Directed SIP Peer-to-Peer Telephony Creating a New Carrier-Class Model Joel Maloff, Ph.D. – EVP and CTO Fusion Telecommunications International

Slides:



Advertisements
Similar presentations
May 2007 Global Technology & Operations | Network Computing Group | Global Enterprise Access & Desktop Services | Network Services Document Release Level/Version:
Advertisements

L. Alchaal & al. Page Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment Lina ALCHAAL Netcelo S.A., Echirolles INRIA.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Voice over IP Skype.
Building IP Video Communication & Collaboration. dialcom provides real-time video communication, collaboration and multimedia sharing capabilities over.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
Technical Architectures
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Chapter 5 Distributed Systems Jeff McCrea. Overview About Distribute Systems (What, When, & How) Six Types of Distributed Systems The IT Infrastructure.
Chapter 3 : Distributed Data Processing
EAI. 2/31 Example: a simple supply chain purchase order deliver goods write invoice order atricle check availability document customer-contact not available.
Internet GIS. A vast network connecting computers throughout the world Computers on the Internet are physically connected Computers on the Internet use.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Osama Shahid ( ) Vishal ( ) BSCS-5B
Cloud Computing Brian Curran, Sabatino DeRico, Mike Delisa, Mudit Goel, Jon Guagenti, Jess Caso, Greg Flynn.
Case Study Paul Dawson. Agenda Business Model Background Core Technology Revenue Stream Performance Competitive Advantage & Marketing Competition Growth.
Copyright Security-Assessment.com 2005 VoIP 2 Is free too Expensive? by Darren Bilby and Nick von Dadelszen.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Voice over IP Spring LNA Meeting April 1, What is Voice over IP? n A technology for transporting integrated digital voice, video and data over IP.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Joseph Ferracin Director IT Security Solutions Managing Security.
The Future of Unified Communications Jim Greenway VP, Marketing, U4EA UC Definition SMB a Large Opportunity –Market for UC in SMB –Examples Conclusion.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
X-Internet COMS E Web-enHanced Information Management Hyun Min Lee
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
(CISCO) Self-Defending Networks Ben Sangster. Agenda (CISCO) Self-Defending Network Concept Why do we need SDN’s? Foundation of the CSDN? Endpoint Protection.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). 
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Introduction to 學校:大同大學 班級: GI1 學號: 姓名:李奕銳 教師:葉慶隆 Jabber 1.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
Web Portals Gateway To Information Or A Hole In Our Perimeter Defenses sm sm Deral Heiland – Layered Defense Research.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
TELECOMMUNICATIONS AND NETWORKS
Host–Based Processing Development Opportunities in Hybrid VoIP Environments.
| nectar.org.au NECTAR TRAINING Module 4 From PC To Cloud or HPC.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
October 10-13, 2006 San Diego Convention Center, San Diego California SIP Peer-to-Peer Telephony Creating a New Carrier-Class Model Joel.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
ITExpo January 24, 2006 Networks C OGNITRONICS Network Media Servers Conferencing and Collaboration Mike Keefe CTO Presented by.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
LEADING FACET OF NETWORKING- CLOUD COMPUTING. Infrastructure provided by the service provider to build internet application. The service provided by cloud.
Vodafone Business Cloud
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Avenues International Inc.
IT Architecture Technical blueprint for evolving a corporate infrastructure resource that can be shared by many users and services processing systems hardware.
Software Design and Architecture
Chapter 3 : Distributed Data Processing
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Presentation transcript:

Directed SIP Peer-to-Peer Telephony Creating a New Carrier-Class Model Joel Maloff, Ph.D. – EVP and CTO Fusion Telecommunications International

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara Objectives To describe the approaches used to blend the superior attributes of SIP Peer-to-Peer telephony with techniques that provide high quality services at low cost to the service provider. To understand the security vulnerabilities introduced by the P2P “super node” concept, and more attractive alternatives. To define “carrier class” SIP P2P telephony services, and highlight a model for their delivery.

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara Peer-to-Peer Telephony Models The Skype Model SIP P2P Model Directed SIP P2P (DSP) Model How do these models differ architecturally? What are the security implications? Scalability Consumer-Grade vs. Carrier-Class

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara The Skype Model As understood from publicly available sources. –Skype is a quasi-Peer-to-Peer service using a small infrastructure for registration and enlisting unsuspecting end-users as “super nodes” to act as the presence coordination and interconnection link between users. –On an average day, there are approximately 20,000 users whose machines have been enlisted by Skype as super nodes – mostly without their knowledge ( March 2006).

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara The Skype Super Node Issue This is an example of the impact that the super node function has on a PC. One minute intervals show Skype super node function capturing +/- 100 mbps Source: 17 July 2006http://

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara Skype Issues The Skype model relies on the ignorance of the public concerning the enlistment of super nodes. Super nodes compromise the most basic network security policies in corporate environment. The Skype “keep-alive functionality has the potential to decrease hard drive life by as much as 50%. The Skype model is proprietary, has not been disclosed, and has not been patented. As of 19 July 2006, it is reported that a Chinese company has cracked the Skype code, reversed engineered it, and plans to deploy WITHOUT super node functionality.

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara SIP P2P Model One of the major criticisms of Skype is the closed proprietary approach. Various working groups including the IETF and a team from Columbia University have been working on a SIP P2P model (“Peer-to-Peer Internet Telephony Using SIP). –For these models to work, however, almost all of them retain the “super node” concept for decentralization and economies of scale as opposed to more traditional client server models. –The advantage of this approach is the ability to build functionality as a community via the open standards architecture.

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara Directed SIP P2P (DSP) Model The DSP approach (patent pending – Fusion Telecommunications International) incorporates SIP but uses a distributed server architecture to direct calls and establish presence rather than enlisting consumers and businesses as “super nodes.” –In this way, the best aspects of client-server are combined with the cost benefits of P2P and SIP.

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara Security Implications Any model that uses a super node must punch holes through a corporate network’s perimeter defenses or a consumer’s desktop firewall. Typical server security vulnerabilities and vectors can be exploited to compromise services, capture confidential information, or be used as a vehicle to invade other machines. Many corporations and government entities are banning Skype and similar services due to these risks.

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara Scalability True Peer-to-Peer telephony may have great promise for enterprises. Limited numbers of users employing sophisticated applications on their PCs or using VoIP-specific devices in an encrypted, tunneled or VPN environment can be quite valuable. –Attempting to scale these systems in a secure, well- managed environment to multiple millions is impractical. Super node-based models can work only as long as the users are unconcerned about their flaws OR until there are better models.

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara Scalability The DSP model is designed to scale infinitely through the use of geographically dispersed nodes that are part of the core infrastructure.

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara Consumer-Grade vs. Carrier-Class An underlying issue of concern to VoIP developers is the distinction between consumer-grade and carrier-class VoIP solutions. –Consumer grade is a generally a free service offered by an entity that has very little traditional telephony infrastructure, and for off-net calling, must interface with one or more other carriers. End-to-end quality control is beyond their reach or their concern. –Carrier class includes advanced VoIP services, such as DSP telephony, that are layered on top of traditional telephony services and may incorporate soft switch functionality and interconnection with hundreds of other carriers. –Just as most Internet Service Providers began as technical entrepreneur driven and evolved into professional organizations, so too will VoIP providers – evolving into carrier-class providers.

August 8-10, 2006 Santa Clara, California Hyatt Regency Santa Clara Conclusions As VoIP developers, it is critical to understand where the market is evolving and what will be expected from your solutions. Some of these include: –Hardened applications that are security-aware and do not expose end-users to unnecessary risk. –Scalable applications that address the needs of both enterprises AND global carriers. –The distinction between consumer-grade and carrier- class applications/services.