RELOAD Usages for P2P Data Storage and Discovery
|
|
|
- Joshua Willis
- 10 years ago
- Views:
Transcription
1 RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf
2 Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference controller Signaling with SIP Connected through DHT Proximity-aware Mesh building
3 Outline Introduction into RELOAD RELOAD Usages TURN advertisement SIP Registration Service Discovery Conclusion & Outlook
4 RELOAD Overview(1) RELOAD = REsource LOcation And Discovery (Defines) * a signaling protocol for P2P networks Features: Data storage and retrieval in a P2P network Message and routing services Designed for a variety of applications Pluggable overlay algorithm High security definitions NAT and Firewall traversal * Not a standard jet
5 RELOAD Overview(2) RELOAD overlay instance: Functionality overview
6 RELOAD Architecture OSI application layer! Application SIP Usage TURN Usage... Message Transport Storage Transport Topology Plugin Network Forward & Link Management Link DTLS TLS... OSI transport layer! Application: The application specific behaviors, called Usages Transport: Defines messages(store, fetch, join, etc) Defines storage types and permissions Pluggable Overlay Network: Creates, maintains and deletes connections Link: Underlying secure transport protocols
7 Kind Definition Each stored data (called Resource) belongs to a Kind: Resource-ID= Hash(Resource name), e.g. SIP URI But: Other Resources with different Kinds may produce same Resource-ID! Solution: Each Kind has its own Kind-ID Its up by the application to add new Kinds (data structures)
8 Usages A usage is an application that wishes to use the overlay for some purpose [1] A Usage must specify: Kind-IDs registration Kind data structure definition Access Control Rule How a Resource name is formed Merge of data, if its partitioned on multiple nodes Defines types of connections
9 TURN Usage(1) Problem: Many (if not most) peers behind NAT Solution: Communication through intermediate relay peer TURN = Traversal Using Relays around NAT) RELOAD Usage: Each overlay peer may act as TURN server After overlay join, a peer knows if it has an public IP if(ip==public): for d in range( 1, turndensity) store(turnserverkind(hash(node-id+d))) Advertises this peer as TURN server randomly in the Overlay
10 TURN Usage(2) Finding a TURN server (TS): Peer uses a Find request messages find(turnserverkind (random (Resource-ID) ) ) Returns 0 if no TURN server is known Returns the Resource-IDs for this Kind Then a peer uses a Fetch request for the returned Resource-ID Because every peer with public IP will become TS, a random search will quickly succeed
11 SIP Usage(1) Goal: Replace SIP registrars and proxies SIP Usage: Store mappings SIP URI Node-ID Example: e4f3a User lookup: fetch(sipkind(hash( ))) Returns: e4f3a Establishing a connection: 1. Use RELOAD AppAttach request to set up a transport 2. Establish SIP connection using this transport connection
12 SIP Usage(2) Establishing a SIP Dialog: ICE Checks for NAT and Firewall traversal Kermit Peer 1 Peer 2 Peer n Elmo AppAttach AppAttach AppAttach AppAttach AppAttach AppAttach AppAttach AppAttach ICE Checks INVITE 200 OK ACK
13 SIP Usage(3) SIP Usage defines a new Kind data structure SipRegistration: SIP URI as string XOR Destination List with preferred contacts Note: a user can have multiple locations (Home, Office, etc..) SipRegistrationData <<type=1>> +uri: opaque[2^16-1] SipRegistrationType <<enum>> +sip_registration_uri=1 +sip_registration_route=2 SipRegistration +type: SipRegistrationType +length: uint16 1 {XOR} 1 +data +data 1 1 SipRegistrationData <<type=2>> +contact_prefs: opaque[2^16-1] +destination_list: Destination[2^16-1]
14 Service Discovery Usage(1) Problem: How to find a service in a RELOAD overlay? Naive solution: Store all service-provider under well known Resource ID Scales linearly Owner of Resource ID may store an amount of data Requests could overload ID owner Solution: Building service discover tree structures: Scales logarithmic Storage and requesting load distributed
15 Service Discovery Usage(2) Each service provided in the overlay is identified by its own namespace Service registration: hash(namespace, i, j), with i is the level (depth) of the tree and j Node-ID at this level Example: hash( voic , 1, ef3a1 ) Then, service provider stores mappings up and down the tree Stops if: others IDs <= n.id <= other IDs OR Stops if: its the only leaf in the tree Each leaf has its own peer responsible for a range of Node-IDs
16 Service Discovery Usage(3) Service lookup: Fetch operation on hash( voic , 1, 3af2b ) Analog: Queries the tree up and down Repeat Fetch() until a node is found with the closest Node- ID to the node searching for the service Then: Establish transport connection to this node and proceed application procedures
17 Conclusion & Outlook Conclusion: RELOAD base protocol for P2P signaling Ready to add new applications Applications MUST define Usages, Kinds, etc.. Some Usages already defined No Usage for conferencing Outlook: RELOAD potential base for distributed conferencing My draft writing had already begun
18 Questions and Discussion Thanks for your Attention!
19 References [1] C. Jennings, B. Lowekamp, E. Rescorla, S. Baset, and H. Schulzrinne, REsource Location And Discovery (RELOAD) Base Protocol, IETF, Internet-Draft work in progress 08, March [2] C. Jennings, B. Lowekamp, E. Rescorla, S. Baset, and H. Schulzrinne, A SIP Usage for RELOAD, IETF, Internet-Draft work in progress 04, March [3] J.Meanpe, G. Camarillo, Service Discovery Usage for REsource LOcation And Discovery (RELOAD)" IETF, Internet-Draft work in progress 00, January 2010.
Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland [email protected], [email protected] Abstract This
A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt
A SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt IETF65, Dallas March 25, 2006 Eunsoo Shim Sathya Narayanan Greg Daley Panasonic Digital Networking Laboratory Two Layer Approach
Bridging the gap between peer-to-peer and conventional SIP networks
1 Bridging the gap between peer-to-peer and conventional SIP networks Mosiuoa Tsietsi, Alfredo Terzoli, George Wells Department of Computer Science Grahamstown, South Africa Tel: +27 46 603 8291 [email protected]
A Peer-to-peer Secure VoIP Architecture
A Peer-to-peer Secure VoIP Architecture Simone Cirani, Riccardo Pecori, and Luca Veltri Abstract Voice over IP (VoIP) and multimedia real-time communications between two ore more parties are widely used
Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature
A Thesis for the degree of Master Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature Chang-Hwan Lee School of Engineering Information and Communications University 2008 i Quantitative
Lawful Interception in P2Pbased
Lawful Interception in P2Pbased VoIP Systems Jan Seedorf (jan.seedorf_at_nw.neclab.eu) NEC Laboratories Europe Heidelberg, Germany July Page 2008 1-1 IPTCOMM 2008 Heidelberg, Germany Outline 1.
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Research on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP
Design of a SIP Outbound Edge Proxy (EPSIP)
Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma
ENUM: Migrating to VoIP. P2P Voice Applications
Advanced Networking ENUM: Migrating to VoIP P2P Voice Applications Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Index ENUM P2P Basics Overlay & P2P Does
A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia
A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia Felipe de Castro Louback Rocha 1, Linnyer Beatriz 1 Programa de Pós Graduação em Engenharia Elétrica, Universidade Federal
Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)
Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP) 1 st International Workshop on Critical Information Infrastructures Security August 31 st - September 1 st 2006. Contents
A P2PSIP event notification architecture
A P2PSIP event notification architecture Georgios Panagiotou Appear Networks AB, Kista Science Tower, 164 51 Kista, Sweden Email: [email protected] Alisa Devlic Appear Networks AB,
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Implementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
Masterarbeit. Alexander Knauf DisCo: A Protocol Scheme for Distributed Conference Control in P2PSIP based on RELOAD
Masterarbeit Alexander Knauf DisCo: A Protocol Scheme for Distributed Conference Control in P2PSIP based on RELOAD Fakultät Technik und Informatik Department Informatik Faculty of Engineering and Computer
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System
1 SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System David A. Bryan and Bruce B. Lowekamp Computer Science Department College of William and Mary Williamsburg, VA 23185 {bryan, lowekamp}@cs.wm.edu Abstract
An Efficient Server Load Balancing using Session Management
An Efficient Server Load Balancing using Session Management S.Tharani 1, Balika.J.Chelliah 2, Dr.J.Jagadeesan 3 1 M.Tech.Computer Science and Engg, Ramapuram campus, 2 Asst.prof, Ramapuram campus, 3 Prof,
Security Issues and Solutions in Peer-topeer Systems for Real-time Communications
Security Issues and Solutions in Peer-topeer Systems for Real-time Communications draft-schulzrinne-p2prg-rtc-security-00 Henning Schulzrinne Enrico Marocco Emil Ivov March 2009 (IETF 74) IETF - P2PRG
Chord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
OSSIR, November 2010 [email protected] 1/45
OSSIR, November 2010 [email protected] 1/45 Real-time Communication Applications OSSIR, November 2010 [email protected] 2/45 Protocols sip & xmpp OSSIR, November 2010 [email protected]
Network Convergence and the NAT/Firewall Problems
Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?
How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication? Nick Hawkins Director, Technology Consulting Polycom, Inc. All rights reserved. Agenda Introduction & standards Requirements
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
Security in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal. Cisco VCS X8.5 December 2014
Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal Cisco VCS X8.5 December 2014 Contents: Cisco VCS IP port usage Which IP ports are used with Cisco VCS? Which
Application Notes for Configuring Microsoft Office Communications Server 2007 R2 and Avaya IP Office PSTN Call Routing - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Microsoft Office Communications Server 2007 R2 and Avaya IP Office PSTN Call Routing - Issue 1.0 Abstract These Application
Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway)
Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway) Deployment Guide Cisco VCS X8.1 D14651.08 August 2014 Contents Introduction 4 Example network deployment 5 Network
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Appears in AAA-IDEA 2005 c IEEE SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp Computer Science Department College of William and Mary Williamsburg,
Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
NAT and Firewall Traversal. VoIP and MultiMedia 2011 [email protected] 1/77
and Firewall Traversal VoIP and MultiMedia 2011 [email protected] 1/77 Introduction Does anyone remember why we started working on IPv6? ICAN says IPv4 addresses will run out by 2011 XXXX says the same
Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0
Application Note Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0 1 FIREWALL REQUIREMENTS FOR ONSIGHT MOBILE VIDEO COLLABORATION SYSTEM AND HOSTED
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
Enabling Users for Lync services
Enabling Users for Lync services 1) Login to collaborate.widevoice Server as admin user 2) Open Lync Server control Panel as Run As Administrator 3) Click on Users option and click Enable Users option
Acano solution. Third Party Call Control Guide. March 2015 76-1055-01-E
Acano solution Third Party Call Control Guide March 2015 76-1055-01-E Contents Contents 1 Introduction... 3 1.1 How to Use this Guide... 3 1.1.1 Commands... 4 2 Example of Configuring a SIP Trunk to CUCM...
Request for Comments: 4579. August 2006
Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)
Creating your own service profile for SJphone
SJ Labs, Inc. 2005 All rights reserved SJphone is a registered trademark. No part of this document may be copied, altered, or transferred to, any other media without written, explicit consent from SJ Labs
Application Note. Onsight Connect Network Requirements V6.1
Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Intercluster Lookup Service
When the (ILS) is configured on multiple clusters, ILS updates Cisco Unified Communications Manager with the current status of remote clusters in the ILS network. The ILS cluster discovery service allows
SIP Trunk Configuration V/IPedge Feature Description 5/22/13
SIP Trunk Configuration V/IPedge Feature Description 5/22/13 OVERVIEW Session Initiation Protocol (SIP) is an application layer protocol used for establishing sessions in an IP network. SIP trunks allow
... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function
Next Generation Network Service Architecture in the IP Multimedia Subsystem Anahita Gouya, Noël Crespi, Lina Oueslati, {anahita.gouya, noel.crespi, lina.oueslati}@int-evry.fr, Institut National des Télécommunications
Application Note. SIP Domain Management
Application Note SIP Domain Management 28 March 2008 Table of Contents 1 WHAT IS A SIP DOMAIN?... 1 2 LOCAL SIP DOMAIN... 2 3 OTHER SIP DOMAIN... 3 4 DNS CONSIDERATIONS... 4 5 USING A PUBLIC DNS... 5 6
Session Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP
and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott
Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya
Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Polycom Unified Communications Deployment Guide for Microsoft Environments
Polycom Unified Communications Deployment Guide for Microsoft Environments Wave 4 February 2011 3725-00000-003C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated
A Scalable Architecture for SIP Infrastructure using Content Addressable Networks
A Scalable Architecture for Infrastructure using Content Addressable Networks Ramrajprabu Balasubramanian Injong Rhee Jaewoo Kang Department of Computer Science North Carolina State University Raleigh,
Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network
Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network Shih-yi Chiu Graduate Inst. of Networking and Communication Eng. Chao Yang Univ. of Tech., Taichung, Taiwan [email protected]
IP Office Technical Tip
IP Office Technical Tip Tip no: 188 Release Date: September 27, 2007 Region: GLOBAL Verifying IP Office SIP Trunk Operation IP Office back-to-back SIP Line testing IP Office Release 4.0 supports SIP trunking.
CommuniGate Pro Real-Time Features. CommuniGate Pro Internet Communications VoIP, Email, Collaboration, IM www.communigate.com
CommuniGate Pro Real-Time Features CommuniGate Pro for VoIP Administrators Audience: Server Administrators and Developers Focus: CommuniGate Pro as the Signaling platform Method: Understanding CommuniGate
Efficient load balancing system in SIP Servers ABSTRACT:
Efficient load balancing system in SIP Servers ABSTRACT: This paper introduces several novel load-balancing algorithms for distributing Session Initiation Protocol (SIP) requests to a cluster of SIP servers.
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
Cisco Expressway IP Port Usage for Firewall Traversal. Cisco Expressway X8.1 D15066.01 December 2013
Cisco Expressway IP Port Usage for Firewall Traversal Cisco Expressway X8.1 D15066.01 December 2013 Contents: Cisco Expressway IP port usage Which IP ports are used with Cisco Expressway? Which IP ports
A Scalable Multi-Server Cluster VoIP System
A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu [email protected] {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department
Enhancements to Collaborative Media Streaming with IETF Protocols
Enhancements to Collaborative Media Streaming with IETF Protocols Institute of Operating Systems and Computer Networks Technical University of Braunschweig Dagstuhl Seminar - Content Distribution Infrastructures,
Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition
Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition F. Astha Ekadiyanto ([email protected]) CONTENTS Why P2P? The P2P Overlay
New possibilities for the provision of value-added services in SIP-based peer-to-peer networks
New possibilities for the provision of value-added services in -based peer-to-peer networks A.Lehmann 1,2, W.Fuhrmann 3, U.Trick 1, B.Ghita 2 1 Research Group for Telecommunication Networks, University
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
I-TNT: PHONE NUMBER EXPANSION AND TRANSLATION SYSTEM FOR MANAGING INTERCONNECTIVITY ADDRESSING IN SIP PEERING
Journal of Engineering Science and Technology Vol. 10, No. 2 (2015) 174-183 School of Engineering, Taylor s University I-TNT: PHONE NUMBER EXPANSION AND TRANSLATION SYSTEM FOR MANAGING INTERCONNECTIVITY
Adaptation of TURN protocol to SIP protocol
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 78 Adaptation of TURN protocol to SIP protocol Mustapha GUEZOURI,
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
TECHNICAL NOTE. FortiGate Support for SIP FortiOS v3.0 MR5. www.fortinet.com
TECHNICAL NOTE FortiGate Support for SIP FortiOS v3.0 MR5 www.fortinet.com FortiGate Support for SIP Technical Note FortiOS v3.0 MR5 22 August 2007 01-30005-0232-20070822 Copyright 2007 Fortinet, Inc.
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
Proposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
EE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry [email protected] [email protected] Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
A Distributed Architecture of Video Conference Using P2P Technology
1852 JOURNAL OF NETWORKS, VOL. 7, NO. 11, NOVEMBER 2012 A Distributed Architecture of Video Conference Using P2P Technology Xiaoyan Yu State Key Laboratory of Networking & Switching Technology Beijing
Application Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt. John Buford, Avaya Labs Research
Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt John Buford, Avaya Labs Research Topics SAM Charter Recap and Problem Statement AMT(Automatic Multicast Tunneling) Overview
SIP Essentials Training
SIP Essentials Training 5 Day Course Lecture & Labs COURSE DESCRIPTION Learn Session Initiation Protocol and important protocols related to SIP implementations. Thoroughly study the SIP protocol through
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
Plaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3
Uni Innsbruck Informatik Uni Innsbruck Informatik Peerto topeer Systems DHT examples, part (Pastry, Tapestry and Kademlia) Michael Welzl [email protected] DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg
VoIP Server Reference
IceWarp Server VoIP Server Reference Version 10 Printed on 12 August, 2009 i Contents VoIP Service 1 Introduction... 1 V10 New Features... 3 SIP REFER... 3 SIP Call Transfer Agent Settings... 3 NAT traversal
IP over Optical Networks - A Framework draft-ip-optical-framework-01.txt
IP over Optical Networks - A Framework draft-ip-optical-framework-01.txt Bala Rajagopalan James Luciani Daniel Awduche Brad Cain Bilel Jamoussi 1 IETF 7/31/00 About this Draft Deals with the following
