Sei sulla pagina 1di 2

SIP trunking

SIP trunking enables the end point’s PBX (Phone Exchange System) to send and receive calls via Internet. As SIP is applied for the
[1] [2]
signalling protocol for multiple real-time application, SIP trunk is able to control voice, video and messaging applications.
It is also a voice over Internet Protocol(VoIP) technology and streaming media service based on the Session Initiation Protocol (SIP)
by which Internet telephony service providers (ITSPs) deliver telephone services and unified communicationsto customers equipped
with SIP-based private branch exchange (IP-PBX) and unified communications facilities.[3] Most unified communications
applications provide voice, video, and other streaming media applications such as desktop sharing, web conferencing, and shared

See also

The architecture of SIP trunking provides a partitioning of the unified communications network into two different domains of

Private domain: refers to a part of the network connected to a PBX or unified communications server.
Public domain: refers to the part of the network which allows access into the
public switched telephone network
(PSTN) or public land mobile network(PLMN).
The interconnection between the two domains must occur through a SIP trunk.
The interconnection between the two domains, created
by transport via the Internet Protocol (IP), involves setting specific rules and regulations as well as the ability to handle some services
and protocols that fall under the name of SIP trunking.

The ITSP is responsible to the applicable regulatory authority regarding all the following law obligations of the public domain:

Tracking traffic;
Identification of users;
Implementation of the lawful interception mechanisms.
The private domain instead, by nature, is not subject to particular constraints of law, and may be either the responsibility of the ITSP,
the end user (enterprise), or of a third party who provides the voice services to the company

Each domain has elements that perform the characteristic features requested of that domain, in particular the result (as part of any
front-end network to the customer) is logically divided into two levels:

The control of access (Class 5softswitch);

Network-border elements[9][10][11] that separate the Public Domain from the Private Domain, implementing all the
appropriate ITSP phone security policies.
The private domain consists of three levels:
Corporate-border elements that separate the public domain from the private domain, implementing the appropriate
company security policies.
Central corporate switching node;

See also
Session border controller(SBC)

1. SIP Trunk guide 26 July 2018: SIP Trunks: A Guide for the Bewildered"'(
2. SIP trunking explained26 July 2018: Making the move from PSTN to SIP trunk: SIP trunking explained"'(https://ww
3. "SIP trunking migration: Enterprise opportunities and challenges"(
4. "SIP Trunking Explained" (
runking.jpg). Technology
Convergence Group. Retrieved 8 September 2015.
5. Gaboli, Ivan; Puglia, Virgilio (Jan 2011). "SIP Trunking the route to the new VoIP services" (
stamp/stamp.jsp?tp=&arnumber=5682153). Kaleidoscope: Beyond the Internet? − Innovations for future networks
and services, 2010 ITU-T, 13-15 Dec 2010. IEEE. ISBN 978-1-4244-8272-6.
6. "SIP trunking explained"(
7. "Legal issues in different countries" (
8. "SIP trunking" (
9. "Role of Border Element"(
l). Cisco.
10. "Acme Packet Net-Net session border controllers"( .voiplogi
f) (PDF). Acme Packet. Archived fromthe original (
3836f9b7f1b4bd8e2/technical_specifications/ds_apkt_net_net_sbc.pdf) (PDF) on 2011-07-17.
11. "SIP Trunking Enterprise Solutions"(
enterprise.php). Ingate Systems. Archived fromthe original ( on

Retrieved from "


This page was last edited on 6 May 2019, at 05:04(UTC).

Text is available under theCreative Commons Attribution-ShareAlike License ; additional terms may apply. By using this
site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of theWikimedia
Foundation, Inc., a non-profit organization.