ESN LLC v. Cisco Systems, Inc. et al
Filing
83
CLAIM CONSTRUCTION SUR-REPLY BRIEF filed by Cisco Systems, Inc., Cisco-Linksys LLC. (Attachments: # 1 Exhibit R, # 2 Exhibit S, # 3 Exhibit T, # 4 Exhibit U)(Smith, Kevin)
Exhibit T
6l. ^ !
IONS : "YES , V
SL 1 A INTERNET M" PAGE 88
The Se ss ion Initiat i on P r oto c ol ( SIP ):
A K e y Componen t for
Intern t Telephony
last month, we got our first look inside the Sip standard for signaling communications services on the Internet and emerging SIP products , This month, we've gone to principal sources for a more thorough primer,
was used fordistribution ofmultimedia content , including talks and seminars , 'bioad·. of space shuttle launches , and IM qs. one of its essential componei a mechanism for inviting users to listen
in on an ongoing or future multimedia ses sion on the Internet, Basically a session initiation protocoL Thus SIP was born.
IQ ince its approval In early iggg as an official standard, the Session Initiation Protocol (SIP) has gained tremendous market ac· ceptance for signaling communications
services on the Internet, What lies behind this success? What problems loom? How does SIP fit in with other solution components? We examine these and other issues in detail.
by Jonatit A. Rosen:
fdro=Vdynamiagft.com
HISTORY
SIP has its origins in late 1996 as a compo. nent ofthe " Mbone" set of utilities and protocols. The Mbone, or multicast backbone, was an experimental. multicast network overlayed on top of the public . Internet. It
and Richard
Shockey
r sh o ckcyV ix. n ekam. com
As an Mbone tool (and as a product of the IET"P), SIP was designed with certain umptions in mind.. First was scalahili· *.'Since users could reside anywhere on the Internet, the protocol needed to work wide-area from day one., Users could be invited to lots of sessions , so the protocol needed to scale in both directions. A seo. and assumption was component reuse: Rather than inventing new protocol tools, those already developed within the im would be used, That Included things like MIME, URLs;-and SDP (already used'for other protocols , such as SAP), This resulted In a protocol that ,integrated well with other IP applications (such as web and e-mail): Interoperability was another key goal although , not one spedi=lc to ..5 . Interoperability is at the heart of IETV's process and operation , as a forum attez'd-
124
/June 2000/
m
Internet Telecom: SIP
ed by implementers and operational experts who actually build and deploy the technologies they design. To these practi· cal-minded standardixers, the KISS (Keep It Simple Stupid) principle was the best way to help ensure correctness and inter. operability.
Despite its historical strengths, SIP saw relatively slow progress throughout x996 and 1997. That's about when Interest in Internet telephony began to take off. People began to see SIP as a technology that would also work for VoiP, not just Mbone sessions . The result was an intensified effort towards completing the specification in late 1998, and completion by the end of the year. It received official approval as an RFC (Request for Comments, the official term for an IEl"F standard) in February and issuance of an RFC number, 2543, in March. bility, and -- most important - flexibility appealed to service providers and vendors who had needs that a vertically integrated protocol , such as H.323, could not address. Among service providers MCI (particularly MCI's Henry Sinnrelch , regarded as the "Pope" of SIP) led the"evangelical change. Throughout x999 and into 2000, it saw adoption by most major vendors , and an. nouncements of networks by service providers . Interoperability bake-offs were held throughout x999 , attendance doubling at each successive event. Tremendous success was achieved in interoperability among vendors . Other standards bodies began to look at SIP as well , Including ITU and BTSI TIPHON, IMTC, Softswitch Consortium, and )AIN. Looking forward, aooo will be a year in which real SIP networks are deployed, SIP vendors step forward to announce real products, and applications and services begin to appear,
WHAT DOES IT DO?
As the name implies, the session initiation protocol (SIP) is about initiation of interactive communications sessions between users. SIP also handles termination and modifications of sessions as well. SIP actually doesn't define what a #session ' is; this is described by content carried in SIP messages. Most of SIP is about the initiation part, since this is reap ly the most difficult aspect, "Initiating a session" requires determining where the user to be contacted is actually residing at
From there, industry acceptance of SIP grew exponentially. Its scalability, extensi.
(A i6,iui(1(j u i " fi-,itiC p^ i(v, euaJ UeS1yil (_S vi 0 I dlly other 3ppkation (,Nwironr )ejits area ioukincj at they tnodularity, scafability, and trans-, T pa;ellcy of SIP for their ovin rases, strong case to point, cull renablinQ r:-cornrnerce Ives) pacJes with onto-click call options.
The use
of S P by
Ottlt'r
;;Sroti,.
afl-center, SIP is perfect for ttlis envir^;rr^,. t Since the SIP user agent is very lighrtd1
l"a Jri
r)I ,rl^_ f
! ,- ^1,it is very easy to inti , c j
C? n Ie' nph rH ry
51P
rfS to ^f('dt8
phony ^ l'Is ou tl ,^t,; I^I n:^^r^ nor
s i [he' to; u5 of tn^r Pa·i? tN,> ^f, .71d lnt^^rnei
n (t4 tE CC> Ihdt ' ^^Uld a'c' ci^nllc,(
^'.lother SI
1(ior,: Ir', t'(`er (:[ill 4V.. 1 i!Iri 1. A ('0
,1nena Call c ( rl Ic; J, Tl y'^Mr
thl, ilril' CVlldlilon , the Stirl','_l) (Daly" ^nlne,
fla ys the ca fi
,.,(,
^O `^!I CAI Id slgtlois you, ';hlll' yriu a; i2 aC
fh,li
0011 corning in
^ ,';J7te(j at your dWSH.^r I:-(Jlthef ^;)
! tit c;r·^ Cnll, +,' [i!jCC
the all, or (3) sprld the uill to voicerilrail, l his appliaMtion tits into the broadci conru,.r ^i>-ps,r J cross sienaJinq environments. its standaidization, based on SIP, is takf l.) l- ^_e lri the SPIRtT5 ( Service in tl)e PSTN/tN Invoking Internet Service) v/orking q )l,p ;n Ih"1 t 0l'i,_ .f tin; r ",),I tI,nll( ', J ru"J uboLt jsulq .>.t ion, T orl rus t
prt"`sonce, affil `I(.' , It t.ipr',s
il .!7 i,> as a protocol pl ,,tf^,ln lc,, h,1, 5 ^ngc "` Ab,ollit^nlly, The meChanc:rn by
J;1"J r@7Iv' ICS Lhe lj ,,GI 'l -ever I, (,, I; ti^CndrnE'rtafly
;r ^^.rrrrn_nu^atiurls state c'.
II I ,TH,I!iUI' al :Lill 8n0 dCll
l,ersvlU to e,lal I^ ,^>>sic;n ir^f(1 ui It tc) , ! nto .+E- " Is (l n tu( i
t: 1' U;E^d tUt ; OiCP
f11 exten sion 01 SIP, q caiso fnf:,&J5, tfl ;:t ']
iri stant
fness,191WJ -
, vIll Y
tIa1lJvdifilo Yv i, o
icular moment. A user might have a PC at work, a PC at home, and an IP desk phone in the lab. A call for that user might need to ring all phones at once. Furthermore, the user might be mobile, one day at work, and the next day visiting a university. This dynamic locationinformation needs to be "taken into account in order to find the user. Once the user to be called has been located , S I P can perform its second main function ---'delivering a descriptions of the session that the user is being invited to. As mentioned, SIP itself does not know about the details of the session . What SIP does do is convey information about the protocol used to describe the session. SIP does this through tike use of multipurpose Internet mail extension$ (MIME), widely used in web and e-mail services to describe content (HT"ML , audio , video, etc,). The most common protocol used to describe sessions is the session descrip tion protocol ( SUP), described in RFC23a7. SIP can also be used to negotiate a commons format for describing sesor sions; so that other things besides SDP can be used. Once the user has been located and the session description delivered, SIP is used to convey the response to the session initiation (accept, reject , etc.). If accepted, the sessions is now active. SIP ' modify the session as well. Doing so is easy ' - the'originator simply re-initiates the session , sending the same message as the original, but with a new session description. For this reason, modification of sessions (which includes
Corrsputa T'ekphwsy,wm/1= e,zooo/12 5
nternet Telecom: SIP
where Jo is currently sitting. How does it know which PC Joe is at? SIP defines another request, called REGISTER, which is used to inform a proxy of an address binding. In this case, when Joe turned on his SIP client on his PC, the client would register the binding sip:joef)sales.engineering.com to sip:joe(Mmypc. sales .foo.com. This would allow the proxy to know that Joe is actually at mypc, a specific host on the network. The bindings registered through SIP are periodically refreshed, so that if the PC crashes, the binding is eventually removed. The sales.foo.com proxy consults this registration database, and forwards the INVITE to joeQ)mypc.sales .foo.com (Step 8). This INVITE then reaches Joe at his PC. Joe can then respond to it (thus the request-response model). SIP provides many responses, and these include acceptance, rejection, redirection, busy, and so on. The response is forwarded back through the proxies to the original caller (Steps 9,10,11,12). An acknowledgement is sent (another type of request, called ACK) in Step r3, and the session is established. Media can then flow (Step 14). SIP is patterned after HTTP in many ways. HTTP is also request-response. SIP borrows much of the syntax and semantics from HTTP. The textual message formatting, usage ofheaders, MIME support, and many headers are identical. An http expert looking at a SIP message would have difficulty distinguishing them.
Figure 1 : Session initiation in SIP, things like adding and removing audio streams, adding video, changing codecs, hold and mute) are easily supported with SIP, so long as the session description protocol can support them (SDP supports all of the above). Finally, SIP can be used to terminate the session (i.e., hang up). tiple locations , in the hopes of finding the desired user at one of them. A close anal. ogy is the home phone line service, where all phones in the home ring at once. Consider the scenario'in Figure r. In our example, the caller (jdrosen@dynamicsoft.com) wishes to place a call to joe@columbia.edu. Jdrosen sends his SIP INVITE message to the proxy for dynamicsoft.com (Step 1). This proxy then forwards the request out to Columbia, where it reaches the Columbia.edu server (Step 2). This server is actually not a proxy, but a similar device called a redirect server. Instead of forwarding calls, a redirect server asks the requester to contact the next server directly. The Colurnbia.edu server looks up Joe in its database, and determines that today, Joe is on sabbatical to foo.com. It therefore sends a special response, called a redirect, to the dynamicsoft.com proxy, instructing it to instead try joe@foo.com (Step 3). The dynamicsoft proxy then acts on this response , which means it directly tries to contact joe@foo.com. So, its sends the INVITE to the foo.com server (step 4). This server consults its database (Step, g), and learns (Step 6) that Joe is actually in sales. So, it constructs a new URL, joe@ sales. foo.com, and sends the INVITE to the sales .foo.com proxy (Step 7). The proxy for the sales department then needs to forward the INVITE to the PC
HOW DOES IT WORK?
SIP is based on the request-response paradigm. To initiate a session , the caller (known as the User Agent Client, or UAC ) sends a request (called an INVITE), addressed to the person the caller wants to talk to. In SIP, addresses are URLs. SIP defines a URL format that is very similar to the popular mailto URL. If the user's email address is jdrosenC)dynamicsoft.com, their SIP URL would be sip:jdrosen@dynamicsoft.com. This message is not sent directly to the called party, but rather to an entity known as a prt server . The proxy server is responsible routing and delivering messages to the called party. The called party then sends a response , accepting or rejecting the invita. tion, which is forwarded back through the same set of proxies, in reverse order. A proxy can receive a single INVITE request , and send out more than one INVITE request to different addresses. This feature, aptly called "forking," allows a session initiation attempt to reach mul-
MAIN ADVANTAGES
Services: Internet telephony began on the premise that it was cheaper than nor. mal phone calling. Users were willing to tolerate degraded quality or reduced function for lower cost. However, the cost differentials are rapidly disappearing. To continue to exist, Internet telephony must find another reason to be. The answer is services. Some of the most exciting applications have already found killer status on the Internet, though not (yet) in the form of multimedia services. Now think of integrating multimedia communications, such as
126/June zooo/ComputerTelephony.com
Internet Telecom: SIP
0;
vto- fir cwlr,a I''tol BCt1"^L,JCt to
iar ice. 01)o I^, ti ?3, wlrkh has hz.iSicully
uo, r, iwshrrJ by big irl,ryers in Qv tclrn"k
`,1[,.0 Mat
ovuryl)ody t.,:ln comilluni-
th . r " "2 of Ike s,k-v icn 111,0,l iun ;:ratoi (SIP) for IP teleptiony signaling, and, we *ith t ood t etason. The innovation that
Wf.; vc, ialreody seen urr)c?rqe horn SIP initia, t7vo , 15 ord''y,) taste tat what 1Ve believe to 1,e
r otc Kh everybody else in an illy xpendve and effective way, E e-_utives sometimes ask rile, 'Why all this talk about protocol,,, why should i be interested in protocols?' I have to explain that soon, the core of our business will be bosed on these protocols."
r indmtry who weriit to enter the'cur nmunicabons business. My persona opinion is that H.323 has oftrfctiveaiy already faded in the US, wd N now M arcing to QH ovep sea % nwinfy because it a based on an I` DN rarchiteoure. I fie second cramp is SIP, which is thQ prate Internet play. The thi> 1, wtilcfrlrcorasider to be ttW most d,ancJemus and potentirilly negrative, is thoso
the Prc>tt) oTs IndlentAl. Ne"AhVWY4 whit owes the runt sense todmittl(agii:atiy is not
fafi4`tays what wros it trio R1^1I K( t,j)Jra _C'. We
wwo tti lorc^ pleasantly .u,rpfised to dis u
t^,+,, r, ^'trrf " ', ri iri ca rriers to beat,, Coin
THE NEW SERVICE PARADIGM
Mike MCI, Stalup carrier Level 3 entyred
^
nl!ttod a^) t1
err C.oinFau,rratty to thV cie
yr f, 1,^:^nt _3: o adoption of SIP. MC: WoriclCorn, tinder, t1w direction of fienry Sinn)oich, Distinquished Melnbe r at iginoof iS now carrying out uric, of tue rilost sopnir hceated rrnpir>mr:n a ions of SIP to data MCf has ,akeady clexkWed its own SIt'rc'dkoctQroxy/locMion serwws, and is wear koig with other vendors in areas like soltswitchas and IP tvlc:phones. iri '`.fPt)i
in the teleamn industry who area trying to p roserv e circuit-sw t(ted control and signaling sysWrns, rrsirtg Me Interrret as just a cheaper win, The W agent in the case of FMGCP or MITGACQ for example, is essen orally Mere to pineserve the signI and control architecture of SS7 and the intelligent NOwork: The software, of course, is ad proprietary, so that Me ven, dor who hup;=smunts the caU. xager is and
t ,:
Ccn'
he rnarketur^ ncun, '.iered by tan e.vrrtii)y sir
-,ulit-switcho,J ailr.,structure. L(?v4Ci ^ als'u noes not provide services directly tea end users, but offers its network infrastructure to rather service providers, Almost from day tine; the carrier was cpmrnittec to SIP. Matt Johnson, product marketing manager for Level 3`s Dynamic Bandwidth Applications
candSoftswitch-Enabled Services Group, Buys
Mat by pushing more fl&UNe nce out to the rn:t.^ork t n:ip^:)int , `!P can' generally irn lA fy lho systemsrrrtiujrcd in the rirh.oi't.." _cvel 3 also t,3heS a very strater^iC Pcisition ors thr olts^llch's rule in net,vol a in-
.-hc5 in th,? car rioi 1-s nl two! K
aver that C,)rricr; iCE"
HW q tire:: vices can now be appNed to ti 'I1 SW V tecNiVal elug ance More'' wadd tsar s win c,lrr ier adoption , of courso "Thrr idea is srrot,kY s9 stoney in new netwof t; infrastructure offly it it can
fus h n surrounds the relration of protocols We the Modh Gateway ; Control Pwtocol (MGM and ME"GACJ ( its likely ;anew sor) to SIP, as they we e:ornplemeMary in cortaira ways and muWaIN exclusPve A oMers. Si mIr?l h exNairim howenk "M(iC
Con
TURF PROTECTION
irwhocture . According to idu rsn, "The s'oftswitchshould behave: basically as a web server behEavos, providing a kind .of , '.dumb intelligence."' In Love[ S's network, softswitches are ptattorrns that provide
tr'Ag new revenue;. And new invenue copws Rom servive; that donl 6it today.
On the web, we've air e ady se L ra an explo .
d hAEGAC0 rare great proWmis for internal :,^ cantr^..!Iir,gan WteloolonyOah-vv,iyISO In on 1my,ar? and nS `Vr,hIAP1um, a!
open interfaces to services, but do not thearnselves contain the service intellirtce. SIP, because it facilitates point-towriecti,, ns is crucial to this rnodwi Yet L rT^cl 3 cl , SY tlotjust as a $ qT 1,aliri5, pr utucul, but t;s an arobtingtechnclogy nor a fun^larw^nlra it used to be at the transport lever.,' While some try to avoid aking such strong positions on VUIP protocols by claiming "protpCOiag^osticisrrr^" Sinni-eich sees ads notion as untenable. "'r he Internet id the wears am nothf, ig but
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?