Voice over IP Skype.

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing Case Study: Skype.
Advertisements

Lync /11/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Reza hooshangi ( ). short history  One of the last major challenges for the web is to enable human communication via voice and video: Real Time.
NAT/Firewall Traversal April NAT revisited – “port-translating NAT”
AN ANALYSIS OF THE SKYPE PEER-TO-PEER INTERNET TELEPHONY PROTOCOL Presentation by Andrew Keating for CS577 Fall 2009 By Salman A. Baset and Henning Schulzrinne,
CSE 222a Final Project - UCSD Spring 2007 p2p DNS addressing Presented By- Anup Tapadia Alexander Loukissas Justin Wu.
Skype & Network Management Taken from class reference : An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning Schulzrinne.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 38 – Voice-over-IP/Skype Klara Nahrstedt Spring 2011.
1 An Analysis of the Skype Peer-to- Peer Internet Telephony Protocol Speaker : zcchen.
Review of a research paper on Skype
Comparison between Skype and SIP- based Peer-to-Peer Voice-Over-IP Overlay Network Johnson Lee EECE 565 Data Communications.
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman Baset and Henning Schuzrinne INFOCOMM 2006 Presenter - Bob Kinicki Presenter -
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 41 – P2P Streaming (Part 5) Klara Nahrstedt.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Skype Connected to a SIP PBX
What we will cover… Home Networking: Network Address Translation (NAT) Mobile Routing.
More about Skype. Overview Any node with a public IP address having sufficient CPU, memory and network bandwidth is a candidate to become a super node.
Peer-to-Peer Intro Jani & Sami Peltotalo.
Reliability and Relay Selection in Peer- to-Peer Communication Systems Salman A. Baset and Henning Schulzrinne Internet Real-time Laboratory Department.
Internet Collaboration Tools: VoIP Spencer S. Eccles Health Sciences Library University of Utah Health Sciences Center.
VoIP Michael Laport Robin Heath “I truly believe that VoIP is the telecommunications wave of the future,” said Travis Mack, a VoIP customer of only a year.
Skype & its protocol Aaron Loar CPE 401. Introduction Skype’s Background Topology 3 Node Types Questions.
Section 461.  ARP  Ghostbusters  Grew up in Lexington, KY  Enjoy stargazing, cycling, and mushroom hunting  Met Mario once (long time ago)
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Copyright Security-Assessment.com 2005 VoIP 2 Is free too Expensive? by Darren Bilby and Nick von Dadelszen.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How VoIP and Skype Work.
Voice Over IP (VoIP) “On A Shoe String “
03/02/2005 David Keffer UOIT Student # Internet Telephony CURS4161 Curriculum Studies – Computer Studies II David Keffer UOIT Student #
VoIP Case Study1 VoIP Case Study: Skype Dr. Danny Tsang Department of Electrical & Electronic Engineering Hong Kong University of Science and Technology.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and.
VoIP: Skype architecture & complete call setup Seminar 2 By: Prateek Arora.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Skype Bruce Maggs. 2 Gratuitous Quote of the Day "There have been members of the Maggs family in south east Suffolk since the great subsidy of 1327 but.
Our Last Class!!  summary  what does the future look like?
Skype P2P Kedar Kulkarni 04/02/09.
P2P VoIP Speaker : Ching Chen Chang Date: 2007/09/27.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Skype Pros and Cons In peer-to-peer networking, a supernode works as one of that network's relayers and proxy servers, handling data flow and connections.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
An analysis of Skype protocol Presented by: Abdul Haleem.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
GL-eNestlé Skype Functionalities –Free peer-to-peer calls from PC to PC –Very cheap to call traditional phone numbers (SkypeOut, free in North America)
Lecture 10. P2P VoIP D. Moltchanov, TUT, Fall 2014
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
WebRTC Don McGregor Research Associate MOVES Institute
External Messaging Services. Page 2 External Messaging: Extends the power of Presence and Instant Messaging outside corporate Network Provided only to.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 11 – VoIP Hardware.
Peer-to-Peer Networks - Skype Hongli Luo CEIT, IPFW.
BY ANTHONY HARRIS. What is Skype Link below is video Communication software Enables live conversation video chat Live conversation via webcam IM communication.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
Skype.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
NAT (Network Address Translation)
By Asma Hamad Alharbi.
Instructor Materials Chapter 5 Providing Network Services
An Experimental Study of the Skype Peer-to-Peer VoIP System
VPN-Implementation Using UBUNTU OS and OpenVPN and Hamachi in client-server environment. By Ruphin Byamungu, Kusinza United States International University-Nairobi.
Skype P2P communication
Request for Comments(RFC) 3489
Presentation transcript:

Voice over IP Skype

Skype The largest and most well know P2P Internet telephony operator Started in 2003, grew in only 1.5 years from nothing to a rapidly expanding Internet telephony operator over 2 million active users as of March 2005

Skype products Basic skype SkypeOut SkypeIn Skype API Free phone calls from computer to computer on the Internet Similar to MSN, Yahoo IM, but better voice quality SkypeOut a low cost way to make calls from Skype to traditional landlines or mobile phones. e.g. use SkypeOut to call the United Kingdom you can save up to 80% per minute compared with Bell Canada SkypeIn get your own, regular phone number, receive phone calls from anywhere In Beta test Skype API an open application programming interface (API) that enables third parties to develop their own add-ons for Skype Business users can develop their application systems based on Skype

Skype technology Based on peer-to-peer network Proprietary protocols minimal network infrastructure Utilize its users’ computers to do the work three types of hosts: ordinary hosts, Skype users super nodes, Skype users with sufficient computing power, memory and network bandwidth login servers, for authentication Skpye owns only the login servers Proprietary protocols

Connect to Skype network Each Skype client maintains a host cache which is a list of IP addresses of known super nodes. Initially empty. super nodes are responsible for locating users, routing calls and providing the clients information about hosts currently connected to the network. A Skype client must connect to the network through super nodes

Connect to Skype network First login When Skype client is run for the first time after intallation, it will communicate with the Skype server (skype.com) After that, the client’s host cache is filled with IP addresses of 7 bootstrap super nodes. Establish a connection with one of them authenticate the user name and password with the Skype login server The host cache is periodically updated with the IP address of new super nodes Subsequent login Choose one super nodes from the host cache and establish a connection to that super node

Call establishment User lookup “Global Index” technology that keeps track of which users have used the network in the near past Skype claims, that any user who has logged in to the network in the last 72 hours can be found After acquiring the callee’s IP address, the caller establishes a connection to the callee and send signaling messages. After the callee answered the call, voice packets are sent directly between the two parties. If one or both of the parties are behind NAT or firewall, they communicate through another Skype online node

Other issues Security Voice quality NAT and firewall All communication is encrypted with Advanced Encryption Standard (AES) The AES encryption keys are transmitted between hosts using the Rivest, Shamir, & Adleman (RSA) algorithm. Voice quality wideband codecs: allow 50 – 8000 Hz to pass through NAT and firewall Skype uses Simple Traversal of User Datagram Protocol (STUN) and Traversal Using Relay NAT (TURN) algorithms to determine the type of firewalls and NAT