期刊文献+

基于SIP协议的监视系统设计与实现 被引量:4

Design and Implementation of Monitoring System Based on SIP
在线阅读 下载PDF
导出
摘要 针对监视系统部署难以灵活扩展、实现成本高的问题,提出一种基于会话启动协议(SIP)的监视系统设计与实现方法。设计基于SIP协议的支持视频会议、视频监控和VoIP等多媒体业务的开放式通信系统,实现网络视音频连接、视音频采集编解码、回声抵消、回放和紧急呼叫等功能。结果证明该系统能够方便地与其他互联网协议结合并在各种网络环境下部署,提供较为丰富的IP多媒体业务。 Aiming at the problem of low expansibility and high cost in the deployment of the monitoring sys:em, this paper proposes a kind of method about the design and implementation of monitoring system based on Session Initiation Protocol(SIP), designs an open communication system which supports the multimedia services such as the video conference, the video monitoring and the VolP based on SIP, and achieves the function such as the network establishment, the collection, coding and decoding of the video and audio, the cancellation and payback of the echo, emergency calls and so on. The result proves that the system can be deployed conveniently with other Internet protocols in all kinds of network environment, and supplies IP multimedia service abundantly.
出处 《计算机工程》 CAS CSCD 2013年第11期289-294,共6页 Computer Engineering
关键词 会话启动协议 实时传输协议 用户代理 监视会议 监视系统 Session Initiation Protocol(SIP) Real-time Transport Protocol(RTP) User Agent(UA) monitoring conference monitoringsystem
  • 相关文献

参考文献10

二级参考文献34

共引文献31

同被引文献32

  • 1匡明.基于SIP协议的网络视频监控系统分析[J].中国公共安全,2013(7):153-155. 被引量:3
  • 2俞志春,方滨兴,张兆心.SIP协议的安全性研究[J].计算机应用,2006,26(9):2124-2126. 被引量:21
  • 3Schulzrinne H,Rao A,Lanphier R.Real Time Streaming Protocol[S].RFC 2326,1998.
  • 4Schulzrinne H,Casncr S,Frederick R,et al.RTP:Atransport Protocol for Real-time Applications[S].RFC 3550,2003.
  • 5Wikipedia.Internet[EB/OL].[2014-03-16].http://en.wikipedia.org/wiki/Internet.
  • 6Apple.i OS Developer Library[EB/OL].[2014-03-16].https://developer.apple.com/library/ios/navigation/index.html.
  • 7张全保,吴晓飞,赵伟.基于SIP协议的可视指挥调度系统在公安指挥中心的设计及应用[J].警察技术,2008(1):32-34. 被引量:4
  • 8Wu Liufei,Zhang Yuqing,Wang Fengjiao. A new provably se- cure authentication and key agreement protocol for SIP using ECC [ J ]. Computer Standards & Interfaces,2009,31 ( 2 ) : 286 -291.
  • 9Endler D ,Collier M. Hacking ExposedTM VOIP:voice over IP security secrets and solutions [ M ]. [ s. 1. ] : Osborne/McGraw - Hill, 2007.
  • 10Rivest R L,Shamir A,Tauman Y. How to leak a secret[ C]// Proc of ASIACRYPT. Berlin: Springer - Verlag, 2001 : 552 - 565.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部