 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.

Slides:



Advertisements
Similar presentations
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Advertisements

Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
NAT/Firewall Traversal April NAT revisited – “port-translating NAT”
STUN Date: Speaker: Hui-Hsiung Chung 1.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
Skype & Network Management Taken from class reference : An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning Schulzrinne.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 38 – Voice-over-IP/Skype Klara Nahrstedt Spring 2011.
Voice over IP Skype.
1 An Analysis of the Skype Peer-to- Peer Internet Telephony Protocol Speaker : zcchen.
Review of a research paper on Skype
Comparison between Skype and SIP- based Peer-to-Peer Voice-Over-IP Overlay Network Johnson Lee EECE 565 Data Communications.
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman Baset and Henning Schuzrinne INFOCOMM 2006 Presenter - Bob Kinicki Presenter -
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Skype Connected to a SIP PBX
Session Initiation Protocol (SIP) By: Zhixin Chen.
More about Skype. Overview Any node with a public IP address having sufficient CPU, memory and network bandwidth is a candidate to become a super node.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
Skype & its protocol Aaron Loar CPE 401. Introduction Skype’s Background Topology 3 Node Types Questions.
PROS & CONS of Proxy Firewall
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Chapter 2, slide: 1 CS 372 – introduction to computer networks* Monday June 28 Announcements: r Lab 1 is due today r Lab 2 is posted today and is due next.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Copyright Security-Assessment.com 2005 VoIP 2 Is free too Expensive? by Darren Bilby and Nick von Dadelszen.
VoIP Case Study1 VoIP Case Study: Skype Dr. Danny Tsang Department of Electrical & Electronic Engineering Hong Kong University of Science and Technology.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and.
NAT Traversal Speaker: Chin-Chang Chang Date:
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) speaker : Wenping Zhang date :
Skype P2P Kedar Kulkarni 04/02/09.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Telephony Natalie LeCompte Kara Oliver Emily Taylor Joe Thrower.
Skype Pros and Cons In peer-to-peer networking, a supernode works as one of that network's relayers and proxy servers, handling data flow and connections.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
Wireless Network Design Principles Mobility Addressing Capacity Security.
Simon Millard Professional Services Manager Aculab – booth 402 The State of SIP.
An analysis of Skype protocol Presented by: Abdul Haleem.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Voice over IP B 林與絜.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
Lecture 10. P2P VoIP D. Moltchanov, TUT, Fall 2014
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
Multimedia Messenger Function List 박성민. Multimedia Communication Funcs Sup port Call & Conference # of Simultaneous User supported  Voice, Video, Voice.
Interactive Connectivity Establishment : ICE
© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80%
WebRTC Don McGregor Research Associate MOVES Institute
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 11 – VoIP Hardware.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Session Initiation Protocol
jitsi. org advanced real-time communication.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
Skype.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
NAT、DHCP、Firewall、FTP、Proxy
Peer to peer Internet telephony challenges, status and trend
Chapter 2 Introduction Application Requirements VS. Transport Services
Skype P2P communication
Presentation transcript:

 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion

 Voice over Internet Protocol.  Two or more people can speak with each other over internet using their computers.  Skype is the first peer-to-peer based IP telephony.  Normally there are three basic functions: › Resource location › Session establishment and management › Presence status

 P2P are dynamic, reliable and scalable networks.  Resources are shared between the peers (file- sharing).  Resources can be accessed directly from other peers.  There are different kinds of P2P networks: › Structured › Unstructured  Centralized  Pure  Hybrid

 Pro’s › No single point of failure › Can provide anonymity › Reduces the signaling load without reducing the reliability  Con’s › Still signaling traffic › Overlay topology not optimal › Super nodes have to bear a significantly higher load

 Most VoIP system used.  Privative.  Architecture: › Host nodes › Super nodes › Login node  Skype uses a central authentication server to authenticate users.

LOGIN  A skype client authenticates its username and password with login server.  Advertises its presence to other peers and buddies.  Determines the type of NAT and firewall it is behind. NAT TRANSVERSAL AND FIREWALL  A variation of the STUN and TURN protocols to determine the type of NAT and firewall it is behind.

SECURITY  Username and password for authentication.  Uses the Advanced Encryption Standard (AES) for the calls.

 The Session Initiation Protocol is a signaling protocol, used for setting up and tearing down multimedia communication sessions.  One of its applications is in VoIP (P2PSIP).  SIP entities › User Agents (Uas) › SIP Proxy › SIP Registar › SIP Redirect Server

LOGGING IN  By registration Server. The SIP registration server also stores the IP address and port used to connect to each SIP client. NAT TRANSVERSAL AND FIREWALL  Uses STUN to translate Information inside IP packets for NAT and firewall traversal

SECURITY  SIP authenticates by Digest Authentication.  Communication by extension (TLS). Example:

 No differences in the main architecture. › Hybrid P2P. › Supernode in Skype, SIP Proxy and Redirect server in SIP.  Login process is the same in SIP and Skype › Register before direct transmission. › Login Server in Skype and Registar Server in SIP.  Similar NAT and firewall transversal protocol (STUN).

 SIP is open and Skype uses a proprietary protocol.  Skype encrypts communications. SIP don’t (just by extension).  SIP just a little part of the whole protocol (more flexible).  SIP is a standard (compatibility and reuse). Skype just an application.

 SIP and Skype are two different approaches to VoIP communication.  SIP has the strength of flexibility, Skype is easy to install, use and has transparent network access; both offer excellent sound quality.  Nobody knows, whether Skype is a backdoor and really secure.  Skype uses the own “clients” –supernodes- of servers. Less cost more escalability.  SIP-P2P has still work to do for VoIP communications (security, performance…).

Thank you!