A Technical Analysis of SIP and P2P Networks Centralization and Decentralization

Size: px
Start display at page:

Download "A Technical Analysis of SIP and P2P Networks Centralization and Decentralization"

Transcription

1 A Technical Analysis of SIP and P2P Networks Centralization and Decentralization Xie Xiaolei Helsinki University of Technology Abstract The session initiation protocol (SIP) is an application layer control protocol intended for creating, modifying and terminating multi-participant sessions such as internet telephony, conferencing, messaging and file transfer. The functionalities of SIP are organized in a centralized manner and heavily rely on dedicated servers. Moreover, in order to accomplish the data transmission in those sessions, SIP must be used in combination with other protocols such as RTP, RTSP, SDP, though it does not depend on such protocols. In contrast, the same functionalities are provided by P2P protocols in a totally decentralized manner. Among them, Skype is characteristic. It works in a decentralized fashion both in session initiation and in the following data transmission. In this paper we evaluate the advantages and disadvantages of these two approaches, from a perspective of centralization and decentralization. The area of the evaluation includes session setup latency, quality of service and protocol openess. KEYWORDS: Peer-to-Peer (P2P), Voice over IP (VoIP), Session Initiation Protocol (SIP) 1 Introduction The session initiation protocol (SIP) is a protocol designed to setup sessions. The typs of such sessions may vary from message sessions in chat systems to multimedia and multiparticipant sessions in internet telephony or conference. Currently the standardized version of SIP, RFC 3261, accomplishes its task by setting up lots of servers to provide registration, proxy, and location services to clients. This centralized architecture is rather traditional and undoubtedly has its advantages, e.g. a low latency in connection establishment, but on the other hand, it also has some critical drawbacks, such as being subject to denial-of-service attacks, the lack of robustness and scalability, etc. P2P protocols such as Skype and emule, while providing the same functionalities of internet telephony, conferencing, etc, do not suffer from those problems. By organizing their overlay networks in a decentralized fashion, P2P protocols become much more robust and scalable than their competitors of the traditional fashion. This is why many efforts have been taken recently to incorporate the P2P technology into SIP. A complete session discussed in the above can be roughly divided into three phases connection establishment, data transmission and session termination. The differences between centralization and decentralization are most remarkably manifested in the first two phases. Thus in this paper we shall focus on the behavior of SIP and P2P networks during these two phases. In the next section we shall take a close look at the process of connection establishment in SIP and in a P2P framework, for the latter of which, Skype is taken as a case study. Then we tend to file transfer in both networks. For SIP, the internet draft published as [9] is carefully studied; for P2P, because the protocol used by Skype is not open to the public, we turn our attention to emule, a popular P2P file sharing application with an open protocol. It is notable that Skype originates from the file sharing application KaZaa [11]. Thus we have a good reason to believe that studies of such an application will reveal to us the mechanisms of P2P data transmission, including those employed by VoIP applications such as Skype. 2 Connection Establishment 2.1 SIP Registration The premise of any dialog in SIP, which involves the inviter and an invitee, is a successful registration of the latter. In other words, a user agent server (UAS) must first register itself to a local registrar server and hence make itself reachable through the local location service before it is able to receive any incoming INVITE request. The registration is done by issuing a REGISTER request to the local registrar server, indicating the domain for which the registration is meant, the user name to be registered and a list of contacts to be bound with the domain and the user name. A contact specified in the list could be of any URI scheme, such as a telephone number with a tel URL, an address with a mailto URL or a more specific SIP/SIPS URI. Some other information is also included in the REGISTER request, but for clarification it is omitted here. Now that a user agent client (UAC) has constructed a REGISTER request, its next task is to locate a registrar server and send the request to the server. There are three alternatives specified in RFC 3261 [1] for the UAC to carry out this task. The first is to follow local configurations. The UAC may be configured with the address of a local registrar server and when needed, send the request there without any

2 extra efforts. Secondly, the UAC may send the request to the host that appears in the SIP address in question. For example, if the SIP address is the UAC may send the request to sip:tkk.fi using the normal SIP server location mechanisms. Finally, the UAC can send the REGISTER request to the well-known "all SIP servers" multicast address "sip.mcast.net", which translates to A UAS listening to this address will receive the request and make bindings accordingly Invite Request Here we take a close look at the process that starts a SIP call session, which literally comprises one or more dialogs. A session is always started by the originator sending INVITE requests to desired participants. Such a request includes in its header fields, among others, the address of the recipient, which can be of any URI scheme as is a contact in the REG- ISTER request, the address of the originator, the ID of the attempted call, and a sequence number of the request. [1] Once the request is generated, the UAC computes the destination by querying DNS for SRV (Service record) and NAPTR (Naming Authority Pointer) records about the domain specified in the targeted SIP address [3] (tkk.fi as in alice@tkk.fi), or by following local policies if any. [1] Then the request is sent. If its receiver is a stateless UAS, which is primarily used to handle unauthenticated requests, a challenge response is most likely to be generated; if the receiver is a redirect server, which has access to some location service, the server would use the service to generate a list of alternative locations and return it in a final response. [1] If, however, the receiver of the INVITE request is a proxy server, the successive operations become more complicated. The proxy server will first validate the request. This procedure includes checking the URI scheme, the Max-Forwards field, the Proxy-Require field, etc. If one of these checks fails, the server will conclude the request by responding with an error code. [1] If the request passes the validation, the proxy server will preprocess the route information contained in the request and then determine the target of the request and finaly forward it. [1] After all these relays by the intermediate servers, the IN- VITE request will eventually arrive at its desired UAS and if it is accepted, the two parties will start data transmission using a transport protocol. 2.2 Skype Registration According to [6], user directories in Skype are maintained in a totally decentralized manner, by utilizing the Global Index (GI) technology. GI constructs a multi-tiered overlay network where every node gains full knowledge of all the available users and resources not by contacting a central server but by participating in the communication between super nodes. This way the central login server, which used to be a vital component in the Skype network, can be removed and with it the bottleneck of the whole network performance. During the first login after installation, a Skype client (SC) sends UDP packets, if UDP is not restricted, to some well-known Skype nodes (bootstrap super nodes, as they are called in [2]) and establishes a TCP connection with those that respond. However, if UDP is restricted by a firewall, the SC will try to establish a TCP connection with one of the bootstrap super nodes. At the end of a login process, an SC tries to advertise its arrival in the Skype network by sending UDP packets to other online nodes. This attempt will be made as long as the SC is not behind a UDP-restricted firewall. After that, according to the received responses, the SC will maintain a table of reachable online nodes and, once its super node [2] goes down, it will resort to these nodes instead. It is notable that the SC maintains in the windows registry a list of possible super nodes. This list is first populated by the bootstrap super nodes during the first-time login, and then, as we conjecture, enriched by election from the table of online nodes User Location In order to start a multimedia session with another user identified by a Skype user ID, an SC must first find out the availability of that user and if the user is available, the address of it, before the session can be initiated. Because the Skype protocol is not open and its messages are encrypted, detailed investigations into this process is impossible. However, according to the experiments in [2], the super node of an SC is responsible for providing candidates of the desired user for the SC to query. The first batch of candidates provided by the super node contains 4 address-port pairs and the next contains 8, and so on. If the desired user is not found in one batch, the SC will contact its super node for the next. It remains unknown how the SC decides to terminate the search if the user is not found. 2.3 An Evaluation Latency is obviously the major concern when we consider connection establshment, hence it should be the main criteria in evaluating the two approaches. The widely deployed servers in the SIP architecture now show their contributions: The redirect servers, which provide location services to each other and proxy servers, are carefully configured with local information and consequently are able to route a request/response more accurately to its destination. Thus after a few hops, the request/response will be eventually delivered. In contrast, P2P protocols may incur many more efforts to do the same. In general, the capability and hence responsibility of a node in a P2P network change from time to time, making the information about it stored by other nodes out of date and leading to incorrect routing. Nevertheless, a node may leave its network abruptly and as a result, the affected part of the network has to be re-structured, causing a high latency or even connection failure. However, when we consider the openness as well as the adaptability of protocol, SIP is definitely more preferable. SIP is intended to be a general mechanism for internet telephony and hence its registration process is highly scalable and can be easily adapted to specific administrative policies.

3 On the opposite, Skype is intended and designed to be a proprietary service. It does not follow any open standard to make possible cooperating with other internet telephony software, nor does it support configuration to a specific local area network (LAN) environment. 3 File Transfer 3.1 File Transfer in SIP MSRP The Message Session Relay Protocol (MSRP) is a protocol intended to transfer a series of messages in a SIP session. However, the capability of MSRP is not restricted to the transmission of plain-text messages. Furthermore, it is able to transfer any content that is compliant with the Multipurpose Internet Mail Extensions (MIME) [12], including audio and vedio clips. [9] The basic idea of file transfer using MSRP in a SIP session is to embed the file in question into the stream of instant messages as a MIME object. Moreover, in order to avoid blocking the interactive message exchange while transferring a large file, the same transport connection is shared between both transmission operations. [9]. In the following sections, we shall take a closer look at MSRP Message Partition Since the same transport connection is shared between the transfer of files and the transfer of instant message streams, a large file must be partitioned, and the transmission of the resulting parts must be regularly interrupted, so that the message stream is allowed some chances to be transferred. MSRP provides such a mechanism that allows a large file to be delivered using several SEND requests (such SEND requests are hereafter referred to as MSRP requests in the rest of this section), each of which carries a single chunck of the file. And in turn, each of these chuncks can be interrupted during its transmission. [9] To make possible the partition mechanism, an MSRP request always starts with a unique identifier, which is also regarded as the terminating symbol of the last request. Also, included at the end of the ending line of an MSRP request is a flag that indicates whether the chunck carried by the current request is the last chunk of the message (which contains the file being transferred). Moreover, in the header field of the MSRP request, there is a byte-range header that indicates the overall position of the current chunck in the complete message. With the help of this header, the message can be reconstructed even if the arrival of the seperate messages are disordered. [9] The following figure depicts the partition mechanism described in the above: + <- (1) <- (2) + <- (3) + <- (4) <- (5)... + <- (6) + <- (7)... <- (8)... $ <- (9) 1. beginning of the file and the 1st chunck; the 1st SEND request 2. 1st interrupt 3. the file is to be continued 4. beginning of the 2nd chunck; 2nd SEND request 5. the 2nd interrupt 6. the file is to be continued 7. beginning of the i-th chunck 8. the n-th interrupt 9. the end of the message (file) A Transaction of File Transfer When an MSRP end-point wishes to send a file to another end-point, it will first look into the type of the other endpoint s URL to determine the type of transport connection that it is supposed to use (TLS, TCP, etc.). Particularly, if the URL scheme of the other end-point is msrp:, then a TLS connection must be used. [9] MSRP advocates reusing transport connections. Whenever a connection is needed, the party in question should first check whether it already has a connection associated with the desired host, port and URL scheme. And if it does, it should reuse the existing connection. [9]Following this rule, embedding files into active message streams will be a common case. This strategy positively reduces the number of connections involved in each session and hence reduces the overall transportation cost. However, due to the fragile nature of end-to-end transportation in networks with a low quality of service, we would still expect the transmission of very large file eg. using MSRP in such networks to be error-prone and consequently not practical. Anyway, MSRP is only intended for casual file transfer in message sessions instead of large-scale resource spreading, which is the designed capability of many popular P2P networks, e.g. emule.

4 3.2 File Transfer in P2P P2P File Transfer in General File transfer (sharing) is one of the best known uses of P2P technology. A node joins the P2P overlay network by connecting to some of the nodes that are already in the network. When a node wishes to download a file, it will contact its neighbors to locate the providers of the file and then request those providers to transfer the file Distributed Hash Table Nowadays most P2P systems use a Distributed Hash Table (DHT) to locate resources. In such a system, every resource is assigned a resouce-id, which is obtained by hashing some keyword of the resource that uniquely identifies the resource. On the other hand, the nodes in the overlay network are also each assigned a node-id, which is in the same hash space as the resource-id s. [13] A node in the overlay network is responsible for storing the resources whose resource-id s are close to the node s node-id. When a node enters/leaves the overlay network, the responsibility area of each node in the network will be recalculated, so that the hash space of the resource-id s is always completely covered. After the re-calculation, the nodes in the overlay network will exchange resources to cover their own responsibility areas. [13] In most P2P architectures, e.g. Skype, emule, a node in the DHT knows about more other nodes in the DHT as the distance of interest decreases. When a user tries to search for a resource, the node in which it resides will contact the node that it knows about and that has the node-id closest to the desired resource-id. If, however, the contacted node does not have the requested resource, it will either suggest the closest node that it knows about, or instead consult that node itself and then returns the answer. [13] In this fashion, a request will eventually reach the node that is responsible for the desired resource; that node will then reply to the requester. [13] Chord Chord is a popular DHT algorithm. It organizes the hash space of DHT in a ring structure. In this structure, the node with hash value 0 will be considered ajacent to the node with hash value 2 n 1 in the DHT, where 2 n 1 is the largest possible value in the hash space. Moreover, each node in the structure keeps a table of n pointers to other nodes. The i- th (0 <= i <= n-1) pointer in this table points to a node that is at least 2 i units away from the node in question. Thus the farthest colleague that a node knows about will be 2 n 1 units away, the longest distance possible in the DHT, and as the considered distance decreases, more and more colleague nodes are within its acquaintance. [13] File search in chord is done by sending requests to the node with the node-id closest to the desired resource-id. That node will know about more nodes in that area of the DHT (or has a better resolution about that area of the DHT, as is said in [13]) and hence, by following the same rule of closest node-id, it will be able to route the request closer to the node that is responsible for storing the desired resource. This process will be repeated recursively until the request eventually arrives at the node of responsibility A case Study of emule In this section we shall look at emule more closely. emule is one of the most popular P2P file sharing applications. Through a careful study of it, we demonstrate the decentralized nature of P2P and the great powers this nature brings. In the first part we go through a transaction of emule file transfer, and look into the collaboration between different nodes; then in the second part we study a file search operation initiated by a human user. A Transaction of File Transfer The emule overlay network comprises several hundreds of dedicated servers and millions of clients. Upon startup, an emule client will try to connect to a single emule server using TCP and if successful, it will be assigned a client ID, which will be valid until the TCP connection is closed. [4] There are two categories of client ID s in the emule network [4]: high ID s and low ID s. High ID s are only given to those clients that are able to accept incoming TCP connections and these ID s are simply the big endian representation of each client s IP address. Clients other than those are given low ID s, which are lower than 0x Being assigned a low ID has several implications. First of all, as the bearer of the ID is unable to accept incoming connections, all its communication has to be done through the emule server. This will result in a higher probability of rejection by the latter when the client makes its startup connecting attempt. Secondly, as emule servers don t support forwarding requests between each other, a low ID client is unable to interact with another low ID client connected to a different server. [4] After successfully establishing a TCP connection with an emule server, a client sends to the server a list of its shared files and following that a list of files that it wishes to download. In response, the server will send the client a list of other clients that share the files desired by the latter. Then the client will contact those in the list to request that it be added to their download queue. In the same request, it will also specify which file parts are desired by it. [4] Usually, a client will request the file parts that are owned by fewest other uploading clients so as to aid the distribution of those file parts. By doing so, the rare parts are more quickly spreaded and hence are less likely to become a bottleneck. However, so far I haven t found out how a client knows which parts of a file an uploading client owns or which uploading clients have which parts among those it needs. [4] Nevertheless, the low ID clients are unable to accept incoming requests, so the requests directed to them have to be relayed by the server to which they are connected. Such requests directed to a low ID client are called callback requests. Upon receiving such a request, the server will send the low ID client a "callback requested" message containing the address and port number of the request s initiator and ask the low ID client to call back. Obviously, these callback re-

5 quests can be initiated only by the high ID clients, which are capable of accepting incoming connections. [4] When a request has reached the top of another client s download queue, its initiator will be informed by a connection request from the uploader. if, however, at this moment the initiator has obtained the previously needed file part, it will reject the request. This is not an unusual case since the same client can be in the download queue of several other clients, requesting the same file parts; yet, when it completes downloading a file part, it does not cancel its requests to other clients, but simply rejects those clients connection initiatives when they are made. Here we should note that keeping the registrations no longer needed is better than canceling them, as the former approach does not require an extra log of download requests. [4] Moreover, how fast a request advances in a download queue is dependent on who has sent it. In the emule network, each client is identified by a unique user ID, which is a concatenation of 14 random and 2 fixed bytes and which is valid across sessions. The user ID s are related to a credit system. The more files a user has uploaded to others, the faster the requests sent by this user will advance. In order to support this credit system, an encryption scheme is integrated into the emule protocol to prevent impersonating. [4] File Search A file search operation is first initiated from the user interface. Then the emule client will send the search request to its server. In response, the server will send back a list containing the sources for each of the requested files. After getting this list, the client will send download request(s) to each source. [4] However, a client can have only one connection with the same source even if it wishes to download more than one file from the latter. So it has to decide which file to request when several are available. Currently this decision is based on the priority specified by the user and if the user doesn t specify any, the files will be requested in alphabetical order. [4] In our opinion, some improvements could be made to the above algorithm so as to achieve higher performance and/or better user satisfaction. For instance, if a client chooses to first download the file that has the smallest uncompleted portion, a better user experience can be expected. 3.3 An Evaluation between the Two Solutions The file transfer mechanism proposed by MSRP is fairly suitable for casual file transfer involved in message sessions. Its advocation of connection reuse helps save the cost of connection establishment, as is undoubtedly a good measure to enhance the overall efficiency of the SIP network. The strategy of file partitioning, on the other hand, gives an effective solution to the potential blocking of interactive message streams, provided that a single connection will be used for both message delivery and file transfer. MSRP serves as a good solution to file transfer in message sessions where human users are actively participating and files in question are relatively small, but it is definitely not a good candidate for file sharing in larger scales, which inherently requires better robustness and scalability. In this realm P2P technologies come to show their great powers. The most fundamental idea of the Peer-to-Peer architecture is that every node of the network has an equal importance in the network and that each node serves others with its resources, e.g. data, bandwidth, and processing capability, while enjoying services provided by others. Although a particular node may be unable to provide certain services and when it is able to, the quality of service may vary from time to time, the overlay network as a whole, in most cases, is able to provide the intended services and furthermore, maintain the quality at a decent level. With the P2P architecture, the robustness and scalability of an overlay network are more easily achievied but, nevertheless, P2P also brings its own problems, such as being subject to denial-of-service attacks, file searches being unable to exploit the entire overlay network, the necessity of re-structuring, etc. Targeting at these problems, a variety of DHT algorithms have been proposed and studied. Hopefully, these efforts will yield a satisfactory solution. 4 Conclusion First of all, what SIP describes is a general mechanism for internet telephone calls, multimedia distribution, and multimedia conferences. Presented by SIP is a flexible and extensible overlay network that consists of sub-networks, independant service providers, end users and so on. Furthermore, these components could be various interest parties, for example, commercial/non-commercial VoIP operators, location service providers, Internet service providers (ISP), etc. In a word, all kinds of participants can be easily involved and differently configured networks can be seamlessly integrated into the SIP network. In contrast, the P2P counterparts of SIP, for example, Skype and emule, do not enjoy such flexibility and extensibility. Their networks are each dedicated to a specific functionality and each have their own user group and are not expected to merge easily. From this point of view, SIP certainly has a big advantage. However, when performance becomes the major concern, P2P networks such as Skype prevails. P2P networks are designed to be scalable yet providing a high-quality service. As we understand, such desirable features originate from the distributed nature of P2P networks and the clever algorithms fully utilizing this nature. On the other hand, SIP heavily relies on servers for location service, request redirection (redirect servers) and delegation (proxy servers) and hence are not as scalable as its P2P counterparts. Moreover, owing to the limited capabilities of the SIP servers as well as to the end-to-end data transmission (using RTP, MSRP, etc), the quality of service offered by SIP, on average, may not be as good as that offered by P2P networks. For these reasons, recent efforts have been taken to incorporate P2P technologies into the SIP framework.

6 References [1] J. Rosenberg, etc. SIP: Session Initiation Protocol. RFC 3261, IETF Network Working Group, June [2] Salman A. Baset and Henning Schulzrinne. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. September 15, [3] J. Rosenberg, H. Schulzrinne. Session Initiation Protocol (SIP): Locating SIP Servers June, [4] Yoram Kulbak and Danny Bickson. The emule Protocol Specification. January 20, [5] H. Schulzrinne, etc. RTP: A Transport Protocol for Real-Time Applications January, [6] Skype Limited. P2P Telephony Explained For Geeks Only [7] D. Milojicic, V.Kalogeraki, R. M. Lukose, K. Nagaraja, J. Pruyne, B. Richard, S. Rollins, and Z. Xu. Peer-to-Peer computing. technical report HPL , Technical Publications Department, HP Labs Research Library, March, 2002 [8] A. Gupta, B. Liskov, and R. Rodrigues. One hop lookups for peer-to-peer overlays. In HotOS IX: The 9th workshop on hot topics in operating systems, Lihue, Hawaii, USA, May USENIX [9] J. Rosenberg, M. Isomaki, et al A Mechanism to Enable File Transfer with the Session Initiation Protocol (SIP) February 23, [10] B. Campbell, R. Mahy, C. Jennings The Message Session Relay Protocol (MSRP) February 25, [11] Sharman Networks Ltd How Peer-To-Peer (P2P) and Kazaa Software Works February 23, [12] Freed, N. and N. Borenstein Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Bodies, RFC 2045 November [13] D. Bryan, B. Lowekamp, et al A P2P Approach to SIP Registration and Resource Location draft-bryansipping-p2p-02 Internet-Draft March 5,2006

A Comparative Study of Signalling Protocols Used In VoIP

A Comparative Study of Signalling Protocols Used In VoIP A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

EE4607 Session Initiation Protocol

EE4607 Session Initiation Protocol EE4607 Session Initiation Protocol Michael Barry michael.barry@ul.ie william.kent@ul.ie Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional

More information

RELOAD Usages for P2P Data Storage and Discovery

RELOAD Usages for P2P Data Storage and Discovery RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf Alexander.Knauf@Haw-Hamburg.de Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference

More information

SIP : Session Initiation Protocol

SIP : Session Initiation Protocol : Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification

More information

Session Initiation Protocol and Services

Session Initiation Protocol and Services Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Written by: Salman A. Baset and Henning G. Schulzrinne (Colombia University, NY) CIS 6000 Distributed Systems Benjamin Ferriman bferrima@uoguelph.ca

More information

Skype VoIP service- architecture and comparison

Skype VoIP service- architecture and comparison Skype VoIP service- architecture and comparison Hao Wang Institute of Communication Networks and Computer Engineering University of Stuttgart Mentor: Dr.-Ing. S. Rupp ABSTRACT Skype is a peer-to-peer (P2P)

More information

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Session Initiation Protocol (SIP) The Emerging System in IP Telephony Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol

More information

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza. SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication

More information

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland marcin.matuszewski@nokia.com, esko.kokkonen@nokia.com Abstract This

More information

Best Practices for Controlling Skype within the Enterprise. Whitepaper

Best Practices for Controlling Skype within the Enterprise. Whitepaper Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

User authentication in SIP

User authentication in SIP User authentication in SIP Pauli Vesterinen Helsinki University of Technology pjvester@cc.hut.fi Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia

More information

Contents. Specialty Answering Service. All rights reserved.

Contents. Specialty Answering Service. All rights reserved. Contents 1. Introduction to Session Internet Protocol... 2 2. History, Initiation & Implementation... 3 3. Development & Applications... 4 4. Function & Capability... 5 5. SIP Clients & Servers... 6 5.1.

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

A Peer-to-peer Secure VoIP Architecture

A Peer-to-peer Secure VoIP Architecture A Peer-to-peer Secure VoIP Architecture Simone Cirani, Riccardo Pecori, and Luca Veltri Abstract Voice over IP (VoIP) and multimedia real-time communications between two ore more parties are widely used

More information

7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP

7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP Burapha University ก Department of Computer Science 7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP

More information

SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP

SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott

More information

(Refer Slide Time: 6:17)

(Refer Slide Time: 6:17) Digital Video and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 39 Video Conferencing: SIP Protocol

More information

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt A SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt IETF65, Dallas March 25, 2006 Eunsoo Shim Sathya Narayanan Greg Daley Panasonic Digital Networking Laboratory Two Layer Approach

More information

SIP: Ringing Timer Support for INVITE Client Transaction

SIP: Ringing Timer Support for INVITE Client Transaction SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna (poojan@motorola.com) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone

More information

White paper. SIP An introduction

White paper. SIP An introduction White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary

More information

A Lightweight Secure SIP Model for End-to-End Communication

A Lightweight Secure SIP Model for End-to-End Communication A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract

More information

Chapter 2 PSTN and VoIP Services Context

Chapter 2 PSTN and VoIP Services Context Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using

More information

Peer-to-Peer Internet Telephony using SIP

Peer-to-Peer Internet Telephony using SIP Peer-to-Peer Internet Telephony using SIP Kundan Singh and Henning Schulzrinne Department of Computer Science, Columbia University 1214 Amsterdam Ave, Mail Code 0401 New York, NY 10027, USA {kns10,hgs}@cs.columbia.edu

More information

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,

More information

Network Convergence and the NAT/Firewall Problems

Network Convergence and the NAT/Firewall Problems Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

A Scalable Multi-Server Cluster VoIP System

A Scalable Multi-Server Cluster VoIP System A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu mcliang@nuk.edu.tw {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department

More information

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl

More information

SIP: Protocol Overview

SIP: Protocol Overview SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright

More information

An Efficient Server Load Balancing using Session Management

An Efficient Server Load Balancing using Session Management An Efficient Server Load Balancing using Session Management S.Tharani 1, Balika.J.Chelliah 2, Dr.J.Jagadeesan 3 1 M.Tech.Computer Science and Engg, Ramapuram campus, 2 Asst.prof, Ramapuram campus, 3 Prof,

More information

Skype network has three types of machines, all running the same software and treated equally:

Skype network has three types of machines, all running the same software and treated equally: What is Skype? Why is Skype so successful? Everybody knows! Skype is a P2P (peer-to-peer) Voice-Over-IP (VoIP) client founded by Niklas Zennström and Janus Friis also founders of the file sharing application

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

SIP: Ringing Timer Support for INVITE Client Transaction

SIP: Ringing Timer Support for INVITE Client Transaction SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna (poojan@motorola.com) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone

More information

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX

More information

SIP, Session Initiation Protocol used in VoIP

SIP, Session Initiation Protocol used in VoIP SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1

More information

SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System

SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System 1 SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System David A. Bryan and Bruce B. Lowekamp Computer Science Department College of William and Mary Williamsburg, VA 23185 {bryan, lowekamp}@cs.wm.edu Abstract

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars

More information

Multimedia Communications Voice over IP

Multimedia Communications Voice over IP Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony

More information

This specification this document to get an official version of this User Network Interface Specification

This specification this document to get an official version of this User Network Interface Specification This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into

More information

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

Basic Vulnerability Issues for SIP Security

Basic Vulnerability Issues for SIP Security Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future

More information

A Realization method of Voice over IP System Passing Through Firewall and its Implementation

A Realization method of Voice over IP System Passing Through Firewall and its Implementation A Realization method of Voice over IP System Passing Through Firewall and its Implementation Masashi Ito and Akira Watanabe Graduate School of Science and Technology, Meijo University, Japan m0432004@ccmailg.meijo-u.ac.jp,

More information

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in

More information

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist baruch@deltathree.com. David Schwartz Director, Telephony Research davids@deltathree.

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist baruch@deltathree.com. David Schwartz Director, Telephony Research davids@deltathree. Baruch Sterman, Ph.D. Chief Scientist baruch@deltathree.com David Schwartz Director, Telephony Research davids@deltathree.com Table of Contents 2 3 Background Types of Full Cone Restricted Cone Port Restricted

More information

Voice over IP Fundamentals

Voice over IP Fundamentals Voice over IP Fundamentals Duration: 5 Days Course Code: GK3277 Overview: The aim of this course is for delegates to gain essential data networking and Voice over IP (VoIP) knowledge in a single, week-long

More information

Best Practices for Controlling Skype within the Enterprise > White Paper

Best Practices for Controlling Skype within the Enterprise > White Paper > White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it

More information

Multimedia Conferencing with SIP

Multimedia Conferencing with SIP Multimedia Conferencing with SIP Signalling Demands in Real-Time Systems Multimedia Networking: Protocol Suite Conferencing: VoIP & VCoIP SIP SDP/SAP/IMG Signalling Demands Media Types can be signalled

More information

Design of a SIP Outbound Edge Proxy (EPSIP)

Design of a SIP Outbound Edge Proxy (EPSIP) Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation

More information

Session Initiation Protocol

Session Initiation Protocol TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects

More information

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution ACCEPTED FROM OPEN CALL VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution Hechmi Khlifi, Jean-Charles Grégoire, and James Phillips, Université du Québec ABSTRACT In spite

More information

Implementing Intercluster Lookup Service

Implementing Intercluster Lookup Service Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end

More information

NAT and Firewall Traversal with STUN / TURN / ICE

NAT and Firewall Traversal with STUN / TURN / ICE NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.

More information

Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature

Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature A Thesis for the degree of Master Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature Chang-Hwan Lee School of Engineering Information and Communications University 2008 i Quantitative

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing

2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: rfarha@comm.utoronto.ca ABSTRACT This paper presents a novel solution to

More information

Need for Signaling and Call Control

Need for Signaling and Call Control Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice

More information

Media Gateway Controller RTP

Media Gateway Controller RTP 1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran

More information

OVERVIEW OF ALL VOIP SOLUTIONS

OVERVIEW OF ALL VOIP SOLUTIONS OVERVIEW OF ALL VOIP SOLUTIONS Kovács Gábor Parnaki Zsolt Gergı 13/03/2009 TABLE OF CONTENTS Introduction Overview of VoIP protocols Standard based implementations: H.323 SIP Proprietary solutions: Skype

More information

Week 9 / Paper 3. VoCCN: Voice Over Content-Centric Networks

Week 9 / Paper 3. VoCCN: Voice Over Content-Centric Networks Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass, P. Stewart, J. D. Thornton, R. L. Braynard ACM ReArch 2009 Main point Content-centric

More information

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and

More information

VoIP telephony over internet

VoIP telephony over internet VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)

More information

Multicasting with Mobile IP & The Session Initiation Protocol

Multicasting with Mobile IP & The Session Initiation Protocol Multicasting with Mobile IP & The Session Initiation Protocol Hamad el Allali and Cristian Hesselman Abstract This report discusses how Mobile IP deals with multicast communications and describes a possible

More information

SHORT DESCRIPTION OF THE PROJECT...3 INTRODUCTION...4 MOTIVATION...4 Session Initiation Protocol (SIP)...5 Java Media Framework (JMF)...

SHORT DESCRIPTION OF THE PROJECT...3 INTRODUCTION...4 MOTIVATION...4 Session Initiation Protocol (SIP)...5 Java Media Framework (JMF)... VoIP Conference Server Evgeny Erlihman jenia.erlihman@gmail.com Roman Nassimov roman.nass@gmail.com Supervisor Edward Bortnikov ebortnik@tx.technion.ac.il Software Systems Lab Department of Electrical

More information

Service Quality Assurance Mechanisms for P2P SIP VoIP

Service Quality Assurance Mechanisms for P2P SIP VoIP Service Quality Assurance Mechanisms for P2P SIP VoIP Xiaofei Liao, Fengjiang Guo, Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology

More information

SIP A Technology Deep Dive

SIP A Technology Deep Dive SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing

More information

Voice over IP Communications

Voice over IP Communications SIP The Next Big Step Voice over IP Communications Presented By: Stephen J. Guthrie VP of Operations Blue Ocean Technologies Goals What are our Goals for Today? Executive Summary: It is expected that real-time

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

Best Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011

Best Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011 Best Practices for Role Based Video Streams (RBVS) in SIP IMTC SIP Parity Group Version 33 July 13, 2011 Table of Contents 1. Overview... 3 2. Role Based Video Stream (RBVS) Best Practices Profile... 4

More information

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,

More information

159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)

159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia

More information

Design, implementation and analysis of a large scale audio conferencing system using SIP

Design, implementation and analysis of a large scale audio conferencing system using SIP Design, implementation and analysis of a large scale audio conferencing system using SIP A n t ó n i o V a r a n d a & T i a g o L o u r e i r o Master of Science Thesis Stockholm, Sweden 2006 ECS/ICT-2006-07

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

Application Note. Onsight TeamLink And Firewall Detect v6.3

Application Note. Onsight TeamLink And Firewall Detect v6.3 Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall

More information

Chapter 7. Address Translation

Chapter 7. Address Translation Chapter 7. Address Translation This chapter describes NetDefendOS address translation capabilities. Dynamic Network Address Translation, page 204 NAT Pools, page 207 Static Address Translation, page 210

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

3 The Network Architecture

3 The Network Architecture SIP-H323: a solution for interworking saving existing architecture G. De Marco 1, S. Loreto 2, G. Sorrentino 3, L. Veltri 3 1 University of Salerno - DIIIE- Via Ponte Don Melillo - 56126 Fisciano(Sa) Italy

More information

Desktop sharing with SIP

Desktop sharing with SIP Author : Willem Toorop Supervisor : Michiel Leenaars February 2, 2009 Abstract This report describes how Desktop and Application sharing sessions can be realised using SIP. Investigated is what possibilities

More information

Best Practices for SIP Security

Best Practices for SIP Security Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting

More information

IP Ports and Protocols used by H.323 Devices

IP Ports and Protocols used by H.323 Devices IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential

More information

Implementing SIP and H.323 Signalling as Web Services

Implementing SIP and H.323 Signalling as Web Services Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de

More information

SIP Service Providers and The Spam Problem

SIP Service Providers and The Spam Problem SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation

More information

ETM System SIP Trunk Support Technical Discussion

ETM System SIP Trunk Support Technical Discussion ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with

More information

Desktop sharing with the Session Initiation Protocol

Desktop sharing with the Session Initiation Protocol Desktop sharing with the Session Initiation Protocol Author : Willem Toorop Supervisor : Michiel Leenaars February 25, 2009 Abstract This report describes how Desktop and Application sharing sessions can

More information

1 SIP Carriers. 1.1 Tele2. 1.1.1 Warnings. 1.1.2 Vendor Contact. 1.1.3 Versions Verified SIP Carrier status as of Jan 1, 2011. 1.1.

1 SIP Carriers. 1.1 Tele2. 1.1.1 Warnings. 1.1.2 Vendor Contact. 1.1.3 Versions Verified SIP Carrier status as of Jan 1, 2011. 1.1. 1 SIP Carriers 1.1 Tele2 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found

More information