SlideShare a Scribd company logo
1 of 38
Download to read offline
P2P VoIP Applications:P2P VoIP Applications:
“A Skype case-study”“A Skype case-study”
Vasia Kalavri (vasia@ac.upc.edu)
EMDC 2011 – Decentralized Systems
Universitat Politècnica de Catalunya
2
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
3
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
4
P2P VoIP OverviewP2P VoIP Overview
● Communication Over IP Networks
● Free calls among Internet users
● Usually mixed centralized and P2P scheme
● Requirements
● Resource location
● Session establishment
● Session management
● Presence
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
5
P2P VoIP ChallengesP2P VoIP Challenges
● Best-effort Internet
● Transmission delays
● Delay variations
● Packet loss
● Network failures
● NATs and Firewalls
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
6
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
7
Skype: why so popular?Skype: why so popular?
● Easy-to-use
● Works behind NATs and Firewalls (always?)
● More than 50 million users!
● Offers three services
● VoIP
● IM
● File transfer
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
8
System Design: A KaZaASystem Design: A KaZaA
extension?extension?
● Several studies conclude that Skype is related
to Kazaa
● Founded by the same individuals
● Overlap of technical staff
● Use of the “supernode” hierarchical P2P
network scheme
● KaZaA V 3.0 included a Skype client
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
9
Skype Peer-to-Peer NetworkSkype Peer-to-Peer Network
● Supernodes
● Must be publicly reachable
● Run the regular Skype software
● Form an overlay among themselves
● Also act as ordinary nodes
● Ordinary Nodes
● Connect to one or more supernodes
● Issue queries through supernodes
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
10
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
11
Explaining SupernodesExplaining Supernodes
Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
12
The complete imageThe complete image
Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
13
System Design AdvantagesSystem Design Advantages
● High scalability
● Use of processing and networking power of the
end-users
● Reduce costs
● Reliability by self-healing
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
14
Self-healingSelf-healing
Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
15
Becoming a Supernode: How will itBecoming a Supernode: How will it
affect my connection?affect my connection?
● Negligible additional
processing power,
memory and
storage compared
to an ordinary node
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
16
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
17
NAT TraversalNAT Traversal
● If one client is behind NAT
● Connection Reversal
● Hole Punching
● If both clients are behind NATs
● STUN
● If STUN fails
● TURN
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
18
NAT Traversal: Connection ReversalNAT Traversal: Connection Reversal
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
19
NAT Traversal: Hole PunchingNAT Traversal: Hole Punching
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
20
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
21
Self-healing - revisitedSelf-healing - revisited
Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html
What could possibly go wrong?
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
22
11stst
major outage: August 2007major outage: August 2007
● The number of on-line users started falling
unexpectedly
● Users faced login problems or slow services
● Problems lasted for more than 48h
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
23
11stst
major outage:major outage:
● Skype's Official Explanation
● A Microsoft Windows Update caused Supernodes
to restart all at once
● Self-healing failed because too many users were
chasing too few Supernodes
““Supernodes not so super”Supernodes not so super”
● Skype's Solution
● The system self-recovered completely after almost
48 hours.
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
24
11stst
major outagemajor outage
Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
25
11stst
major outage:major outage:
● Questions raised
““Blame it on Microsoft!”Blame it on Microsoft!”
● Why this particular Tuesday?
– Microsoft has been releasing security fixes on the 2nd
Tuesday of each month since October 2003
● Why at the same time?
– Updates are downloaded and installed at 3am in the PC's
local time
– At the very least, systems would have rebooted time
zone by time zone!
● Microsoft: “The disruption was caused by a bug in
their software.”
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
26
22ndnd
major outage: December 2010major outage: December 2010
● The network became unstable
● Suffered a critical failure
● The outage lasted for 24h approx.
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
27
22ndnd
major outage:major outage:
““Supernodes fail again”Supernodes fail again”
● A cluster of servers became overloaded...
● In version 5.0.0152 of Skype Windows client, the
delayed responses caused crashes...
● 50% of all Skype users globally were running this
version...
● Including 25–30% of the publicly available
Supernodes!
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
28
22ndnd
major outage:major outage:
Permanent Solutions?Permanent Solutions?
● Fixing software bugs
● Building a more resistant core-system
● Suggestions?
● Can we rely on user-Supernodes only?
● How can we recover faster next time?
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
29
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
30
Skype SecuritySkype Security
● Privacy: Does the Skype system allow an
outsider to eavesdrop on a conversation?
I don't mean a person in
the next room!
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
31
Skype Security: PrivacySkype Security: Privacy
Login behind the scenes
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
32
Skype Security: PrivacySkype Security: Privacy
● Skype uses encryption
● Specific algorithms not publicly available
● Key-exchange mechanisms not known
● Secure against casual snooping
● Packets can be observed but are undecipherable
● Searches are observable
● Unknown security level against sophisticated
attacks
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
33
Skype Security: PrivacySkype Security: Privacy
Security
PSTN
VoIP
Skype
VoIP over VPN
Silence ;)
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
34
Skype Security: AuthenticitySkype Security: Authenticity
● Email-based Identification and Authentication
● username/password
● Registered e-mail address
● The network is involved → attacks are possible!
Authentication security level: AOL, Webmail
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
35
OutlineOutline
● Introduction
● The Skype P2P System
● Explaining Supernodes
● NAT Traversal
● Discussing outages
● Skype Security
● Conclusions
36
Conclusions on SkypeConclusions on Skype
● Gained popularity and offers good quality
despite Internet limitations
● Good performance and user satisfaction
● Supernodes increase availability but also fail
● Not clear Security level
● Encryption, network involvement
● As secure as webmail
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
37
General ConclusionsGeneral Conclusions
● VoIP over P2P is challenging but works
● Cost reduction sharing resources
● Fault Tolerance
● Increase call quality over best-effort Internet
Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
38
ReferencesReferences
● [1] Barbosa R, Kamienski C., Mariz D., Callado A., Fernandes S. Sadok D., “Performance
evaluation os P2P VoIP applications”
● [2] Garfinkel, S.L. “VoIP and Skype Security”, Jan. 2005
● [3] Saikat G., Daswani N., Jain R., “An Experimental study of the Skype Peer-to-Peer VoIP
System”, February 2006
● [4] Baset, S. A., And Schrulzrinne, H. “An Analysis of the Skype Peer-to-Peer Internet Telephony
Protocol”, April 2006
● [5] Liang, J., Kumar, R. and Ross, K. W., “ The kazaa overlay: A measurement study”
● [6] Haiyong Xie, Yang R. Yang, “A Measurement-based Study of the Skype Peer-to-Peer VoIP
Performance”.
● [7] David A. Bryan, Bruce B. Lowerkamp, “SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM
System”
● [8] Ford B., Srisuresh P., Kegel D., “Peer-to-Peer Communication Across Network Address
Translators”
● [9] http://blogs.skype.com/en/2010/12/cio_update.html
● [10] http://www.disruptivetelephony.com
● [11] http://news.techworld.com

More Related Content

What's hot

Environmental Differentiation Strategy of Patagonia
Environmental Differentiation Strategy of PatagoniaEnvironmental Differentiation Strategy of Patagonia
Environmental Differentiation Strategy of PatagoniaJohannes Mahlich
 
Premiumsoft - HBR Case Study
Premiumsoft - HBR Case StudyPremiumsoft - HBR Case Study
Premiumsoft - HBR Case StudySwati Karn
 
Financing The Mozal Project
Financing The Mozal ProjectFinancing The Mozal Project
Financing The Mozal ProjectPraful Anchaliya
 
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS Akshay Jain
 
Advertising Plan of Nestle Milk Pack (Relaunch)
Advertising Plan of Nestle Milk Pack (Relaunch)Advertising Plan of Nestle Milk Pack (Relaunch)
Advertising Plan of Nestle Milk Pack (Relaunch)Syed Ahmed Owais
 
Midland Energy Resources, Inc. Cost of Capital
Midland Energy Resources, Inc. Cost of CapitalMidland Energy Resources, Inc. Cost of Capital
Midland Energy Resources, Inc. Cost of CapitalKivanc Ozuolmez
 
NATIONAL FOODS (Mangement Report)
NATIONAL FOODS (Mangement Report)NATIONAL FOODS (Mangement Report)
NATIONAL FOODS (Mangement Report)Hammad Hasan
 
Frooto report (COMMECS INSTITUTE)
Frooto report (COMMECS INSTITUTE)Frooto report (COMMECS INSTITUTE)
Frooto report (COMMECS INSTITUTE)MUHAMMAD RIAZ
 
Understanding the Canadian Market, PEST Analysis for Exporters to Canada
Understanding the Canadian Market, PEST Analysis for Exporters to CanadaUnderstanding the Canadian Market, PEST Analysis for Exporters to Canada
Understanding the Canadian Market, PEST Analysis for Exporters to CanadaMichaelcmcdermott
 
Maynard company ppt
Maynard company pptMaynard company ppt
Maynard company pptNivin Vinoi
 
Macroeconomics 12th-edition-dornbusch-solutions-manual
Macroeconomics 12th-edition-dornbusch-solutions-manualMacroeconomics 12th-edition-dornbusch-solutions-manual
Macroeconomics 12th-edition-dornbusch-solutions-manualShannonHarlan
 
Strategy of Bharat forge
Strategy of Bharat forge Strategy of Bharat forge
Strategy of Bharat forge Mayank Kumar
 
Starbucks delivering customer service
Starbucks delivering customer serviceStarbucks delivering customer service
Starbucks delivering customer serviceMonoj Kumar Rabha
 
Nirdosh - Herbal Cigarette : What went wrong ?
Nirdosh - Herbal Cigarette : What went wrong ? Nirdosh - Herbal Cigarette : What went wrong ?
Nirdosh - Herbal Cigarette : What went wrong ? Ritesh Hati
 
Candyland (ismail industry)
Candyland (ismail industry)Candyland (ismail industry)
Candyland (ismail industry)IIUI
 
Pakistan Tobacco Company
Pakistan Tobacco CompanyPakistan Tobacco Company
Pakistan Tobacco Companydiaryinc
 
McKinsey & Company: Managing Knowledge and Learning
McKinsey & Company:  Managing Knowledge and LearningMcKinsey & Company:  Managing Knowledge and Learning
McKinsey & Company: Managing Knowledge and LearningDisha Ghoshal
 

What's hot (20)

Environmental Differentiation Strategy of Patagonia
Environmental Differentiation Strategy of PatagoniaEnvironmental Differentiation Strategy of Patagonia
Environmental Differentiation Strategy of Patagonia
 
Premiumsoft - HBR Case Study
Premiumsoft - HBR Case StudyPremiumsoft - HBR Case Study
Premiumsoft - HBR Case Study
 
Ingersoll rand
Ingersoll randIngersoll rand
Ingersoll rand
 
Financing The Mozal Project
Financing The Mozal ProjectFinancing The Mozal Project
Financing The Mozal Project
 
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
 
Advertising Plan of Nestle Milk Pack (Relaunch)
Advertising Plan of Nestle Milk Pack (Relaunch)Advertising Plan of Nestle Milk Pack (Relaunch)
Advertising Plan of Nestle Milk Pack (Relaunch)
 
Midland Energy Resources, Inc. Cost of Capital
Midland Energy Resources, Inc. Cost of CapitalMidland Energy Resources, Inc. Cost of Capital
Midland Energy Resources, Inc. Cost of Capital
 
Marketing of Vital
Marketing of VitalMarketing of Vital
Marketing of Vital
 
NATIONAL FOODS (Mangement Report)
NATIONAL FOODS (Mangement Report)NATIONAL FOODS (Mangement Report)
NATIONAL FOODS (Mangement Report)
 
Frooto report (COMMECS INSTITUTE)
Frooto report (COMMECS INSTITUTE)Frooto report (COMMECS INSTITUTE)
Frooto report (COMMECS INSTITUTE)
 
Understanding the Canadian Market, PEST Analysis for Exporters to Canada
Understanding the Canadian Market, PEST Analysis for Exporters to CanadaUnderstanding the Canadian Market, PEST Analysis for Exporters to Canada
Understanding the Canadian Market, PEST Analysis for Exporters to Canada
 
Pran RFL group Market analysis
Pran RFL group Market analysisPran RFL group Market analysis
Pran RFL group Market analysis
 
Maynard company ppt
Maynard company pptMaynard company ppt
Maynard company ppt
 
Macroeconomics 12th-edition-dornbusch-solutions-manual
Macroeconomics 12th-edition-dornbusch-solutions-manualMacroeconomics 12th-edition-dornbusch-solutions-manual
Macroeconomics 12th-edition-dornbusch-solutions-manual
 
Strategy of Bharat forge
Strategy of Bharat forge Strategy of Bharat forge
Strategy of Bharat forge
 
Starbucks delivering customer service
Starbucks delivering customer serviceStarbucks delivering customer service
Starbucks delivering customer service
 
Nirdosh - Herbal Cigarette : What went wrong ?
Nirdosh - Herbal Cigarette : What went wrong ? Nirdosh - Herbal Cigarette : What went wrong ?
Nirdosh - Herbal Cigarette : What went wrong ?
 
Candyland (ismail industry)
Candyland (ismail industry)Candyland (ismail industry)
Candyland (ismail industry)
 
Pakistan Tobacco Company
Pakistan Tobacco CompanyPakistan Tobacco Company
Pakistan Tobacco Company
 
McKinsey & Company: Managing Knowledge and Learning
McKinsey & Company:  Managing Knowledge and LearningMcKinsey & Company:  Managing Knowledge and Learning
McKinsey & Company: Managing Knowledge and Learning
 

Viewers also liked

Microsoft's Skype acquisition
Microsoft's Skype acquisitionMicrosoft's Skype acquisition
Microsoft's Skype acquisitionDavid Mc Guinness
 
E Bay Skype Acquisition
E Bay Skype AcquisitionE Bay Skype Acquisition
E Bay Skype AcquisitionCfederman
 
MIS presentation on Skype business model
MIS presentation on Skype business modelMIS presentation on Skype business model
MIS presentation on Skype business modelAmit Tiwari
 
Skype Marketing Essentials - Storytelling
Skype Marketing Essentials - StorytellingSkype Marketing Essentials - Storytelling
Skype Marketing Essentials - StorytellingSkype
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overviewQA Club Kiev
 
How we test tvideo at skype
How we test tvideo at skypeHow we test tvideo at skype
How we test tvideo at skypeQA Club Kiev
 
What is Skype for Business? - GennGlobal
What is Skype for Business? - GennGlobalWhat is Skype for Business? - GennGlobal
What is Skype for Business? - GennGlobalSarah Ward
 
Structure of an english lesson skype
Structure of an english lesson skypeStructure of an english lesson skype
Structure of an english lesson skypeXenia Shash
 
Development of skype for business and knowledge of
Development of skype for business and knowledge ofDevelopment of skype for business and knowledge of
Development of skype for business and knowledge ofayemyatmoe069
 
Born Globals
Born Globals Born Globals
Born Globals lpremoli
 
Big data processing systems research
Big data processing systems researchBig data processing systems research
Big data processing systems researchVasia Kalavri
 
m2r2: A Framework for Results Materialization and Reuse
m2r2: A Framework for Results Materialization and Reusem2r2: A Framework for Results Materialization and Reuse
m2r2: A Framework for Results Materialization and ReuseVasia Kalavri
 

Viewers also liked (20)

Skype anlaysis
Skype anlaysisSkype anlaysis
Skype anlaysis
 
Microsoft and Skype
Microsoft and Skype Microsoft and Skype
Microsoft and Skype
 
Microsoft's Skype acquisition
Microsoft's Skype acquisitionMicrosoft's Skype acquisition
Microsoft's Skype acquisition
 
Microsoft-Skype
Microsoft-SkypeMicrosoft-Skype
Microsoft-Skype
 
Skype marketing final
Skype marketing finalSkype marketing final
Skype marketing final
 
E Bay Skype Acquisition
E Bay Skype AcquisitionE Bay Skype Acquisition
E Bay Skype Acquisition
 
MIS presentation on Skype business model
MIS presentation on Skype business modelMIS presentation on Skype business model
MIS presentation on Skype business model
 
Skype Marketing Essentials - Storytelling
Skype Marketing Essentials - StorytellingSkype Marketing Essentials - Storytelling
Skype Marketing Essentials - Storytelling
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overview
 
Disruptive innovation
Disruptive innovationDisruptive innovation
Disruptive innovation
 
How we test tvideo at skype
How we test tvideo at skypeHow we test tvideo at skype
How we test tvideo at skype
 
Skype meeting
Skype meetingSkype meeting
Skype meeting
 
What is Skype for Business? - GennGlobal
What is Skype for Business? - GennGlobalWhat is Skype for Business? - GennGlobal
What is Skype for Business? - GennGlobal
 
Structure of an english lesson skype
Structure of an english lesson skypeStructure of an english lesson skype
Structure of an english lesson skype
 
Meat Industry in Poland
Meat Industry in PolandMeat Industry in Poland
Meat Industry in Poland
 
The Born Global Strategy
The Born Global StrategyThe Born Global Strategy
The Born Global Strategy
 
Development of skype for business and knowledge of
Development of skype for business and knowledge ofDevelopment of skype for business and knowledge of
Development of skype for business and knowledge of
 
Born Globals
Born Globals Born Globals
Born Globals
 
Big data processing systems research
Big data processing systems researchBig data processing systems research
Big data processing systems research
 
m2r2: A Framework for Results Materialization and Reuse
m2r2: A Framework for Results Materialization and Reusem2r2: A Framework for Results Materialization and Reuse
m2r2: A Framework for Results Materialization and Reuse
 

Similar to A Skype case study (2011)

MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月
MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月
MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月VirtualTech Japan Inc.
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar Santhosh Kumar
 
Closed2Open Networking
Closed2Open NetworkingClosed2Open Networking
Closed2Open NetworkingNaLUG
 
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...Dave Neary
 
Between you me and the network security boundary
Between you me and the network security boundaryBetween you me and the network security boundary
Between you me and the network security boundaryPatrick Fussell
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hackingPranshu Pareek
 
Improving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization OverlaysImproving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization OverlaysAdam Johnson
 
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdfKdpKumar
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanOWASP Delhi
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?RIPE NCC
 
2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshopKathleen Ludewig Omollo
 
Building a Small DC
Building a Small DCBuilding a Small DC
Building a Small DCAPNIC
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKMarian Marinov
 
Open contrail slides for BANV meetup
Open contrail slides for BANV meetupOpen contrail slides for BANV meetup
Open contrail slides for BANV meetupScott Edwards
 
PLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPROIDEA
 
SDN - Openflow + OpenVSwitch + Quantum
SDN - Openflow + OpenVSwitch + QuantumSDN - Openflow + OpenVSwitch + Quantum
SDN - Openflow + OpenVSwitch + QuantumRodrigo Campos
 
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi SubsystemTutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi SubsystemDheryta Jaisinghani
 
Troubleshooting for Intent-based Networking
Troubleshooting for Intent-based NetworkingTroubleshooting for Intent-based Networking
Troubleshooting for Intent-based NetworkingOpen Networking Summit
 

Similar to A Skype case study (2011) (20)

MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月
MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月
MidoNet Trouble Shooting – OpenStack最新情報セミナー 2015年4月
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
 
Closed2Open Networking
Closed2Open NetworkingClosed2Open Networking
Closed2Open Networking
 
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
 
Between you me and the network security boundary
Between you me and the network security boundaryBetween you me and the network security boundary
Between you me and the network security boundary
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
Improving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization OverlaysImproving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization Overlays
 
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop
 
Building a Small DC
Building a Small DCBuilding a Small DC
Building a Small DC
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDK
 
Open contrail slides for BANV meetup
Open contrail slides for BANV meetupOpen contrail slides for BANV meetup
Open contrail slides for BANV meetup
 
SDN approach.pptx
SDN approach.pptxSDN approach.pptx
SDN approach.pptx
 
PLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDN
 
Opencontrail network virtualization
Opencontrail network virtualizationOpencontrail network virtualization
Opencontrail network virtualization
 
SDN - Openflow + OpenVSwitch + Quantum
SDN - Openflow + OpenVSwitch + QuantumSDN - Openflow + OpenVSwitch + Quantum
SDN - Openflow + OpenVSwitch + Quantum
 
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi SubsystemTutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
 
Troubleshooting for Intent-based Networking
Troubleshooting for Intent-based NetworkingTroubleshooting for Intent-based Networking
Troubleshooting for Intent-based Networking
 

More from Vasia Kalavri

From data stream management to distributed dataflows and beyond
From data stream management to distributed dataflows and beyondFrom data stream management to distributed dataflows and beyond
From data stream management to distributed dataflows and beyondVasia Kalavri
 
Self-managed and automatically reconfigurable stream processing
Self-managed and automatically reconfigurable stream processingSelf-managed and automatically reconfigurable stream processing
Self-managed and automatically reconfigurable stream processingVasia Kalavri
 
Predictive Datacenter Analytics with Strymon
Predictive Datacenter Analytics with StrymonPredictive Datacenter Analytics with Strymon
Predictive Datacenter Analytics with StrymonVasia Kalavri
 
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...Online performance analysis of distributed dataflow systems (O'Reilly Velocit...
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...Vasia Kalavri
 
Apache Flink & Graph Processing
Apache Flink & Graph ProcessingApache Flink & Graph Processing
Apache Flink & Graph ProcessingVasia Kalavri
 
The shortest path is not always a straight line
The shortest path is not always a straight lineThe shortest path is not always a straight line
The shortest path is not always a straight lineVasia Kalavri
 
Graphs as Streams: Rethinking Graph Processing in the Streaming Era
Graphs as Streams: Rethinking Graph Processing in the Streaming EraGraphs as Streams: Rethinking Graph Processing in the Streaming Era
Graphs as Streams: Rethinking Graph Processing in the Streaming EraVasia Kalavri
 
Demystifying Distributed Graph Processing
Demystifying Distributed Graph ProcessingDemystifying Distributed Graph Processing
Demystifying Distributed Graph ProcessingVasia Kalavri
 
Like a Pack of Wolves: Community Structure of Web Trackers
Like a Pack of Wolves: Community Structure of Web TrackersLike a Pack of Wolves: Community Structure of Web Trackers
Like a Pack of Wolves: Community Structure of Web TrackersVasia Kalavri
 
Batch and Stream Graph Processing with Apache Flink
Batch and Stream Graph Processing with Apache FlinkBatch and Stream Graph Processing with Apache Flink
Batch and Stream Graph Processing with Apache FlinkVasia Kalavri
 
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache Flink
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache FlinkGelly-Stream: Single-Pass Graph Streaming Analytics with Apache Flink
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache FlinkVasia Kalavri
 
Asymmetry in Large-Scale Graph Analysis, Explained
Asymmetry in Large-Scale Graph Analysis, ExplainedAsymmetry in Large-Scale Graph Analysis, Explained
Asymmetry in Large-Scale Graph Analysis, ExplainedVasia Kalavri
 
Block Sampling: Efficient Accurate Online Aggregation in MapReduce
Block Sampling: Efficient Accurate Online Aggregation in MapReduceBlock Sampling: Efficient Accurate Online Aggregation in MapReduce
Block Sampling: Efficient Accurate Online Aggregation in MapReduceVasia Kalavri
 
MapReduce: Optimizations, Limitations, and Open Issues
MapReduce: Optimizations, Limitations, and Open IssuesMapReduce: Optimizations, Limitations, and Open Issues
MapReduce: Optimizations, Limitations, and Open IssuesVasia Kalavri
 
Gelly in Apache Flink Bay Area Meetup
Gelly in Apache Flink Bay Area MeetupGelly in Apache Flink Bay Area Meetup
Gelly in Apache Flink Bay Area MeetupVasia Kalavri
 
Apache Flink Deep Dive
Apache Flink Deep DiveApache Flink Deep Dive
Apache Flink Deep DiveVasia Kalavri
 
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15Vasia Kalavri
 

More from Vasia Kalavri (17)

From data stream management to distributed dataflows and beyond
From data stream management to distributed dataflows and beyondFrom data stream management to distributed dataflows and beyond
From data stream management to distributed dataflows and beyond
 
Self-managed and automatically reconfigurable stream processing
Self-managed and automatically reconfigurable stream processingSelf-managed and automatically reconfigurable stream processing
Self-managed and automatically reconfigurable stream processing
 
Predictive Datacenter Analytics with Strymon
Predictive Datacenter Analytics with StrymonPredictive Datacenter Analytics with Strymon
Predictive Datacenter Analytics with Strymon
 
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...Online performance analysis of distributed dataflow systems (O'Reilly Velocit...
Online performance analysis of distributed dataflow systems (O'Reilly Velocit...
 
Apache Flink & Graph Processing
Apache Flink & Graph ProcessingApache Flink & Graph Processing
Apache Flink & Graph Processing
 
The shortest path is not always a straight line
The shortest path is not always a straight lineThe shortest path is not always a straight line
The shortest path is not always a straight line
 
Graphs as Streams: Rethinking Graph Processing in the Streaming Era
Graphs as Streams: Rethinking Graph Processing in the Streaming EraGraphs as Streams: Rethinking Graph Processing in the Streaming Era
Graphs as Streams: Rethinking Graph Processing in the Streaming Era
 
Demystifying Distributed Graph Processing
Demystifying Distributed Graph ProcessingDemystifying Distributed Graph Processing
Demystifying Distributed Graph Processing
 
Like a Pack of Wolves: Community Structure of Web Trackers
Like a Pack of Wolves: Community Structure of Web TrackersLike a Pack of Wolves: Community Structure of Web Trackers
Like a Pack of Wolves: Community Structure of Web Trackers
 
Batch and Stream Graph Processing with Apache Flink
Batch and Stream Graph Processing with Apache FlinkBatch and Stream Graph Processing with Apache Flink
Batch and Stream Graph Processing with Apache Flink
 
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache Flink
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache FlinkGelly-Stream: Single-Pass Graph Streaming Analytics with Apache Flink
Gelly-Stream: Single-Pass Graph Streaming Analytics with Apache Flink
 
Asymmetry in Large-Scale Graph Analysis, Explained
Asymmetry in Large-Scale Graph Analysis, ExplainedAsymmetry in Large-Scale Graph Analysis, Explained
Asymmetry in Large-Scale Graph Analysis, Explained
 
Block Sampling: Efficient Accurate Online Aggregation in MapReduce
Block Sampling: Efficient Accurate Online Aggregation in MapReduceBlock Sampling: Efficient Accurate Online Aggregation in MapReduce
Block Sampling: Efficient Accurate Online Aggregation in MapReduce
 
MapReduce: Optimizations, Limitations, and Open Issues
MapReduce: Optimizations, Limitations, and Open IssuesMapReduce: Optimizations, Limitations, and Open Issues
MapReduce: Optimizations, Limitations, and Open Issues
 
Gelly in Apache Flink Bay Area Meetup
Gelly in Apache Flink Bay Area MeetupGelly in Apache Flink Bay Area Meetup
Gelly in Apache Flink Bay Area Meetup
 
Apache Flink Deep Dive
Apache Flink Deep DiveApache Flink Deep Dive
Apache Flink Deep Dive
 
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15
Large-scale graph processing with Apache Flink @GraphDevroom FOSDEM'15
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

A Skype case study (2011)

  • 1. P2P VoIP Applications:P2P VoIP Applications: “A Skype case-study”“A Skype case-study” Vasia Kalavri (vasia@ac.upc.edu) EMDC 2011 – Decentralized Systems Universitat Politècnica de Catalunya
  • 2. 2 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 3. 3 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 4. 4 P2P VoIP OverviewP2P VoIP Overview ● Communication Over IP Networks ● Free calls among Internet users ● Usually mixed centralized and P2P scheme ● Requirements ● Resource location ● Session establishment ● Session management ● Presence Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 5. 5 P2P VoIP ChallengesP2P VoIP Challenges ● Best-effort Internet ● Transmission delays ● Delay variations ● Packet loss ● Network failures ● NATs and Firewalls Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 6. 6 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 7. 7 Skype: why so popular?Skype: why so popular? ● Easy-to-use ● Works behind NATs and Firewalls (always?) ● More than 50 million users! ● Offers three services ● VoIP ● IM ● File transfer Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 8. 8 System Design: A KaZaASystem Design: A KaZaA extension?extension? ● Several studies conclude that Skype is related to Kazaa ● Founded by the same individuals ● Overlap of technical staff ● Use of the “supernode” hierarchical P2P network scheme ● KaZaA V 3.0 included a Skype client Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 9. 9 Skype Peer-to-Peer NetworkSkype Peer-to-Peer Network ● Supernodes ● Must be publicly reachable ● Run the regular Skype software ● Form an overlay among themselves ● Also act as ordinary nodes ● Ordinary Nodes ● Connect to one or more supernodes ● Issue queries through supernodes Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 10. 10 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 11. 11 Explaining SupernodesExplaining Supernodes Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 12. 12 The complete imageThe complete image Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 13. 13 System Design AdvantagesSystem Design Advantages ● High scalability ● Use of processing and networking power of the end-users ● Reduce costs ● Reliability by self-healing Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 14. 14 Self-healingSelf-healing Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 15. 15 Becoming a Supernode: How will itBecoming a Supernode: How will it affect my connection?affect my connection? ● Negligible additional processing power, memory and storage compared to an ordinary node Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 16. 16 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 17. 17 NAT TraversalNAT Traversal ● If one client is behind NAT ● Connection Reversal ● Hole Punching ● If both clients are behind NATs ● STUN ● If STUN fails ● TURN Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 18. 18 NAT Traversal: Connection ReversalNAT Traversal: Connection Reversal Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 19. 19 NAT Traversal: Hole PunchingNAT Traversal: Hole Punching Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 20. 20 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 21. 21 Self-healing - revisitedSelf-healing - revisited Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html What could possibly go wrong? Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 22. 22 11stst major outage: August 2007major outage: August 2007 ● The number of on-line users started falling unexpectedly ● Users faced login problems or slow services ● Problems lasted for more than 48h Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 23. 23 11stst major outage:major outage: ● Skype's Official Explanation ● A Microsoft Windows Update caused Supernodes to restart all at once ● Self-healing failed because too many users were chasing too few Supernodes ““Supernodes not so super”Supernodes not so super” ● Skype's Solution ● The system self-recovered completely after almost 48 hours. Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 24. 24 11stst major outagemajor outage Image Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.htmlImage Source: http://www.disruptivetelephony.com/2010/12/understanding-todays-skype-outage-explaining-supernodes.html Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 25. 25 11stst major outage:major outage: ● Questions raised ““Blame it on Microsoft!”Blame it on Microsoft!” ● Why this particular Tuesday? – Microsoft has been releasing security fixes on the 2nd Tuesday of each month since October 2003 ● Why at the same time? – Updates are downloaded and installed at 3am in the PC's local time – At the very least, systems would have rebooted time zone by time zone! ● Microsoft: “The disruption was caused by a bug in their software.” Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 26. 26 22ndnd major outage: December 2010major outage: December 2010 ● The network became unstable ● Suffered a critical failure ● The outage lasted for 24h approx. Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 27. 27 22ndnd major outage:major outage: ““Supernodes fail again”Supernodes fail again” ● A cluster of servers became overloaded... ● In version 5.0.0152 of Skype Windows client, the delayed responses caused crashes... ● 50% of all Skype users globally were running this version... ● Including 25–30% of the publicly available Supernodes! Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 28. 28 22ndnd major outage:major outage: Permanent Solutions?Permanent Solutions? ● Fixing software bugs ● Building a more resistant core-system ● Suggestions? ● Can we rely on user-Supernodes only? ● How can we recover faster next time? Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 29. 29 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 30. 30 Skype SecuritySkype Security ● Privacy: Does the Skype system allow an outsider to eavesdrop on a conversation? I don't mean a person in the next room! Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 31. 31 Skype Security: PrivacySkype Security: Privacy Login behind the scenes Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 32. 32 Skype Security: PrivacySkype Security: Privacy ● Skype uses encryption ● Specific algorithms not publicly available ● Key-exchange mechanisms not known ● Secure against casual snooping ● Packets can be observed but are undecipherable ● Searches are observable ● Unknown security level against sophisticated attacks Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 33. 33 Skype Security: PrivacySkype Security: Privacy Security PSTN VoIP Skype VoIP over VPN Silence ;) Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 34. 34 Skype Security: AuthenticitySkype Security: Authenticity ● Email-based Identification and Authentication ● username/password ● Registered e-mail address ● The network is involved → attacks are possible! Authentication security level: AOL, Webmail Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 35. 35 OutlineOutline ● Introduction ● The Skype P2P System ● Explaining Supernodes ● NAT Traversal ● Discussing outages ● Skype Security ● Conclusions
  • 36. 36 Conclusions on SkypeConclusions on Skype ● Gained popularity and offers good quality despite Internet limitations ● Good performance and user satisfaction ● Supernodes increase availability but also fail ● Not clear Security level ● Encryption, network involvement ● As secure as webmail Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 37. 37 General ConclusionsGeneral Conclusions ● VoIP over P2P is challenging but works ● Cost reduction sharing resources ● Fault Tolerance ● Increase call quality over best-effort Internet Introduction - Supernodes - NAT Traversal - Outages - Security - Conclusions
  • 38. 38 ReferencesReferences ● [1] Barbosa R, Kamienski C., Mariz D., Callado A., Fernandes S. Sadok D., “Performance evaluation os P2P VoIP applications” ● [2] Garfinkel, S.L. “VoIP and Skype Security”, Jan. 2005 ● [3] Saikat G., Daswani N., Jain R., “An Experimental study of the Skype Peer-to-Peer VoIP System”, February 2006 ● [4] Baset, S. A., And Schrulzrinne, H. “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol”, April 2006 ● [5] Liang, J., Kumar, R. and Ross, K. W., “ The kazaa overlay: A measurement study” ● [6] Haiyong Xie, Yang R. Yang, “A Measurement-based Study of the Skype Peer-to-Peer VoIP Performance”. ● [7] David A. Bryan, Bruce B. Lowerkamp, “SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System” ● [8] Ford B., Srisuresh P., Kegel D., “Peer-to-Peer Communication Across Network Address Translators” ● [9] http://blogs.skype.com/en/2010/12/cio_update.html ● [10] http://www.disruptivetelephony.com ● [11] http://news.techworld.com