CN114938414A - Telephone traffic proxy method, system, equipment and storage medium for isolating soft switch end - Google Patents

Telephone traffic proxy method, system, equipment and storage medium for isolating soft switch end Download PDF

Info

Publication number
CN114938414A
CN114938414A CN202210518866.6A CN202210518866A CN114938414A CN 114938414 A CN114938414 A CN 114938414A CN 202210518866 A CN202210518866 A CN 202210518866A CN 114938414 A CN114938414 A CN 114938414A
Authority
CN
China
Prior art keywords
address
network
intranet
signaling
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210518866.6A
Other languages
Chinese (zh)
Inventor
袁晓东
熊忠国
王长春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Huake Information Technology Co ltd
Original Assignee
Shanghai Huake Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Huake Information Technology Co ltd filed Critical Shanghai Huake Information Technology Co ltd
Priority to CN202210518866.6A priority Critical patent/CN114938414A/en
Publication of CN114938414A publication Critical patent/CN114938414A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/12Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal
    • H04M7/1205Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal where the types of switching equipement comprises PSTN/ISDN equipment and switching equipment of networks other than PSTN/ISDN, e.g. Internet Protocol networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/0024Services and arrangements where telephone services are combined with data services

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a telephone traffic proxy method, a system, a device and a storage medium for isolating a soft switch end, wherein the method comprises the following steps: registering an intranet IP address of at least one piece of fixed equipment in an intranet where a soft switch end is located, and registering a public network IP address in a public network where a signaling transmission server of the soft switch end is located; configuring a signaling transmission server to transmit a signaling stream between a soft switch end and a public network, and configuring a media stream transmission server to transmit a media stream between the soft switch end and the public network; and receiving the traffic data, and changing the network address and the port of the traffic data into the preset network address and transmission port by the signaling transmission server and/or the media stream transmission server according to the target address of the traffic data and transmitting the preset network address and transmission port to the target address. The invention can hide the telephone core in the internal local area network for protection, so that the telephone center can physically isolate the entrance of the public network, protect the telephone core to the greatest extent, and greatly improve the safety, stability and robustness of the system.

Description

Telephone traffic proxy method, system, equipment and storage medium for isolating soft switch end
Technical Field
The present invention relates to the field of hotel management, and in particular, to a method, a system, a device and a storage medium for isolating a telephone traffic agent at a soft switch end.
Background
With the development of the hotel industry, more and more hotels develop in a group evolution manner, and meanwhile, the integration of service capacity is also a necessary trend. The currently commonly used telephone core FreeSWITCH (soft switch solution for telephone) is a core service that processes VOIP (Voice over IP, abbreviated VOIP) Voice communication signaling and media, and provides SIP (Session initiation Protocol) based B2B (abbreviated to Business-to-Business) Voice call. Due to the openness of the SIP protocol and the powerful NAT function of the FreeSWITCH, the FreeSWITCH can be deployed alone in a public network to provide VOIP telephony services, but at the same time, SIP attacks or malignant virus intrusion from the internet can be caused, which causes serious problems such as telephone core paralysis.
The nat (network Address translation) refers to network Address translation. The NAT method can be used when some hosts inside a private network have been assigned a local IP address (i.e., a private address used only within the private network) but want to communicate with hosts on the internet (without encryption). This method requires NAT software to be installed on a router connected to the internet (public IP) on a private network (private IP). A router with NAT software, called a NAT router, has at least one valid external global IP address (public IP address). Thus, all hosts using local addresses (private IP addresses) must convert their local addresses to global IP addresses on the NAT router to connect to the internet when communicating with the outside world. In addition, this way of representing more private IP addresses by using a small number of global IP addresses (public network IP addresses) will help slow down the exhaustion of the available IP address space. There is a description of NAT in RFC 2663.
For example: the hotel lobby telephone traffic is the busiest, most important. Figure 1 is a prior art soft switch architecture model. As shown in fig. 1, the hotel lobby Phone-a31 is registered with the ip of the public network 1 where the software exchange FreeSWITCH29 is located, FreeSWITCH-a representing the conventional technology, FreeSWITCH-a being exposed on the forefront line of the public network. In general, methods for protecting the phone core from being attacked are implemented by using a firewall or installing antivirus software, but these methods are common network security protection methods, the phone core service itself is still exposed in front of the public network, and hackers suffering from severe attacks are still easily breached.
Therefore, the invention provides a method, a system, equipment and a storage medium for isolating a telephone traffic proxy of a soft switch end.
Disclosure of Invention
Aiming at the problems in the prior art, the invention aims to provide a telephone traffic proxy method, a system, equipment and a storage medium for isolating a soft switch end, overcomes the difficulty in the prior art, and can ensure that a telephone center isolates a public network entrance from the physics by hiding a telephone core in an internal local area network for protection, thereby protecting the telephone core to the maximum extent and greatly increasing the safety, stability and robustness of the system.
The embodiment of the invention provides a telephone traffic proxy method for isolating a soft switch end, which comprises the following steps:
registering an intranet IP address of at least one piece of fixed equipment in an intranet where a soft switch end is located, and registering a public network IP address in a public network where a signaling transmission server of the soft switch end is located;
configuring the signaling transmission server to transmit a signaling stream between the soft switch end and a public network, and configuring a media stream transmission server to transmit a media stream between the soft switch end and the public network;
receiving traffic data, and changing a network address and a port of the traffic data into a preset network address and a preset transmission port by the signaling transmission server and/or the media stream transmission server according to a target address of the traffic data;
and sending the traffic data to a target address based on the changed network address and the transmission port.
Preferably, the configuring the signaling transmission server to transmit the signaling stream between the soft switch and the public network, and configuring the media stream transmission server to transmit the media stream between the soft switch and the public network further include:
the signaling transmission server comprises a first external network card with a first public network IP address, a first internal network card with a first internal network IP address and a plurality of first internal ports;
the media stream transmission server comprises a second external network card with a second public network IP address, a second internal network card with a second internal network IP address and a plurality of second internal ports.
Preferably, the receiving the traffic data, and the signaling transmission server and/or the media streaming transmission server changing the network address and the port of the traffic data to a preset network address and a preset transmission port according to the destination address of the traffic data includes:
receiving signaling data, and when the target address of the signaling data is the public network IP address, converting the network address and the port of the signaling data into the public network IP address of the first external network card and then sending the public network IP address by the signaling transmission server;
and receiving signaling data, and when the target address of the signaling data is the intranet IP address, converting the network address and the port of the signaling data into the first intranet IP address of the first intranet card and then sending the first intranet IP address to the signaling transmission server.
Preferably, the receiving the traffic data, and the signaling transmission server and/or the media streaming transmission server changing the network address and the port of the traffic data to a preset network address and a preset transmission port according to the destination address of the traffic data includes:
receiving media stream data, and when the destination address of the media stream data is the public network IP address, converting the network address and the port of the media stream data into the public network IP address of the second external network card and then sending the public network IP address by the media stream transmission server;
and receiving media stream data, converting the network address and the port of the media stream data into a second intranet IP address of the second intranet card by the media stream transmission server when the target address of the media stream data is the intranet IP address, and selecting an idle second internal port to send the idle second internal port to the intranet IP address.
Preferably, the receiving the traffic data, and the signaling transmission server and/or the media streaming transmission server changing the network address and the port of the traffic data to a preset network address and a preset transmission port according to the destination address of the traffic data includes:
the received telephone traffic data comprises signaling data and media stream data, when the target addresses of the signaling data and the media stream data are the public network IP address, the signaling transmission server converts the network address and the port of the signaling data into the public network IP address of the first external network card and then sends the public network IP address, the signaling transmission server drives the media stream transmission server based on the signaling data to convert the network address and the port of the media stream data into the public network IP address of the second external network card and then sends the public network IP address, and the public network IP address of the first external network card is the same as the public network IP address of the first external network card;
the received traffic data comprises signaling data and media stream data, when the target addresses of the signaling data and the media stream data are the intranet IP addresses, the signaling transmission server converts the network address and the port of the signaling data into a first intranet IP address of the first intranet card and then sends the first intranet IP address to the intranet IP address, the signaling transmission server drives the media stream transmission server based on the signaling data to convert the network address and the port of the media stream data into a second intranet IP address of the second intranet card and then send the second intranet IP address to the intranet IP address, and the first intranet IP address of the first intranet card is the same as the second intranet IP address of the second intranet card.
Preferably, the registering an intranet IP address of the at least one mobile device in an intranet where the soft switch end is located, and registering a public network IP address in a public network where a signaling transmission server of the soft switch end is located, further includes:
a plurality of base-station equipment registers the same intranet IP address in an intranet where a soft switch end is located, and establishes a mapping relation between the intranet IP address and the plurality of base-station equipment;
after the receiving the traffic data, the signaling transmission server and/or the media stream transmission server changes the network address and the port of the traffic data to the preset network address and transmission port according to the target address of the traffic data, and before the traffic data is sent to the target address based on the changed network address and transmission port, the method further includes:
detecting the working state of the fixed telephone equipment with the mapping relation with the target address, and taking the currently idle fixed telephone equipment as target equipment;
the media stream transmission server comprises a second external network card with a second public network IP address, a second internal network card with a second internal network IP address and a plurality of second internal ports, and the media stream transmission server comprises:
and sending the traffic data to the target equipment with the current target address based on the changed network address and the transmission port.
Preferably, the method includes that at least one base unit device registers an intranet IP address in an intranet where a soft switch end is located, and registers a public network IP address in a public network where a signaling transmission server of the soft switch end is located, and the method further includes that a plurality of base unit devices are respectively connected to a plurality of soft switch ends;
further comprising: when one of the soft switch ends is upgraded, the soft switch end interrupts the connection with the signaling transmission server and the media stream transmission server, and the self-internal network is offline; and after the soft switch end is upgraded, the soft switch end is on line from the intranet and reconnects with the signaling transmission server and the media stream transmission server.
The embodiment of the present invention further provides a telephone traffic agent system of an isolation soft switch end, which is used for implementing the telephone traffic agent method of the isolation soft switch end, and the telephone traffic agent system of the isolation soft switch end includes:
the device registration module registers an intranet IP address of at least one piece of mobile phone equipment in an intranet where the soft switch end is located, and registers a public network IP address in a public network where a signaling transmission server of the soft switch end is located;
the information configuration module is used for configuring the signaling transmission server to transmit the signaling stream between the soft switch end and the public network and configuring the media stream transmission server to transmit the media stream between the soft switch end and the public network;
the traffic data module receives traffic data, and the signaling transmission server and/or the media stream transmission server change the network address and the port of the traffic data into preset network addresses and transmission ports according to the target address of the traffic data;
and the data sending module is used for sending the telephone traffic data to a target address based on the changed network address and the transmission port.
The embodiment of the invention also provides a telephone traffic proxy device of the isolation soft switch end, which comprises:
a processor;
a memory having stored therein executable instructions of the processor;
wherein the processor is configured to perform the steps of the above-described traffic proxy method of the isolated softswitch via execution of the executable instructions.
Embodiments of the present invention also provide a computer-readable storage medium for storing a program, which when executed, implements the steps of the above-mentioned traffic proxy method for isolating a soft switch.
The invention aims to provide a telephone traffic agent method, a system, equipment and a storage medium for isolating a soft switch end, which can ensure that a telephone center isolates a public network entrance from the physics by hiding a telephone core in an internal local area network for protection, protect the telephone core to the maximum extent and greatly increase the safety, stability and robustness of the system.
Drawings
Other features, objects and advantages of the present invention will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, with reference to the accompanying drawings.
Figure 1 is a prior art soft switch architecture model.
Fig. 2 is a flow chart of the traffic proxy method of the isolated softswitch of the present invention.
Fig. 3 is a soft switch fabric model of the traffic proxy method of the isolated soft switch end of the present invention.
Fig. 4 is a schematic diagram of the traffic proxy method implementation process of the isolation softswitch end of the present invention.
Fig. 5 is a block diagram of the traffic proxy system of the isolated softswitch of the present invention.
Fig. 6 is a schematic structural diagram of a traffic proxy device at an isolated softswitch end of the present invention.
Fig. 7 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
The following embodiments of the present application are described by specific examples, and other advantages and effects of the present application will be readily apparent to those skilled in the art from the disclosure herein. The present application is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present application. It should be noted that, in the present application, the embodiments and features of the embodiments may be combined with each other without conflict.
Embodiments of the present application will be described in detail below with reference to the accompanying drawings so that those skilled in the art to which the present application pertains can easily carry out the present application. The present application may be embodied in many different forms and is not limited to the embodiments described herein.
Reference throughout this specification to "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," or the like, means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. Furthermore, the particular features, structures, materials, or characteristics shown may be combined in any suitable manner in any one or more embodiments or examples. Moreover, the various embodiments or examples and features of the various embodiments or examples presented herein can be combined and combined by those skilled in the art without being mutually inconsistent.
Furthermore, the terms "first", "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one of the feature. In the expressions of the present application, "plurality" means two or more unless specifically defined otherwise.
In order to clearly explain the present application, components that are not related to the description are omitted, and the same reference numerals are given to the same or similar components throughout the specification.
Throughout the specification, when a device is referred to as being "connected" to another device, this includes not only the case of being "directly connected" but also the case of being "indirectly connected" with another element interposed therebetween. In addition, when a device "includes" a certain component, unless otherwise stated, the device does not exclude other components, but may include other components.
When a device is said to be "on" another device, this may be directly on the other device, but may also be accompanied by other devices in between. When a device is said to be "directly on" another device, there are no other devices in between.
Although the terms first, second, etc. may be used herein to describe various elements in some instances, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, the first interface and the second interface are represented. Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, items, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used herein, the singular forms "a", "an" and "the" include plural forms as long as the words do not expressly indicate a contrary meaning. The term "comprises/comprising" when used in this specification is taken to specify the presence of stated features, regions, integers, steps, operations, elements, and/or components, but does not exclude the presence or addition of other features, regions, integers, steps, operations, elements, and/or components.
Although not defined differently, including technical and scientific terms used herein, all terms have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. Terms defined in commonly used dictionaries are to be additionally interpreted as having meanings consistent with those of related art documents and the contents of the present prompts, and must not be excessively interpreted as having ideal or very formulaic meanings unless defined.
Fig. 2 is a flow chart of the traffic proxy method of the isolated softswitch of the present invention. As shown in fig. 2, an embodiment of the present invention provides a traffic proxy method for isolating a soft switch, including the following steps:
s110, registering an intranet IP address of at least one piece of fixed equipment in an intranet where a soft switch end is located, and registering a public network IP address in a public network where a signaling transmission server of the soft switch end is located.
S120, configuring a signaling transmission server to transmit a signaling stream between the soft switch end and the public network, and configuring a media stream transmission server to transmit a media stream between the soft switch end and the public network.
S130, receiving the traffic data, and changing the network address and the port of the traffic data into a preset network address and a preset transmission port by the signaling transmission server and/or the media stream transmission server according to the target address of the traffic data.
And S150, transmitting the traffic data to a target address based on the changed network address and the transmission port.
In a preferred embodiment, step S120 further includes:
the signaling transmission server comprises a first external network card with a first public network IP address, a first internal network card with a first internal network IP address and a plurality of first internal ports.
The media stream transmission server comprises a second external network card with a second public network IP address, a second internal network card with a second internal network IP address and a plurality of second internal ports.
In a preferred embodiment, step S130 includes:
s131, receiving the signaling data, and when the destination address of the signaling data is the public network IP address, the signaling transmission server converts the network address and the port of the signaling data into the public network IP address of the first external network card and then sends the public network IP address.
S132, receiving the signaling data, and when the target address of the signaling data is an intranet IP address, converting the network address and the port of the signaling data into a first intranet IP address of a first intranet card and then sending the first intranet IP address to the signaling transmission server.
In a preferred embodiment, step S130 further includes:
s133, receiving the media stream data, and when the destination address of the media stream data is the public network IP address, the media stream transmission server converts the network address and the port of the media stream data into the public network IP address of the second external network card and then sends the public network IP address.
S134, receiving the media stream data, when the destination address of the media stream data is an intranet IP address, the media stream transmission server converts the network address and the port of the media stream data into a second intranet IP address of a second intranet card, and selects an idle second internal port to send the second intranet IP address.
In a preferred embodiment, step S130 further includes:
and S135, the received telephone traffic data comprises signaling data and media stream data, when the target addresses of the signaling data and the media stream data are public network IP addresses, the signaling transmission server converts the network address and the port of the signaling data into the public network IP address of the first external network card and then sends the public network IP address, the signaling transmission server drives the media stream transmission server based on the signaling data to convert the network address and the port of the media stream data into the public network IP address of the second external network card and then send the public network IP address, and the public network IP address of the first external network card is the same as the public network IP address of the first external network card.
S136, the received telephone traffic data comprises signaling data and media stream data, when the target addresses of the signaling data and the media stream data are intranet IP addresses, the signaling transmission server converts the network address and the port of the signaling data into a first intranet IP address of a first intranet card and then sends the first intranet IP address to the intranet IP address, the signaling transmission server drives the media stream transmission server based on the signaling data to convert the network address and the port of the media stream data into a second intranet IP address of a second intranet card and then sends the second intranet IP address to the intranet IP address, and the first intranet IP address of the first intranet card is the same as the second intranet IP address of the second intranet card.
In a preferred embodiment, in S110, the method further includes that a plurality of landline devices register the same intranet IP address in the intranet where the soft switch is located, and establish a mapping relationship between the intranet IP address and the plurality of landline devices.
After step S130, step S150 further includes:
step S140, detecting the operating state of the fixed-line device having the mapping relationship with the target address, and using the currently idle fixed-line device as the target device.
Step S150, including: and transmitting the traffic data to the target equipment with the current target address based on the changed network address and the transmission port.
In a preferred embodiment, in S110, a plurality of base units are further included, and are respectively connected to a plurality of soft switch ends.
Further comprising: when one of the soft switch terminals is upgraded, the soft switch terminal interrupts the connection with the signaling transmission server and the media stream transmission server, and the intranet goes offline. After the soft switch end finishes upgrading, the soft switch end is on line from the intranet and reconnects with the signaling transmission server and the media stream transmission server.
Fig. 3 is a soft switch fabric model of the traffic proxy method of the isolated soft switch end of the present invention. As shown in fig. 3, the embodiment of the present invention is as follows:
the hotel Phone-B31 registers to the ip of the public network 1 where the signaling transport server 21 (opensis) and the media stream transport server 24(Rtpengine) of the FreeSWITCH20 are located, and at the same time, the corresponding Rtpengine of each call is configured in the opensis configuration code. Compared with a telephone core FreeS WITCH-A, FreeS WITCH-B is better protected, and if the public network ip is the first threshold of external intrusion, the FreeS WITCH-B provides services to the outside through a proxy (Opensps + Rtpregine signaling + media) method through physical isolation protection, so that the condition that the FreeS WITCH-B is directly exposed on the public network is avoided, and the method is obviously safer and is also based on a traditional innovative design method. The invention designs a method for acting SIP signaling and media, which exposes Opensips process for SIP registration and forwarding and Rtprigine process for RTP media forwarding on the forefront line of a public network by deploying Opensips and Rtprigine, and hides a telephone core Freeswitch in an internal local area network for protection, so that a telephone center physically isolates an entrance of the public network, protects the telephone core to the greatest extent, and greatly increases the safety, stability and robustness of the system.
One of the characteristics of Opensips is load _ bandwidth, which can provide load balance for multiple Freeswitch-B, and can control to which Freeswitch the telephone traffic is sent, so that the characteristic makes the gray release of the telephone core be dominant, and can complete the upgrade of the telephone core function without stopping the service. By adopting the proxy service design method, the telephone core is prevented from being directly exposed in the public network, and the safety and the stability of the telephone core are improved. While the load balancing feature of the proxy service provides the possibility for the greyscale release of the phone core, these advantages and innovations are significant features of the present invention.
Among them, Freeswitch is a soft-switching solution for phones, including a soft phone and soft switch to provide product-driven voice and chat. FreeWITCH can be used as a switch engine, PBX, multimedia gateway, multimedia server, and the like. FreeWITCH supports many advanced SIP features, such as presence/BLF/SLA, TCP TLS, and sRTP, which can also be used as a transparent proxy similar to SBC (Session Border controller). FreeWITCH is a cross-platform open source telephone switching platform with strong scalability. It is intended to provide routing and interconnect communication protocols for audio, video, text, or any other form of media. It was created in 2006, filling the gap in many business solutions. FreeWITCH also provides a stable telephony platform, with which many widely used toll-free telephones are being developed. FreeWITCH complies with RFC and supports many advanced SIP features such as presence, BLF, SLA, as well as TCP, TLS, and sRTP, among others. It may also be used as a SBC to perform transparent SIP proxy (proxy) to support other media such as t.38, etc. FreeWITCH supports wideband and narrowband speech coding, and the teleconference bridge can simultaneously support 8, 12, 16, 24, 32, and 48kHZ speech. IN the traditional telephone network, three-party call or multi-party call needs to be processed through a special chip, other services such as prepayment, color ring and the like need to be realized IN the PSTN network by means of an Intelligent Network (IN), and the configuration is quite inflexible. FreeWITCH is an open source telephony switching platform that is almost impossible from a simple softphone client to a carrier-class softswitch. The platform can originally run on 32/64 bit platforms such as Windows, Max OS X, Linux, BSD and solaris. May be used as a simple switching engine, a PBX, a media gateway or media-enabled IVR server, etc. It supports protocols such as SIP, H323, Skype, Google Talk, etc., and can easily communicate with various open-source PBX systems such as sipXecs, Call Weaver, Bayonne, YATE, and Asterisk, etc.
Among them, RTP, Real-time Transport Protocol (RTP) is a network Transport Protocol, which was published by the multimedia Transport working group of IETF in RFC1889 in 1996. The RTP protocol specifies a standard packet format for the delivery of audio and video over the internet. It was originally designed as a multicast protocol but was later used in many unicast applications. The RTP protocol is commonly used in streaming media systems (in conjunction with the RTSP protocol), video conferencing and Push to Talk (Push to Talk) systems (in conjunction with h.323 or SIP), making it the technological base of the IP telephony industry. The RTP protocol is used together with the RTP control protocol RTCP and it is built on the UDP protocol.
Wherein, SIP (Session initiation Protocol) is a multimedia communication Protocol established by IETF (Internet Engineering Task Force). It is a text-based application-layer control protocol for creating, modifying and releasing sessions of one or more participants. The SIP is an IP voice session control protocol originated from the Internet, and has the characteristics of flexibility, easiness in implementation, convenience in expansion and the like. Sip (session Initiation protocol) is a signaling control protocol of an application layer. For creating, modifying and releasing sessions of one or more participants. These sessions may be Internet multimedia conferences, IP telephony or multimedia distribution. The participants of the session may communicate by multicast (multicast), mesh unicast (unicast), or a mixture of both. SIP interoperates with the resource reservation protocol (RSVP), which is responsible for voice quality. It also cooperates with several other protocols, including multiple protocols such as Lightweight Directory Access Protocol (LDAP) which is responsible for location, remote authentication dial-in user service (RADIUS) which is responsible for authentication, and RTP which is responsible for real-time transport. With the advance of computer science and technology, the IP data network based on the packet switching technology replaces the core position of the traditional telephone network based on the circuit switching in the communication field with the convenience and the cheapness. The SIP protocol is used as an application layer signaling control protocol to provide complete session creation and session change services for various instant messaging services, and thus, the security of the SIP protocol plays an important role in the security of instant messaging.
The proxy service method designed by the invention not only avoids exposing the FreeSFIVITH of the telephone core to the public network, but also improves the stability and the safety of the telephone core, and simultaneously utilizes the load _ balance function of Opensps to control the trend of the telephone flow, thereby facilitating the function release and the transverse expansion of the telephone core, achieving multiple purposes at one stroke, and providing powerful guarantee for the safety, the stability and the expansibility of the system.
Another embodiment of the invention is as follows:
fig. 4 is a schematic diagram of the traffic proxy method implementation process of the isolation softswitch end of the present invention. As shown in fig. 4, the base units 31, 32, 33 register intranet IP addresses in the intranet where the two softswitch terminals 27, 28 are located, and the base units 31, 32, 33 are respectively connected to the softswitch terminals 27, 28, and register public network IP addresses in the public network where the signaling transmission server 21 at the softswitch terminal is located. And a plurality of fixed telephone equipment registers the same intranet IP address in the intranet where the soft switch end is positioned, and establishes the mapping relation between the intranet IP address and the plurality of fixed telephone equipment.
The configuration signaling transmission server 21 transmits signaling stream between the soft switch and the public network, and the configuration media stream transmission server 22 transmits media stream between the soft switch and the public network. The signaling transmission server 21 includes a first external network card 23 having a first public network IP address, a first internal network card 22 having a first internal network IP address, and a plurality of first internal ports. The media streaming server 22 comprises a second external network card 26 with a second public IP address, a second internal network card 25 with a second internal IP address, and a plurality of second internal ports.
Receiving the traffic data from the external network 1, the signaling transmission server 21 and/or the media stream transmission server 22 changes the network address and the port of the traffic data to the preset network address and transmission port according to the destination address of the traffic data. For example:
when the signaling data is received and the destination address of the signaling data is the public network IP address, the signaling transmission server 21 converts the network address and the port of the signaling data into the public network IP address of the first external network card 23 and then sends the public network IP address. When the signaling data is received and the destination address of the signaling data is the intranet IP address, the signaling transmission server 21 converts the network address and the port of the signaling data into the first intranet IP address of the first intranet card 22 and then sends the first intranet IP address.
When the media stream data is received and the destination address of the media stream data is the public network IP address, the media stream transmission server 22 converts the network address and the port of the media stream data into the public network IP address of the second external network card 26 and then transmits the public network IP address. When receiving the media stream data, when the destination address of the media stream data is the intranet IP address, the media stream transmission server 22 converts the network address and the port of the media stream data into the second intranet IP address of the second intranet card 25, selects an idle second internal port, and sends the port to the intranet IP address.
When the received traffic data includes signaling data and media stream data, when the destination addresses of the signaling data and the media stream data are public network IP addresses, the signaling transmission server 21 converts the network address and the port of the signaling data into the public network IP address of the first external network card 23 and then sends the public network IP address, the signaling transmission server 21 drives the media stream transmission server 22 based on the signaling data to convert the network address and the port of the media stream data into the public network IP address of the second external network card 26 and then send the public network IP address, and the public network IP address of the first external network card 23 is the same as the public network IP address of the first external network card 23. When the received traffic data includes signaling data and media stream data, when the destination addresses of the signaling data and the media stream data are intranet IP addresses, the signaling transmission server 21 converts the network address and the port of the signaling data into a first intranet IP address of the first intranet card 22 and then sends the first intranet IP address, the signaling transmission server 21 drives the media stream transmission server 22 based on the signaling data to convert the network address and the port of the media stream data into a second intranet IP address of the second intranet card 25 and then sends the second intranet IP address, and the first intranet IP address of the first intranet card 22 is the same as the second intranet IP address of the second intranet card 25.
And detecting the working state of the fixed telephone equipment with the mapping relation with the target address, and taking the currently idle fixed telephone equipment as the target equipment.
And transmitting the traffic data to the target equipment with the current target address based on the changed network address and the transmission port.
Finally, when one of the soft switch terminals is upgraded, the soft switch terminal interrupts the connection with the signaling transmission server 21 and the media stream transmission server 22, and goes offline from the internal network. After the soft switch end is upgraded, the soft switch end is on line from the intranet and reconnects with the signaling transmission server 21 and the media stream transmission server 22.
The telephone traffic agent method of the isolation soft switch end can hide the telephone core in the internal local area network for protection, so that the telephone center can isolate the public network entrance from the physics, protect the telephone core to the maximum extent, and greatly improve the safety, stability and robustness of the system.
Fig. 5 is a block diagram of the traffic proxy system of the isolated softswitch of the present invention. As shown in fig. 5, an embodiment of the present invention further provides a traffic proxy system at an isolated soft switch end, which is used to implement the traffic proxy method at the isolated soft switch end, where the traffic proxy system at the isolated soft switch end includes:
the device registration module 51 registers an intranet IP address of at least one set of mobile phone device in an intranet where the soft switch end is located, and registers a public network IP address in a public network where a signaling transmission server of the soft switch end is located.
The information configuration module 52 configures the signaling transmission server to transmit the signaling stream between the soft switch and the public network, and configures the media stream transmission server to transmit the media stream between the soft switch and the public network.
And a traffic data module 53, configured to receive the traffic data, where the signaling transmission server and/or the media stream transmission server changes a network address and a port of the traffic data to a preset network address and a preset transmission port according to a destination address of the traffic data.
And a data sending module 55 for sending the traffic data to the destination address based on the changed network address and the transmission port.
In a preferred embodiment, the information configuration module 52 is configured to make the signaling transmission server include a first external network card with a first public network IP address, a first internal network card with a first internal network IP address, and a plurality of first internal ports. The media stream transmission server comprises a second external network card with a second public network IP address, a second internal network card with a second internal network IP address and a plurality of second internal ports.
In a preferred embodiment, the traffic data module 53 is configured to receive the signaling data, and when the destination address of the signaling data is a public network IP address, the signaling transmission server converts the network address and the port of the signaling data into the public network IP address of the first external network card and then sends the public network IP address. And receiving the signaling data, and when the target address of the signaling data is an intranet IP address, converting the network address and the port of the signaling data into a first intranet IP address of a first intranet card and then sending the first intranet IP address to the signaling transmission server.
In a preferred embodiment, the traffic data module 53 is configured to accept the media stream data, and when the destination address of the media stream data is the public network IP address, the media stream transmission server converts the network address and the port of the media stream data into the public network IP address of the second external network card and then transmits the public network IP address. And receiving the media stream data, converting the network address and the port of the media stream data into a second intranet IP address of a second intranet card by the media stream transmission server when the target address of the media stream data is the intranet IP address, and transmitting the second intranet IP address to the intranet IP address after selecting an idle second internal port.
In a preferred embodiment, the traffic data module 53 is configured to receive traffic data including signaling data and media stream data, when the destination addresses of the signaling data and the media stream data are public network IP addresses, the signaling transmission server converts the network address and the port of the signaling data into the public network IP address of the first external network card and then sends the public network IP address, and the signaling transmission server drives the media stream transmission server based on the signaling data to convert the network address and the port of the media stream data into the public network IP address of the second external network card and then sends the public network IP address, where the public network IP address of the first external network card is the same as the public network IP address of the first external network card. The received traffic data comprises signaling data and media stream data, when the target addresses of the signaling data and the media stream data are intranet IP addresses, the signaling transmission server converts the network address and the port of the signaling data into a first intranet IP address of a first intranet card and then sends the first intranet IP address to the intranet IP address, the signaling transmission server drives the media stream transmission server based on the signaling data to convert the network address and the port of the media stream data into a second intranet IP address of a second intranet card and then sends the second intranet IP address to the intranet IP address, and the first intranet IP address of the first intranet card is the same as the second intranet IP address of the second intranet card.
In a preferred embodiment, the device registration module 51 further includes a plurality of base units registering the same intranet IP address in an intranet where the soft switch is located, and establishing a mapping relationship between the intranet IP address and the plurality of base units. Further comprising: the device detection module 54 detects the operating state of the fixed-line device having a mapping relationship with the target address, and takes the currently idle fixed-line device as the target device. The data sending module 55 is configured to send the traffic data to the target device whose target address is current based on the changed network address and the transmission port.
In a preferred embodiment, the system further includes a soft switch upgrading module 56, when one of the soft switch terminals is upgraded, the soft switch terminal interrupts the connection with the signaling transmission server and the media streaming server, and the intranet goes offline. After the soft switch end finishes upgrading, the soft switch end is on line from the intranet and reconnects with the signaling transmission server and the media stream transmission server.
The invention aims to provide a telephone traffic agent system for isolating a soft switch end, which can ensure that a telephone center isolates a public network entrance from the physics by hiding a telephone core in an internal local area network for protection, thereby protecting the telephone core to the maximum extent and greatly increasing the safety, stability and robustness of the system.
The embodiment of the invention also provides a telephone traffic agent device of the isolation soft switch end, which comprises a processor. A memory having stored therein executable instructions of the processor. Wherein the processor is configured to isolate steps of the traffic proxy method at the soft switch end for execution via execution of the executable instructions.
As shown above, the telephone service agent system of the isolated soft switch of the embodiment of the present invention can hide the telephone core in the internal lan for protection, so that the telephone hub physically isolates the public network access, thereby protecting the telephone core to the greatest extent, and greatly increasing the security, stability and robustness of the system.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" platform.
Fig. 6 is a schematic structural diagram of a traffic proxy device at an isolated softswitch end of the present invention. An electronic device 600 according to this embodiment of the invention is described below with reference to fig. 6. The electronic device 600 shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 6, the electronic device 600 is embodied in the form of a general purpose computing device. The components of the electronic device 600 may include, but are not limited to: at least one processing unit 610, at least one memory unit 620, a bus 630 connecting the different platform components (including the memory unit 620 and the processing unit 610), a display unit 640, etc.
Wherein the storage unit stores program code executable by the processing unit 610 to cause the processing unit 610 to perform steps according to various exemplary embodiments of the present invention described in the above-mentioned electronic prescription flow processing method section of the present specification. For example, processing unit 610 may perform the steps as shown in fig. 2.
The storage unit 620 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)6201 and/or a cache memory unit 6202, and may further include a read-only memory unit (ROM) 6203.
The memory unit 620 may also include a program/utility 6204 having a set (at least one) of program modules 6205, such program modules 6205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 630 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 600 may also communicate with one or more external devices 700 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 600, and/or with any device (e.g., router, modem, etc.) that enables the electronic device 600 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 650. Also, the electronic device 600 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 660. The network adapter 660 may communicate with the other modules of the electronic device 600 via the bus 630. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 600, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage platforms, to name a few.
The embodiment of the invention also provides a computer readable storage medium for storing a program, and the steps of the method for isolating the telephone traffic proxy of the soft switch end are realized when the program is executed. In some possible embodiments, the various aspects of the invention may also be implemented in the form of a program product comprising program code for causing a terminal device to perform the steps according to various exemplary embodiments of the invention described in the above-mentioned electronic prescription flow processing method section of this specification, when the program product is run on the terminal device.
As shown above, the telephone service agent system of the isolated soft switch of the embodiment of the present invention can hide the telephone core in the internal lan for protection, so that the telephone hub physically isolates the public network access, thereby protecting the telephone core to the greatest extent, and greatly increasing the security, stability and robustness of the system.
Fig. 7 is a schematic structural diagram of a computer-readable storage medium of the present invention. Referring to fig. 7, a program product 800 for implementing the above method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the present invention provides a method, a system, a device and a storage medium for isolating a telephone traffic proxy at a soft switch end, which can hide a telephone core in an internal lan for protection, so that a telephone hub physically isolates a public network access, protect the telephone core to the greatest extent, and greatly increase system security, stability and robustness.
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.

Claims (10)

1. A method for isolating a traffic proxy of a soft switch end is characterized by comprising the following steps:
registering an intranet IP address of at least one piece of fixed equipment in an intranet where a soft switch end is located, and registering a public network IP address in a public network where a signaling transmission server of the soft switch end is located;
configuring the signaling transmission server to transmit a signaling stream between the soft switch end and a public network, and configuring a media stream transmission server to transmit a media stream between the soft switch end and the public network;
receiving traffic data, and changing a network address and a port of the traffic data into a preset network address and a preset transmission port by the signaling transmission server and/or the media stream transmission server according to a target address of the traffic data;
and sending the traffic data to a target address based on the changed network address and the transmission port.
2. The traffic proxy method for isolating a soft switch end according to claim 1, wherein said configuring the signaling transport server to transport the signaling stream between the soft switch end and the public network and configuring the media stream transport server to transport the media stream between the soft switch end and the public network further comprises:
the signaling transmission server comprises a first external network card with a first public network IP address, a first internal network card with a first internal network IP address and a plurality of first internal ports;
the media stream transmission server comprises a second external network card with a second public network IP address, a second internal network card with a second internal network IP address and a plurality of second internal ports.
3. The method for isolating traffic proxy at soft switch end according to claim 2, wherein said receiving traffic data, said signaling transmission server and/or said media streaming server changing the network address and port of said traffic data to preset network address and transmission port according to the destination address of said traffic data, comprises:
receiving signaling data, and when the target address of the signaling data is the public network IP address, converting the network address and the port of the signaling data into the public network IP address of the first external network card and then sending the public network IP address by the signaling transmission server;
and receiving signaling data, and when the target address of the signaling data is the intranet IP address, converting the network address and the port of the signaling data into a first intranet IP address of the first intranet card and then sending the first intranet IP address to the intranet IP address by the signaling transmission server.
4. The method for isolating traffic proxy at soft switch end according to claim 2, wherein said receiving traffic data, said signaling transmission server and/or said media streaming server changing the network address and port of said traffic data to preset network address and transmission port according to the destination address of said traffic data, comprises:
receiving media stream data, and when the destination address of the media stream data is the public network IP address, converting the network address and the port of the media stream data into the public network IP address of the second external network card and then sending the public network IP address by the media stream transmission server;
and receiving media stream data, converting the network address and the port of the media stream data into a second intranet IP address of the second intranet card by the media stream transmission server when the target address of the media stream data is the intranet IP address, and selecting an idle second internal port to send the idle second internal port to the intranet IP address.
5. The method for isolating traffic proxy at soft switch end according to claim 2, wherein said receiving traffic data, said signaling transmission server and/or said media streaming server changing the network address and port of said traffic data to preset network address and transmission port according to the destination address of said traffic data, comprises:
the received telephone traffic data comprises signaling data and media stream data, when the target addresses of the signaling data and the media stream data are the public network IP address, the signaling transmission server converts the network address and the port of the signaling data into the public network IP address of the first external network card and then sends the public network IP address, the signaling transmission server drives the media stream transmission server based on the signaling data to convert the network address and the port of the media stream data into the public network IP address of the second external network card and then sends the public network IP address, and the public network IP address of the first external network card is the same as the public network IP address of the first external network card;
the received traffic data comprises signaling data and media stream data, when the target addresses of the signaling data and the media stream data are the intranet IP addresses, the signaling transmission server converts the network address and the port of the signaling data into a first intranet IP address of the first intranet card and then sends the first intranet IP address to the intranet IP address, the signaling transmission server drives the media stream transmission server based on the signaling data to convert the network address and the port of the media stream data into a second intranet IP address of the second intranet card and then send the second intranet IP address to the intranet IP address, and the first intranet IP address of the first intranet card is the same as the second intranet IP address of the second intranet card.
6. The method for isolating a traffic proxy of a soft switch as claimed in claim 1, wherein the registering at least one base unit device with an intranet IP address in an intranet where the soft switch is located and with a public network IP address in a public network where a signaling transmission server of the soft switch is located further comprises:
a plurality of base-station equipment registers the same intranet IP address in an intranet where a soft switch end is located, and establishes a mapping relation between the intranet IP address and the plurality of base-station equipment;
after the receiving the traffic data, the signaling transmission server and/or the media stream transmission server changes the network address and the port of the traffic data to the preset network address and transmission port according to the target address of the traffic data, and before the sending the traffic data to the target address based on the changed network address and transmission port, the method further includes:
detecting the working state of the fixed telephone equipment with the mapping relation with the target address, and taking the currently idle fixed telephone equipment as target equipment;
the media stream transmission server includes a second external network card with a second public network IP address, a second internal network card with a second internal network IP address and a plurality of second internal ports, including:
and sending the traffic data to the target equipment with the current target address based on the changed network address and the transmission port.
7. The method for isolating a traffic proxy of a soft switch according to claim 1, wherein said at least one fixed equipment registers an intranet IP address in an intranet where the soft switch is located, and registers a public IP address in a public network where a signaling transmission server of the soft switch is located, and further comprising connecting a plurality of fixed equipments to a plurality of soft switches respectively;
further comprising: when one of the soft switch terminals is upgraded, the soft switch terminal interrupts the connection with the signaling transmission server and the media stream transmission server, and the intranet goes offline; and after the soft switch end finishes upgrading, the soft switch end is on line from the intranet and is reconnected with the signaling transmission server and the media stream transmission server.
8. A traffic proxy system of an isolated soft switch for implementing the traffic proxy method of claim 1, comprising:
the device registration module registers an intranet IP address of at least one piece of mobile phone in an intranet where the soft switch end is located, and registers a public network IP address in a public network where a signaling transmission server of the soft switch end is located;
the information configuration module is used for configuring the signaling transmission server to transmit the signaling stream between the soft switch end and the public network and configuring the media stream transmission server to transmit the media stream between the soft switch end and the public network;
the traffic data module receives traffic data, and the signaling transmission server and/or the media stream transmission server change the network address and the port of the traffic data into preset network addresses and transmission ports according to the target address of the traffic data;
and the data sending module is used for sending the telephone traffic data to a target address based on the changed network address and the transmission port.
9. A traffic proxy device for isolating a soft switch, comprising:
a processor;
a memory having stored therein executable instructions of the processor;
wherein the processor is configured to perform the steps of the traffic proxy method of the isolated softswitch of any of claims 1 to 7 via execution of the executable instructions.
10. A computer-readable storage medium storing a program, wherein the program when executed by a processor implements the steps of the method for isolating traffic proxy at a softswitch as claimed in any of claims 1 to 7.
CN202210518866.6A 2022-05-13 2022-05-13 Telephone traffic proxy method, system, equipment and storage medium for isolating soft switch end Pending CN114938414A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210518866.6A CN114938414A (en) 2022-05-13 2022-05-13 Telephone traffic proxy method, system, equipment and storage medium for isolating soft switch end

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210518866.6A CN114938414A (en) 2022-05-13 2022-05-13 Telephone traffic proxy method, system, equipment and storage medium for isolating soft switch end

Publications (1)

Publication Number Publication Date
CN114938414A true CN114938414A (en) 2022-08-23

Family

ID=82864644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210518866.6A Pending CN114938414A (en) 2022-05-13 2022-05-13 Telephone traffic proxy method, system, equipment and storage medium for isolating soft switch end

Country Status (1)

Country Link
CN (1) CN114938414A (en)

Similar Documents

Publication Publication Date Title
US10104235B2 (en) Forwarding roaming call to VoIP system
US8861510B1 (en) Dynamic assignment of media proxy
US7773580B2 (en) Apparatus and method for voice processing of voice over internet protocol (VoIP)
KR100360274B1 (en) Method for supporting general ip telephone system in nat based private network
EP1790149B1 (en) Method and session initiation protocol (sip) server for the exchange of end-point capabilities
US20150271445A1 (en) Advanced real-time ip communication in a mobile terminal
US7443842B2 (en) Communication control apparatus
US7660299B2 (en) Network-based call interface device for real-time packet protocol calls
US20130007291A1 (en) MEDIA INTERWORKING IN IPv4 AND IPv6 SYSTEMS
US8743871B2 (en) Media identification, classification, forwarding, and management for voice and video communications
US11330022B2 (en) System and method for separation of call origination and call delivery techniques
US20100020792A1 (en) Media Proxy Able to Detect Blocking
US10931720B2 (en) IP tolerance and signaling interworking
US7701971B2 (en) System and method for providing a compatibility feature in a session initiation protocol (SIP) environment
RU2608673C2 (en) Handling session initiation protocol messages in wireless telecommunications device
US8005099B2 (en) Selecting transport addresses to route streams between endpoints
US20170064086A1 (en) Transfer of voice transmissions to alternate networks
US9148306B2 (en) System and method for classification of media in VoIP sessions with RTP source profiling/tagging
EP2115977B1 (en) Methods and apparatus for controlling signaling associated with a private branch exchange within a session over internet protocol network
CN114938414A (en) Telephone traffic proxy method, system, equipment and storage medium for isolating soft switch end
US7778274B2 (en) System and method for providing a compatibility feature in a session initiation protocol (SIP) environment
JP4372629B2 (en) SIP communication control apparatus for performing FW control and FW control method thereof
JP2006140750A (en) System, method, and program for monitoring communication data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination