ID-LOC Proposal Philip Matthews Eric Cooper Alan Johnston Avaya With contributions from Cullen Jennings, David Bryan, and Bruce Lowekamp.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

Address Settlement by Peer to Peer (ASP) Jonathan Rosenberg Cullen Jennings Eric Rescorla.
SIP Traversal over NAT Problems and Solutions Mr. Ting-Yun Chi May 2,2006 (Taiwan,NICI IPv6 R&D Division)
NAT Traversal for P2PSIP Philip Matthews Avaya. Peer X Peer Y Peer W 2. P2PSIP Network Establishing new Peer Protocol connection Peer Protocol messages.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID STUN, TURN and ICE Cary Fitzgerald.
PPSP NAT traversal Lichun Li, Jun Wang, Yu Meng {li.lichun1, draft-li-ppsp-nat-traversal-00.
Addressing the P2P Bootstrap Problem for Small Overlay Networks David Wolinsky, Pierre St. Juste, P. Oscar Boykin, and Renato Figueiredo ACIS P2P Group.
Natting NATTING. Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage.
1 Application Layer. 2 Writing Networked Applications TCP UDP IP LL PL TCP UDP IP LL PL TCP UDP IP LL PL Web Browser Web Server Ftp Server Ftp Client.
Davide Rossi 2002 Using Sockets in Java. 2Davide Rossi 2002 TCP/IP  A protocol is a set of rules that determine how things communicate with each other.
SIP, NAT, Firewall SIP NAT Firewall How to Traversal NAT/Firewall for SIP.
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
Host Identity Protocol
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Process-to-Process Delivery:
TURN draft-ietf-behave-turn-07 Philip Matthews, Avaya Jonathan Rosenberg, Cisco Rohan Mahy, Plantronics.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 0 TCP/IP Overview.
HIP API issues in base spec Tom Henderson IETF-59, March 3, 2004.
SOCKS Group: Challenger Member: Lichun Zhan. Agenda Introduction SOCKS v4 SOCKS v5 Summary Conclusion References Questions.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 Tracker Protocol Proposal.
P2PSIP Charter Proposal Many people helped write this charter…
Secure Socket Layer (SSL)
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Chabot College ELEC Ports (Layer 4).
Dean Cheng Jouni Korhonen Mehamed Boucadair
Network Layer4-1 DHCP: Dynamic Host Configuration Protocol Goal: allow host to dynamically obtain its IP address from network server when it joins network.
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
CIS 3360: Internet: Network Layer Introduction Cliff Zou Spring 2012.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
The HIP-HOP proposal draft-matthews-p2psip-hip-hop-00 Philip Matthews
PPSP NAT traversal Lichun Li, Jun Wang, Wei Chen {li.lichun1, draft-li-ppsp-nat-traversal-02.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Problems in using HIP for P2PSIP Philip Matthews Avaya
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Presented by Rebecca Meinhold But How Does the Internet Work?
RTCWEB Considerations for NATs, Firewalls and HTTP proxies draft-hutton-rtcweb-nat-firewall- considerations A. Hutton, T. Stach, J. Uberti.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
The NAT Traversal Problem in P2PSIP Bruce Lowekamp (SIPeerior) Philip Matthews (Avaya)
WebRTC Don McGregor Research Associate MOVES Institute
OCALA Overlay Convergence Architecture for supporting Legacy Applications on Overlays Dilip Antony Joseph 1, Jayanth Kannan 1, Ayumu Kubota 2, Karthik.
Michael G. Williams, Jeremey Barrett 1 Intro to Mobi-D Host based mobility.
Draft-ietf-behave-nat-udp-00 NAT Behavioral Requirements for Unicast UDP draft-ietf-behave-nat-upd-00 François Audet - Cullen Jennings.
1 P2PSIP Peer Protocol Design Questions Presenter: Philip Matthews (based on input from the authors of the various proposals)
Draft-ietf-p2psip-base-08 Cullen Jennings Bruce Lowekamp Eric Rescorla Salman Baset Henning Schulzrinne March 25, 2010.
Java’s networking capabilities are declared by the classes and interfaces of package java.net, through which Java offers stream-based communications that.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
SEC406 IPsec And NATs: Finally In harmony? Steve Riley Product Manager Security Business Unit Microsoft Corporation.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
H.323 NAT Traversal Problem particular to H.323(RAS->Q.931->H.245):  RAS from private network to public network can pass NAT  Q931 、 H.245 adopts the.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
HIP-Based NAT Traversal in P2P-Environments
CSC458 Programming Assignment II: NAT
The Transport Layer Implementation Services Functions Protocols
Preferred Alternatives for Tunnelling HIP (PATH)
WebRTC enabled multimedia conferencing and collaboration solution
Domain Name System DNS - A system for converting host names and domain names into IP addresses on the Internet or on local networks that use the TCP/IP.
改良UDP洞穿技術設計物聯網通訊: 以遠端門鈴監控系統為例 Improving UDP Hole Punching Technique For IoT Communications: A Remote Door-bell Monitoring System 報告時間28~32分佳 楊凱勝 指導教授:柯開維.
Preferred Alternatives for Tunnelling HIP (PATH)
The Internet and HTTP and DNS Examples
Process-to-Process Delivery:
CSCI {4,6}900: Ubiquitous Computing
When you connect with DHCP, you are assigned a
Cengage Learning: Computer Networking from LANs to WANs
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
Process-to-Process Delivery: UDP, TCP
Exceptions and networking
Presentation transcript:

ID-LOC Proposal Philip Matthews Eric Cooper Alan Johnston Avaya With contributions from Cullen Jennings, David Bryan, and Bruce Lowekamp

Not a Peer Protocol proposal ! ID-LOC = proposed addition to the Peer Protocol (i.e., Reload or whatever). ID-LOC = –Some selected ideas from HIP –Plus a few new ideas

Relationship to HIP Take from HIP: –Identifiers that look like IP addresses –NAT traversal done once for all apps –TCP over UDP (for NAT traversal) Not taken (for now): –HIP signaling (use Peer Protocol instead) –Encrypting all data packets using ESP New: –Domain names for peers

What ID-LOC allows earth.example.com NATNAT saturn.example.com NATNAT Overlay Example.com Browser Web server

Tech Details in 3 slides (1) 1.Assign domain names to overlays and peers: –saturn.example.com 2.DHT holds mapping between peer’s domain name and peer’s peer ID saturn.example.com => 0xA3F26E…

Tech Details in 3 slides (2) 3.Applications don’t use Peer IDs directly. Instead, use special IP addresses (LSIs). –An LSI is a ‘shorthand’ for a Peer ID –Unlike peer IDs, an LSI can be used anywhere a real IP address can be used –Taken from special address range ORCHID range (RFC 4843) for IPv6 Perhaps 1.x.x.x for IPv4

Tech Details in 3 slides (3) 4.NAT Traversal (ICE, etc) done for all applications by Peer Protocol (w/ ID-LOC extensions) –Apps don’t need to worry about this 5.Application data + transport protocol encapsulated inside UDP for NAT traversal reasons HTTP TCP UDP IP

Implementation One option is to implement using standard VPN client implementation techniques.

Advantages Turns a p2p overlay into a VPN Like VPNs, applications don’t need to change to work in an overlay Preserves the existing user interface (= domain names) and existing application interface (= sockets and use of IP addresses) NAT traversal handled in one place –Apps don’t need NAT traversal code –No need for endless “ICE for protocol X” drafts