SlideShare una empresa de Scribd logo
1 de 59
P2P SIP Tutorial Part 2: P2P overlay networks Henry Sinnreich Alan Johnston March 17, 2008
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Note: The Internet and real time communications are very complex Disruptions such as P2P have solid reasons  This is a best effort to fit the content into less than three hours
Part 1: Overview of SIP and P2P Little time to discuss high complexity
The Session Initiation Protocol (SIP) and  the Real Time Transport Protocol (RTP) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1  REGISTER 2  INVITE SIP Srv SIP Srv SIP UA SIP UA sip:alice@atlanta.com sip:bob@biloxi.com DNS biloxi.com?  IP Bob? Loc DB IP of Bob 3  INVITE 4  INVITE 5  RTP voice, video, text
The ugly, later parts in SIP ,[object Object],[object Object],[object Object],[object Object],Legend: NAT: Network address translation SBC: Session border controller SIP Srv SIP Srv SIP UA SIP UA sip:alice@atlanta.com sip:bob@biloxi.com DNS biloxi.com?  IP Bob? Loc DB IP of Bob RTP media NAT NAT SBC SBC Internet SBC SBC SIP
Problem: VoIP infrastructure complexity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The sum of all =  IMS  ( IP Multimedia Subsystem  for 3G wireless)
Overall carrier wire & wireless IMS architecture  - Other IP Networks IP Transport (Access and Core) T - MGF I - BGF UPSF P - CSCF I/S - CSCF BGCF SLF Charging Functions IWF PSTN  Emulation (R2) Mw Mw/Mk/Mm Mr Mg Mj Mi Mp Mn Gm Gq ' ISC Cx Dx Dh Sh Ic Rf /Ro Rf /Ro Ib Iw Gq ' PSTN/ISDN MRFC MGCF MRFP e4 Ie Mw IBCF Mk Mk Application Servers Rf /Ro AGCF e2 P1 P2 P3 UE CNG MG IMS / PSTN  Simulation Gq ' SPDF A-RACF Resource &  Admission Control Resource &  Admission Control SPDF Network   Attachment   Subsystem Re Ia RCEF BGF Ut Ut SGF
The complexity of SIP The impact of cable & wireless industries, telephony DB, SBC
Solution: Application level overlay network Application Transport Network Data link Physical Application Transport Network Data link Physical Application Transport Network Data link Physical Application layer IP Routing Nothing in the middle Back to the Internet as it was designed: e2e
Major P2P Projects Planet Lab infrastructure   http://www.planet-lab.org/ 645 nodes over 310 sites. Academic, industrial, and government institutions  Open DHT OpenDHT is a publicly accessible distributed hash table (DHT)  service . Clients of OpenDHT do not need to run a DHT node in order to use the service. http://www.opendht.org/index.html  P2P SIP New IETF WG formed: P2PSIP Several P2P SIP projects and Internet Drafts (P2P IP PBX: Avaya and Peerio, prestandard) http://p2psip.org
The P2P overlay network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Motivating scenarios for P2P SIP networks  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ref: “P2P SIP Standards” by D. Bryan and H. Sinnreich, Paris 2007 http://www.upperside.fr/sip2007/sip2007program.htm#day1
Other P2P Overlay Network Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TBD by market and business model * “A Layered Naming Architecture for the Internet” by H. Balakrishnan et al. http://nms.lcs.mit.edu/papers/layerednames-sigcomm04.pdf  VON topic today
Business model items for the P2P network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Latest news about commercial P2P ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
P2P SIP Protocol Layers Overlay Network Internet SIP applications L4 Transport (UDP, TCP) L3 IP Network Legend DHT: Distributed Hash Table IM: Instant Messaging DHT Layer TCP/IP VoIP, Video Presence IM File Transfer Applications L5
SIP Session Setup Options ,[object Object],[object Object],Legend DNS: (Internet) Domain Name System PBX: Private Branch Exchange URI: Uniform Resource Identifier SIP messages: INVITE, 180, 200 OK, ACK  ,[object Object],[object Object],[object Object],[object Object],Query DNS for IP address Query one SIP proxy server  (PBX) Query chain of SIP proxy servers (service providers) Query another SIP peer node in P2P SIP Caller Called INVITE 200 OK ACK RTP media packets 180 Ringing (or 183 Session Progress) Caller IP/port for media and codec choices Called IP/port for media and selected codec Time until callee answers
CS (a) and P2P (b) SIP Location Discovery Legend SRV: DNS Server Resource Locator (RFC 2782) NAPTR: Network Authority Pointer (RFC 3403) ENUM: E164 Telephone Number Mapping Service (RFC 3764)   SIP UA Outbound Proxy SIP UA Inbound  Proxy DNS DNS SRV & A queries ENUM: NAPTR, SRV & A queries DB query INVITE INVITE INVITE Caller Called a.  Location DB b.  Location INVITE 1 2 3 4 5 6 Caller Called API SIP SIP SIP SIP DHT DHT DHT DHT
P2P SIP System Legend CN: Client node PN: Peer (various functions) Proxy: SIP proxy server, is another PN Concepts and Terminology for Peer to Peer SIP,  < draft-ietf-p2psip-concepts > P2P SIP Peer protocol Client protocol PN PN PN CN CN CN CN CN CN CN CN CN Proxy DNS CS SIP Enrollment Server Bootstrap Server(s) other PSTN PN
Some requirements for global markets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Note:  Telecom carriers  and cable operators have mostly local markets Internet companies have the global market
Simple usage scenario for SIP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.ietf.org/internet-drafts/draft-sinnreich-sip-tools-01.txt
What P2P SIP IS NOT is just as important ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Multimedia communications (voice) is a convenient “killer” application, there are however many other * The GUI and the communications apps are accessible via the API
Part 2: P2P Overlay Networks and Distributed Hash Tables (DHT)
Secure Hash Algorithm SHA-1 “it is computationally infeasible 1) to find a message that corresponds to a given message digest, or 2) to find two different messages that produce the same message digest. Any change to a message will, with a very high probability, result in a different message digest.”  When a message of any length < 2^64 bits is input, the output is a message digest of 160 bits.  Ref: RFC 3174 and http://en.wikipedia.org/wiki/SHA-1 A word equals a 32-bit string which may be represented as a sequence of 8 hex digits. To convert a word to 8 hex digits each 4-bit string is converted to its hex equivalent.  Example:  1010 0001 0000 0011 1111 1110 0010 0011 = A103FE23   The SHA1 hash function exhibits good avalanche effect. When a single bit is changed the hash sum becomes totally different
DHT Example: Chord ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ref: http://pdos.csail.mit.edu/chord/ http://pdos.csail.mit.edu/papers/chord:sigcomm01/chord_sigcomm.pdf Examples: key:  H{ alice@example.com} Returns content: IP address key:  H{ voice_mail@example.com} Returns content: an audio file Responsibility of node n Responsibility of node n Node ID=n Predecessor of node n Node ID=n Predecessor of node n Node ID=n Predecessor of node n 2 ^m-1 0 2 ^m-1 0 2 ^m-1 0
Frequent Joins and Leaves in Chord ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ref: Security considerations for P2P-SIP by Jan Seedorf http://www.informatik.uni-hamburg.de/SVS/research/projects/voip/index.php
Joining Procedure in Chord ,[object Object],[object Object],[object Object],[object Object],[object Object],Ref: Security considerations for P2P-SIP by Jan Seedorf
Chord Extensions for Robustness Against Node Failure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ref: Security considerations for P2P-SIP by Jan Seedorf
Comparing P2P Overlays - 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Wikipedia,  http://en.wikipedia.org/wiki/P2P_network “ A Survey and Comparison of Peer-to-Peer Overlay Network Schemes” by E. K. Lua at al., IEEE Communications Survey, March 2004. http://www.cl.cam.ac.uk/teaching/2005/AdvSysTop/survey.pdf  “ A performance vs. cost framework for evaluating DHT design tradeoffs under churn” by J. Li et all. MIT, 2002. http://pdos.csail.mit.edu/papers/dhtcomparison:infocom05/paper.pdf  http://www.microsoft.com/technet/network/p2p/default.mspx
Comparing P2P Overlays - 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],*http://opendht.org/pubs.html
Comparing Routing Geometries and Algorithms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],K. Gummadi et al: “The Impact of DHT Routing on Resilience and Proximity”.SIGCOMM’03, August 2003, Karlsruhe, Germany ,[object Object],[object Object],[object Object],[object Object],[object Object]
The limitations of DHT overlays ,[object Object],[object Object],[object Object],“ openDHT: A Public DHT Service, Ph.D. Thesis by Sean C. Rhea, 2005 http://srhea.net/papers/rhea-thesis.pdf  Bandwidth = S/NT Average node lifetime in seconds T Total data stored, S = rD S Unique data bits stored D Redundancy to fault tolerance r Size of the system in number of nodes N
Example Deployment Scenarios for P2P SIP There is a large deployment area service providers and IT for stable peers to support big data sets Low Short High Mobile phone, PDA None Client  Battery  WiFi Phone & GWY Desktop PBX phone BEHAVE compliant Enterprise IAD Residential GWY Phone adapter High Long Low Stable  PC Low Short Medium Any Peer Moving  Laptop IP Quality Session time Churn Rate NAT Scenario DHT Protocol Critical Operation Deployment Scenario hard easy
Performance measurements on the openDHT http://www.arl.wustl.edu/~jst/cse/570/files/10-2-2006a-Andrew_Wan.pdf a. Long running performance and availability of the openDHT for about one year on about 210 nodes b. Latency of ReDirR lookups and openDHT gets
Pastry routing from peer 37A0F1 with key B57B2D Live peers B581F1 Route to:  B57B2D 1. Match prefix 2. Closest match for same prefix “ A Survey and Comparison or Peer-to-Peer Overlay Network Schemes” by E. K. Lua at al., IEEE Communications Survey, March 2004. B 24EA3 B5 324F B57 3AB 37A0F1 Where is  B57B2D ? B57B2D B57 3D6
Lookup performance for Pastry “ Pastry: Scalable, decentralized object location and routing” by A. Rowstron and P. Druschel. ACM, Heidelberg, Nov. 2001 b=4, L=16, M=32 for 200,000 lookups (close to log 2 b (N) steps) L=16, 100k random queries, 100k nodes
Lookup (routing) in Pastry and Bamboo “ Handling Churn in a DHT”: http://srhea.net/papers/bamboo-usenix-talk.ppt ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],0… 10… 110… 111… Leaf set and   proximity neighbor selection (PNS) Find this node
Routing table of Pastry peer with nodeID 37A0x … 37AFx 37AEx 37ADx 37ACx 37ABx … 37A2x 37A1x 37A0x … 37Fx 37Ex … 37Bx 37Ax … 372x 371x 370x … 3Fx 3Ex … 38x 37x … 32x 31x 30x … Fx Ex Dx … 4x 3x 2x 1x 0x IP addresses are not shown “ A Survey and Comparison or Peer-to-Peer Overlay Network Schemes” by E. K. Lua at al., IEEE Communications Survey, March 2004.
Routing state of a Pastry peer b=4, L=16, M=32 (IP addresses are not shown) “ A Survey and Comparison or Peer-to-Peer Overlay Network Schemes” by E. K. Lua at al., IEEE Communications Survey, March 2004.  199ABC 28989C 267221 221145 19902D 16228A 122167 11345B 5213EA 510A0C 290A0B 279DE0 490CDE 4881AB 477810 46710A 3912CD 390AF0 37890 3612AB 2670AB 245AD0 1B3467 1A223B Neighborhood set M 37A0FE 37A0FC 37A0FB 37A0FA 37A0F8 37A0F6 37A0F4 37A0F2 Leaf set (larger) 37A077 37A066 37A055 37A044 37A033 37A022 37A011 37A001 Leaf set (smaller) nodeID 37A0F1
Pastry: Node addition  d46a1c Route(d46a1c)? d46 2ba d4 213f d 13da3 65a1fc d46 7c4 d4 71f1 New node : d46a1c
Part 3: High Performance P2P
Bamboo  A variation of Pastry ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ref: Kundan Singh, Adobe Systems, 2007
Interfaces to Bamboo in the openDHT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ref: OpenDHT: “A Public DHT Service and Its Uses” by S. Rhea et al. http://www.intel-research.net/Publications/Pittsburgh/092620050725_326.pdf
Interfaces to Bamboo in the openDHT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],*http://www.intel-research.net/Publications/Pittsburgh/092620050725_326.pdf **http://www.arl.wustl.edu/~jst/cse/570/files/10-2-2006a-Andrew_Wan.pdf ***http://www.opendht.org/users-guide.html
Routing Styles in DHT Routing control at source Is slower Can check routing integrity: better security Higher message traffic at Source Hop by hop routing* Is faster Cannot check routing integrity higher vulnerability Lower message traffic at Source *Routing control is possible through the data interface in ReDiR Source A Root B Iterative routing A B Source Root Recursive routing
The use of routing styles in Bamboo (delay aware routing) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ref: “Fixing the Embarrassing Slowness of OpenDHT on PlanetLab” by S. Rhea et. al. Proceedings of Worlds ’05. http://srhea.net/papers/opendht-worlds05.pdf
Reducing the DHT latency due to slow nodes “ Fixing the Embarrassing Slowness of openDHT on PlanetLab” by S. Rhea et all. WORLDS ’05 Conference, http://srhea.net/papers/opendht-worlds05.pdf ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Experimental results on Planet Lab 332 196 62 86 Greedy p=2 Iterative 1-3 8,113 490 186 434 Original algorithm 99th 90th 50th Average Mode parallel I/R Gwys Latency (ms) Routing parameters
Non-transitive connectivity in DHTs ,[object Object],[object Object],[object Object],[object Object],[object Object],A can communicate with B B can communicate with C C cannot communicate with A Example for a 300 node Chord overlay: Each pair of adjacent nodeIDs have 0.1% chance of no communications 1-0.999 300  ~ 26% chance that some pair will not communicate 0.999 2  of both nodes have a chance to communicate w. immediate predecessor Ref: “Non-Transitive Connectivity and DHTs”, http://srhea.net/papers/ntr-worlds05.pdf A B C
Handling Churn and Failures in Bamboo ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Handling Churn in a DHT”: http://srhea.net/papers/bamboo-usenix-talk.ppt
Performance with smart timeouts Estimating when it is time to route around a failed node “ Handling Churn in a DHT”: http://srhea.net/papers/bamboo-usenix-talk.ppt The best results were obtained with TCP-style timers, by keeping a history of past timeouts and use this to compute timeouts for new requests.  This approach works best for recursive lookups where peers are talking only to their neighbors and as a consequence there is only a small and current history to deal with.
Smart recovery of neighbor list  Reactive recovery is expensive under churn Excessive bandwidth consumption leads to overload and long latencies “ Handling Churn in a DHT”: http://srhea.net/papers/bamboo-usenix-talk.ppt Bandwidth consumption Latency Two 20 minute churn periods of 47 and 23 minute median session times separated by 5 minutes without churn
Security for structured P2P overlays Ref: “Secure routing for structured peer-to-peer overlay networks” by M. Castro et al. http://www.cs.rice.edu/~dwallach/pub/osdi2002.pdf ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Routing security Model and simulation results for the probability of reaching all correct replica roots using redundant routing. The probability of success is greater than 0.999 for the fraction of faulty nodes <0.3 Ref: “Secure routing for structured peer-to-peer overlay networks” by M. Castro et al. http://www.cs.rice.edu/~dwallach/pub/osdi2002.pdf
Design for P2P Interface Security in the OpenDHT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ref: OpenDHT: “A Public DHT Service and Its Uses” by S. Rhea et al. http://www.intel-research.net/Publications/Pittsburgh/092620050725_326.pdf
Skype security: Enrollment system ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf
Skype session security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf
A: Contributions to P2PSIP at the 70 IETF  (in no particular order for non-HIP based) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Search at http://www.rfc-editor.org/idsearch.html Avaya Cisco Ericsson Network Resonance Nokia Huawei SIPeerio Telecom Italia Universities (3)
A: Contributions to P2PSIP at the 70 & 71 IETF  (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Search at http://www.rfc-editor.org/idsearch.html
Questions and discussion

Más contenido relacionado

La actualidad más candente

Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IPALTANAI BISHT
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentationJoe Trial
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP ThousandEyes
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocolSanthosh Somu
 
Sip call flows all cases ccmigration
Sip call flows all cases ccmigrationSip call flows all cases ccmigration
Sip call flows all cases ccmigrationcoolrahul28
 
Voice over IP (VoIP)
Voice over IP (VoIP)Voice over IP (VoIP)
Voice over IP (VoIP)Peter R. Egli
 
Vo Ip Rajibdeka
Vo Ip RajibdekaVo Ip Rajibdeka
Vo Ip Rajibdekarajibdk
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingThousandEyes
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation ProtocolMatt Bynum
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIPMahmoud Abudaqa
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIPFraj Alshahibi
 

La actualidad más candente (20)

Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IP
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentation
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocol
 
Sip call flows all cases ccmigration
Sip call flows all cases ccmigrationSip call flows all cases ccmigration
Sip call flows all cases ccmigration
 
Voice over IP (VoIP)
Voice over IP (VoIP)Voice over IP (VoIP)
Voice over IP (VoIP)
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
R43019698
R43019698R43019698
R43019698
 
VOIP
VOIPVOIP
VOIP
 
Sip
SipSip
Sip
 
Vo Ip Rajibdeka
Vo Ip RajibdekaVo Ip Rajibdeka
Vo Ip Rajibdeka
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Sip crash course
Sip crash courseSip crash course
Sip crash course
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and Troubleshooting
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIP
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
 
Voip
VoipVoip
Voip
 
Ch 2
Ch 2Ch 2
Ch 2
 

Similar a Sinnreich Henry Johnston Alan Pt 2

Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGRagheb Gmira
 
Building Voice
Building Voice Building Voice
Building Voice Videoguy
 
Indigo Product And Technology Overivew 2005
Indigo Product And Technology Overivew 2005 Indigo Product And Technology Overivew 2005
Indigo Product And Technology Overivew 2005 ir. Carmelo Zaccone
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.igede tirtanata
 
Packet-to-Packet Applications
Packet-to-Packet ApplicationsPacket-to-Packet Applications
Packet-to-Packet ApplicationsVideoguy
 
Global Multimedia Collaboration System
Global Multimedia Collaboration SystemGlobal Multimedia Collaboration System
Global Multimedia Collaboration SystemVideoguy
 
Global Multimedia Collaboration System
Global Multimedia Collaboration SystemGlobal Multimedia Collaboration System
Global Multimedia Collaboration SystemVideoguy
 
Global Multimedia Collaboration System
Global Multimedia Collaboration SystemGlobal Multimedia Collaboration System
Global Multimedia Collaboration SystemVideoguy
 
Docfoc.com ngn - signaling &amp;amp; protocol analysis
Docfoc.com ngn - signaling &amp;amp; protocol analysisDocfoc.com ngn - signaling &amp;amp; protocol analysis
Docfoc.com ngn - signaling &amp;amp; protocol analysisRashid Khan
 
Overview of Internet.ppt
Overview of Internet.pptOverview of Internet.ppt
Overview of Internet.pptVideoguy
 
Uit Presentation of IN/NGIN for Cosmote 2010
Uit Presentation of IN/NGIN for  Cosmote  2010Uit Presentation of IN/NGIN for  Cosmote  2010
Uit Presentation of IN/NGIN for Cosmote 2010michael_mountrakis
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowCisco DevNet
 

Similar a Sinnreich Henry Johnston Alan Pt 2 (20)

Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMING
 
Building Voice
Building Voice Building Voice
Building Voice
 
Indigo Product And Technology Overivew 2005
Indigo Product And Technology Overivew 2005 Indigo Product And Technology Overivew 2005
Indigo Product And Technology Overivew 2005
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Fundamentals and Basics
Fundamentals and BasicsFundamentals and Basics
Fundamentals and Basics
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Vo ip sip
Vo ip sipVo ip sip
Vo ip sip
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.
 
Packet-to-Packet Applications
Packet-to-Packet ApplicationsPacket-to-Packet Applications
Packet-to-Packet Applications
 
Surf Communication Solutions - Packet To Packet Apps
Surf Communication Solutions - Packet To Packet AppsSurf Communication Solutions - Packet To Packet Apps
Surf Communication Solutions - Packet To Packet Apps
 
Gda ipsoc blr_hic_final
Gda ipsoc blr_hic_finalGda ipsoc blr_hic_final
Gda ipsoc blr_hic_final
 
Global Multimedia Collaboration System
Global Multimedia Collaboration SystemGlobal Multimedia Collaboration System
Global Multimedia Collaboration System
 
Global Multimedia Collaboration System
Global Multimedia Collaboration SystemGlobal Multimedia Collaboration System
Global Multimedia Collaboration System
 
Global Multimedia Collaboration System
Global Multimedia Collaboration SystemGlobal Multimedia Collaboration System
Global Multimedia Collaboration System
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Docfoc.com ngn - signaling &amp;amp; protocol analysis
Docfoc.com ngn - signaling &amp;amp; protocol analysisDocfoc.com ngn - signaling &amp;amp; protocol analysis
Docfoc.com ngn - signaling &amp;amp; protocol analysis
 
Overview of Internet.ppt
Overview of Internet.pptOverview of Internet.ppt
Overview of Internet.ppt
 
Uit Presentation of IN/NGIN for Cosmote 2010
Uit Presentation of IN/NGIN for  Cosmote  2010Uit Presentation of IN/NGIN for  Cosmote  2010
Uit Presentation of IN/NGIN for Cosmote 2010
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 

Más de Carl Ford

Does the Wireless Internet Need to be Interoperable
Does the Wireless Internet Need to be InteroperableDoes the Wireless Internet Need to be Interoperable
Does the Wireless Internet Need to be InteroperableCarl Ford
 
HTML5 Happening in Miami Beach
HTML5 Happening in Miami BeachHTML5 Happening in Miami Beach
HTML5 Happening in Miami BeachCarl Ford
 
Superwifiwhitespacemiami
SuperwifiwhitespacemiamiSuperwifiwhitespacemiami
SuperwifiwhitespacemiamiCarl Ford
 
M2M Evolution
M2M EvolutionM2M Evolution
M2M EvolutionCarl Ford
 
Miami2012 cag
Miami2012 cagMiami2012 cag
Miami2012 cagCarl Ford
 
M2memiami2012
M2memiami2012M2memiami2012
M2memiami2012Carl Ford
 
Html5 miami2012
Html5 miami2012Html5 miami2012
Html5 miami2012Carl Ford
 
Swifimiami2012
Swifimiami2012Swifimiami2012
Swifimiami2012Carl Ford
 
Swifimiami2012
Swifimiami2012Swifimiami2012
Swifimiami2012Carl Ford
 
4 gwemiami2012
4 gwemiami20124 gwemiami2012
4 gwemiami2012Carl Ford
 
4 gwemiami2012
4 gwemiami20124 gwemiami2012
4 gwemiami2012Carl Ford
 
Dev con5layout2
Dev con5layout2Dev con5layout2
Dev con5layout2Carl Ford
 
Bill volk gamification
Bill volk  gamificationBill volk  gamification
Bill volk gamificationCarl Ford
 
Css3 paul trani
Css3 paul traniCss3 paul trani
Css3 paul traniCarl Ford
 
Bridge wave 4gwe-miami_02feb(3)
Bridge wave   4gwe-miami_02feb(3)Bridge wave   4gwe-miami_02feb(3)
Bridge wave 4gwe-miami_02feb(3)Carl Ford
 
Mindspeed jim.johnston 4_gwe-spring 1.0
Mindspeed jim.johnston 4_gwe-spring 1.0Mindspeed jim.johnston 4_gwe-spring 1.0
Mindspeed jim.johnston 4_gwe-spring 1.0Carl Ford
 
Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)Carl Ford
 
Adrian scrase 4_gwe_final
Adrian scrase 4_gwe_finalAdrian scrase 4_gwe_final
Adrian scrase 4_gwe_finalCarl Ford
 
Shakouri 4 gwe keynote jan 2011
Shakouri 4 gwe keynote jan 2011Shakouri 4 gwe keynote jan 2011
Shakouri 4 gwe keynote jan 2011Carl Ford
 

Más de Carl Ford (20)

Does the Wireless Internet Need to be Interoperable
Does the Wireless Internet Need to be InteroperableDoes the Wireless Internet Need to be Interoperable
Does the Wireless Internet Need to be Interoperable
 
4 gwes2012
4 gwes20124 gwes2012
4 gwes2012
 
HTML5 Happening in Miami Beach
HTML5 Happening in Miami BeachHTML5 Happening in Miami Beach
HTML5 Happening in Miami Beach
 
Superwifiwhitespacemiami
SuperwifiwhitespacemiamiSuperwifiwhitespacemiami
Superwifiwhitespacemiami
 
M2M Evolution
M2M EvolutionM2M Evolution
M2M Evolution
 
Miami2012 cag
Miami2012 cagMiami2012 cag
Miami2012 cag
 
M2memiami2012
M2memiami2012M2memiami2012
M2memiami2012
 
Html5 miami2012
Html5 miami2012Html5 miami2012
Html5 miami2012
 
Swifimiami2012
Swifimiami2012Swifimiami2012
Swifimiami2012
 
Swifimiami2012
Swifimiami2012Swifimiami2012
Swifimiami2012
 
4 gwemiami2012
4 gwemiami20124 gwemiami2012
4 gwemiami2012
 
4 gwemiami2012
4 gwemiami20124 gwemiami2012
4 gwemiami2012
 
Dev con5layout2
Dev con5layout2Dev con5layout2
Dev con5layout2
 
Bill volk gamification
Bill volk  gamificationBill volk  gamification
Bill volk gamification
 
Css3 paul trani
Css3 paul traniCss3 paul trani
Css3 paul trani
 
Bridge wave 4gwe-miami_02feb(3)
Bridge wave   4gwe-miami_02feb(3)Bridge wave   4gwe-miami_02feb(3)
Bridge wave 4gwe-miami_02feb(3)
 
Mindspeed jim.johnston 4_gwe-spring 1.0
Mindspeed jim.johnston 4_gwe-spring 1.0Mindspeed jim.johnston 4_gwe-spring 1.0
Mindspeed jim.johnston 4_gwe-spring 1.0
 
Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)
 
Adrian scrase 4_gwe_final
Adrian scrase 4_gwe_finalAdrian scrase 4_gwe_final
Adrian scrase 4_gwe_final
 
Shakouri 4 gwe keynote jan 2011
Shakouri 4 gwe keynote jan 2011Shakouri 4 gwe keynote jan 2011
Shakouri 4 gwe keynote jan 2011
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Sinnreich Henry Johnston Alan Pt 2

  • 1. P2P SIP Tutorial Part 2: P2P overlay networks Henry Sinnreich Alan Johnston March 17, 2008
  • 2.
  • 3. Part 1: Overview of SIP and P2P Little time to discuss high complexity
  • 4.
  • 5.
  • 6.
  • 7. Overall carrier wire & wireless IMS architecture - Other IP Networks IP Transport (Access and Core) T - MGF I - BGF UPSF P - CSCF I/S - CSCF BGCF SLF Charging Functions IWF PSTN Emulation (R2) Mw Mw/Mk/Mm Mr Mg Mj Mi Mp Mn Gm Gq ' ISC Cx Dx Dh Sh Ic Rf /Ro Rf /Ro Ib Iw Gq ' PSTN/ISDN MRFC MGCF MRFP e4 Ie Mw IBCF Mk Mk Application Servers Rf /Ro AGCF e2 P1 P2 P3 UE CNG MG IMS / PSTN Simulation Gq ' SPDF A-RACF Resource & Admission Control Resource & Admission Control SPDF Network Attachment Subsystem Re Ia RCEF BGF Ut Ut SGF
  • 8. The complexity of SIP The impact of cable & wireless industries, telephony DB, SBC
  • 9. Solution: Application level overlay network Application Transport Network Data link Physical Application Transport Network Data link Physical Application Transport Network Data link Physical Application layer IP Routing Nothing in the middle Back to the Internet as it was designed: e2e
  • 10. Major P2P Projects Planet Lab infrastructure http://www.planet-lab.org/ 645 nodes over 310 sites. Academic, industrial, and government institutions Open DHT OpenDHT is a publicly accessible distributed hash table (DHT) service . Clients of OpenDHT do not need to run a DHT node in order to use the service. http://www.opendht.org/index.html P2P SIP New IETF WG formed: P2PSIP Several P2P SIP projects and Internet Drafts (P2P IP PBX: Avaya and Peerio, prestandard) http://p2psip.org
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. P2P SIP Protocol Layers Overlay Network Internet SIP applications L4 Transport (UDP, TCP) L3 IP Network Legend DHT: Distributed Hash Table IM: Instant Messaging DHT Layer TCP/IP VoIP, Video Presence IM File Transfer Applications L5
  • 17.
  • 18. CS (a) and P2P (b) SIP Location Discovery Legend SRV: DNS Server Resource Locator (RFC 2782) NAPTR: Network Authority Pointer (RFC 3403) ENUM: E164 Telephone Number Mapping Service (RFC 3764) SIP UA Outbound Proxy SIP UA Inbound Proxy DNS DNS SRV & A queries ENUM: NAPTR, SRV & A queries DB query INVITE INVITE INVITE Caller Called a. Location DB b. Location INVITE 1 2 3 4 5 6 Caller Called API SIP SIP SIP SIP DHT DHT DHT DHT
  • 19. P2P SIP System Legend CN: Client node PN: Peer (various functions) Proxy: SIP proxy server, is another PN Concepts and Terminology for Peer to Peer SIP, < draft-ietf-p2psip-concepts > P2P SIP Peer protocol Client protocol PN PN PN CN CN CN CN CN CN CN CN CN Proxy DNS CS SIP Enrollment Server Bootstrap Server(s) other PSTN PN
  • 20.
  • 21.
  • 22.
  • 23. Part 2: P2P Overlay Networks and Distributed Hash Tables (DHT)
  • 24. Secure Hash Algorithm SHA-1 “it is computationally infeasible 1) to find a message that corresponds to a given message digest, or 2) to find two different messages that produce the same message digest. Any change to a message will, with a very high probability, result in a different message digest.” When a message of any length < 2^64 bits is input, the output is a message digest of 160 bits. Ref: RFC 3174 and http://en.wikipedia.org/wiki/SHA-1 A word equals a 32-bit string which may be represented as a sequence of 8 hex digits. To convert a word to 8 hex digits each 4-bit string is converted to its hex equivalent. Example: 1010 0001 0000 0011 1111 1110 0010 0011 = A103FE23 The SHA1 hash function exhibits good avalanche effect. When a single bit is changed the hash sum becomes totally different
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Example Deployment Scenarios for P2P SIP There is a large deployment area service providers and IT for stable peers to support big data sets Low Short High Mobile phone, PDA None Client Battery WiFi Phone & GWY Desktop PBX phone BEHAVE compliant Enterprise IAD Residential GWY Phone adapter High Long Low Stable PC Low Short Medium Any Peer Moving Laptop IP Quality Session time Churn Rate NAT Scenario DHT Protocol Critical Operation Deployment Scenario hard easy
  • 34. Performance measurements on the openDHT http://www.arl.wustl.edu/~jst/cse/570/files/10-2-2006a-Andrew_Wan.pdf a. Long running performance and availability of the openDHT for about one year on about 210 nodes b. Latency of ReDirR lookups and openDHT gets
  • 35. Pastry routing from peer 37A0F1 with key B57B2D Live peers B581F1 Route to: B57B2D 1. Match prefix 2. Closest match for same prefix “ A Survey and Comparison or Peer-to-Peer Overlay Network Schemes” by E. K. Lua at al., IEEE Communications Survey, March 2004. B 24EA3 B5 324F B57 3AB 37A0F1 Where is B57B2D ? B57B2D B57 3D6
  • 36. Lookup performance for Pastry “ Pastry: Scalable, decentralized object location and routing” by A. Rowstron and P. Druschel. ACM, Heidelberg, Nov. 2001 b=4, L=16, M=32 for 200,000 lookups (close to log 2 b (N) steps) L=16, 100k random queries, 100k nodes
  • 37.
  • 38. Routing table of Pastry peer with nodeID 37A0x … 37AFx 37AEx 37ADx 37ACx 37ABx … 37A2x 37A1x 37A0x … 37Fx 37Ex … 37Bx 37Ax … 372x 371x 370x … 3Fx 3Ex … 38x 37x … 32x 31x 30x … Fx Ex Dx … 4x 3x 2x 1x 0x IP addresses are not shown “ A Survey and Comparison or Peer-to-Peer Overlay Network Schemes” by E. K. Lua at al., IEEE Communications Survey, March 2004.
  • 39. Routing state of a Pastry peer b=4, L=16, M=32 (IP addresses are not shown) “ A Survey and Comparison or Peer-to-Peer Overlay Network Schemes” by E. K. Lua at al., IEEE Communications Survey, March 2004. 199ABC 28989C 267221 221145 19902D 16228A 122167 11345B 5213EA 510A0C 290A0B 279DE0 490CDE 4881AB 477810 46710A 3912CD 390AF0 37890 3612AB 2670AB 245AD0 1B3467 1A223B Neighborhood set M 37A0FE 37A0FC 37A0FB 37A0FA 37A0F8 37A0F6 37A0F4 37A0F2 Leaf set (larger) 37A077 37A066 37A055 37A044 37A033 37A022 37A011 37A001 Leaf set (smaller) nodeID 37A0F1
  • 40. Pastry: Node addition d46a1c Route(d46a1c)? d46 2ba d4 213f d 13da3 65a1fc d46 7c4 d4 71f1 New node : d46a1c
  • 41. Part 3: High Performance P2P
  • 42.
  • 43.
  • 44.
  • 45. Routing Styles in DHT Routing control at source Is slower Can check routing integrity: better security Higher message traffic at Source Hop by hop routing* Is faster Cannot check routing integrity higher vulnerability Lower message traffic at Source *Routing control is possible through the data interface in ReDiR Source A Root B Iterative routing A B Source Root Recursive routing
  • 46.
  • 47.
  • 48.
  • 49.
  • 50. Performance with smart timeouts Estimating when it is time to route around a failed node “ Handling Churn in a DHT”: http://srhea.net/papers/bamboo-usenix-talk.ppt The best results were obtained with TCP-style timers, by keeping a history of past timeouts and use this to compute timeouts for new requests. This approach works best for recursive lookups where peers are talking only to their neighbors and as a consequence there is only a small and current history to deal with.
  • 51. Smart recovery of neighbor list Reactive recovery is expensive under churn Excessive bandwidth consumption leads to overload and long latencies “ Handling Churn in a DHT”: http://srhea.net/papers/bamboo-usenix-talk.ppt Bandwidth consumption Latency Two 20 minute churn periods of 47 and 23 minute median session times separated by 5 minutes without churn
  • 52.
  • 53. Routing security Model and simulation results for the probability of reaching all correct replica roots using redundant routing. The probability of success is greater than 0.999 for the fraction of faulty nodes <0.3 Ref: “Secure routing for structured peer-to-peer overlay networks” by M. Castro et al. http://www.cs.rice.edu/~dwallach/pub/osdi2002.pdf
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.