RELOAD P2P Overlay Access Protocol. Younghan Kim Soongsil University
|
|
- Hollie Barnett
- 5 years ago
- Views:
Transcription
1 RELOAD P2P Overlay Access Protocol Younghan Kim Soongsil University
2 Contents Introduction What is P2P? Why P2P-SIP? P2PSIP overlay network Architecture Operations RELOAD protocol Introduction Protocol structure Usages for RELOAD protocol SIP usage Distributed conference control (DisCo) Service Discovery Other IETF P2P WGs 2
3 What is P2P? Centralized mainframes workstations Computer systems Client-server Distributed Peer-to-peer Share the resources of individual peers CPU, disk, bandwidth, information, Communication and collaboration Magi Groove Skype Flat Hierarchical Pure Hybrid C C RPC HTTP S DNS mount C C Gnutella Chord P P Kazaa Napster Groove P P SETI@Home folding@home Napster Gnutella Kazaa Freenet Overnet File sharing C P Distributed computing 3
4 Why P2P-SIP? INVITE REGISTER => Bob s host Contact: ssu.ac.kr Alice s host Client-server => maintenance, configuration, controlled infrastructure INVITE Alice P2P overlay REGISTER Bob No central server, search latency Alice
5 How to combine SIP + P2P? SIP-using-P2P Replace SIP location service by a P2P protocol Use two separate stacks: a SIP layer for registering users, resource lookup, establishing session, and a P2P layer for maintaining a distributed network P2P-over-SIP SIP messages are used for registering users, resource lookup, establishing session, also used for maintaining a P2P network SIP is mature, using SIP as foundation and carry out P2P traffic on top of it => not cost extra stack and not require much change of SIP itself P2PSIP WG FIND P2P network INSERT INVITE Alice P2P-SIP overlay REGISTER Bob INVITE sip:alice@ Alice Bob Alice
6 The architecture of P2P-SIP overlay network UA Peer E PSTN NAT / Firewall UA Peer F P2PSIP Overlay Gateway Peer G RELOAD P2PSIP Protocol UA Client C NAT / Firewall Peer Q Bootstrap Server Enrollment Server RELOAD P2PSIP Protocol UA Peer D SIP Proxy Peer P SIP domain SIP Redirect Peer R SIP UA A SIP UA B (*) draft-ietf-p2psip-concepts-03 October
7 Component definitions Peer: A node in overlay that provides storage and transport services to other nodes in that P2PSIP overlay Client: A node in overlay does not store information or forward messages Overlay name: a human-friendly name identifies a specific P2PSIP overlay Service: a capability contributed by a peer to an overlay or to the members of an overlay Peer protocol: the protocol used between P2PSIP overlay peers to share information and organize the P2PSIP overlay network Client protocol: the protocol used between clients and peers Enrollment server: provide peer-id and credentials for joining peer 7
8 P2PSIP overlay operations The joining procedure Joining Peer Bootstrap Server Bootstrap Peer Admitting Peer Joining Peer 5 Overlay information exchange P2PSIP Overlay ssu.ac.kr Bootstrap Peer Admitting Peer (5) (3) Credentials (1) & (4) (2) ICE Enrollment Server Joining Peer Bootstrap Server REGISTER (1) (2) ICE (3) (5) Credentials INVITE 200 OK ACK BYE/200 OK REGISTER INVITE 200 OK ACK ICE Connectivity Checks Peer Ptotocol connection from A to C established INVITE (Replaces) 200 OK ACK BYE/200 OK Overlay information exchange INVITE 200 OK ACK BYE/200 OK 8
9 The resource registration procedure Peer A (3) 200 OK P2PSIP Overlay (ssu.ac.kr) (3) 200 OK Peer C Peer B sip:alice@ssu.ac.kr (1) REGISTER (2) REGISTER (forward) P2P SIP Peer C is responsible of the mapping to sip:alice@ssu.ac.kr, because the URI hashes to its key space part (1) Standard SIP REGISTER message is sent to the overlay (2) Routing mechanism of the overlay handles to forward the message to peer responsible for the resource-id (Peer C) (3) On the reverse path, responsible peer sends 200 OK message to the peer providing the resource 9
10 P2PSIP Lookup SIP session establishment NAT P2P SIP NAT P2P SIP P2P SIP A P2P SIP P2P SIP A P2P SIP sip:bob@ssu.ac.kr P2PSIP Overlay (ssu.ac.kr) (3) 200 OK (bob (3) 200 OK (2) REGISTER (forward) (1) REGISTER (for resource lookup) B sip:bob@ssu.ac.kr (2) ICE (3) 200 OK P2PSIP Overlay (3) Media (ssu.ac.kr) (1) INVITE bob@ssu.ac.kr (3) 200 OK (1) INVITE (bob (forward) (2) REGISTER (forward) (1) REGISTER (for resource lookup) B P2P SIP NAT D C Peer C is responsible of the mapping to sip:bob@ssu.ac.kr, because it hashes to its key space part P2P SIP NAT D C 10
11 P2PSIP Peer Protocol (RELOAD) The first goal of P2PSIP WG is to develop and standardize a P2PSIP peer protocol This protocol is used between P2PSIP overlay peers, and define how the P2PSIP peers collectively provide for user and resource location in a SIP environment with no or minimal centralized servers Provide a distribution location service for RFC 3263 (locating SIP servers). The location service determines the correct destination of SIP requests without centralized servers, using only peers Resource Location And Discovery (RELOAD) protocol is proposed 11
12 RELOAD Introduction REsource LOcation And Discovery (RELOAD) A peer-to-peer (P2P) signaling protocol for use on the Internet Provides a generic, self-organizing overlay network service, allowing nodes to efficiently route messages and to efficiently store and retrieve data in the overlay. RELOAD provides several features Security Framework: central enrollment server. Usage Model: support a variety of applications, or new application usages (own data types, its rules). NAT Traversal: using ICE. High Performance Routing: a simple, lightweight forwarding header. Pluggable overlay Algorithms: a variety of structured (DHT) and unstructured overlay algorithms. (*) draft-ietf-p2psip-base-13 March
13 Architecture Usage Layer: each application defines a RELOAD usage (set of data kinds and behaviors that describe how to use the services provided by RELOAD) Message Transport: handles end-to-end reliability. Storage: processing messages relating to the storage and retrieval of data. Topology Plug-in: implement the specific overlay algorithm. Forwarding and Link Management Layer: store and implement routing table, establish new links (NAT using ICE) Overlay Link Layer: transporting traffic directly between nodes SIP Usage Message Transport Application XMPP Usage Forwarding & Link Management TLS DTLS... Storage Topology Plugin CHORD... Messaging API Overlay Link API 13
14 Message Transport Provides a generic message routing service for the overlay Each peer is identified by its location in the overlay as determined by its Node-ID Two basic functions that a component which is a client of the Routing Layer can perform : Send a message to a given peer, specified by Node-Id or responsible for a Resource-Id Receive messages that other peers sent to a Node-Id or Resource-Id for which this peer is responsible SIP Usage Message Transport Application XMPP Usage Forwarding & Link Management TLS DTLS... Messaging API Storage Topology Plugin CHORD... Overlay Link API 14
15 Storage and Topology Plug-in Storage Responsible for processing messages relating to the storage and retrieval messages from other peers A peer s Node-ID determines the set of resources that it will be responsible for storing Topology Plug-in 15 Responsible for implementing and maintaining the specific overlay algorithm being used SIP Usage Message Transport Application XMPP Usage Forwarding & Link Management TLS DTLS... Messaging API Storage Topology Plugin CHORD... Overlay Link API
16 Forwarding & Link Management Layer Responsible for getting a packet to the next peer, as determined by the Routing and Storage Layer Establishes and maintains the network connections as required by the Topology Plug-in Allows the topology plug-in to control the overlay and resource operations and messages. Responsible for setting up connections to other peers through NATs and firewalls using ICE Utilizes a framing header to encapsulate messages as they are forwarding along each hop. SIP Usage Message Transport Application XMPP Usage Forwarding & Link Management TLS DTLS... Messaging API Storage Topology Plugin CHORD... Overlay Link API 16
17 Data Storage Each kind is identified by a kind-id Base Routing Scheme Symmetric Recursive Protocol designers may define constraints Limits on size, on the values which may be stored Resource-ID Kind 1 Kind 2 Value Value Value Value Value 17
18 P2PSIP Integration Overview The SIP Usage of RELOAD allows SIP user agents to provide a peer-to-peer telephony service without the requirement for permanent proxy or registration servers The RELOAD overlay itself performs the registration and rendezvous functions The basic function of the SIP usage To allow Alice to start with a SIP URI (e.g., "bob@dht.ssu.ac.kr") End up with a connection which Alice's SIP UA can use to pass SIP messages back and forth to Bob's SIP UA The example of this is shown on next page 18
19 An SIP usage for RELOAD Peer Alice (5678) Peer1 Overlay Peer2 Peer Bob (1234) 1. Bob, operating Node-ID 1234, stores a mapping from his URI to his Node-ID in the overlay I.e., "sip:bob@dht.ssu.ac.kr -> 1234" Connect Connect Connect 2. Alice, operating Node-ID 5678, ConnectAns ConnectAns ConnectAns decides to call Bob. She looks up "sip:bob@dht.ssu.ac.kr" in the overlay ICE Checks INVITE OK ACK and retrieves "1234" 3. Alice uses the overlay to route a ICE Checks for media Connect message to Bob's peer RTP Bob responds with his own Connect and they set up a direct connection 19
20 RELOAD Message Flow Example JP PPP PP AP NP NNP BP Attach Dest = JP Attach Dest = JP Attach Dest = JP AttachAns AttachAns AttachAns TLS PPP PP JP: Joining Peer AP: Admitting Peer PP: Previous Peer (before AP) NP: Next Peer (after AP) BP 2.Attach Dest = JP 5.AttachAns 1.Attach Dest = JP 6.AttachAns 3.Attach Dest = JP 4.AttachAns AP NP JP NNP 20
21 PPP PP JP 4.AttachAns 1.Attach AP+1 AP BP NP 3.AttachAns 2.Attach AP+1 NNP JP PPP PP AP NP NNP BP Attach AP+1 Attach AP+1 AttachAns AttachAns TLS 21
22 XX PPP PP AP 1.JoinReq 4. StoreAns 6. StoreAns 8. UpdateAns JP 2. JoinAns 3.StoreReq Data A 5. StoreReq Data B 7. UpdateReq TP NP NNP JP PPP PP AP NP NNP JoinReq JoinAns StoreReq Data A StoreAns StoreReq Data B StoreAns UpdateReq UpdateAns 22
23 JP PPP PP AP NP NNP Attach Dest=PP AttachAns TLS UpdateReq Attach Dest=PP AttachAns UpdateAns UpdateReq UpdateAns UpdateReq UpdateAns 23
24 A RELOAD Usage for Distributed Conference Control (DisCo) User Agent E Peer C SIP SIP Access List Focus Peer A Storing Peer SP RELOAD Instance Conf. Events Call delegation Reference Model DisCo-Registration Focus Peer B Peer D Overlay Comm. Client F (*) draft-knauf-p2psip-disco-02, March 2011 SIP Peers A and B managing a single multiparty conference, fulfilling the role of the focus The storing peer SP of the distributed conference resource holds a mapping of conference URI to the responsible focus peers Focus peers maintain SIP signaling relations to conference participants: Peer A is the focus for the RELOAD peer C and plain user agent E Peer B is the focus for RELOAD peer D and RELOAD client F 24
25 Joining a Conference (initiating peer) RELOAD (joining peer) Store mapping (ConfURI, Alice) Alice stores her mapping to register a conference Lookup ConfURI Bob requests the list of potential focus peers Result list of conf. focus Bob establishes transport connection to Alice AppAttach AppAttach INVITE OK ACK Media Store mapping(confuri, Bob) Bob stores his mapping to become a focus peer too 25
26 Service Discovery Usage for K V RELOAD K 1 : a particular service V 1 : Peer-ID K V K V K V k 1,v 2 k 1,v 1 K V k 1,v 3 list(v 1 V 2 V 3 ) k 1 K V K V store(k 1,v 1 ) K V store(k 1,v 3 ) store(k 1,v 2 ) General service discovery mechanism: a peer wants to use a particular service S (key=k1) will find peers that are providing that service from the Overlay (Peer-ID: v1, v2, v3) K V K V req(k 1 ) 26
27 Motivation of a new service discovery mechanism The limitation of this general mechanism: scales linearly in case the number of nodes that provide the service largely, leading the problems: The Node X is responsible for service S(key k) becomes traffic overloaded easily, because all service lookup requests for service s are answered by node X Doesn t provide load balancing between nodes in overlay that providing a service Defining a service discovery mechanism for base protocol in P2PSIP wg (RELOAD): Using Recursive Distributed Rendezvous (ReDir) service discovery mechanism used in OpenDHT applied to RELOAD overlays ReDir builds a tree structure of nodes that provide a particular service, then embedding into the RELOAD overlay 27
28 The DHT accessed as a Service in OpenDHT CFS (MIT) PAST (MSR/ Rice) OStore (UCB) psearch (HP) Coral (NYU) i3 (UCB) PIER (UCB) Overnet (open) Chord DHT Pastry DHT Tapestry DHT CAN DHT Kademlia DHT Chord DHT Bamboo DHT Kademlia DHT indirection DHT Every application deploys its own DHT (DHT as a library) OpenDHT: one DHT, shared across applications (DHT as a service) connectivity IP 28
29 OpenDHT architecture Interface (Puts/Gets) Infrastructure nodes run the OpenDHT server code. Client nodes are outside the set of infrastructure nodes and access DHT using RPC over TCP Client OpenDHT Client Interface is simple put/get: Put(key/value) stores value under key Get(key) returns all the values stored under key Client Client 29
30 Recursive Distributed Rendezvous (ReDiR) put/get interface cannot meet the needs of some applications using another DHT interface: lookup Goal: Implement two functions using put/get: join(namespace, node) node = lookup(namespace, identifier) Procedure Functionality Join(host, id, namespace) adds(host, id) to the list of hosts providing functionality of namespace Lookup(key, namespace) returns(host, id) in namespace whose id most immediately follows key The lookup interface provided using ReDiR 30
31 Recursive Distributed Rendezvous (ReDiR) Each service provided in the overlay has established own ReDiR tree Each service provided in the overlay is identified by an identifier, namespace ns Each tree node in ReDiR tree contains a list of node-id providing a service At level 0: node (0,0) responsible for two intervals Level 1: two nodes (1,0), (1,1), each of which is responsible for half of the id space Level 2, 3, interval for keyspace Level 0 Level 1 Level 2 Level 3 ReDiR tree 31
32 Other P2P WGs related in IETF PPSP: Peer to Peer Streaming Protocol ALTO: Application-Layer Traffic Optimization DECADE: Decoupled Application Data Enroute (*) draft-seedorf-ppsp-design-considerations-02, April 2011 (*) draft-gu-ppsp-tracker-protocol-03, March 2011 (*) draft-ietf-alto-protocol-07, March 2011 (*) draft-ietf-decade-arch-00, March
33 PPSP WG Peer-to-peer Streaming Protocol (PPSP) WG develops two signaling and control protocols for a P2P streaming system for transmitting live media content that satisfy real-time delivery constraints: Tracker protocol: between trackers and peers Peer protocol: among the peers Tracker Request Data Networks PPSP Transmission and return A/B/C Register Data Networks Chunk Description, A Peer List, Peer Status, etc. Requestor Chunk Data B Content Registration and/or Peer List Request PPSP Signaling Swarm C 33
34 Tracker protocol components Peer Peer signaling CONNECT/ DISCONNECT/JOIN/ JOIN_CHUNK/LEAVE/FI ND/ KEEPALIVE/ STAT_REPORT Communication Layer Data management Swarm ID -Chunk ID -Peer list -Buffer map Tracker Tracker signaling JOIN/LEAVE/ KEEPALIVE/PUT/G ET/STAT_QUERY/ STAT_REPORT Peer status Peer ID Online time Peer property Link status Data management on Tracker Content status Swarm ID Chunk ID Peer list 34
35 Flow of Peer protocol 35
36 ALTO WG Design and specify an application-layer traffic optimization (ALTO) service that provide applications by perform better-than-random initial peer selection ALTO Protocol defines communication between ALTO Client and ALTO Server ALTO Client Routing Protocols ALTO Server Provisioning Policy ALTO Service Discovery ALTO Protocol Dynamic Network Info... 36
37 ALTO Service Model ALTO Server provides ALTO Information to ALTO Clients Indicates preferences amongst Resource Consumers and Resource Providers ALTO Client (P2P Client) ALTO Client (P2P Tracker) Resource Consumers and Providers ALTO Server 37
38 ALTO (Application-Layer Traffic Optimization) A request/response protocol for querying the ALTO service to obtain information useful for peer selection 38
39 DECADE WG DECADE intended to improve network efficiency of P2P apps Storage Storage by introducing storage into the Network network Develop an architecture for accessing in-network storage Standard Protocol Standard Protocol WG identifies the requirements to enable target applications to utilize in-network storage P2P Peer P2P Protocols Peer P2P Peer 39
40 Architectural entities: applications Typical characteristics: Divide content into smaller objects for distribution Multiple sources for content 40
41 Q & A Thank you! 41
P2PSIP, ICE, and RTCWeb
P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment
More informationA Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2PSIP
A Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2PSIP Alexander Knauf 1 alexander.knauf@haw-hamburg.de Gabriel Hege 1, Thomas Schmidt 1, Matthias Wählisch 2
More informationA RELOAD Usage for Distributed Conference Control (DisCo)
A RELOAD Usage for Distributed Conference Control (DisCo) draft-knauf-p2psip-disco-00 Alexander Knauf Gabriel Hege Thomas Schmidt Matthias Wählisch alexander.knauf@haw-hamburg.de, hege@fhtw-berlin.de,
More informationExtensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP
Extensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP T-110.7100 Applications and Services in Internet 1.10.2008 Jouni Mäenpää NomadicLab, Ericsson Contents Extending SIP SIP extension negotiation
More informationDepartment of Computer Science. Burapha University 6 SIP (I)
Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important
More informationPeer-to-Peer Internet Applications: A Review
Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation
More informationExtensions to SIP and P2PSIP
Extensions to SIP and P2PSIP T-110.7100 Applications and Services in Internet 12.10.2010 Jouni Mäenpää NomadicLab, Ericsson Research Contents Extending SIP Examples of SIP extensions Reliability of provisional
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /
More informationA Public DHT Service
A Public DHT Service Sean Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, and Harlan Yu UC Berkeley and Intel Research August 23, 2005 Two Assumptions
More informationA DHT-based Distributed Location Service for Internet Applications
A DHT-based Distributed Location Service for Internet Applications Simone Cirani and Luca Veltri Department of Information Engineering University of Parma Viale G. P. Usberti 181/A, 43100 Parma - Italy
More informationUnit 8 Peer-to-Peer Networking
Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System
More informationInternet Engineering Task Force (IETF)
Internet Engineering Task Force (IETF) Request for Comments: 7890 Category: Informational ISSN: 2070-1721 D. Bryan Cogent Force, LLC P. Matthews Nokia E. Shim Samsung Electronics Co., Ltd. D. Willis Softarmor
More informationLatest Peer-to-Peer Technologies II Artjom Lind 1
Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured
More informationP2PNS: A Secure Distributed Name Service for P2PSIP
P2PNS: A Secure Distributed Name Service for P2PSIP Mobile P2P 2008, Hong Kong, China Outline Decentralized VoIP (P2PSIP) Peer-to-Peer name service (P2PNS) Architecture Two-stage name resolution P2PNS
More informationSIP Compliance APPENDIX
APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following
More informationFrom POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno
Advanced Networking P2P Voice Applications Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg The Client/Server model in conversationsl communications User-plan
More informationTSIN02 - Internetworking
Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand
More informationResearch topic: Multimedia Communication over Wireless Mesh Networks
Research topic: Multimedia Communication over Wireless Mesh Networks Marcel Castro Education background Bachelor in Electrical Eng. - Federal University of Goias, Goiânia, Brazil 2000 Master or Science
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationSession Initiation Protocol (SIP)
Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part
More informationAdvanced Computer Networks
Advanced Computer Networks P2P Systems Jianping Pan Summer 2007 5/30/07 csc485b/586b/seng480b 1 C/S vs P2P Client-server server is well-known server may become a bottleneck Peer-to-peer everyone is a (potential)
More informationOverlay Networks in ScaleNet
Overlay Networks in ScaleNet Dipl-Inform. Ingmar Baumgart Prof. Dr. Martina Zitterbart VDE ITG 5.2.1 Fachgruppentreffen, Ericsson, Aachen, 5.5.06, The ScaleNet Project : Scalable, efficient and flexible
More informationTech-invite. RFC 3261's SIP Examples. biloxi.com Registrar. Bob's SIP phone
Tech-invite http://www.tech-invite.com RFC 3261's SIP Examples V2.2 November 22, 2005 Registrar Bob's SIP INVITE 100 Trying Proxy INVITE 100 Trying Proxy 200 OK INVITE REGISTER This is a representation,
More informationJournal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication
More information*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.
More informationSecure Telephony Enabled Middle-box (STEM)
Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components
More informationDistributed Hash Tables (DHTs) OpenDHT: A Shared, Public DHT Service
Distributed Hash Tables (DHTs) OpenDHT: A Shared, Public DHT Service Sean C. Rhea OASIS Retreat January 10, 2005 Joint work with Brighten Godfrey, Brad Karp, Sylvia Ratnasamy, Scott Shenker, Ion Stoica
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationBecome a WebRTC School Qualified Integrator (WSQI ) supported by the Telecommunications Industry Association (TIA)
WSQI Certification Become a WebRTC School Qualified Integrator (WSQI ) supported by the Telecommunications Industry Association (TIA) Exam Objectives The WebRTC School Qualified Integrator (WSQI ) is designed
More informationOctoshape. Commercial hosting not cable to home, founded 2003
Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server
More informationA Survey of Peer-to-Peer Content Distribution Technologies
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview
More informationP2PSIP Draft Charter. Dean Willis March 2006
P2PSIP Draft Charter Dean Willis March 2006 Purpose The purpose of the Peer-to-Peer (P2P) Session Initiation Protocol working group (P2PSIP WG) is to develop guidelines and mechanisms for the use of the
More informationALTO Problem Statement
ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting Outline History The problem Main issues Use cases The cache location sub-problem Internet
More informationArchitectures for Distributed Systems
Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced
More informationCSCI 466 Midterm Networks Fall 2013
CSCI 466 Midterm Networks Fall 2013 Name: This exam consists of 6 problems on the following 7 pages. You may use your single-sided hand-written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationMedia Communications Internet Telephony and Teleconference
Lesson 13 Media Communications Internet Telephony and Teleconference Scenario and Issue of IP Telephony Scenario and Issue of IP Teleconference ITU and IETF Standards for IP Telephony/conf. H.323 Standard
More informationDesktop sharing with the Session Initiation Protocol
Desktop sharing with the Session Initiation Protocol Willem Toorop willem.toorop@os3.nl February 25, 2009 How can application and desktop sharing, initiated by SIP, be realised in existing SIP infrastructure
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationChapter 2: Application layer
Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationInternet Engineering Task Force (IETF) January 2014
Internet Engineering Task Force (IETF) Request for Comments: 7086 Category: Experimental ISSN: 2070-1721 A. Keranen G. Camarillo J. Maenpaa Ericsson January 2014 Host Identity Protocol-Based Overlay Networking
More informationSession Initiation Protocol (SIP) Ragnar Langseth University of Oslo April 26th 2013
Session Initiation Protocol (SIP) Ragnar Langseth University of Oslo April 26th 2013 Overview SIP Basic principles Components Message flow Mobility in SIP Personal Mobility Terminal Mobility Pre-call Mid-call
More informationFlooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9
Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication
More informationHandling Churn in a DHT
Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get
More informationMaking Gnutella-like P2P Systems Scalable
Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems
More informationSIP Session Initiation Protocol
Session Initiation Protocol ITS 441 - VoIP; 2009 P. Campbell, H.Kruse HTTP Hypertext Transfer Protocol For transfer of web pages encoded in html: Hypertext Markup Language Our interest: primarily as model
More informationPresented By: Niharjyoti Sarangi
Presented By: Niharjyoti Sarangi 1. 2. 3. 4. 5. 6. 7. 8. INTRODUCTION WHAT & WHY KEY FEATURES JXTA ARCHITECTURE JXTA LAYERS JXTA JARGONS JXTA PROTOCOLS JXTA SHELLS JXTA ADVANTAGES 2 AN OPEN P2P PROTOCOL
More informationThe Session Initiation Protocol
The Session Initiation Protocol N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture # 25 Roadmap for Multimedia Networking 2 1. Introduction why QoS? what are the problems?
More informationA Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2PSIP
A Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2P Alexander Knauf 1 Gabriel Hege 1 Thomas C. Schmidt 1 Matthias Wählisch 2 1 HAW Hamburg, Dept. Informatik,
More informationOverview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).
This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,
More informationLast Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1
Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 13.1.2014 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationOverview of the Session Initiation Protocol
CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction
More informationTransporting Voice by Using IP
Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 14.1.2013 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationControlling Overload in Networks of SIP Servers
Controlling Overload in Networks of SIP Servers Volker Hilt, Indra Widjaja Bell Labs/Alcatel-Lucent volkerh@bell-labs.com, iwidjaja@bell-labs.com Outline Motivation SIP Background Performance Evaluation
More informationPeer-to-Peer (P2P) Systems
Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed
More informationPeer-to-Peer Networks
Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week
More informationLecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011
Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared
More informationPeer-to-peer computing research a fad?
Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node
More informationCMSC 332 Computer Networks P2P and Sockets
CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that
More informationAn Efficient NAT Traversal for SIP and Its Associated Media sessions
An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,
More informationVoice over IP (VoIP)
Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have
More informationDistributed Hash Tables: Chord
Distributed Hash Tables: Chord Brad Karp (with many slides contributed by Robert Morris) UCL Computer Science CS M038 / GZ06 12 th February 2016 Today: DHTs, P2P Distributed Hash Tables: a building block
More informationOverlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example
Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization
More informationENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE. Implement Session Initiation Protocol (SIP) User Agent Prototype
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE Final Project Presentation Spring 2001 Implement Session Initiation Protocol (SIP) User Agent Prototype Thomas Pang (ktpang@sfu.ca) Peter Lee (mclee@sfu.ca)
More informationdraft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo
HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 07:53:57 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 15 Feb 2000 17:03:00 GMT ETag: "3239a5-465b-38a986c4" Accept-Ranges: bytes Content-Length: 18011 Connection:
More informationT Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.
T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?
More informationOverlay and P2P Networks. Applications. Prof. Sasu Tarkoma and
Overlay and P2P Networks Applications Prof. Sasu Tarkoma 10.2.2015 and 12.2.2015 Contents Monday 9.2. Applications I BitTorrent Mainline DHT Scribe and PAST Thursday 12.2. Applications II P2PSIP Internet
More informationApplication Scenario 1: Direct Call UA UA
Application Scenario 1: Direct Call UA UA Internet Alice Bob Call signaling Media streams 2009 Jörg Ott 1 tzi.org INVITE sip:bob@foo.bar.com Direct Call bar.com Note: Three-way handshake is performed only
More informationVoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.
VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationPilsung Taegyun A Fathur Afif A Hari A Gary A Dhika April Mulya Yusuf Anin A Rizka B Dion Siska Mirel Hani Airita Voice over Internet Protocol Course Number : TTH2A3 CLO : 2 Week : 7 ext Circuit Switch
More informationSIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER
CHAPTER 4 Revised: March 24, 2011, This chapter describes features that apply to all SIP system operations. It includes the following topics: SIP Timer Values, page 4-1 SIP Session Timers, page 4-7 Limitations
More informationOpportunistic Application Flows in Sensor-based Pervasive Environments
Opportunistic Application Flows in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian, and Manish Parashar ICPS 2004 1 Outline Introduction to pervasive sensor-based
More informationNetwork Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example
Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying
More information15-744: Computer Networking P2P/DHT
15-744: Computer Networking P2P/DHT Overview P2P Lookup Overview Centralized/Flooded Lookups Routed Lookups Chord Comparison of DHTs 2 Peer-to-Peer Networks Typically each member stores/provides access
More informationInternet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!
Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams
More informationOptimizing SIP Service Provisioning in Internet Connected MANETs
Optimizing SIP Service Provisioning in Internet Connected MANETs Marcel C. Castro and Andreas J. Kassler Computer Science Department Karlstad University Universitetgatan 2, Karlstad, Sweden Email: (Marcel.Cavalcanti
More informationInternet Engineering Task Force (IETF) Request for Comments: 7264 Category: Standards Track. Y. Zhang CoolPad / China Mobile June 2014
Internet Engineering Task Force (IETF) Request for Comments: 7264 Category: Standards Track ISSN: 2070-1721 N. Zong X. Jiang R. Even Huawei Technologies Y. Zhang CoolPad / China Mobile June 2014 An Extension
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 25 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer peer-to-peer systems overview
More informationL3S Research Center, University of Hannover
, University of Hannover Structured Peer-to to-peer Networks Wolf-Tilo Balke and Wolf Siberski 3..6 *Original slides provided by K. Wehrle, S. Götz, S. Rieche (University of Tübingen) Peer-to-Peer Systems
More informationGoals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.
Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationP2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies
P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play
More informationLecture 8: Application Layer P2P Applications and DHTs
Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationSIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)
security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General
More informationNetwork Address Translation (NAT) Background Material for Overlay Networks Course. Jan, 2013
Network Address Translation (NAT) Background Material for Overlay Networks Course Jan, 2013 Prof. Sasu Tarkoma University of Helsinki, Department of Computer Science Contents Overview Background Basic
More informationToday. Architectural Styles
Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed
More informationToday. Architectural Styles
Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed
More informationVoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer
More informationCisco Expressway with Jabber Guest
Cisco Expressway with Jabber Guest Deployment Guide First Published: Decemeber 2016 Cisco Expressway X8.9 Cisco Jabber Guest Server 10.6.9 (or later) Cisco Systems, Inc. www.cisco.com Contents Preface
More informationInformation About SIP Compliance with RFC 3261
APPENDIX A Information About SIP Compliance with RFC 3261 This appendix describes how the Cisco SIP IP phone complies with the IETF definition of SIP as described in RFC 3261. It has compliance information
More informationCommon Components. Cisco Unified Border Element (SP Edition) Configuration Profile Examples 5 OL
The following components of the Cisco Unified Border Element are common to all of the configuration profile examples in this document. Secure Media Adjacencies Call Policies CAC Policies SIP Profiles 5
More informationDISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES
DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application
More informationContent Overlays. Nick Feamster CS 7260 March 12, 2007
Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not
More informationIntroduction to P2P Computing
Introduction to P2P Computing Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Introduction A. Peer-to-Peer vs. Client/Server B. Overlay Networks 2. Common Topologies 3. Data Location 4. Gnutella
More information