One document matched: draft-matthews-sipping-p2p-industrial-strength-00.txt


SIPPING Working Group                                       P. Matthews 
Internet Draft                                          Nimcat Networks 
Expires: August 2005                                                    
                                                            B. Poustchi 
                                                        Nimcat Networks 
 
                                                      February 11, 2005 
                                    
 
                                      
                        Industrial-Strength P2P SIP 
           draft-matthews-sipping-p2p-industrial-strength-00.txt 


Status of this Memo 

   By submitting this Internet-Draft, I certify that any applicable 
   patent or other IPR claims of which I am aware have been disclosed, 
   or will be disclosed, and any of which I become aware will be 
   disclosed, in accordance with RFC 3668. 

   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet-
   Drafts. 

   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 

   The list of current Internet-Drafts can be accessed at 
        http://www.ietf.org/ietf/1id-abstracts.txt 

   The list of Internet-Draft Shadow Directories can be accessed at 
        http://www.ietf.org/shadow.html 

   This Internet-Draft will expire on August 11, 2005. 

Copyright Notice 

      Copyright (C) The Internet Society (2005).  All Rights Reserved. 

Abstract 

   If internet telephony networks based on peer-to-peer and Session 
   Initiation Protocol (SIP) technology are to become as viable as 
   existing centralized telephony services, the peer-to-peer SIP 
 
 
 
Matthews & Poustchi    Expires August 11, 2005                 [Page 1] 

Internet-Draft        Industrial-Strength P2P SIP         February 2005 
    

   technology must offer all the features of existing technologies. This 
   draft lists some features which are in some way "challenging" for 
   peer-to-peer SIP to support, and proposes a structure for the 
   resulting protocol suite. 

1. Introduction 

   Peer-to-peer technology offers the promise of being able to replace 
   centralized services with distributed systems, thus eliminating the 
   need for a centralized server. Our interest lies in the application 
   of peer-to-peer technology to telephony networks based on SIP [1]. 
   Specifically, we are interested in constructing peer-to-peer 
   telephony networks that offer the same feature set as existing 
   centralized networks, but at a lower cost. The lower cost comes from 
   eliminating the need to buy and set up central servers. 

   In order for networks based on peer-to-peer SIP technology 
   (henceforth called P2P SIP) to become as viable as existing networks, 
   the new P2P SIP technology must offer the same feature set and 
   performance as existing technology. We apply the term "industrial-
   strength" to P2P SIP technology that meets this goal, in order to 
   contrast it with other P2P SIP technology that has less-stringent 
   goals.  

   Recently, a couple of other drafts [2][3] on P2P SIP technology have 
   been submitted to the SIPPING working group. The contribution of this 
   draft is the focus on "industrial-strength" P2P SIP and its 
   implications. 

   Specifically, this draft does two things. In section 2, it lists some 
   features that must be supported by an "industrial-strength" P2P SIP 
   network. In section 3, it presents a structure for the resulting P2P 
   SIP protocol suite. 

   This draft is being discussed on the SIPPING Working Group mailing 
   list (sipping@ietf.org). 

2. Features for "industrial-strength" P2P SIP networks 

   It may be that there will be different types of P2P SIP networks. One 
   type that that has been mentioned by others is ad-hoc networks, 
   formed to allow people with similar interests to set up a private 
   overlay network for communication. These are usually envisioned to be 
   temporary and/or have a reasonably high membership churn.  

   We, however, are interested in more permanent networks that replace 
   existing telephony systems. An example is placing P2P SIP technology 
 
 
Matthews & Poustchi      Expires August 11, 2005               [Page 2] 

Internet-Draft        Industrial-Strength P2P SIP         February 2005 
    

   inside phones in an office to give the illusion that the phones are 
   connected to a centralized PBX system. Here the advantage of P2P 
   technology is that there is no need to buy and maintain a centralized 
   PBX server.  

   For these more permanent P2P SIP networks to be successful, they must 
   duplicate most of the features of existing telephony systems. In 
   particular, some of the necessary features that might be considered 
   more "challenging" are:  

   o  Support for heterogeneous networks 

   o  Support for call handling for an unreachable device 

   o  Support for dividing the network into zones 

   o  Support for network management 

   o  Security  

   These features are discussed in more detail in the sub-sections 
   below. 

2.1. Heterogeneous networks 

   The P2P SIP network must support a mixture of devices with different 
   attachment bandwidths, storage capacities, network availabilities, 
   and mobility capabilities. For example, the network may consist of a 
   mixture of phones (either soft or hard) that sit on users' desks and 
   are almost always connected to the network, with some mobile wireless 
   handsets that connect and disconnect frequently and may have lower 
   attachment bandwidths and local storage capacities. The challenge 
   here is to devise protocols that take these different device 
   capabilities into account.  

   For example, some P2P lookup protocols (like Jxta [4]) assume that 
   devices join and leave the network frequently and are thus optimized 
   for this case. Other P2P protocols (like CAN [5] and Chord [6]) are 
   more concerned with reducing lookup time, and thus device-join and 
   device-leave operations are relatively more expensive.  

2.2. Call handling for an unreachable device 

   The P2P SIP network must support call handling features such as call 
   forwarding and voicemail. The challenge here is to support these 
   features in a P2P network where devices are not always reachable. 

 
 
Matthews & Poustchi      Expires August 11, 2005               [Page 3] 

Internet-Draft        Industrial-Strength P2P SIP         February 2005 
    

   For example, consider a handheld SIP phone using WiFi for network 
   connectivity. When the device becomes unreachable because it is out-
   of-range (or turned off), the phone's owner might like callers to be 
   forwarded to another number or to be able to leave a voicemail 
   message. How does the system remember this preference when the user's 
   phone is not available, and how does it store any voicemail message? 
   In a pure P2P system, both pieces of information must be stored on 
   another user's device. And since that second device might also become 
   unreachable, we must duplicate the information and store copies on a 
   number of devices to ensure that the information (both call treatment 
   information and any received voicemail message) is available when it 
   is needed (e.g., when a call comes in or the user wants to retrieve 
   stored voicemail messages). Here the characteristics of different 
   device comes into account: storing this information on other handheld 
   WiFi devices is likely to result in more messaging and be perhaps 
   less-reliable compared to storing copies on stationary desktop 
   devices. 

2.3. Dividing the network into zones 

   As a network of any type grows larger, any security, stability or 
   scalability problems the network might have tend to get magnified. As 
   a result, the network is often divided into zones to try to keep 
   problems in one part of the network for affecting another part. 

   An example is the deployment of BGP, which can be considered an early 
   P2P protocol. Here, service providers run one flavor of BGP (iBGP) 
   internally, and another flavor (eBGP) when connecting to other 
   carriers. Moreover, larger service providers often divide up their 
   internal networks (for example, by using BGP confederation or 
   multiple autonomous system (AS) numbers) to achieve greater 
   scalability and to try to restrict problems to a portion of their 
   network. 

   We believe that any "industrial-strength" P2P SIP protocol suite will 
   need ways to divide the network up into zones. 

   Note that dividing a network into zones may also make it easier to 
   support heterogeneous networks. 

2.4. Network Management 

   The P2P SIP network must provide a way for an authorized 
   administrator to perform typical network management functions, such 
   as: 


 
 
Matthews & Poustchi      Expires August 11, 2005               [Page 4] 

Internet-Draft        Industrial-Strength P2P SIP         February 2005 
    

   o  Diagnose and correct network problems  
         ("Why can't I reach Alice?") 

   o  Configure network settings 
         ("Store a maximum of 3 minutes of voicemail for each user") 

   o  Change user privileges or perform other per-user operations 
         ("Please reset my password?") 

   The details of how network management is done will likely vary from 
   vendor to vendor, but the P2P SIP protocol suite needs to provide 
   some basic support for this function. 

2.5. Security 

   Security in an "industrial-strength" P2P SIP network is very 
   important, perhaps even more important than in ad-hoc networks. 

   Other documents ([2][3]) have discussed various security issues in 
   P2P SIP networks. Here we mention some of the additional security 
   issues raised by the features discussed in this draft: 

   o  If a voicemail message is left for Alice when Alice's phone is not 
      available, then the message must be stored somewhere on the 
      network. This will involve storing a copy (or part of a copy) in 
      the phones of various users. If Bob is one of those users, then 
      Bob should not be able to hear it or tamper with it.  

   o  Say Alice sets her desktop phone's call handling preferences so 
      that most missed calls get redirected to voicemail, but calls from 
      certain friends get redirected to her mobile phone. If Charlie 
      (who is not on Alice's list of friends) phones Alice, then he 
      should not be able to learn the address of her mobile phone 
      (unless Alice wishes it). 

   And, of course, anyone who attempts to do network management 
   operations must be authenticated. 

3. Structure of the P2P SIP protocol suite 

   Based on the above feature set, we suggest the P2P SIP protocol suite 
   be divided into the following parts: 

   o  P2P layer 

   o  SIP layer 

 
 
Matthews & Poustchi      Expires August 11, 2005               [Page 5] 

Internet-Draft        Industrial-Strength P2P SIP         February 2005 
    

   o  Call Services layer 

   The P2P layer provides basic P2P services for registering and 
   locating nodes and resources. This should be a generic P2P layer that 
   can be used for many different P2P applications. This layer needs to 
   take the capabilities of different devices into account, but should 
   need no special knowledge of P2P SIP. 

   The SIP layer includes SIP and any extensions (e.g., SIMPLE). This 
   layer is basically the SIP protocol and extensions as they are today 
   -- little or no changes should be required.  

   The Call Services layer provides the protocols that support call 
   forwarding, voicemail, and similar services. This layer builds upon 
   the services of the P2P and SIP layers and defines protocols as 
   necessary. In essence, this is glue layer that takes the independent 
   P2P and SIP layers and brings them together into the cohesive whole 
   we call P2P SIP. 

   Structuring P2P SIP in this manner has the following properties: 

   o  It leaves the SIP layer basically untouched. This maintains two 
      often-citied advantages of SIP over H.323: simplicity and narrow 
      focus. 

   o  It leaves the P2P layer independent of SIP. Thus the P2P layer can 
      evolve independently of SIP, and can be used for other 
      applications that run on the devices in the network that have 
      nothing to do with SIP. 

   By way of analogy, consider the relationship between SIP and SDP. 
   Though SDP is commonly used with SIP, there is nothing in the SIP 
   protocol that gives SDP any special consideration, and it is easy to 
   substitute another protocol in place of SDP. The above structure 
   supports the same relationship between SIP and P2P.  

    
4. Security Considerations 

   See section 2.5.  

5. Acknowledgments 

   We thank Eric Cooper, Mahshad Koohgoli, and Jim Stelzig for useful 
   discussions leading up to this draft. 


 
 
Matthews & Poustchi      Expires August 11, 2005               [Page 6] 

Internet-Draft        Industrial-Strength P2P SIP         February 2005 
    

6. Informative References 

   [1]   Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., 
         Peterson, J., Sparks, R., Handley, M. and E. Schooler, "SIP: 
         Session Initiation Protocol", RFC 3261, June 2002. 

   [2]   Bryan, D. and Jennings, C., "A P2P approach to SIP 
         Registration", Internet-Draft draft-bryan-sipping-p2p-00, 
         January 2005. 

   [3]   Johnston, A., "SIP, P2P, and Internet Communications", 
         Internet-Draft draft-johnston-sipping-p2p-ipcom-00, January 
         2005. 

   [4]   Traversat, B. et al. "Project JXTA 2.0 Super-Peer Virtual 
         Network", May 2003.                                      
         Available at http://www.jxta.org/white_papers.html. 

   [5]   Ratnasamy, S. P. Francis, M. Handley, R. Karp, and S. Shenker 
         "A Scalable Content-Addressable Network", SIGCOMM 2001 
         Conference, August 2001. 

   [6]   Stoica, I., R. Morris, D. Karger, M.F. Kaashoek, and H. 
         Balakrishnan "Chord: A Scalable Peer-to-peer Lookup Service for 
         Internet Applications", SIGCOMM 2001 Conference, August 2001. 

   [7]   Zhao, B.Y., J. Kubiatowicz, and A.D.Joseph "Tapestry: An 
         Infrastructure for Fault-tolerant Wide-area Location and 
         Routing", UC Berkeley Technical Report UCB/CSD-01-1141, April 
         2001. 
         Available at http://www.cs.berkeley.edu/~ravenben/publications/ 
         CSD-01-1141.pdf 

   [8]   Rowstron, A. and P. Druschel, "Pastry: Scalable, distributed 
         object location and routing for large-scale peer-to-peer 
         systems", IFIP/ACM Int. Conf. on Distributed Systems Platforms, 
         November 2001. 
         Available at http://research.microsoft.com/~antr/Pastry/ 
         pubs.htm 

    






 
 
Matthews & Poustchi      Expires August 11, 2005               [Page 7] 

Internet-Draft        Industrial-Strength P2P SIP         February 2005 
    

Authors' Addresses 

   Philip Matthews 
   Nimcat Networks 
   1135 Innovation Drive 
   Ottawa, Ontario K2K 3G7 
   Email: matthews@nimcatnetworks.com 
    
    
   Behrouz Poustchi 
   Nimcat Networks 
   1135 Innovation Drive 
   Ottawa, Ontario K2K 3G7 
   Email: poustchi@nimcatnetworks.com 
    

    

Intellectual Property Statement 

   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed to 
   pertain to the implementation or use of the technology described in 
   this document or the extent to which any license under such rights 
   might or might not be available; nor does it represent that it has 
   made any independent effort to identify any such rights.  Information 
   on the procedures with respect to rights in RFC documents can be 
   found in BCP 78 and BCP 79. 

   Copies of IPR disclosures made to the IETF Secretariat and any 
   assurances of licenses to be made available, or the result of an 
   attempt made to obtain a general license or permission for the use of 
   such proprietary rights by implementers or users of this 
   specification can be obtained from the IETF on-line IPR repository at 
   http://www.ietf.org/ipr. 

   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights that may cover technology that may be required to implement 
   this standard.  Please address the information to the IETF at 
   ietf-ipr@ietf.org.  By submitting this Internet-Draft, I certify that 
   any applicable patent or other IPR claims of which I am aware have 
   been disclosed, and any of which I become aware will be disclosed, in 
   accordance with RFC 3668. 



 
 
Matthews & Poustchi      Expires August 11, 2005               [Page 8] 

Internet-Draft        Industrial-Strength P2P SIP         February 2005 
    

Disclaimer of Validity 

   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 

Copyright Statement 

   Copyright (C) The Internet Society (2005).  This document is subject 
   to the rights, licenses and restrictions contained in BCP 78, and 
   except as set forth therein, the authors retain all their rights. 

Acknowledgment 

   Funding for the RFC Editor function is currently provided by the 
   Internet Society. 



























 
 
Matthews & Poustchi      Expires August 11, 2005               [Page 9] 



PAFTECH AB 2003-20262026-04-22 09:24:09