Information-Centric Networks Section # 9.3: Clean Slate Instructor: George Xylomenos Department: Informatics.

Slides:



Advertisements
Similar presentations
SIP, Presence and Instant Messaging
Advertisements

IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
Information-Centric Networks09c-1 Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks –V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass,
A Presentation on H.323 Deepak Bote. , IM, blog…
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
CCNA – Network Fundamentals
29.1 Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Wireless & VoIP Christian Huitema February 26, 2000.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Application layer (continued) Week 4 – Lecture 2.
Session Initiation Protocol (SIP) By: Zhixin Chen.
VoCCN: Voice over Content-Centric Networks Van Jacobson et.al Palo Alto Research Center (PARC) ReArch ’09,Rome, Italy Akmal Khan Topics in Internet SNU.
 3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication.
12/05/2000CS590F, Purdue University1 Sip Implementation Protocol Presented By: Sanjay Agrawal Sambhrama Mundkur.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
Voice and Data Integration over IP An analytical overview of voice-over-IP Prabhu Sivarja Wichita State University, Wichita, KS Spring 2003.
Introduction to SIP Speaker: Min-Hua Yang Advisor: Ho-Ting Wu Date:2005/3/29.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
Review of the literature : VoCCN: Voice-over Content-Centric Networks Takashima Daiki Waseda University, Japan 1/13.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 8 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Computer Networks: Multimedia Applications Ivan Marsic Rutgers University Chapter 3 – Multimedia & Real-time Applications.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
H.323 An International Telecommunications Union (ITU) standard. Architecture consisting of several protocols oG.711: Encoding and decoding of speech (other.
1 © NOKIA FILENAMs.PPT/ DATE / NN Helsinki University of Technology Department of Electrical and Communications Engineering Jarkko Kneckt point to point.
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
Simon Millard Professional Services Manager Aculab – booth 402 The State of SIP.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
E Multimedia Communications Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia.
Voice over IP B 林與絜.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Session Initiation Protocol (SIP) Chapter 5 speaker : Wenping Zhang data :
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
Information-Centric Networks Section # 3.2: DNS Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.3: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 7.2: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 10.2: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 3.1: DNS Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.2: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 7.1: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 1.1: Introduction Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.1: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 10.3: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 4.2: Routing Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
Information-Centric Networks Section # 2.3: Internet Evolution Instructor: George Xylomenos Department: Informatics.
Multimedia Streaming I. Fatimah Alzahrani. Introduction We can divide audio and video services into three broad categories: streaming stored audio/video,
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
3/10/2016 Subject Name: Computer Networks - II Subject Code: 10CS64 Prepared By: Madhuleena Das Department: Computer Science & Engineering Date :
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Presented by Maria Shah. Road Map  VoIP Benefits  VoIP Protocols  VoIP Analysis  Advantages  Disadvantages  Implementing  Security  Summary.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
سمینار تخصصی What is PSTN ? (public switched telephone network) تیرماه 1395.
IP Telephony (VoIP).
Instructor Materials Chapter 9: Transport Layer
Presentation transcript:

Information-Centric Networks Section # 9.3: Clean Slate Instructor: George Xylomenos Department: Informatics

Funding These educational materials have been developed as part of the instructors educational tasks. The “Athens University of Economics and Business Open Courses” project only funded the reformatting of these educational materials. The project is being implemented as part of the Operational Program “Instruction and Lifelong Learning” and is co- financed by the European Union (European Social Fund) and national funds.

Licencing These educational materials are subject to a Creative Commons License.

Information-Centric Networks09c-4 Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks –V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass, P. Stewart, J. D. Thornton, R. L. Braynard –ACM ReArch 2009 Main point –Content-centric targets fetching/downloading applications –Can it work for other applications, too? , streaming and (especially) VoIP? –VoCCN: Voice over CCN (instead of IP) –Based on certain key properties of CCN

Introduction Most new architectures place content at the center –Good fit for content exchange applications (WWW, P2P) –What about conversational applications (VoIP, e-commerce)? VoCCN addresses the issue of CCN suitability –Real-time, conversational, telephony over CCN –Simpler, more secure and more scalable than VoIP –Uses SIP and RTP to securely interoperate with VoIP –Employs a stateless IP to CCN gateway –Model for mapping conversational applications to CCN Information-Centric Networks09c-5

VoIP background VoIP components –Endpoints are represented by fixed proxies The endpoints can be mobile or have dynamic IP addresses –Signaling established via SIP (Session Initiation Protocol) Caller to caller’s proxy, to callee’s proxy, to callee The proxies must know where the endpoints reside –Data exchange directly between endpoints The caller’s invite indicates its address for RTP data The callee’s accept indicates address for RTP data –Media can be secured via SRTP or tunneling inside DTLS –Signaling can be secured via DTLS/PKI or MIKEY Authentication and encryption are tricky to setup Usually everything ends up unencrypted and unathenticated! Information-Centric Networks09c-6

Architecture VoIP is harder than it needs to be –The caller simply wants to talk to the callee –The network requires finding the callee’s phone IP address This is where the SIP proxies come into play –In content-oriented networking this should be redundant VoCCN has to solve a different set of problems –Service rendezvous: the callee must offer a contact point In IP this is the TCP/UDP port to which the application listens –In CCN we must request content that has not been published The network must route the request to potential publishers The publishers should then create and publish the content Information-Centric Networks09c-7

Architecture VoCCN has to solve a different set of problems –The service rendezvous must transition to a conversation In IP the SIP packets contain information in an SDP payload –In CCN we need dynamically constructible names Construct the name of a piece of content without being told Two requirements for content name construction –Deterministic algorithm to produce names Names rely on information available to both endpoints Cannot use (say) content hashes as names –Support for partial specification of names Constructing unique names requires prearrangement Partial names allow unique names to be used eventually –Structured names can satisfy both requirements Information-Centric Networks09c-8

Architecture In CCN content uses hierarchical naming –Interest packets specify a name prefix and some rules The rules specify what matching content to return –CCN routers use prefix matching to direct Interests Sent towards content sources that have registered availability –Sources do not need to register the exact content, only prefixes Content can be generated on the fly –Data packets reverse the path taken by interests VoCCN signaling –Each VoCCN endpoint has an identity (e.g. –The endpoint registers to offer data in a specific namespace Based on service and identity (e.g. /ccnx.org/sip/alice/invite) Information-Centric Networks09c-9

Architecture VoCCN signaling –A caller sends an Interest asking for content from the callee The well-known prefix is extended with unique data A session key encrypted with the callee’s public key The SIP invite data encrypted with the session key –The callee responds with a data packet generated on the fly Uses the name indicated by the caller Includes the SIP accept data encrypted with the session key VoCCN data exchange –Uses a sequence of names based on rendezvous information Call-id+endpoint+sequence (e.g. /ccnx.org/alice/call-id/rtp/seqno) Each Interest is matched by a unique data packet –Can issue many interests to pipeline data flow As data packets arrive, more interests are generated Information-Centric Networks09c-10

Advantages Easy location of endpoints –In IP the endpoint needs to register its IP address with a proxy –With CCN a prefix can be registered at many areas The Interest will be routed to all of them The endpoint will respond from its current location Endpoints can prove their identity –All the credentials needed are at the endpoint The private key needed to decrypt the session key –No need to change identity to IP address mappings Advanced services are easy to build –Exploits the built-in multipoint routing of CCN Follow call requests or copy and process call contents Information-Centric Networks09c-11

VoCCN/VoIP interoperability Based on a stateless VoCCN/VoIP gateway –SIP and SRTP are used to simplify the exchange –The gateway acts as a SIP proxy that translates packets –A SIP/SRTP packet is translated to a CCN data packet They match CCN interest packets from VoCCN endpoints The gateway also generates an Interest for the next packet This matches the next data packet from the VoCCN endpoint The VoCCN packet is translated to an IP packet –The proxy does not maintain state on conversations Every action is based on received packets –Signaling security is provided for the CCN part only The IP part may have its own SIP signaling security mechanism End-to-end data security does not involve the gateway Information-Centric Networks09c-12

Implementation Implementation data –VoCCN client based on Linphone Uses extensible SIP and RTP libraries Simple plugins for the CCN part –CCN routers on all routers and endpoints CCN routers communicate over a UDP overlay Security –Many ways to get public keys in CCN Ask for /ccnx.org/users/alice/KEY and accept on faith Publish key as CCN content signed by a trusted third party –VoCCN used MIKEY to secure the data exchange MIKEY is initiated during the SIP signaling exchange –The signaling exchange is protected with public keys Information-Centric Networks09c-13

Implementation Performance –Direct exchange between two machines in the same LAN –Compared stock Linphone with VoCCN version –No perceptible impact from packet signing with 1024 bit RSA keys –No packet loss, but some delayed packets in the latter case –Similar jitter for both versions Information-Centric Networks09c-14

End of Section # 9.3 Course: Information-Centric Networks, Section # 9.3: Clean Slate Instructor: George Xylomenos, Department: Informatics