The NAT Traversal Problem in P2PSIP Bruce Lowekamp (SIPeerior) Philip Matthews (Avaya)

Slides:



Advertisements
Similar presentations
Re-INVITE Handling draft-camarillo-sipping-reinvite-00.txt
Advertisements

Message Sessions Draft-campbell-simple-im-sessions-01 Ben Campbell
Fall VoN 2000 SIP Servers SIP Servers: A Buyers Guide Jonathan Rosenberg Chief Scientist.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom.
The Chord P2P Network Some slides have been borowed from the original presentation by the authors.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
NAT Traversal for P2PSIP Philip Matthews Avaya. Peer X Peer Y Peer W 2. P2PSIP Network Establishing new Peer Protocol connection Peer Protocol messages.
Comparison between Skype and SIP- based Peer-to-Peer Voice-Over-IP Overlay Network Johnson Lee EECE 565 Data Communications.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID STUN, TURN and ICE Cary Fitzgerald.
ICE Jonathan Rosenberg dynamicsoft. Issue 1: Port Restricted Flow This case does not work well with ICE right now Race condition –Works if message 13.
RTSP NAT Traversal Update Magnus Westlund (Ericsson) Thomas Zeng (PVNS, an Alcatel company) IETF-60 MMUSIC WG draft-ietf-mmusic-rtsp-nat-03.txt.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
SIP, NAT, Firewall SIP NAT Firewall How to Traversal NAT/Firewall for SIP.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
P2P Course, Structured systems 1 Introduction (26/10/05)
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
SIP and NAT Dr. Jonathan Rosenberg Cisco Fellow. What is NAT? Network Address Translation (NAT) –Creates address binding between internal private and.
Section 461.  ARP  Ghostbusters  Grew up in Lexington, KY  Enjoy stargazing, cycling, and mushroom hunting  Met Mario once (long time ago)
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
DHCP for Multi-hop Wireless Ad-Hoc Networks Presented by William List.
RTP Relay Support in Intelligent Gateway Author: Pieere Pi
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
P2PSIP Charter Proposal Many people helped write this charter…
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
NAT Traversal Speaker: Chin-Chang Chang Date:
All rights reserved © 1999, Alcatel, Paris. page n° 1 SIP for Xcast SIP for the establishment of xcast-based multiparty.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Improving the Routing Efficiency of SIP Instant Message SIP 即時傳訊之繞送效能研究 adviser : Quincy Wu speaker : Wenping Zhang date :
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
The HIP-HOP proposal draft-matthews-p2psip-hip-hop-00 Philip Matthews
PPSP NAT traversal Lichun Li, Jun Wang, Wei Chen {li.lichun1, draft-li-ppsp-nat-traversal-02.
1 NAT & RTP Proxy Date: 2009/7/2 Speaker: Ni-Ya Li Advisor: Quincy Wu.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Simon Millard Professional Services Manager Aculab – booth 402 The State of SIP.
Problems in using HIP for P2PSIP Philip Matthews Avaya
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
March, 2009 OS7x00 no MGI Solution Introduction Distribution EnglishED01.
Lecture 10. P2P VoIP D. Moltchanov, TUT, Fall 2014
1 Requirements for Internet Routers (Gateways) and Hosts Relates to Lab 3. (Supplement) Covers the compliance requirements of Internet routers and hosts.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Magnus Westerlund 1 The RTSP Core specification draft-ietf-mmusic-rfc2326bis-06.txt Magnus Westerlund Aravind Narasimhan Rob Lanphier Anup Rao Henning.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Security Mechanisms and Key Refresh for P2PSIP Overlays draft-birkos-p2psip-security-key-refresh-00 Konstantinos Birkos University of Patras, Greece
1 Media Session Authorization Dan Wing draft-wing-session-auth-00.txt.
March P2PSIP Routing Discussion (“Routing: what does it look like?) Spencer Dawkins IETF 70 – December 2007 Vancouver, British.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
The eXtensible Peer Protocol (XPP) Emil Ivov - Enrico Marocco –
RELOAD draft-bryan-p2psip-reload-01 draft-lowekamp-p2psip-reload-security-01 Bruce Lowekamp David Bryan Jim Deverick Marcia Zangrilli.
1 P2PSIP Peer Protocol Design Questions Presenter: Philip Matthews (based on input from the authors of the various proposals)
ID-LOC Proposal Philip Matthews Eric Cooper Alan Johnston Avaya With contributions from Cullen Jennings, David Bryan, and Bruce Lowekamp.
Peer-to-Peer Protocol (P2PP) Salman Baset, Henning Schulzrinne Columbia University.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
MSRP (The Message Session Relay Protocol) 姓名:張文萍 日期: 2007/04/02.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
NAT (Network Address Translation)
Chapter 6 Delivery & Forwarding of IP Packets
Transmission Control Protocol (TCP) Retransmission and Time-Out
The Chord P2P Network Some slides have been borrowed from the original presentation by the authors.
Forwarding and Routing IP Packets
Chapter 6 Delivery & Forwarding of IP Packets
LOCSER + HIP draft-hautakorpi-p2psip-peer-protocol-00
Introducing To Networking
Net 431: ADVANCED COMPUTER NETWORKS
Chapter 6 Delivery & Forwarding of IP Packets
Presentation transcript:

The NAT Traversal Problem in P2PSIP Bruce Lowekamp (SIPeerior) Philip Matthews (Avaya)

NATs cause problems for P2PSIP overlays NAT About 90% of NATs will drop inbound packets for a peer unless there is a previously-established “connection” with the sender.

NAT Traversal vs. Msg Type P2PSIP will have (at least) 3 different message types: –Peer/Client Protocol msgs –SIP msgs –RTP (or other media transport protocol) msgs For RTP (or other media protocol), use ICE and STUN to establish direct media stream For SIP and Peer/Client Protocol msgs, problem is more complex. Here, two solutions have been proposed: –The “superpeer” approach –The “fully-distributed” approach These solutions provide traversal and/or routing for peer/client and SIP messages across the overlay and can provide relay for RTP if needed.

The “Superpeer” solution O S O O NAT S O O S Peers with public IP addresses and other ‘good’ properties are promoted to “superpeers” (S). These peers can freely exchange messages with each other. Each “ordinary peer” (O) establishes a Peer Protocol connection to an ordinary peer. These peers can exchange messages directly with its superpeer, and indirectly with other peers with the help of its superpeer.

The “Fully-Distributed” approach NAT Each peer establishes a small number of Peer Protocol connections to other peers (a partial mesh). A message may traverse multiple hops to get to its destination.

Example: Fully-Distributed approach w/ Chord X C B A D Chord uses exponentially spaced entries in finger table. Each peer uses “greedy routing” to route a message to its neighbor that is closest to the final destination. Establish connections through NATs to make connection table match DHT routing.

Using ICE to Open New Connections NAT 1.Initially inbound connections are rejected 2.Proxy INVITE with ICE sdp through established connection to establish new {peer protocol, SIP, RTP} connection 3.New connection now established INVITE 1 2 3

Comparison of approaches Superpeer Establish connections with an Outbound-like scheme? (Pro) “Classic” scheme used by many P2P systems today (Con) Requires there be enough peers eligible for superpeer status. May limit DHT to superpeers? Need mechanism to assign ordinary peers to superpeers Fully-Distributed Establish connections using SIP signaling with ICE. (Con) No operational experience w/ approach. (Pro) No requirement that some peers have public IP addresses. (Pro) No limits on DHT participation? (Con) May require up to Log 2 N hops.

More on Routing (either approach) Direct Routing. –Send msg directly to destination. May work in some cases. Recursive Routing –Send msg to neighbor nearest to destination. Ask neighbor to forward msg for you. Iterative Routing –Send msg to neighbor nearest to destination. Neighbor replies with a redirect to another peer U. –Use direct or recursive routing to set up a connection to peer U. –Repeat.

Establishing a Peer Protocol Connection Peer XPeer UPeer V Peer Y INVITE (To:Y; R-D:Proxy) 200 OK ACK ICE Connnectivity Checks Direct PeerProtocol Connection Established INVITE (Replaces) 200 OK ACK BYE 200 OK [See draft-matthews-p2psip-bootstrap-mechanisms for how first connection might be established.]