Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.

Slides:



Advertisements
Similar presentations
VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Computer networks Fundamentals of Information Technology Session 6.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Address Settlement by Peer to Peer (ASP) Jonathan Rosenberg Cullen Jennings Eric Rescorla.
Review of a research paper on Skype
Comparison between Skype and SIP- based Peer-to-Peer Voice-Over-IP Overlay Network Johnson Lee EECE 565 Data Communications.
Peer-to-Peer SIP David Bryan July 27, Affiliation(s) p2psip.org.
Scope Discussion Seems to be a good deal of interest in moving this toward a working group If we want to work toward this, we need to have a clearly defined.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
Draft-bryan-sipping-p2p David Bryan IETF 63, Paris August 3, 2005.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CSc 461/561 CSc 461/561 Peer-to-Peer Streaming. CSc 461/561 Summary (1) Service Models (2) P2P challenges (3) Service Discovery (4) P2P Streaming (5)
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
Skype & its protocol Aaron Loar CPE 401. Introduction Skype’s Background Topology 3 Node Types Questions.
Peer-to-peer approaches for SIP Henning Schulzrinne Dept. of Computer Science Columbia University.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
P2PSIP Charter Proposal Many people helped write this charter…
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
P2P Networking for Consumer Electronics (CE) Devices November 12, 2005 Eunsoo Shim Greg Perkins Panasonic Digital Networking Laboratory P2P SIP Ad-hoc.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Grid Appliance – On the Design of Self-Organizing, Decentralized Grids David Wolinsky, Arjun Prakash, and Renato Figueiredo ACIS Lab at the University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Scalability Don McGregor Research Associate MOVES Institute
P2P SIP Names & Security Cullen Jennings
| E. Marocco, G. Canal VoIP Conference 2006, 26 th October P2PSIP for Communications in New Network Topologies Enrico Marocco Research Engineer
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
| E. Marocco, G. Canal Lucent, 2006, 26 th October P2PSIP: Interworking Enrico Marocco Research Engineer
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
An analysis of Skype protocol Presented by: Abdul Haleem.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
SIPeerior Technologies A superior way to connect Emerging IETF Standards Work on P2PSIP David A. Bryan.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
1 30 November 2006 An Efficient Nearest Neighbor (NN) Algorithm for Peer-to-Peer (P2P) Settings Ahmed Sabbir Arif Graduate Student, York University.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Alex Chee Daniel LaBare Mike Oster John Spann Bryan Unbangluang Collaborative Document Sharing In Conjunction With.
November 2005IETF 641 Interconnect SIP networks using P2P SIP Marc Bailly
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
RELOAD draft-bryan-p2psip-reload-01 draft-lowekamp-p2psip-reload-security-01 Bruce Lowekamp David Bryan Jim Deverick Marcia Zangrilli.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Alex Chee Daniel LaBare Mike Oster John Spann Bryan Unbangluang Collaborative Document Sharing In Conjunction With.
ID-LOC Proposal Philip Matthews Eric Cooper Alan Johnston Avaya With contributions from Cullen Jennings, David Bryan, and Bruce Lowekamp.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
P2P Cullen Jennings Out of scope Mechanisms File Sharing Fluffy’s Hair XCAP.
Skype.
Draft-bryan-sipping-p2p-usecases-00 David A. Bryan Eunsoo Shim Bruce B. Lowekamp.
Instructor Materials Chapter 5 Providing Network Services
Peer to peer Internet telephony challenges, status and trend
Comparison of LAN, MAN, WAN
draft-bryan-sipping-p2p
The Case for DDoS Resistant Membership Management in P2P Systems
Presentation transcript:

Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp

P2P Communications VoIP – Voice over IP (Internet Protocol) IM – Instant Messaging (such as AOL) Communications systems running over a network – not always the public Internet –Private networks (corporation, research lab) –Remote/ephemeral networks (sensor networks, meetings, battlefields, etc.) –Next generation (3G and later) cellular phones run over IP networks

Client/Server Session In a Client/Server session, two nodes must use a central server to communicate

Peer-to-Peer (P2P) Instead of a central server providing services, the members of the network collaborate to provide them as peers Each node in addition to be a client is responsible for some portion of server work Classic example is file sharing (Napster and the like)

P2P Session

Innovations in P2P Communications What has been happening in this space? –Several issues have emerged as problems –Work on many fronts to solve “hard” problems Security Offline Message Storage Standardization NAT Traversal Improving Routing Mechanisms

A Example of the Problems… Can insert nodes with nearer values, and censor/intercept data or split a node from the overlay. Can’t let user choose location.

Sybil Attack Even if you can’t pick your Node ID, if you can occupy bulk of namespace, attack is possible

Efforts to Prevent This Attack Chord limits attack by locking ID to IP address –Bad for multiple nodes on one IP -- NATs Our solution: Replace last 5 digits with port number: –IP is fixed, assume for example this hashes to abcdef –Client on port 5000 becomes abcdef05000 –Client on port 5001 becomes abcdef05001 Client can have multiple nodes, but all are “near” each other -- harder to attack a particular machine.

Using Limited Central Servers Still hard to limit number of nodes, and hard to know who is authorized –A bit of a “cheat” -- use a central server, but only to get onto network –Issues a certificate when a user wants to join the network, certificate “chain” is stored in the overlay, so only need to contact to join –Small cost can be used to rate limit –Also solves the identity problem -- who gets to be “David”? –These certificates can be used for many things, including encrypting messages for offline storage

Standardization and NATs Standardization is essential for VoIP and IM Image two phones not being able to talk to each other… Main groups for telephony are IETF and ITU –IETF defines VoIP standard SIP –We have been chairing IETF efforts to standardized P2PSIP –Looks liklely to become a standard in the next 1-2 years Some open questions -- use SIP for P2P messages too? What DHT? Helps solve some problems with NAT traversal

Which DHT? / Routing Most P2P routing research is for file sharing –Only need to find an instance of a file –May give up after searching part of network if not there For communications, can’t have false positive or negative Anonymity is different in communication –Almost always desirable for file sharing –Sometimes good, sometimes not for communications Using buddies or phone book can improve performance

Acknowledgements This work is supported by: –VSGC: David Bryan is supported by a VSGC graduate student research grant –Cisco Systems through a grant from the University Research Program (URP) Thanks to others involved in this work: –Bruce B. Lowekamp, W&M –Cullen Jennings and Feng Cao, Cisco

Contact Information Web : – –