think is suitable as a convention.  It does not define any new
   protocol with respect to RFC 2543.

   In a conventional telephony environment, extended service
   applications often use call state information, such as calling party,
   called party, reason for forward, etc, to infer application context.
   In a SIP/2.0 call, much of this information may be either non-
   existent or unreliable.  This document proposes a mechanism to
   communicate context information to an application.  Under this
   proposal, a client or proxy can communicate context through the use
   of a distinctive Request-URI.  This document continues with examples
   of how this mechanism could be used in a voice mail application.















Campbell & Sparks            Informational                      [Page 1]

RFC 3087                  SIP Service Control                 April 2001


Table of Contents

   1.      Introduction . . . . . . . . . . . . . . . . . . . . . . .  3
   2.      Example Application  . . . . . . . . . . . . . . . . . . .  3
   2.1     Using URIs to Control Voice Mail Service Behavior  . . . .  3
   3.      Voice Mail Scenario Descriptions . . . . . . . . . . . . .  5
   3.1     Deposits . . . . . . . . . . . . . . . . . . . . . . . . .  5
   3.1.1   Direct Request to Deposit to a particular mailbox  . . . .  5
   3.1.1.1 SIP source . . . . . . . . . . . . . . . . . . . . . . . .  5
   3.1.1.2 Arbitrary PSTN source  . . . . . . . . . . . . . . . . . .  5
   3.1.1.3 Recognized PSTN source . . . . . . . . . . . . . . . . . .  6
   3.1.2   Direct Request to Deposit, mailbox to be determined  . . .  6
   3.1.2.1 SIP source . . . . . . . . . . . . . . . . . . . . . . . .  6
   3.1.2.2 PSTN source  . . . . . . . . . . . . . . . . . . . . . . .  6
   3.1.2.3 Indirect Request to Deposit, due to find-me proxy decision  6
   3.2     Retrievals . . . . . . . . . . . . . . . . . . . . . . . .  7
   3.2.1   Request to Retrieve from a particular mailbox  . . . . . .  7
   3.2.1.1 Trusted SIP source . . . . . . . . . . . . . . . . . . . .  7
   3.2.1.2 Authenticated SIP source . . . . . . . . . . . . . . . . .  7
   3.2.1.3 Unauthenticated SIP source . . . . . . . . . . . . . . . .  7
   3.2.1.4 PSTN source  . . . . . . . . . . . . . . . . . . . . . . .  7
   3.2.2   Request to Retrieve, mailbox to be determined  . . . . . .  7
   3.2.2.1 SIP source . . . . . . . . . . . . . . . . . . . . . . . .  7
   3.2.2.2 Arbitrary PSTN source  . . . . . . . . . . . . . . . . . .  8
   3.2.2.3 Recognized PSTN source . . . . . . . . . . . . . . . . . .  8
   4.      Voice Mail Call Flow Examples  . . . . . . . . . . . . . .  8
   4.1     Generic Scenario . . . . . . . . . . . . . . . . . . . . .  8
   4.1.1   Direct call to the voice mail system . . . . . . . . . . .  8
   4.2     Message Deposit Scenarios  . . . . . . . . . . . . . . . . 13
   4.2.1   Call to known subscriber forwarded on no answer  . . . . . 13
   4.2.2   Call to known subscriber forwarded on busy . . . . . . . . 19
   4.2.3   Direct call to a subscriber's mailbox  . . . . . . . . . . 24
   4.3     Message Retrieval Scenarios  . . . . . . . . . . . . . . . 29
   4.3.1   Call to retrieve messages believed to be from a known
           subscriber . . . . . . . . . . . . . . . . . . . . . . . . 29
   4.3.2   Call to retrieve messages from an authenticated subscriber 33
   5.      Security Considerations  . . . . . . . . . . . . . . . . . 38
   6.      Acknowledgments  . . . . . . . . . . . . . . . . . . . . . 38
           References . . . . . . . . . . . . . . . . . . . . . . . . 38
           Authors' Addresses . . . . . . . . . . . . . . . . . . . . 38
           Full Copyright Statement . . . . . . . . . . . . . . . . . 39










Campbell & Sparks            Informational                      [Page 2]

RFC 3087                  SIP Service Control                 April 2001


1. Introduction

   A communication service should make use of the information it has at
   hand when being accessed.  For example, in most current voice mail
   implementations, a subscriber retrieving messages from his own desk
   does not have to reenter his voice mailbox number - the service
   assumes that the store being accessed is the one associated with the
   endpoint being used to access the service.  Some services allow the
   user to validate this assumption using IVR techniques before
   prompting for a PIN.

   This concept of context-awareness can be captured in a voice mail
   service implementing SIP as defined in RFC 2543[1], without
   modification, through the standard use of that protocol's Request-
   URI.  Furthermore, the concept is applicable to any SIP-based service
   where initial application state should be determined from context.

   This concept is a usage convention of standard SIP as defined in RFC
   2543[1] and does not modify or extend that protocol in any way.

2. Example Application

   In this document, we use the example of voice mail to illustrate the
   technique.  One motivation for applying this technique to this
   problem is allowing a proxy or location server to control the initial
   state of a voice service.  For example, a voice client might register
   a contact list ending with the URL that would accept voice messages
   for the client.

2.1 Using URIs to Control Voice Mail Service Behavior

   Many conventional voice mail systems use call state information, such
   as the calling party, called party, reason for forward, etc, to
   decide the initial application state.  For example, it might play one
   outgoing message if the call reached voice mail because the called
   party did not answer and another if the line was busy.  It decides
   whom the message is for based on the called party information.  If
   the call originated from a subscriber's phone number, it might
   authenticate the caller and then go directly to the message retrieval
   and account maintenance menu.

   When a new subscriber is added to a system, a set of identities could
   be generated, each given a unique sip URI.  The following tables show
   some of the identities that might be generated (it is not
   exhaustive).  The example schemes show that the URIs could, but don't
   necessarily have to, have mnemonic value.





Campbell & Sparks            Informational                      [Page 3]

RFC 3087                  SIP Service Control                 April 2001


   In practical applications, it is important that an application does
   not apply semantic rules to the various URIs.  Instead, it should
   allow any arbitrary string to be provisioned, and map the string to
   the desired behavior.  The owner of the system may choose to
   provision mnemonic strings, but the application should not require
   it.  In any large installation, the system owner is likely to have
   pre-existing rules for mnemonic URIs, and any attempt by an
   application to define its own rules may create a conflict.  For our
   example, this means a voice mail system should allow an arbitrary mix
   of URLs from these schemes, or any other scheme that renders valid
   SIP URIs to be provisioned, rather than enforce one particular
   scheme.

      URI Identity       Example Scheme 1
                              Example Scheme 2
                                   Example Scheme 3

      Deposit with       sip:sub-rjs-deposit@vm.wcom.com
      standard greeting       sip:677283@vm.wcom.com
                                   sip:rjs@vm.wcom.com;mode=deposit


      Deposit with on    sip:sub-rjs-deposit-busy.vm.wcom.com
      phone greeting          sip:677372@vm.wcom.com
                                   sip:rjs@vm.wcom.com;mode=3991243

      Deposit with       sip:sub-rjs-deposit-sg@vm.wcom.com
      special greeting        sip:677384@vm.wcom.com
                                   sip:rjs@vm.wcom.com;mode=sg

      Retrieve - SIP     sip:sub-rjs-retrieve@vm.wcom.com
      authentication          sip:677405@vm.wcom.com
                                   sip:rjs@vm.wcom.com;mode=retrieve

      Retrieve - prompt  sip:sub-rjs-retrieve-inpin.vm.wcom.com
      for PIN in-band         sip:677415@vm.wcom.com
                                   sip:rjs@vm.wcom.com;mode=inpin

   When a service is first set up, identities such as the following
   could be created.

      URI Identity       Example Scheme 1
                              Example Scheme 2
                                   Example Scheme 3

      Deposit -          sip:deposit@vm.wcom.com
      identify target         sip:670001@vm.wcom.com
      mailbox by To:               sip:deposit@vm.wcom.com



Campbell & Sparks            Informational                      [Page 4]

RFC 3087                  SIP Service Control                 April 2001


      Retrieve -         sip:retrieve@vm.wcom.com
      identify target         sip:670002@vm.wcom.com
      mailbox by SIP               sip:retrieve@vm.wcom.com
      authentication

      Deposit - prompt   sip:deposit-in@vm.wcom.com
      for target              sip:670003@vm.wcom.com
      mailbox in-band              sip:deposit@vm.wcom.com;mode=inband

      Retrieve - prompt  sip:retrieve-in@vm.wcom.com
      for target              sip:670004@vm.wcom.com
      mailbox and PIN              sip:retrieve@vm.wcom.com;mode=inband
      in-band

   In addition to providing this set of URIs to the subscriber (to use
   as he sees fit), an integrated service provider could add these to
   the set of contacts in a find-me proxy.  The proxy could then route
   calls to the appropriate URI based on the origin of the request, the
   subscriber's preferences and current state.

3. Voice Mail Scenario Descriptions

   In each of these scenarios, the PSTN gateway is configured to
   communicate only with a particular proxy-registrar.

3.1 Deposits

3.1.1 Direct Request to Deposit to a particular mailbox

3.1.1.1 SIP source

   A SIP client that knew the URI for a particular deposit mailbox
   (sip:sub-rjs-deposit@vm.wcom.com) could place a direct invitation to
   the voicemail service, or through a protecting proxy.  The proxy
   could restrict access to deposit identities with special greetings by
   authenticating the requester.

3.1.1.2 Arbitrary PSTN source

   The gateway's proxy would map a call from an unrecognized PSTN number
   to a number associated with a subscriber's mailbox into an invite to
   the deposit with standard greeting URI (sip:sub-rjs-
   deposit@vm.wcom.com).








Campbell & Sparks            Informational                      [Page 5]

RFC 3087                  SIP Service Control                 April 2001


3.1.1.3 Recognized PSTN source

   The gateway's proxy would map a call from a recognized (exact or
   pattern match) PSTN number to a number associated with a subscriber's
   mailbox into an invite to the appropriate special greeting URI
   (sip:sub-rjs-deposit-sg@vm.wcom.com).  The gateway's ability to
   identify the calling party (using calling party number) is trusted,
   so no further authentication of the requester is performed.

3.1.2 Direct Request to Deposit, mailbox to be determined

3.1.2.1 SIP source

   A voice mail service or its protecting proxy could expose a generic
   deposit URL for use when a caller wished to go directly to voice
   mail.  The service would likely play an IVR dialog to determine what
   message store to deposit a message into.

   An application designer may be tempted to attempt to match the To:
   and From: headers on a call to infer information.  However, this
   approach could cause complications when multiple proxy forwards occur
   in a call.  For example, A calls B, who has all calls forwarded to C.
   C forwards the call to her voice mail service.  If the voice mail
   service matches the To: header to determine the message store, it
   will get the information for B instead of C.  But there is no reason
   to assume that C's voice mail service has any knowledge of B.

3.1.2.2 PSTN source

   The gateway's proxy would map a call from an unrecognized PSTN number
   to the top level voice mail service access number to an invite to the
   Deposit - prompt for target mailbox in-band URI (sip:deposit-
   in@vm.wcom.com for example).  Getting the call to the target mailbox
   would proceed as in the SIP source case.

3.1.2.3 Indirect Request to Deposit, due to find-me proxy decision

   A find-me proxy could map an invitation to a subscriber
   (sip:rjs@wcom.com) to the appropriate voice mail service URI
   depending on the subscriber's current state.  The normal deposit URI

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -