SlideShare uma empresa Scribd logo
1 de 38
Baixar para ler offline
P2P VoIP Applications:P2P VoIP Applications:
“A Skype case-study”“A Skype case-study”
Vasia Kalavri (vasia@ac.upc.edu)
EMDC 2011 – Decentralized Systems
Universitat Politècnica de Catalunya
2
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
3
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
4
P2P VoIP OverviewP2P VoIP Overview
● Communication Over IP Networks
● Free calls among Internet users
● Usually mixed centralized and P2P scheme
● Requirements
● Resource location
● Session establishment
● Session management
● Presence
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
5
P2P VoIP ChallengesP2P VoIP Challenges
● Best-effort Internet
● Transmission delays
● Delay variations
● Packet loss
● Network failures
● NATs and Firewalls
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
6
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
7
Skype: why so popular?Skype: why so popular?
● Easy-to-use
● Works behind NATs and Firewalls (always?)
● More than 50 million users!
● Offers three services
● VoIP
● IM
● File transfer
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
8
System Design: A KaZaASystem Design: A KaZaA
extension?extension?
● Several studies conclude that Skype is related
to Kazaa
● Founded by the same individuals
● Overlap of technical staff
● Use of the “supernode” hierarchical P2P
network scheme
● KaZaA V 3.0 included a Skype client
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
9
Skype Peer-to-Peer NetworkSkype Peer-to-Peer Network
● Supernodes
● Must be publicly reachable
● Run the regular Skype software
● Form an overlay among themselves
● Also act as ordinary nodes
● Ordinary Nodes
● Connect to one or more supernodes
● Issue queries through supernodes
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
10
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
11
Explaining SupernodesExplaining Supernodes
Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
12
The complete imageThe complete image
Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
13
System Design AdvantagesSystem Design Advantages
● High scalability
● Use of processing and networking power of the
end-users
● Reduce costs
● Reliability by self-healing
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
14
Self-healingSelf-healing
Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
15
Becoming a Supernode: How will itBecoming a Supernode: How will it
affect my connection?affect my connection?
● Negligible additional
processing power,
memory and
storage compared
to an ordinary node
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
16
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
17
NAT TraversalNAT Traversal
● If one client is behind NAT
● Connection Reversal
● Hole Punching
● If both clients are behind NATs
● STUN
● If STUN fails
● TURN
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
18
NAT Traversal: Connection ReversalNAT Traversal: Connection Reversal
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
19
NAT Traversal: Hole PunchingNAT Traversal: Hole Punching
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
20
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
21
Self-healing - revisitedSelf-healing - revisited
Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html
What could possibly go wrong?
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
22
11stst
major outage: August 2007major outage: August 2007
● The number of on-line users started falling
unexpectedly
● Users faced login problems or slow services
● Problems lasted for more than 48h
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
23
11stst
major outage:major outage:
● Skype's Official Explanation
● A Microsoft Windows Update caused Supernodes
to restart all at once
● Self-healing failed because too many users were
chasing too few Supernodes
““Supernodes not so super”Supernodes not so super”
● Skype's Solution
● The system self-recovered completely after almost
48 hours.
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
24
11stst
major outagemajor outage
Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
25
11stst
major outage:major outage:
● Questions raised
““Blame it on Microsoft!”Blame it on Microsoft!”
● Why this particular Tuesday?
– Microsoft has been releasing security fixes on the 2nd
Tuesday of each month since October 2003
● Why at the same time?
– Updates are downloaded and installed at 3am in the PC's
local time
– At the very least, systems would have rebooted time
zone by time zone!
● Microsoft: “The disruption was caused by a bug in
their software.”
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
26
22ndnd
major outage: December 2010major outage: December 2010
● The network became unstable
● Suffered a critical failure
● The outage lasted for 24h approx.
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
27
22ndnd
major outage:major outage:
““Supernodes fail again”Supernodes fail again”
● A cluster of servers became overloaded...
● In version 5.0.0152 of Skype Windows client, the
delayed responses caused crashes...
● 50% of all Skype users globally were running this
version...
● Including 25–30% of the publicly available
Supernodes!
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
28
22ndnd
major outage:major outage:
Permanent Solutions?Permanent Solutions?
● Fixing software bugs
● Building a more resistant core-system
● Suggestions?
● Can we rely on user-Supernodes only?
● How can we recover faster next time?
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
29
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
30
Skype SecuritySkype Security
● Privacy: Does the Skype system allow an
outsider to eavesdrop on a conversation?
I don't mean a person in
the next room!
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
31
Skype Security: PrivacySkype Security: Privacy
Login behind the scenes
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
32
Skype Security: PrivacySkype Security: Privacy
● Skype uses encryption
● Specific algorithms not publicly available
● Key-exchange mechanisms not known
● Secure against casual snooping
● Packets can be observed but are undecipherable
● Searches are observable
● Unknown security level against sophisticated
attacks
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
33
Skype Security: PrivacySkype Security: Privacy
Security
PSTN
VoIP
Skype
VoIP over VPN
Silence ;)
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
34
Skype Security: AuthenticitySkype Security: Authenticity
● Email-based Identification and Authentication
● username/password
● Registered e-mail address
● The network is involved → attacks are possible!
Authentication security level: AOL, Webmail
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
35
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
36
Conclusions on SkypeConclusions on Skype
● Gained popularity and offers good quality
despite Internet limitations
● Good performance and user satisfaction
● Supernodes increase availability but also fail
● Not clear Security level
● Encryption, network involvement
● As secure as webmail
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
37
General ConclusionsGeneral Conclusions
● VoIP over P2P is challenging but works
● Cost reduction sharing resources
● Fault Tolerance
● Increase call quality over best-effort Internet
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
38
ReferencesReferences
● [1] Barbosa R, Kamienski C., Mariz D., Callado A., Fernandes S. Sadok D., “Performance
evaluation os P2P VoIP applications”
● [2] Garfinkel, S.L. “VoIP and Skype Security”, Jan. 2005
● [3] Saikat G., Daswani N., Jain R., “An Experimental study of the Skype Peer-to-Peer VoIP
System”, February 2006
● [4] Baset, S. A., And Schrulzrinne, H. “An Analysis of the Skype Peer-to-Peer Internet Telephony
Protocol”, April 2006
● [5] Liang, J., Kumar, R. and Ross, K. W., “ The kazaa overlay: A measurement study”
● [6] Haiyong Xie, Yang R. Yang, “A Measurement-based Study of the Skype Peer-to-Peer VoIP
Performance”.
● [7] David A. Bryan, Bruce B. Lowerkamp, “SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM
System”
● [8] Ford B., Srisuresh P., Kegel D., “Peer-to-Peer Communication Across Network Address
Translators”
● [9] http://blogs.skype.com/en/2010/12/cio_update.html
● [10] http://www.disruptivetelephony.com
● [11] http://news.techworld.com

Mais conteúdo relacionado

Mais procurados

Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancyJosue Wuezo
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESManas Rai
 
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...Associazione Digital Days
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Merlec Mpyana
 
Wtc pop negotiation
Wtc pop negotiationWtc pop negotiation
Wtc pop negotiationaruncec2001
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation Mohit Kumar
 
DealBook of Ukraine: 2021 edition
DealBook of Ukraine: 2021 editionDealBook of Ukraine: 2021 edition
DealBook of Ukraine: 2021 editionYevgen Sysoyev
 
Real Life Examples of Cybersecurity with Neo4j
 Real Life Examples of Cybersecurity with Neo4j Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4jNeo4j
 
Blockchain technology and applications from a financial perspective
Blockchain technology and applications from a financial perspectiveBlockchain technology and applications from a financial perspective
Blockchain technology and applications from a financial perspectiveTommaso Pellizzari
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)Networkel
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1DallasHaselhorst
 

Mais procurados (20)

Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancy
 
Tencent Company Review - December 2016
Tencent Company Review - December 2016Tencent Company Review - December 2016
Tencent Company Review - December 2016
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICES
 
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
Wtc pop negotiation
Wtc pop negotiationWtc pop negotiation
Wtc pop negotiation
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation
 
Blockchain & Government
Blockchain & GovernmentBlockchain & Government
Blockchain & Government
 
VPN
VPNVPN
VPN
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and Degrees
 
Cryptocurrency.pptx
Cryptocurrency.pptxCryptocurrency.pptx
Cryptocurrency.pptx
 
DealBook of Ukraine: 2021 edition
DealBook of Ukraine: 2021 editionDealBook of Ukraine: 2021 edition
DealBook of Ukraine: 2021 edition
 
Real Life Examples of Cybersecurity with Neo4j
 Real Life Examples of Cybersecurity with Neo4j Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4j
 
Blockchain technology and applications from a financial perspective
Blockchain technology and applications from a financial perspectiveBlockchain technology and applications from a financial perspective
Blockchain technology and applications from a financial perspective
 
Made in America, Again
Made in America, AgainMade in America, Again
Made in America, Again
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
 

Destaque

Microsoft's Skype acquisition
Microsoft's Skype acquisitionMicrosoft's Skype acquisition
Microsoft's Skype acquisitionDavid Mc Guinness
 
E Bay Skype Acquisition
E Bay Skype AcquisitionE Bay Skype Acquisition
E Bay Skype AcquisitionCfederman
 
MIS presentation on Skype business model
MIS presentation on Skype business modelMIS presentation on Skype business model
MIS presentation on Skype business modelAmit Tiwari
 
Skype Marketing Essentials - Storytelling
Skype Marketing Essentials - StorytellingSkype Marketing Essentials - Storytelling
Skype Marketing Essentials - StorytellingSkype
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overviewQA Club Kiev
 
How we test tvideo at skype
How we test tvideo at skypeHow we test tvideo at skype
How we test tvideo at skypeQA Club Kiev
 
What is Skype for Business? - GennGlobal
What is Skype for Business? - GennGlobalWhat is Skype for Business? - GennGlobal
What is Skype for Business? - GennGlobalSarah Ward
 
Structure of an english lesson skype
Structure of an english lesson skypeStructure of an english lesson skype
Structure of an english lesson skypeXenia Shash
 
Development of skype for business and knowledge of
Development of skype for business and knowledge ofDevelopment of skype for business and knowledge of
Development of skype for business and knowledge ofayemyatmoe069
 
Born Globals
Born Globals Born Globals
Born Globals lpremoli
 
Big data processing systems research
Big data processing systems researchBig data processing systems research
Big data processing systems researchVasia Kalavri
 
m2r2: A Framework for Results Materialization and Reuse
m2r2: A Framework for Results Materialization and Reusem2r2: A Framework for Results Materialization and Reuse
m2r2: A Framework for Results Materialization and ReuseVasia Kalavri
 

Destaque (20)

Skype anlaysis
Skype anlaysisSkype anlaysis
Skype anlaysis
 
Microsoft and Skype
Microsoft and Skype Microsoft and Skype
Microsoft and Skype
 
Microsoft's Skype acquisition
Microsoft's Skype acquisitionMicrosoft's Skype acquisition
Microsoft's Skype acquisition
 
Microsoft-Skype
Microsoft-SkypeMicrosoft-Skype
Microsoft-Skype
 
Skype marketing final
Skype marketing finalSkype marketing final
Skype marketing final
 
E Bay Skype Acquisition
E Bay Skype AcquisitionE Bay Skype Acquisition
E Bay Skype Acquisition
 
MIS presentation on Skype business model
MIS presentation on Skype business modelMIS presentation on Skype business model
MIS presentation on Skype business model
 
Skype Marketing Essentials - Storytelling
Skype Marketing Essentials - StorytellingSkype Marketing Essentials - Storytelling
Skype Marketing Essentials - Storytelling
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overview
 
Disruptive innovation
Disruptive innovationDisruptive innovation
Disruptive innovation
 
How we test tvideo at skype
How we test tvideo at skypeHow we test tvideo at skype
How we test tvideo at skype
 
Skype meeting
Skype meetingSkype meeting
Skype meeting
 
What is Skype for Business? - GennGlobal
What is Skype for Business? - GennGlobalWhat is Skype for Business? - GennGlobal
What is Skype for Business? - GennGlobal
 
Structure of an english lesson skype
Structure of an english lesson skypeStructure of an english lesson skype
Structure of an english lesson skype
 
Meat Industry in Poland
Meat Industry in PolandMeat Industry in Poland
Meat Industry in Poland
 
The Born Global Strategy
The Born Global StrategyThe Born Global Strategy
The Born Global Strategy
 
Development of skype for business and knowledge of
Development of skype for business and knowledge ofDevelopment of skype for business and knowledge of
Development of skype for business and knowledge of
 
Born Globals
Born Globals Born Globals
Born Globals
 
Big data processing systems research
Big data processing systems researchBig data processing systems research
Big data processing systems research
 
m2r2: A Framework for Results Materialization and Reuse
m2r2: A Framework for Results Materialization and Reusem2r2: A Framework for Results Materialization and Reuse
m2r2: A Framework for Results Materialization and Reuse
 

Semelhante a A Skype case study (2011)

MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月
MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月
MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月VirtualTech Japan Inc.
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar Santhosh Kumar
 
Closed2Open Networking
Closed2Open NetworkingClosed2Open Networking
Closed2Open NetworkingNaLUG
 
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...Dave Neary
 
Between you me and the network security boundary
Between you me and the network security boundaryBetween you me and the network security boundary
Between you me and the network security boundaryPatrick Fussell
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hackingPranshu Pareek
 
Improving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization OverlaysImproving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization OverlaysAdam Johnson
 
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdfKdpKumar
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanOWASP Delhi
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?RIPE NCC
 
2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshopKathleen Ludewig Omollo
 
Building a Small DC
Building a Small DCBuilding a Small DC
Building a Small DCAPNIC
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKMarian Marinov
 
Open contrail slides for BANV meetup
Open contrail slides for BANV meetupOpen contrail slides for BANV meetup
Open contrail slides for BANV meetupScott Edwards
 
PLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPROIDEA
 
SDN - Openflow + OpenVSwitch + Quantum
SDN - Openflow + OpenVSwitch + QuantumSDN - Openflow + OpenVSwitch + Quantum
SDN - Openflow + OpenVSwitch + QuantumRodrigo Campos
 
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi SubsystemTutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi SubsystemDheryta Jaisinghani
 
Troubleshooting for Intent-based Networking
Troubleshooting for Intent-based NetworkingTroubleshooting for Intent-based Networking
Troubleshooting for Intent-based NetworkingOpen Networking Summit
 

Semelhante a A Skype case study (2011) (20)

MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月
MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月
MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
 
Closed2Open Networking
Closed2Open NetworkingClosed2Open Networking
Closed2Open Networking
 
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
 
Between you me and the network security boundary
Between you me and the network security boundaryBetween you me and the network security boundary
Between you me and the network security boundary
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
Improving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization OverlaysImproving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization Overlays
 
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop
 
Building a Small DC
Building a Small DCBuilding a Small DC
Building a Small DC
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDK
 
Open contrail slides for BANV meetup
Open contrail slides for BANV meetupOpen contrail slides for BANV meetup
Open contrail slides for BANV meetup
 
SDN approach.pptx
SDN approach.pptxSDN approach.pptx
SDN approach.pptx
 
PLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDN
 
Opencontrail network virtualization
Opencontrail network virtualizationOpencontrail network virtualization
Opencontrail network virtualization
 
SDN - Openflow + OpenVSwitch + Quantum
SDN - Openflow + OpenVSwitch + QuantumSDN - Openflow + OpenVSwitch + Quantum
SDN - Openflow + OpenVSwitch + Quantum
 
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi SubsystemTutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
 
Troubleshooting for Intent-based Networking
Troubleshooting for Intent-based NetworkingTroubleshooting for Intent-based Networking
Troubleshooting for Intent-based Networking
 

Mais de Vasia Kalavri

From data stream management to distributed dataflows and beyond
From data stream management to distributed dataflows and beyondFrom data stream management to distributed dataflows and beyond
From data stream management to distributed dataflows and beyondVasia Kalavri
 
Self-managed and automatically reconfigurable stream processing
Self-managed and automatically reconfigurable stream processingSelf-managed and automatically reconfigurable stream processing
Self-managed and automatically reconfigurable stream processingVasia Kalavri
 
Predictive Datacenter Analytics with Strymon
Predictive Datacenter Analytics with StrymonPredictive Datacenter Analytics with Strymon
Predictive Datacenter Analytics with StrymonVasia Kalavri
 
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...Online performance analysis of distributed dataflow systems (O'Reilly Velocit...
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...Vasia Kalavri
 
Apache Flink & Graph Processing
Apache Flink & Graph ProcessingApache Flink & Graph Processing
Apache Flink & Graph ProcessingVasia Kalavri
 
The shortest path is not always a straight line
The shortest path is not always a straight lineThe shortest path is not always a straight line
The shortest path is not always a straight lineVasia Kalavri
 
Graphs as Streams: Rethinking Graph Processing in the Streaming Era
Graphs as Streams: Rethinking Graph Processing in the Streaming EraGraphs as Streams: Rethinking Graph Processing in the Streaming Era
Graphs as Streams: Rethinking Graph Processing in the Streaming EraVasia Kalavri
 
Demystifying Distributed Graph Processing
Demystifying Distributed Graph ProcessingDemystifying Distributed Graph Processing
Demystifying Distributed Graph ProcessingVasia Kalavri
 
Like a Pack of Wolves: Community Structure of Web Trackers
Like a Pack of Wolves: Community Structure of Web TrackersLike a Pack of Wolves: Community Structure of Web Trackers
Like a Pack of Wolves: Community Structure of Web TrackersVasia Kalavri
 
Batch and Stream Graph Processing with Apache Flink
Batch and Stream Graph Processing with Apache FlinkBatch and Stream Graph Processing with Apache Flink
Batch and Stream Graph Processing with Apache FlinkVasia Kalavri
 
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache Flink
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache FlinkGelly-Stream: Single-Pass Graph Streaming Analytics with Apache Flink
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache FlinkVasia Kalavri
 
Asymmetry in Large-Scale Graph Analysis, Explained
Asymmetry in Large-Scale Graph Analysis, ExplainedAsymmetry in Large-Scale Graph Analysis, Explained
Asymmetry in Large-Scale Graph Analysis, ExplainedVasia Kalavri
 
Block Sampling: Efficient Accurate Online Aggregation in MapReduce
Block Sampling: Efficient Accurate Online Aggregation in MapReduceBlock Sampling: Efficient Accurate Online Aggregation in MapReduce
Block Sampling: Efficient Accurate Online Aggregation in MapReduceVasia Kalavri
 
MapReduce: Optimizations, Limitations, and Open Issues
MapReduce: Optimizations, Limitations, and Open IssuesMapReduce: Optimizations, Limitations, and Open Issues
MapReduce: Optimizations, Limitations, and Open IssuesVasia Kalavri
 
Gelly in Apache Flink Bay Area Meetup
Gelly in Apache Flink Bay Area MeetupGelly in Apache Flink Bay Area Meetup
Gelly in Apache Flink Bay Area MeetupVasia Kalavri
 
Apache Flink Deep Dive
Apache Flink Deep DiveApache Flink Deep Dive
Apache Flink Deep DiveVasia Kalavri
 
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15Vasia Kalavri
 

Mais de Vasia Kalavri (17)

From data stream management to distributed dataflows and beyond
From data stream management to distributed dataflows and beyondFrom data stream management to distributed dataflows and beyond
From data stream management to distributed dataflows and beyond
 
Self-managed and automatically reconfigurable stream processing
Self-managed and automatically reconfigurable stream processingSelf-managed and automatically reconfigurable stream processing
Self-managed and automatically reconfigurable stream processing
 
Predictive Datacenter Analytics with Strymon
Predictive Datacenter Analytics with StrymonPredictive Datacenter Analytics with Strymon
Predictive Datacenter Analytics with Strymon
 
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...Online performance analysis of distributed dataflow systems (O'Reilly Velocit...
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...
 
Apache Flink & Graph Processing
Apache Flink & Graph ProcessingApache Flink & Graph Processing
Apache Flink & Graph Processing
 
The shortest path is not always a straight line
The shortest path is not always a straight lineThe shortest path is not always a straight line
The shortest path is not always a straight line
 
Graphs as Streams: Rethinking Graph Processing in the Streaming Era
Graphs as Streams: Rethinking Graph Processing in the Streaming EraGraphs as Streams: Rethinking Graph Processing in the Streaming Era
Graphs as Streams: Rethinking Graph Processing in the Streaming Era
 
Demystifying Distributed Graph Processing
Demystifying Distributed Graph ProcessingDemystifying Distributed Graph Processing
Demystifying Distributed Graph Processing
 
Like a Pack of Wolves: Community Structure of Web Trackers
Like a Pack of Wolves: Community Structure of Web TrackersLike a Pack of Wolves: Community Structure of Web Trackers
Like a Pack of Wolves: Community Structure of Web Trackers
 
Batch and Stream Graph Processing with Apache Flink
Batch and Stream Graph Processing with Apache FlinkBatch and Stream Graph Processing with Apache Flink
Batch and Stream Graph Processing with Apache Flink
 
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache Flink
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache FlinkGelly-Stream: Single-Pass Graph Streaming Analytics with Apache Flink
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache Flink
 
Asymmetry in Large-Scale Graph Analysis, Explained
Asymmetry in Large-Scale Graph Analysis, ExplainedAsymmetry in Large-Scale Graph Analysis, Explained
Asymmetry in Large-Scale Graph Analysis, Explained
 
Block Sampling: Efficient Accurate Online Aggregation in MapReduce
Block Sampling: Efficient Accurate Online Aggregation in MapReduceBlock Sampling: Efficient Accurate Online Aggregation in MapReduce
Block Sampling: Efficient Accurate Online Aggregation in MapReduce
 
MapReduce: Optimizations, Limitations, and Open Issues
MapReduce: Optimizations, Limitations, and Open IssuesMapReduce: Optimizations, Limitations, and Open Issues
MapReduce: Optimizations, Limitations, and Open Issues
 
Gelly in Apache Flink Bay Area Meetup
Gelly in Apache Flink Bay Area MeetupGelly in Apache Flink Bay Area Meetup
Gelly in Apache Flink Bay Area Meetup
 
Apache Flink Deep Dive
Apache Flink Deep DiveApache Flink Deep Dive
Apache Flink Deep Dive
 
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

A Skype case study (2011)

  • 1. P2P VoIP Applications:P2P VoIP Applications: “A Skype case-study”“A Skype case-study” Vasia Kalavri (vasia@ac.upc.edu) EMDC 2011 – Decentralized Systems Universitat Politècnica de Catalunya
  • 2. 2 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 3. 3 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 4. 4 P2P VoIP OverviewP2P VoIP Overview ● Communication Over IP Networks ● Free calls among Internet users ● Usually mixed centralized and P2P scheme ● Requirements ● Resource location ● Session establishment ● Session management ● Presence Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 5. 5 P2P VoIP ChallengesP2P VoIP Challenges ● Best-effort Internet ● Transmission delays ● Delay variations ● Packet loss ● Network failures ● NATs and Firewalls Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 6. 6 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 7. 7 Skype: why so popular?Skype: why so popular? ● Easy-to-use ● Works behind NATs and Firewalls (always?) ● More than 50 million users! ● Offers three services ● VoIP ● IM ● File transfer Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 8. 8 System Design: A KaZaASystem Design: A KaZaA extension?extension? ● Several studies conclude that Skype is related to Kazaa ● Founded by the same individuals ● Overlap of technical staff ● Use of the “supernode” hierarchical P2P network scheme ● KaZaA V 3.0 included a Skype client Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 9. 9 Skype Peer-to-Peer NetworkSkype Peer-to-Peer Network ● Supernodes ● Must be publicly reachable ● Run the regular Skype software ● Form an overlay among themselves ● Also act as ordinary nodes ● Ordinary Nodes ● Connect to one or more supernodes ● Issue queries through supernodes Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 10. 10 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 11. 11 Explaining SupernodesExplaining Supernodes Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 12. 12 The complete imageThe complete image Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 13. 13 System Design AdvantagesSystem Design Advantages ● High scalability ● Use of processing and networking power of the end-users ● Reduce costs ● Reliability by self-healing Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 14. 14 Self-healingSelf-healing Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 15. 15 Becoming a Supernode: How will itBecoming a Supernode: How will it affect my connection?affect my connection? ● Negligible additional processing power, memory and storage compared to an ordinary node Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 16. 16 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 17. 17 NAT TraversalNAT Traversal ● If one client is behind NAT ● Connection Reversal ● Hole Punching ● If both clients are behind NATs ● STUN ● If STUN fails ● TURN Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 18. 18 NAT Traversal: Connection ReversalNAT Traversal: Connection Reversal Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 19. 19 NAT Traversal: Hole PunchingNAT Traversal: Hole Punching Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 20. 20 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 21. 21 Self-healing - revisitedSelf-healing - revisited Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html What could possibly go wrong? Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 22. 22 11stst major outage: August 2007major outage: August 2007 ● The number of on-line users started falling unexpectedly ● Users faced login problems or slow services ● Problems lasted for more than 48h Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 23. 23 11stst major outage:major outage: ● Skype's Official Explanation ● A Microsoft Windows Update caused Supernodes to restart all at once ● Self-healing failed because too many users were chasing too few Supernodes ““Supernodes not so super”Supernodes not so super” ● Skype's Solution ● The system self-recovered completely after almost 48 hours. Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 24. 24 11stst major outagemajor outage Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 25. 25 11stst major outage:major outage: ● Questions raised ““Blame it on Microsoft!”Blame it on Microsoft!” ● Why this particular Tuesday? – Microsoft has been releasing security fixes on the 2nd Tuesday of each month since October 2003 ● Why at the same time? – Updates are downloaded and installed at 3am in the PC's local time – At the very least, systems would have rebooted time zone by time zone! ● Microsoft: “The disruption was caused by a bug in their software.” Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 26. 26 22ndnd major outage: December 2010major outage: December 2010 ● The network became unstable ● Suffered a critical failure ● The outage lasted for 24h approx. Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 27. 27 22ndnd major outage:major outage: ““Supernodes fail again”Supernodes fail again” ● A cluster of servers became overloaded... ● In version 5.0.0152 of Skype Windows client, the delayed responses caused crashes... ● 50% of all Skype users globally were running this version... ● Including 25–30% of the publicly available Supernodes! Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 28. 28 22ndnd major outage:major outage: Permanent Solutions?Permanent Solutions? ● Fixing software bugs ● Building a more resistant core-system ● Suggestions? ● Can we rely on user-Supernodes only? ● How can we recover faster next time? Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 29. 29 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 30. 30 Skype SecuritySkype Security ● Privacy: Does the Skype system allow an outsider to eavesdrop on a conversation? I don't mean a person in the next room! Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 31. 31 Skype Security: PrivacySkype Security: Privacy Login behind the scenes Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 32. 32 Skype Security: PrivacySkype Security: Privacy ● Skype uses encryption ● Specific algorithms not publicly available ● Key-exchange mechanisms not known ● Secure against casual snooping ● Packets can be observed but are undecipherable ● Searches are observable ● Unknown security level against sophisticated attacks Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 33. 33 Skype Security: PrivacySkype Security: Privacy Security PSTN VoIP Skype VoIP over VPN Silence ;) Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 34. 34 Skype Security: AuthenticitySkype Security: Authenticity ● Email-based Identification and Authentication ● username/password ● Registered e-mail address ● The network is involved → attacks are possible! Authentication security level: AOL, Webmail Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 35. 35 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 36. 36 Conclusions on SkypeConclusions on Skype ● Gained popularity and offers good quality despite Internet limitations ● Good performance and user satisfaction ● Supernodes increase availability but also fail ● Not clear Security level ● Encryption, network involvement ● As secure as webmail Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 37. 37 General ConclusionsGeneral Conclusions ● VoIP over P2P is challenging but works ● Cost reduction sharing resources ● Fault Tolerance ● Increase call quality over best-effort Internet Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 38. 38 ReferencesReferences ● [1] Barbosa R, Kamienski C., Mariz D., Callado A., Fernandes S. Sadok D., “Performance evaluation os P2P VoIP applications” ● [2] Garfinkel, S.L. “VoIP and Skype Security”, Jan. 2005 ● [3] Saikat G., Daswani N., Jain R., “An Experimental study of the Skype Peer-to-Peer VoIP System”, February 2006 ● [4] Baset, S. A., And Schrulzrinne, H. “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol”, April 2006 ● [5] Liang, J., Kumar, R. and Ross, K. W., “ The kazaa overlay: A measurement study” ● [6] Haiyong Xie, Yang R. Yang, “A Measurement-based Study of the Skype Peer-to-Peer VoIP Performance”. ● [7] David A. Bryan, Bruce B. Lowerkamp, “SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System” ● [8] Ford B., Srisuresh P., Kegel D., “Peer-to-Peer Communication Across Network Address Translators” ● [9] http://blogs.skype.com/en/2010/12/cio_update.html ● [10] http://www.disruptivetelephony.com ● [11] http://news.techworld.com