Comparison between Skype and SIP- based Peer-to-Peer Voice-Over-IP Overlay Network Johnson Lee EECE 565 Data Communications.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Spring 2000CS 4611 Introduction Outline Statistical Multiplexing Inter-Process Communication Network Architecture Performance Metrics.
Camarillo / Schulzrinne / Kantola November 26th, 2001 SIP over SCTP performance analysis
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
AN ANALYSIS OF THE SKYPE PEER-TO-PEER INTERNET TELEPHONY PROTOCOL Presentation by Andrew Keating for CS577 Fall 2009 By Salman A. Baset and Henning Schulzrinne,
Skype & Network Management Taken from class reference : An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning Schulzrinne.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 38 – Voice-over-IP/Skype Klara Nahrstedt Spring 2011.
NAT Traversal for P2PSIP Philip Matthews Avaya. Peer X Peer Y Peer W 2. P2PSIP Network Establishing new Peer Protocol connection Peer Protocol messages.
Voice over IP Skype.
1 An Analysis of the Skype Peer-to- Peer Internet Telephony Protocol Speaker : zcchen.
Review of a research paper on Skype
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman Baset and Henning Schuzrinne INFOCOMM 2006 Presenter - Bob Kinicki Presenter -
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 41 – P2P Streaming (Part 5) Klara Nahrstedt.
Addressing the P2P Bootstrap Problem for Small Overlay Networks David Wolinsky, Pierre St. Juste, P. Oscar Boykin, and Renato Figueiredo ACIS P2P Group.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
DYSWIS1 Managing (VoIP) Applications – DYSWIS Henning Schulzrinne Dept. of Computer Science Columbia University July 2005.
More about Skype. Overview Any node with a public IP address having sufficient CPU, memory and network bandwidth is a candidate to become a super node.
1/20 Introduction Outline Statistical Multiplexing Inter-Process Communication Network Architecture Performance Metrics Implementation Issues.
Reliability and Relay Selection in Peer- to-Peer Communication Systems Salman A. Baset and Henning Schulzrinne Internet Real-time Laboratory Department.
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
Skype & its protocol Aaron Loar CPE 401. Introduction Skype’s Background Topology 3 Node Types Questions.
Peer-to-peer approaches for SIP Henning Schulzrinne Dept. of Computer Science Columbia University.
Dr. Philip Cannata 1 Principles of Network Applications.
Introduction 1 Lecture 5 Application Layer slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering Department.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
Chapter 2, slide: 1 CS 372 – introduction to computer networks* Monday June 28 Announcements: r Lab 1 is due today r Lab 2 is posted today and is due next.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
VoIP Case Study1 VoIP Case Study: Skype Dr. Danny Tsang Department of Electrical & Electronic Engineering Hong Kong University of Science and Technology.
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and.
P2PSIP Charter Proposal Many people helped write this charter…
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
CHAPTER 2. Creating a network app write programs that – run on (different) end systems – communicate over network – e.g., web server software communicates.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Skype Bruce Maggs. 2 Gratuitous Quote of the Day "There have been members of the Maggs family in south east Suffolk since the great subsidy of 1327 but.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Skype P2P Kedar Kulkarni 04/02/09.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
1 Peer-to-Peer Systems r Application-layer architectures r Case study: BitTorrent r P2P Search and Distributed Hash Table (DHT)
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
Peer-to-Peer Communication Systems Protocols and Systems, Reliability, Energy Efficiency and Measurements Salman Abdul Baset Department.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
An analysis of Skype protocol Presented by: Abdul Haleem.
Voice over IP B 林與絜.
VOIP over Peer-to-Peer
Lecture 10. P2P VoIP D. Moltchanov, TUT, Fall 2014
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
The Advanced Encryption Standard Part 1: Overview
Peer-to-Peer Networks - Skype Hongli Luo CEIT, IPFW.
Peer-to-Peer Protocol (P2PP) Salman Baset, Henning Schulzrinne Columbia University.
@Yuan Xue CS 283Computer Networks Spring 2011 Instructor: Yuan Xue.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Skype.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
Gijeong Kim ,Junho Kim ,Sungwon Lee Kyunghee University
Peer to peer Internet telephony challenges, status and trend
Chapter 2 Introduction Application Requirements VS. Transport Services
Skype P2P communication
Presentation transcript:

Comparison between Skype and SIP- based Peer-to-Peer Voice-Over-IP Overlay Network Johnson Lee EECE 565 Data Communications

2 Outline P2P versus Client-Server P2P-SIP design goal Overlay Network of Skype and P2P-SIP Login Sequences Advance Service Comparison Security Performance

3 Peer-to-Peer / Client-Servier Client-Server vs P2P –Scalability –Infrastructure cost Structured vs Unstructured –Search time –Data distribution

4 P2P-SIP Design Goals

5 Skype Overlay Network Unstructured KaZaA predecssor based –Super node –Ordinary node –Login server STUN and TURN protocols for firewall and NAT traversal –Simple Traversal of UDP over NAT –Traversal Using Relay NAT

6 P2P-SIP Overlay Network Based on Chord Distributed Hash Table (DHT) Structured O(log N) lookup time Finger table STUN and TURN firewall and NAT traversal as well

7 Login Sequence 1 - Skype Start Send UDP packet(s) to HC IP address and port Response within 5 s TCP connection attempt with HC IP address and port Connected TCP connection attempt with HC IP address and port 80 (HTTP port) Connected TCP connection attempt with HC IP address and port 443 (HTTPS port) Connected Connection Attempt == 5 Failure Wait for 6 seconds Success Yes No Yes No Yes No Yes No

8 Login Sequence 2 – P2P-SIP Multicast TTL = 1 Service Location Protocol (SLP) [LAN peers] Bootstrap Cached

9 Advanced Services Comparison Offline Messaging Issue – Where to store? –Skype stores at it message originator –P2P-SIP proposes storing it at DHT Replication strategy for reliability Call transfer and call forwarding are SIP features that would be available in non-P2P SIP. –Super node instead of centralized database –Required feature for SIP (not as crucial for Skype)

10 Security P2P-SIP –Malicious Node Hop-by-hop TLS (Tunneling) –Freeriding Incentives –Problem: No centralized login server to certify. Trust via reputation? Skype –Encryption AES 256bits –Key Exchange RSA 2048 –Public Key Certified by Login Server

11 Performance P2P-SIP Scalable? –Yes, suppose nodes support 10 request/sec, minimum refresh rate of one minute, call rate of one call per minute per node Latency? –P2P-SIP: 10,000 node system avg 6 hopes, SIP call setup ~200ms; therefore, 1-2 s delay –Skype Average 3-8 second for user location based on a 2004 study = C = 10, c = 1/60, and r = 1/60 =

12 References 1.Skype Networks. 2.KaZaA. 3.K. Singh and H. Schulzrinne. Peer-to-peer Internet telephony using SIP. Technical Report CUCS , Department of Computer Science, Columbia University, New York, NY, Oct J. Rosenber, Henning Schulzrinne, G. Camarillo, A. R. Johnston, J. Peterson, R. Parks, M. Handley, and E. Schooler, "SIP: session initialiozation, protocol,” RFC 3261, Internet Engineering Task Force, June P2P-SIP. 6.Singh, K. and Schulzrinne, H Peer-to-peer internet telephony using SIP. In Proceedings of the international Workshop on Network and Operating Systems Support For Digital Audio and Video (Stevenson, Washington, USA, June , 2005). NOSSDAV '05. ACM Press, New York, NY, DOI=

Questions/Comments? Thank You For Listening

14 Login Sequence - Incoming

15 Service Location Protocol RFC 2608 Allows computers and other devices to find services in a local area network without prior configuration.local area network “service:printer:lpr://myprinter/myqueue”

16 Advanced Encryption Standard Aka Rijndael Block Cipher Replaces DES (and the modified 3DES) 128, 192, 256 bits keys 1.AddRoundKey — each byte of the state is combined with the round key; each round key is derived from the cipher key using a key schedule. key schedule 2.SubBytes — a non-linear substitution step where each byte is replaced with another according to a lookup table.lookup table 3.ShiftRows — a transposition step where each row of the state is shifted cyclically a certain number of steps. 4.MixColumns — a mixing operation which operates on the columns of the state, combining the four bytes in each column using a linear transformation.