P2P-SIP Presentation Philip Matthews Nimcat / Avaya.

Slides:



Advertisements
Similar presentations
© Exordium Networks All Rights Reserved. Agenda 1. Our Understanding of your needs 2. Our Recommended Solution 3. Who we are 4. Solution Pricing.
Advertisements

Distributed Data Processing
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Design Clinic: Cisco UC Architecture for Corporate Branch Offices Tim Wellborn – CCIE #15397.
NAT, firewalls and IPv6 Christian Huitema Architect, Windows Networking Microsoft Corporation.
Overview of DVX 9000.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations.
AARNet Copyright 2011 Network Operations Cisco Unified Communications Manager SIP Trunking Bill Efthimiou APAN33 SIP workshop February 2012.
How Green is IP-Telephony? Salman Abdul Baset*, Joshua Reich*, Jan Janak**, Pavel Kasparek**, Vishal Misra*, Dan Rubenstein*, Henning Schulzrinne* Department.
Application layer (continued) Week 4 – Lecture 2.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions Avaya IP Office Voic Options.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
SAMwin.innovaphone operator SIP Console for Innovaphone
4.4 Naming And Directory Services Lakshmi Narayana Gupta Kollepara 09/20/2009 CSC-8320.
1 Copyright © 2002 ACNielsen a VNU company 3CX – The VOIP PBX for small to medium businesses Nick Galea, 3CX CEO.
Copyright © 2002 ACNielsen a VNU company 3CX Introduction & Sales Presentation.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Copyright © 2002 ACNielsen a VNU company Key Features and Benefits of the 3CX PBX for Windows Server.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—3-1 Enabling Single-Site On-Net Calling Understanding Endpoints in Cisco Unified Communications.
© Aastra – 2013 BluStar for iPad / iPhone September 2013 BluStar for iPad/iPhone.
Telesnap 2009 Release OCS Gateway. Telesnap OCS Gateway Snapware Server JTAPI Cisco UCM Telesnap OCS Gateway TAPI CSTA ASN1 CSTA XML TSAPI Aastra OpenCom.
Architecture SIP proxy, redirect server SQL database sipd Proxy, Redirect, Registration server. Authentication Programmable (SIP- CGI) OpenSource SQL database:
PIKA Technologies’ fully customizable PBX Platform.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
P2P Networking for Consumer Electronics (CE) Devices November 12, 2005 Eunsoo Shim Greg Perkins Panasonic Digital Networking Laboratory P2P SIP Ad-hoc.
1 NGN Issues - Numbering and Addressing Peter Darling ACIF NGN FOG No. 3.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—4-1 Enabling Single-Site On-Net Calling Implementing MGCP Gateways in Cisco Unified Communications.
DUE Voice over IP (VoIP) Linksys Ernie Friend- FSCJ.
GROUP INVOLVED IN A WEB APPLICATION DEVELOPMENT Continue.
The Role of High Availability Software in Quality of Service Joe McFadden Vice President, Marketing, Nuasis.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Scalability Don McGregor Research Associate MOVES Institute
NuolSec VIspace Vientiane, Laos.
1 © 2008 Avaya Inc. All rights reserved. Enterprise Infrastructure Anne L Coulombe Global Unified Communications Solutions September.
MoVoIX CSD 2005 mozambique voice over ip and ix extension FINAL PRESENTATION.
Interworking between P2PSIP Overlays and IMS Networks: Why? How?
March 12, 2008© Copyright 2008 John Buford SAM Overlay Protocol draft-buford-irtf-sam-overlay-protocol-01.txt John Buford, Avaya Labs Research IETF 71.
A Conference Gateway Supporting Interoperability Between SIP and H.323 Jiann-Min Ho (Presenter) Jia-Cheng Hu Information Networking Institute Peter Steenkiste.
2004 APPA Community Broadband Conference Emerging Technologies: Voice Over IP October 11, 2004 Tim Hoolihan V.P. Marketing and Product Management (949)
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
An analysis of Skype protocol Presented by: Abdul Haleem.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Web-based Enterprise Telephony Application Development Johnny Wong Principal Member of Technical Staff Oracle Corporation.
Sumanth Nag Popuri.  Why do we need SIP ?  The protocol  Instant Messaging using SIP  Internet Telephony with SIP  Additional applications  Future.
Softswitch SIP Proxy Server Call Manager IP Telephony Router Tablet PC IP PBX Class 5 Switch Class 4 Switch PBX Access Gateway Broadband Router Voice Gateway.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Delivering Serverless IP Telephony to the Enterprise Simon Bryden VP Engineering, Popular Telephony.
MX Groups. Page 2 Multiple Sites – What Most are Offering Centralized Intelligence Survivable Gateways at remote sites DISASTER AT MAIN SITE ONLY BASIC.
IP telephony in CESNET Sven Ubik CESNET Association of universities and research institutes in Czech Republic Operates Czech NREN (CESNET2)
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
1 Draft RTC Architecture From “Next Steps for Internet2 Real Time Communications”
1 P2PSIP Peer Protocol Design Questions Presenter: Philip Matthews (based on input from the authors of the various proposals)
Skype.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
IP Telephony (VoIP).
Peer to peer Internet telephony challenges, status and trend
SIX MONTHS INDUSTRIAL TRAINING REPORT
Principles of Network Applications
Peer-to-peer SIP Ad-hoc meeting
Oracle Solaris Zones Study Purpose Only
The Challenge of P2P Communications
Where should services reside in Internet Telephony Systems?
Design Clinic: Cisco UC Architecture for Corporate Branch Offices
Peer-to-peer SIP Ad-hoc meeting
Presentation transcript:

P2P-SIP Presentation Philip Matthews Nimcat / Avaya

Matthews; P2P-SIP; 64th IETF2 Nimcat’s Product

Matthews; P2P-SIP; 64th IETF3 Features PBX system for small-med organization Is P2P; no central component. Phones cooperate to produce PBX functionality Supports many standard PBX features: Call forward, call transfer, conference call, etc. Corporate directory (built automatically) Even features like voic , auto attendant, call logs, etc. are done in a distributed fashion. See for list of featureswww.nimcatnetworks.com

Matthews; P2P-SIP; 64th IETF4 Features (cont.) Designed for resiliency - system still works if some phones become unavailable. Designed to be very “plug-and-play” For basic operation, the only configuration required is to enter your name on your phone. Two ways to connect to outside world Through an optional PSTN gateway box (TTI) Though a SIP service provider

Matthews; P2P-SIP; 64th IETF5 Implementation Uses SIP for signaling Uses a simple proprietary P2P layer Uses multicast to locate peers and join overlay Uses both multicast and unicast to distribute info about each phone Each phone has complete knowledge of other phones Uses various proprietary schemes for distributing services in the P2P environment Not planning to describe details unless group is interested.

Matthews; P2P-SIP; 64th IETF6 Status Nimcat’s business model is to license the software to hardware vendors (= IP phone vendors) One announced licensee (Aastra) is currently shipping product (“Venture IP”). There will be other licensee announcements soon. In September, Nimcat was acquired by Avaya, and ports to various Avaya platforms are underway.

Matthews; P2P-SIP; 64th IETF7 Observations on a P2P Layer for Real-Time Communication

Matthews; P2P-SIP; 64th IETF8 Intro Feel that the P2P layer should be a major focus of this group. Want to talk a bit about requirements and observations on a P2P layer for Real-Time Communications (RTC).

Matthews; P2P-SIP; 64th IETF9 Basics P2P layer = distributed database In RTC, data items stored are mostly information about a user Name IP address of phone Etc. Requirements for a P2P layer for Real-Time Communication (RTC) are not the same as the requirements for file sharing

Matthews; P2P-SIP; 64th IETF10 RTC vs. File-sharing P2P layer for RTCP2P layer for File- sharing # of data items  # of nodes Can be >> # of nodes Size of data itemsSmallCan be large LookupsInfrequent -- not a significant portion of a phone’s workload Can be frequent Join/Leave frequency Low (especially wireline) Can be high

Matthews; P2P-SIP; 64th IETF11 Different Requirements (cont) Most of the academic research into P2P algorithms has implicitly assumed file- sharing as the application. RTC is a different (simpler?) problem.

Matthews; P2P-SIP; 64th IETF12 Enterprise vs. Consumer See (at least) two distinct applications of P2P-SIP Consumer telephony: Skype-like Enterprise telephony: PBX systems for enterprises These two applications have different requirements

Matthews; P2P-SIP; 64th IETF13 Enterprise vs. Consumer Enterprise Hierarchy Natural groups (office, division, etc) that a P2P layer should respect. Artificial? Trust Model -- Authentication (“Can this phone/group join the network?”) is very important. -- Preventing rogue behavior not so important. -- Authentication is not so important -- Preventing rogue behavior is important. Scale 10,000 peers is a large network 10,000 peers is a small network

Matthews; P2P-SIP; 64th IETF14 Final thoughts Are their other RTC applications with different requirements? E.g., Proxy server redundancy? Perhaps a set of drafts, each outlining the requirements on the P2P layer for a particular RTC application is the right place to start?