www.itexpo.com October 10-13, 2006 San Diego Convention Center, San Diego California SIP Peer-to-Peer Telephony Creating a New Carrier-Class Model Joel.

Slides:



Advertisements
Similar presentations
October 10-13, 2006 San Diego Convention Center, San Diego California VoIP/SOA Integration Impact on IT Apps, Processes, & Overall Business.
Advertisements

May 2007 Global Technology & Operations | Network Computing Group | Global Enterprise Access & Desktop Services | Network Services Document Release Level/Version:
Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Technical Architectures
Skype Connected to a SIP PBX
October 4-7, 2004 Los Angeles, CA Changing the VoIP Paradigm: Delivering Value over IP John Meyer President, Lucent Worldwide Services.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Web 3.0 or The Semantic Web By: Konrad Sit CCT355 November 21 st 2011.
October 10-13, 2006 San Diego Convention Center, San Diego California Introduction to WiFi Telephony Thursday - 10/12/06, 8:30-9:15am David.
How to Leverage Skype in Call Centers David Tang – VoSKY VP of Global Marketing.
Internet GIS. A vast network connecting computers throughout the world Computers on the Internet are physically connected Computers on the Internet use.
October 10-13, 2006 San Diego Convention Center, San Diego California Taking IP Security to the Next Level Real-time threat mitigation.
Copyright Security-Assessment.com 2005 VoIP 2 Is free too Expensive? by Darren Bilby and Nick von Dadelszen.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
1 Yoram Arbel C o m o x Convergent Communication Applications Using SIP Yoram Arbel Comox Inc.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Chapter 4 Networking and the Internet Introduction to CS 1 st Semester, 2015 Sanghyun Park.
Can VoIP Replace “Legacy Voice” in Asia? Steven Rago Principal Analyst, iSuppli Corporation.
The Future of Unified Communications Jim Greenway VP, Marketing, U4EA UC Definition SMB a Large Opportunity –Market for UC in SMB –Examples Conclusion.
MAEDS 45 th Annual Conference October , 2009.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Exploring the Network.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
October 10-13, 2006 San Diego Convention Center, San Diego California Billing Primer TMC IT Expo – Oct 2006 Bala Janakiraman Sonus Networks.
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
| E. Marocco, G. Canal Lucent, 2006, 26 th October P2PSIP: Interworking Enrico Marocco Research Engineer
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
October 10-13, 2006 San Diego Convention Center, San Diego California SIP Isn’t Just for Voice Anymore Delivering Applications and Services.
(CISCO) Self-Defending Networks Ben Sangster. Agenda (CISCO) Self-Defending Network Concept Why do we need SDN’s? Foundation of the CSDN? Endpoint Protection.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). 
October 10-13, 2006 San Diego Convention Center, San Diego California High Availability Corporate Faxing Disaster Recovery and Business.
Introduction The network is the computer By Waseem Anwar Chaudhri.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
The State of VoIP Peering Charles Studt Director of Product Management, VoEX.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
October 10-13, 2006 San Diego Convention Center, San Diego California SIP Trunking… Why is it so important?
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Directed SIP Peer-to-Peer Telephony Creating a New Carrier-Class Model Joel Maloff, Ph.D. – EVP and CTO Fusion Telecommunications International
October 10-13, 2006 San Diego Convention Center, San Diego California Effective Deployment and Migration Strategies Leigh Fatzinger, VP.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
SIP-ify the Base Jon R. Doyle VP Business Development CommuniGate Systems.
Adoption of IP in the Next Generation Contact Center Rupesh ChokshiGautham NatarajanDirector, AT&T.
William Stallings Data and Computer Communications
Intelligent Interconnects in the VoIP Peering Environment
1 Recommendations Now that 40 GbE has been adopted as part of the 802.3ba Task Force, there is a need to consider inter-switch links applications at 40.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
| nectar.org.au NECTAR TRAINING Module 4 From PC To Cloud or HPC.
To Rent or Buy the IP PBX? Maybe it’s Both…. Building a VoIP Solution That Enables Both.
© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80%
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
Video Makes its Way into the Enterprise Stefan Karapetkov Emerging Technologies Director Polycom.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
CCI BUSINESS James W. Yates, MBA Regional Solutions Engineering Manager.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
IT Architecture Technical blueprint for evolving a corporate infrastructure resource that can be shared by many users and services processing systems hardware.
Network and the internet
Presentation transcript:

October 10-13, 2006 San Diego Convention Center, San Diego California SIP Peer-to-Peer Telephony Creating a New Carrier-Class Model Joel Maloff, Principal Consultant Maloff NetResults Telephone: Web: Blog:

October 10-13, 2006 San Diego Convention Center, San Diego California Objectives To describe the approaches used to blend the superior attributes of SIP Peer-to-Peer telephony with techniques that provide high quality services at low cost to the service provider. To understand the security vulnerabilities introduced by the P2P “super node” concept, and more attractive alternatives. To define “carrier class” SIP P2P telephony services, and highlight a model for their delivery.

October 10-13, 2006 San Diego Convention Center, San Diego California Peer-to-Peer Telephony Models The Skype Model SIP P2P Model Directed SIP P2P (DSP) Model

October 10-13, 2006 San Diego Convention Center, San Diego California Impact of P2P Telephony Models How do these models differ architecturally? What are the security implications? Scalability Consumer-Grade vs. Carrier-Class

October 10-13, 2006 San Diego Convention Center, San Diego California The Skype Model As understood from publicly available sources. –Skype is a quasi-Peer-to-Peer service using a small infrastructure for registration and enlisting unsuspecting end- users as “super nodes” to act as the presence coordination and interconnection link between users. –On an average day, there are approximately 20,000 users whose machines have been enlisted by Skype as super nodes – mostly without their knowledge ( March 2006).

October 10-13, 2006 San Diego Convention Center, San Diego California The Skype Super Node Issue This is an example of the impact that the super node function has on a PC. One minute intervals show Skype super node function capturing +/- 100 kbps Source: 17 July 2006http://

October 10-13, 2006 San Diego Convention Center, San Diego California Skype Issues Relies on the ignorance of super nodes. Super nodes compromise the most basic network security policies in a corporate environment. The “keep-alive” functionality has the potential to decrease hard drive life by as much as 50%.

October 10-13, 2006 San Diego Convention Center, San Diego California Skype Issues The Skype model: –is proprietary. –has not been disclosed. –has not been patented. As of 19 July 2006, a Chinese company reportedly has cracked the Skype code, reverse engineered it, and plans to deploy WITHOUT super node functionality.

October 10-13, 2006 San Diego Convention Center, San Diego California SIP P2P Model Skype uses a closed proprietary approach. Various groups have been working on a SIP P2P model (e.g., "Peer-to-Peer Internet Telephony Using SIP”). –Almost all of them retain the “super node” as opposed to more traditional client-server models. –The advantage of these approaches is their ability to build functionality as a community via open standards architecture.

October 10-13, 2006 San Diego Convention Center, San Diego California Directed SIP P2P (DSP) Model The DSP approach incorporates SIP but uses a distributed server architecture to direct calls and establish presence rather than enlisting consumers and businesses as “super nodes.” –In this way, the best aspects of client-server are combined with the cost benefits of P2P and SIP.

October 10-13, 2006 San Diego Convention Center, San Diego California Directed SIP Peer-to-Peer (DSP Model) Fusion’s Approach

October 10-13, 2006 San Diego Convention Center, San Diego California Other Emerging Models BandTel ( –Clustered SIP softswitch architecture –pairs of DNS servers direct SIP calls to SIP signaling transfer points (STPs) –directs SIP calls to "N" SIP proxies in the BandTel SIP proxy matrix.

October 10-13, 2006 San Diego Convention Center, San Diego California Other Emerging Models Communigate ( –All-Active Dynamic Cluster SIP farm able to scale to 10 million VoIP subscribers in a simulated environment. Call load generation of 1,000 SIP calls per second with up to 192,000 unique registered end-points driven by a test device for inbound calling.

October 10-13, 2006 San Diego Convention Center, San Diego California Security Implications Any model that uses a super node must punch holes through a corporate network’s perimeter defenses or a consumer’s desktop firewall. Typical server security vulnerabilities and vectors can be exploited to compromise services, capture confidential information, or be used as a vehicle to invade other machines. Many corporations and government entities are banning Skype and similar services due to these risks.

October 10-13, 2006 San Diego Convention Center, San Diego California Scalability True Peer-to-Peer telephony –Great promise for enterprises. –Limited numbers of users employing sophisticated applications on their PCs or using VoIP-specific devices in an encrypted, tunneled, or VPN environment can be quite valuable. –Attempting to scale these systems in a secure, well-managed environment to multiple millions is impractical.

October 10-13, 2006 San Diego Convention Center, San Diego California Scalability The DSP model is designed to scale infinitely through the use of geographically dispersed nodes that are part of the core infrastructure. Super node-based models can work only as long as the users are unconcerned about their flaws OR until there are better models.

October 10-13, 2006 San Diego Convention Center, San Diego California Consumer-Grade vs. Carrier-Class Consumer grade –Generally a free service offered by an entity that has very little traditional telephony infrastructure. –For off-net calling, must interface with one or more carriers. –End-to-end quality control is beyond their reach or their concern. Carrier class –Advanced VoIP services, such as DSP telephony, layered on top of traditional telephony services. –May incorporate soft switch functionality and interconnect with many other carriers. VoIP Peering –On-Net quality is a realistic objective. An underlying issue is the distinction between consumer-grade and carrier-class VoIP solutions.

October 10-13, 2006 San Diego Convention Center, San Diego California Consumer-Grade vs. Carrier-Class Just as most Internet Service Providers began as technical entrepreneur driven and evolved into professional organizations, so too will VoIP providers – evolving into carrier-class providers.

October 10-13, 2006 San Diego Convention Center, San Diego California Conclusions It is critical to understand where the market is evolving and what should be expected from your solutions. Some of these include: –Hardened applications that are security-aware and do not expose end-users to unnecessary risk. –Scalable applications that address the needs of both enterprises AND global carriers. –The distinction between consumer-grade and carrier-class applications/services.