A Scalable based Multicast Model for P2P Conferencing Applications
|
|
|
- Malcolm Harper
- 10 years ago
- Views:
Transcription
1 Scalable based Multicast Model for PP onferencing pplications Mourad M University of ejaia, lgeria mourad [email protected] Zahir H ejaia University, lgeria [email protected] Lachemi KHENOUS ejaia University, lgeria khenous [email protected] Kamal KYL LMOS, ejaia University, lgeria k [email protected] bstract Multicast conferencing is a rapidly-growing area of Internet use. udio, video and other media such as shared whiteboard data can be distributed efficiently between groups of conference participants using multicast algorithms that minimize the amount of traffic sent over the network. This is far more effective than systems that maintain a separate link between each participant. On the other hand Peer-to-Peer (PP) model is inherently characterized by high scalability, robustness and fault tolerance. With its decentralized and distributed architecture, a PP network is somehow able to self organized dynamically. Peerto-Peer model or architecture is well adapted to conferencing applications, effectively it can greatly benefit from PP attributes such as: flexibility, scalability and robustness, particularly in critical environments such as: mobile networks. In this paper we propose a novel and scalable approach for PP onferencing. This model combines a call control and signalling protocol (SIP) with a PP protocol (hord) for maintaining (dynamically) a well stabilized and optimized architecture topology. This model is also based on an application layer multicast mechanism. Performance evaluation shows that our proposed approach benefits from SIP protocol flexibility, with the robustness and scalability of hord protocol. The use of a multicast mechanism optimizes the overall traffic flow (control and media) and transmission efficiency. Key Words: onferencing architecture, pplication Layer Multicast, PP. I. INTROUTION The N-way conferencing applications[4] connects fewto-few or many-to-many users, as opposed to streaming applications which provide one-to-many media distribution. Generally the conferencing groups (audio or video) are typically small, involving fewer than ten participants. lso membership usually changes dynamically and rapidly, where any member may join, leave or invite other participants to the conference at any time. This class of applications commonly requires significant processors and bandwidth resources, especially if multiple simultaneous users are allowed. For each group of N-participants, each one must encode its own media streams and transmits them to the N other participants, while receiving and decoding media streams from the N other participants. Thus processor and bandwidth resources can go over the limit and then constitute a critical issue. Existing conferencing architectures [6] using Session Initiation Protocol (SIP) or H. are generally based on a registration server for every domain. Scalability of such server-based systems, representing a single point of failure, is generally achieved with traditional methods such as NS. PP systems are distributed and scalable, thus providing a solution to the single point of failure problem [7]. lso conferencing applications deliver real-time information [4] between (possibly large) groups of people, requiring real-time communications and performance optimization. Given this, our proposed conferencing model derived from an optimal combination of both protocols: hord [] (for users/terminals discovery, maintaining topology stabilization) and SIP [] (for call control and signalization). This approach benefits from both protocol advantages, and from the use of an efficient multicast mechanism at application layer for data streams forwarding. This paper is organized as follows: Section II gives a brief overview of the main architectures used for conferencing, with their limitations. In section III, we present the concept of application layer multicast. SIP protocol and hord concepts proposed for PP conferencing are resumed in section IV. Section V describes the concepts and the architecture of our proposed approach. We also give preliminary results related to performances of our architecture. Finally we conclude and give some perspectives and future works. II. ONFERENING RHITETURE Most of the existing SIP and H.-based systems rely on a centralized architecture. In [7] a PP model is proposed for user location purpose(avoiding the use of a proxy server). onferencing applications require exchange of various types of media. H. onferencing [9] is essentially based on a centralized server that uses a set of tightly integrated protocols to control sessions. SIP conferencing makes minimal assumptions about the underlying transport protocol; as it can be used with any type of transport protocol such as: UP, TP or TLS [5]. comparison between SIP and H. [4], [6] shows that SIP provides a similar set of services to H., but with far lower complexity, rich extensibility, and better scalability, and facilities fixed mobile convergence. lso, due to its complete specifications and deployment, SIP can also be considered as one of the main standard protocol for IP signalling. For these reasons, SIP constitutes a good candidate for supporting signaling functions in our architecture. The two types of conference architecture (entralized and decentralized) are described bellow.
2 . entralized architecture The centralized approach requires a conference bridge or MU (Multipoint ontrol Unit). ll participants send audio, video, data and control streams to the MU in a point-topoint mode (see figure ). The central MU controls and manages the conference. It also provides functions such as media mixing, switching or transcoding. This centralized conference [0] provides main advantages such are: onference control and management simplification, terminal/user capacity negotiation. Transcoding function can be provided by the central MU which constitutes the focus for the signaling and media flow. This focus represents a single point of failure and requires expensive functionalities. E F ++++F F E ++++E +++E+F +++E+F +++E+F +++E+F. ecentralized architecture Fig. : entralized architecture onference Server Participant The second type of architecture (decentralized architecture) can be based on a full mesh topology connection [7] (see figure ), or makes use of a multicast mechanism (as our proposed model). The full mesh topology suffered from a lack of scalability, as each node must store N information about other nodes (for maintaining topology stabilization). When the number of nodes increases, nodes with limited resources (ex. mobile devices) will present limited storage capacity for keeping this information. decentralized architecture (not full mesh) is well adapted for this class of applications. Thus we propose for our model a hord based architecture[], and use an optimized algorithm for tree multicast construction. multicast concept is presented in section below. III. PPLITION LYER MULTIST pplication layer multicast aims to address scalability issues of unicast by distributing data replication process among the different group members, in an adaptative and efficient way. However LM is not efficient as IP multicast in terms of data duplication. The nodes in LM organize themselves into mesh or tree structures. More details are available on [][5][][][]. The next section gives a brief overview of hord and SIP, as our contribution combines these two protocols for providing conferencing services. Fig. : ecentralized architecture IV. SIP N HOR FOR PP ONFERENING entralized and decentralized topologies (full mesh) lead to some critical issues such as scalability. The first one, requires high resources (memory, bandwidth, processing) particularly for the server, while the second one, also requires resources, high bandwidth for each participant. Our architecture is based on hord protocol, it makes use of a decentralized architecture associated with a ring topology (not full mesh), and it uses SIP as signaling protocol.. SIP Session Initiation Protocol (SIP) is completely specified in multiple IETF RFs[]. It is an IETF application layer protocol used for VoIP call control and signaling. SIP is a textbased protocol (derived from HTTP), used for establishment, modification and termination of all types of media sessions []. SIP defines two types of messages: requests and responses. The request type message is specified by its method. SIP RFs defines multiple methods such as: INVITE, K, YE, NEL, OPTIONS and REGISTER. oth requests and responses contain header and body that provide network or session description information. SIP entity or service is identified by a unique name (SIP URL) using an type format address as: server/user-name@domain/host-name.. hord hord [] is a PP protocol which provides an efficient approach to resource location (data or user) issue. hord uses routing queries to locate a key with a small number of hops O(ln (n)), even if the system contains a large number of nodes. It is characterized by its: simplicity, performance and robustness. It adapts efficiently as nodes join or leave the system dynamically. node in hord is identified by a unique identifier, this last is obtained from IP address, using distributed hash table (HT) like SH- or SH-. Each node in hord maintains a routing table of (at most) m entries called the Finger table (N = m where N is the nodes number in the system). The i th entry in the table at node n contains the identifier of the first node s that succeeds n by at least i on the identifier circle. hord is organized according a ring topology (see figure ). hord lookup protocol complexity is O(ln (n)). The scalable approach proposed in this paper combines and
3 Finger Table (N6) N6 + = N6 + = N6 + 4 = N N6 N5 N4 N N Finger Table (N) N + = N N + = N N +4 = N5 N SIP Registration On start up Firewalls/NTs detection and Traversal Join in the System (bootstrapping ) Fig. : hord rchitecture Time expired Start timer Join onference Member takes advantages of both protocols described above: Scalability, robustness, stabilization algorithm, efficiency (when a node joins or leaves the system), interoperability, simplicity and security which characterized SIP protocol. So the main objective is to built a peer-to-peer decentralized conferencing topology based on hord for assuring scalability and fault tolerance, while using the standard SIP for signaling. In one-to-many or many-to-many applications, each node has to broadcast data streams for M participants (M > ). For optimizing data streams forwarding, we use an efficient application layer multicast mechanism build on top of the hord layer. Section 5 presents and describes our contribution, particularly the architecture and protocol model for providing conferencing services. V. NOVEL ONFERENING PPROH The proposed approach combines both protocols described above: hord for participant s discovery, localization, and topology stabilization management, and SIP protocol for signaling and call control.. Functional principle When a node wants to join the conference group (see figure 4), it must find a SIP server addresses using NS. It sends a SIP REGISTER message for authentication. Using bootstrapping mechanism[8], it joins the conference group. The second step for the new participant is to use one or more existing protocols such as IE[8], for discovering and traversing NTs and Firewalls. The third step is to send a Join message to any group member. If the join process fails, the participant waits until a time-out period, then the process is repeated from the beginning. If the join process succeeds, the participant (node) takes a place in the system and initiates its finger table. The stabilization algorithm is executed for maintaining the correctness of the successors list along the ring. If a node wants to leave the conference, it sends a leave message to all nodes identified in its finger table, informing them to its leaving. The figure 4 resumes and describes this process. In our approach, each node needs to know a limited topology related to the existing connections, for maintaining links correctness (finger table) along the hord based ring. This topology is used to build a multicast tree for transmitting media stream to a set of receivers. The information about other nodes is stored in a specific data structure called djacency matrix. For data streams forwarding, a transmitting node needs rejected accepted? Yes Fig. 4: rchitecture-functional schema onference Group to store IP addresses of receiving nodes. The next sub-section describes the multicast tree construction process.. Multicast tree construction The djacency Matrix: ased on the finger table defined in hord architecture, we define the adjacency matrix (denoted dj Mat) as: dj Mat[i,j] = : if there is a link between node N i and node N j (link non bijective), else it is equal to zero. The djacency matrix related to figure is shown table I. N N N N4 N5 N N N N N N N TLE I: The adjacency matrix (see figure ) ased on the adjacency matrix, we introduce an algorithm for multicast tree construction, with rapid convergence. ased on this algorithm, we can build a tree with any node as lgorithm : Multicast tree construction algorithm : begin : if (N i is a source node) then : Send message hild (N i ) to all nodes in its finger table 4: else N i is not a source 5: t the reception of the messages hild (N i ) forwards this message to all nodes in its finger table excepts those in sets, or Where: : the set of nodes which precede N i (Parent) : the set of nodes at the same level as N i (rothers) : the set of nodes which are child of its brothers and those last have an identifier numerically lower than that of N i 6: End.
4 root, and connect it to all other nodes in the system. Figures 5.a and 5.b show the global multicast tree respectively with N 0 and N as root. N N N4 N4 N N5 Join (I am a new participant) List of nodes recently join the group oostrap Host Existing overlay N N5 N6 N6 N (a) N (b) New node Fig. 5: Global Multicast tree Fig. 6: The join process. Shared adjacency matrix The djacency matrix can be viewed as a global knowledge base, associated to the list representing all the current participants. This data base is maintained in each node. So this matrix needs to be shared among all nodes. To limit and optimize the necessary resources (ex. memory space), which are critical in some environments (ex. P, mobile terminal...), we implement it as a matrix of bits. Then, for any change in finger table, the corresponding node updates this entry and sends it to all successors. The shared adjacency matrix is based on a distributed algorithm described below: lgorithm : Shared adjacency matrix : begin : For any changes in finger table (neighboring) or at reception of a new entry of adjacency matrix do Update this entry. Send this entry to all successors in the finger table. : end.. Join, leave and fault tolerance In a dynamic environment, nodes can join or leave at any time. The main challenge is to preserve the ability to locate and update every key/user in the network. For this, ootstrapping constitutes a vital core functionality, required by every Peer-to- Peer overlay network. Nodes intending to participate in such overlay network initially have to find at least one node that is already part of this network. Four solutions applicable for the ootstrapping problem exist [8] and are resumed as : Static Overlay Nodes-ootstrapping servers, Out-of-bande ddress caches, Random ddress Probing or Employing Network Layer Mechanism. To reduce system complexity, we advocate Static Overlay Nodes-ootstrapping servers for our proposed model. The figure 6 describes this process. When a node leaves the system, some nodes must update their finger table. fter a failure detection at node n by its neighboring nodes, this last node invokes the join operation process for localizing one node. Then the hord stabilization algorithm is executed. VI. NLYZE N ISUSSION The analysis of the overhead (control messages traffic) generated by each participant in the system is represented figure 7 and 8. For this we consider the three types of conferencing architecture (centralized, decentralized full mesh and based multicast tree). These figures show that the use of an application layer multicast mechanism, combined with a peer-to-peer architecture provides satisfactory results. s Number of sent/received messages by each participant : entralized onference : ecentralized onference (ompletely connected) M: ased Multicast onfererence Number of participants Fig. 7: Number of sent/received messages for centralized, decentralized full mesh and based multicast architectures. shown in figures 8, for the centralized conference, the server needs to send n messages for forwarding data flows to all participants in the system, and it receives a single data flow from each active participant (at most n nodes). The other nodes send only one control message for forwarding its own data flow and receive one single message from the server. For the decentralized conference (full mesh), each node sends n messages to other participants and receives n messages from them. Results are obtained from Matlab V7 Message is a data flows
5 quantity of information about other nodes stored by every participant M: entralized Multipoint onference M: ecentralized Multipoint onference (ompletely connected) M: Multicast onference ased Number of participants Fig. 8: Quantity of information stored by each participant In based multicast decentralized conference architecture (our approach), each node sends O(ln (n)) messages to other participants and receives O(ln (n)) messages from them. Table II shows a numerical examples for n =, n = 64 and n = 8. M n= 5 n=64 6 n=8 7 TLE II: numerical examples VII. ONLUSION N FUTURE WORKS The N-way and multicast conferencing constitute a critical application for Internet. udio, video and other type of media can be distributed efficiently between conference groups using multicast algorithms, minimizing the amount of traffic sent over the network. This is far more cost effective than maintaining a dedicated link between each participant. In this paper, we have proposed a based multicast architecture for conferencing. It is based on an efficient combination of PP (hord) and SIP protocol. The combination provides the main following characteristics : simplicity, robustness, scalability and fault tolerance. Then, we have defined an efficient application layer multicast algorithm for data flows forwarding. Interoperability is also facilitated by using SIP protocol but also, by the limited number of control messages generated by each peer. In term of future works, we envision to apply and combine a distributed QoS (Quality of Service) management, by extended our architecture to support a lookup mechanism (for selecting a path or connection with the specified and requested QoS parameters), and extended our model for other PP networks. Finally a complete implementation will be achieved by using and extending existing PP middlewares (ex. JXT ). [] J. Rosenberg, H. Schulzrinne, G. amarillo,. Johnston, J. Peterson, R. Sparks, M. Handley and E. Schooler, SIP: Session Initiation Protocol, RF 6, June 00. [] S. Ratnasamy and M. Handley and S. Shenker, pplication-level Multicast using ontent ddressable Networks, In Proc of Intl workshop on Networked Group ommunication (NG), November 00. [4] Peter T. Kirstein, Ian rown and Edmund Whelan, Secure Multicast onferencing, Technical report University ollege London. [5]. Rowstron and -M. Kermarrec and M. astro and P. ruschel, Scribe: large-scale and decentralized application-level multicast infrastructure, IEEE Journal on selected reas in communications, 0(8): , October 00. [6] Jiann-Min Ho, Jia-heng Hu and Peter Steenkiste, onference Gateway Supporting Interoperability between SIP and H., M Multimedia 00, P4-P40. [7] Kundan Singh and Henning Schulzrinne, Peer-to-Peer Internet Telephony using SIP, NOSSV 005 P6-P68. [8] urt ramer and Kendy Kutzner and Thomas Fuhrmann, ootstrapping Locality-ware PP Networks, 00. [9] O. Levin, H. Uniform Resource Locator (URL) Scheme Registration, RF 508. [0] []. Pendarakis and S. Shi and. Verma and M. Waldvogel LMI: an pplication Level Multicast Infrastructure, In rd USENIX Symposium on Internet Technologies, San Francisco,, US, Mars 00. [] S. Ratnasamy and M. Handley and S. Shenker pplication-level Multicast using ontent ddressable Networks, In Proc of Intl workshop on Networked Group ommunication (NG), November 00. [] L. Mathy and R. anonico and. Hutchison n Overlay Tree uilding ontrol Protocol, In Proc of Intl workshop on Networked Group ommunication (NG), Page 76-87, November 00. [4] Henning Schulzrinne and Jonathan Rosenberg, comparison of SIP and H. for Internet Telephony, Network and Operating System Support for igit udio and Video (NOSSV) ambridge, England, Jul [5] Henning Schulzirnne and Jonathan Rosenberg, Signaling for Internet Telephony, Technical Report US , olumbia University, New York, Feb [6] Kundan Singh, Gautam Nair and Henning Schulzrinne, entralized conferencing using SIP, In Internet Telephony Workshop, New York, pr. 00. [7] Ling hen, hong Luo, Jiang Li and hipeng Li, igiparty- ecentralized multiparty video conferencing system, Microsoft research sia. 00. [8] Victor Paulsamy and Samir hatterjee, Network convergence and the NT/Firewall problems, proceedings of (HISS 0), IEEE Internet computing, 00. REFERENES [] Ion Stoica, Robert Morris, avid Karger, M.Frans Kaashoek and Hari alakrishnan, hord: Scalable Peer to peer Lookup Service for Internet pplications, SIGOMM 0 M, 00. Project JXT:
Research on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia
A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia Felipe de Castro Louback Rocha 1, Linnyer Beatriz 1 Programa de Pós Graduação em Engenharia Elétrica, Universidade Federal
A P2PSIP event notification architecture
A P2PSIP event notification architecture Georgios Panagiotou Appear Networks AB, Kista Science Tower, 164 51 Kista, Sweden Email: [email protected] Alisa Devlic Appear Networks AB,
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland [email protected], [email protected] Abstract This
AN APPROACH TOWARDS THE LOAD BALANCING STRATEGY FOR WEB SERVER CLUSTERS
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS THE LOAD BALANCING STRATEGY FOR WEB SERVER CLUSTERS B.Divya Bharathi 1, N.A. Muneer 2, Ch.Srinivasulu 3 1
How To Use Application Layer Multicast For Media Distribution
An Architecture for Centralized SIP-based Audio Conferencing using Application Layer Multicast José Simões 1, Ravic Costa 1, Paulo Nunes 1, 3, Rui Lopes 1, 2, Laurent Mathy 4 1 Departamento de Ciências
A Distributed Architecture of Video Conference Using P2P Technology
1852 JOURNAL OF NETWORKS, VOL. 7, NO. 11, NOVEMBER 2012 A Distributed Architecture of Video Conference Using P2P Technology Xiaoyan Yu State Key Laboratory of Networking & Switching Technology Beijing
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
A Lightweight Secure SIP Model for End-to-End Communication
A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China [email protected] Abstract
Enabling SIP-Based Services in Ad Hoc Networks
Enabling SIP-Based Services in Ad Hoc Networks Heng-Te Chu 1, 2, Wen-Shiung Chen 1 1 VIPCCL, Dept. of Electrical Engineering, National Chi Nan University, Nan-Tou, Taiwan 2 Dept. of Information Networking
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature
A Thesis for the degree of Master Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature Chang-Hwan Lee School of Engineering Information and Communications University 2008 i Quantitative
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1
Design of a SIP Outbound Edge Proxy (EPSIP)
Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
A Scalable Multi-Server Cluster VoIP System
A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu [email protected] {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department
Alkit Reflex RTP reflector/mixer
Alkit Reflex RTP reflector/mixer Mathias Johanson, Ph.D. Alkit Communications Introduction Real time audio and video communication over IP networks is attracting a lot of interest for applications like
Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network
Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Jian Ni, Danny H. K. Tsang, Ivan S. H. Yeung, Xiaojun Hei Department of Electrical & Electronic Engineering Hong Kong University
2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing
SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: [email protected] ABSTRACT This paper presents a novel solution to
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Implementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
Implementing SIP and H.323 Signalling as Web Services
Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de
HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat
HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video
RELOAD Usages for P2P Data Storage and Discovery
RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf [email protected] Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference
VIDEOCONFERENCING. Video class
VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network
Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network Shih-yi Chiu Graduate Inst. of Networking and Communication Eng. Chao Yang Univ. of Tech., Taichung, Taiwan [email protected]
Bridging the gap between peer-to-peer and conventional SIP networks
1 Bridging the gap between peer-to-peer and conventional SIP networks Mosiuoa Tsietsi, Alfredo Terzoli, George Wells Department of Computer Science Grahamstown, South Africa Tel: +27 46 603 8291 [email protected]
Chord. A scalable peer-to-peer look-up protocol for internet applications
Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University
Proposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
Chord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing
Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing Adeel Anwar Abbasi*, Tahir Mehmood** {*Department of Computer Sciences, Shaheed Zulfiqar Ali Bhutto Institute of Science and
Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
10 Signaling Protocols for Multimedia Communication
Outline (Preliminary) 1. Introduction and Motivation 2. Digital Rights Management 3. Cryptographic Techniques 4. Electronic Payment Systems 5. Multimedia Content Description Part I: Content-Oriented Base
TSIN02 - Internetworking
TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division
A Scalable Architecture for SIP Infrastructure using Content Addressable Networks
A Scalable Architecture for Infrastructure using Content Addressable Networks Ramrajprabu Balasubramanian Injong Rhee Jaewoo Kang Department of Computer Science North Carolina State University Raleigh,
(Refer Slide Time: 6:17)
Digital Video and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 39 Video Conferencing: SIP Protocol
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
An Evaluation of Architectures for IMS Based Video Conferencing
An Evaluation of Architectures for IMS Based Video Conferencing Richard Spiers, Neco Ventura University of Cape Town Rondebosch South Africa Abstract The IP Multimedia Subsystem is an architectural framework
4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19
4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Voice over IP (VoIP) Overview. Introduction. David Feiner ACN 2004. Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples
Voice over IP (VoIP) David Feiner ACN 2004 Overview Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples Introduction Voice Calls are transmitted over Packet Switched Network instead
OVERVIEW OF ALL VOIP SOLUTIONS
OVERVIEW OF ALL VOIP SOLUTIONS Kovács Gábor Parnaki Zsolt Gergı 13/03/2009 TABLE OF CONTENTS Introduction Overview of VoIP protocols Standard based implementations: H.323 SIP Proprietary solutions: Skype
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Network Research Group, School of Computer Sciences Universiti Sains Malaysia11800 Penang, Malaysia Abstract
SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System
1 SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System David A. Bryan and Bruce B. Lowekamp Computer Science Department College of William and Mary Williamsburg, VA 23185 {bryan, lowekamp}@cs.wm.edu Abstract
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
Voice over IP (VoIP) Part 2
Kommunikationssysteme (KSy) - Block 5 Voice over IP (VoIP) Part 2 Dr. Andreas Steffen 1999-2001 A. Steffen, 10.12.2001, KSy_VoIP_2.ppt 1 H.323 Network Components Terminals, gatekeepers, gateways, multipoint
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or
Simulation of SIP-Based VoIP for Mosul University Communication Network
Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication
Secure VoIP Transmission through VPN Utilization
Secure VoIP Transmission through VPN Utilization Prashant Khobragade Department of Computer Science & Engineering RGCER Nagpur, India [email protected] Disha Gupta Department of Computer Science
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
Decentralized supplementary services for Voice-over-IP telephony
Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
An Efficient Server Load Balancing using Session Management
An Efficient Server Load Balancing using Session Management S.Tharani 1, Balika.J.Chelliah 2, Dr.J.Jagadeesan 3 1 M.Tech.Computer Science and Engg, Ramapuram campus, 2 Asst.prof, Ramapuram campus, 3 Prof,
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Multimedia Applications. Streaming Stored Multimedia. Classification of Applications
Chapter 2: Basics Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Multimedia Transfer and Protocols Quality of Service and Resource Management
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network
White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming
Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
Indepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Zeenov Agora High Level Architecture
Zeenov Agora High Level Architecture 1 Major Components i) Zeenov Agora Signaling Server Zeenov Agora Signaling Server is a web server capable of handling HTTP/HTTPS requests from Zeenov Agora web clients
Contents. Specialty Answering Service. All rights reserved.
Contents 1. Introduction to Session Internet Protocol... 2 2. History, Initiation & Implementation... 3 3. Development & Applications... 4 4. Function & Capability... 5 5. SIP Clients & Servers... 6 5.1.
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
Load Balancing for Microsoft Office Communication Server 2007 Release 2
Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks
Voice over IP. Presentation Outline. Objectives
Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester
A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks
1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many
New Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
Master Kurs Rechnernetze Computer Networks IN2097
Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle, Dr. Fuhrmann Master Kurs Rechnernetze Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Dr. Thomas Fuhrmann
Emergency Services Interconnection Forum (ESIF) Emergency Services Messaging Interface Task Force ( Task Force 34 )
Emergency Services Interconnection Forum (ESIF) Emergency Services Messaging Interface Task Force ( Task Force 34 ) Contribution Title: Implementing ESMI with SIP and ESTP Contribution Number: Submission
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Network Convergence and the NAT/Firewall Problems
Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
Where Should Services Reside in Internet Telephony Systems?
Where Should Services Reside in Internet Telephony Systems? Xiaotao Wu and Henning Schulzrinne xiaotaow,hgs @cs.columbia.edu Department of omputer Science, olumbia University, New York bstract Internet
LOOKING UP DATA IN P2P SYSTEMS
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed
