RELOAD P2P Overlay Access Protocol. Younghan Kim Soongsil University

Size: px
Start display at page:

Download "RELOAD P2P Overlay Access Protocol. Younghan Kim Soongsil University"

Transcription

1 RELOAD P2P Overlay Access Protocol Younghan Kim Soongsil University

2 Contents Introduction What is P2P? Why P2P-SIP? P2PSIP overlay network Architecture Operations RELOAD protocol Introduction Protocol structure Usages for RELOAD protocol SIP usage Distributed conference control (DisCo) Service Discovery Other IETF P2P WGs 2

3 What is P2P? Centralized mainframes workstations Computer systems Client-server Distributed Peer-to-peer Share the resources of individual peers CPU, disk, bandwidth, information, Communication and collaboration Magi Groove Skype Flat Hierarchical Pure Hybrid C C RPC HTTP S DNS mount C C Gnutella Chord P P Kazaa Napster Groove P P SETI@Home folding@home Napster Gnutella Kazaa Freenet Overnet File sharing C P Distributed computing 3

4 Why P2P-SIP? INVITE REGISTER => Bob s host Contact: ssu.ac.kr Alice s host Client-server => maintenance, configuration, controlled infrastructure INVITE Alice P2P overlay REGISTER Bob No central server, search latency Alice

5 How to combine SIP + P2P? SIP-using-P2P Replace SIP location service by a P2P protocol Use two separate stacks: a SIP layer for registering users, resource lookup, establishing session, and a P2P layer for maintaining a distributed network P2P-over-SIP SIP messages are used for registering users, resource lookup, establishing session, also used for maintaining a P2P network SIP is mature, using SIP as foundation and carry out P2P traffic on top of it => not cost extra stack and not require much change of SIP itself P2PSIP WG FIND P2P network INSERT INVITE Alice P2P-SIP overlay REGISTER Bob INVITE sip:alice@ Alice Bob Alice

6 The architecture of P2P-SIP overlay network UA Peer E PSTN NAT / Firewall UA Peer F P2PSIP Overlay Gateway Peer G RELOAD P2PSIP Protocol UA Client C NAT / Firewall Peer Q Bootstrap Server Enrollment Server RELOAD P2PSIP Protocol UA Peer D SIP Proxy Peer P SIP domain SIP Redirect Peer R SIP UA A SIP UA B (*) draft-ietf-p2psip-concepts-03 October

7 Component definitions Peer: A node in overlay that provides storage and transport services to other nodes in that P2PSIP overlay Client: A node in overlay does not store information or forward messages Overlay name: a human-friendly name identifies a specific P2PSIP overlay Service: a capability contributed by a peer to an overlay or to the members of an overlay Peer protocol: the protocol used between P2PSIP overlay peers to share information and organize the P2PSIP overlay network Client protocol: the protocol used between clients and peers Enrollment server: provide peer-id and credentials for joining peer 7

8 P2PSIP overlay operations The joining procedure Joining Peer Bootstrap Server Bootstrap Peer Admitting Peer Joining Peer 5 Overlay information exchange P2PSIP Overlay ssu.ac.kr Bootstrap Peer Admitting Peer (5) (3) Credentials (1) & (4) (2) ICE Enrollment Server Joining Peer Bootstrap Server REGISTER (1) (2) ICE (3) (5) Credentials INVITE 200 OK ACK BYE/200 OK REGISTER INVITE 200 OK ACK ICE Connectivity Checks Peer Ptotocol connection from A to C established INVITE (Replaces) 200 OK ACK BYE/200 OK Overlay information exchange INVITE 200 OK ACK BYE/200 OK 8

9 The resource registration procedure Peer A (3) 200 OK P2PSIP Overlay (ssu.ac.kr) (3) 200 OK Peer C Peer B sip:alice@ssu.ac.kr (1) REGISTER (2) REGISTER (forward) P2P SIP Peer C is responsible of the mapping to sip:alice@ssu.ac.kr, because the URI hashes to its key space part (1) Standard SIP REGISTER message is sent to the overlay (2) Routing mechanism of the overlay handles to forward the message to peer responsible for the resource-id (Peer C) (3) On the reverse path, responsible peer sends 200 OK message to the peer providing the resource 9

10 P2PSIP Lookup SIP session establishment NAT P2P SIP NAT P2P SIP P2P SIP A P2P SIP P2P SIP A P2P SIP sip:bob@ssu.ac.kr P2PSIP Overlay (ssu.ac.kr) (3) 200 OK (bob (3) 200 OK (2) REGISTER (forward) (1) REGISTER (for resource lookup) B sip:bob@ssu.ac.kr (2) ICE (3) 200 OK P2PSIP Overlay (3) Media (ssu.ac.kr) (1) INVITE bob@ssu.ac.kr (3) 200 OK (1) INVITE (bob (forward) (2) REGISTER (forward) (1) REGISTER (for resource lookup) B P2P SIP NAT D C Peer C is responsible of the mapping to sip:bob@ssu.ac.kr, because it hashes to its key space part P2P SIP NAT D C 10

11 P2PSIP Peer Protocol (RELOAD) The first goal of P2PSIP WG is to develop and standardize a P2PSIP peer protocol This protocol is used between P2PSIP overlay peers, and define how the P2PSIP peers collectively provide for user and resource location in a SIP environment with no or minimal centralized servers Provide a distribution location service for RFC 3263 (locating SIP servers). The location service determines the correct destination of SIP requests without centralized servers, using only peers Resource Location And Discovery (RELOAD) protocol is proposed 11

12 RELOAD Introduction REsource LOcation And Discovery (RELOAD) A peer-to-peer (P2P) signaling protocol for use on the Internet Provides a generic, self-organizing overlay network service, allowing nodes to efficiently route messages and to efficiently store and retrieve data in the overlay. RELOAD provides several features Security Framework: central enrollment server. Usage Model: support a variety of applications, or new application usages (own data types, its rules). NAT Traversal: using ICE. High Performance Routing: a simple, lightweight forwarding header. Pluggable overlay Algorithms: a variety of structured (DHT) and unstructured overlay algorithms. (*) draft-ietf-p2psip-base-13 March

13 Architecture Usage Layer: each application defines a RELOAD usage (set of data kinds and behaviors that describe how to use the services provided by RELOAD) Message Transport: handles end-to-end reliability. Storage: processing messages relating to the storage and retrieval of data. Topology Plug-in: implement the specific overlay algorithm. Forwarding and Link Management Layer: store and implement routing table, establish new links (NAT using ICE) Overlay Link Layer: transporting traffic directly between nodes SIP Usage Message Transport Application XMPP Usage Forwarding & Link Management TLS DTLS... Storage Topology Plugin CHORD... Messaging API Overlay Link API 13

14 Message Transport Provides a generic message routing service for the overlay Each peer is identified by its location in the overlay as determined by its Node-ID Two basic functions that a component which is a client of the Routing Layer can perform : Send a message to a given peer, specified by Node-Id or responsible for a Resource-Id Receive messages that other peers sent to a Node-Id or Resource-Id for which this peer is responsible SIP Usage Message Transport Application XMPP Usage Forwarding & Link Management TLS DTLS... Messaging API Storage Topology Plugin CHORD... Overlay Link API 14

15 Storage and Topology Plug-in Storage Responsible for processing messages relating to the storage and retrieval messages from other peers A peer s Node-ID determines the set of resources that it will be responsible for storing Topology Plug-in 15 Responsible for implementing and maintaining the specific overlay algorithm being used SIP Usage Message Transport Application XMPP Usage Forwarding & Link Management TLS DTLS... Messaging API Storage Topology Plugin CHORD... Overlay Link API

16 Forwarding & Link Management Layer Responsible for getting a packet to the next peer, as determined by the Routing and Storage Layer Establishes and maintains the network connections as required by the Topology Plug-in Allows the topology plug-in to control the overlay and resource operations and messages. Responsible for setting up connections to other peers through NATs and firewalls using ICE Utilizes a framing header to encapsulate messages as they are forwarding along each hop. SIP Usage Message Transport Application XMPP Usage Forwarding & Link Management TLS DTLS... Messaging API Storage Topology Plugin CHORD... Overlay Link API 16

17 Data Storage Each kind is identified by a kind-id Base Routing Scheme Symmetric Recursive Protocol designers may define constraints Limits on size, on the values which may be stored Resource-ID Kind 1 Kind 2 Value Value Value Value Value 17

18 P2PSIP Integration Overview The SIP Usage of RELOAD allows SIP user agents to provide a peer-to-peer telephony service without the requirement for permanent proxy or registration servers The RELOAD overlay itself performs the registration and rendezvous functions The basic function of the SIP usage To allow Alice to start with a SIP URI (e.g., "bob@dht.ssu.ac.kr") End up with a connection which Alice's SIP UA can use to pass SIP messages back and forth to Bob's SIP UA The example of this is shown on next page 18

19 An SIP usage for RELOAD Peer Alice (5678) Peer1 Overlay Peer2 Peer Bob (1234) 1. Bob, operating Node-ID 1234, stores a mapping from his URI to his Node-ID in the overlay I.e., "sip:bob@dht.ssu.ac.kr -> 1234" Connect Connect Connect 2. Alice, operating Node-ID 5678, ConnectAns ConnectAns ConnectAns decides to call Bob. She looks up "sip:bob@dht.ssu.ac.kr" in the overlay ICE Checks INVITE OK ACK and retrieves "1234" 3. Alice uses the overlay to route a ICE Checks for media Connect message to Bob's peer RTP Bob responds with his own Connect and they set up a direct connection 19

20 RELOAD Message Flow Example JP PPP PP AP NP NNP BP Attach Dest = JP Attach Dest = JP Attach Dest = JP AttachAns AttachAns AttachAns TLS PPP PP JP: Joining Peer AP: Admitting Peer PP: Previous Peer (before AP) NP: Next Peer (after AP) BP 2.Attach Dest = JP 5.AttachAns 1.Attach Dest = JP 6.AttachAns 3.Attach Dest = JP 4.AttachAns AP NP JP NNP 20

21 PPP PP JP 4.AttachAns 1.Attach AP+1 AP BP NP 3.AttachAns 2.Attach AP+1 NNP JP PPP PP AP NP NNP BP Attach AP+1 Attach AP+1 AttachAns AttachAns TLS 21

22 XX PPP PP AP 1.JoinReq 4. StoreAns 6. StoreAns 8. UpdateAns JP 2. JoinAns 3.StoreReq Data A 5. StoreReq Data B 7. UpdateReq TP NP NNP JP PPP PP AP NP NNP JoinReq JoinAns StoreReq Data A StoreAns StoreReq Data B StoreAns UpdateReq UpdateAns 22

23 JP PPP PP AP NP NNP Attach Dest=PP AttachAns TLS UpdateReq Attach Dest=PP AttachAns UpdateAns UpdateReq UpdateAns UpdateReq UpdateAns 23

24 A RELOAD Usage for Distributed Conference Control (DisCo) User Agent E Peer C SIP SIP Access List Focus Peer A Storing Peer SP RELOAD Instance Conf. Events Call delegation Reference Model DisCo-Registration Focus Peer B Peer D Overlay Comm. Client F (*) draft-knauf-p2psip-disco-02, March 2011 SIP Peers A and B managing a single multiparty conference, fulfilling the role of the focus The storing peer SP of the distributed conference resource holds a mapping of conference URI to the responsible focus peers Focus peers maintain SIP signaling relations to conference participants: Peer A is the focus for the RELOAD peer C and plain user agent E Peer B is the focus for RELOAD peer D and RELOAD client F 24

25 Joining a Conference (initiating peer) RELOAD (joining peer) Store mapping (ConfURI, Alice) Alice stores her mapping to register a conference Lookup ConfURI Bob requests the list of potential focus peers Result list of conf. focus Bob establishes transport connection to Alice AppAttach AppAttach INVITE OK ACK Media Store mapping(confuri, Bob) Bob stores his mapping to become a focus peer too 25

26 Service Discovery Usage for K V RELOAD K 1 : a particular service V 1 : Peer-ID K V K V K V k 1,v 2 k 1,v 1 K V k 1,v 3 list(v 1 V 2 V 3 ) k 1 K V K V store(k 1,v 1 ) K V store(k 1,v 3 ) store(k 1,v 2 ) General service discovery mechanism: a peer wants to use a particular service S (key=k1) will find peers that are providing that service from the Overlay (Peer-ID: v1, v2, v3) K V K V req(k 1 ) 26

27 Motivation of a new service discovery mechanism The limitation of this general mechanism: scales linearly in case the number of nodes that provide the service largely, leading the problems: The Node X is responsible for service S(key k) becomes traffic overloaded easily, because all service lookup requests for service s are answered by node X Doesn t provide load balancing between nodes in overlay that providing a service Defining a service discovery mechanism for base protocol in P2PSIP wg (RELOAD): Using Recursive Distributed Rendezvous (ReDir) service discovery mechanism used in OpenDHT applied to RELOAD overlays ReDir builds a tree structure of nodes that provide a particular service, then embedding into the RELOAD overlay 27

28 The DHT accessed as a Service in OpenDHT CFS (MIT) PAST (MSR/ Rice) OStore (UCB) psearch (HP) Coral (NYU) i3 (UCB) PIER (UCB) Overnet (open) Chord DHT Pastry DHT Tapestry DHT CAN DHT Kademlia DHT Chord DHT Bamboo DHT Kademlia DHT indirection DHT Every application deploys its own DHT (DHT as a library) OpenDHT: one DHT, shared across applications (DHT as a service) connectivity IP 28

29 OpenDHT architecture Interface (Puts/Gets) Infrastructure nodes run the OpenDHT server code. Client nodes are outside the set of infrastructure nodes and access DHT using RPC over TCP Client OpenDHT Client Interface is simple put/get: Put(key/value) stores value under key Get(key) returns all the values stored under key Client Client 29

30 Recursive Distributed Rendezvous (ReDiR) put/get interface cannot meet the needs of some applications using another DHT interface: lookup Goal: Implement two functions using put/get: join(namespace, node) node = lookup(namespace, identifier) Procedure Functionality Join(host, id, namespace) adds(host, id) to the list of hosts providing functionality of namespace Lookup(key, namespace) returns(host, id) in namespace whose id most immediately follows key The lookup interface provided using ReDiR 30

31 Recursive Distributed Rendezvous (ReDiR) Each service provided in the overlay has established own ReDiR tree Each service provided in the overlay is identified by an identifier, namespace ns Each tree node in ReDiR tree contains a list of node-id providing a service At level 0: node (0,0) responsible for two intervals Level 1: two nodes (1,0), (1,1), each of which is responsible for half of the id space Level 2, 3, interval for keyspace Level 0 Level 1 Level 2 Level 3 ReDiR tree 31

32 Other P2P WGs related in IETF PPSP: Peer to Peer Streaming Protocol ALTO: Application-Layer Traffic Optimization DECADE: Decoupled Application Data Enroute (*) draft-seedorf-ppsp-design-considerations-02, April 2011 (*) draft-gu-ppsp-tracker-protocol-03, March 2011 (*) draft-ietf-alto-protocol-07, March 2011 (*) draft-ietf-decade-arch-00, March

33 PPSP WG Peer-to-peer Streaming Protocol (PPSP) WG develops two signaling and control protocols for a P2P streaming system for transmitting live media content that satisfy real-time delivery constraints: Tracker protocol: between trackers and peers Peer protocol: among the peers Tracker Request Data Networks PPSP Transmission and return A/B/C Register Data Networks Chunk Description, A Peer List, Peer Status, etc. Requestor Chunk Data B Content Registration and/or Peer List Request PPSP Signaling Swarm C 33

34 Tracker protocol components Peer Peer signaling CONNECT/ DISCONNECT/JOIN/ JOIN_CHUNK/LEAVE/FI ND/ KEEPALIVE/ STAT_REPORT Communication Layer Data management Swarm ID -Chunk ID -Peer list -Buffer map Tracker Tracker signaling JOIN/LEAVE/ KEEPALIVE/PUT/G ET/STAT_QUERY/ STAT_REPORT Peer status Peer ID Online time Peer property Link status Data management on Tracker Content status Swarm ID Chunk ID Peer list 34

35 Flow of Peer protocol 35

36 ALTO WG Design and specify an application-layer traffic optimization (ALTO) service that provide applications by perform better-than-random initial peer selection ALTO Protocol defines communication between ALTO Client and ALTO Server ALTO Client Routing Protocols ALTO Server Provisioning Policy ALTO Service Discovery ALTO Protocol Dynamic Network Info... 36

37 ALTO Service Model ALTO Server provides ALTO Information to ALTO Clients Indicates preferences amongst Resource Consumers and Resource Providers ALTO Client (P2P Client) ALTO Client (P2P Tracker) Resource Consumers and Providers ALTO Server 37

38 ALTO (Application-Layer Traffic Optimization) A request/response protocol for querying the ALTO service to obtain information useful for peer selection 38

39 DECADE WG DECADE intended to improve network efficiency of P2P apps Storage Storage by introducing storage into the Network network Develop an architecture for accessing in-network storage Standard Protocol Standard Protocol WG identifies the requirements to enable target applications to utilize in-network storage P2P Peer P2P Protocols Peer P2P Peer 39

40 Architectural entities: applications Typical characteristics: Divide content into smaller objects for distribution Multiple sources for content 40

41 Q & A Thank you! 41

P2PSIP, ICE, and RTCWeb

P2PSIP, ICE, and RTCWeb P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment

More information

A Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2PSIP

A Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2PSIP A Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2PSIP Alexander Knauf 1 alexander.knauf@haw-hamburg.de Gabriel Hege 1, Thomas Schmidt 1, Matthias Wählisch 2

More information

A RELOAD Usage for Distributed Conference Control (DisCo)

A RELOAD Usage for Distributed Conference Control (DisCo) A RELOAD Usage for Distributed Conference Control (DisCo) draft-knauf-p2psip-disco-00 Alexander Knauf Gabriel Hege Thomas Schmidt Matthias Wählisch alexander.knauf@haw-hamburg.de, hege@fhtw-berlin.de,

More information

Extensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP

Extensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP Extensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP T-110.7100 Applications and Services in Internet 1.10.2008 Jouni Mäenpää NomadicLab, Ericsson Contents Extending SIP SIP extension negotiation

More information

Department of Computer Science. Burapha University 6 SIP (I)

Department of Computer Science. Burapha University 6 SIP (I) Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important

More information

Peer-to-Peer Internet Applications: A Review

Peer-to-Peer Internet Applications: A Review Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation

More information

Extensions to SIP and P2PSIP

Extensions to SIP and P2PSIP Extensions to SIP and P2PSIP T-110.7100 Applications and Services in Internet 12.10.2010 Jouni Mäenpää NomadicLab, Ericsson Research Contents Extending SIP Examples of SIP extensions Reliability of provisional

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

A Public DHT Service

A Public DHT Service A Public DHT Service Sean Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, and Harlan Yu UC Berkeley and Intel Research August 23, 2005 Two Assumptions

More information

A DHT-based Distributed Location Service for Internet Applications

A DHT-based Distributed Location Service for Internet Applications A DHT-based Distributed Location Service for Internet Applications Simone Cirani and Luca Veltri Department of Information Engineering University of Parma Viale G. P. Usberti 181/A, 43100 Parma - Italy

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

Internet Engineering Task Force (IETF)

Internet Engineering Task Force (IETF) Internet Engineering Task Force (IETF) Request for Comments: 7890 Category: Informational ISSN: 2070-1721 D. Bryan Cogent Force, LLC P. Matthews Nokia E. Shim Samsung Electronics Co., Ltd. D. Willis Softarmor

More information

Latest Peer-to-Peer Technologies II Artjom Lind 1

Latest Peer-to-Peer Technologies II Artjom Lind 1 Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured

More information

P2PNS: A Secure Distributed Name Service for P2PSIP

P2PNS: A Secure Distributed Name Service for P2PSIP P2PNS: A Secure Distributed Name Service for P2PSIP Mobile P2P 2008, Hong Kong, China Outline Decentralized VoIP (P2PSIP) Peer-to-Peer name service (P2PNS) Architecture Two-stage name resolution P2PNS

More information

SIP Compliance APPENDIX

SIP Compliance APPENDIX APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following

More information

From POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno

From POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno Advanced Networking P2P Voice Applications Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg The Client/Server model in conversationsl communications User-plan

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand

More information

Research topic: Multimedia Communication over Wireless Mesh Networks

Research topic: Multimedia Communication over Wireless Mesh Networks Research topic: Multimedia Communication over Wireless Mesh Networks Marcel Castro Education background Bachelor in Electrical Eng. - Federal University of Goias, Goiânia, Brazil 2000 Master or Science

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks P2P Systems Jianping Pan Summer 2007 5/30/07 csc485b/586b/seng480b 1 C/S vs P2P Client-server server is well-known server may become a bottleneck Peer-to-peer everyone is a (potential)

More information

Overlay Networks in ScaleNet

Overlay Networks in ScaleNet Overlay Networks in ScaleNet Dipl-Inform. Ingmar Baumgart Prof. Dr. Martina Zitterbart VDE ITG 5.2.1 Fachgruppentreffen, Ericsson, Aachen, 5.5.06, The ScaleNet Project : Scalable, efficient and flexible

More information

Tech-invite. RFC 3261's SIP Examples. biloxi.com Registrar. Bob's SIP phone

Tech-invite. RFC 3261's SIP Examples. biloxi.com Registrar. Bob's SIP phone Tech-invite http://www.tech-invite.com RFC 3261's SIP Examples V2.2 November 22, 2005 Registrar Bob's SIP INVITE 100 Trying Proxy INVITE 100 Trying Proxy 200 OK INVITE REGISTER This is a representation,

More information

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication

More information

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.

More information

Secure Telephony Enabled Middle-box (STEM)

Secure Telephony Enabled Middle-box (STEM) Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components

More information

Distributed Hash Tables (DHTs) OpenDHT: A Shared, Public DHT Service

Distributed Hash Tables (DHTs) OpenDHT: A Shared, Public DHT Service Distributed Hash Tables (DHTs) OpenDHT: A Shared, Public DHT Service Sean C. Rhea OASIS Retreat January 10, 2005 Joint work with Brighten Godfrey, Brad Karp, Sylvia Ratnasamy, Scott Shenker, Ion Stoica

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Become a WebRTC School Qualified Integrator (WSQI ) supported by the Telecommunications Industry Association (TIA)

Become a WebRTC School Qualified Integrator (WSQI ) supported by the Telecommunications Industry Association (TIA) WSQI Certification Become a WebRTC School Qualified Integrator (WSQI ) supported by the Telecommunications Industry Association (TIA) Exam Objectives The WebRTC School Qualified Integrator (WSQI ) is designed

More information

Octoshape. Commercial hosting not cable to home, founded 2003

Octoshape. Commercial hosting not cable to home, founded 2003 Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server

More information

A Survey of Peer-to-Peer Content Distribution Technologies

A Survey of Peer-to-Peer Content Distribution Technologies A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview

More information

P2PSIP Draft Charter. Dean Willis March 2006

P2PSIP Draft Charter. Dean Willis March 2006 P2PSIP Draft Charter Dean Willis March 2006 Purpose The purpose of the Peer-to-Peer (P2P) Session Initiation Protocol working group (P2PSIP WG) is to develop guidelines and mechanisms for the use of the

More information

ALTO Problem Statement

ALTO Problem Statement ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting Outline History The problem Main issues Use cases The cache location sub-problem Internet

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

CSCI 466 Midterm Networks Fall 2013

CSCI 466 Midterm Networks Fall 2013 CSCI 466 Midterm Networks Fall 2013 Name: This exam consists of 6 problems on the following 7 pages. You may use your single-sided hand-written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

Media Communications Internet Telephony and Teleconference

Media Communications Internet Telephony and Teleconference Lesson 13 Media Communications Internet Telephony and Teleconference Scenario and Issue of IP Telephony Scenario and Issue of IP Teleconference ITU and IETF Standards for IP Telephony/conf. H.323 Standard

More information

Desktop sharing with the Session Initiation Protocol

Desktop sharing with the Session Initiation Protocol Desktop sharing with the Session Initiation Protocol Willem Toorop willem.toorop@os3.nl February 25, 2009 How can application and desktop sharing, initiated by SIP, be realised in existing SIP infrastructure

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

Internet Engineering Task Force (IETF) January 2014

Internet Engineering Task Force (IETF) January 2014 Internet Engineering Task Force (IETF) Request for Comments: 7086 Category: Experimental ISSN: 2070-1721 A. Keranen G. Camarillo J. Maenpaa Ericsson January 2014 Host Identity Protocol-Based Overlay Networking

More information

Session Initiation Protocol (SIP) Ragnar Langseth University of Oslo April 26th 2013

Session Initiation Protocol (SIP) Ragnar Langseth University of Oslo April 26th 2013 Session Initiation Protocol (SIP) Ragnar Langseth University of Oslo April 26th 2013 Overview SIP Basic principles Components Message flow Mobility in SIP Personal Mobility Terminal Mobility Pre-call Mid-call

More information

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9 Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication

More information

Handling Churn in a DHT

Handling Churn in a DHT Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

SIP Session Initiation Protocol

SIP Session Initiation Protocol Session Initiation Protocol ITS 441 - VoIP; 2009 P. Campbell, H.Kruse HTTP Hypertext Transfer Protocol For transfer of web pages encoded in html: Hypertext Markup Language Our interest: primarily as model

More information

Presented By: Niharjyoti Sarangi

Presented By: Niharjyoti Sarangi Presented By: Niharjyoti Sarangi 1. 2. 3. 4. 5. 6. 7. 8. INTRODUCTION WHAT & WHY KEY FEATURES JXTA ARCHITECTURE JXTA LAYERS JXTA JARGONS JXTA PROTOCOLS JXTA SHELLS JXTA ADVANTAGES 2 AN OPEN P2P PROTOCOL

More information

The Session Initiation Protocol

The Session Initiation Protocol The Session Initiation Protocol N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture # 25 Roadmap for Multimedia Networking 2 1. Introduction why QoS? what are the problems?

More information

A Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2PSIP

A Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2PSIP A Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2P Alexander Knauf 1 Gabriel Hege 1 Thomas C. Schmidt 1 Matthias Wählisch 2 1 HAW Hamburg, Dept. Informatik,

More information

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP). This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,

More information

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 13.1.2014 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Overview of the Session Initiation Protocol

Overview of the Session Initiation Protocol CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 14.1.2013 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

Controlling Overload in Networks of SIP Servers

Controlling Overload in Networks of SIP Servers Controlling Overload in Networks of SIP Servers Volker Hilt, Indra Widjaja Bell Labs/Alcatel-Lucent volkerh@bell-labs.com, iwidjaja@bell-labs.com Outline Motivation SIP Background Performance Evaluation

More information

Peer-to-Peer (P2P) Systems

Peer-to-Peer (P2P) Systems Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

Peer-to-peer computing research a fad?

Peer-to-peer computing research a fad? Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node

More information

CMSC 332 Computer Networks P2P and Sockets

CMSC 332 Computer Networks P2P and Sockets CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that

More information

An Efficient NAT Traversal for SIP and Its Associated Media sessions

An Efficient NAT Traversal for SIP and Its Associated Media sessions An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,

More information

Voice over IP (VoIP)

Voice over IP (VoIP) Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have

More information

Distributed Hash Tables: Chord

Distributed Hash Tables: Chord Distributed Hash Tables: Chord Brad Karp (with many slides contributed by Robert Morris) UCL Computer Science CS M038 / GZ06 12 th February 2016 Today: DHTs, P2P Distributed Hash Tables: a building block

More information

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization

More information

ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE. Implement Session Initiation Protocol (SIP) User Agent Prototype

ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE. Implement Session Initiation Protocol (SIP) User Agent Prototype ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE Final Project Presentation Spring 2001 Implement Session Initiation Protocol (SIP) User Agent Prototype Thomas Pang (ktpang@sfu.ca) Peter Lee (mclee@sfu.ca)

More information

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 07:53:57 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 15 Feb 2000 17:03:00 GMT ETag: "3239a5-465b-38a986c4" Accept-Ranges: bytes Content-Length: 18011 Connection:

More information

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs. T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?

More information

Overlay and P2P Networks. Applications. Prof. Sasu Tarkoma and

Overlay and P2P Networks. Applications. Prof. Sasu Tarkoma and Overlay and P2P Networks Applications Prof. Sasu Tarkoma 10.2.2015 and 12.2.2015 Contents Monday 9.2. Applications I BitTorrent Mainline DHT Scribe and PAST Thursday 12.2. Applications II P2PSIP Internet

More information

Application Scenario 1: Direct Call UA UA

Application Scenario 1: Direct Call UA UA Application Scenario 1: Direct Call UA UA Internet Alice Bob Call signaling Media streams 2009 Jörg Ott 1 tzi.org INVITE sip:bob@foo.bar.com Direct Call bar.com Note: Three-way handshake is performed only

More information

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved. VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

Pilsung Taegyun A Fathur Afif A Hari A Gary A Dhika April Mulya Yusuf Anin A Rizka B Dion Siska Mirel Hani Airita Voice over Internet Protocol Course Number : TTH2A3 CLO : 2 Week : 7 ext Circuit Switch

More information

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER CHAPTER 4 Revised: March 24, 2011, This chapter describes features that apply to all SIP system operations. It includes the following topics: SIP Timer Values, page 4-1 SIP Session Timers, page 4-7 Limitations

More information

Opportunistic Application Flows in Sensor-based Pervasive Environments

Opportunistic Application Flows in Sensor-based Pervasive Environments Opportunistic Application Flows in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian, and Manish Parashar ICPS 2004 1 Outline Introduction to pervasive sensor-based

More information

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying

More information

15-744: Computer Networking P2P/DHT

15-744: Computer Networking P2P/DHT 15-744: Computer Networking P2P/DHT Overview P2P Lookup Overview Centralized/Flooded Lookups Routed Lookups Chord Comparison of DHTs 2 Peer-to-Peer Networks Typically each member stores/provides access

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

Optimizing SIP Service Provisioning in Internet Connected MANETs

Optimizing SIP Service Provisioning in Internet Connected MANETs Optimizing SIP Service Provisioning in Internet Connected MANETs Marcel C. Castro and Andreas J. Kassler Computer Science Department Karlstad University Universitetgatan 2, Karlstad, Sweden Email: (Marcel.Cavalcanti

More information

Internet Engineering Task Force (IETF) Request for Comments: 7264 Category: Standards Track. Y. Zhang CoolPad / China Mobile June 2014

Internet Engineering Task Force (IETF) Request for Comments: 7264 Category: Standards Track. Y. Zhang CoolPad / China Mobile June 2014 Internet Engineering Task Force (IETF) Request for Comments: 7264 Category: Standards Track ISSN: 2070-1721 N. Zong X. Jiang R. Even Huawei Technologies Y. Zhang CoolPad / China Mobile June 2014 An Extension

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 25 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer peer-to-peer systems overview

More information

L3S Research Center, University of Hannover

L3S Research Center, University of Hannover , University of Hannover Structured Peer-to to-peer Networks Wolf-Tilo Balke and Wolf Siberski 3..6 *Original slides provided by K. Wehrle, S. Götz, S. Rieche (University of Tübingen) Peer-to-Peer Systems

More information

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations. Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play

More information

Lecture 8: Application Layer P2P Applications and DHTs

Lecture 8: Application Layer P2P Applications and DHTs Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA) security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General

More information

Network Address Translation (NAT) Background Material for Overlay Networks Course. Jan, 2013

Network Address Translation (NAT) Background Material for Overlay Networks Course. Jan, 2013 Network Address Translation (NAT) Background Material for Overlay Networks Course Jan, 2013 Prof. Sasu Tarkoma University of Helsinki, Department of Computer Science Contents Overview Background Basic

More information

Today. Architectural Styles

Today. Architectural Styles Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed

More information

Today. Architectural Styles

Today. Architectural Styles Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed

More information

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint

More information

Peer to Peer Networks

Peer to Peer Networks Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer

More information

Cisco Expressway with Jabber Guest

Cisco Expressway with Jabber Guest Cisco Expressway with Jabber Guest Deployment Guide First Published: Decemeber 2016 Cisco Expressway X8.9 Cisco Jabber Guest Server 10.6.9 (or later) Cisco Systems, Inc. www.cisco.com Contents Preface

More information

Information About SIP Compliance with RFC 3261

Information About SIP Compliance with RFC 3261 APPENDIX A Information About SIP Compliance with RFC 3261 This appendix describes how the Cisco SIP IP phone complies with the IETF definition of SIP as described in RFC 3261. It has compliance information

More information

Common Components. Cisco Unified Border Element (SP Edition) Configuration Profile Examples 5 OL

Common Components. Cisco Unified Border Element (SP Edition) Configuration Profile Examples 5 OL The following components of the Cisco Unified Border Element are common to all of the configuration profile examples in this document. Secure Media Adjacencies Call Policies CAC Policies SIP Profiles 5

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Introduction to P2P Computing

Introduction to P2P Computing Introduction to P2P Computing Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Introduction A. Peer-to-Peer vs. Client/Server B. Overlay Networks 2. Common Topologies 3. Data Location 4. Gnutella

More information