Information-Centric Networks09c-1 Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks –V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass,

Slides:



Advertisements
Similar presentations
SIP, Presence and Instant Messaging
Advertisements

SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
Running SIP behind NAT Dr. Christian Stredicke, snom technology AG Tokyo, Japan, Oct 22 th 2002.
Lync /11/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
A Presentation on H.323 Deepak Bote. , IM, blog…
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
IP Communications Services Redefining Communications Teresa Hastings Director WorldCom SIP Services Conference – April 18-20, 2001.
CCNA – Network Fundamentals
29.1 Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Application layer (continued) Week 4 – Lecture 2.
Session Initiation Protocol (SIP) By: Zhixin Chen.
VoCCN: Voice over Content-Centric Networks Van Jacobson et.al Palo Alto Research Center (PARC) ReArch ’09,Rome, Italy Akmal Khan Topics in Internet SNU.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
12/05/2000CS590F, Purdue University1 Sip Implementation Protocol Presented By: Sanjay Agrawal Sambhrama Mundkur.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
5/3/2006 tlpham VOIP/Security 1 Voice Over IP and Security By Thao L. Pham CS 525.
Voice and Data Integration over IP An analytical overview of voice-over-IP Prabhu Sivarja Wichita State University, Wichita, KS Spring 2003.
Introduction to SIP Speaker: Min-Hua Yang Advisor: Ho-Ting Wu Date:2005/3/29.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
Review of the literature : VoCCN: Voice-over Content-Centric Networks Takashima Daiki Waseda University, Japan 1/13.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Computer Networks: Multimedia Applications Ivan Marsic Rutgers University Chapter 3 – Multimedia & Real-time Applications.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
IP Multicast A convention to identify a multicast address Each node must translate between an IP multicast address and a list of networks that contain.
E Multimedia Communications Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia.
H.323 An International Telecommunications Union (ITU) standard. Architecture consisting of several protocols oG.711: Encoding and decoding of speech (other.
1 © NOKIA FILENAMs.PPT/ DATE / NN Helsinki University of Technology Department of Electrical and Communications Engineering Jarkko Kneckt point to point.
Simon Millard Professional Services Manager Aculab – booth 402 The State of SIP.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
E Multimedia Communications Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia.
Voice over IP B 林與絜.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Session Initiation Protocol (SIP) Chapter 5 speaker : Wenping Zhang data :
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
Detection and Mitigation of Spam in IP Telephony Networks using Signaling Protocol Analysis MacIntosh, R Vinokurov, D Advances in Wired and Wireless Communication,
E Multimedia Communications Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia.
Information-Centric Networks Section # 9.3: Clean Slate Instructor: George Xylomenos Department: Informatics.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Multimedia Streaming I. Fatimah Alzahrani. Introduction We can divide audio and video services into three broad categories: streaming stored audio/video,
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
3/10/2016 Subject Name: Computer Networks - II Subject Code: 10CS64 Prepared By: Madhuleena Das Department: Computer Science & Engineering Date :
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Presented by Maria Shah. Road Map  VoIP Benefits  VoIP Protocols  VoIP Analysis  Advantages  Disadvantages  Implementing  Security  Summary.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
Chapter 9: Transport Layer
Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP Telephony (VoIP).
Instructor Materials Chapter 9: Transport Layer
Session Initiation Protocol (SIP)
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Presentation transcript:

Information-Centric Networks09c-1 Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks –V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass, P. Stewart, J. D. Thornton, R. L. Braynard –ACM ReArch 2009 Main point –Content-centric targets fetching/downloading applications –Can it work for other applications, too? , streaming and (especially) VoIP? –VoCCN: Voice over CCN (instead of IP) –Based on certain key properties of CCN

Introduction Most new architectures place content at the center –Good fit for content exchange applications (WWW, P2P) –What about conversational applications (VoIP, e-commerce)? VoCCN addresses the issue of CCN suitability –Real-time, conversational, telephony over CCN –Simpler, more secure and more scalable than VoIP –Uses SIP and RTP to securely interoperate with VoIP –Employs a stateless IP to CCN gateway –Model for mapping conversational applications to CCN Information-Centric Networks09c-2

VoIP background VoIP components –Endpoints are represented by fixed proxies The endpoints can be mobile or have dynamic IP addresses –Signaling established via SIP (Session Initiation Protocol) Caller to caller’s proxy, to callee’s proxy, to callee The proxies must know where the endpoints reside –Data exchange directly between endpoints The caller’s invite indicates its address for RTP data The callee’s accept indicates address for RTP data –Media can be secured via SRTP or tunneling inside DTLS –Signaling can be secured via DTLS/PKI or MIKEY Authentication and encryption are tricky to setup Usually everything ends up unencrypted and unathenticated! Information-Centric Networks09c-3

Architecture VoIP is harder than it needs to be –The caller simply wants to talk to the callee –The network requires finding the callee’s phone IP address This is where the SIP proxies come into play –In content-oriented networking this should be redundant VoCCN has to solve a different set of problems –Service rendezvous: the callee must offer a contact point In IP this is the TCP/UDP port to which the application listens –In CCN we must request content that has not been published The network must route the request to potential publishers The publishers should then create and publish the content Information-Centric Networks09c-4

Architecture VoCCN has to solve a different set of problems –The service rendezvous must transition to a conversation In IP the SIP packets contain information in an SDP payload –In CCN we need dynamically constructible names Construct the name of a piece of content without being told Two requirements for content name construction –Deterministic algorithm to produce names Names rely on information available to both endpoints Cannot use (say) content hashes as names –Support for partial specification of names Constructing unique names requires prearrangement Partial names allow unique names to be used eventually –Structured names can satisfy both requirements Information-Centric Networks09c-5

Architecture In CCN content uses hierarchical naming –Interest packets specify a name prefix and some rules The rules specify what matching content to return –CCN routers use prefix matching to direct Interests Sent towards content sources that have registered availability –Sources do not need to register the exact content, only prefixes Content can be generated on the fly –Data packets reverse the path taken by interests VoCCN signaling –Each VoCCN endpoint has an identity (e.g. –The endpoint registers to offer data in a specific namespace Based on service and identity (e.g. /ccnx.org/sip/alice/invite) Information-Centric Networks09c-6

Architecture VoCCN signaling –A caller sends an Interest asking for content from the callee The well-known prefix is extended with unique data A session key encrypted with the callee’s public key The SIP invite data encrypted with the session key –The callee responds with a data packet generated on the fly Uses the name indicated by the caller Includes the SIP accept data encrypted with the session key VoCCN data exchange –Uses a sequence of names based on rendezvous information Call-id+endpoint+sequence (e.g. /ccnx.org/alice/call-id/rtp/seqno) Each Interest is matched by a unique data packet –Can issue many interests to pipeline data flow As data packets arrive, more interests are generated Information-Centric Networks09c-7

Advantages Easy location of endpoints –In IP the endpoint needs to register its IP address with a proxy –With CCN a prefix can be registered at many areas The Interest will be routed to all of them The endpoint will respond from its current location Endpoints can prove their identity –All the credentials needed are at the endpoint The private key needed to decrypt the session key –No need to change identity to IP address mappings Advanced services are easy to build –Exploits the built-in multipoint routing of CCN Follow call requests or copy and process call contents Information-Centric Networks09c-8

VoCCN/VoIP interoperability Based on a stateless VoCCN/VoIP gateway –SIP and SRTP are used to simplify the exchange –The gateway acts as a SIP proxy that translates packets –A SIP/SRTP packet is translated to a CCN data packet They match CCN interest packets from VoCCN endpoints The gateway also generates an Interest for the next packet This matches the next data packet from the VoCCN endpoint The VoCCN packet is translated to an IP packet –The proxy does not maintain state on conversations Every action is based on received packets –Signaling security is provided for the CCN part only The IP part may have its own SIP signaling security mechanism End-to-end data security does not involve the gateway Information-Centric Networks09c-9

Implementation Implementation data –VoCCN client based on Linphone Uses extensible SIP and RTP libraries Simple plugins for the CCN part –CCN routers on all routers and endpoints CCN routers communicate over a UDP overlay Security –Many ways to get public keys in CCN Ask for /ccnx.org/users/alice/KEY and accept on faith Publish key as CCN content signed by a trusted third party –VoCCN used MIKEY to secure the data exchange MIKEY is initiated during the SIP signaling exchange –The signaling exchange is protected with public keys Information-Centric Networks09c-10

Implementation Performance –Direct exchange between two machines in the same LAN –Compared stock Linphone with VoCCN version –No perceptible impact from packet signing with 1024 bit RSA keys –No packet loss, but some delayed packets in the latter case –Similar jitter for both versions Information-Centric Networks09c-11