An Analysis of the Skype P2P Internet Telephony Protocol 王永豪 B 杜明可 B 吳治明 B
|
|
- Melvyn Jones
- 5 years ago
- Views:
Transcription
1 An Analysis of the Skype P2P Internet Telephony Protocol 王永豪 B 杜明可 B 吳治明 B
2 Outline Intro The Skype Network Key Components Experiment setup explained Experiment performed and results Startup Login User search Call Establishment and teardown Logout Media Transfer Conferencing Other Skype facts Conclusion
3 Introduction Previous solutions are cost saving however falls short on quality. Call-completion rate are low due to NATs and Firewalls. Bloated interface makes usage a hassle. Requires technical expertise.
4 The Skype Network (as it used to be) Central Login Server Super Nodes Ordinary Nodes
5 The Skype Network (as it used to be) NAT and Firewall traversal STUN and TURN No global traversal server Function distributed among nodes A 3G P2P network Global Index Technology Multi-tiered network where supernodes communicate in such a way that every node in the network has full knowledge of all available users and resources with minimal latency 72 hour guaranteed user find TCP for signaling UDP & TCP for media traffic
6 The way it looks now
7 Key Components (as they used to Ports be) A Skype Client (SC) opens TCP and UDP listening ports as configured in the client itself SC also listens on ports 80(HTTP) and 443(HTTPS) No default listening port Host Cache (HC) Skype is an overlay network Thus the HC contains IP address and port# of super nodes. Used to reside in the registry
8 Key Components (as they used to be Codecs ilbc, isac, a third codec Possibly licensed from GlobalIPSound 50-8,000Hz Buddy List Used to be an encrypted registry entry Switching computers needed reconstruction of the buddy list )
9 Key Components (as they used to be Encryption AES (Advanced Encryption Standard) 256 bit NAT and Firewall ) SC can traverse NAT and firewalls quite successfully using variations of STUN and TURN SC cannot prevent from becoming a super node
10 Ports Key Components (what has changed) UDP and TCP ports actually used can be very random, sometimes not using the one configured in the SC. Host Cache Host Cache is still central to the Skype Protocol Rather than residing in the Windows registry, it has been moved to C:/Documents and Settings/All Users/Application Data/Skype/shared.xml
11 Key Components (What has changed) Buddy List No longer resides in the registry Moved to C:/Document and settings/username/application Data/skypeaccount/user1024.dbb Swiching computers no longer needs reconstruction of the entire contact list. Buddy List are saved both locally and in a remote server. Last-modified based
12 Key Components (What has changed) Encryption Since the size of the encrypted packets have changed since the publication of the paper, we believe that some level of modification has been made to the encryption method.
13 Experimental setup (I) In the paper Skype ver Windows 2000 PII 200MHz 128MB RAM, PPRO 200MHz 128MB RAM 10/100 Mb/s Ethernet Our setup Skype ver Windows XP Pentium M Centrino 1.5GHZ, 512MB RAM AthlonXP 1800+(1.4Ghz) 1GB RAM Cable, ADSL
14 Experimenal setup (II) Network configurations in the paper Both machines with public IP addresses One user behind port-restricted NAT Both users behind port restricted NAT and UDP restricted firewall Our Network Setup Both machines with public IP addresses One user behind NAT one users behind NAT and UDP restricted firewall One user behind a nested port-restricted NAT (two NATs) NAT #1 D-Link DI-714P+ Wireless Router NAR #2 Edimax Wireless Broadband Router Firewall From the routers
15 Install & Startup Startup as in the paper Upon first startup: HTTP GET request to skype.com with the keyword installed Upon subsequent startups: HTTP GET request with keyword getlatestversion Startup Now Upon first startup: HTTP GET request to ui.skype.com with keyword installed Upon subsequent startups: HTTP GET request with keyword getlatestversion
16 Login
17 Login Server(s) Before: Skype used to have 1 login server at located in Denmark Now: From the numerous tests performed, we believe that Skype now has a set of login servers that varies with location.
18 Bootstrap Nodes Nodes always present in the HC after instalation New bootstrap nodes:
19 First Time Login with public IPs UDP 11B UDP 23B TCP:SYN TCP:ACK TCP 14B TCP 14B TCP 176B TCP 246B FIN FIN,ACK Nodes UDP 26B Nodes TCP:SYN TCP:ACK TCP 14B TCP 34B TCP 146B TCP 67B TCP 28B TCP 197B UDP 34B 17 Nodes UDP 44B 5 Nodes UDP 11B replies from 22 nodes
20 One user behind a NAT UDP 11B UDP 23B UDP 11B TCP:SYN TCP:ACK TCP 2402B TCP 14B TCP 18B TCP 34B TCP 148B TCP 61B TCP 19B TCP 1206B TCP 18B TCP 34B UDP 26B TCP 19B TCP 1026B TCP 426B TCP 10B Nodes UDP 26B Nodes TCP:SYN TCP:ACK TCP 14B TCP 14B TCP 176B TCP 246B FIN FIN,ACK TCP 197B Nodes Nodes UDP 348B Nodes UDP11B Nodes
21 Port-restricted NAT and UDP Firewall UDP 44B 18 Nodes TCP 197B TCP 14B TCP 14B TCP 35B TCP 148B TCP 35B TCP 19B TCP 1205B TCP 407B 4Nodes TCP:SYN TCP:ACK TCP 14B TCP 14B TCP 176B TCP 246B FIN FIN,ACK TCP 28B TCP 197B TCP 52B TCP 101B TCP 93B TCP 249B TCP 1460B TCP 588B TCP 895 TCP 1460B TCP 588B TCP 895B
22 First Time Login (Our tests) UDP 11B UDP 23B UDP 58B TCP:SYN TCP:ACK TCP:14B TCP 14B TCP 28B TCP 232B TCP 17B TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 399B TCP 218B FIN FIN,ACK UDP 26B TCP 25B TCP 437B UDP 348B 17 Nodes UDP 44B 5 Nodes UDP 11B replies from 22 nodes TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 260B TCP 56B TCP 24B TCP 21B TCP 18B TCP 28B TCP 25B TCP 382B FIN FIN, ACK
23 One user behind a NAT (Our Tests) UDP 11B UDP 23B UDP 11B TCP:SYN TCP:ACK TCP 2402B TCP 14B TCP 18B TCP 34B TCP 148B TCP 61B TCP 19B TCP 1206B TCP 18B TCP 34B UDP 26B TCP 19B TCP 1026B TCP 426B TCP 10B UDP 26B TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 399B TCP 218B FIN FIN,ACK TCP 197B Nodes Nodes UDP 348B Nodes UDP11B Nodes TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 260B TCP 56B TCP 24B TCP 21B TCP 18B TCP 28B TCP 25B TCP 382B FIN FIN, ACK
24 One user behind NAT and firewall TCP 197B TCP 14B TCP 14B TCP 27B TCP 231B TCP 41B TCP 19B TCP 1205B TCP 407B 4Nodes TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 399B TCP 218B FIN FIN,ACK TCP 28B TCP 197B TCP 52B TCP 101B TCP 93B TCP 249B TCP 1460B TCP 588B TCP 895 TCP 1460B TCP 588B TCP 895B TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 260B TCP 56B TCP 24B TCP 21B TCP 18B TCP 28B TCP 25B TCP 382B FIN FIN, ACK
25 One user behind nested NAT (Our Tests) UDP 11B UDP 23B UDP 11B TCP:SYN TCP:ACK TCP 2402B TCP 14B TCP 18B TCP 34B TCP 148B TCP 61B TCP 19B TCP 1206B TCP 18B TCP 34B UDP 26B TCP 19B TCP 1026B TCP 426B TCP 10B UDP 26B TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 399B TCP 218B FIN FIN,ACK TCP 197B Nodes Nodes UDP 348B Nodes UDP11B Nodes TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 260B TCP 56B TCP 24B TCP 21B TCP 18B TCP 28B TCP 25B TCP 382B FIN FIN, ACK
26 NAT, Firewall, Alternate Node Table, Subsequent Login The information can be detected by STUN Receive data from other nodes after connection with SN has been established Own Analysis SC initiates all connections, TCP or UDP. Combination with STUN solves the NAT problem P2P networks are very dynamic, thus: During login SC sends packets to 22 distinct nodes over UDP to advertise its presence The purpose of the packets can be similar but it is not clear at this point Subsequent login is very similar No packets
27 Login Process Time In the paper Public IP and single NAT 3-7 seconds Firewall 34 seconds Our results Public IP and NAT4~5 seconds Firewall ~40 seconds Login failure time 3 minutes
28 User Search SN gives the SC the nodes to query 8 nodes on average Process is repeated if user cannot be found Search results will be cached at intermediate nodes Based on user search time TCP 52B TCP 101B TCP 52B TCP 406B TCP 1104B Public IP UDP 77B 2 Nodes UDP 44B 2 Nodes NAT UDP 44B 4 Nodes UDP 17B 2 Nodes UDP 369B 1 Node UDP 44B 5 Nodes UDP 17B reply from 5 nodes TCP 183B TCP 132B TCP 205B TCP 27B TCP 205B TCP 27B TCP 205B TCP 27B TCP 138B TCP 18B NAT & Firewall
29 User Search (Our Tests) SN gives the SC the nodes to query More than 8 nodes were given for search Process is not repeated if user is not found. Search results will be cached at intermediate nodes Based on user search time TCP 60B TCP 101B TCP 52B TCP 406B TCP 1104B Public IP UDP 41B 3 Nodes NAT UDP 41B 3 Nodes UDP 1345B 2 Nodes UDP 50B 2 Node UDP 77B 3 Nodes UDP 1345B 3 Nodes TCP 183B TCP 132B TCP 205B TCP 27B TCP 205B TCP 27B TCP 205B TCP 27B TCP 138B TCP 18B NAT & Firewall
30 Call Establishment for Public IP User Not in Buddy list T Call_Est =T search +T signalling User in Buddy list TCP:SYN TCP:ACK TCP 14B TCP 14B TCP 77B TCP 4B TCP 4B TCP 528B TCP 4B TCP 946B TCP 479B
31 One User Behind a NAT Forwarding No direct flow from caller to callee; signalling is forwarded through another Skype node TCP 18B TCP 18B TCP 19B TCP 19B Error from paper!
32 NAT and Firewall TCP SYN TCP ACK TCP SYN TCP ACK TCP 19B TCP 19B TCP 19B TCP 19B Error from paper!
33 Call Teardown and Logout Call teardown TCP 17B TCP 14B Logout: TCP 64B TCP 21B
34 Media Transfer Silence Suppression Skype does not support silence supression. (Confirmed in test) Silence packets are transmitted to maintain UDP bindings in NAT In TCP, packets are still sent to avoid reduction of the window size Packages not 67 bytes, actually, dynamic payload size. Putting a Call on Hold 3 messages/second to call peer, SN or media proxy Additional TCP packets exchange Congestion Skype needs at least 1.5kB/s uplink and downlink to maintain reasonable quality Keep alive messages Sent to SN every 1 minute over TCP
35 Conferencing
36 Other Skype Facts Multiple Locations Calls and messages are forwarded to all locations where the user has signed it. Very good voice quality Compared to MSN Messenger and Yahoo! Messanger SN Selection Based on CPU power, RAM and bandwidth, and whether is on a public IP address. SC cannot be forced to become a SN The actual algorithm is not known
37 The result
38 Problems We Have Experienced During the Experiments Bad synchronization between SC local buddy list, and remote buddy list Call error No ringing on the other side No sound on the caller side
39 Conclusion First VoIP client based on P2P technology Factors of increasing popularity Better voice quality Works seamlessly behind NAT and firewall Extremely easy to install and use NAT and firewall traversal techniques Random port selection P2P overlay network No need for explicit NAT and firewall traversal server
Analysis and Signature of Skype VoIP Session Traffic
Ensimag-4MMSR 2011-2012 Student seminars Analysis and Signature of Skype VoIP Session Traffic Sven Ehlert Sandrine Petgang Fraunhofer FOKUS, Berlin, Germany July 25th, 2006 Students :Amine.Boukioud@ensimag.fr
More informationPeer-to-Peer Signalling. Agenda
Peer-to-Peer Signalling Marcin Matuszewski marcin@netlab.hut.fi S-38.115 Signalling Protocols Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction Peer-to-Peer (P2P) is a communications
More informationOverview Computer Networking Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste
Overview 15-441 15-441 Computer Networking 15-641 Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste Fall 2014 www.cs.cmu.edu/~prs/15-441-f14 Web Consistent hashing Peer-to-peer Motivation
More informationExperimental Study of Skype. Skype Peer-to-Peer VoIP System
An Experimental Study of the Skype Peer-to-Peer VoIP System Saikat Guha (Cornell) Neil Daswani (Google) Ravi Jain (Google) IPTPS 2006 About Skype Voice over IP (VoIP) 50 million users Valued at $2.6 billion
More informationPeer-to-Peer Architectures and Signaling. Agenda
Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction
More informationCS 457 Multimedia Applications. Fall 2014
CS 457 Multimedia Applications Fall 2014 Topics Digital audio and video Sampling, quantizing, and compressing Multimedia applications Streaming audio and video for playback Live, interactive audio and
More informationPerformance Analysis of a P2P-Based VoIP Software
Performance Analysis of a P2P-Based VoIP Software Gao Lisha and Luo Junzhou Department of Computer Science and Engineering Southeast University, Nanjing, China {lsgao, jluo}@seu.edu.cn Abstract With the
More informationMultimedia Networking
Multimedia Networking #2 Multimedia Networking Semester Ganjil 2012 PTIIK Universitas Brawijaya #2 Multimedia Applications 1 Schedule of Class Meeting 1. Introduction 2. Applications of MN 3. Requirements
More informationSai Praveen Sadhu George Mason University Fall 2014, ECE 646
Sai Praveen Sadhu George Mason University Fall 2014, ECE 646 VoIP - > Voice over IP Technology to send voice and mul9media over Internet Protocol. Skype is a good example of VoIP. Skype was developed in
More informationFrom POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno
Advanced Networking P2P Voice Applications Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg The Client/Server model in conversationsl communications User-plan
More informationChapter 9. Multimedia Networking. Computer Networking: A Top Down Approach
Chapter 9 Multimedia Networking A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationEFFECT OF DISTANCE ON SKYPE VOIP COMMUNICATION OVER WIRELESS NETWORK
ISSN 2320-9194 1 International Journal of Advance Research, IJOAR.org Volume 4, Issue 6, June 2016, Online: ISSN 2320-9194 EFFECT OF DISTANCE ON SKYPE VOIP COMMUNICATION OVER WIRELESS NETWORK Anas Tukur
More informationChapter 5 VoIP. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March Multmedia Networking
Chapter 5 VoIP Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Multmedia Networking audio signal amplitude Multimedia: audio analog audio signal sampled
More informationContent distribution networks
Content distribution networks v challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? v option 2: store/serve multiple copies of videos at
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationMultimedia Networking
CE443 Computer Networks Multimedia Networking Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by
More informationQuantifying Skype User Satisfaction
EECS443: Skype satisfaction presentation p. 1/14 Quantifying Skype User Satisfaction Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, and Chin-Laung Lei SIGCOMM 06, Sep 2006, Pisa, Italy. EECS443: Skype satisfaction
More informationVoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.
VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like
More informationAn Efficient NAT Traversal for SIP and Its Associated Media sessions
An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,
More informationStudying the Security in VoIP Networks
Abstract Studying the Security in VoIP Networks A.Alseqyani, I.Mkwawa and L.Sun Centre for Security, Communications and Network Research, Plymouth University, Plymouth, UK e-mail: info@cscan.org Voice
More informationMultimedia Networking
CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose
More informationGUIDELINES FOR VOIP NETWORK PREREQUISITES
GUIDELINES FOR VOIP NETWORK PREREQUISITES WHITE PAPER October 2016 Unified Networks Unified User Clients Unified Messaging Mobility 100+ Call Management Features Executive Summary This document contains
More informationTRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016
TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.
More informationAn In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance
An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance Authors: Junxian Huang, Feng Qian, Yihua Guo, Yuanyuan Zhou, Qiang Xu, Z. Morley Mao, Subhabrata Sen, Oliver
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationLecture 10: TCP Friendliness, DCCP, NATs, and STUN
Lecture 10: TCP Friendliness, DCCP, NATs, and STUN TCP Friendliness Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do
More informationLecture 12: TCP Friendliness, DCCP, NATs, and STUN
Lecture 12: TCP Friendliness, DCCP, NATs, and STUN Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit
More informationInstallation & Configuration Guide Version 1.6
TekConSer Installation & Configuration Guide Version 1.6 Document Revision 2.0 http://www.kaplansoft.com/ TekConSer is built by Yasin KAPLAN Read Readme.txt for last minute changes and updates which can
More informationAdvanced Computer Networks. IP Mobility
Advanced Computer Networks 263 3501 00 IP Mobility Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Tuesday 1 April 2014 Outline Last week: Today: Cellular Networks
More informationMultimedia
Multimedia Communications @CS.NCTU Lecture 11: Multimedia Networking Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 2 Why Multimedia Networking Matters? Watching video over Internet Uploading user-generated content
More informationChapter 9. Multimedia Networking. Computer Networking: A Top Down Approach
Chapter 9 Multimedia Networking A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationSkype Traffic Identification
Skype Traffic Identification Marcell Perényi, András Gefferth, Trang Dinh Dang and Sándor Molnár Budapest University of Technology and Economics, Department of Telecommunications and Media Informatics,
More informationLocation Based Advanced Phone Dialer. A mobile client solution to perform voice calls over internet protocol. Jorge Duda de Matos
Location Based Advanced Phone Dialer A mobile client solution to perform voice calls over internet protocol Jorge Duda de Matos Superior Institute of Technology (IST) Lisbon, Portugal Abstract Mobile communication
More informationInstaVoIP Modules Embedded Web Pages. For Use with ControlSpace Designer User Guide. Software Version 4.4.0
InstaVoIP Modules Embedded Web Pages For Use with ControlSpace Designer User Guide Software Version 4.4.0 Table of Contents Getting Started Overview...3 Before You Begin...3 Logging In...3 Navigating the
More informationProceedings of the 41st Hawaii International Conference on System Sciences Skype Fingerprint
Skype Fingerprint Ronald C Dodge, JR. Department of Electrical Engineering and Computer Science United States Military Academy West Point, New York 10996 ronald.dodge@usma.edu Abstract The wealth of data
More informationUnit 8 Peer-to-Peer Networking
Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System
More informationVG422R. User s Manual. Rev , 5
VG422R User s Manual Rev 1.0 2003, 5 CONGRATULATIONS ON YOUR PURCHASE OF VG422R... 1 THIS PACKAGE CONTAINS... 1 CONFIRM THAT YOU MEET INSTALLATION REQUIREMENTS... 1 1. INSTALLATION GUIDE... 2 1.1. HARDWARE
More informationP2PSIP, ICE, and RTCWeb
P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment
More informationAvaya AG250 Application Gateway Server Pre-Installation Checklist for Avaya Communication Manager
Avaya AG250 Application Gateway Server Pre-Installation Checklist for Avaya Communication Manager The Application Gateway Server delivers business applications to Internet-enabled IP telephones, personal
More informationi-phonenet X-Lite SoftPhone Setup Mar 2005 ver 1.0
i-phonenet X-Lite SoftPhone Setup Mar 2005 ver 1.0 TABLE OF CONTENT 1. REQUIREMENTS AND INSTALLATION...2 2. INSTALLING X-LITE (ONE TIME)...3 3. X-LITE SOFTPHONE SETUP...4 4. QUICK USER GUIDE...10 5. TROUBLESHOOTING...11
More informationGoIP Series SIM Card for GSM Voice Gateway User Manual
GoIP Series SIM Card for GSM Voice Gateway User Manual V3.0 Shenzhen HYBERTONE Technology Co., Ltd Http://www.hybertone.com Marketing@ hybertone.com Support@ hybertone.com Content Content...1 1 Overview...3
More informationConfiguring a Softphone for Windows for Virtual Contact Center
Configuring Bria 3 for Virtual Contact Center Configuring a Softphone for Windows for Virtual Contact Center 8x8 issues softphone licenses to Virtual Contact Center customers allowing them to manage all
More informationUDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data
ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission
More informationOctoshape. Commercial hosting not cable to home, founded 2003
Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server
More informationVOIP Network Pre-Requisites
VOIP Network Pre-Requisites Executive Summary This document contains basic network requirements that are foundational for good voice quality when using Vogtec VoIP products/solutions over a data network.
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationEyeball Any-Bandwidth Technology. Guaranteeing the best possible VoIP and video quality over any Internet connection and on any device
Guaranteeing the best possible VoIP and video quality over any Internet connection and on any device www.eyeball.com Copyright 2005 VoIP and Video Telephony Voice over IP (VoIP) and video telephony, delivered
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING FINAL EXAMINATION: April 25, 2017 DURATION: 2V2 hrs. ECE361 - Computer Networks Exam Type: B Calculator Type: 2 (non-programmable calculators)
More informationAdministration Guide for Cisco VXC 4000 Release 1.0
Administration Guide for Cisco VXC 4000 Release 1.0 Overview, page 1 Deployment, page 4 Differences in the virtual environment, page 7 Audio devices, page 7 What to tell users, page 9 Troubleshooting,
More informationArion Router and Firewall User s Manual. Rev 1.0 Mar 2004
Arion 3001-4 Router and Firewall User s Manual Rev 1.0 Mar 2004 Table of Contents 1. INTRODUCTION... 1 1.1. PRODUCT OVERVIEW... 1 2. HARDWARE DESCRIPTION... 2 2.1. FRONT PANEL... 2 Arion 3001-4 Front Panel...
More informationSecure Networking with NAT Traversal for Enhanced Mobility
Secure Networking with NAT Traversal for Enhanced Mobility Lubomir Cvrk 1, Vit Vrba 1 1 Brno University of Technology, Dept. of Telecommunications, Purkynova 118, 61200 Brno, Czech Republic {cvrk, vrba}@westcom.cz
More informationRequirements. System Requirements
System, page 1 Network for Cisco Jabber, page 2 Compatibility, page 4 Client, page 5 Audio and Video Properties, page 6 System The minimum system requirements for running Cisco Jabber for Mac are listed
More informationCS December 2017
Caching Distributed Systems 25. Distributed Caching & Some Peer-to-Peer Systems Paul Krzyzanowski Rutgers University Fall 2017 Purpose of a cache Temporary storage to increase data access speeds Increase
More informationWashington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C
Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) Your name: This exam consists 13 numbered problems on 6 pages printed front and back on 3 sheets. Please
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.
More informationD-Link DVG-1402S. Manual. 2Voice + 4SW VoIP Router. Version B.1. Building Networks for People
D-Link DVG-1402S 2Voice + 4SW VoIP Router Manual Building Networks for People Version B.1 Contents Package Contents... 3 Introduction... 4 Rear Panel Connections... 5 Front Panel LEDs... 6 Features...
More informationCongestion Control. Lecture 12: TCP Friendliness, DCCP, NATs, and STUN. Chiu Jain Phase Plots. Fair A=B. Responding to Loss. Flow B rate (bps) t 1 t 3
Congestion Control Lecture 12: TCP Friendliness, DCCP, s, and STUN TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit errors)
More informationAdvanced Computer Networks. Mobility Support
Advanced Computer Networks 263 3501 00 Mobility Support Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last Week WLAN/802.11 Architecture (Infrastructure / Ad
More informationSD-WAN Deployment Guide (CVD)
SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces
More informationUDP NAT Traversal. CSCI-4220 Network Programming Spring 2015
UDP NAT Traversal CSCI-4220 Network Programming Spring 2015 What is NAT Traversal? NAT traversal means establishing a connection between two hosts when one or both is behind NAT. Many of today s network
More informationMaking Gnutella-like P2P Systems Scalable
Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems
More informationNetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.
NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility
More informationInternet Networking recitation #
recitation # UDP NAT Traversal Winter Semester 2013, Dept. of Computer Science, Technion 1 UDP NAT Traversal problems 2 A sender from the internet can't pass a packet through a NAT to a destination host.
More informationDistributed Systems. 25. Distributed Caching & Some Peer-to-Peer Systems Paul Krzyzanowski. Rutgers University. Fall 2017
Distributed Systems 25. Distributed Caching & Some Peer-to-Peer Systems Paul Krzyzanowski Rutgers University Fall 2017 1 Caching Purpose of a cache Temporary storage to increase data access speeds Increase
More informationYealink VCS Network Deployment Solution
Yealink VCS Network Deployment Solution Oct. 2015 V10.6 Yealink Network Deployment Solution Table of Contents Table of Contents... iii Network Requirements... 1 Bandwidth Requirements... 1 Calculating
More informationComputer Science 461 Final Exam May 22, :30-3:30pm
NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge
More informationLatest Peer-to-Peer Technologies II Artjom Lind 1
Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured
More informationi-phonenet X-Lite (ver 3.0) SoftPhone Setup June 2006 ver 1.0
i-phonenet X-Lite (ver 3.0) SoftPhone Setup June 2006 ver 1.0 TABLE OF CONTENT 1. REQUIREMENTS AND INSTALLATION...2 2. INSTALLING X-LITE (ONE TIME)...3 3. X-LITE SOFTPHONE SETUP...4 4. QUICK USER GUIDE...9
More informationAvi Networks Technical Reference (16.3)
Page 1 of 7 view online A TCP/UDP profile determines the type and settings of the network protocol that a subscribing virtual service will use. It sets a number of parameters, such as whether the virtual
More informationCDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol
CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol Mustapha GUEZOURI LISSI/SCTIC, University of Paris XII-Val de Marne, France e-mail mguezouri@yahoo.fr and Abdelhamid MELLOUK
More informationPopular protocols for serving media
Popular protocols for serving media Network transmission control RTP Realtime Transmission Protocol RTCP Realtime Transmission Control Protocol Session control Real-Time Streaming Protocol (RTSP) Session
More informationIntegra Hosted Voice Service PC Communicator Desktop Enterprise Administrator Guide
PC Communicator Desktop Enterprise Administrator Guide 19 Feb 2014 i Enterprise Administrator Guide 21 Feb 20134 Contents 1 Introduction... 1-1 2 Integra PC Communicator Desktop Features... 1-1 2.1 The
More informationBandwidth, Latency, and QoS for Core Components
Bandwidth, Latency, and QoS for Core Components, on page 1 Bandwidth, Latency, and QoS for Optional Cisco Components, on page 18 Bandwidth, Latency, and QoS for Optional Third-Party Components, on page
More informationConfiguring Static and Dynamic NAT Translation
This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 4 Timeout Mechanisms, page 4 NAT Inside and Outside
More informationA5500 Configuration Guide
A5500 Configuration Guide Sri Ram Kishore February 2012 Table of contents Gateway Configuration... 3 Accessing your gateway configuration tool... 3 Configuring your broadband Internet access... 3 Configuring
More informationImproving QoS of VoIP over Wireless Networks (IQ-VW)
Improving QoS of VoIP over Wireless Networks (IQ-VW) Mona Habib & Nirmala Bulusu CS522 12/09/2002 1 Agenda Voice over IP (VoIP): Why? VoIP Protocols: H.323 and SIP Quality of Service (QoS) Wireless Networks
More informationPatrick Verkaik Yuvraj Agarwal, Rajesh Gupta, Alex C. Snoeren
Patrick Verkaik Yuvraj Agarwal, Rajesh Gupta, Alex C. Snoeren UCSD NSDI April 24, 2009 1 Voice over IP (VoIP) and WiFi increasingly popular Cell phones with WiFi + VoIP: iphone (+ Skype, Fring, icall,..)
More informationAssessing Call Quality of VoIP and Data Traffic over Wireless LAN
Assessing Call Quality of VoIP and Data Traffic over Wireless LAN Wen-Tzu Chen and Chih-Yuan Lee Institute of Telecommunications Management, National Cheng Kung University, No. 1 University Road, Tainan
More informationOSI Transport Layer. objectives
LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating
More informationOverlay and P2P Networks. Unstructured networks I. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks I Prof. Sasu Tarkoma 16.1.2015 Contents Terminology and overlays continued Unstructured networks Today Napster Skype Next week: Gnutella BitTorrent Freenet
More informationIPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationInformation Network Systems The network layer. Stephan Sigg
Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order
More informationTransporting Voice by Using IP
Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone
More informationCSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012
CSE 473 Introduction to Computer Networks Jon Turner Final Exam Your name here: 12/17/2012 1. (8 points). The figure below shows a network path connecting a server to a client. 200 km 2000 km 2 km X Y
More informationTechnical White Paper for NAT Traversal
V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationWhy WAN accelerators (still) matter? Andrea Dainese Data Center Engineer
Why WAN accelerators (still) matter? Data Center Engineer Presentation Data Center Engineer @ Cerved Group SpA Red Hat RHCE VMware VCP-DCV NetApp NCIE-SAN Cisco CCIE Who is Andrea Dainese Cisco Architecture
More informationANSEL FXS / 1 PSTN. VoIP Telephone Adaptor. User Manual V1.10
ANSEL 5518 1 FXS / 1 PSTN VoIP Telephone Adaptor User Manual V1.10 Quick Guide Step 1: Broadband (ADSL/Cable Modem) Connections for ANSEL 5518 A. Connect ANSEL 5518 WAN port to ADSL NAT Router as the following
More informationService Quality Assurance Mechanisms for P2P SIP VoIP
Service Quality Assurance Mechanisms for P2P SIP VoIP Xiaofei Liao, Fengjiang Guo, and Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and
More informationTCP/IP. Chapter 5: Transport Layer TCP/IP Protocols
TCP/IP Chapter 5: Transport Layer TCP/IP Protocols 1 Objectives Understand the key features and functions of the User Datagram Protocol Explain the mechanisms that drive segmentation, reassembly, and retransmission
More informationARP, IP, TCP, UDP. CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1
ARP, IP, TCP, UDP CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1 IP and MAC Addresses Devices on a local area network have IP addresses (network layer) MAC addresses (data
More informationDOCUMENT REFERENCE: SQ EN. SAMKNOWS TEST METHODOLOGY Methodology and technical information relating to the SamKnows testing platform.
DOCUMENT REFERENCE: SQ301-002-EN SAMKNOWS TEST METHODOLOGY Methodology and technical information relating to the SamKnows testing platform. March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG
More informationIntroducing SkyPipe link optimisation for BGAN
Introducing SkyPipe link optimisation for BGAN Version 2 6 June 2008 inmarsat.com/bgan Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationRealtime Multimedia in Presence of Firewalls and Network Address Translation
Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Oct, 2017 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or
More informationHow to Configure VOIP Connections with the Skinny (SCCP) Firewall Plugin
How to Configure VOIP Connections with the Skinny (SCCP) Firewall Plugin SCCP (Skinny Client Control Protocol) is the protocol used by Cisco callmanager software for VOIP telephony. The VOIP connection
More informationLecture 11. Transport Layer (cont d) Transport Layer 1
Lecture 11 Transport Layer (cont d) Transport Layer 1 Agenda The Transport Layer (continue) Connection-oriented Transport (TCP) Flow Control Connection Management Congestion Control Introduction to the
More informationRealtime Multimedia in Presence of Firewalls and Network Address Translation. Knut Omang Ifi/Oracle 9 Nov, 2015
Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Nov, 2015 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or
More informationOverview of the Session Initiation Protocol
CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction
More informationLecture 22: TCP & NAT. CSE 123: Computer Networks Alex C. Snoeren
Lecture 22: TCP & NAT CSE 123: Computer Networks Alex C. Snoeren Lecture 22 Overview TCP Connection Management TCP Slow Start Allow TCP to adjust to links of any speed Fast Retransmit & Recovery Avoid
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther
More informationChapter 7. The Transport Layer
Chapter 7 The Transport Layer 1 2 3 4 5 6 7 8 9 10 11 Addressing TSAPs, NSAPs and transport connections. 12 For rarely used processes, the initial connection protocol is used. A special process server,
More information