Interactive Connectivity Establishment : ICE

Slides:



Advertisements
Similar presentations
SIP, Presence and Instant Messaging
Advertisements

SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Fall IM 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Fall VoN 2000 SIP Servers SIP Servers: A Buyers Guide Jonathan Rosenberg Chief Scientist.
VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Interactive Connectivity Establishment: ICE
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
VON Europe SIP Update Jonathan Rosenberg Chief Scientist co-chair, IETF SIP Working Group.
Early Media Authorization Under what conditions should negotiated media flow prior to 200 OK (INVITE)? Richard Ejzak.
Running SIP behind NAT Dr. Christian Stredicke, snom technology AG Tokyo, Japan, Oct 22 th 2002.
IPv6 Privacy Hannes Tschofenig, Tara Whalen. Agenda Privacy Threats Layering Addressing Policy Questionnaire.
UC403: Lync & Network Interaction
NETW-250 Troubleshooting Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Voice over IP Fundamentals
SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom.
Network Address Translation (NAT) Prof. Sasu Tarkoma.
ICE Jonathan Rosenberg Cisco Systems. Changes Removed abstract protocol concept Relaxed requirements for ICE on servers and gateways – no address gathering.
NAT/Firewall Traversal April NAT revisited – “port-translating NAT”
1 © 2004 Cisco Systems, Inc. All rights reserved. Making NATs work for Online Gaming and VoIP Dr. Cullen Jennings
STUN Date: Speaker: Hui-Hsiung Chung 1.
Network Address Translation (NAT) Adj. Prof. Sasu Tarkoma.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID STUN, TURN and ICE Cary Fitzgerald.
PPSP NAT traversal Lichun Li, Jun Wang, Yu Meng {li.lichun1, draft-li-ppsp-nat-traversal-00.
STUN Tutorial Jonathan Rosenberg Chief Technology Officer.
Session Initiation Protocol (SIP) By: Zhixin Chen.
VoIP Using SIP/RTP by George Fu, UCCS CS 522 Semester Project Fall 2004.
ICE Jonathan Rosenberg dynamicsoft. Issue 1: Port Restricted Flow This case does not work well with ICE right now Race condition –Works if message 13.
RTSP NAT Traversal Update Magnus Westlund (Ericsson) Thomas Zeng (PVNS, an Alcatel company) IETF-60 MMUSIC WG draft-ietf-mmusic-rtsp-nat-03.txt.
SIP, NAT, Firewall SIP NAT Firewall How to Traversal NAT/Firewall for SIP.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
Introduction to SIP Speaker: Min-Hua Yang Advisor: Ho-Ting Wu Date:2005/3/29.
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
AARNet Copyright 2011 Network Operations SDP Deep Dive Bill Efthimiou APAN33 SIP workshop February 2012.
SIP and NAT Dr. Jonathan Rosenberg Cisco Fellow. What is NAT? Network Address Translation (NAT) –Creates address binding between internal private and.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Session Initiation Protocol Team Members: Manjiri Ayyar Pallavi Murudkar Sriusha Kottalanka Vamsi Ambati Girish Satya LeeAnn Tam.
PPSP Tracker Protocol draft-gu-ppsp-tracker-protocol PPSP WG IETF 82 Taipei Rui Cruz (presenter) Mário Nunes, Yingjie Gu, Jinwei Xia, David Bryan, João.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
NAT Traversal Speaker: Chin-Chang Chang Date:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) speaker : Wenping Zhang date :
Improving the Routing Efficiency of SIP Instant Message SIP 即時傳訊之繞送效能研究 adviser : Quincy Wu speaker : Wenping Zhang date :
Curtsy Web
E Multimedia Communications Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia.
PPSP NAT traversal Lichun Li, Jun Wang, Wei Chen {li.lichun1, draft-li-ppsp-nat-traversal-02.
SIPPING IETF 57 Jonathan Rosenberg dynamicsoft.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
Draft-gu-ppsp-peer-protocol-02 Presenter : Gu Yingjie IETF-81, Quebec, July, 2011.
Simon Millard Professional Services Manager Aculab – booth 402 The State of SIP.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Session Initiation Protocol (SIP) Chapter 5 speaker : Wenping Zhang data :
IETF-81, Quebec City, July 25-29, 2011
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
E Multimedia Communications Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia.
TURN Jonathan Rosenberg Cisco Systems. Changes since last version Moved to behave terminology Many things moved into STUN –Basic request/response formation.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
draft-ivov-mmusic-trickle-ice E. Rescorla, J. Uberti, E. Ivov
The Session Initiation Protocol - SIP
jitsi. org advanced real-time communication.
How to develop a VoIP softphone in C# that enables SIP Instant Messaging (IM) This presentation describes how to create a softphone in C# that allows you.
How to develop a VoIP softphone in C# by using OZEKI VoIP SIP SDK This presentation demonstrates the first steps concerning to how to develop a fully-functional.
HIP-Based NAT Traversal in P2P-Environments
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Introducing To Networking
* Essential Network Security Book Slides.
SDP Offer Answer Examples
CS4470 Computer Networking Protocols
SIP Basics Workshop Dennis Baron July 20, 2005.
Presentation transcript:

Interactive Connectivity Establishment : ICE speaker:Wenping Zhang date:2008.05.01

Outline Introduction What is NAT What is the Problem What is STUN What is TURN IETFs Answer:ICE Conclusion Reference

Introduction SIP has seen widespread usage and deployment in both the public Internet and private IP networks. However, its success has not come without difficulties. Perhaps most significant among them has been the proliferation of network address translator and firewall devices. The IETF responded to this need by the creation of a new specification that augments SIP with robust and low-cost NAT traversal. This specification, Interactive Connectivity Establishment, was produced by the mmusic working group.

What is NAT

What is the Problem In the Contact of a REGISTER as the target for incoming INVITE

Cont. In the SDP as the target for receipt of media

What is STUN

What is TURN

IETFs Answer:ICE ICE provides NAT and firewall traversal capabilities for any type of session-oriented protocol, though it has been designed to work with SIP and its companion protocol, the Session Description Protocol (SDP). ICE makes use of STUN and TURN and provides a unifying framework around them. Even though ICE has not yet reached RFC status, there are already several large-scale deployments supporting hundreds of thousands of users.

Cont. A client will obtain IP addresses and ports by using both techniques, including both addresses - in addition to ports allocated from local interfaces - into the SIP call-setup messages. Each of these is called a candidate and represents a potential point of communications for the agent. At that point, the agents begin a process of connectivity checks. These are STUN messages sent from one agent to the other, probing to find a particular pair of addresses that work. Once a pair is found, the probes cease, and media can begin to flow.

Cont. The detailed operation of ICE can be broken into six steps: Gathering Prioritizing Encoding Offering and Answering Checking Completing

Step 1:Gathering Prior to making a call, the caller begins gathering IP addresses and ports, each of which is a potential candidate for communications. Three different types of candidates Host Candidates Server Reflexive Candidates Relayed Candidates

Step 2:Prioritizing Once the agent has gathered its candidates, it assigns each of them a priority value. Priorities are from 0 to 2 to the power of 31 minus 1, with larger numbers denoting higher priority. Typically, the lowest priority is given to the relayed candidates, since sending media through a relay is expensive and increases voice latency.

Cont. The type preference MUST be an integer from 0 to 126 inclusive, and represents the preference for the type of the candidate . The local preference MUST be an integer from 0 to 65535 inclusive. The component ID is the component ID for the candidate, and MUST be between 1 and 256 inclusive.

Step 3:Encoding Each candidate is placed into an a=candidate attribute of the offer Each candidate line has IP address and port Component ID Foundation Transport Protocol Priority Type “Related Address”

Step 4:Offering and Answering Once the calling agent has constructed its SIP INVITE request with the SDP payload, it sends the request to the called party. Assuming the called party also supports ICE, the called party holds off on ringing the phone. it performs the same gathering, prioritizing, and encoding that the caller performed. The called party then generates a provisional SIP response.

Step 5:Checking Each agent pairs up its candidates with its peers to form candidate pairs Each agent sends a connectivity check every 20ms, in pair priority order Upon receipt of the request the peer agent generates a response If the response is received the check has succeeded

Step 6:Completing Once a check is completed, the agent knows it has found a pair that will work for media traffic. By avoiding ringing the phone until the ICE checks have been completed, ICE can guarantee that when the called party does answer, media will successfully flow in each direction Once the phone rings, the called party answers. This generates an SIP 200 OK final response, confirming acceptance of the call. If ICE negotiation results in the selection of a candidate pair that differs from the default IP address and port carried in the SDP, the caller performs an SIP re-INVITE to update the default.

Cont.

Conclusion ICE is one of the most important extensions produced to date for SIP. Indeed, it is considered one of its few core extensions - those expected to be used by every SIP client for every SIP call. Though designed for SIP, ICE is applicable to any session-oriented protocol. ICE’s importance goes beyond just robust NAT traversal. ICE adds significant security to SIP overall, eliminating a key DoS attack , which can be launched by using SIP networks as amplifiers.

Reference IETF Journal, “Interactive Connectivity Establishment”, By Jonathan Rosenberg, Cisco Systems ICE Tutorial J. Rosenberg. “Interactive Connectivity Establishment (ICE): A Methodology for Network Address Translator (NAT) Traversal for Offer/Answer Protocols.” IETF Internet Draft draft-ietf-mmusic-ice-19, October 2006. Rosenberg, "Interactive Connectivity Establishment (ICE): Methodology for Network Address Translator (NAT) Traversal for the Session Initiation Protocol (SIP)", Internet draft http://www.ietf.org/internet-drafts/draft-rosenberg-sipping-ice- 01.txt, February 2003