Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen A Cooperative SIP Infrastructure for Highly.

Slides:



Advertisements
Similar presentations
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Advertisements

Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Distributed System Architectures.
July 20, 2000H.323/SIP1 Interworking Between SIP/SDP and H.323 Agenda Compare SIP/H.323 Problems in interworking Possible solutions Conclusion Q/A Kundan.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Outline for today Structured overlay as infrastructures Survey of design solutions Analysis of designs.
Introduction to Distributed Systems
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
ShortTalk - XMPP messaging in a peer to peer manner Instructed by: Edward Bortnikov Supervisor: Dr. Ilana David Developed.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Peer-to-Peer Computing
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Overview Distributed vs. decentralized Why distributed databases
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Peer-to-peer approaches for SIP Henning Schulzrinne Dept. of Computer Science Columbia University.
March 31, 2005Thomson1 Advanced Network Services: P2P VoIP, location-based services and self-managing server farms Henning Schulzrinne (and members of.
SIP Greg Nelson Duc Pham. SIP Introduction Application-layer (signaling) control protocol for initiating a session among users Application-layer (signaling)
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
SIMULATING A MOBILE PEER-TO-PEER NETWORK Simo Sibakov Department of Communications and Networking (Comnet) Helsinki University of Technology Supervisor:
A RELOAD Usage for Distributed Conference Control (DisCo) draft-knauf-p2psip-disco-00 Alexander Knauf Gabriel Hege Thomas Schmidt Matthias Wählisch
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
P2P Networking for Consumer Electronics (CE) Devices November 12, 2005 Eunsoo Shim Greg Perkins Panasonic Digital Networking Laboratory P2P SIP Ad-hoc.
Gil EinzigerRoy Friedman Computer Science Department Technion.
Rwanda GovNet Xuan Pan Nkusi Issa Claude Hakizimana Joakim Slettengren Innocent Nkurunziza Xuan Pan Nkusi Issa Claude Hakizimana Joakim Slettengren Innocent.
This document is for informational purposes only, and Tekelec reserves the right to change any aspect of the products, features or functionality described.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Distributed Session Announcement Agents for Real-time Streaming Applications Keio University, Graduate School of Media and Governance Kazuhiro Mishima.
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato DAR Active measurement in the large.
Software Architectural Styles Andrew Midwinter, Mark Mullen, Kevin Wong, Matt Jones 1.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Optimal Content Delivery with Network Coding Derek Leong, Tracey Ho California Institute of Technology Rebecca Cathey BAE Systems CISS 2009 March 19, 2009.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
7/6/20061 Speermint Use Case for Cable IETF 66 Yiu L. Lee JULY 2006.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 SPEERMINT Use Cases for Cable IETF 66 Montreal 11 JULY 2006 Presented by Yiu L. Lee.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
VOIP over Peer-to-Peer
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
MWIF Confidential MWIF-Arch Security Task Force Task 5: Security for Signaling July 11, 2001 Baba, Shinichi Ready for MWIF Kansas.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Topic Distributed DBMS Database Management Systems Fall 2012 Presented by: Osama Ben Omran.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Peer to Peer Network Design Discovery and Routing algorithms
SIP-Based or DHT-Based? November 12, 2005 Eunsoo Shim Panasonic Digital Networking Laboratory P2P SIP Ad-hoc Meeting IETF64, Vancouver.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi Jingyuan Li, Liusheng Huang, Weijia Jia, Mingjun Xiao and Peng Du Joint.
The eXtensible Peer Protocol (XPP) Emil Ivov - Enrico Marocco –
Volunteer-based Monitoring System Min Gyung Kang KAIST.
The Session Initiation Protocol - SIP
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
P2P Cullen Jennings Out of scope Mechanisms File Sharing Fluffy’s Hair XCAP.
Multicast in Information-Centric Networking March 2012.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
The Biologically Inspired Distributed File System: An Emergent Thinker Instantiation Presented by Dr. Ying Lu.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
IP Telephony (VoIP).
Session Initiation Protocol (SIP)
Providing Secure Storage on the Internet
draft-bryan-sipping-p2p
Presentation transcript:

Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services Ali Fessi, Heiko Niedermayer, Holger Kinkelin, Georg Carle IPTComm 2007, 19 th -20 th July, New York, USA

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 2 Overview  Motivation  Properties of server-based SIP networks  Properties of P2P-based SIP networks  Our solution for SIP reliability: Cooperative SIP (CoSIP)  CoSIP Overview  Sample Applications  Implementation  Evaluation:  Improving reliability and security with CoSIP  Initial functional tests results  Conclusions

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 3 Motivation  Some open issues with VoIP still need to be solved  reliability, security, QoS, SPIT, etc.  Users are used to the nearly 100% reliable PSTN  Good news:  Peer-to-peer (P2P) networks provide higher reliability  Bad news:  P2P network have also their bad side Security in P2P networks is much harder to cope with due to decentralization  Goals  How can we make SIP networks more reliable?  How can we benefit from the advantages of both architectures server vs. P2P

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 4 Properties of Server-based SIP Networks Sufficient security mechanisms UA authentication Integrity and confidentiality High lookup performance of SIP URI O(1) messages  Complex service infrastructure SIP proxies, registrars, AAA servers, location database, DNS server, routers, etc  Network and service failures may propagate quickly  Server infrastructures are vulnerable to DoS attacks

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 5 Properties of P2P-SIP Networks Self-organization  Recoverability from local failures Robustness against DoS attacks  P2P network can also survive under difficult conditions Scalability  Lookup performance of the Contact URI in a DHT in the avg case: O( log ( N ) ) messages; N is the number of peers  Several security issues can not be solved in pure P2P network  Attacks on the routing of lookup requests  Attacks on the content of the P2P network  Sybil attacks, partitioning attacks, etc.  Open P2P-SIP networks are an invitation for SPIT!

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 6 Cooperative SIP (CoSIP)  Basic idea  Design a hybrid architecture that benefits from the advantages of both server-based and P2P-based SIP networks  SIP User Agents organize themselves into a P2P network  SIP infrastructure and SIP User Agents cooperate in order to provide the best service  Cooperative SIP architecture: CoSIP  Improve reliability, survivability, security and lookup performance

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 7 CoSIP: UA Registration REGISTER put(H(SIP_URI), Contact_URI)  A SIP UA is registered to the SIP infrastructure as well as to the DHT  Use REGISTER for registration to the infrastructure  Use put for the registration to the DHT: put (H(SIP_URI), Contact_URI)

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 8 CoSIP: Session Establishment INVITE get(SIP_URI) Contact_URI INVITE 200 OK Session  Signaling to the SIP infrastructure with INVITE  In parallel: resolve the Contact-URI in the DHT with a get get (H(SIP_URI)) = Contact_URI  Server does not answer or DHT is faster?  use the Contact-URI provided by the DHT lookup  perform direct signaling to the peer  Lookup performance  under normal conditions: O(1) messages  in case of failures of the infrastructure: O( log ( N ) ) messages;

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 9 CoSIP Sample Applications  Large enterprise/ academic SIP networks with e.g k-users  CoSIP can be used to bridge  network and service failures  maintenance downtimes CoSIP-enabled SIP Network

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 10 CoSIP Sample Applications (2)  CoSIP adapter/ proxy in DSL routers  CoSIP adapters organize themselves into a P2P network DSL Router with a CoSIP adapter / CoSIP proxy Small Office and Home Network (SOHO) Internet/VoIP Provider SOHO

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 11 Implementation of CoSIP as an external Proxy Application  The CoSIP proxy is an adapter to connect regular SIP UA  CoSIP Proxy communicates with the SIP infrastructure and the P2P network  DHT: Bamboo/ Pastry  Formal specification of the “CoSIP” protocol with SDL  Programming language: Python  When the SIP infrastructure fails: P2P signaling between the CoSIP proxies SIP Express Router (SER)

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 12 Specification of CoSIP - Goody  State machines „switchable“ to different modes 1.Cooperative mode (DHT + SIP server) 2.DHT-only mode (basically P2P-SIP with Bamboo as a DHT) 3.Server-only mode  DHT-only mode successfully tested with OpenDHT

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 13 SIP UA running with CoSIP Proxy in the background

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 14 Evaluation  Improving reliability with CoSIP  P2P network provide high reliability and self-organization Local failures can be recovered autonomically by neighboring peers  Data is replicated on a set of nodes (replica set)  Even large failures affect only a part of the network  In the ideal case (uncorrelated failures), the probability of a service failure with CoSIP would be:  CoSIP provides even better reliability and survivability than  P2P-SIP networks  server-based SIP networks

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 15 Evaluation  Improving security with CoSIP  Managing security in large P2P-SIP networks is not possible without central severs  However, PKI / CA is not enough  A CA is not able to detect an attack in the P2P network and shut down the attacker  A security solution for P2PSIP requires more SIP specific knowledge knowledge about the P2P network  CoSIP servers can provide Identity Management for the P2P-SIP network  CoSIP servers can make sure that peers in the P2P-SIP network behave well  How can you provide Intrusion Detection in a large P2P network?  a “CoSIP server” can help to do this job  More work is still required on this topic

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 16 Evaluation  Initial tests have been run on PlanetLab  Each used PlanetLab node hosts  a SIP UA  a CoSIP proxy  a Bamboo DHT node  High variance of the RTT on PlanetLab noticed  SIP server failure emulated  Successful recoverability from service failure  No interruption of service is noticed  Time required to establish a session between UAC and UAS increases slightly but is still acceptable  Performance results will be published soon

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 17 CoSIP: Summary  CoSIP provides a low-cost solution for significantly improving the reliability of SIP networks  Implementation  CoSIP as an external proxy application  compatible to existing SIP networks  Cooperative (server + DHT) as well as DHT-only mode possible  CoSIP is a hybrid architecture which provides better reliability, survivability, security and performance simultaneously  Could CoSIP be useful for catastrophic failures / emergency calls?  Future work  Integration of security mechanisms to CoSIP  Improve security of P2P-SIP  CoSIP is still a single domain concept  Peering of several domains with CoSIP  Improving geometry and routing in the DHT for higher connectivity in case of network failures

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 18 Questions / Discussion / Feedback

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 19 P2P-SIP  Basic idea: „SIP without server“  Registration:  Phase1: Node registration = P2P-SIP node “joins” the DHT  Phase 2: User registration = storing the Contact URI with SIP URI as lookup key in the DHT  Session establishment:  Resolving the SIP URI to a Contact URI using the DHT  Subsequent signaling can occur between the two peers Node registration User registration Session establishment

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 20 Evaluation - PlanetLab  Global research network  784 nodes  382 institutions  Con’s  Very variable performance and load of PlanetLab nodes  High variance in the RTT  Causes high variance in the measurement results  High instability and unreliability of the PlanetLab nodes  Upgrade PlanetLab 3.0 to 4.0  More than 50 nodes barely manageable

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 21 CoSIP State Machines  Formal specification of the CoSIP protocol using SDL  Logical separation between the state machines of different SIP UAs  The CoSIP proxy processes  requests from UA  messages from the server  messages from the DHT  timeouts for limiting the pending time  Events are processed FIFO SDL diagram for the processing of an INVITE message in state IDLE

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 22 CoSIP State Machines (2) High Level INVITE Session State Machine High Level REGISTER Session State Machine

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 23 Related Work  P2PSIP  Secure Overlay Services (SOS)  Resilient Overlay Networks (RON)  Skype  CoDNS

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 24 Overview Tesbed

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 25 OpenDHT  OpenDHT = Bamboo running on PlanetLab  publicly accessible  put  get  remove

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 26 CoSIP Implementation: Overview  Threading for transport of SIP messages and communication with the DHT  Event-based processing of  SIP messages  DHT messages  Timeouts  Events are processed FIFO  Programming language  Python  Platform independent (CoSIP tested with Linux / Windows)  Code size ca. 5 kLoC

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 27 SIP UA running with CoSIP Proxy in the background

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 28 Evaluation – Recovery from Service Interruption

A. Fessi, et al, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services“ 29 Evaluation (VI)