Analysis and Design of Instant Message System Based on P2P



Similar documents
A Network Simulation Experiment of WAN Based on OPNET

An Advanced Commercial Contact Center Based on Cloud Computing

Research on Operation Management under the Environment of Cloud Computing Data Center

An Optimization Model of Load Balancing in P2P SIP Architecture

Mobile Wireless Overview

CDMA-based network video surveillance System Solutions

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

SSL VPN Technology White Paper

Towards Cloud Streaming: architecture, mechanism and deployments

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Efficient evolution to all-ip

The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD

TOPOLOGIES NETWORK SECURITY SERVICES

A Scheme for Implementing Load Balancing of Web Server

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

ICTTEN4215A Install and configure internet protocol TV in a service provider network

Introduction to Ethernet

Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream

Implementing LTE International Data Roaming

On Cloud Computing Technology in the Construction of Digital Campus

White Paper. Requirements of Network Virtualization

Integrating VoIP Phones and IP PBX s with VidyoGateway

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

The Experimental Practices of VoIP Based on the Commercial Softswitch Device

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS

Cisco Videoscape Distribution Suite Service Broker

Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3

Chapter 12 Homework CIT J001/02/04/06. Name: Date: Course: Test:

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Small Business Stackable Switch White Paper January 16, 2001

An ECG Monitoring and Alarming System Based On Android Smart Phone

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

UPS battery remote monitoring system in cloud computing

Network Platform Makes SP More Brilliant

Enhancing VoIP with Voice Peering

DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK

Journal of Chemical and Pharmaceutical Research, 2014, 6(3): Research Article

Application notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 Issue 1.

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

Datawire Secure Transport Value Proposition

IT 3202 Internet Working (New)

IMT-2000 Network Architecture

P2P VoIP for Today s Premium Voice Service 1

Research on Cloud Computing Network Architecture Based on SDN Technology Weibo Li

Indepth Voice over IP and SIP Networking Course

Contents. Specialty Answering Service. All rights reserved.

IPv6 Practices on China Mobile IP Bearer Network

Wireless E-commerce Payment and Its Development in China

Huawei Agile WAN Solution

Quality of Service Routing Network and Performance Evaluation*

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Mobility and cellular networks

Masters of Science in Information Technology

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT

Study on Value Chain of Telecom VAS under Transformation Background

Integrating voice, video and data networks

VOIP Security Essentials. Jeff Waldron

Constructing High Quality IP Core Network

Data Communication and Computer Network

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA

Alexandre Weffort Thenorio - Data. IP-Telephony

Portable Wireless Mesh Networks: Competitive Differentiation

Lync for Mac 2011 Deployment Guide

Cellular Networks: Background and Classical Vulnerabilities

Networks 2. Gabriela Ochoa University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE

Supporting operators as they introduce Voice over LTE

International Journal of Advanced Research in Computer Science and Software Engineering

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.

Troubleshooting Voice Over IP with WireShark

VoIP in the Enterprise

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China

Content Distribution over IP: Developments and Challenges

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum

Building Service-driven NGN

Managed VoIP platform for delivering business class features to your clients. Deliver reliable Voice Over IP service without licensing costs

The NG-OSS Evolution of Telecom Service Providers: From Network-Focused to Customers-Focused

IT Data Communication and Networks (Optional)

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

DESIGN OF DATA CENTER S HIGH RELIABILITY IN LARGE AGRICULTURAL ENTERPRISE

International Journal of Scientific & Engineering Research Volume 3, Issue 12, December ISSN

WHITE PAPER. Gaining Total Visibility for Lawful Interception

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice

Acme Packet Net-Net SIP Multimedia-Xpress

Requirements and Service Scenarios for QoS enabled Mobile VoIP Service

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Information Technology Career Field Pathways and Course Structure

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Mobile. Analyzing, Planning and Optimizing Heterogeneous Mobile Access and Core Networks

Transcription:

Analysis and Design of Instant Message System Based on P2P Shen Zhiwei Ma Shaowu China Netcom Group Labs Beijing 100032 Abstract By analyzing current development conditions of mainstream Instant Message technologies and services, some detailed discussion about technical solution and formal operation deployment strategies of P2P Instant Message Services based on Internet is made. Several crucial problems of P2P Instant Message System about services management, interconnection with other instant message, security and profit-making mode are analyzed,, and how to develop P2P IM Services is proposed. Keywords P2P; Instant Message; Session Initiation Protocol; Profit-making Mode 1 Introduction At present, the application of IM (Instant Message) is used very widely, it is able to realize the integrated services based on Internet such as IP voice, data, and images. At the same time, the fee with PC voice one another is almost free,in virtue of the realizing of voice PC to phone must through fixed-line operator s interconnection, the fee is cheaper though not free. The very-low-fee or even cost-free IM software heavily shunt the traditional voice services of the operators. So need analyzing and research the IM, utilizing the technologies advantage of P2P IM to optimize operators own network and services, and bring forward the suited P2P IM scheme for operators faction. For the operators, the use of IM technologies based on P2P architecture would reduce communication equipment investment greatly, improve the network utilization rate and reduce the service development cost. And the operators could exploit many new value-added services based on P2P IM and make it become a new profit increment point. This paper proposes a solution of the IM based on P2P from the aspects of technical realization and service deployment by analyzing current mainstream IM technologies. 2 The current development conditions of Instant Message services Resently, with the rapid incensement of the number of the Internet users, the users of the IM also increase. Based on the I-Research market expection, the IM users all over the world would increase from 490 million in 2007 to 650 million in 2010, and the scale of IM market would increase from 150 million dollars to 280 hundred million dollars in 2010. The operators at home and abroad continuously propose new services. England Telecom had put forward a new Internet service that from Yahoo IM product to a phone in March 2004.China Telecom proposed Internet CALL ME IM system that provide the text message services among PC, PHS and mobile phone and the PC to 13

P2P 和 CDN 技 术 融 合 实 现 流 媒 体 业 务 phone voice service in November 2004, and the CALL ME update edition is tested in Guangdong province at present. China Mobile developed the IM Fetion based on Mobile Network that offering the text messages and voice services between a PC and a mobile phone in November 2006.China Union proposed the Mobile Network IM UMS that offering the text messages and voice services between a PC and a mobile phone in August 2007.China Netcom also provided CNCIM based on PHS in April 2007, and would propose CA based on Soft Switch. The development procedure of china IM is shown in figure 1.Figure 1(a) focuses on the time and figure 1(b) focuses on the function [1]. between different IM systems has become a serious problem[2,3]. Table.1 Contrast analyze of mainstream IM (a) For the profit-making mode, most IM platforms still use advertisement as their main way. This advertisement mode includes traditional, initiative and personal way. At the same time, it includes Internet, wireless and fixed-line Increment Services. The corporation mode makes profit by providing IM services for enterprises. The virtual telecommunication operators collect fees form the users to a dial fixed or mobile phone by using the IM software, and make profit with the IM brand patents. (b) Figure1 The development of IM in China ((a)about time,(b)about function) The contrastive analyis of current mainstream IM software such as QQ, MSN, TOM-Skype and Fetion according to the aspects of support network, work mode and protocol etc. is shown in table 1. It could be seen from table 1 that all of the IM platforms based on conventional C/S structure have their own private protocols except TOM-Skype, which is based on P2P mode and has standard protocol. So the IM system would have a bottleneck if the number of the users increases to a certain degree. At the same time, for the protocols not being opened, the interconnection 3 The technology realization scheme of P2P IM Services and deployment strategies After analyzing the contrast of the mainstream IM architecture with P2P technical features, a technical solution of the P2P IM providing a online real-time communication service across Internet, fixed and mobile networks that realized anywhere real-time communication to the users within fixed-telephone, PHS, PC, GSM mobile phone, CDMA mobile phone, GPRS mobile phone, 3G mobile phone and wifi/wimax mobile phone is proposed. The Internet communication services include the PC to PC text messages, presence of PC to PC, PC to PC voice, PC to PC video and PC to PC file transfer; the acrossnetwork data communication services consist of PC 14 信 息 通 信 技 术

to PC text messages, presence of PC to PC and PC to PC file transfer; and the across-network multimedia communication services are the PC to PC voices and PC to PC videos. At the same time, the system also supply the increment services based on content with a series of IM applications and the interface with the other services platform or content providers, for example, many people online games and personal spaces etc. management of users, platforms, contents and charges etc. In addition, the operation management level also provides the third-party interfaces. The physics topology of system is shown in figure 3. The established super node consists of chord ring and common users node connected with its adjacent super node that composed of partially decentralized structure topology. At the beginning, a node is a common node, and after it has run for certain time, Figure 2 Logical Architecture of P2P IM The solution adopts the partially decentralized structure topology and SIP/SIMPLE protocol as its calling signal, and the logical architecture is shown in figure 2. The access level is a terminal type of support services that including PC, wifi/wimax phone, fixed phone, PHS, GSM/GPRS/WAP mobile phone, CDMA mobile phone and 3G mobile phone etc. The network level is the uniform P2P overlay network above the access level, this level uses partially decentralized structure topology and is responsible for joining a peer and leaving a peer, choosing the calling route, maintaining the network stability with the chord algorithm and DHT algorithm. The service level is the system that could support services including Internet communication, the across-network data communication, the across-network multimedia communication and the increment services. The operation management level implements the the node could be converted to a super node when the node itself inspect own have enough performance and accessibility (for example, have an IP address and be able to run stably for a long time). The platform management server and content management server mostly manage every super node. The correlate information of users is stored through a database server. The message cache server stores the off-line text messages etc of the users. This system could interconnect with the operators own operation support system and the operators own increment services platform, SP/CP increment services platform and other IM systems through all kinds of interconnection gateway. All the IM services in this paper could be shown by WAP and WEB server. Considering the network of the operator, it is suggested that try to implement this system in one province or in one district in a practical deployment at the beginning. The system of P2P IM deployed in 15

P2P 和 CDN 技 术 融 合 实 现 流 媒 体 业 务 a province or a district metropolitan-area networks in the registration stage should be checked. Between (MAN), at the same time, validating usability the the validate communication the users could negotiate mechanism of P2P and the users experience effect a shared key which used for data transmission or by trial the each service function of P2P IM. As the communication stage. The system also provides the P2P architecture continuously mature, the mechanism functions of platform management and maintenance, of control and management improved, the market content release and management, system configure needs farther expand, the accumulate rich operation and management, long-distance monitoring and faults experience step by step, the internet bandwidth diagnose etc. farther increased and mobile terminal equipment its At present, much IM software have many performance better etc, we could deploy the system differences in the service function interface, and of P2P IM in core network. In this time, the system the description of data format that caused the deployment would be very flexibility that adjust the interconnection of different IM applications has dispose of super node which could deployed in core became a serious problem. Now there are two network, a province of backbone network or MAN, solutions, one is based on gateway, and the other is and super node s join, leave, failure all couldn t affect based on multi-protocol client. In this paper, a gateway the system stability. is adopted to realize the interconnection between one IM and another. On account of the real-time character of IM application that caused the network attack spread more fast and the result also more seriously through IM. We should design a specific information security IM system structure for IM garbage messages. For the security of transmission channel, a very credible encrypted channel mechanism is needed but Figure 3 Physics system topology of P2P IM there would not be a very high computing complexity. And for the enterprises, 4 Analyzing the management, it is suggested to build their own EIM (Enterprise IM) interconnection and security of P2P IM server inside, run the specific IM services, inspect and The solution of this paper proposed is a P2P IM note the flow of IM and the operation of IM users to system which could management, controlled and ensure the security of IM services [4]. operated. Before user login the system, user should send certificate request to authenticate server and 5 Analyzing the profit-making mode of through negotiation way to authenticate. The users P2P IM could login the system only using the authentication. When the operators develop the P2P IM services After the user logins the system successfully, the could earn function fee by providing the IM user need to establish a communication or exchange transmission function. The mobile IM could adopt data with the equity peer. Only after the successfully short message and IM client mode, the short message login the system, the users can search their equity charge basically by month and the client mode by peer information. Before the users exchange data, flow. At the same time, entirely deploying Increment the certificate which awarded by authenticate server Services about Internet, wireless, fixed-line etc to 16 信 息 通 信 技 术

attain the aim that through IM drive the Increment Services increased and through Increment Services attract the IM uses rise. The operators also may combine with the IM services CP/SP to cooperate and drive the whole IM industry chain harmonious developing. Except the tradition advertisement mode, the operators could attempt new mode including initiative and personal etc. For enterprise customers, the operators can provide IM servers and IM terminals to supply the IM services. And the fee of the PC to phone voice is also collected by the gateway. 6 Conclusion IM has become one of the important Internet applications after E-mail and web. The current IM architecture mostly bases on the C/S mode. The particular technical advantages of the IM system based on P2P architecture would be shown when the users and the services increase. This paper focuses on designing a logical and network architecture of P2P IM, analyzing some crucial problems about the management, interconnection, security and profitmaking mode of the P2P IM systems, and giving some practical deployment suggestions for the systems of P2P IM. References [1] iresearch market consultation. http:// www.iresearchgroup.com.cn, 2007 [2] CHEN Gui-hai, LI Zheng-hua P2P Network: Architecture, Application and Design. Beijing: Tsinghua Press,2007 [3] YANG Tian-lu, LIU Yu-hong etc. The principle of P2P network technology and the examples of system development [M]. Beijing: Post&Telecom Press, 2007 [4] ZHANG Wen-mao, ZHANG Miao etc. Instant Messaging: the Present and the Future. Mini-Micro Systems of Computers, 2007, vol.28, no.7, pp.1162-1168. 作 者 简 历 Shen Zhiwei China Netcom Group Labs, Beijing, 100032, China Ma Shaowu China Netcom Group Labs, Beijing, 100032, China 17