An Analysis of the Skype P2P Internet Telephony Protocol 王永豪 B 杜明可 B 吳治明 B

Size: px
Start display at page:

Download "An Analysis of the Skype P2P Internet Telephony Protocol 王永豪 B 杜明可 B 吳治明 B"

Transcription

1 An Analysis of the Skype P2P Internet Telephony Protocol 王永豪 B 杜明可 B 吳治明 B

2 Outline Intro The Skype Network Key Components Experiment setup explained Experiment performed and results Startup Login User search Call Establishment and teardown Logout Media Transfer Conferencing Other Skype facts Conclusion

3 Introduction Previous solutions are cost saving however falls short on quality. Call-completion rate are low due to NATs and Firewalls. Bloated interface makes usage a hassle. Requires technical expertise.

4 The Skype Network (as it used to be) Central Login Server Super Nodes Ordinary Nodes

5 The Skype Network (as it used to be) NAT and Firewall traversal STUN and TURN No global traversal server Function distributed among nodes A 3G P2P network Global Index Technology Multi-tiered network where supernodes communicate in such a way that every node in the network has full knowledge of all available users and resources with minimal latency 72 hour guaranteed user find TCP for signaling UDP & TCP for media traffic

6 The way it looks now

7 Key Components (as they used to Ports be) A Skype Client (SC) opens TCP and UDP listening ports as configured in the client itself SC also listens on ports 80(HTTP) and 443(HTTPS) No default listening port Host Cache (HC) Skype is an overlay network Thus the HC contains IP address and port# of super nodes. Used to reside in the registry

8 Key Components (as they used to be Codecs ilbc, isac, a third codec Possibly licensed from GlobalIPSound 50-8,000Hz Buddy List Used to be an encrypted registry entry Switching computers needed reconstruction of the buddy list )

9 Key Components (as they used to be Encryption AES (Advanced Encryption Standard) 256 bit NAT and Firewall ) SC can traverse NAT and firewalls quite successfully using variations of STUN and TURN SC cannot prevent from becoming a super node

10 Ports Key Components (what has changed) UDP and TCP ports actually used can be very random, sometimes not using the one configured in the SC. Host Cache Host Cache is still central to the Skype Protocol Rather than residing in the Windows registry, it has been moved to C:/Documents and Settings/All Users/Application Data/Skype/shared.xml

11 Key Components (What has changed) Buddy List No longer resides in the registry Moved to C:/Document and settings/username/application Data/skypeaccount/user1024.dbb Swiching computers no longer needs reconstruction of the entire contact list. Buddy List are saved both locally and in a remote server. Last-modified based

12 Key Components (What has changed) Encryption Since the size of the encrypted packets have changed since the publication of the paper, we believe that some level of modification has been made to the encryption method.

13 Experimental setup (I) In the paper Skype ver Windows 2000 PII 200MHz 128MB RAM, PPRO 200MHz 128MB RAM 10/100 Mb/s Ethernet Our setup Skype ver Windows XP Pentium M Centrino 1.5GHZ, 512MB RAM AthlonXP 1800+(1.4Ghz) 1GB RAM Cable, ADSL

14 Experimenal setup (II) Network configurations in the paper Both machines with public IP addresses One user behind port-restricted NAT Both users behind port restricted NAT and UDP restricted firewall Our Network Setup Both machines with public IP addresses One user behind NAT one users behind NAT and UDP restricted firewall One user behind a nested port-restricted NAT (two NATs) NAT #1 D-Link DI-714P+ Wireless Router NAR #2 Edimax Wireless Broadband Router Firewall From the routers

15 Install & Startup Startup as in the paper Upon first startup: HTTP GET request to skype.com with the keyword installed Upon subsequent startups: HTTP GET request with keyword getlatestversion Startup Now Upon first startup: HTTP GET request to ui.skype.com with keyword installed Upon subsequent startups: HTTP GET request with keyword getlatestversion

16 Login

17 Login Server(s) Before: Skype used to have 1 login server at located in Denmark Now: From the numerous tests performed, we believe that Skype now has a set of login servers that varies with location.

18 Bootstrap Nodes Nodes always present in the HC after instalation New bootstrap nodes:

19 First Time Login with public IPs UDP 11B UDP 23B TCP:SYN TCP:ACK TCP 14B TCP 14B TCP 176B TCP 246B FIN FIN,ACK Nodes UDP 26B Nodes TCP:SYN TCP:ACK TCP 14B TCP 34B TCP 146B TCP 67B TCP 28B TCP 197B UDP 34B 17 Nodes UDP 44B 5 Nodes UDP 11B replies from 22 nodes

20 One user behind a NAT UDP 11B UDP 23B UDP 11B TCP:SYN TCP:ACK TCP 2402B TCP 14B TCP 18B TCP 34B TCP 148B TCP 61B TCP 19B TCP 1206B TCP 18B TCP 34B UDP 26B TCP 19B TCP 1026B TCP 426B TCP 10B Nodes UDP 26B Nodes TCP:SYN TCP:ACK TCP 14B TCP 14B TCP 176B TCP 246B FIN FIN,ACK TCP 197B Nodes Nodes UDP 348B Nodes UDP11B Nodes

21 Port-restricted NAT and UDP Firewall UDP 44B 18 Nodes TCP 197B TCP 14B TCP 14B TCP 35B TCP 148B TCP 35B TCP 19B TCP 1205B TCP 407B 4Nodes TCP:SYN TCP:ACK TCP 14B TCP 14B TCP 176B TCP 246B FIN FIN,ACK TCP 28B TCP 197B TCP 52B TCP 101B TCP 93B TCP 249B TCP 1460B TCP 588B TCP 895 TCP 1460B TCP 588B TCP 895B

22 First Time Login (Our tests) UDP 11B UDP 23B UDP 58B TCP:SYN TCP:ACK TCP:14B TCP 14B TCP 28B TCP 232B TCP 17B TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 399B TCP 218B FIN FIN,ACK UDP 26B TCP 25B TCP 437B UDP 348B 17 Nodes UDP 44B 5 Nodes UDP 11B replies from 22 nodes TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 260B TCP 56B TCP 24B TCP 21B TCP 18B TCP 28B TCP 25B TCP 382B FIN FIN, ACK

23 One user behind a NAT (Our Tests) UDP 11B UDP 23B UDP 11B TCP:SYN TCP:ACK TCP 2402B TCP 14B TCP 18B TCP 34B TCP 148B TCP 61B TCP 19B TCP 1206B TCP 18B TCP 34B UDP 26B TCP 19B TCP 1026B TCP 426B TCP 10B UDP 26B TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 399B TCP 218B FIN FIN,ACK TCP 197B Nodes Nodes UDP 348B Nodes UDP11B Nodes TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 260B TCP 56B TCP 24B TCP 21B TCP 18B TCP 28B TCP 25B TCP 382B FIN FIN, ACK

24 One user behind NAT and firewall TCP 197B TCP 14B TCP 14B TCP 27B TCP 231B TCP 41B TCP 19B TCP 1205B TCP 407B 4Nodes TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 399B TCP 218B FIN FIN,ACK TCP 28B TCP 197B TCP 52B TCP 101B TCP 93B TCP 249B TCP 1460B TCP 588B TCP 895 TCP 1460B TCP 588B TCP 895B TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 260B TCP 56B TCP 24B TCP 21B TCP 18B TCP 28B TCP 25B TCP 382B FIN FIN, ACK

25 One user behind nested NAT (Our Tests) UDP 11B UDP 23B UDP 11B TCP:SYN TCP:ACK TCP 2402B TCP 14B TCP 18B TCP 34B TCP 148B TCP 61B TCP 19B TCP 1206B TCP 18B TCP 34B UDP 26B TCP 19B TCP 1026B TCP 426B TCP 10B UDP 26B TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 399B TCP 218B FIN FIN,ACK TCP 197B Nodes Nodes UDP 348B Nodes UDP11B Nodes TCP:SYN TCP:ACK TCP 5B TCP 5B TCP 260B TCP 56B TCP 24B TCP 21B TCP 18B TCP 28B TCP 25B TCP 382B FIN FIN, ACK

26 NAT, Firewall, Alternate Node Table, Subsequent Login The information can be detected by STUN Receive data from other nodes after connection with SN has been established Own Analysis SC initiates all connections, TCP or UDP. Combination with STUN solves the NAT problem P2P networks are very dynamic, thus: During login SC sends packets to 22 distinct nodes over UDP to advertise its presence The purpose of the packets can be similar but it is not clear at this point Subsequent login is very similar No packets

27 Login Process Time In the paper Public IP and single NAT 3-7 seconds Firewall 34 seconds Our results Public IP and NAT4~5 seconds Firewall ~40 seconds Login failure time 3 minutes

28 User Search SN gives the SC the nodes to query 8 nodes on average Process is repeated if user cannot be found Search results will be cached at intermediate nodes Based on user search time TCP 52B TCP 101B TCP 52B TCP 406B TCP 1104B Public IP UDP 77B 2 Nodes UDP 44B 2 Nodes NAT UDP 44B 4 Nodes UDP 17B 2 Nodes UDP 369B 1 Node UDP 44B 5 Nodes UDP 17B reply from 5 nodes TCP 183B TCP 132B TCP 205B TCP 27B TCP 205B TCP 27B TCP 205B TCP 27B TCP 138B TCP 18B NAT & Firewall

29 User Search (Our Tests) SN gives the SC the nodes to query More than 8 nodes were given for search Process is not repeated if user is not found. Search results will be cached at intermediate nodes Based on user search time TCP 60B TCP 101B TCP 52B TCP 406B TCP 1104B Public IP UDP 41B 3 Nodes NAT UDP 41B 3 Nodes UDP 1345B 2 Nodes UDP 50B 2 Node UDP 77B 3 Nodes UDP 1345B 3 Nodes TCP 183B TCP 132B TCP 205B TCP 27B TCP 205B TCP 27B TCP 205B TCP 27B TCP 138B TCP 18B NAT & Firewall

30 Call Establishment for Public IP User Not in Buddy list T Call_Est =T search +T signalling User in Buddy list TCP:SYN TCP:ACK TCP 14B TCP 14B TCP 77B TCP 4B TCP 4B TCP 528B TCP 4B TCP 946B TCP 479B

31 One User Behind a NAT Forwarding No direct flow from caller to callee; signalling is forwarded through another Skype node TCP 18B TCP 18B TCP 19B TCP 19B Error from paper!

32 NAT and Firewall TCP SYN TCP ACK TCP SYN TCP ACK TCP 19B TCP 19B TCP 19B TCP 19B Error from paper!

33 Call Teardown and Logout Call teardown TCP 17B TCP 14B Logout: TCP 64B TCP 21B

34 Media Transfer Silence Suppression Skype does not support silence supression. (Confirmed in test) Silence packets are transmitted to maintain UDP bindings in NAT In TCP, packets are still sent to avoid reduction of the window size Packages not 67 bytes, actually, dynamic payload size. Putting a Call on Hold 3 messages/second to call peer, SN or media proxy Additional TCP packets exchange Congestion Skype needs at least 1.5kB/s uplink and downlink to maintain reasonable quality Keep alive messages Sent to SN every 1 minute over TCP

35 Conferencing

36 Other Skype Facts Multiple Locations Calls and messages are forwarded to all locations where the user has signed it. Very good voice quality Compared to MSN Messenger and Yahoo! Messanger SN Selection Based on CPU power, RAM and bandwidth, and whether is on a public IP address. SC cannot be forced to become a SN The actual algorithm is not known

37 The result

38 Problems We Have Experienced During the Experiments Bad synchronization between SC local buddy list, and remote buddy list Call error No ringing on the other side No sound on the caller side

39 Conclusion First VoIP client based on P2P technology Factors of increasing popularity Better voice quality Works seamlessly behind NAT and firewall Extremely easy to install and use NAT and firewall traversal techniques Random port selection P2P overlay network No need for explicit NAT and firewall traversal server

Analysis and Signature of Skype VoIP Session Traffic

Analysis and Signature of Skype VoIP Session Traffic Ensimag-4MMSR 2011-2012 Student seminars Analysis and Signature of Skype VoIP Session Traffic Sven Ehlert Sandrine Petgang Fraunhofer FOKUS, Berlin, Germany July 25th, 2006 Students :Amine.Boukioud@ensimag.fr

More information

Peer-to-Peer Signalling. Agenda

Peer-to-Peer Signalling. Agenda Peer-to-Peer Signalling Marcin Matuszewski marcin@netlab.hut.fi S-38.115 Signalling Protocols Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction Peer-to-Peer (P2P) is a communications

More information

Overview Computer Networking Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste

Overview Computer Networking Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste Overview 15-441 15-441 Computer Networking 15-641 Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste Fall 2014 www.cs.cmu.edu/~prs/15-441-f14 Web Consistent hashing Peer-to-peer Motivation

More information

Experimental Study of Skype. Skype Peer-to-Peer VoIP System

Experimental Study of Skype. Skype Peer-to-Peer VoIP System An Experimental Study of the Skype Peer-to-Peer VoIP System Saikat Guha (Cornell) Neil Daswani (Google) Ravi Jain (Google) IPTPS 2006 About Skype Voice over IP (VoIP) 50 million users Valued at $2.6 billion

More information

Peer-to-Peer Architectures and Signaling. Agenda

Peer-to-Peer Architectures and Signaling. Agenda Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction

More information

CS 457 Multimedia Applications. Fall 2014

CS 457 Multimedia Applications. Fall 2014 CS 457 Multimedia Applications Fall 2014 Topics Digital audio and video Sampling, quantizing, and compressing Multimedia applications Streaming audio and video for playback Live, interactive audio and

More information

Performance Analysis of a P2P-Based VoIP Software

Performance Analysis of a P2P-Based VoIP Software Performance Analysis of a P2P-Based VoIP Software Gao Lisha and Luo Junzhou Department of Computer Science and Engineering Southeast University, Nanjing, China {lsgao, jluo}@seu.edu.cn Abstract With the

More information

Multimedia Networking

Multimedia Networking Multimedia Networking #2 Multimedia Networking Semester Ganjil 2012 PTIIK Universitas Brawijaya #2 Multimedia Applications 1 Schedule of Class Meeting 1. Introduction 2. Applications of MN 3. Requirements

More information

Sai Praveen Sadhu George Mason University Fall 2014, ECE 646

Sai Praveen Sadhu George Mason University Fall 2014, ECE 646 Sai Praveen Sadhu George Mason University Fall 2014, ECE 646 VoIP - > Voice over IP Technology to send voice and mul9media over Internet Protocol. Skype is a good example of VoIP. Skype was developed in

More information

From POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno

From POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno Advanced Networking P2P Voice Applications Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg The Client/Server model in conversationsl communications User-plan

More information

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach Chapter 9 Multimedia Networking A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

EFFECT OF DISTANCE ON SKYPE VOIP COMMUNICATION OVER WIRELESS NETWORK

EFFECT OF DISTANCE ON SKYPE VOIP COMMUNICATION OVER WIRELESS NETWORK ISSN 2320-9194 1 International Journal of Advance Research, IJOAR.org Volume 4, Issue 6, June 2016, Online: ISSN 2320-9194 EFFECT OF DISTANCE ON SKYPE VOIP COMMUNICATION OVER WIRELESS NETWORK Anas Tukur

More information

Chapter 5 VoIP. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March Multmedia Networking

Chapter 5 VoIP. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March Multmedia Networking Chapter 5 VoIP Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Multmedia Networking audio signal amplitude Multimedia: audio analog audio signal sampled

More information

Content distribution networks

Content distribution networks Content distribution networks v challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? v option 2: store/serve multiple copies of videos at

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Multimedia Networking

Multimedia Networking CE443 Computer Networks Multimedia Networking Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by

More information

Quantifying Skype User Satisfaction

Quantifying Skype User Satisfaction EECS443: Skype satisfaction presentation p. 1/14 Quantifying Skype User Satisfaction Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, and Chin-Laung Lei SIGCOMM 06, Sep 2006, Pisa, Italy. EECS443: Skype satisfaction

More information

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved. VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like

More information

An Efficient NAT Traversal for SIP and Its Associated Media sessions

An Efficient NAT Traversal for SIP and Its Associated Media sessions An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,

More information

Studying the Security in VoIP Networks

Studying the Security in VoIP Networks Abstract Studying the Security in VoIP Networks A.Alseqyani, I.Mkwawa and L.Sun Centre for Security, Communications and Network Research, Plymouth University, Plymouth, UK e-mail: info@cscan.org Voice

More information

Multimedia Networking

Multimedia Networking CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose

More information

GUIDELINES FOR VOIP NETWORK PREREQUISITES

GUIDELINES FOR VOIP NETWORK PREREQUISITES GUIDELINES FOR VOIP NETWORK PREREQUISITES WHITE PAPER October 2016 Unified Networks Unified User Clients Unified Messaging Mobility 100+ Call Management Features Executive Summary This document contains

More information

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.

More information

An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance

An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance Authors: Junxian Huang, Feng Qian, Yihua Guo, Yuanyuan Zhou, Qiang Xu, Z. Morley Mao, Subhabrata Sen, Oliver

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Lecture 10: TCP Friendliness, DCCP, NATs, and STUN

Lecture 10: TCP Friendliness, DCCP, NATs, and STUN Lecture 10: TCP Friendliness, DCCP, NATs, and STUN TCP Friendliness Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do

More information

Lecture 12: TCP Friendliness, DCCP, NATs, and STUN

Lecture 12: TCP Friendliness, DCCP, NATs, and STUN Lecture 12: TCP Friendliness, DCCP, NATs, and STUN Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit

More information

Installation & Configuration Guide Version 1.6

Installation & Configuration Guide Version 1.6 TekConSer Installation & Configuration Guide Version 1.6 Document Revision 2.0 http://www.kaplansoft.com/ TekConSer is built by Yasin KAPLAN Read Readme.txt for last minute changes and updates which can

More information

Advanced Computer Networks. IP Mobility

Advanced Computer Networks. IP Mobility Advanced Computer Networks 263 3501 00 IP Mobility Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Tuesday 1 April 2014 Outline Last week: Today: Cellular Networks

More information

Multimedia

Multimedia Multimedia Communications @CS.NCTU Lecture 11: Multimedia Networking Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 2 Why Multimedia Networking Matters? Watching video over Internet Uploading user-generated content

More information

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach Chapter 9 Multimedia Networking A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Skype Traffic Identification

Skype Traffic Identification Skype Traffic Identification Marcell Perényi, András Gefferth, Trang Dinh Dang and Sándor Molnár Budapest University of Technology and Economics, Department of Telecommunications and Media Informatics,

More information

Location Based Advanced Phone Dialer. A mobile client solution to perform voice calls over internet protocol. Jorge Duda de Matos

Location Based Advanced Phone Dialer. A mobile client solution to perform voice calls over internet protocol. Jorge Duda de Matos Location Based Advanced Phone Dialer A mobile client solution to perform voice calls over internet protocol Jorge Duda de Matos Superior Institute of Technology (IST) Lisbon, Portugal Abstract Mobile communication

More information

InstaVoIP Modules Embedded Web Pages. For Use with ControlSpace Designer User Guide. Software Version 4.4.0

InstaVoIP Modules Embedded Web Pages. For Use with ControlSpace Designer User Guide. Software Version 4.4.0 InstaVoIP Modules Embedded Web Pages For Use with ControlSpace Designer User Guide Software Version 4.4.0 Table of Contents Getting Started Overview...3 Before You Begin...3 Logging In...3 Navigating the

More information

Proceedings of the 41st Hawaii International Conference on System Sciences Skype Fingerprint

Proceedings of the 41st Hawaii International Conference on System Sciences Skype Fingerprint Skype Fingerprint Ronald C Dodge, JR. Department of Electrical Engineering and Computer Science United States Military Academy West Point, New York 10996 ronald.dodge@usma.edu Abstract The wealth of data

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

VG422R. User s Manual. Rev , 5

VG422R. User s Manual. Rev , 5 VG422R User s Manual Rev 1.0 2003, 5 CONGRATULATIONS ON YOUR PURCHASE OF VG422R... 1 THIS PACKAGE CONTAINS... 1 CONFIRM THAT YOU MEET INSTALLATION REQUIREMENTS... 1 1. INSTALLATION GUIDE... 2 1.1. HARDWARE

More information

P2PSIP, ICE, and RTCWeb

P2PSIP, ICE, and RTCWeb P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment

More information

Avaya AG250 Application Gateway Server Pre-Installation Checklist for Avaya Communication Manager

Avaya AG250 Application Gateway Server Pre-Installation Checklist for Avaya Communication Manager Avaya AG250 Application Gateway Server Pre-Installation Checklist for Avaya Communication Manager The Application Gateway Server delivers business applications to Internet-enabled IP telephones, personal

More information

i-phonenet X-Lite SoftPhone Setup Mar 2005 ver 1.0

i-phonenet X-Lite SoftPhone Setup Mar 2005 ver 1.0 i-phonenet X-Lite SoftPhone Setup Mar 2005 ver 1.0 TABLE OF CONTENT 1. REQUIREMENTS AND INSTALLATION...2 2. INSTALLING X-LITE (ONE TIME)...3 3. X-LITE SOFTPHONE SETUP...4 4. QUICK USER GUIDE...10 5. TROUBLESHOOTING...11

More information

GoIP Series SIM Card for GSM Voice Gateway User Manual

GoIP Series SIM Card for GSM Voice Gateway User Manual GoIP Series SIM Card for GSM Voice Gateway User Manual V3.0 Shenzhen HYBERTONE Technology Co., Ltd Http://www.hybertone.com Marketing@ hybertone.com Support@ hybertone.com Content Content...1 1 Overview...3

More information

Configuring a Softphone for Windows for Virtual Contact Center

Configuring a Softphone for Windows for Virtual Contact Center Configuring Bria 3 for Virtual Contact Center Configuring a Softphone for Windows for Virtual Contact Center 8x8 issues softphone licenses to Virtual Contact Center customers allowing them to manage all

More information

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission

More information

Octoshape. Commercial hosting not cable to home, founded 2003

Octoshape. Commercial hosting not cable to home, founded 2003 Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server

More information

VOIP Network Pre-Requisites

VOIP Network Pre-Requisites VOIP Network Pre-Requisites Executive Summary This document contains basic network requirements that are foundational for good voice quality when using Vogtec VoIP products/solutions over a data network.

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Eyeball Any-Bandwidth Technology. Guaranteeing the best possible VoIP and video quality over any Internet connection and on any device

Eyeball Any-Bandwidth Technology. Guaranteeing the best possible VoIP and video quality over any Internet connection and on any device Guaranteeing the best possible VoIP and video quality over any Internet connection and on any device www.eyeball.com Copyright 2005 VoIP and Video Telephony Voice over IP (VoIP) and video telephony, delivered

More information

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING FINAL EXAMINATION: April 25, 2017 DURATION: 2V2 hrs. ECE361 - Computer Networks Exam Type: B Calculator Type: 2 (non-programmable calculators)

More information

Administration Guide for Cisco VXC 4000 Release 1.0

Administration Guide for Cisco VXC 4000 Release 1.0 Administration Guide for Cisco VXC 4000 Release 1.0 Overview, page 1 Deployment, page 4 Differences in the virtual environment, page 7 Audio devices, page 7 What to tell users, page 9 Troubleshooting,

More information

Arion Router and Firewall User s Manual. Rev 1.0 Mar 2004

Arion Router and Firewall User s Manual. Rev 1.0 Mar 2004 Arion 3001-4 Router and Firewall User s Manual Rev 1.0 Mar 2004 Table of Contents 1. INTRODUCTION... 1 1.1. PRODUCT OVERVIEW... 1 2. HARDWARE DESCRIPTION... 2 2.1. FRONT PANEL... 2 Arion 3001-4 Front Panel...

More information

Secure Networking with NAT Traversal for Enhanced Mobility

Secure Networking with NAT Traversal for Enhanced Mobility Secure Networking with NAT Traversal for Enhanced Mobility Lubomir Cvrk 1, Vit Vrba 1 1 Brno University of Technology, Dept. of Telecommunications, Purkynova 118, 61200 Brno, Czech Republic {cvrk, vrba}@westcom.cz

More information

Requirements. System Requirements

Requirements. System Requirements System, page 1 Network for Cisco Jabber, page 2 Compatibility, page 4 Client, page 5 Audio and Video Properties, page 6 System The minimum system requirements for running Cisco Jabber for Mac are listed

More information

CS December 2017

CS December 2017 Caching Distributed Systems 25. Distributed Caching & Some Peer-to-Peer Systems Paul Krzyzanowski Rutgers University Fall 2017 Purpose of a cache Temporary storage to increase data access speeds Increase

More information

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) Your name: This exam consists 13 numbered problems on 6 pages printed front and back on 3 sheets. Please

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

D-Link DVG-1402S. Manual. 2Voice + 4SW VoIP Router. Version B.1. Building Networks for People

D-Link DVG-1402S. Manual. 2Voice + 4SW VoIP Router. Version B.1. Building Networks for People D-Link DVG-1402S 2Voice + 4SW VoIP Router Manual Building Networks for People Version B.1 Contents Package Contents... 3 Introduction... 4 Rear Panel Connections... 5 Front Panel LEDs... 6 Features...

More information

Congestion Control. Lecture 12: TCP Friendliness, DCCP, NATs, and STUN. Chiu Jain Phase Plots. Fair A=B. Responding to Loss. Flow B rate (bps) t 1 t 3

Congestion Control. Lecture 12: TCP Friendliness, DCCP, NATs, and STUN. Chiu Jain Phase Plots. Fair A=B. Responding to Loss. Flow B rate (bps) t 1 t 3 Congestion Control Lecture 12: TCP Friendliness, DCCP, s, and STUN TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit errors)

More information

Advanced Computer Networks. Mobility Support

Advanced Computer Networks. Mobility Support Advanced Computer Networks 263 3501 00 Mobility Support Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last Week WLAN/802.11 Architecture (Infrastructure / Ad

More information

SD-WAN Deployment Guide (CVD)

SD-WAN Deployment Guide (CVD) SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces

More information

UDP NAT Traversal. CSCI-4220 Network Programming Spring 2015

UDP NAT Traversal. CSCI-4220 Network Programming Spring 2015 UDP NAT Traversal CSCI-4220 Network Programming Spring 2015 What is NAT Traversal? NAT traversal means establishing a connection between two hosts when one or both is behind NAT. Many of today s network

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

Internet Networking recitation #

Internet Networking recitation # recitation # UDP NAT Traversal Winter Semester 2013, Dept. of Computer Science, Technion 1 UDP NAT Traversal problems 2 A sender from the internet can't pass a packet through a NAT to a destination host.

More information

Distributed Systems. 25. Distributed Caching & Some Peer-to-Peer Systems Paul Krzyzanowski. Rutgers University. Fall 2017

Distributed Systems. 25. Distributed Caching & Some Peer-to-Peer Systems Paul Krzyzanowski. Rutgers University. Fall 2017 Distributed Systems 25. Distributed Caching & Some Peer-to-Peer Systems Paul Krzyzanowski Rutgers University Fall 2017 1 Caching Purpose of a cache Temporary storage to increase data access speeds Increase

More information

Yealink VCS Network Deployment Solution

Yealink VCS Network Deployment Solution Yealink VCS Network Deployment Solution Oct. 2015 V10.6 Yealink Network Deployment Solution Table of Contents Table of Contents... iii Network Requirements... 1 Bandwidth Requirements... 1 Calculating

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

Latest Peer-to-Peer Technologies II Artjom Lind 1

Latest Peer-to-Peer Technologies II Artjom Lind 1 Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured

More information

i-phonenet X-Lite (ver 3.0) SoftPhone Setup June 2006 ver 1.0

i-phonenet X-Lite (ver 3.0) SoftPhone Setup June 2006 ver 1.0 i-phonenet X-Lite (ver 3.0) SoftPhone Setup June 2006 ver 1.0 TABLE OF CONTENT 1. REQUIREMENTS AND INSTALLATION...2 2. INSTALLING X-LITE (ONE TIME)...3 3. X-LITE SOFTPHONE SETUP...4 4. QUICK USER GUIDE...9

More information

Avi Networks Technical Reference (16.3)

Avi Networks Technical Reference (16.3) Page 1 of 7 view online A TCP/UDP profile determines the type and settings of the network protocol that a subscribing virtual service will use. It sets a number of parameters, such as whether the virtual

More information

CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol

CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol Mustapha GUEZOURI LISSI/SCTIC, University of Paris XII-Val de Marne, France e-mail mguezouri@yahoo.fr and Abdelhamid MELLOUK

More information

Popular protocols for serving media

Popular protocols for serving media Popular protocols for serving media Network transmission control RTP Realtime Transmission Protocol RTCP Realtime Transmission Control Protocol Session control Real-Time Streaming Protocol (RTSP) Session

More information

Integra Hosted Voice Service PC Communicator Desktop Enterprise Administrator Guide

Integra Hosted Voice Service PC Communicator Desktop Enterprise Administrator Guide PC Communicator Desktop Enterprise Administrator Guide 19 Feb 2014 i Enterprise Administrator Guide 21 Feb 20134 Contents 1 Introduction... 1-1 2 Integra PC Communicator Desktop Features... 1-1 2.1 The

More information

Bandwidth, Latency, and QoS for Core Components

Bandwidth, Latency, and QoS for Core Components Bandwidth, Latency, and QoS for Core Components, on page 1 Bandwidth, Latency, and QoS for Optional Cisco Components, on page 18 Bandwidth, Latency, and QoS for Optional Third-Party Components, on page

More information

Configuring Static and Dynamic NAT Translation

Configuring Static and Dynamic NAT Translation This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 4 Timeout Mechanisms, page 4 NAT Inside and Outside

More information

A5500 Configuration Guide

A5500 Configuration Guide A5500 Configuration Guide Sri Ram Kishore February 2012 Table of contents Gateway Configuration... 3 Accessing your gateway configuration tool... 3 Configuring your broadband Internet access... 3 Configuring

More information

Improving QoS of VoIP over Wireless Networks (IQ-VW)

Improving QoS of VoIP over Wireless Networks (IQ-VW) Improving QoS of VoIP over Wireless Networks (IQ-VW) Mona Habib & Nirmala Bulusu CS522 12/09/2002 1 Agenda Voice over IP (VoIP): Why? VoIP Protocols: H.323 and SIP Quality of Service (QoS) Wireless Networks

More information

Patrick Verkaik Yuvraj Agarwal, Rajesh Gupta, Alex C. Snoeren

Patrick Verkaik Yuvraj Agarwal, Rajesh Gupta, Alex C. Snoeren Patrick Verkaik Yuvraj Agarwal, Rajesh Gupta, Alex C. Snoeren UCSD NSDI April 24, 2009 1 Voice over IP (VoIP) and WiFi increasingly popular Cell phones with WiFi + VoIP: iphone (+ Skype, Fring, icall,..)

More information

Assessing Call Quality of VoIP and Data Traffic over Wireless LAN

Assessing Call Quality of VoIP and Data Traffic over Wireless LAN Assessing Call Quality of VoIP and Data Traffic over Wireless LAN Wen-Tzu Chen and Chih-Yuan Lee Institute of Telecommunications Management, National Cheng Kung University, No. 1 University Road, Tainan

More information

OSI Transport Layer. objectives

OSI Transport Layer. objectives LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating

More information

Overlay and P2P Networks. Unstructured networks I. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks I. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks I Prof. Sasu Tarkoma 16.1.2015 Contents Terminology and overlays continued Unstructured networks Today Napster Skype Next week: Gnutella BitTorrent Freenet

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

CSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012

CSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012 CSE 473 Introduction to Computer Networks Jon Turner Final Exam Your name here: 12/17/2012 1. (8 points). The figure below shows a network path connecting a server to a client. 200 km 2000 km 2 km X Y

More information

Technical White Paper for NAT Traversal

Technical White Paper for NAT Traversal V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Why WAN accelerators (still) matter? Andrea Dainese Data Center Engineer

Why WAN accelerators (still) matter? Andrea Dainese Data Center Engineer Why WAN accelerators (still) matter? Data Center Engineer Presentation Data Center Engineer @ Cerved Group SpA Red Hat RHCE VMware VCP-DCV NetApp NCIE-SAN Cisco CCIE Who is Andrea Dainese Cisco Architecture

More information

ANSEL FXS / 1 PSTN. VoIP Telephone Adaptor. User Manual V1.10

ANSEL FXS / 1 PSTN. VoIP Telephone Adaptor. User Manual V1.10 ANSEL 5518 1 FXS / 1 PSTN VoIP Telephone Adaptor User Manual V1.10 Quick Guide Step 1: Broadband (ADSL/Cable Modem) Connections for ANSEL 5518 A. Connect ANSEL 5518 WAN port to ADSL NAT Router as the following

More information

Service Quality Assurance Mechanisms for P2P SIP VoIP

Service Quality Assurance Mechanisms for P2P SIP VoIP Service Quality Assurance Mechanisms for P2P SIP VoIP Xiaofei Liao, Fengjiang Guo, and Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and

More information

TCP/IP. Chapter 5: Transport Layer TCP/IP Protocols

TCP/IP. Chapter 5: Transport Layer TCP/IP Protocols TCP/IP Chapter 5: Transport Layer TCP/IP Protocols 1 Objectives Understand the key features and functions of the User Datagram Protocol Explain the mechanisms that drive segmentation, reassembly, and retransmission

More information

ARP, IP, TCP, UDP. CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1

ARP, IP, TCP, UDP. CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1 ARP, IP, TCP, UDP CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1 IP and MAC Addresses Devices on a local area network have IP addresses (network layer) MAC addresses (data

More information

DOCUMENT REFERENCE: SQ EN. SAMKNOWS TEST METHODOLOGY Methodology and technical information relating to the SamKnows testing platform.

DOCUMENT REFERENCE: SQ EN. SAMKNOWS TEST METHODOLOGY Methodology and technical information relating to the SamKnows testing platform. DOCUMENT REFERENCE: SQ301-002-EN SAMKNOWS TEST METHODOLOGY Methodology and technical information relating to the SamKnows testing platform. March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG

More information

Introducing SkyPipe link optimisation for BGAN

Introducing SkyPipe link optimisation for BGAN Introducing SkyPipe link optimisation for BGAN Version 2 6 June 2008 inmarsat.com/bgan Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

Realtime Multimedia in Presence of Firewalls and Network Address Translation

Realtime Multimedia in Presence of Firewalls and Network Address Translation Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Oct, 2017 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or

More information

How to Configure VOIP Connections with the Skinny (SCCP) Firewall Plugin

How to Configure VOIP Connections with the Skinny (SCCP) Firewall Plugin How to Configure VOIP Connections with the Skinny (SCCP) Firewall Plugin SCCP (Skinny Client Control Protocol) is the protocol used by Cisco callmanager software for VOIP telephony. The VOIP connection

More information

Lecture 11. Transport Layer (cont d) Transport Layer 1

Lecture 11. Transport Layer (cont d) Transport Layer 1 Lecture 11 Transport Layer (cont d) Transport Layer 1 Agenda The Transport Layer (continue) Connection-oriented Transport (TCP) Flow Control Connection Management Congestion Control Introduction to the

More information

Realtime Multimedia in Presence of Firewalls and Network Address Translation. Knut Omang Ifi/Oracle 9 Nov, 2015

Realtime Multimedia in Presence of Firewalls and Network Address Translation. Knut Omang Ifi/Oracle 9 Nov, 2015 Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Nov, 2015 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or

More information

Overview of the Session Initiation Protocol

Overview of the Session Initiation Protocol CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction

More information

Lecture 22: TCP & NAT. CSE 123: Computer Networks Alex C. Snoeren

Lecture 22: TCP & NAT. CSE 123: Computer Networks Alex C. Snoeren Lecture 22: TCP & NAT CSE 123: Computer Networks Alex C. Snoeren Lecture 22 Overview TCP Connection Management TCP Slow Start Allow TCP to adjust to links of any speed Fast Retransmit & Recovery Avoid

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther

More information

Chapter 7. The Transport Layer

Chapter 7. The Transport Layer Chapter 7 The Transport Layer 1 2 3 4 5 6 7 8 9 10 11 Addressing TSAPs, NSAPs and transport connections. 12 For rarely used processes, the initial connection protocol is used. A special process server,

More information