1 P2PSIP Peer Protocol Design Questions Presenter: Philip Matthews (based on input from the authors of the various proposals)

Slides:



Advertisements
Similar presentations
Current methods for negotiating firewalls for the Condor ® system Bruce Beckles (University of Cambridge Computing Service) Se-Chang Son (University of.
Advertisements

Access 2007 ® Use Databases How can Microsoft Access 2007 help you structure your database?
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
CS 457 – Lecture 16 Global Internet - BGP Spring 2012.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
NAT Traversal for P2PSIP Philip Matthews Avaya. Peer X Peer Y Peer W 2. P2PSIP Network Establishing new Peer Protocol connection Peer Protocol messages.
P2P-SIP Presentation Philip Matthews Nimcat / Avaya.
Video Rental Store M.S. Access Module CAS 133 Basic Computer Skills/MS Office Russ Erdman.
Chapter 5 The Network Layer.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
Dr. Philip Cannata 1 Principles of Network Applications.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Chapter 27 Q and A Victor Norman IS333 Spring 2015.
IETF P2P Mechanisms Wes Eddy / TSV AD MTI Systems TSVAREA IETF 81 – Quebec City, July 2011.
Gursharan Singh Tatla Transport Layer 16-May
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
Database Applications – Microsoft Access Lesson 2 Modifying a Table and Creating a Form 45 slides in presentation Accessibility check 9/14.
SIP working group status Keith Drage, Dean Willis.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
Draft-loughney-what-standards-01.txt IETF 59 NEWTRK WG Presented by Spencer Dawkins.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 Tracker Protocol Proposal.
Draft-gu-ppsp-protocol-00 PPSP Session IETF 77, Anaheim March 22, 2010.
P2PSIP Charter Proposal Many people helped write this charter…
P2P Networking for Consumer Electronics (CE) Devices November 12, 2005 Eunsoo Shim Greg Perkins Panasonic Digital Networking Laboratory P2P SIP Ad-hoc.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
Chapter 3 Transport Layer
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
The HIP-HOP proposal draft-matthews-p2psip-hip-hop-00 Philip Matthews
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Farnaz Moradi Based on slides by Andreas Larsson 2013.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Problems in using HIP for P2PSIP Philip Matthews Avaya
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Peer to Peer Streaming Protocol (PPSP) BOF Gonzalo Camarillo Ericsson Yunfei Zhang China Mobile IETF76, Hiroshima, Japan 13:00~15:00 THURSDAY, Nov 12,
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Requirements for Peer protocol draft-jiang-p2psip-peer-protocol-requirement-00.txt Jiang XingFeng (Johnson) P2PSIP WG, IETF #68.
The NAT Traversal Problem in P2PSIP Bruce Lowekamp (SIPeerior) Philip Matthews (Avaya)
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
SIP-Based or DHT-Based? November 12, 2005 Eunsoo Shim Panasonic Digital Networking Laboratory P2P SIP Ad-hoc Meeting IETF64, Vancouver.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
App End-to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date:
March P2PSIP Routing Discussion (“Routing: what does it look like?) Spencer Dawkins IETF 70 – December 2007 Vancouver, British.
1 IPFIX Default Transport IPFIX IETF-58 November 10, 2003 Stewart Bryant Benoit Claise.
The eXtensible Peer Protocol (XPP) Emil Ivov - Enrico Marocco –
Design Considerations for the Common MIH Protocol Functions draft-hepworth-mipshop-mih-design-considerations-01 Ele Hepworth (*), Robert Hancock, Srinivas.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
Draft-ietf-pim-port-03 wglc. WGLC responses Thomas suggested a long list of changes, mostly editorial –I believe I addressed all Dimitri also had comments.
Draft-ietf-p2psip-base-08 Cullen Jennings Bruce Lowekamp Eric Rescorla Salman Baset Henning Schulzrinne March 25, 2010.
ID-LOC Proposal Philip Matthews Eric Cooper Alan Johnston Avaya With contributions from Cullen Jennings, David Bryan, and Bruce Lowekamp.
Multicasting EECS June Multicast One-to-many, many-to-many communications Applications: – Teleconferencing – Database – Distributed computing.
DECADE Requirements draft-gu-decade-reqs-05 Yingjie Gu, David A. Bryan, Y. Richard Yang, Richard Alimi IETF-78 Maastricht, DECADE Session.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
1 Group Communications: Host Group and IGMP Dr. Rocky K. C. Chang 19 March, 2002.
5. End-to-end protocols (part 1)
NAT State Synchronization using SCSP draft-xu-behave-nat-state-sync-01
ICMP ICMP – Internet Control Message Protocol
CS 457 – Lecture 10 Internetworking and IP
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Chat Refs: RFC 1459 (IRC).
Jiang XingFeng (Johnson) P2PSIP WG, IETF #68
Presentation transcript:

1 P2PSIP Peer Protocol Design Questions Presenter: Philip Matthews (based on input from the authors of the various proposals)

2 Intro This presentation: List of some key design questions WG needs to decide upon, and some of the choices and implications of those choices. Think about these questions as you listen to the individual presentations. Except perhaps for the first question (next slide), answers are still being explored and there is no consensus yet on the right answers.

3 Should the P2P layer be distinct from the SIP layer? Various things pushing for distinct P2P layer: Various concerns about the nature of the P2P extensions to SIP. Sense that a distinct layer is architecturally correct. Do we have WG consensus that P2P layer should be distinct?? P2P Layer SIP SIP w/ P2P extensions

4 Should P2P layer support apps other than SIP? NO: Focus on a narrow, well-understood problem. This way, networks admins won’t want to block P2PSIP. YES: Strong push from some to do this. If P2PSIP is successful, it WILL happen. Note: Charter says only “cannot work on issues not relevant to P2P-based SIP”.

5 Support multiple DHTs? Options: a) Support just one. (Which one?) b) Support a number of similar DHTs. c) Support most/all DHTs. d) ??? If multiple DHTs, then: Is there a mandatory-to-implement DHT, or do we just specify one to use for testing? If MTI is X, but overlay currently running Y, what happens when peer that supports only X wants to join?

6 DD Record Types How is format and meaning of a DD record type specified: in prose, in a formal notation, or … ? How are new record types added? –Software upgrade of DD code? –Agreed to before overlay forms? –Added dynamically when overlay is running? Who needs to know about and understand a type? All peers, or just peers doing put/get on that type?

7 DD: Soft state or hard state? Soft-state = Records must be refreshed periodically, otherwise they time out. –How long is timeout? –What if user/peer leaves overlay? Should their records be remembered? If so, refreshed how? Hard-state = Records remembered until explicitly or implicitly deleted. In general, soft-state protocols more robust and easier to get right, but more chatty. Use hard-state when chatty is a problem. Classic example. OSPF = DD proto w/ soft-state. Scales to about 600 peers. BGP = DD proto w/ hard state. Supports > 100,000 records, and developed because soft-state predecessor didn’t scale.

8 Security Admission security –Who is allowed to join the overlay? How is this enforced? Database security –Who is allowed to create or modify a record in the DD? –How do we prevent a malicious peer from ignoring a record update, or replying with the wrong record contents when asked? Message security –Preventing inspection or modification of a message in transit.

9 High-level NAT Traversal Approach? Do we assume that there will always be at least a few peers with public IP addresses?

10 What transport should the Peer Protocol use? TCP - Provides reliability, segmentation UDP - No reliability or segmentation, but traverses NATs better SCTP - Like TCP, but message-oriented Add TLS/DTLS for security?

11 Future-proofing Some things that can change: –New fields in messages –New DD types –New DHT algorithm –New admission procedure How can we mix old and new versions of the protocol in one overlay?

12 Diagnostics Distributed systems are very difficult to troubleshoot. What can we do in the protocol to make this easier to check that: –DD is “correct”? –Overlay is properly formed? –Messages are getting delivered? –Etc.