Session Initiation Protocol (SIP) is used for voice and video. It is a signalling protocol for setting media connection for packet flow over IP addresses in other words call flow in the IP principally means SIP. It can be established between 2 IPs.
SIP basically and initiates terminates and maintains and real-time sessions and it works with and other protocols such as SDP and TLS.
SDP helps it with codecs and TLS, where TLS provide some additional security by encrypting.
Session Description Protocol(SDP)
It is the network perimeter used to find trusted and untrusted networks. Firewall can be trusted and are generally used but when it comes to business migration and cloud and mobile workforce the perimeters more fluid than ever and just as our and threats and networks have evolved so are our defence models.
New technologies like software-defined perimeter have raised the concept into reality with SDP we can achieve zero trust security which is a security model in which trusting anyone is not involved or anything based on where they are located on the network instead every single connection and attempt is verified until Trust can be established.
Resources are completely and hidden from the network leaving unauthorized users and devices segmented and from even seeing anything else on the and network verification involves a human and machine element before trust can be established.
Zero trust and security is built around the concept of need-to-know user will only have access to the resources that they need and nothing else until the new request goes through the same process in a zero trust and security model.
The network is in a and constant dynamic state of verifying and users and devices this means that if a verified user has compromised the Machine verification would fail and their access to the resource would be immediately cut off to prevent data ex-filtration and lateral movement because zero trust security is just a model there’s many products and technologies that can help us get there a relatively new technology known as software-defined perimeter which mainly carries out many of the zero trust principles on your network.
To speed up the process sometimes User Datagram Protocol(UDP) is used.