Quantcast
Channel: ITSP – The Smartvox Knowledgebase
Browsing all 12 articles
Browse latest View live

OpenSIPS vs Asterisk

OpenSIPS and Asterisk are both open source projects and both are used for Voice over IP. However, they perform quite different roles, have different capabilities and different strengths and weaknesses....

View Article



Image may be NSFW.
Clik here to view.

SIP User Credentials in the ITSP environment – part 1

This three-part article reviews the SIP entities that identify a user, a handset or service and looks at how they are used to register devices, authenticate and identify users and route calls. The...

View Article

Image may be NSFW.
Clik here to view.

SIP User Credentials in the ITSP environment – part 2

In part 1 of this article we reviewed the basic entities and concepts used to identify a user, a handset or service. It discussed in detail how these entities are used to register devices, either...

View Article

Image may be NSFW.
Clik here to view.

SIP User Credentials in the ITSP environment – part 3

In this, the third part of the article, we will look at how the ITSP Proxy server handles outbound calls, paying particular attention to the authentication requirements and to the handling of Caller...

View Article

OpenSIPS vs Asterisk

OpenSIPS and Asterisk are both open source projects and both are used for Voice over IP. However, they perform quite different roles, have different capabilities and different strengths and weaknesses....

View Article


Image may be NSFW.
Clik here to view.

SIP User Credentials in the ITSP environment – part 1

This three-part article reviews the SIP entities that identify a user, a handset or service and looks at how they are used to register devices, authenticate and identify users and route calls. The...

View Article

Image may be NSFW.
Clik here to view.

SIP User Credentials in the ITSP environment – part 2

In part 1 of this article we reviewed the basic entities and concepts used to identify a user, a handset or service. It discussed in detail how these entities are used to register devices, either...

View Article

Image may be NSFW.
Clik here to view.

SIP User Credentials in the ITSP environment – part 3

In this, the third part of the article, we will look at how the ITSP Proxy server handles outbound calls, paying particular attention to the authentication requirements and to the handling of Caller...

View Article


OpenSIPS vs Asterisk

OpenSIPS and Asterisk are both open source projects and both are used for Voice over IP. However, they perform quite different roles, have different capabilities and different strengths and weaknesses....

View Article


Image may be NSFW.
Clik here to view.

SIP User Credentials in the ITSP environment – part 1

This three-part article reviews the SIP entities that identify a user, a handset or service and looks at how they are used to register devices, authenticate and identify users and route calls. The...

View Article

Image may be NSFW.
Clik here to view.

SIP User Credentials in the ITSP environment – part 2

In part 1 of this article we reviewed the basic entities and concepts used to identify a user, a handset or service. It discussed in detail how these entities are used to register devices, either...

View Article

Image may be NSFW.
Clik here to view.

SIP User Credentials in the ITSP environment – part 3

In this, the third part of the article, we will look at how the ITSP Proxy server handles outbound calls, paying particular attention to the authentication requirements and to the handling of Caller...

View Article
Browsing all 12 articles
Browse latest View live




Latest Images