| E. Marocco, G. Canal Lucent, 2006, 26 th October P2PSIP: Interworking Enrico Marocco Research Engineer

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Industry Perspective. VON The Current Environment Its Tough Out There! Free has become a dirty word Internet communications.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Open Standards: Communications at Your Desktop SmartCity Summit, April 29 th, 2003 Anne L. Coulombe Head of SIP-Based Solutions, Mitel Networks
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Exploring the Functions of Networking.
Interworking IPv6 in Mobile Networks Mat
August 2005IETF 63 VOIPEER1 Issues in Numbering, Naming and Addressing voipeer BoF IETF 63 – Paris, August 2005 Richard Stastny ÖFEG.
All rights reserved © 2006, Alcatel Benefits of Distributed Access Border Gateway in the Access  Benoît De Vos Alcatel, May 29 th 2006.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
IMS – The future of Fixed Mobile Convergence EduCause Walt Magnussen Ph.D. 12 October, 2010.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Living the SIMPLE SIP way SIP 2003 Paris, January 2003 Jörgen Björkner VP Concept Development Chairman SIP Forum
© 2004, SS8 Networks, Inc. Remote Office/Branch Office IP Telephony Solutions Sean Kent – Director Architecture/Technology V18.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
Peer-to-peer approaches for SIP Henning Schulzrinne Dept. of Computer Science Columbia University.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Principles for Collaboration Systems Geoffrey Fox Community Grids Laboratory Indiana University Bloomington IN 47404
Wireless Ad Hoc VoIP Thesis by: Patrick Stuedi & Gustavo Alonso Presentation by: Anil Kumar Marukala & Syed Khaja Najmuddin Ahmed.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2008 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. 1 Video Relay Service and Assignment.
Mobility And Anywhere Access Clancy Priest Technology Services Director City of Hayward.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
CELFRAME ® CELFRAME.GT Unified Communications over IP.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Fall VON - September 28, 1999 C O N N E C T I N G T H E W O R L D W I T H A P P L I C A T I O N S SIP - Ready to Deploy Jim Nelson,
1 Integrating 3G and WLAN Services in NTP SIP-based VoIP Platform Dr. Quincy Wu National Telecommunications Program Office
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
IP telephony overview and demonstration
BROADBAND TECHNOLOGIES & SERVICES Broadband Technologies -Core Network
Exploring the Network.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
| E. Marocco, G. Canal VoIP Conference 2006, 26 th October P2PSIP for Communications in New Network Topologies Enrico Marocco Research Engineer
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Appendix A UM in Microsoft® Exchange Server 2010.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
Interworking between P2PSIP Overlays and IMS Networks: Why? How?
Decision Group Inc. E-DETECTIVE Decision Group Inc.
LTE Architecture KANNAN M JTO(3G).
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
SIP-ify the Base Jon R. Doyle VP Business Development CommuniGate Systems.
Jan 24, 06William Rich, Pingtel Corp. IT Expo. Pingtel Corp., William Rich, IT Expo, Jan 24, 06 VoIP is Here… Source: IDC IP PBX vs. TDM PBX.
Lecture Week 3 Application Layer Functionality and Protocols Network Fundamentals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
1 © 2006 Nokia Fixed Mobile Convergence The future of communication networks János Kurtz 11/05/2006.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
France Télécom R&D – February 5th 2003 Internet Telephony Conference – Miami, Florida Bridging the Chasm Between Legacy and Next-Generation Networks Internet.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 1 – Introduction to VoIP.
 Chapter 1.5. ~ KNSS  Students ’ feedback  Had difficulties due to: Lack of knowledge in networking English No microphone for.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
0 What Does SIP Bring to Your Customer Experience ? Extend VoIP and IP Contact Center values through support of SIP o Media and location independent support.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
NT1210 Introduction to Networking
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
WIDER 3 WiFi in Disaster and Emergency Response Anders Bäck Muhammad Ali Beyhan Kochali Xin Bai David Tlahuetl WiFi in Disaster and Emergency Response.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
Exploring the Functions of Networking
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Client/Server and Peer to Peer
Presentation transcript:

| E. Marocco, G. Canal Lucent, 2006, 26 th October P2PSIP: Interworking Enrico Marocco Research Engineer

| E. Marocco, G. Canal The World is Converging Mobile GSM GPRS UMTS

| E. Marocco, G. Canal GSM GPRS UMTS But Mobile is becoming Ephemeral Toothing Communities Municipal Free Wireless Networks Ad-Hoc Networks

| E. Marocco, G. Canal Limited or Ephemeral Network Environments  Characterized by physical constraints (e.g. space, time, number...)  Limited diffusion  Limited requirements (e.g. security, equipment...)  Highly specialized (e.g. messaging, gaming, ad-hoc applications...)  Almost isolated (or partially connected)  Collaborative  Self-Sustained Cyber-Communities

| E. Marocco, G. Canal Technology in Limited or Ephemeral Environments  Unstable links  Cannot rely upon stable servers  Need of distributed fault tolerance (vs. single point of failure)  Missing or unconfigurable naming service  Cannot deploy stable servers  Need of multiple access points for resources (vs. centralization)  “Peer-to-Peer”  Distribution of location and routing services for communication  Distribution of storage service for file-sharing

| E. Marocco, G. Canal Who Cares?  Telcos?  Vendors?  Academics  Open Source  Users! IGNORE?

| E. Marocco, G. Canal Peer-to-Peer Limited or Ephemeral Networks Pros  Ease of deployment  Need common devices  Click 'n go  Costless  Need cheap devices  No O&M  Increase of adoption  AUTOCONF, MANET  Just Applications Cons  Scarce security  No identity assertion  No protection against malicious peers  Scarce connectivity  Hard to go over locality  No Services

| E. Marocco, G. Canal What can Operators do?  Ignore it  In ephemeral environments service provisioning is not feasible  Internet-like applications are out of core business  Fill the gaps  Provide access-level service for upgrading reachability  Provide “some” services to applications  Impede  Filter P2P traffic whenever is possible  Force the use of IMS

| E. Marocco, G. Canal A Notable Example Municipal Free Wireless  Mesh of APs on street lamps  Full local connectivity  Cheap – Sustainable  Mb/sec  Restricted Internet connection  Must serve Ms of users  Cannot support bandwidth-eager applications Internet “full” IP HTTP SMTP POP3

| E. Marocco, G. Canal Municipal Free Wireless Applications  Exploiting “global” connectivity   Web browsing  Exploiting “local” connectivity  File sharing  VoIP Internet “full” IP HTTP SMTP POP3

| E. Marocco, G. Canal Municipal Free Wireless - VoIP  Cannot access the home network for call routing  Restricted connectivity  Cannot rely on central servers  Link weakness  Unaccessible configuration  Must rely on resources shared by users

| E. Marocco, G. Canal P2PSIP: How It Works P2PSIP Overlay rome.test.net INVITE REGISTER

| E. Marocco, G. Canal P2PSIP: What Is Missing rome.test.netparis.test.org REGISTER INVITE

| E. Marocco, G. Canal P2PSIP: Providing Interworking rome.test.netparis.test.org REGISTER isp.test.com INVITE

| E. Marocco, G. Canal P2PSIP: Actors Clients Peers Super Peers Relay Agents Proxies

| E. Marocco, G. Canal P2PSIP: Architecture p2psip.org SIP location DNS location

| E. Marocco, G. Canal P2PSIP: New Elements Proxy  Access to the Internet  E.g. peers with DSL access  Registered in the DNS with the overlay identifier  Semi-stable  Open issue: how to register?  Client/Peer  Must be able to route messages Media Relay  Access to the Internet  E.g. host with DSL access  Must implement a relay mechanism  TURN, TEREDO

| E. Marocco, G. Canal P2PSIP: Interworking 1/2 p2psip.org sip:example.com Get Proxy Get Relay INVITE Media RFC3263 ICE

| E. Marocco, G. Canal P2PSIP: Interworking 2/2 p2psip.org sip:example.com Get Proxy Get Relay Media RFC3263 INVITE

| E. Marocco, G. Canal P2PSIP: Providing More Than Transport YES  Identity  Gateways  Presence service  Conferencing  Voice mail MAYBE  Emergency calls  Legal interception No  QoS

| E. Marocco, G. Canal Do Not Repeat The Same Old Mistakes  Do not understimate  This applies to municipal and building networks, but could also extend to big Internet communities (Skype-like)  Go for a standard P2P solution  Remember the lesson learned from IM&P (ICQ + AIM + MSN + Yahoo!)  Keep it open  IMS is SIP based; let it also be SIP compliant  It is not services vs. applications  Voice is both a service and an application

| E. Marocco, G. Canal Some Pointers  Municipal Free Wireless Networks  MuniWireless Web Portal (  Earthlink Municipal Networks Web Page (  P2PSIP  P2PSIP Project Page (  Concept and terminology (draft-willis-p2psip-concepts)  SIP-P2PSIP Interworking (draft-marocco-p2psip-interwork)  IMS  ;-)

| E. Marocco, G. Canal Thank You! Enrico Marocco