A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia

Size: px
Start display at page:

Download "A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia"

Transcription

1 A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia Felipe de Castro Louback Rocha 1, Linnyer Beatriz 1 Programa de Pós Graduação em Engenharia Elétrica, Universidade Federal de Minas Gerais, Belo Horizonte, Brazil Abstract. Most of Voice over IP(VoIP) systems are deployed using SIP protocol and based in a client-server architecture. A lot of people and companies could be benefited if the system did not require the configuration and maintenance of central servers. Some proposals are found in the literature. In order to improve the efficiency of such approaches and to provide a complete self-configuring service of IP telephony, we suggest a new solution based on the P2P algorithm Kademlia. According with the results of our experiments, our approach has a better performance when network experiences different kind of delays due to the fact that Kademlia supports concurrent searches, improving the latency in user location, and providing a faster call establishment. 1 Introduction Voice over IP(VoIP) systems are becoming very popular nowadays, with many services being offered in the market. Deployment of services based on IP telephony have good advantages, such as low cost calls and mobility to the users. The configuration and maintenance of such systems requires the configurations of server and specialized employees to do so. Knowledge of the signalling protocols are need, for example. However, a lot of small-size to middle-size companies can t make use of an IP telephony system due to lack of specialized employees or lack of enough money to hire a third-party company to install and keep its telephony IP system. Day by day, distributed applications based on a Peer-to-Peer architecture are becoming popular and with this DHTs (Distributed Hash Tables) are being more utilized. DHTs are known by its decentralization, fault tolerance and scalability characteristics. In many scenarios, deployment of DHTs instead of centralized servers is a good deal. Telephony IP systems can make use of such benefits. Using these DHTs characteristics, we propose in this article another approach to replace VoIP centralized servers by an approach using DHTs, envisioning a complete self-organizing and self-configuring IP telephony system using Kademlia P2P algorithm.

2 2 1.1 P2P Networks There are a great number of definitions to P2P(Peer-to-Peer) system. In the most basic level, a P2P system is a system where multiple software applications interact with each other to realize a task. The node group, as a whole, is some times referred to as an Overlay Network. This contrasts with the traditional client-server model, where a piece of centralized software(the server) process tasks from different clients. The P2P or the client-server model choice is a matter of architecture decision of where the data-processing of the information will happen. A P2P architecture does not necessarily implies that each node must offer all kind of services or store all available data. All nodes on the overlay network must provide all services collectively, but any node can provide just a fraction of the services. For example, a group of nodes may provide a database service and each one may store a small fraction of the database itself. If a big number of nodes share the task, the chances that some entry will be stored in one chosen node is small, but at least one node on the overlay network will store the entry, making sure that, as a group, the nodes offer a complete database system. In a structured P2P architecture, nodes are connected to each other in a logical and well defined structure, such as a ring, a tree or a grid. Many arrangements are possible, but in general an unique identifier is given to a node when it is inserted into the overlay network. This identifier may be specified in a randomly way or determined by the hash of some property of the node, such as his IP address. The ID determines with which other nodes the node must establish contact. For example, a new node must connect to other nodes near him, to some notion of proximity. A very special type of structured P2P system is widely deployed, called DHT (Distributed Hash Table). Some of the most discussed DHTs algorithms are Chord[1], Kademlia[2] and Bamboo[3]. In a DHT, not only the connectivity structure among the nodes is controlled in a mathematical way, but also the way the resources are shared. An ID is given to each resource in the same ID space that the ID given to the nodes. In other words, the range that the values that a resource ID can have is the same as the node ID. The resource identifier is the hash of some property of the resource, such as the filename or another keyword that identifies the resource. The hash of this keywork is done, yielding to the resource ID, and the node with ID closer stores the resource. The definition of proximity and redundancy are very dependent of the algorithm deployed. 1.2 SIP - Session Initiation Protocol SIP [4] is a protocol based and derived from HTTP(Hiper Text Transfer Protocol), so its types of messages and traffic are very similar to the http traffic. SIP is a general protocol to establish and control multimedia sessions, but is has been mostly used in the VoIP field. Devices implementing SIP may be configured to communicate directly with each other, but usually in systems with more than two UAs(User Agents) a

3 3 central server or a proxy is used. In SIP s specification [4] the functions of a server are divided, including the proxy server and the registrar server function. This functions are often implemented together, and for the sake of clarity, in this article we will refer to the server realizing the previous cited functions as proxy server. A SIP proxy keeps information about user location and it is also responsible for all the routing and establishment of calls. 1.3 OpenDHT With the goal to serve applications that would make use of a public DHT, it was created OpenDHT[5]. OpenDHT is a public shared DHT that runs in about 200 machines of the PlanetLab 1 globally distributed. OpenDHT implements the BambooDHT[3] algorithm. Nodes that run OpenDHT code are considered infrastructure nodes. Clients may run codes that uses OpenDHT through RPCs(Remote Procedure Calls), but they do not have OpenDHT code implemented. In this way, applications do not need to worry about DHT implementation. But on the other hand, nodes can not execute specific codes at the infrastructure nodes. In most of the applications today, the DHT is executed through a local library that implements it. The adoption of a library that implements the DHT allows the use of specific code and code optimized to the application, but each application must implement its own DHT. OpenDHT offers an opposite approach, with a smaller flexibility of utilization, but the application programmer does not need to worry about DHT implementation. 1.4 Kademlia Kademlia[2] is a P2P Distributed Hash Table. Kademlia uses the same general approach as others DHTs. An 160-bit ID is associated to each node and it is given and algorithm that searches and locates successively closer nodes to some given ID, converging the search in a logarithmic way. Kademlia treat nodes as leaves in a binary tree, where the position of each node is determined by the smalled unique prefix of its ID. To some given node, the tree is divided in a series of successively smaller subtrees that do not contain the node. The biggest subtree consists of half the subtree that doens t have the node. The next smaller subtree consist of half the remaining tree not having the node and so on. Kademlia protocol assures that each node knows the location of at least one node in each of its subtree, if that subtree has a node. With this warranty, each node can locate another node through its ID by successively querying the best node the knows, trying to locate it in smaller subtrees and finally the search converges to the target node. Usually searches are made in a concurrent way, that is, more than one query is sent at the same time. The parameter α controls this behavior. 1

4 4 Each Kademlia node has an ID of 160 bits. Node IDs are usually randomly numbers of 160 bits. Key IDs are also 160 bit longer. To give a pair <key, value> to a node, Kademlia uses the notion of distance between identifiers. Given two IDs of 160 bits, x and y, Kademlia defines the distance between them as their bitwise exclusive or(xor) interpreted as an integer. Kademlia nodes keep contact information about each other to make routing of messages possible. For each 0 < i < 160, each node keeps a list of tripes <IP, UDP Port, node ID> to nodes with distance between 2 i and 2 i+1 of itself. These lists are called k-buckets. More details about the algorithm can be obtained at [2]. Kademlia is the algorithm implemented in one of the most popular file share software, Emule. 2 Related Work In [6] it is proposed the use of OpenDHT as an alternative to resource location servers of SIP architecture. SOSIMPLE [7] is a project that aims to implement a system without servers, based on a SIP P2P communications. In this project all P2P traffic is managed using SIP messages and the DHT implemented is based on the Chord algorithm. Skype [8] allows users to make free calls to other Skype users as all as paid phone calls to regular phone numbers. Skype is parcially P2P, once that it users centralized servers to authentication and authorization. Skype is based on a proprietary protocol and it is not compatible with other protocols such as SIP and H323. Kundan Singh and Henning Schulzrinne from Columbia University have a project [9] with a similar approach to SOSIMPLE, using Chord as the DHT. The main differences are related to the transport and routing of data inside the P2P overlay network. All works cited above requires Internet connectivity to work, otherwise communication will fail or not even be established. 3 Our Proposal We want our proposal to promote cost reduction, because there will be no need to buy physical servers, and management simplification, once it will not be needed any personnel to keep the system running. To achieve such goals the main point is to remove the need of a centralized resource location server in SIP based systems. The centralized server will be replaced for one adapter that will run locally at the machine and will be responsible for all the server functions. It is a requirement that it will not be necessary to adapt existent UAs and that every UA that is SIP compliant will be able to use the adapter. The adapter was written in C++ using the library Resiprocate 2 to treat SIP messages. The implementation using Kademlia used the code from Anulus project 3. Anulus project implements Kademlia algorithm in C++ and one of the authors of this article is part of the Anulus developer team

5 5 SIP has been the definitive standard adopted by many companies and most of the VoIP providers today have their system based on this protocol. This is why SIP was chosen as the signaling choice. 3.1 Adapter Behavior Call establishment flow in a centralized approach can be made in one of two ways: either using a redirect server or a proxy server. When a server behaves like a redirection server, the caller sends a SIP INVITE to the server, showing the intention of initialize a session with a callee. The redirect server then locates the IP address of the callee. After the IP is located, the server sends back a 302 Moved Temporarily message to the caller. The caller then sends out a new SIP INVITE to the callee using the IP address returned by the redirection message. All the later message flow is done directly between the caller and callee. When the server behaves like a proxy, basically it handles all the signalling between the two parties. It was adopted the redirection server behavior in our adapter. The redirection server does not need to keep track of the sessions established, making its implementation simpler. 3.2 The adapter The adapter is responsible for all the resource location(user location) process as well as user maintenance in the DHT. Basically the adapter can be divided into two main modules: the SIP module, who implements the redirection server functions and SIP message treatment, and the P2P module, responsible for locating and keeping the users in the P2P overlay as well as have the algorithm Kademlia running. Communication between these modules are done through an API(Application Programming Interface) exported by the P2P module, allowing registering and searching of users to be done. 3.3 Initialization Process To enter the P2P overlay network, a node needs to find another node that is already part of the overlay. OpenDHT was used to store a reference to a node in the overlay, so that another node can find a participant node. The idea to store a reference in OpenDHT is based on the idea of Dynamic DNS, but using a public shared DHT to do such. In Dynamic DNS the entries are updated in real time. The reference is store using as key bootstrap.node.br and as value related to the key IP:Port of a node that is already in the P2P network. In this way, when a node searches for that key, it will be returned the information need to contact a node in the P2P overlay. When the adapter is initialized, it searches for the key bootstrap.node.br at OpenDHT. In case of a successful search, the adapter uses that information and starts the bootstrap process.

6 6 In case of an unsuccessful search, initially the node tries to register at OpenDHT the key bootstrap.node.br with its own IP, so that he can become a reference for future nodes that try to join the overlay. After the register attempt at OpenDHT, the node try to locate any other node at the P2P overlay sending a broadcast. Broadcast is used because the unsuccessful search for the key at OpenDHT may indicate, for example, that connectivity with the Internet was lost, or that this is an attempt to establish a telephony IP system in an environment that does not have connectivity to the Internet or even that this is the first node at the overlay. If any node at the overlay notice the search broadcast, it answers it with its IP. The node who generated the request then starts the bootstrap process with that node. Only the first reply to the broadcast is considered. 3.4 User Registration During the register process, the UA send a SIP REGISTER to the adapter. The SIP module notices that the packet is a register message. DHTs store pairs <key, value>. After a user is located in a telephony IP system, the UA need the information regarding the port and IP address of where the UA of the callee is running, so the call can be established. So, when using a DHT to store information regarding users location, pairs are stored using the following format: <User, IP:Port>. In this way, when a search is performed, it will be returned the IP and port where the callee is located. 3.5 User Maintenance The main use of Kademlia today is file sharing. When a search is made for some key, nodes that participate in the search, that is, that are on the search path, cache a copy of the search. In this way, future searches to this key may be faster due to the probability that a node on the search path may have a copy in cache. In the case of telephony IP, the register of users can not be persistent because users may enter and leave the network at any time, and they may have a different IP address each time they come back. The behavior of Kademlia algorithm had to be changed in order to support the needs of telephony IP systems. An expiration time of 3600 seconds was added to the key, and after that the entry is deleted. Softphones must update its registry with the servers at regular intervals. This is done by sending SIP REGISTER messages at regular intervals to the server. We took advantage of this feature to update the user registry expiration time at the DHT. When the adapter receives a SIP REGISTER, a new key is inserted in the DHT and the expiration time is initialized to 3600 seconds seconds is the default time for most of the softphones available today. When it receiver another SIP REGISTER message, the node responsible for that user updates the registry expiration to 3600 seconds again, unless other value is specified at the message. Cached copies of user registries are not updated. But the expiration of cached copies is not a problem because, as a characteristic of Kademlia algorithm, all the searches converge to the node responsible for the key. So, in our case, even

7 7 after all the cached copies expire, during a new search, new cached copies will be formed. 3.6 User Location and Call Establishment As said before, our adapter behaves like a redirection server. When a UA wants to establish a call with another UA, a SIP INVITE message is sent to the adapter, who in turn searches for that user into the DHT. In case where the user is found, a 302 Moved Temporarily is built according to SIP specifications[4], with all the information necessary to redirect the call. This message is sent back to the caller UA and then the caller sends a new SIP INVITE to the callee. When the user is not found inside the DHT, a 404 Not Found message is returned. 3.7 Performance The system can be self-configured and self-mainteined but the effects of this decentralization must be measured. In a centralized approach, user location is made in O(1) while most of the DHTs, including Kademlia, is designed to locate a resource with O(log(n)) messages[2], where n is the number of nodes in the overlay network. This affects the call establishment time, once it will take more time to locate a specific user before the call can be established. In order to measure the efficiency of our approach regarding call establishment time, we used three machines connect to each other by a 100Mbps full duplex link, using a switch to do so. In each node we started 20 adapters, in a total of 60, and after they were started, seven different users were registered. Concurrent searches improve latency in resource location when timeouts for a request is experienced, since more than one request is sent at a time. In order to measure how the concurrency parameter(α) would affect user location time, we divided our experiments in three different scenarios. In our adapter, the request to search for a value has a timeout of 3 seconds before re-transmission. In the first scenario, all 60 nodes did not experienced delay. In the second scenario, half the nodes were programmed to hold the search response for 2 seconds before sending it to the node who made the search. In the third scenario half of the nodes were configured to hold the search responses for 4 seconds. So, in the first scenario no delay at all, in the second a delay smaller than the retransmission timout and on the third one a delay that would cause a new transmission due to timeout. 40 searches were made in each scenario and we repeated the experience for α = 1 and α = 5. The value 1 for α was chosen so we could see how DHTs that does not support concurrency would behave; the value 5 was chosen based on the studies presented at[10]. This way we could check what impact does the concurrency has when the network introduces delay(simulated by the induced delay on half of the nodes). The results can be seen in figure 1 for α = 1 and in figure 2 for α = 5. We could see on figure 1 that as delay increases on the network, the average time to locate a resource also increases. When a 2 second delay were introduced in half of the nodes, the requests that reached those node had a higher response

8 8 7 6 User Location Time 60 nodes and Alpha=1 No Delay 2 second Delay in half nodes 4 second Delay in half nodes 5 Time (Seg) Measure Fig. 1. Time to locate a user at Kademlia with α = 1. time. When a 4 second delay were introduced, the requests that reached those nodes were re-transmitted to other nodes after the 3-second timeout. When the experiment were run with α = 5(figure 2) we can see that the resource location time were not that much affected. That happens because five requests are sent concurrently, and if some requests reach nodes pre-programed to introduce a delay, some would still reach nodes with no programmed delay. With these experiments, we can conclude that when multiple concurrent requests are sent we have a better chance to get a faster response even when some nodes on the overlay network are experiencing network congestion. When α = 1, Kademlia is similar to Chord in message cost [2]. Chord does not support concurrent searches. We could see from our experiments that an approach that supports concurrency can improve the mean response time for user location. All other approaches found on literature, but Skype, use Chord as the underlying DHT. 4 Future Work 4.1 NAT Traversal Users behind NAT is still an open issue. At the present time, we assume that all users can be found on reachable IPs. One alternative would be the implementation of some solution like STUN(Simple Traversal of UDP through NAT) on the adapters with valid IP address. 4.2 Authentication At the present time we do not provide any sort of authentication and assume that all users can be trusted. But this can not be a valid assumption on various

9 User Location Time 60 nodes and Alpha=5 No Delay 2 second Delay in half nodes 4 second Delay in half nodes Time (Seg) Measure Fig. 2. Time to locate a user at Kademlia with α = 5. scenarios. The solutions listed on section Related Work do not treat authentication in a very effective way. One alternative would be the PGP web of trust model. Another one would be to store centralized certificates in a central point in the network, but this would require a centralized authority to be consulted. In the case of ad-hoc or transiente networks, no verification may be required or desirable. An authentication system is still an open issue and is under analysis. 5 Conclusion Our approach is effective in building a decentralized, self-configuring and selfmanaging telephony IP system. Self-configuring is provided by the fact that it is not necessary to install and configure a centralized server. Once the adaptor is initialized, not further configuration is required. Self-managing is provided by the fact that the system does not require any person to manage it. Users joining and leaving the system are handled by the P2P network without the need of a centralized server to store user information. Our solution works well on environments with Internet connectivity or without it. For example, if the connectivity to the Internet of a company is lost, the IP telephony system would not stop in our solution. In scenarios where there may not be an Internet connection available, our approach still works. Our solution is the first one that uses the algorithm Kademlia for such purpose. Concurrent searches can reduce significantly the mean delay time in resource location when nodes are experiencing packet loss or high traffic as we could see from our experiments. Other approaches found on the literature do not use concurrent searches because of the DHT deployed. The fact that our approach is the first one to use Kademlia also leads our work to be the first

10 10 one to analyse how the concurrency parameter on Kademlia can benefit user location time on decentralized IP telephony systems under different network circumstances. A decentralized approach offers cost reduction because there is no need to buy any special hardware(servers). Another characteristic is management simplification, once the systems manages itself and there is no need to have someone specialized to keep the system up and running. In scenarios where there is the need to rapidly establish a communication system, such as a disaster area with wireless network or a conference, for instance, installation of servers can be timeconsuming and our solution provides agility. Our solution works with softphones, but it could be used a similar approach to code the adapter and embedded it inside hardphones. Our adapter is SIP compliant, it can be used with any softphone that supports SIP. References [1] Stoica, I., Morris, R., Karger, D., Kaashoek, F., Balakrishnan, H.: Chord: A scalable Peer-To-Peer lookup service for internet applications. In: Proceedings of the 2001 ACM SIGCOMM Conference. (2001) [2] Maymounkov, P., Mazires, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: IPTPS 01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, London, UK, Springer-Verlag (2002) [3] Sean Rhea, Dennis Geels, T.R., Kubiatowicz, J.: Handling churn in a dht. Technical Report UCB/CSD , EECS Department, University of California, Berkeley (2003) [4] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: Sip: Session initiation protocol (2002) [5] Rhea, S., Godfrey, B., Karp, B., Kubiatowicz, J., Ratnasamy, S., Shenker, S., Stoica, I., Yu, H.: Opendht: a public DHT service and its uses. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New York, NY, USA, ACM Press (2005) [6] Singh, K., Schulzrinne, H.: Using an external dht as a sip location service. Technical report, Department of Computer Science, Columbia University, CUCS , New York (February 2006) [7] Bryan, D.A., Lowekamp, B.B., Jennings, C.: SOSIMPLE: A serverless, standardsbased, P2P SIP communication system. In: Proceedings of the 2005 International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA 2005). (June 2005) [8] Baset, S.A., Schulzrinne, H.: An analysis of the Skype peer-to-peer Internet telephony protocol. Technical Report CUCS , Columbia University (September 2004) [9] Singh, K., Schulzrinne, H.: Peer-to-peer internet telephony using sip. In: NOSS- DAV 05: Proceedings of the international workshop on Network and operating systems support for digital audio and video, New York, NY, USA, ACM Press (2005) [10] Li, J., Stribling, J., Gil, T., Morris, R., Kaashoek, F.: Comparing the performance of distributed hash tables under churn (2004)

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland marcin.matuszewski@nokia.com, esko.kokkonen@nokia.com Abstract This

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

Distributed Hash Tables in P2P Systems - A literary survey

Distributed Hash Tables in P2P Systems - A literary survey Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology tstanner@cc.hut.fi Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer

More information

SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System

SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System 1 SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System David A. Bryan and Bruce B. Lowekamp Computer Science Department College of William and Mary Williamsburg, VA 23185 {bryan, lowekamp}@cs.wm.edu Abstract

More information

Bridging the gap between peer-to-peer and conventional SIP networks

Bridging the gap between peer-to-peer and conventional SIP networks 1 Bridging the gap between peer-to-peer and conventional SIP networks Mosiuoa Tsietsi, Alfredo Terzoli, George Wells Department of Computer Science Grahamstown, South Africa Tel: +27 46 603 8291 hezekiah@rucus.ru.ac.za

More information

SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System

SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System Appears in AAA-IDEA 2005 c IEEE SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp Computer Science Department College of William and Mary Williamsburg,

More information

Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature

Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature A Thesis for the degree of Master Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature Chang-Hwan Lee School of Engineering Information and Communications University 2008 i Quantitative

More information

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand

More information

Peer-to-Peer Internet Telephony using SIP

Peer-to-Peer Internet Telephony using SIP Peer-to-Peer Internet Telephony using SIP Kundan Singh and Henning Schulzrinne Department of Computer Science, Columbia University 1214 Amsterdam Ave, Mail Code 0401 New York, NY 10027, USA {kns10,hgs}@cs.columbia.edu

More information

SIP: Ringing Timer Support for INVITE Client Transaction

SIP: Ringing Timer Support for INVITE Client Transaction SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna (poojan@motorola.com) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

Skype VoIP service- architecture and comparison

Skype VoIP service- architecture and comparison Skype VoIP service- architecture and comparison Hao Wang Institute of Communication Networks and Computer Engineering University of Stuttgart Mentor: Dr.-Ing. S. Rupp ABSTRACT Skype is a peer-to-peer (P2P)

More information

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Written by: Salman A. Baset and Henning G. Schulzrinne (Colombia University, NY) CIS 6000 Distributed Systems Benjamin Ferriman bferrima@uoguelph.ca

More information

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer

More information

Decentralized supplementary services for Voice-over-IP telephony

Decentralized supplementary services for Voice-over-IP telephony Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.

More information

P2P VoIP for Today s Premium Voice Service 1

P2P VoIP for Today s Premium Voice Service 1 1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com

More information

A P2PSIP event notification architecture

A P2PSIP event notification architecture A P2PSIP event notification architecture Georgios Panagiotou Appear Networks AB, Kista Science Tower, 164 51 Kista, Sweden Email: georgios.panagiotou@appearnetworks.com Alisa Devlic Appear Networks AB,

More information

A Peer-to-peer Secure VoIP Architecture

A Peer-to-peer Secure VoIP Architecture A Peer-to-peer Secure VoIP Architecture Simone Cirani, Riccardo Pecori, and Luca Veltri Abstract Voice over IP (VoIP) and multimedia real-time communications between two ore more parties are widely used

More information

IAX-Based Peer-to-Peer VoIP Architecture

IAX-Based Peer-to-Peer VoIP Architecture www.ijcsi.org 280 IAX-Based Peer-to-Peer VoIP Architecture Amor Lazzez, Ouissem Ben Fredj, Thabet Slimani Taif University, Kingdom of Saudi Arabia Abstract Nowadays, Voice over IP (VoIP) constitutes a

More information

Service Quality Assurance Mechanisms for P2P SIP VoIP

Service Quality Assurance Mechanisms for P2P SIP VoIP Service Quality Assurance Mechanisms for P2P SIP VoIP Xiaofei Liao, Fengjiang Guo, Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology

More information

SOSIMPLE Self Organizing SIMPLE A Proposed P2P Instant Messaging System

SOSIMPLE Self Organizing SIMPLE A Proposed P2P Instant Messaging System SOSIMPLE Self Organizing SIMPLE A Proposed P2P Instant Messaging System David A. Bryan College of William and Mary, CSCI 780, P2P and Grid Systems December, 2003 1 Introduction Instant messaging (IM) has

More information

Volume 2, Issue 1, 2008. A New Security Architecture for SIP Based P2P Computer Networks

Volume 2, Issue 1, 2008. A New Security Architecture for SIP Based P2P Computer Networks Volume 2, Issue 1, 2008 A New Security Architecture for SIP Based P2P Computer Networks Huang Yongfeng, Professor, Tsinghua University, yfhuang@tsinghua.edu.cn Shanyu Tang, Dr & Senior Lecturer, London

More information

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes

More information

Design of a SIP Outbound Edge Proxy (EPSIP)

Design of a SIP Outbound Edge Proxy (EPSIP) Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma

More information

RELOAD Usages for P2P Data Storage and Discovery

RELOAD Usages for P2P Data Storage and Discovery RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf Alexander.Knauf@Haw-Hamburg.de Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference

More information

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks 1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many

More information

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,

More information

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany tim@c-lab.de Abstract. Network infrastructures are nowadays

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

SIP : Session Initiation Protocol

SIP : Session Initiation Protocol : Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification

More information

ENUM: Migrating to VoIP. P2P Voice Applications

ENUM: Migrating to VoIP. P2P Voice Applications Advanced Networking ENUM: Migrating to VoIP P2P Voice Applications Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Index ENUM P2P Basics Overlay & P2P Does

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Join and Leave in Peer-to-Peer Systems: The DASIS Approach

Join and Leave in Peer-to-Peer Systems: The DASIS Approach Join and Leave in Peer-to-Peer Systems: The DASIS Approach Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer {kenoa@inf, rarnold@inf, mgaehwil@student, wattenhofer@inf}.ethz.ch Department

More information

2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing

2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: rfarha@comm.utoronto.ca ABSTRACT This paper presents a novel solution to

More information

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt A SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt IETF65, Dallas March 25, 2006 Eunsoo Shim Sathya Narayanan Greg Daley Panasonic Digital Networking Laboratory Two Layer Approach

More information

88 ADVANCES IN ELECTRONICS AND TELECOMMUNICATIONS, VOL. 2, NO. 3, SEPTEMPBER 2011. Agent based VoIP Application with Reputation Mechanisms

88 ADVANCES IN ELECTRONICS AND TELECOMMUNICATIONS, VOL. 2, NO. 3, SEPTEMPBER 2011. Agent based VoIP Application with Reputation Mechanisms 88 ADVANCES IN ELECTRONICS AND TELECOMMUNICATIONS, VOL. 2, NO. 3, SEPTEMPBER 2011 Agent based VoIP Application with Reputation Mechanisms Grzegorz Oryńczak and Zbigniew Kotulski Abstract In this paper

More information

Peer-to-Peer Replication

Peer-to-Peer Replication Peer-to-Peer Replication Matthieu Weber September 13, 2002 Contents 1 Introduction 1 2 Database Replication 2 2.1 Synchronous Replication..................... 2 2.2 Asynchronous Replication....................

More information

A Scalable Multi-Server Cluster VoIP System

A Scalable Multi-Server Cluster VoIP System A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu mcliang@nuk.edu.tw {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department

More information

SIP: Ringing Timer Support for INVITE Client Transaction

SIP: Ringing Timer Support for INVITE Client Transaction SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna (poojan@motorola.com) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone

More information

3 The Network Architecture

3 The Network Architecture SIP-H323: a solution for interworking saving existing architecture G. De Marco 1, S. Loreto 2, G. Sorrentino 3, L. Veltri 3 1 University of Salerno - DIIIE- Via Ponte Don Melillo - 56126 Fisciano(Sa) Italy

More information

Distributed Media Server Architecture for SIP using IP Anycast

Distributed Media Server Architecture for SIP using IP Anycast Distributed Media Server Architecture for SIP using IP Anycast Ladislav Andel Jiri Kuthan Dorgham Sisalem Tekelec Tekelec Tekelec Prague, Czech Republic Berlin, Germany Berlin, Germany ladislav.andel@tekelec.com

More information

Chord - A Distributed Hash Table

Chord - A Distributed Hash Table Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing

More information

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks , pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication

More information

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push

More information

Security issues in Voice over IP: A Review

Security issues in Voice over IP: A Review www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu

More information

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2) Overview Voice-over over-ip (VoIP) ENUM VoIP Introduction Basic PSTN Concepts and SS7 Old Private Telephony Solutions Internet Telephony and Services VoIP-PSTN Interoperability IP PBX Network Convergence

More information

Key Elements of a Successful SIP Device Provisioning System

Key Elements of a Successful SIP Device Provisioning System Key Elements of a Successful SIP Device Provisioning System A white paper by Incognito Software April, 2006 2006 Incognito Software Inc. All rights reserved. Page 1 of 6 Key Elements of a Successful SIP

More information

A Comparative Study of Signalling Protocols Used In VoIP

A Comparative Study of Signalling Protocols Used In VoIP A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.

More information

Programming SIP Services University Infoline Service

Programming SIP Services University Infoline Service Programming SIP Services University Infoline Service Tatiana Kováčiková, Pavol Segeč Department of Information Networks University of Zilina Moyzesova 20, 010 26 SLOVAKIA Abstract: Internet telephony now

More information

Implementing SIP and H.323 Signalling as Web Services

Implementing SIP and H.323 Signalling as Web Services Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de

More information

Week 9 / Paper 3. VoCCN: Voice Over Content-Centric Networks

Week 9 / Paper 3. VoCCN: Voice Over Content-Centric Networks Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass, P. Stewart, J. D. Thornton, R. L. Braynard ACM ReArch 2009 Main point Content-centric

More information

Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner

Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner Voichiţa Almăşan and Iosif Ignat Technical University of Cluj-Napoca Computer Science

More information

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee

More information

Integrating Voice over IP services in IPv4 and IPv6 networks

Integrating Voice over IP services in IPv4 and IPv6 networks ARTICLE Integrating Voice over IP services in IPv4 and IPv6 networks Lambros Lambrinos Dept.of Communication and Internet studies Cyprus University of Technology Limassol 3603, Cyprus lambros.lambrinos@cut.ac.cy

More information

Skype characteristics

Skype characteristics Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications

More information

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

Aladdin Sleem Olugbenga Olumuyiwa Khaled Kamel Department of Computer Science Texas Southern University Houston, Texas, USA.

Aladdin Sleem Olugbenga Olumuyiwa Khaled Kamel Department of Computer Science Texas Southern University Houston, Texas, USA. International Journal of Applied Science and Technology Vol. 1 No. 6; November 2011 286 REAL TIME PERFORMANCE EVALUATION OF VOICE OVER IP CALL QUALITY UNDER VARYING NETWORK CONDITIONS Abstract Aladdin

More information

New Algorithms for Load Balancing in Peer-to-Peer Systems

New Algorithms for Load Balancing in Peer-to-Peer Systems New Algorithms for Load Balancing in Peer-to-Peer Systems David R. Karger Matthias Ruhl MIT Laboratory for Computer Science Cambridge, MA 02139, USA {karger, ruhl}@theory.lcs.mit.edu Abstract Load balancing

More information

White paper. SIP An introduction

White paper. SIP An introduction White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary

More information

An investigation into multimedia service creation using SIP

An investigation into multimedia service creation using SIP An investigation into multimedia service creation using SIP M.C. Hsieh, J. Okuthe and A. Terzoli Department of Computer Science, Rhodes University Grahamstown, 6140, South Africa Email: g9610645@campus.ru.ac.za

More information

A VoIP Traffic Monitoring System based on NetFlow v9

A VoIP Traffic Monitoring System based on NetFlow v9 A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel,

More information

Enabling SIP-Based Services in Ad Hoc Networks

Enabling SIP-Based Services in Ad Hoc Networks Enabling SIP-Based Services in Ad Hoc Networks Heng-Te Chu 1, 2, Wen-Shiung Chen 1 1 VIPCCL, Dept. of Electrical Engineering, National Chi Nan University, Nan-Tou, Taiwan 2 Dept. of Information Networking

More information

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division

More information

Improving Quality in Voice Over Internet Protocol (VOIP) on Mobile Devices in Pervasive Environment

Improving Quality in Voice Over Internet Protocol (VOIP) on Mobile Devices in Pervasive Environment Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 Improving Quality in Voice Over Internet Protocol (VOIP) on Mobile Devices in Pervasive Environment Mr. S.Thiruppathi

More information

Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network

Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network Shih-yi Chiu Graduate Inst. of Networking and Communication Eng. Chao Yang Univ. of Tech., Taichung, Taiwan s9430605@cyut.edu.tw

More information

Are Virtualized Overlay Networks Too Much of a Good Thing?

Are Virtualized Overlay Networks Too Much of a Good Thing? Are Virtualized Overlay Networks Too Much of a Good Thing? Pete Keleher, Bobby Bhattacharjee, Bujor Silaghi Department of Computer Science University of Maryland, College Park keleher@cs.umd.edu 1 Introduction

More information

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl

More information

Open IMS Core with VoIP Quality Adaptation

Open IMS Core with VoIP Quality Adaptation Open IMS Core with VoIP Quality Adaptation Is-Haka Mkwawa, Emmanuel Jammeh, Lingfen Sun, Asiya Khan and Emmanuel Ifeachor Centre for Signal Processing and Multimedia Communication School of Computing,Communication

More information

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences

More information

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article

More information

Lawful Interception in P2Pbased

Lawful Interception in P2Pbased Lawful Interception in P2Pbased VoIP Systems Jan Seedorf (jan.seedorf_at_nw.neclab.eu) NEC Laboratories Europe Heidelberg, Germany July Page 2008 1-1 IPTCOMM 2008 Heidelberg, Germany Outline 1.

More information

A Scalable Architecture for SIP Infrastructure using Content Addressable Networks

A Scalable Architecture for SIP Infrastructure using Content Addressable Networks A Scalable Architecture for Infrastructure using Content Addressable Networks Ramrajprabu Balasubramanian Injong Rhee Jaewoo Kang Department of Computer Science North Carolina State University Raleigh,

More information

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in

More information

SIP A Technology Deep Dive

SIP A Technology Deep Dive SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing

More information

Introduction to VoIP Technology

Introduction to VoIP Technology Lesson 1 Abstract Introduction to VoIP Technology 2012. 01. 06. This first lesson of contains the basic knowledge about the terms and processes concerning the Voice over IP technology. The main goal of

More information

P.Brighten Godfrey, Scott Shenker, and Ion Stoica. Computer Science Division. -Anjali Sridhar CS598 Brighten Godfrey

P.Brighten Godfrey, Scott Shenker, and Ion Stoica. Computer Science Division. -Anjali Sridhar CS598 Brighten Godfrey P.Brighten Godfrey, Scott Shenker, and Ion Stoica UC Berkeley Computer Science Division -Anjali Sridhar CS598 Brighten Godfrey Peer to Peer Networks Churn and Overlay Networks Motivation to reduce churn

More information

LOOKING UP DATA IN P2P SYSTEMS

LOOKING UP DATA IN P2P SYSTEMS LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed

More information

Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se

Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous

More information

Open Source Research and Education Networking Project in Malawi. VoIP

Open Source Research and Education Networking Project in Malawi. VoIP Open Source Research and Education Networking Project in Malawi (OSREN-MaREN) VoIP Design and Interoperatibilty Version 0.0.2 IK2207 09 ICT and Communication Systems Design Summer 2008 Date: 10 July 2008.

More information

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

Examples Peer-to-Peer Applications. (Gnutella, Kazaa, BitTorrent, Skype)

Examples Peer-to-Peer Applications. (Gnutella, Kazaa, BitTorrent, Skype) Examples Peer-to-Peer Applications (Gnutella, Kazaa, BitTorrent, Skype) Second generation approach Gnutella Fully distributed approach Constructs Gnutella overlay network What is an overlay network? How

More information

Peer-to-Peer audio conferencing using SIP: P2P Architecture

Peer-to-Peer audio conferencing using SIP: P2P Architecture Peer-to-Peer audio conferencing using SIP: P2P Architecture Max Weltz May 11, 2007 Abstract This report is part of a collection of three report describing several aspects of Peer-to-Peer audio conferencing

More information

Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29

Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29 Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29 http://www.dinstar.com 1 / 9 Contents Chapter 1: Authors and changes logs... 3 Chapter

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL

AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL João Paulo Sousa Instituto Politécnico de Bragança R. João Maria Sarmento Pimentel, 5370-326 Mirandela, Portugal + 35 27 820 3 40 jpaulo@ipb.pt Eurico Carrapatoso

More information

RESERV: A Distributed, Load Balanced Information System for Grid Applications

RESERV: A Distributed, Load Balanced Information System for Grid Applications RESERV: A Distributed, Load Balanced Information System for Grid Applications Gábor Vincze, Zoltán Novák, Zoltán Pap, Rolland Vida Department of Telecommunications and Media Informatics, Budapest University

More information

Peer-to-peer (P2P) telephony and communications

Peer-to-peer (P2P) telephony and communications 02jennings/bryan-p36 4/21/06 9:42 AM Page 2 P2P For Communications: Beyond File Sharing Cullen Jennings and David A. Bryan Dr. Cullen Jennings is a Distinguished Engineer with Cisco Systems specializing

More information

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya

More information

Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution

Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution White Paper January 2012 Radware GSLB Solution White Paper Page 1 Table of Contents 1. EXECUTIVE SUMMARY... 3 2. GLOBAL

More information

Chapter 2 PSTN and VoIP Services Context

Chapter 2 PSTN and VoIP Services Context Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using

More information

Developing Higher Density Solutions with Dialogic Host Media Processing Software

Developing Higher Density Solutions with Dialogic Host Media Processing Software Telecom Dialogic HMP Media Server Developing Higher Density Solutions with Dialogic Host Media Processing Software A Strategy for Load Balancing and Fault Handling Developing Higher Density Solutions with

More information

Frequently Asked Questions about Integrated Access

Frequently Asked Questions about Integrated Access Frequently Asked Questions about Integrated Access Phone Service How are local, long distance, and international calls defined? Local access transport areas (LATAs) are geographical boundaries set by the

More information

Security in Structured P2P Systems

Security in Structured P2P Systems P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in

More information

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information

Framework for Decentralizing Legacy Applications

Framework for Decentralizing Legacy Applications 9th IEEE/ACM International Symposium on Cluster Computing and the Grid Framework for Decentralizing Legacy Applications Jani Hautakorpi and Gonzalo Camarillo Ericsson Research Nomadiclab FI-02420 Jorvas,

More information

Secure Communication in a Distributed System Using Identity Based Encryption

Secure Communication in a Distributed System Using Identity Based Encryption Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA tjstadin@us.ibm.com Abstract Distributed systems require the ability to communicate

More information

(Refer Slide Time: 6:17)

(Refer Slide Time: 6:17) Digital Video and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 39 Video Conferencing: SIP Protocol

More information

Simulation of SIP-Based VoIP for Mosul University Communication Network

Simulation of SIP-Based VoIP for Mosul University Communication Network Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication

More information