SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.

Slides:



Advertisements
Similar presentations
SIP, Presence and Instant Messaging
Advertisements

Presence, Security and Privacy. VON The Current Environment Many Faces of Security Authentication Verify someone is who they.
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Fall IM 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
SURA/ViDe 4th Annual Workshop SIP, Security & Threat Models Dr. Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
Applicability of Instant Messaging in the Military Command and Control Systems Author: Juha Vermaja Superviser: Jorma Jormakka Instructor: Marko Luoma,
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Voice over IP Skype.
Comparison between Skype and SIP- based Peer-to-Peer Voice-Over-IP Overlay Network Johnson Lee EECE 565 Data Communications.
SIP Security & the Future of VoIP Nate Klingenstein APAN 26 Queenstown August 5, ~ndk/apanSIP.pdf.
Addressing the P2P Bootstrap Problem for Small Overlay Networks David Wolinsky, Pierre St. Juste, P. Oscar Boykin, and Renato Figueiredo ACIS P2P Group.
SIP Simplified August 2010 By Dale Anderson. SIP Simplified Session Initiation Protocol Core of SIP specifications is documented in IETF RFC 3261 Many.
Peer-to-Peer SIP David Bryan July 27, Affiliation(s) p2psip.org.
PEER-TO-PEER Is a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures,
Draft-bryan-sipping-p2p David Bryan IETF 63, Paris August 3, 2005.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Session Initiation Protocol (SIP) By: Zhixin Chen.
A Generic Event Notification System Using XML and SIP Knarig Arabshian and Henning Schulzrinne Department of Computer Science Columbia University
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Copyright © 2001 Telcordia Technologies, Inc. All rights reserved. SEC: Spontaneous Enterprise Communications Hyong Sop Shim, Chit Chung, Michael Long,
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
A Gateway For SIP Event Interworking - Sasu Tarkoma & Thalainayar Balasubramanian Ramya.
Peer-to-peer approaches for SIP Henning Schulzrinne Dept. of Computer Science Columbia University.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Architecture Proxy, Redirect, Registration server. Authentication Programmable (SIP- CGI) OpenSource SQL database: MySQL User information:
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
P2PSIP Charter Proposal Many people helped write this charter…
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Integrating 3G and WLAN Services in NTP SIP-based VoIP Platform Dr. Quincy Wu National Telecommunications Program Office
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
Support Services & IP Multimedia Subsystem (IMS)
| E. Marocco, G. Canal VoIP Conference 2006, 26 th October P2PSIP for Communications in New Network Topologies Enrico Marocco Research Engineer
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Larry Amiot Northwestern University Internet2 Commons Site Coordinator Training September 27, 2004 Austin, Texas Introduction to.
Interworking between P2PSIP Overlays and IMS Networks: Why? How?
Presented By Team Netgeeks SIP Session Initiation Protocol.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
SIP, SDP and VoIP David A. Bryan CSCI 434/534 December 6, 2003.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
An analysis of Skype protocol Presented by: Abdul Haleem.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
VOIP over Peer-to-Peer
Presence Networking: XMPP and Jabber Joe Hildebrand Chief Architect Jabber, Inc. Networld+Interop 1 May 2003.
SIPeerior Technologies A superior way to connect Emerging IETF Standards Work on P2PSIP David A. Bryan.
Jabber Technical Overview Presenter: Ming-Wei Lin.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
Deploying IPv6, Now Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 1 – Introduction to VoIP.
IPv6 - The Way Ahead Christian Huitema Architect Windows Networking & Communications
November 2005IETF 641 Interconnect SIP networks using P2P SIP Marc Bailly
External Messaging Services. Page 2 External Messaging: Extends the power of Presence and Instant Messaging outside corporate Network Provided only to.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
SIP6 Platform Updates Based on CNGI-CERNET2 Network Research Center Tsinghua University.
P2P Cullen Jennings Out of scope Mechanisms File Sharing Fluffy’s Hair XCAP.
Skype.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
Draft-bryan-sipping-p2p-usecases-00 David A. Bryan Eunsoo Shim Bruce B. Lowekamp.
IP Telephony (VoIP).
Building Distributed Educational Applications using P2P
Deploying IP Telephony
P2P-SIP Using an External P2P network (DHT)
draft-bryan-sipping-p2p
Presentation transcript:

SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings Cisco

2 VoIP/IM VoIP – Voice over IP (Internet Protocol) IM – Instant Messaging (such as AOL) Common components: Resource location Session establishment and management Presence SIP: IETF standard supporting VoIP SIMPLE: IM extensions to SIP

3 Organization B Internet Organization A Problems with Traditional Architecture

4 SOSIMPLE Self-Organizing SIMPLE Based on existing SIP/SIMPLE architecture Incorporates P2P technology for Scalability Secure messages Ad-hoc or limited connectivity Draft submitted to IETF

5 Talk Outline Introduction SIP/SIMPLE Motivating Scenarios Requirements SOSIMPLE Architecture Security and Performance

6 SIP/SIMPLE SIP IETF (Internet Engineering Task Force) defined a protocol for VoIP, called SIP Designed for packet networks, useful for any sort of multimedia session establishment Support for integration with /web services SIMPLE is a set of extensions to SIP to support instant messaging

7 Why SIP? Widely used today for VoIP and IM Vonage, Microsoft MSN Large investment $$$ (phones, gateways) Effort (applications, stacks) Reuse/cheap COTS devices SIP is extensible – we can extend for P2P Used SIP’s REGISTRATION support

8 Scenario: Small Organization Traditional VoIP and IM systems use centralized servers. Not appropriate for private messages. Internal chat systems used. Not compatible with external users.

9 Scenario: No Internet Connectivity Disaster management Remote locations ISP failure

10 Scenario: Ad-hoc Groups Meetings, classrooms, and conferences Desire to establish quick connectivity between those present. No need to configure a server.

11 Scenarios: Access & Scalability Censorship always a problem Government censorship Corporate/ISP censorship Scalability Reliability Easy to join Cheap!

12 Scalability Requirements No central server No central naming authority Simple system discovery Scalable number of users

13 Usability Requirements Privacy Multiple realms Interconnection User mobility Compatibility and reuse

14 Why P2P SIP? SIP/SIMPLE are existing standards widely used commercially supports both voice and IM P2P meets many of our requirements SIP is easily extensible to implement P2P Different than file-sharing: false negatives unacceptable anonymity undesirable

15 SOSIMPLE Messages Basic approach is a DHT current implementation based on Chord All messages are SIP messages SIP headers extensible Modify REGISTER for node and user registration Traditional use of REGISTER sending user location information to registrar Now send user location to peer Also used for node registration

16 Why Use SIP Messages? No standard P2P protocol implementation Existing filesharing applications generally not appropriately extensible Filesharing most commonly blocked apps Many firewalls already recognize SIP OpenDHT emerging standard Centralized super-peers Still need independent P2P for private nets, hierarchies, and infrastructureless modes

17 Node Joining Iterative search increases reliability Bootstrap Node Node-ID 023 Node B Node-ID 245 Joining Node Node-ID REGISTER 302 Node B 2. REGISTER 302 Node C 3. REGISTER 200 OK 4. Joining node after join Node-ID 503 Node C Node-ID 520

18 User Registration User’s node must register in DHT Node A Node-ID 023 Node B Node-ID 245 Alice’s Node Node-ID 503 Alice’s Node Node-ID 503 Alice -> REGISTER 302 Node B 2. REGISTER 200 OK Alice-> Alice’s Node SIP REGISTER used for nodes and users Node C Node-ID 520

19 Contacting a User Node A Node-ID 023 Node B Node-ID 245 Node C Node-ID 520 Alice’s Node Node-ID 503 Alice -> 234 Bob -> 723 Alice-> Alice’s Node Bob-> Bob’s Node DHT used for initial location SIP INVITE/MESSAGE used for location Bob’s Node Node-ID INVITE 302 Bob’s Node 2. INVITE

20 Session Establishment Node A Node-ID 023 Node B Node-ID 245 Node C Node-ID 520 Alice’s Node Node-ID 503 Alice -> 234 Bob -> 723 Alice-> Alice’s Node Bob-> Bob’s Node Standard SIP used for connection No reliance on DHT Bob’s Node Node-ID 683

21 Presence Buddies located upon joining Serve as additional finger table entries

22 Security Concerns User Authentication Routing NAT Traversal

23 User Authentication Need to know who we’re talking to, but There is no way to establish initial identity AIM, etc. provide no way to lookup handle Initial authentication addresses PGP web of trust CAs Face to face Big question: Is this the same person I’ve talked with before?

24 User Authentication User authentication easy with public key Duplicate IDs necessary evil Can specify CA as source User mobility requires storing user profiles in network, relying on password encryption Some aspects of user authentication harder without trusted nodes ( addresses)

25 Routing Can we trust other nodes? DOS attacks by misrouting queries Iterative search simplifies problem DHT traversal unimportant after location Buddies’ locations cached Media routed end-to-end Social routing Finger table size

26 Related Work Skype Singh and Schulzrinne, NOSSDAV 2005 SPROUT OpenDHT

27 Conclusions P2P ideal for user location SIP gives compatibility with existing tech P2P can never be fully secure Need to provide reliability with untrustworthy nodes and users IETF draft submitted