Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
TAP: A Novel Tunneling Approach for Anonymity in Structured P2P Systems Yingwu Zhu and Yiming Hu University of Cincinnati.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Address Settlement by Peer to Peer (ASP) Jonathan Rosenberg Cullen Jennings Eric Rescorla.
Voice over IP Skype.
Draft-bryan-sipping-p2p David Bryan IETF 63, Paris August 3, 2005.
Skype Connected to a SIP PBX
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
1/25/2000 Active Names: Flexible Location and Transport of Wide-Area Resources Luis Rivera.
Distributed Databases
SIMULATING A MOBILE PEER-TO-PEER NETWORK Simo Sibakov Department of Communications and Networking (Comnet) Helsinki University of Technology Supervisor:
Host Identity Protocol
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Wireless Ad Hoc VoIP Thesis by: Patrick Stuedi & Gustavo Alonso Presentation by: Anil Kumar Marukala & Syed Khaja Najmuddin Ahmed.
Module 12: Designing an AD LDS Implementation. AD LDS Usage AD LDS is most commonly used as a solution to the following requirements: Providing an LDAP-based.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 Tracker Protocol Proposal.
P2PSIP Charter Proposal Many people helped write this charter…
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
Thesis Proposal Data Consistency in DHTs. Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing,
IETF-84 (29 July – 3 Aug. 2012) Cloud Computing, Networking, and Service (CCNS) Update for GISFI-10, New Delhi, India Sept Monday-10-September-20121IETF84.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
DNS based IP NetLocation Service China Telecom Guangzhou Institute
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
MobileMAN Internal meetingHelsinki, June 8 th 2004 NETikos activity in MobileMAN project Veronica Vanni NETikos S.p.A.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Multimedia & Mobile Communications Lab.
Akbar Rahman Juan Carlos Zúñiga Guang Lu IETF 78, July P2P Streaming for Mobile Nodes: Scenarios.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
SIPeerior Technologies A superior way to connect Emerging IETF Standards Work on P2PSIP David A. Bryan.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Requirements for Peer protocol draft-jiang-p2psip-peer-protocol-requirement-00.txt Jiang XingFeng (Johnson) P2PSIP WG, IETF #68.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Bruce Hammer, Steve Wallis, Raymond Ho
November 2005IETF 641 Interconnect SIP networks using P2P SIP Marc Bailly
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
SIP-Based or DHT-Based? November 12, 2005 Eunsoo Shim Panasonic Digital Networking Laboratory P2P SIP Ad-hoc Meeting IETF64, Vancouver.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
The eXtensible Peer Protocol (XPP) Emil Ivov - Enrico Marocco –
Discussion On Routing Modes IETF72 P2PSIP WG draft-jiang-p2psip-sep-01 Jiang XingFeng Carlos Macian Victor Pascual.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
1 P2PSIP Peer Protocol Design Questions Presenter: Philip Matthews (based on input from the authors of the various proposals)
NGMAST Mobile DHT Energy1 Optimizing Energy Consumption of Mobile Nodes in Heterogeneous Kademlia-based Distributed Hash Tables Imre Kelényi Budapest.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Multicast in Information-Centric Networking March 2012.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
Peer to peer Internet telephony challenges, status and trend
Peer-to-peer networking
CHAPTER 3 Architectures for Distributed Systems
Introduction to Networks
P2P-SIP Using an External P2P network (DHT)
Peer-to-Peer Protocol (P2PP)
Building Peer-to-Peer Systems with Chord, a Distributed Lookup Service
Jiang XingFeng (Johnson) P2PSIP WG, IETF #68
draft-bryan-sipping-p2p
AAA: A Survey and a Policy- Based Architecture and Framework
The Case for DDoS Resistant Membership Management in P2P Systems
Presentation transcript:

Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe 69 IETF, Chicago, July 26, 2007

2 An orderly approach to requirements Deployment scenarios NAT traversal Bootstrap and other servers SIP-P2P overlay interface and API P2P Overlay requirements DHT selection criteria Client protocol requirements Security: SIP, DHT, client This reflects the work of several authors, so there is still some inconsistency

3 P2P overlay requirements Data replication Load balancing Overlay performance –Routing performance: Tables and state –Routing styles –Join/leave (churn) handling –Enabling mobility: nodeID not based on IP –Fault tolerance to non-transitive connectivity

4 SIP-Overlay Interface No dependence on any particular overlay –SIP-P2P interface –APIs for DHT usage API for the peer protocol API for the client protocol

5 The client protocol Benefit from, but not contribute to overlay Avoid battery consumption and charges from “always talking” in DHT mode Bandwidth limitations+churn make a poor peer Access to find/insert/modify data in overlay Flexible interface for non-SIP applications

6 Selecting a DHT Deployed and tested over the Internet with millions of users? Has the research been published? Running code available? Can the experience be extrapolated for P2PSIP? Some people suggested that we should not select mandatory-to -implement DHT, instead leave the decision to developers.

Security Requirements draft-matuszewski-p2psip-security-requirements-01.txt M. Matuszewski -editor J-E. Ekberg P. Laitinen 69 IETF, Chicago, July 26, 2007

8 Attacks Storage –Attacker may discard, modify data it is responsible for –Attacker may fill up the network with data –Attacker may modify, delete resource (user) records of other users Routing –Attacker may discard or modify messages –Attacker may reply with wrong data –Attacker may misroute messages Privacy –Attacker may eavesdrop routed messages Other e.g. replay attacks Scope –Bootstrapping, joining, data insertion, modification and retrieval –SIP operations: proxy, registrar

9 P2PSIP security Security must be an integral part of the overlay protocols design Consider user requirements and first target “good enough security” “Good enough security” at least should address: –Enrolment: control identity and issue credentials –Secure data stored in the overlay –Limit the impact of badly behaving nodes … while not re-defining the existing security mechanisms (or DHT itself) more than necessary

10 OPEN ISSUES Who enrolls to the P2PSIP system: only a user or also a peer? Do we need separate credentials for peers and users? Do we allow a distributed enrolment system?