The answer is yes but it creates a new call at the slave because Party C will 
send its Invite with a new Call-ID. There are three possible approaches to this 
problem. A) if you can control the Call-IDs used by the parties then you can 
make them use the same stem. B) you can end the first SIPp after the first 
exchange and start another for the next exchange. C) you can find something 
that distinguishes the two Invites so that you do different things when you 
receive them. I would probably try C) in your case.PeterDate: Tue, 4 Oct 2011 
12:04:17 -0500
From: [email protected]
To: [email protected]
Subject: [Sipp-users] Can a slave instance receive invites?


  


    
  
  
    Hello,

        

        here is my call flow

        

      
    
     Party A            SIPp             Party B           Party C       
    |                     |                |                 |
     |  1a INVITE          |                |                 |
     |-------------------->|                |                 |
     |                     |  1b INVITE     |                 |
     |                     |--------------->|                 |
     |                     |  1c 180 Ring.  |                 |
     |                     |<---------------|                 |
     |  1d 180 Ringing     |                |                 |
     |<--------------------|                |                 |
     |                     |                |                 |
     |                     |                |                 |  2 Call
     |                     |                |                 |  Pickup
     |                     |                |                 |  
     |                     |                |                 |
     |                     |                |3a INVITE Call PU|
     |                     |<---------------------------------|
     |                     |                |                 |
     |  3b INVITE/Replaces |                |                 |
     |<--------------------|                |                 |
     |  3c 200 OK          |                |                 |
     |-------------------->|                |                 |
     |                     |                |  3d 200 OK      |
     |                     |--------------------------------->|
     |  1e CANCEL/200      |                |                 |
     |-------------------->|                |                 |
     |                     |  1f CANCEL/200 |                 |
     |                     |--------------->|                 |
     |                     | 1g 487 Req Term|                 |
     |                     |<---------------|                 |
     |  1h 487 Req Term    |                |                 |
     |<--------------------|                |                 |
     |   1i  ACK           |                |                 |
     |-------------------->|   1j ACK       |                 |
     |                     |--------------->|                 |
     |                     |                |   3e ACK        |
     |  3f ACK             |<---------------------------------|
     |<--------------------|                |                 |      
     |                     |                |                 |
     |<=======================  MEDIA  ======================>|   

    We have already
        attempted this and we see the 3a INVITE being sent through
        wireshark, but SIPp is not recognizing the 3a INVITE from Party
        C.

      Is it
        possible for the slave instance of Party C to receive INVITE
        messages from Party C?

     

        

        

      
    -- 
Doug Beach

Telecore, Inc.
www.telecore.com
  


------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Sipp-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/sipp-users                         
                  
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Sipp-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/sipp-users

Reply via email to