UPnP [1/2] Universal Plug and Play It is being pushed by Microsoft



Similar documents
NAT Traversal for VoIP. Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist David Schwartz Director, Telephony Research

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 TEL: # 255

Network Convergence and the NAT/Firewall Problems

NAT and Firewall Traversal. VoIP and MultiMedia /77

NAT and Firewall Traversal with STUN / TURN / ICE

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic

NAT Traversal for VoIP

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution

NAT and Firewall Traversal with STUN / TURN / ICE

Review: Lecture 1 - Internet History

EE4607 Session Initiation Protocol

OSSIR, November /45

TECHNICAL CHALLENGES OF VoIP BYPASS

The H.323 NAT/FW Traversal Solution

Best Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011

Formación en Tecnologías Avanzadas

Application Note. Onsight Connect Network Requirements V6.1

Developing P2P Protocols across NAT

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005

Application Note. Onsight TeamLink And Firewall Detect v6.3

NAT TCP SIP ALG Support

ThinkTel ITSP with Registration Setup Quick Start Guide

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities

OpenScape Business V1

Voice over IP Fundamentals

Cullen Jennings July 2015

SIP Essentials Training

Creating your own service profile for SJphone

Application Note. Onsight Connect Network Requirements v6.3

The SIP School- 'Mitel Style'

OpenScape Business V2

Demystifying SIP NAT Traversal

How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions

Skype characteristics

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Bria iphone Edition User Guide

THINKTEL COMMUNICATIONS TALKSWITCH VS TALKSWITCH VS THINKTEL SIP TRUNK & DID

Basic Vulnerability Issues for SIP Security

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Firewalls P+S Linux Router & Firewall 2013

DSX. ATC SIP Trunk Setup. April 22, 2011 Issue NEC Corporation of America 4 Forest Parkway, Shelton, CT 06484

Nortel Technology Standards and Protocol for IP Telephony Solutions

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

SIP A Technology Deep Dive

TLS and SRTP for Skype Connect. Technical Datasheet

Session Initiation Protocol and Services

SIP Trunking Quick Reference Document

Programming Manual for Virtual SIP Trunk Card

Voice over IP Communications

Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date:

Technical Information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

VoIP Server Reference

BROADSOFT PARTNER CONFIGURATION GUIDE VEGASTREAM VEGA 100

A Comparative Study of Signalling Protocols Used In VoIP

Configuring SIP Support for SRTP

Avaya Port Matrix: Avaya one-x Communicator Release 6

Avaya IP Office SIP Configuration Guide

SIP Trunking Manual Technical Support Web Site: (registration is required)

Peer-to-Peer Systems and Security

Vintalk SIP Trunk Setup

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

point to point and point to multi point calls over IP

How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions

An outline of the security threats that face SIP based VoIP and other real-time applications

Session Border Controller

D-LINK DPH-140S SIP PHONE INSTALLATION GUIDE

Unit 23. RTP, VoIP. Shyam Parekh

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX

TALKSWITCH VOIP NETWORK TROUBLESHOOTING GUIDE

3CX IP PBX Phone System Technical Training Deerfield.com

Connecting with Vonage

Nokia E65 Internet calls

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

P160S SIP Phone Quick User Guide

How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?

ETM System SIP Trunk Support Technical Discussion

Adaptation of TURN protocol to SIP protocol

TSIN02 - Internetworking

A Scalable Multi-Server Cluster VoIP System

Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol

Implementing DHCPv6 on an IPv6 network

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Avaya IP Office SIP Trunk Configuration Guide

RTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos

Technical Configuration Notes

Asterisk SIP Trunk Settings - Vestalink

SIP Trunking and Voice over IP

Dial91 iphone User Guide

Provisioning and configuring the SIP Spider

Transcription:

VoIP + 1

UPnP [1/2] http://www.upnp.org/ Universal Plug and Play It is being pushed by Microsoft Windows Messenger A UPnP-aware client can ask the UPnPenabled how it would map a particular IP:port through UPnP It will not work in the case of cascading s 2

UPnP [2/2] A: Private Network UPnP-aware Internet gateway device The UPnP-enabled allows A to be aware of its external IP B: Public Internet B and A can communicate with each other Private Network Public Internet A UPnPenabled B 3

External Query A server sits listening for packets (call this a probe) When it receives a packet, it returns a message from the same port to the source containing the IP:port that it sees Public Internet IP: 10.0.0.1 Port: 8000 IP: 202.123.211.25 Port: 12345 Probe 4

STUN Simple Traversal of UDP Through RFC 3489 In Working Group IETF MIDCOM Group Simple Protocol Works with existing s Main features Allow Client to Discover Presence of Works in Multi- Environments Allow Client Discover Type of Allows Client to Discover the Binding Lifetimes Stateless Servers 5

STUN Server Allow client to discover if it is behind a, what type of it is, and the public address & port will use. Very Simple Protocol, Easy to implement, Little load Client wants to receive packet at port 5060 Send a query to STUN server from port 5060 STUN Server receives packet from 202.123.211.25 port 12345 Client IP: 10.0.0.1 Port: 5060 IP: 202.123.211.25 Port: 12345 STUN Server IP: 222.111.99.1 Port: 20202 STUN Server send a response packet to client. Tell him his public address is 202.123.211.25 port 12345 6

Binding Acquisition STUN Server can be ANYWHERE on Public Internet Call Flow Proceeds Normally

STUN Message [1/3] TLV (type-length-value) Start with a STUN header, followed by a STUN payload (which is a series of STUN attributes depending on the message type) Format STUN Header STUN Payload (can have none to many blocks) 8

STUN Message [2/3] STUN Header STUN Payload (can have none to many blocks) Message Type (16 bits) Message Length (16bits) Transaction ID (128 bits) Message Types 0x0001: Binding Request 0x0101: Binding Response 0x0111: Binding Error Response 0x0002: Shared Secret Request 0x0102: Shared Secret Response 0x0112: Shared Secret Error Response 9

STUN Message [3/3] STUN Header STUN Payload (can have none to many blocks) Attribute Type (16 bits) Attribute Length (16bits) Attribute Value (Variable length) Attribute Types 0x0001: MAPPED-ADDRESS 0x0002: RESPONSE-ADDRESS 0x0003: CHANGE-REQUEST 0x0004: SOURCE-ADDRESS 0x0005: CHANGED-ADDRESS 0x0006: USERNAME 0x0007: PASSWORD 0x0008: MESSAGE-INTEGRITY 0x0009: ERROR-CODE 0x000a: UNKNOWN-ATTRIBUTES 0x000b: REFLECTED-FROM 10

Automatic Detection of Environment [1/2] STUN Client Environment Port1 Port2 Port2 Port1 STUN Server IP1 STUN Server IP2 Test I Test II Test III Test IV 11

Automatic Detection of Environment [2/2] Test I UDP Blocked No Resp? Yes Same IP? Yes Test II No Symmetric No Same IP as Test I? Test III No Test II Resp? Resp? Yes No Sym UDP Firewall Yes Test IV Resp? Yes Restricted Yes Full Cone Open Internet No Port Restricted 12

Binding Lifetime Determination Socket X Bind Req. Bind (Pa, Pp) Binding Resp. MAPPED-ADDRESS (Pa, Pp) Start Timer T Socket Y Another Binding Request, RESPONSE-ADDRESS is set to (Pa, Pp) If it receives Binding Response on socket X, the binding has not expired. Client STUN 13

Binding Acquisition Procedure Control Media Shared Secret Request and Response Binding Request and Response (Pa, Pp) Binding Request and Response (Pa, Pp ) RESPONSE- ADDRESS is set to (Pa, Pp) SIP Message RTP Client 1 STUN Client 2 14

STUN - Pros and Cons Benefits No changes required in No changes required in Proxy Works through most residential Drawbacks Doesn t allow VoIP to work through Symmetric RTCP may not work Need to keep media flowing to keep bindings alive 15

Is STUN suitable for Symmetric Absolutely not Client A IP: 10.0.0.1 Port: 21 IP: 202.123.211.25 Port: 12345 Mapping Table 10.0.0.1:21 <-> 12345 (for 222.111.99.1 : 20202) STUN Server IP: 222.111.99.1 Port: 20202 Client B IP: 222.111.88.2 Port: 10101 16

Solutions for Symmetric s Connection Oriented Media RTP-Relay 17

Connection Oriented Media The endpoint outside the must wait until it receives a packet from the client before it can know where to reply Add a line to the SDP message (coming from the client behind the ) a=direction:active The initiating client will actively set up the IP:port to which the endpoint should return RTP The IP:port found in the SDP message should be ignored 18

Problem? 1) If the endpoint does not support the a=direction:active tag 2) If both endpoints are behind Symmetric s 19

RTP-Relay In either of the cases considered in the previous slide, one solution is to have an RTP Relay in the middle of the RTP flow between endpoints. The RTP Relay acts as the second endpoint to each of the actual endpoints that are attempting to communicate with each other. 20

Example The following is a typical call flow that might be instantiated between a User Agent behind a symmetric and a voice gateway on the open Internet: Proxy 4 1 8 5 2 3 6 7 UA 9 12 10 11 Voice Gateway RTP Relay 21

TURN Traversal Using Relay draft-rosenberg-midcom-turn-04.txt Expires: August 16, 2004 22