Draft-bryan-sipping-p2p-usecases-00 David A. Bryan Eunsoo Shim Bruce B. Lowekamp.

Slides:



Advertisements
Similar presentations
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Advertisements

Enabling IPv6 in Corporate Intranet Networks
Vodacom Microsoft Hosted Lync
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Guide to Network Defense and Countermeasures Second Edition
August 2005IETF 63 VOIPEER1 Issues in Numbering, Naming and Addressing voipeer BoF IETF 63 – Paris, August 2005 Richard Stastny ÖFEG.
SIP Security & the Future of VoIP Nate Klingenstein APAN 26 Queenstown August 5, ~ndk/apanSIP.pdf.
A Secure Network for All Team Excel. Requirements Business Add visitor, customer, and competitor access Use non-company laptops onto corporate network.
Managing International Information Systems
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Enterprise Infrastructure Solutions for SIP Trunking
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Copyright © 2002 ACNielsen a VNU company Key Features and Benefits of the 3CX PBX for Windows Server.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
P2P Networking for Consumer Electronics (CE) Devices November 12, 2005 Eunsoo Shim Greg Perkins Panasonic Digital Networking Laboratory P2P SIP Ad-hoc.
Oracle Contact Center Anywhere: Go To Market - Positioning James Owens – BDM, Specialist Sales APAC.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
Appendix A UM in Microsoft® Exchange Server 2010.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
ACM 511 Introduction to Computer Networks. Computer Networks.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
SIPeerior Technologies A superior way to connect Emerging IETF Standards Work on P2PSIP David A. Bryan.
Deploying IPv6, Now Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
IPv6 - The Way Ahead Christian Huitema Architect Windows Networking & Communications
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
ROI for VoIP in the Enterprise A business case for Zultys VoIP Solutions.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Peer-to-Peer Solutions Between Service Providers David A. Bryan CTO, Jasomi Networks October 10, 2002 – Fall VON, Atlanta, GA.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
Planning the Addressing Structure
Chapter 1: Explore the Network
On-Site PBX Vs Hosted PBX.
Chapter 1 Introduction to Networking
Chapter 6: Securing the Cloud
Computers Are Your Future
Chapter 1: Exploring the Network
Contents Software components All users in one location:
Lab A: Planning an Installation
IP Telephony (VoIP).
Global Asterisk Voice over IP Implementation
TOPEX miniGateway.
Living in a Network Centric World
Living in a Network Centric World
Henning Schulzrinne Stephen McCann Gabor Bajko Hannes Tschofenig
IS4550 Security Policies and Implementation
11/12/2018.
Mobile Agents.
Living in a Network Centric World
Enterprise Infrastructure Solutions for SIP Trunking
Living in a Network Centric World
Planning the Addressing Structure
Planning the Addressing Structure
Living in a Network Centric World
Living in a Network Centric World
System Center Marketing
Cengage Learning: Computer Networking from LANs to WANs
Helping to Achieve ROI Targets with SIP Trunking
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Digital Voice Recorder Market Size Growth During Forecast Period.
Living in a Network Centric World
Presentation transcript:

draft-bryan-sipping-p2p-usecases-00 David A. Bryan Eunsoo Shim Bruce B. Lowekamp

Use Cases When is P2P SIP useful? How can it be used? RT IP communication VoIP IM Presence Some require P2P, some could be CS or P2P

Scenarios Considered (portions may overlap) Global Internet Environment Large scope and many administrative domains Private networks Corporate to small enterprise Security Demanding Environments Privacy and access considerations Limited Connectivity Ad-hoc or disaster response

Global VoIP Networks Commercial May connect with PSTN Centralized authentication Provide super-peer services Open Maybe no central auth Homesites may provide identity Doesn’t connect to PSTN Reduced infrastructure important for commercial and open networks Challenge is maintaining reliability and security with/without minimal authorities Need to work within existing infrastructure (NATs, firewalls, etc)

Scale Unimportant Global Network Infrastructure and administration cost savings Works with central authority or without Scales Down Small Company VoIP without cost/training of central IP PBX PSTN access provided through regular node Scale back up as company grows

Private: Failover and Redundant Proxies A medium sized company may want a central proxy, but rely on P2P when proxy fails or during upgrades. Larger companies or service providers want redundant proxies, such as used by sip- outbound. One possible organization for these proxies is to internally use P2P Could allow simple configuration of proxy farms

Private: Multi-site Organization Many large companies and organizations have multiple locations Independent networks Behind NATs Not always single VPN Provide connectivity without regard to location across organization or NAT behavior.

Not Just Voice: Content Sharing for CE Consumer electronics increasingly connected Bluetooth phone, headset, laptop, PDA, Nokia 770 Information sharing beyond personal space Different people’s cameras Family members across country Not VoIP, but global presence provides interaction and sharing wherever network connectivity is available

Security: Impeded Access Not all networks offer network neutrality “Triple play” means data provider views other content providers as competitors Access to specific service providers sometimes blocked for competition Access to ports blocked for “security” Difficult to impede access to decentralized system that doesn’t rely on fixed servers or ports

Security: Anonymous Communication Many reasons: Commercial Political persecution Violence History has shown anonymous communication is a useful (sometimes abused) mechanism to force change Various levels of anonymity: Repeatable identity without a known location Single use, untraceable identity Again, impeding access to a P2P communications system without blocking all Internet access is difficult

Security: Small Organizations Many companies and organizations Want private communications Regardless of members’ locations Relying on external provider unacceptable Skill to maintain own servers not available P2P allows minimal configuration to achieve secure communications for small companies.

Limited Connectivity Group of IETF people at a bar want to connect 770s No prior configuration No authority setup No Internet connectivity Developing world Internet/PSTN only available sporadically Provide useful connectivity: Globally when network available Locally when access restricted Scales easily Integrate with available communication infrastructure

Limited Connectivity: First Responder Katrina provided example Unable to anticipate what networks will be available Organizations with separate communication systems may suddenly need to communicate In absence of infrastructure, provide useful connectivity between nodes in area using what routing schemes are available to set up P2P network. Most first responders going all-digital already.

Summary P2P SIP useful for: Global scale networks Large companies Small companies Meeting at a conference Family across the country Few people at a bar

Summary P2P SIP can/should/must provide: Easy configuration Opportunity for anonymity Ability to confirm identity of contact Privacy Fault tolerance Best-effort communications Compatibility with existing base of SIP devices