NAT/Firewall traversal:issues and solutions

Size: px
Start display at page:

Download "NAT/Firewall traversal:issues and solutions"

Transcription

1 NAT/Firewall traversal:issues and solutions Fakher Atout Helsinki University of Technology Abstract Network Address Translators (NATs) and Firewalls are increasingly used in all type of networks because of various reasons. However, NATs and firewalls are limiting some kind of communications and they are known to cause problems for applications that carry IP addresses in the payload which are mainly related to multimedia communications and Voice over IP. Nowadays there are many techniques and solutions are used to allow those increasingly popular applications to work through NATs and Firewalls. Examples of such applications are NAT/Firewall NSLP, STUN, Application Level Gateways, CODO, etc. In this paper, we will take a look on a few exscinding and proposed solutions and study their features, advantages and shotrcomes. Special focus will be given to NSLP. KEYWORDS:NAT, Firewall, NSIS, NSLP, STUN 1 Introduction NATs and firewalls have become important elements in today s networks. They are providing solutions for many challenges such as IPv4 addresses. shortage and to protect networks security. To do so firewalls are checking all IP packets and based on preconfigured settings it may allow or drop those packets. In addition to that NAT is also changing the IP address/port and hides the private network topology. However, nothing comes without an expense. For example, NATs and Firewalls cause significant connectivity problems between nodes separated by NATs/Firewalls and preventing them form communicating with each other [6]. These connectivity problems are more severe in complex protocols that negotiate secondary flows of data on the application layer. This type of communication is found in many protocols such as SIP, H.323, etc. used in peer-to-peer applications [2]. To overcome this problem there are many approaches and solutions exist, some of those focus on Firewalls/NATs, others focus on applications themselves while others mix both. Most of the existing solutions are application specific or work for some type of protocols but not for others. However, there are some new approaches try to tackle the problem for all IP communications. But because these challenges are quite new, the standardization is still in the first phases. NAT/Firewall NSLP is one of the solutions that will be studies in this paper, it is developed based on Next Step In Signaling (NSIS) task force recommendations. 2 NAT/Firewall overview 2.1 Firewalls Firewalls can be defined as "a collection of components placed between two networks that collectively have the following properties: All traffic from inside to outside, and vice versa, must pass through the firewall. Only authorized traffic, as defined by the local security policy, will be allowed to pass. The firewall itself is immune to penetration."[1] Firewalls main role is to protect its "privater" network security by granting only the needed access based on preconfigured polices. They usually allow outbound traffic but block all inbound traffic except what the configured rules allow. Firewalls rules mainly are set based on source/destination IP/port addresses. In other words, Firewall may allow all outbound traffic except for some application; this means to add a deny rule on that destination port number. Another example it to block all inbound traffic except from some trusted host, so an allow policy will be added to the source IP address. Firewalls check each IP packet source/destination address as well as its source/destination port and then decide to allow or deny the packet. 2.2 Network Address Translatros (NAT) "Network Address Translation is a method by which IP addresses are mapped from one realm to another, in an attempt to provide transparent routing to hosts. Traditionally, NAT devices are used to connect an isolated address realm with private unregistered address to an external realm with globally unique registered addresses."[3] NAT was designed as short term solution for the IPv4 address exhaustion to allow multiple hosts in a "private" network to share public IP addresses while a more permanent solution is being developed. Because of its intended temporary nature it has been designed to cause minimal network changes and without making any changes to hosts or other routers. [8] NATs usually found on the edge of network as a functional unit of a router or gateway. NATs divide the network into "inside" and "outside" and they operate in a very simple way. NATs intercept each IP packet, examine it and then decide what to do with it. NATs might discard the packet or forward it as it is or alter its IP address and checksums. They either alter the source or destination IP address based

2 the direction i.e. from inside to outside or the opposite direction. There are also another variant on NATs which is port translating NAT or NATP, they work in a similar way but the mapping is done for the IP address and the port as a pair which allows even more sufficient usage of the public IP addresses. However, in this paper we will use NAT to refer to both NATs and NAPTs. [3][8] NATs can be divided in four types based on how binding is done, the four types are:[3] Symmetric: In which the mapping of private IP/port to public IP/port remains the same until the connection is closed. However a new private/public mapping is done for each new connection. Full-cone: In which the mapping of private IP/port to public IP/port remains the same which enables any outside host to send packet to the internal host using this IP/port. Restricted-cone: It uses the same mapping as in Fullcone but it allows the outside host to send packets to inside host only if the inside host has sent packets to the outside one before. Port-restricted-cone: It also uses the same mapping as in Full-cone but it only allow outside host to send packets to the same IP/port that has been used by the inside host before. 3 Problem description (traversality) Because of the services the NATs and Firewalls offer they become important elements of today.s networks which have changed the internet address architecture to be a collection of private address realms connected by NATs to the global address realm in which every device has a global unique address. Figure 1 shows how public and private domains in today s networks.[10]] But this was not without a price, Firewalls and NATs break the IP connectivity model by preventing hosts residing in "outside" networks from initiating a connection with host residing in the "inside" network[5]. This behavior is more obvious in connection oriented protocols such as TCP, for example many Firewalls are configured to allow connection only if they are imitated by internal hosts. To do so Firewalls drop inbound SYN packets making it impossible for any external host to initiate a connection with internal one. If both hosts A and B are behind Firewalls then it will be impossible for them establish a connection although the connection itself do not violate the firewall policy.[5] such configuration is reasonable to limit access to the internal network, however this cause a severe problem for peer to peer communication (P2P). The nature of P2P communications which based on incoming calls from unknown/untrusted hosts limits the possibility to solve the problem by pre-configuring the Firewall.[9] Many multimedia and P2P protocols negotiate secondary flows in the application level. Session Initiation Protocol (SIP) for example, sends an IP address and port to the other party where the audio should be sent. As a result this audio stream will be dropped at Firewall. If the host is behind Figure 1: Public and private IP address domains[10] a NAT and is using a private IP address SIP will eventually send this IP address to the other party, but all packets that will be sent to this IP address will be dropped because it is unroutable. Altough NATs alter the IP packets and replace the private IP addresses but it has no way to change or read the data in application layer.[2] 4 Solutions To solve the NAT/Firewall traversality many solutions have been developed, one of those is Application Layer Gatways (ALGs) which are an extra functionality in NATs that are application "aware". ALGs may override NAT policies or alter application layer messages and replace the IP addresses in them. [3] However, ALGs have many limitations such as scalability, reliability and the speed of deployment.[11] ALGs is a protocol specific and require upgrades and changed for each modification in the protocol.[3]to overcome some of ALGs limitations a Middlebox Communication (MIDCOM) protocol was developed which managed to overcome some of them, however, it still requires an upgrade of the existing NATs/Firewalls and application components.[11] Anther solution which is developed by Microsoft for home users is Universal Plug and Play (UPnP) but it is limited to home users and suffer form a major security problem which is putting the NAT under the control of the applications.[3] There are also some other solutions exist but in this paper we will study the following 3 solutions: 4.1 STUN "Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) (STUN) is a light weight protocol that allows applications to discover the presence and types of NATs and firewalls between them and the public Internet".[11] STUN is a client-server protocol in which the server must be in the public side of NAT and has two global IP addresses and the client might be behind

3 a NAT. The client send a simple UDP message to the server that contains its IP address and the port in the payload, the server examines the message and reply to the client with IP address and port that have been used in the header. [8][9] The client - which usually embedded in an application that need to acquire a public IP address and port to receive data on them- check the IP address it gets from the STUN server. If the IP address is the same that it has then there is no NAT in the path between the client and STUN server. If the IP address is different then the client starts to send another type of messages to the STUN server in order to learn the NAT behavior and type. After this discovery process the application can use the public IP address and port that the other end should send the data to them.[8] Figure 2 shows how SIP is using STUN for NAT traversal, for more details please check [13]. Figure 2: STUN operation[13] STUN has many advantages such as its simplicity and compatibility with many types on NATs. However it suffers from many disadvantages, the most serious one is not being able to work with symmetric NATs which are typically found in corporate networks. Because STUN client establish totally independent connection with STUN server then it will work only with cone NATS which use the same mapping for all traffic. To overcome this problem a new protocol has been developed which is Traversal Using Relay NAT (TURN). STUN also suffers from another major drawback which is the lack of support to TCP based connections and applications. But there are an extention to STUN that support TCP which is Smart Tunnel Union for NAT Traversal (STUNTS). 4.2 CODO Cooperative On-Demand Opening (CODO) is a middleware NAT/Firewall traversal system that dynamically configures NATs/Firewalls and open holes in them so the authorized application can communicate. CODO allows only authorized applications to open narrow holes in Firewalls when needed. When the application do not need to the hole it can be closed.[6] CODO uses extensive cooperation between firewalls and application. To do that a CODO-enabled firewall will have a firewall agent (FA) that will communicate with client libraries (CLs). Figure 3 shows CODO topology.[6] In CODO, there is no need to add static rules to allow application to traverse the Firewall since the FA functionality which embedded with the Firewall adds and deletes the rules dynamically. FA also keeps a list of applications that can Figure 3: CODO topology [6] traverse the Firewall and do not allow any other application traverse it. When an authorized application need to open a hole in the firewall, the CL establish a secure TCP connection to the FA and informs FA of application s need to open a certain hole, FA then modify the rules to allow such an activity. CL also informs FA with the status of the connection and when the connection is closed be the application FA modifies the rules to close the hole. CODO also address NAT traversal using similar approach, CL make a TCP connection to FA which reserve a public IP address to be used. Then client FA will ask the server FA to allow the connection for that IP address.[6] As we can see CODO can work with the most restricted Firewalls and NATS and it allow only narrow and short Firewall openings. In addition to that CODO controls both inbound and outbound traffic. Another important advantage of CODO is its application authorization capability which makes it very suitable for high secure systems. However, CODO is not backward compatible and it is necessary to update the existing NATs and Firewalls to enable CODO to work. But, at application level only CL libraries are needed with a possibility of re-linking. [6] 4.3 NSLP "NAT/Firewall NSIS Signaling Layer Protocol (NAT/FW NSLP) is a path-coupled signaling protocol for NAT and Firewall configuration within the NSIS (Next Step In Signaling) framework."[7] But before we can talk about NAT/FW NSLP we will discuss NSIS briefly. The efforts of NSIS work group (NSIS WG) to have a new protocol suite that take care of new signaling needs resulted in the developments of an extensible IP signaling architecture which referred to as NSIS. [15] NSIS enables different signaling applications to install and manipulate states in the network along the data path; this concept is called pathcoupled. NSIS Entity (NE ) is a network element ( mainly router) that is NSIS-enabled, which means that it can understand NSIS signals. For a certain data flow states are installed or manipulated in each NE that resides in the path. However, not all the nodes in the path should be NEs. Figure 4 shows NSIS signaling example. NE can be NSIS initiator (NI) which initiates the signaling, NSIS Forwarder (NF) which intercept and then forwards the signaling message and finally NSIS Responder NR which terminate the signaling. NSIS protocol has two layers which are:

4 Figure 4: NSIS Signaling and data flow Example [7] NSIS Transport Layer Protocol (NTLP) which is responsible for transporting signaling layer messages between NEs, the currently used protocol is General Internet Signaling Transport (GIST). This protocol is application independent and it runs over TCP or UDP.[7] The NSIS Signaling Layer Protocol (NSLP) which is application specific and it implements application signaling functionality. NAT FW NSLP is one example on NSLP. In order to make NAT FW NSLP works it is necessary that the NAT/Firewall can accept NSLP messages and process them and then it is dynamically alter it policies to allow the needed connection. All NSLP-aware nodes in the path should do so, however, it is not necessary for all nodes to be NSLP-aware.[7] Figure 5 shows how NAT/FW NSLP works, when needed NI sends an NSLP signaling message to NR to create a.hole". All NF in the path process the message and alter their rules to allow the connection to be established.[7] it has a high security features but this requires changes or replacement of the existing Firewalls/NATs. Finally, NSLP has many advantages such as it can be deployed gradually and it can be utilized by any application and it support both TCP and UDP. NSLP also a part of standardized two level protocols which allow each application to set up its own security standard. Although NSLP has some limitation such as need to update existing NATs, Firewalls but we think it could be the best solution because of the features it has and being a part of a wider protocol suite. References [1] Bellovin, S.M.and Cheswick, W.R. Network firewalls. In Communications Magazine, IEEE Volume 32, Issue 9, Sept Page(s):50-57 [2] Martin, M., Brunner, M., Stiemerling, M., and Fessi, A. Path-coupled signaling for NAT/firewall traversal. High Performance Switching and Routing, HPSR Workshop on, May 2005 Page(s): [3] Aurel Constantinescu M., Croitoru, V., and Oana Cernaianu, D. NAT/Firewall traversal for SIP: issues and solutions Signals, Circuits and Systems, ISSCS International Symposium on, Volume 2, July 2005 Page(s): Vol. 2 [4] Aoun, C., Stiemerling, M., Davies, E.,and Tschofenig, H. Path-directed signaling usage in the Internet IP Operations and Management, Proceedings IEEE Workshop on,11-13 Oct Page(s): [5] Saikat Guha and Paul Francis Characterization and Measurement of TCP Traversal through NATs and Firewalls Source: 2005, Usenix Figure 5: Firewall traversal scenario[7] Although this protocol requires some changes in NATs and Firewalls but it is feasible because the changes can be used by a range of applications. The most important one is Quality of Service (QoS). Reference [7] shows that the protocol is implemental and the performance figures are acceptable. 5 Conclusion As we can see there are many solutions exist to solve the Firewall/NAT traversal problem. From the ones we have studied we can see that STUN which used by Skype is a very simple solution and it is backward compatible. But it suffers form many limitations such as incompatibility with some Firewalls and supporting UDP only, STUN also require that each service provider allocate their own STUN servers. It also considered causing a security threat. [6] Another solution which is CODO is solving the problem by allowing the application to communicate with Firewalls/NATs, [6] Sechang Son, Allcock, B., and Livny, M. CODO: firewall traversal by cooperative on-demand opening High Performance Distributed Computing, HPDC-14. Proceedings. 14th IEEE International Symposium on, July 2005 Page(s): [7] Steinleitner, N., Peters, H., and Xiaoming Fu Implementation and Performance Study of a New NAT/Firewall Signaling Protocol Distributed Computing Systems Workshops, ICDCS Workshops th IEEE International Conference on,04-07 July 2006 Page(s):8-8 [8] cicso systems 3/anatomy.html [9] Solving the Firewall and NAT Traversal Issues for MoIP [10] Ford Bryan, Srisuresh Pyda, and Kegel Dan Peer-topeer communication across network address translators In USENIX Annual Technical Conference, 2005

5 [11] Rosenberg J., Weinberger J.,Huitema C., and Mahy R. STUN: Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) RFC 3489, IETF, Mar [12] Salman A. Baset and Henning Schulzrinne An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol IEEE Infocom [13] Koski P., Ylinen J., and Loula P. The SIP-Based System Used in Connection with a Firewall International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications 2006 Vol. Issue, p203 [14] [15] Xiaoming Fu; Schulzrinne, H.; Bader, A.; Hogrefe, D.; Kappler, C.; Karagiannis, G.; Tschofenig, H.; Van den Bosch, S. NSIS: a new extensible IP signaling protocol suite Communications Magazine, IEEE Volume 43, Issue 10, Oct Page(s):

Internet Engineering Task Force (IETF) Request for Comments: 5973. C. Aoun Consultant E. Davies Folly Consulting October 2010

Internet Engineering Task Force (IETF) Request for Comments: 5973. C. Aoun Consultant E. Davies Folly Consulting October 2010 Internet Engineering Task Force (IETF) Request for Comments: 5973 Category: Experimental ISSN: 2070-1721 M. Stiemerling NEC H. Tschofenig Nokia Siemens Networks C. Aoun Consultant E. Davies Folly Consulting

More information

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in

More information

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl

More information

Explicit Mechanisms for Controlling NAT/Firewall Systems Dynamically

Explicit Mechanisms for Controlling NAT/Firewall Systems Dynamically Explicit Mechanisms for Controlling NAT/Firewall Systems Dynamically Teemu Mäki Helsinki University of Technology Teemu.Maki@hut.fi Abstract NAT/Firewall systems are very widely utilized in today s network

More information

Network Convergence and the NAT/Firewall Problems

Network Convergence and the NAT/Firewall Problems Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,

More information

A Scalable Multi-Server Cluster VoIP System

A Scalable Multi-Server Cluster VoIP System A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu mcliang@nuk.edu.tw {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department

More information

Request for Comments: 5207 Category: Informational L. Eggert Nokia April 2008

Request for Comments: 5207 Category: Informational L. Eggert Nokia April 2008 Network Working Group Request for Comments: 5207 Category: Informational M. Stiemerling J. Quittek NEC L. Eggert Nokia April 2008 NAT and Firewall Traversal Issues of Host Identity Protocol (HIP) Communication

More information

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution ACCEPTED FROM OPEN CALL VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution Hechmi Khlifi, Jean-Charles Grégoire, and James Phillips, Université du Québec ABSTRACT In spite

More information

Peer-to-Peer Networks Hole Punching 7th Week

Peer-to-Peer Networks Hole Punching 7th Week Peer-to-Peer Networks Hole Punching 7th Week Department of Computer Science 1 Peer-to-Peer Networks NAT, PAT & Firewalls 2 2 Network Address Translation Problem too few (e.g. one) IP addresses for too

More information

Peer-to-Peer Networks 16 Hole Punching. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 16 Hole Punching. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 16 Hole Punching Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks NAT, PAT & Firewalls 2 Network Address Translation

More information

NAT Traversal for VoIP. Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University

NAT Traversal for VoIP. Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University NAT Traversal for VoIP Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University 1 What is NAT NAT - Network Address Translation RFC 3022

More information

Voice over IP Communications

Voice over IP Communications SIP The Next Big Step Voice over IP Communications Presented By: Stephen J. Guthrie VP of Operations Blue Ocean Technologies Goals What are our Goals for Today? Executive Summary: It is expected that real-time

More information

Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.

Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch. Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability

More information

An Examination of the Firewall/NAT Problem, Traversal Methods, and Their Pros and Cons

An Examination of the Firewall/NAT Problem, Traversal Methods, and Their Pros and Cons TRAVERSING FIREWALLS AND NATS WITH VOICE AND VIDEO OVER IP An Examination of the Firewall/NAT Problem, Traversal Methods, and Their Pros and Cons Traversing Firewalls and NATs With Voice and Video Over

More information

The H.323 NAT/FW Traversal Solution

The H.323 NAT/FW Traversal Solution Open Community Specification The H.323 NAT/FW Traversal Solution January 2014 International Multimedia Communications Consortium Summary This document describes the NAT/FW traversal solution defined by

More information

Peer-to-Peer Systems and Security

Peer-to-Peer Systems and Security Peer-to-Peer Systems and Security Network Address Translation Christian Grothoff Technische Universität München April 8, 2013 Freedom of connection with any application to any party is the fundamental

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza. SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication

More information

Firewalls P+S Linux Router & Firewall 2013

Firewalls P+S Linux Router & Firewall 2013 Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network

More information

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist baruch@deltathree.com. David Schwartz Director, Telephony Research davids@deltathree.

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist baruch@deltathree.com. David Schwartz Director, Telephony Research davids@deltathree. Baruch Sterman, Ph.D. Chief Scientist baruch@deltathree.com David Schwartz Director, Telephony Research davids@deltathree.com Table of Contents 2 3 Background Types of Full Cone Restricted Cone Port Restricted

More information

Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks

Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks Huawei Technologies Co., Ltd. All rights reserved. Contents Contents 1 Overview... 1 2 H.323...

More information

Network Address Translation (NAT)

Network Address Translation (NAT) Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT. Taken from http://www.cs.virginia.edu/~itlab/ book/slides/module17-nat.ppt 1 Private Network Private IP network

More information

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland marcin.matuszewski@nokia.com, esko.kokkonen@nokia.com Abstract This

More information

Keywords: VoIP, Mobile convergence, NGN networks

Keywords: VoIP, Mobile convergence, NGN networks VoIP Mobility Issues Gábor Bányász, Renáta Iváncsy Department of Automation and Applied Informatics and HAS-BUTE Control Research Group Budapest University of Technology and Economics Goldmann Gy. tér

More information

NAT and Firewall Traversal with STUN / TURN / ICE

NAT and Firewall Traversal with STUN / TURN / ICE NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.

More information

OVERVIEW OF ALL VOIP SOLUTIONS

OVERVIEW OF ALL VOIP SOLUTIONS OVERVIEW OF ALL VOIP SOLUTIONS Kovács Gábor Parnaki Zsolt Gergı 13/03/2009 TABLE OF CONTENTS Introduction Overview of VoIP protocols Standard based implementations: H.323 SIP Proprietary solutions: Skype

More information

CODO: Firewall Traversal by Cooperative On-Demand Opening *

CODO: Firewall Traversal by Cooperative On-Demand Opening * CODO: Firewall Traversal by Cooperative On-Demand Opening * Sechang Son, 1 Bill Allcock, 2 and Miron Livny 1 1 Computer Science Department, University of Wisconsin 2 Mathematics and Computer Science Division,

More information

White Paper. Traversing Firewalls with Video over IP: Issues and Solutions

White Paper. Traversing Firewalls with Video over IP: Issues and Solutions Traversing Firewalls with Video over IP: Issues and Solutions V Table of Contents Introduction Role of a Firewall Deployment Issues Relating to IP Video and Firewall Traversal The VCON SecureConnect Solution

More information

Skype characteristics

Skype characteristics Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications

More information

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1 Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...

More information

NAT Traversal for VoIP

NAT Traversal for VoIP NAT Traversal for VoIP Dr. Quincy Wu National Chi Nan University Email: solomon@ipv6.club.tw 1 TAC2000/2000 NAT Traversal Where is NAT What is NAT Types of NAT NAT Problems NAT Solutions Program Download

More information

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address

More information

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee

More information

Voice Over IP and Firewalls

Voice Over IP and Firewalls Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Use of Voice Over IP (VoIP) in enterprises is becoming more and more

More information

Adaptation of TURN protocol to SIP protocol

Adaptation of TURN protocol to SIP protocol IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 78 Adaptation of TURN protocol to SIP protocol Mustapha GUEZOURI,

More information

SECHANG SON. A dissertation submitted in partial fulfillment. Of the requirements for the degree of. Doctor of Philosophy. (Computer Sciences) At the

SECHANG SON. A dissertation submitted in partial fulfillment. Of the requirements for the degree of. Doctor of Philosophy. (Computer Sciences) At the 1 MIDDLEWARE APPROACHES TO MIDDLEBOX TRAVERSAL BY SECHANG SON A dissertation submitted in partial fulfillment Of the requirements for the degree of Doctor of Philosophy (Computer Sciences) At the University

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

Peer-to-Peer Communication Across Network Address Translators

Peer-to-Peer Communication Across Network Address Translators Peer-to-Peer Communication Across Network Address Translators Bryan Ford Massachusetts Institute of Technology baford@mit.edu Dan Kegel dank@kegel.com Pyda Srisuresh Caymas Systems, Inc. srisuresh@yahoo.com

More information

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: wechen@niu.edu.tw TEL: 03-9357400 # 255

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: wechen@niu.edu.tw TEL: 03-9357400 # 255 SIP Traversal over NAT 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: wechen@niu.edu.tw TEL: 03-9357400 # 255 Outline Introduction to SIP and NAT NAT Problem Definition NAT Solutions on NTP VoIP

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

TCP Connections for P2P Apps: A Software Approach to Solving the NAT Problem

TCP Connections for P2P Apps: A Software Approach to Solving the NAT Problem Carnegie Mellon University Research Showcase @ CMU Institute for Software Research School of Computer Science 2005 TCP Connections for P2P Apps: A Software Approach to Solving the NAT Problem Jeffrey L.

More information

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0) for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5

More information

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility) Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol

More information

Solving the Firewall and NAT Traversal Issues for SIP-based VoIP

Solving the Firewall and NAT Traversal Issues for SIP-based VoIP Solving the Firewall and Traversal Issues for SIP-based VoIP Yevgeniy Yeryomin Technische Universität Ilmenau Germany, 98693 Ilmenau EMail: yevgeniy.yeryomin@tu-ilmenau.de Florian Evers Technische Universität

More information

Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol

Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol Mario Baldi, Fulvio Risso, Livio Torrero Dipartimento di Automatica e Informatica, Politecnico di Torino, Torino, Italy {mario.baldi,

More information

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application

More information

Internet Ideal: Simple Network Model

Internet Ideal: Simple Network Model Middleboxes Reading: Ch. 8.4 Internet Ideal: Simple Network Model Globally unique identifiers Each node has a unique, fixed IP address reachable from everyone and everywhere Simple packet forwarding Network

More information

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

Network Working Group. Category: Informational January 2002

Network Working Group. Category: Informational January 2002 Network Working Group D. Senie Request for Comments: 3235 Amaranth Networks Inc. Category: Informational January 2002 Status of this Memo Network Address Translator (NAT)-Friendly Application Design Guidelines

More information

Design of a SIP Outbound Edge Proxy (EPSIP)

Design of a SIP Outbound Edge Proxy (EPSIP) Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

Solving the Firewall/NAT Traversal Issue of SIP:

Solving the Firewall/NAT Traversal Issue of SIP: Solving the Firewall/NAT Traversal Issue of SIP: Who Should Control Your Security Infrastructure? Ingate Systems www.ingate.com 1 1 Executive Summary...3 2 SIP, NATs and Enterprise Firewalls...4 3 Methods

More information

Peer-to-Peer Communication Across Network Address Translators

Peer-to-Peer Communication Across Network Address Translators Peer-to-Peer Communication Across Network Address Translators Bryan Ford Massachusetts Institute of Technology baford@mit.edu Dan Kegel dank@kegel.com Pyda Srisuresh Caymas Systems, Inc. srisuresh@yahoo.com

More information

Skype VoIP service- architecture and comparison

Skype VoIP service- architecture and comparison Skype VoIP service- architecture and comparison Hao Wang Institute of Communication Networks and Computer Engineering University of Stuttgart Mentor: Dr.-Ing. S. Rupp ABSTRACT Skype is a peer-to-peer (P2P)

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

A Realization method of Voice over IP System Passing Through Firewall and its Implementation

A Realization method of Voice over IP System Passing Through Firewall and its Implementation A Realization method of Voice over IP System Passing Through Firewall and its Implementation Masashi Ito and Akira Watanabe Graduate School of Science and Technology, Meijo University, Japan m0432004@ccmailg.meijo-u.ac.jp,

More information

How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?

How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication? How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication? Nick Hawkins Director, Technology Consulting Polycom, Inc. All rights reserved. Agenda Introduction & standards Requirements

More information

Creating your own service profile for SJphone

Creating your own service profile for SJphone SJ Labs, Inc. 2005 All rights reserved SJphone is a registered trademark. No part of this document may be copied, altered, or transferred to, any other media without written, explicit consent from SJ Labs

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address NAT Introduction: Vidyo Conferencing in Firewall and NAT Deployments Vidyo Technical Note Section 1 The VidyoConferencing platform utilizes reflexive addressing to assist in setup of Vidyo calls. Reflexive

More information

NetScaler carriergrade network

NetScaler carriergrade network White Paper NetScaler carriergrade network address translation Preserve IPv4 network investments, consolidate application delivery control in one platform and lower capex and opex Protect your investment

More information

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

BroadCloud PBX Customer Minimum Requirements

BroadCloud PBX Customer Minimum Requirements BroadCloud PBX Customer Minimum Requirements Service Guide Version 2.0 1009 Pruitt Road The Woodlands, TX 77380 Tel +1 281.465.3320 WWW.BROADSOFT.COM BroadCloud PBX Customer Minimum Requirements Service

More information

Best Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011

Best Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011 Best Practices for Role Based Video Streams (RBVS) in SIP IMTC SIP Parity Group Version 33 July 13, 2011 Table of Contents 1. Overview... 3 2. Role Based Video Stream (RBVS) Best Practices Profile... 4

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

IP Ports and Protocols used by H.323 Devices

IP Ports and Protocols used by H.323 Devices IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential

More information

IPv6 Specific Issues to Track States of Network Flows

IPv6 Specific Issues to Track States of Network Flows IPv6 Specific Issues to Track States of Network Flows Yasuyuki Kozakai Corporate Research & Development Center, Toshiba Corporation yasuyuki.kozakai@toshiba.co.jp Hiroshi Esaki Graduate School of Information

More information

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes ZyXEL V100 (V100 Softphone 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V100 Softphone...3 2. Setting up the V100 Softphone.....4 3. V100 Basic Phone Usage.....7

More information

Terminology and Definitions Acronyms and Abbreviations Acknowledgement

Terminology and Definitions Acronyms and Abbreviations Acknowledgement Contents Foreword Terminology and Definitions Acronyms and Abbreviations Acknowledgement xiii xv xvii xxi 1 Introduction 1 1.1 General Introduction 1 1.2 On Voice over IP and Telephony over IP 2 1.3 Context

More information

Application Note. Onsight Connect Network Requirements v6.3

Application Note. Onsight Connect Network Requirements v6.3 Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...

More information

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt A SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt IETF65, Dallas March 25, 2006 Eunsoo Shim Sathya Narayanan Greg Daley Panasonic Digital Networking Laboratory Two Layer Approach

More information

LinkProof And VPN Load Balancing

LinkProof And VPN Load Balancing LinkProof And Load Balancing Technical Application Note May 2008 North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

RSVP as Firewall Signalling Protocol

RSVP as Firewall Signalling Protocol RSVP as Firewall Signalling Protocol Utz Roedig 1, Manuel Görtz 1, Martin Karsten 1, Ralf Steinmetz 1,2 1 Industrial Process and System Communications, Darmstadt University of Technology, Germany 1 German

More information

Implementation of a NAT and Firewall Traversal Library

Implementation of a NAT and Firewall Traversal Library Implementation of a NAT and Firewall Traversal Library Damien Auroux Supervisors: Prof. Karl Aberer Nicolas Bonvin Distributed Systems Laboratory January 1, 2009 Presentation Outline I- Motivations and

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile

More information

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration ICS 351: Today's plan IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration IP address exhaustion IPv4 addresses are 32 bits long so there

More information

NAT and Firewall Traversal with STUN / TURN / ICE

NAT and Firewall Traversal with STUN / TURN / ICE NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.

More information

Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking & Distributed Systems

Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking & Distributed Systems Brochure More information from http://www.researchandmarkets.com/reports/2172101/ Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking

More information

Developing P2P Protocols across NAT

Developing P2P Protocols across NAT Developing P2P Protocols across NAT Girish Venkatachalam Abstract Hole punching is a possible solution to solving the NAT problem for P2P protocols. Network address translators (NATs) are something every

More information

A Comparative Study of Signalling Protocols Used In VoIP

A Comparative Study of Signalling Protocols Used In VoIP A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.

More information

Nokia E65 Internet calls

Nokia E65 Internet calls Nokia E65 Internet calls Nokia E65 Internet calls Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document

More information

A Technical FAQ. Frequently Asked Questions About Voice and Video over IP Networks. January 2003. Saqib Jang, Margalla Communications

A Technical FAQ. Frequently Asked Questions About Voice and Video over IP Networks. January 2003. Saqib Jang, Margalla Communications A Technical FAQ Frequently Asked Questions About Voice and Video over IP Networks January 2003 Saqib Jang, Margalla Communications E. Brent Kelly, Wainhouse Research Andrew W. Davis, Wainhouse Research

More information

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation Deploying IPv6, Now Christian Huitema Architect Windows Networking & Communications Microsoft Corporation Agenda The Opportunity Key Problems The Promise of IPv6 What is Microsoft doing Call to Action

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Category: Informational Juniper Networks, Inc. August 1998. Load Sharing using IP Network Address Translation (LSNAT)

Category: Informational Juniper Networks, Inc. August 1998. Load Sharing using IP Network Address Translation (LSNAT) Network Working Group Request for Comments: 2391 Category: Informational P. Srisuresh Lucent Technologies D. Gan Juniper Networks, Inc. August 1998 Load Sharing using IP Network Address Translation (LSNAT)

More information

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

ECMA TR/91. Enterprise Communication in Next Generation Corporate Networks (NGCN) involving Public Next Generation Networks (NGN)

ECMA TR/91. Enterprise Communication in Next Generation Corporate Networks (NGCN) involving Public Next Generation Networks (NGN) ECMA TR/91 1 st Edition / December 2005 Enterprise Communication in Next Generation Corporate Networks (NGCN) involving Public Next Generation Networks (NGN) Technical Report ECMA TR/91 1 st Edition /

More information

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence

More information