A DHT-based Distributed Location Service for Internet Applications

Size: px
Start display at page:

Download "A DHT-based Distributed Location Service for Internet Applications"

Transcription

1 A DHT-based Distributed Location Service for Internet Applications Simone Cirani and Luca Veltri Department of Information Engineering University of Parma Viale G. P. Usberti 181/A, Parma - Italy simone.cirani@tlc.unipr.it, luca.veltri@unipr.it Abstract Distributed Hash Tables (DHTs) are structured peer-to-peer systems that provide an information storage and retrieval service of key/value pairs among a number of hosts. Although DHTs are usually used to store P2P-application-specific information, they could be used in a transparent and applicationindependent way. In this paper, we describe how DHTs can be used in order to obtain a general purpose Distributed Location Service (DLS). This approach results in a twofold benefit: a unique service for multiple P2P applications is deployed, and a more robust DHT is obtained due to the increased number of collaborating nodes. The DLS provides generic and dynamic service for mapping application resource URIs to the actual list of contact URIs, expiration dates, and other related information. Such a DLS can be exploited by any new P2P application or other legacy application, which otherwise would natively rely on a centralized location server. First, we discuss the role of URIs and URLs for service/resource addressing, the requirements for architectures components and protocols for DHT maintenance and DLS service access, and the possibility to reuse current RPC-based or other existing protocols. Finally, we provide implementation details and demonstrative applications to show the feasibility of the proposed solution. I. INTRODUCTION Distributed Hash Tables (DHTs) are structured peer-topeer (P2P) systems that provide an information storage and retrieval service of key/value pairs among a number of nodes. DHTs feature desirable properties such as scalability, selforganization, robustness, and fault-tolerance. Several DHT algorithms, such as Chord [1] and Kademlia [2], have been already defined and successfully implemented. DHTs rely on the cooperation of a number of nodes (peers) which collectively provide the information storage and retrieval service. Nodes are arranged on an overlay network, which is built upon an existing network, whose topology depends on the particular DHT algorithm. For instance, Chord organizes nodes on a circle, while Kademlia as leaves of a binary tree. The structure of the DHT topology affects message routing inside the DHT. Each DHT algorithm typically defines also a protocol (usually a set of RPCs) to be used for the communication and cooperation among the DHT nodes. Applications interact with the DHT through two basic RPCs: put(key, value) get(key) The key of a resource is in general the hash of the resource name, through some hashing function defined by the DHT algorithm. The IETF P2PSIP Working Group has proposed DHTs to be used to realize a P2P SIP architecture, specifically to implement a Distributed Location Service (DLS). A DLS would allow a direct and distributed resolution of SIP contacts, thus eliminating the need for intermediate SIP nodes, such as SIP Proxy servers and SIP Registrar servers, as the registration and resolution of SIP contacts would be managed by the DHT itself. Many proposals have been made within the P2PSIP WG for a P2P signalling protocol to be used in order to maintain and manage such DHT. Some proposed protocols are binarybased, such as RELOAD [3] and XPP [4]. Another major protocol is dsip [5], which is a text-based SIP extension. This paper focuses on how to implement a DLS to be used not only for SIP resources, such as SIP contact addresses, but for generic resources, and therefore intended for any new P2P application or other legacy application, which otherwise would natively rely on a centralized location server to perform address resolution tasks, such as DNS servers. II. MOTIVATIONS FOR A DISTRIBUTED LOCATION SERVICE Some application-layer protocols like SIP, SMTP, and HTTP use URI or URL (RFC 3986 [6]) information to identify and address their resources, the end points (peers) of their communications, or simply the recipient of their messages. The use of an URI-based address mechanism instead of simply using IP addresses and port numbers could be preferred since: IP addresses have a geographical distribution and are related to the specific (and sometimes temporary) network point of attachment of hosts; URI may contain more information on the addressed resource (user name, resource path, parameters, etc.). The method used for mapping the URI to the actual next hop toward the recipient depends on the specific URI scheme, protocol type, or service logic. When no specific mechanism applies, a common way is to use the DNS system for resolving a part of the given URI representing a fully qualified domain name (FQDN), if present. For example, a HTTP request to is processed by a HTTP client agent (e.g. a web browser) by taking the hostport part ( and resolving the hostname through a standard DNS query to the

2 2 default DNS server. Similarly, when calling a user identified by the URI sip:alice@wonderland.net;user=phone, the SIP UACs often use DNS for resolving the FQDN wonderland.net to determinate the next hop SIP node through which the INVITE messages has to be routed. However, such a DNSbased approach generally suffers of some problems like: i) it is server centric; by using standard DNS servers it uses an architecture that is intrinsically distributed but not completely reliable, since an entire domain is normally managed by one or few servers; ii) it does not allow dynamic name resolution; the association between the FQDN and the host address (IPv4 or IPv6) is statically configured on DNS servers; although updates of such binding are possible, the frequency of such updates is strongly limited by caching mechanisms implemented within the DNS architecture; iii) it applies only to the FQDN part of the URI (when present) although some protocol-dependent information can also be provided within the URI. Note that, although some protocols such as SIP provide their own location service in order to handle the issue ii, the dependence on DNS still remains, resulting in issues i and iii. A possible solution to these issues could be to partially or completely replace the DNS dependence with a complete distributed and independent P2P location service (LS), for example based on DHT. In such a scenario, whenever an agent wants to send a request to a resource or agent identified by a given URI, the following steps may be followed: 1) the agent processes the URI and decides if the URI already contains all information to route the message (for example because it includes a valid IP address and port number, or because it contains some explicit reference that can be locally and uniquely resolved to the proper IP address and port number), or requires an explicit LS lookup; in the former case the procedure ends here, while in the latter case step step 2 is executed; 2) in order to obtain a fully routable address (URL) the agent performs a LS lookup by issuing a DHT get() query; 3) the returned address (URL) is used as new reference as the next hop or recipient for the resource request. This procedure can be also extended to the case in which the step 2 may return a new URI (or URL) not routable in the sense of step 1. In this case, steps 1, 2, and 3 are repeated more times until step 2 returns a finally fully routable-url. This simple LS procedure can be further extended in order to provide dynamic name resolution. If an agent wants to update the location information of a given resource (or of the agent itself): 4) the agent performs a LS insertion or update by issuing a put() query with the proper new URI-to-routable-URL binding. Since each binding has a time-to-live (expiration) date, such binding is refreshed through successive put() queries. Step 4 can be used for inserting, refreshing, modifying, or deleting binding information. A. Distributed SIP Location Service The SIP protocol is an application-level signalling protocol defined by the IETF RFC 3261 [7] and used to establish multimedia sessions. SIP is defined as a P2P protocol, in the sense that, once a session has been established, the multimedia stream flows among the participants directly. Moreover, some SIP scenarios, such as a SIP P2P call, require nothing but User Agents: in this case, the caller initiates a session by knowing the callee s location (i.e. its IP address and port number). However, since this information is usually not known in advance, in order to be useful and practical for a public service, SIP relies on some network elements, such as Registrar servers or Proxy servers, that introduce some degree of centralization and possible failure points of the architecture. SIP has been investigated for P2P capabilities in order to propose a version of SIP that does not require central servers. One possible solution to this problem has been found in realizing a DLS, in order to remove the need for central servers to resolve the contacts addresses to route requests between User Agents. Because of their nature, DHTs have revealed as a perfect tool to accomplish this goal, as they can be used to store the user registration information (name address and location). A protocol for DHT maintenance and management in SIP is then required. A mature proposal for a SIP-based P2P protocol was dsip [5], which is a very simple extension of the SIP protocol with a few new headers added in order to maintain and manage the DHT. dsip messages are based on the SIP REGISTER method; this choice was due to the fact that SIP REGISTER messages are intended to be processed only by those network elements, such as SIP Proxies, that provide a centralization point and that can decide whether to process the message or not by checking if they support the P2P capability. Depending on the implementation, peers can act either as proxy servers or redirect servers. Clients that are not aware of the P2P substrate can interact with their peer with the SIP protocol, thus allowing for backward compatibility towards legacy SIP applications. In this case, the peer would analyze the request (i.e. a normal SIP INVITE request for another client) from the client and retrieve the necessary information from the DHT; then the peer would forward the request to the appropriate endpoint or send a response back to the client. This role of the peer is called adapter. An adapter peer provides therefore a sort of gateway between SIP and P2PSIP. The peer thus has two main communication interfaces. The first one is the DHT communication interface, which is used to communicate with other peers in the DHT. Communication inside the DHT occurs using the dsip protocol. dsip messages are therefore received and sent at this interface. The second interface is what we call the SIP adapter, which is the interface responsible to provide the adapter functionality to the peer. The SIP adapter receives and sends regular SIP messages from and to clients. The P2PSIP WG moved from the text-based dsip proposal towards other binary-based protocols such as RELOAD [3] and XPP [4].

3 3 TABLE I REPRESENTATION OF THE DHT S CONTENTS FOR A DLS. Key resourceuri-1 Value contacturi-1; displayname-1; priority=p1; expires=t1 contacturi-2; displayname-2; priority=p2; expires=t2 contacturi-3; displayname-3; priority=p3; expires=t3 contacturi-4; displayname-4; priority=p4; expires=t4 contacturi-5; displayname-5; priority=p5; expires=t5 contacturi-6; displayname-6; priority=p6; expires=t resourceuri-2 resourceuri-3 B. Merging Location Services The distributed SIP LS described above is one example of how a DHT can be used to create a LS for a given application. Other applications might exploit a DLS as well. We propose that these location services be merged into a unique DHT in order to achieve a single DLS that several application might use. This approach is preferred rather than creating separate location services for each application since: only one registry would be used as a single distributed access point; the increased number of collaborating nodes would result in a more robust DHT. III. GENERAL PURPOSE DLS ARCHITECTURE The P2P DLS system should provide a storage and retrieval service for the binding between an URI, identifying the target resource, and one or more mapped contact URIs, identifying the place where or through which the resource can be accessed. Together with each contact URI some other information should be stored like the expiration time, an access priority value, and, optionally, a displayable text (for example a description of the contact or a readable name). The distribute LS can be abstractly represented as in table I. The proposed P2P distributed LS may actually store and retrieve mappings between a URI (identifying the resource) and one or more URIs in a distributed and reliable manner. RFC 2397 [8] defines a method for mapping any (short) data within a standard URI. Our LS system in conjunction with RFC 2397 may also be seen as a system for storing any kind of short data in a distributed P2P manner, providing a sort of distributed database. It is important to point out that, although a real distributed database would require that the information stored in the DHT should be the actual data (such as files), the data stored in the DHT should be short as they would be moved often from node to node as the DHT reorganizes when members join and leave. This is why we prefer using the DHT as a location service, that is, a registry, where the information stored are not the actual data but rather show how to access that particular resource. This approach is also preferred as it is up to the application that looks up the DHT to decide what to do with the location information and what protocol to eventually use to actually access the resource. Therefore, applications may treat the DHT as an external registry to consult whenever they need location information. In order to implement a general purpose DLS we do not specify a particular DHT algorithm: different implementations may use different DHT algorithms (like Kademlia, Chord, etc.). The main components of such P2P distribute LS are: 1) a DHT algorithm; 2) a P2P protocol used for managing the DHT (inserting a new peer, updating the DHT, etc.); 3) a protocol used to perform basic LS queries like put(), get() on the distributed LS, used by DHT-peer and possibly by non-dht peers; since DHT peers use 2 for maintaining the DHT, protocol 3 is intended for pure DHT access at the border of the P2P system. As pointed out, for component 1 we do not make any particular assumption since different DHT algorithms should be supported. For component 2 we propose to use SIP as it is a candidate as standard protocol for maintaining P2P systems by the P2PSIP WG [5], [9], [11]. Finally, for component 3 we do not specify a new protocol. Any implementation can consider and use its own mechanism, according with the other systems it has to interact with. Some examples are described in the next sections. Note that protocol 2 is also a possible candidate for 3. Particularly, we have already implemented a LS system in which SIP (actually with some extensions) is used for both 2 and 3 [12]. Note that, if the application includes the peer, 3 is not needed as the communication between the application and the peer occurs through basic API calls. In our realization both Kademlia and Chord DHT algorithm have been implemented and used for 1. A. DHT protocols There are several DHT algorithms currently proposed in literature, each with its own procedures for allowing a node to join, insert a new resource, query for a resource, leaving the DHT. Generally, the DHT algorithm describes all mechanisms required for the maintenance of the DHT. However, in order to implement such mechanisms amongst several nodes distributed on an underlying network (usually an IP network or more precisely the Internet) a proper communication protocol is needed. Current DHT implementations often use ad-hoc communication protocols specified directly with their implementations. In other cases, a more general RPC protocol is used. The use of RPC protocols is motivated by the typical interaction between peers required by various DHT algorithms. Instead, in this section we discuss the use of SIP for the purpose of the maintenance of the LS DHT. Although the primary function of SIP is to initiate, modify, and terminate multimedia sessions, the use of SIP for other communication scenarios has been already proposed for other applications (e.g. for presence, or instant messaging). Some advantages of using SIP are: reference protocol for different P2P-oriented applications such as VoIP, IM, presence, and conference; easy integration of the proposed mechanisms with this applications; quite tested protocol; runs everywhere: over high speed fixed or mobile network, over light transport protocol like UDP or on reliable

4 4 and secure protocol such as TLS over TCP or SCTP; already solved (at least partially) some well-known issues such as NAT or firewall traversal; SIP already contemplates the presence of intermediate nodes; already implemented within several devices (PCs, PDAs, smartphones, hardphones, etc.); availability of several implementation of SIP intermediate nodes; availability of several SIP stack implementations for different OSs and programming languages; easy to implement (text-based); easy to extend, keeping backward compatibility. We envisaged two different approaches for using SIP as DHT communication protocol: A) SIP is used transparently to carry opaque DHT messages. This is similar to the usage of HTTP for Web Services. DHT messages, for example XML encoded, are encapsulated within the SIP message body. Standard SIP methods such as REGISTER, MESSAGE, UPDATE, SUBSCRIBE, NOTIFY can be used, or a new specific method (e.g. DHTQUERY) can be defined. B) SIP is extended in order to provide support for DHT maintenance, and proper mechanisms are used to map the specified DHT operation (such as join, leave, put, leave, etc). This is the approach followed by some proposals arisen within the P2PSIP WG. In particular, dsip [5] tried to completely reuse the semantics used by standard SIP registration service. The REGISTER message (like in dsip) or new proper messages can be used for the purpose. Approach A substantially uses SIP as RPC protocol, although this is in contrast with what declared in RFC 4485 (Informational). However, this is consistent with other SIP usages such as for UA registration and service subscription. If approach A is followed, the SIP protocol may be replaced at any time by another RPC protocol. Solution B is more compact than A and is the approach that we followed in our work. B. Information stored into the DHT We propose that the information stored into the DHT does not include only the contact of the resource (or service), that is, its routable-uri. We also store additional information such as: an optional display name, to be used as a description or a readable name; an expiration time, referring to the time for which the resource is to be considered fresh (this information can be also used to delete a resource from the DHT if set to 0); an access priority value. This information can be included directly into a single URI, just like SIP specifies for contact information. Another approach could be to represent the resource information in XML format allowing also for adding additional parameters that might be considered useful for the resource. Fig. 1. DHT Peer API and DHT client API. IV. IMPLEMENTATION DETAILS An implementation of the DLS described in the previous section has already been realized based on the Java programming language [12]. In this section we will describe some architectural and implementative choices and solutions that have been undertaken. For compatibility, two different DHT algorithms (1) have been implemented: Chord and Kademlia. The protocol used for maintaining and managing the DHT (2) and the resources is dsip. For the client protocol (3) no assumption has been made. Our implementation currently supports SIP and HTTP request from SIP UAs and HTTP clients. Compatibility with client protocols is realized by Protocol Adapter interfaces that reside within the peer. It is possibile to extend the adapter capabilities of the peer by implementing new adapter interfaces that support new client protocols. It is also possible that the communication between the client and the peer may occur through API calls. This is the case when the application includes both one or more clients and a peer. A. The DHT API In our investigation, we have highlighted the basic operations that are common to all DHT algorithms. We have found that the basic operations are: join: this operation allows a peer to join an overlay; leave: this opartion allows a peer to leave the overlay it is currently enrolled in; put: this operation allows to store a key/value pair in the DHT; get: this operation allows to retrieve the information associated with the given key. All these operations can be performed by peers, but only the put and get operations can be performed by clients. Hence, the DHT client API is a logical subset of the DHT peer API, since a peer can do anything a client can do, but not viceversa (see figure 1). B. A DHT-independent implementation Since no assumption has been made on the particular DHT algorithm (1) to be used, we have decided to create our implementation in a pluggable-dht algorithm fashion. This means that the peer can negotiate and learn at the time of joining which DHT algorithm is in use and act consequently. The

5 5 Fig. 3. Session establishment using the DLS. Fig. 2. Client protocol adapters. Fig. 4. Peer-to-Peer SIP user registration. implementation therefore exploits the DHT API in order to be as neutral as possible. The DHT logic for the specific DHT algorithm is part of the peer s core, and must be implemented for any DHT algorithm that the peer is willing to support. C. A protocol-independent implementation Our implementation is not tied to a specific protocol for managing the DHT (2). This choice was made because the different approaches for a DHT protocol are still under investigation. Therefore, the DHT communication interface can be implemented using any suitable protocol. The communication API is based on two basic mathods (request() and respond()) which are transparent to the DHT protocol in use. Our DLS implementation currently supports the dsip protocol, but it is easy to add support for additional protocol by simply implementing a DHT communication interface for the specific protocol. dsip support is based upon the open source mjsip project [10]. Since no assumption is made for the DHT protocol, we manage requests and responses internally to the peer with neutral objects, which are constructed based on the actual protocol requests and responses that are received by the DHT communicator interface. D. Protocol adapters As described above, communication between clients and peers may occur through any client protocol the peer is able to support. Client requests are received by a protocol adapter interface, which is part of the peer, whose task is to parse the request, constructing the internal request representation, executing the request using the peer s DHT logic, and finally to respond to the client. Currently supported client protocols are SIP and HTTP, but other client protocols may be supported by simply implementing the corresponding protocol adapter (figure 2). Note that when the application includes both one or more clients and a peer, it is possible to directly use the DHT API to perform the desired operations, without passing through the intermediate protocol adapter. E. Session establishment The DLS that we have realized can be used by any application to establish sessions among users (i.e. SIP UAs). Agents can register their contact into the DHT through a put() request, and can initiate sessions with other users by retrieving the contact information from the DHT and successively exploiting this information for establishing the session, as shown in figure 3. V. DEMONSTRATIVE APPLICATIONS Together with the DLS implementation, we have realized some demonstrative applications to show usage possibilities for our DLS. These applications are only examples of how to exploit the DLS and are not exclusive, that is, they can co-exist since they can be based upon the same DLS. A. Peer-to-Peer SIP Pure P2P SIP calls can be performed by exploiting the DLS as a SIP LS. Legacy SIP User Agents would register themselves using a peer enrolled into the DHT as a Proxy server. The peer would receive the registration request at its SIP protocol adapter interface and store the UA s contact into the DHT. When a UA wants to perform a SIP call, it sends an INVITE request to the peer for some user. The peer performs a lookup to resolve the target user s address and retrieve its location, then it would forward the INVITE request to the UA. The SIP session is now initiated. User registration scenario is sketched in figure 4. Session establishment is shown in figure 5. B. HTTP distributed virtual server Another DLS-based application is a HTTP distributed virtual server. In such application, a virtual web server is deployed. This means that the files are not stored on the same host but are published by a number of nodes that collaborate. Data replication can be achieved by storing the same information on different hosts, and the website contents can be partitioned among several nodes.

6 6 Fig. 5. Peer-to-Peer SIP call. information. Motivations for a DLS rise from the need to remove centralizing points for name resolution, which occurs in many applications that use URI and URL to refer to the enpoints of communication. The DLS architecture is based on distributed hash tables and consists in creating a distributed registry that application can consult to perfrom address resolution. The main components for a DLS would therefore be a DHT algorithm, a peer protocol for maintaining the DHT, and client protocol to interact with the DLS. After describing the possible approaches for a DLS, we have presented a Javabased implementation for a DLS, which uses a SIP-based peer protocol and supports both Chord and Kademlia DHTs. Finally, we have presented also some sample application that show how the DLS can be exploited to create P2P applications. Fig. 6. HTTP resource registration. ACKNOWLEDGMENTS This work was partially supported by the Italian Ministry for University and Research (MIUR) within the project PRO- FILES under the PRIN 2006 research program. Fig. 7. HTTP resource access. Resource registration can be performed with a HTTP PUT request as shown in figure 6. A resource can be accessed by a HTTP User Agent as shown in figure 7. Let s assume that there are three hosts H 1, H 2, and H 3 that collaborate in deploying a virtual web server as follows: H 1 publishes files F A, F B, and F C. H 2 publishes files F A, F D, and F E. H 3 publishes files F B, F D, and F F. A HTTP User Agent (i.e., a web server) might want to access the resource F A. The HTTP UA sends a HTTP GET request for the resource F A to a DHT peer it has set as proxy. The peer perfroms a lookup into the DHT for the targeted resource (thus avoiding a DNS lookup) and discovers that it is available at hosts H 1 and H 2. With some policy it can select either of these two hosts, forward the HTTP request, and retrieve the resource. Access to resources occurs in a transparent way as the resources would all be registered with resource names that refer to the same virtual domain. The end user would not be aware of the fact that resources are distributed among a number of hosts. REFERENCES [1] I. Stoica, R. Morris, D. Liben-Nowell, D. Karger, M. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Transactions on Networking, 11(1):17 32, Feb [2] P. Maymounkov and D. Mazires. Kademlia: A Peer-to-Peer Information System Based on the XOR metric. In 1st International Workshop on Peer-to-peer Systems, [3] D. Bryan. REsource LOcation And Discovery (RELOAD). Internet-Draft draft-bryan-p2psip-reload-01, IETF, July [4] E. Marocco and E. Ivov. Extensible Peer Protocol (XPP). Internet-Draft draft-marocco-p2psip-xpp-00, IETF, June [5] D. Bryan. dsip: A P2P Approach to SIP Registration and Resource Location. Internet-Draft draft-bryan-p2psip-dsip-00, IETF, February [6] T. Berners-Lee, R. Fielding, and L. Masinter, RFC 3986: Uniform Resource Identifier (URI): Generic Syntax, January 2005, status: IETF Standard Track. [7] J. Rosenberg, H. Schulzrinne, G. Camarillo, J. Peterson, A. Johnston, and E. Schooler, RFC 3261: SIP: Session Initiation Protocol, June 2002, status: IETF Standard Track. [8] L. Masinter, RFC 2397: The data URL scheme, August 1998, status: IETF Standard Track. [9] M. Zangrilli and D. Bryan. A Chord-based DHT for Resource Lookup in P2PSIP. Internet-Draft draft-zangrilli-p2psip-dsip-dhtchord-00, IETF, February [10] L. Veltri. mjsip project, [11] S. Cirani and L. Veltri. A Kademlia-based DHT for Resource Lookup in P2PSIP. Internet-Draft draft-cirani-p2psip-dsip-dhtkademlia-00, IETF, October [12] S. Cirani. Kademlia implementation, dsip zip VI. CONCLUSIONS In this paper, we have presented a proposal for a general purpose Distributed Location Service to be used by new P2P application or other legacy application, which otherwise would natively rely on a centralized location server to gather location

P2PSIP, ICE, and RTCWeb

P2PSIP, ICE, and RTCWeb P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment

More information

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication

More information

Internet Engineering Task Force (IETF)

Internet Engineering Task Force (IETF) Internet Engineering Task Force (IETF) Request for Comments: 7890 Category: Informational ISSN: 2070-1721 D. Bryan Cogent Force, LLC P. Matthews Nokia E. Shim Samsung Electronics Co., Ltd. D. Willis Softarmor

More information

RELOAD P2P Overlay Access Protocol. Younghan Kim Soongsil University

RELOAD P2P Overlay Access Protocol. Younghan Kim Soongsil University RELOAD P2P Overlay Access Protocol Younghan Kim Soongsil University Contents Introduction What is P2P? Why P2P-SIP? P2PSIP overlay network Architecture Operations RELOAD protocol Introduction Protocol

More information

A SESSION INITIATION PROTOCOL FOR THE INTERNET OF THINGS

A SESSION INITIATION PROTOCOL FOR THE INTERNET OF THINGS DOI 10.12694/scpe.v14i4.931 Scalable Computing: Practice and Experience ISSN 1895-1767 Volume 14, Number 4, pp. 249 263. http://www.scpe.org c 2013 SCPE A SESSION INITIATION PROTOCOL FOR THE INTERNET OF

More information

Department of Computer Science. Burapha University 6 SIP (I)

Department of Computer Science. Burapha University 6 SIP (I) Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important

More information

Presence Scalability Architectures 1

Presence Scalability Architectures 1 Scalability Architectures 1 Vishal K. Singh and Henning Schulzrinne Department of Computer Science, Columbia University {vs2140, hgs}@cs.columbia.edu Abstract: We apply the two-stage reliable and scalable

More information

An Efficient NAT Traversal for SIP and Its Associated Media sessions

An Efficient NAT Traversal for SIP and Its Associated Media sessions An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,

More information

Optimizing SIP Service Provisioning in Internet Connected MANETs

Optimizing SIP Service Provisioning in Internet Connected MANETs Optimizing SIP Service Provisioning in Internet Connected MANETs Marcel C. Castro and Andreas J. Kassler Computer Science Department Karlstad University Universitetgatan 2, Karlstad, Sweden Email: (Marcel.Cavalcanti

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

Implementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar

Implementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar Implementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar Jean-François Wauthy FUNDP - The University of Namur jfwauthy@student.fundp.ac.be Laurent Schumacher FUNDP - The University

More information

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions [MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open

More information

P2PSIP Draft Charter. Dean Willis March 2006

P2PSIP Draft Charter. Dean Willis March 2006 P2PSIP Draft Charter Dean Willis March 2006 Purpose The purpose of the Peer-to-Peer (P2P) Session Initiation Protocol working group (P2PSIP WG) is to develop guidelines and mechanisms for the use of the

More information

Overview of the Session Initiation Protocol

Overview of the Session Initiation Protocol CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction

More information

Session Initiation Protocol (SIP) Overview

Session Initiation Protocol (SIP) Overview Session Initiation Protocol (SIP) Overview T-110.7100 Applications and Services in Internet 6.10.2009 Jouni Mäenpää NomadicLab, Ericsson Contents SIP introduction, history and functionality Key concepts

More information

Session Initiation Protocol (SIP) Overview

Session Initiation Protocol (SIP) Overview Session Initiation Protocol (SIP) Overview T-110.7100 Applications and Services in Internet 5.10.2010 Jouni Mäenpää NomadicLab, Ericsson Research Contents SIP introduction, history and functionality Key

More information

Voice over IP Consortium

Voice over IP Consortium Voice over IP Consortium Version 1.6 Last Updated: August 20, 2010 121 Technology Drive, Suite 2 University of New Hampshire Durham, NH 03824 Research Computing Center Phone: +1-603-862-0186 Fax: +1-603-862-4181

More information

The Design of Secure and Efficient P2PSIP Communication Systems

The Design of Secure and Efficient P2PSIP Communication Systems The Design of Secure and Efficient P2PSIP Communication Systems Xianghan Zheng and Vladimir Oleshchuk Faculty of Engineering and Science, University of Agder, Norway. {xianghan.zheng,vladimir.oleshchuk}@uia.no

More information

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility Rubén Cuevas, Carmen Guerrero, Ángel Cuevas, María Calderón, Carlos J. Bernardos Departamento de Ingeniería Telemática, Universidad

More information

CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol

CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol Mustapha GUEZOURI LISSI/SCTIC, University of Paris XII-Val de Marne, France e-mail mguezouri@yahoo.fr and Abdelhamid MELLOUK

More information

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record Network Working Group J. Peterson Request for Comments: 3764 NeuStar Category: Standards Track April 2004 enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record Status of this

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] ALEX: Improving SIP Support in Systems with Multiple Network Addresses Original Citation: Baldi M; Marinone F; Risso F.; Torrero L (2005).

More information

P2PNS: A Secure Distributed Name Service for P2PSIP

P2PNS: A Secure Distributed Name Service for P2PSIP P2PNS: A Secure Distributed Name Service for P2PSIP Mobile P2P 2008, Hong Kong, China Outline Decentralized VoIP (P2PSIP) Peer-to-Peer name service (P2PNS) Architecture Two-stage name resolution P2PNS

More information

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs

More information

SIP Compliance APPENDIX

SIP Compliance APPENDIX APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following

More information

A Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2PSIP

A Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2PSIP A Virtual and Distributed Control Layer with Proximity Awareness for Group Conferencing in P2PSIP Alexander Knauf 1 alexander.knauf@haw-hamburg.de Gabriel Hege 1, Thomas Schmidt 1, Matthias Wählisch 2

More information

Extensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP

Extensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP Extensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP T-110.7100 Applications and Services in Internet 1.10.2008 Jouni Mäenpää NomadicLab, Ericsson Contents Extending SIP SIP extension negotiation

More information

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP). This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,

More information

Application Scenario 1: Direct Call UA UA

Application Scenario 1: Direct Call UA UA Application Scenario 1: Direct Call UA UA Internet Alice Bob Call signaling Media streams 2009 Jörg Ott 1 tzi.org INVITE sip:bob@foo.bar.com Direct Call bar.com Note: Three-way handshake is performed only

More information

[MS-ICE2]: Interactive Connectivity Establishment (ICE) Extensions 2.0

[MS-ICE2]: Interactive Connectivity Establishment (ICE) Extensions 2.0 [MS-ICE2]: Interactive Connectivity Establishment (ICE) Extensions 2.0 Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: September 2015

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: September 2015 Internet Engineering Task Force (IETF) R. Sparks Request for Comments: 7647 Oracle Updates: 3515 A.B. Roach Category: Standards Track Mozilla ISSN: 2070-1721 September 2015 Abstract Clarifications for

More information

Network Working Group Request for Comments: 5509 Category: Standards Track April 2009

Network Working Group Request for Comments: 5509 Category: Standards Track April 2009 Network Working Group S. Loreto Request for Comments: 5509 Ericsson Category: Standards Track April 2009 Internet Assigned Numbers Authority (IANA) Registration of Instant Messaging and Presence DNS SRV

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 2 Outline 1. Introduction 2. Core SIP 3. Selected Extensions 3 Introduction: Signaling vs Media Signaling: Session establishment Session tear down Changes to the session Supplementary services Media:

More information

Chapter 3: IP Multimedia Subsystems and Application-Level Signaling

Chapter 3: IP Multimedia Subsystems and Application-Level Signaling Chapter 3: IP Multimedia Subsystems and Application-Level Signaling Jyh-Cheng Chen and Tao Zhang IP-Based Next-Generation Wireless Networks Published by John Wiley & Sons, Inc. January 2004 Outline 3.1

More information

IMS signalling for multiparty services based on network level multicast

IMS signalling for multiparty services based on network level multicast IMS signalling for multiparty services based on network level multicast Ivan Vidal, Ignacio Soto, Francisco Valera, Jaime Garcia, Arturo Azcorra UniversityCarlosIIIofMadrid Av.Universidad,30 E-28911, Madrid,

More information

Kademlia: A P2P Informa2on System Based on the XOR Metric

Kademlia: A P2P Informa2on System Based on the XOR Metric Kademlia: A P2P Informa2on System Based on the XOR Metric Today! By Petar Mayamounkov and David Mazières, presented at IPTPS 22 Next! Paper presentation and discussion Image from http://www.vs.inf.ethz.ch/about/zeit.jpg

More information

Cisco Expressway Session Classification

Cisco Expressway Session Classification Cisco Expressway Session Classification Deployment Guide First Published: December 2016 Last Updated: December 2017 Expressway X8.10 Cisco Systems, Inc. www.cisco.com 2 Preface Preface Change History Table

More information

Extension of Resource Management in SIP

Extension of Resource Management in SIP Extension of Resource Management in SIP Franco Callegati and Aldo Campi University of Bologna, Italy {franco.callegati,aldo.campi}@unibo.it Abstract. In this work we discuss the issue of communication

More information

X-Communicator: Implementing an advanced adaptive SIP-based User Agent for Multimedia Communication

X-Communicator: Implementing an advanced adaptive SIP-based User Agent for Multimedia Communication X-Communicator: Implementing an advanced adaptive SIP-based User Agent for Multimedia Communication Shakil Siddique, Raimund K. Ege and S. Masoud Sadjadi School of Computer Science Florida International

More information

SIMPLEstone - Benchmarking Presence Server Performance *

SIMPLEstone - Benchmarking Presence Server Performance * SIMPLEstone - Benchmarking Presence Server Performance * Vishal K. Singh and Henning Schulzrinne Department of Computer Science, Columbia University {vs2140, hgs}@cs.columbia.edu Abstract: Presence is

More information

RELOAD/CoAP architecture with a resource aggregation/disaggregation

RELOAD/CoAP architecture with a resource aggregation/disaggregation RELOAD/CoAP Architecture with Resource Aggregation/Disaggregation Service L. Rodrigues, J. Guerreiro and N. Correia CEOT, FCT, University of Algarve 8005-139 Faro, Portugal Emails: {lrodrig,jdguerreiro,ncorreia}@ualg.pt

More information

Cisco Expressway Options with Cisco Meeting Server and/or Microsoft Infrastructure

Cisco Expressway Options with Cisco Meeting Server and/or Microsoft Infrastructure Cisco Expressway Options with Cisco Meeting Server and/or Microsoft Infrastructure Deployment Guide First Published: December 2016 Last Updated: October 2017 Expressway X8.9.2 Cisco Systems, Inc. www.cisco.com

More information

Request for Comments: 5369 Category: Informational October Framework for Transcoding with the Session Initiation Protocol (SIP)

Request for Comments: 5369 Category: Informational October Framework for Transcoding with the Session Initiation Protocol (SIP) Network Working Group G. Camarillo Request for Comments: 5369 Ericsson Category: Informational October 2008 Framework for Transcoding with the Session Initiation Protocol (SIP) Status of This Memo This

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part

More information

A RELOAD Usage for Distributed Conference Control (DisCo)

A RELOAD Usage for Distributed Conference Control (DisCo) A RELOAD Usage for Distributed Conference Control (DisCo) draft-knauf-p2psip-disco-00 Alexander Knauf Gabriel Hege Thomas Schmidt Matthias Wählisch alexander.knauf@haw-hamburg.de, hege@fhtw-berlin.de,

More information

TinyTorrent: Implementing a Kademlia Based DHT for File Sharing

TinyTorrent: Implementing a Kademlia Based DHT for File Sharing 1 TinyTorrent: Implementing a Kademlia Based DHT for File Sharing A CS244B Project Report By Sierra Kaplan-Nelson, Jestin Ma, Jake Rachleff {sierrakn, jestinm, jakerach}@cs.stanford.edu Abstract We implemented

More information

Network-based Fast Handover for IMS Applications and Services

Network-based Fast Handover for IMS Applications and Services Network-based Fast Handover for IMS Applications and Services Sang Tae Kim 1, Seok Joo Koh 1, Lee Kyoung-Hee 2 1 Department of Computer Science, Kyungpook National University 2 Electronics and Telecommunications

More information

Extensions to SIP and P2PSIP

Extensions to SIP and P2PSIP Extensions to SIP and P2PSIP T-110.7100 Applications and Services in Internet 12.10.2010 Jouni Mäenpää NomadicLab, Ericsson Research Contents Extending SIP Examples of SIP extensions Reliability of provisional

More information

The Session Initiation Protocol

The Session Initiation Protocol The Session Initiation Protocol N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture # 25 Roadmap for Multimedia Networking 2 1. Introduction why QoS? what are the problems?

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks Network Architectures Jianping Pan Summer 2007 5/16/07 csc485b/586b/seng480b 1 Internet architectures Design principles store-and-forward packet switching end-to-end arguments

More information

Internet Engineering Task Force (IETF) Category: Informational August 2012 ISSN:

Internet Engineering Task Force (IETF) Category: Informational August 2012 ISSN: Internet Engineering Task Force (IETF) R. Asati Request for Comments: 6695 Cisco Systems Category: Informational August 2012 ISSN: 2070-1721 Abstract Methods to Convey Forward Error Correction (FEC) Framework

More information

Z24: Signalling Protocols

Z24: Signalling Protocols Z24: Signalling Protocols Mark Handley H.323 ITU protocol suite for audio/video conferencing over networks that do not provide guaranteed quality of service. H.225.0 layer Source: microsoft.com 1 H.323

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions [MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open

More information

Publication III. c 2010 IEEE. Reprinted with permission.

Publication III. c 2010 IEEE. Reprinted with permission. Publication III Jouni Mäenpää and Jaime Jiménez Bolonio. Performance of REsource LOcation And Discovery (RELOAD) on Mobile Phones. In 2010 IEEE Wireless Communications and Networking Conference (WCNC),

More information

Internet Engineering Task Force. draft-ietf-sip-srv-04.txt dynamicsoft,columbia U. January 24, 2002 Expires: July SIP: Locating SIP Servers

Internet Engineering Task Force. draft-ietf-sip-srv-04.txt dynamicsoft,columbia U. January 24, 2002 Expires: July SIP: Locating SIP Servers Internet Engineering Task Force SIP WG Internet Draft J.Rosenberg,H.Schulzrinne draft-ietf-sip-srv-04.txt dynamicsoft,columbia U. January 24, 2002 Expires: July 2002 STATUS OF THIS MEMO SIP: Locating SIP

More information

Information About SIP Compliance with RFC 3261

Information About SIP Compliance with RFC 3261 APPENDIX A Information About SIP Compliance with RFC 3261 This appendix describes how the Cisco SIP IP phone complies with the IETF definition of SIP as described in RFC 3261. It has compliance information

More information

Peer-to-Peer Architectures and Signaling. Agenda

Peer-to-Peer Architectures and Signaling. Agenda Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction

More information

Internet Engineering Task Force (IETF) Request for Comments: 7263 Category: Standards Track. Y. Zhang CoolPad / China Mobile June 2014

Internet Engineering Task Force (IETF) Request for Comments: 7263 Category: Standards Track. Y. Zhang CoolPad / China Mobile June 2014 Internet Engineering Task Force (IETF) Request for Comments: 7263 Category: Standards Track ISSN: 2070-1721 N. Zong X. Jiang R. Even Huawei Technologies Y. Zhang CoolPad / China Mobile June 2014 An Extension

More information

Authentication, Authorization and Accounting Requirements for the Session Initiation Protocol

Authentication, Authorization and Accounting Requirements for the Session Initiation Protocol Internet Engineering Task Force INTERNET-DRAFT draft-ietf-sipping-aaa-req-02.ps SIP WG J. Loughney, G. Camarillo Nokia, Ericsson February 5, 2003 Expires: August, 2003 Authentication, Authorization and

More information

E. Shim Panasonic October 16, 2006

E. Shim Panasonic October 16, 2006 SIPPING WG Internet-Draft Expires: April 19, 2007 S. Baset H. Schulzrinne Columbia University E. Shim Panasonic October 16, 2006 Status of this Memo A Protocol for Implementing Various DHT Algorithms draft-baset-sipping-p2pcommon-00

More information

The Sys-Security Group

The Sys-Security Group The Sys-Security Group Security Advisory More Vulnerabilities with Pingtel xpressa SIP-based IP Phones How one can exploit vulnerabilities with MyPingtel Portal to subvert a VoIP infrastructure which includes

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information

Internet Engineering Task Force (IETF) Request for Comments: 8465 September 2018 Category: Informational ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 8465 September 2018 Category: Informational ISSN: Internet Engineering Task Force (IETF) R. Atarius, Ed. Request for Comments: 8465 September 2018 Category: Informational ISSN: 2070-1721 Using the Mobile Equipment Identity (MEID) URN as an Instance ID

More information

Providing File Services using a Distributed Hash Table

Providing File Services using a Distributed Hash Table Providing File Services using a Distributed Hash Table Lars Seipel, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany lars.seipel@stud.h-da.de

More information

Internet Engineering Task Force. dynamicsoft H.Schulzrinne Columbia U. draft-ietf-sip-srv-05.txt February 21, 2002 Expires: August 2002

Internet Engineering Task Force. dynamicsoft H.Schulzrinne Columbia U. draft-ietf-sip-srv-05.txt February 21, 2002 Expires: August 2002 Internet Engineering Task Force Internet Draft draft-ietf-sip-srv-05.txt February 21, 2002 Expires: August 2002 SIP WG J.Rosenberg dynamicsoft H.Schulzrinne Columbia U. SIP: Locating SIP Servers STATUS

More information

SIP SERVICES USING SIP SERVLET API THE INFOLINE SERVICE

SIP SERVICES USING SIP SERVLET API THE INFOLINE SERVICE Journal of Information, Control and Management Systems, Vol. 8, (2010), No.3 SIP SERVICES USING SIP SERVLET API THE INFOLINE SERVICE Pavel SEGEČ University of Žilina, Faculty of Management Science and

More information

IP Network Enabler. Feature Description. Relationships to Other Features

IP Network Enabler. Feature Description. Relationships to Other Features This chapter describes the StarOS (IPNE) feature. It describes how the feature works, and how to configure and monitor IPNE. Feature, page How it Works, page Configuring the IPNE Feature, page 8 Monitoring

More information

Latest Peer-to-Peer Technologies II Artjom Lind 1

Latest Peer-to-Peer Technologies II Artjom Lind 1 Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured

More information

Asynchronous SIP Routing

Asynchronous SIP Routing Asynchronous SIP Routing SIP Express Router (SER) and Kamailio (OpenSER) SIP-Router.org Daniel-Constantin Mierla Co-Founder Kamailio asipto.com www.kamailio.org 2 History 2002 Jun 2005 Jul 2008 Aug 2008

More information

IP Office Platform R11.0

IP Office Platform R11.0 Issue 03d - (09 October 2018) Contents 8. Remote SIP Deskphones 8.1 Provisioning... the Deskphones 59 8.2 Configuring... Application Rules 61 1.1 Example Schematic... 4 8.3 Configuring... Media Rules 61

More information

WWW, REST, and Web Services

WWW, REST, and Web Services WWW, REST, and Web Services Instructor: Yongjie Zheng Aprile 18, 2017 CS 5553: Software Architecture and Design World Wide Web (WWW) What is the Web? What challenges does the Web have to address? 2 What

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL

AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL João Paulo Sousa Instituto Politécnico de Bragança R. João Maria Sarmento Pimentel, 5370-326 Mirandela Eurico Carrapatoso FEUP/INESC Porto R. Dr. Roberto

More information

Enabling SIP-Based Sessions in Ad Hoc Networks

Enabling SIP-Based Sessions in Ad Hoc Networks SUBMITTED FOR PUBLICATION TO: WINET, APRIL 25, 2006 Enabling SIP-Based Sessions in Ad Hoc Networks Nilanjan Banerjee Motorola India Research Labs, 66/1, Plot 5, Bagmane TechPark, C. V. Raman Nagar Post,

More information

Columbia University G. Camarillo Ericsson October 2005

Columbia University G. Camarillo Ericsson October 2005 Network Working Group Request for Comments: 4168 Category: Standards Track J. Rosenberg Cisco Systems H. Schulzrinne Columbia University G. Camarillo Ericsson October 2005 The Stream Control Transmission

More information

SIP Status and Directions

SIP Status and Directions 1 SIP Status and Directions Henning Schulzrinne Dept. of Computer Science Columbia University New York, New York schulzrinne@cs.columbia.edu VON Developer s Conference Summer 2000 (Boston) July 18, 2000

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

ReST 2000 Roy Fielding W3C

ReST 2000 Roy Fielding W3C Outline What is ReST? Constraints in ReST REST Architecture Components Features of ReST applications Example of requests in REST & SOAP Complex REST request REST Server response Real REST examples REST

More information

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying

More information

Proactive Management and Monitoring of Mobile Devices in Social Networking Applications

Proactive Management and Monitoring of Mobile Devices in Social Networking Applications International Journal of Emerging Trends in Science and Technology Proactive Management and Monitoring of Mobile Devices in Social Networking Applications Authors TVN Prapulla Chandu 1, A. Vishnuvardhan

More information

Medical Sensor Application Framework Based on IMS/SIP Platform

Medical Sensor Application Framework Based on IMS/SIP Platform Medical Sensor Application Framework Based on IMS/SIP Platform I. Markota, I. Ćubić Research & Development Centre, Ericsson Nikola Tesla d.d. Poljička cesta 39, 21000 Split, Croatia Phone: +38521 305 656,

More information

Installation & Configuration Guide Version 1.6

Installation & Configuration Guide Version 1.6 TekConSer Installation & Configuration Guide Version 1.6 Document Revision 2.0 http://www.kaplansoft.com/ TekConSer is built by Yasin KAPLAN Read Readme.txt for last minute changes and updates which can

More information

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved. BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and

More information

Outline. Goals of work Work since Atlanta Extensions Updates Made Open Issues Ad-hoc meeting & Next Teleconference Links

Outline. Goals of work Work since Atlanta Extensions Updates Made Open Issues Ad-hoc meeting & Next Teleconference Links Update of RTSP draft-ietf-mmusic-rfc2326bis-03.txt Authors: Henning Schulzrinne / Columbia University Robert Lanphier / Real Networks Magnus Westerlund / Ericsson (Presenting) Anup Rao / Cisco Outline

More information

A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services

A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services Hui-Kai Su 1,*, Wen-Hsu Hsiao 2, Jian-Ting Pan 3, Chen-Hung Liao 4, Kim-Joan Chen 3, and Chien-Min Wu 5 1 Dept. of Electrical

More information

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization

More information

Developing ILNP. Saleem Bhatti, University of St Andrews, UK FIRE workshop, Chania. (C) Saleem Bhatti.

Developing ILNP. Saleem Bhatti, University of St Andrews, UK FIRE workshop, Chania. (C) Saleem Bhatti. Developing ILNP Saleem Bhatti, University of St Andrews, UK 2010-07-16 FIRE workshop, Chania. (C) Saleem Bhatti. 1 What is ILNP? Identifier Locator Network Protocol: http://ilnp.cs.st-andrews.ac.uk/ ILNP

More information

Internet Engineering Task Force (IETF) Request for Comments: 8262 Updates: 5368, 5621, 6442 Category: Standards Track October 2017 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 8262 Updates: 5368, 5621, 6442 Category: Standards Track October 2017 ISSN: Internet Engineering Task Force (IETF) C. Holmberg Request for Comments: 8262 I. Sedlacek Updates: 5368, 5621, 6442 Ericsson Category: Standards Track October 2017 ISSN: 2070-1721 Content-ID Header Field

More information

Multimedia Communication

Multimedia Communication Multimedia Communication Session Description Protocol SDP Session Announcement Protocol SAP Realtime Streaming Protocol RTSP Session Initiation Protocol - SIP Dr. Andreas Kassler Slide 1 SDP Slide 2 SDP

More information

08 Distributed Hash Tables

08 Distributed Hash Tables 08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per

More information

Hypertext Transport Protocol HTTP/1.1

Hypertext Transport Protocol HTTP/1.1 Hypertext Transport Protocol HTTP/1.1 Jim Gettys Digital Equipment Corporation, ISBU Visiting Scientist, World Wide Web Consortium 10/17/96 20-Apr-01 1 Acknowledgments HTTP/1.1 Authors Roy Fielding (UCI)

More information

This is the published version of a paper presented at Workshop on Innovative Mobile Applications of Context (IMAC) at MobileHCI 2006, Espoo, Finland.

This is the published version of a paper presented at Workshop on Innovative Mobile Applications of Context (IMAC) at MobileHCI 2006, Espoo, Finland. http://www.diva-portal.org This is the published version of a paper presented at Workshop on Innovative Mobile Applications of Context (IMAC) at MobileHCI 2006, Espoo, Finland. Citation for the original

More information

Compliance with RFC 3261

Compliance with RFC 3261 APPENDIX A Compliance with RFC 3261 This appendix describes how the Cisco Unified IP Phone 7960G and 7940G complies with the IETF definition of SIP as described in RFC 3261. It contains compliance information

More information

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 07:53:57 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 15 Feb 2000 17:03:00 GMT ETag: "3239a5-465b-38a986c4" Accept-Ranges: bytes Content-Length: 18011 Connection:

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

Network Working Group. Intended status: Standards Track Expires: September 2, 2018 March 1, 2018

Network Working Group. Intended status: Standards Track Expires: September 2, 2018 March 1, 2018 Network Working Group Internet-Draft Intended status: Standards Track Expires: September 2, 2018 J. Uberti Google G. Shieh Facebook March 1, 2018 WebRTC IP Address Handling Requirements draft-ietf-rtcweb-ip-handling-06

More information

Tech-invite. RFC 3261's SIP Examples. biloxi.com Registrar. Bob's SIP phone

Tech-invite. RFC 3261's SIP Examples. biloxi.com Registrar. Bob's SIP phone Tech-invite http://www.tech-invite.com RFC 3261's SIP Examples V2.2 November 22, 2005 Registrar Bob's SIP INVITE 100 Trying Proxy INVITE 100 Trying Proxy 200 OK INVITE REGISTER This is a representation,

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information