855,660 research outputs found
Peer-to-Peer Communication Across Network Address Translators
Network Address Translation (NAT) causes well-known difficulties for
peer-to-peer (P2P) communication, since the peers involved may not be reachable
at any globally valid IP address. Several NAT traversal techniques are known,
but their documentation is slim, and data about their robustness or relative
merits is slimmer. This paper documents and analyzes one of the simplest but
most robust and practical NAT traversal techniques, commonly known as "hole
punching." Hole punching is moderately well-understood for UDP communication,
but we show how it can be reliably used to set up peer-to-peer TCP streams as
well. After gathering data on the reliability of this technique on a wide
variety of deployed NATs, we find that about 82% of the NATs tested support
hole punching for UDP, and about 64% support hole punching for TCP streams. As
NAT vendors become increasingly conscious of the needs of important P2P
applications such as Voice over IP and online gaming protocols, support for
hole punching is likely to increase in the future.Comment: 8 figures, 1 tabl
Symmetric and Synchronous Communication in Peer-to-Peer Networks
Motivated by distributed implementations of game-theoretical algorithms, we
study symmetric process systems and the problem of attaining common knowledge
between processes. We formalize our setting by defining a notion of
peer-to-peer networks(*) and appropriate symmetry concepts in the context of
Communicating Sequential Processes (CSP), due to the common knowledge creating
effects of its synchronous communication primitives. We then prove that CSP
with input and output guards makes common knowledge in symmetric peer-to-peer
networks possible, but not the restricted version which disallows output
statements in guards and is commonly implemented.
(*) Please note that we are not dealing with fashionable incarnations such as
file-sharing networks, but merely use this name for a mathematical notion of a
network consisting of directly connected peers "treated on an equal footing",
i.e. not having a client-server structure or otherwise pre-determined roles.)Comment: polished, modernized references; incorporated referee feedback from
MPC'0
Detection of Peer-to-Peer Communication
Bakalářská práce se věnuje problematice detekce P2P sítí ze síťových toků NetFlow. V teoretické části této práce jsou představeny aktuální techniky pro detekci této komunikace v síti společně s jejich výhodami a nevýhodami. Největší pozornost je věnována klasifikačnímu schématu pana Bashira, které se věnuje detekci protokolu BitTorrent a aplikace Skype z NetFlow záznamů v síti. Na základě tohoto schématu je navržen detekční modul pro modulární systém analýzy síťových dat Nemea vyvíjený organizací Cesnet. V praktické části práce je pak představena implementace tohoto modulu a jsou prezentovány výsledky experimentů nad reálnými daty.This thesis is focused on issues in detection of P2P network from NetFlow. In the theoretical part of this work are introduced actual techniques in detection of this communication in network. There are presented their advantages and disadvantages too. The biggest attention is focused on the classification scheme of Mr. Bashir which deals with a detection of a protocol BitTorrent and a Skype application from Netflow. Following this scheme is designed a detection module for a modular system of a traffic analysis Nemea, developed by Cesnet organization. In the practical part of this work is introduced the implementation of this module. There are also presented results of experiments with real data.
Peer-to-Peer and Mass Communication Effect on Revolution Dynamics
Revolution dynamics is studied through a minimal Ising model with three main
influences (fields): personal conservatism (power-law distributed),
inter-personal and group pressure, and a global field incorporating
peer-to-peer and mass communications, which is generated bottom-up from the
revolutionary faction. A rich phase diagram appears separating possible
terminal stages of the revolution, characterizing failure phases by the
features of the individuals who had joined the revolution. An exhaustive
solution of the model is produced, allowing predictions to be made on the
revolution's outcome
Peer to peer Audio and Video Communication
In this paper we introduce a simple way on how you can build your own “end-to- end” audio and video chat. You can expect to learn how to add new features on it, as well as building your own signaling server, your mobile UI and mobile calls logic implemented in a perfect coexistence between NodeJS, Java and Kotlin. What makes this application special is the possibility to express yourself with different annotations while you’re on a video chat
Security in peer-to-peer communication systems
P2PSIP (Peer-to-Peer Session Initiation Protocol) is a protocol developed by the IETF (Internet Engineering Task Force) for the establishment, completion and modi¿cation of communication sessions that emerges as a complement to SIP (Session Initiation Protocol) in environments where the original SIP protocol may fail for technical, ¿nancial, security, or social reasons. In order to do so, P2PSIP systems replace all the architecture of servers of the original SIP systems used for the registration and location of users, by a structured P2P network that distributes these functions among all the user agents that are part of the system. This new architecture, as with any emerging system, presents a completely new security problematic which analysis, subject of this thesis, is of crucial importance for its secure development and future standardization.
Starting with a study of the state of the art in network security and continuing with more speci¿c systems such as SIP and P2P, we identify the most important security services within the architecture of a P2PSIP communication system: access control, bootstrap, routing, storage and communication. Once the security services have been identi¿ed, we conduct an analysis of the attacks that can a¿ect each of them, as well as a study of the existing countermeasures that can be used to prevent or mitigate these attacks. Based on the presented attacks and the weaknesses found in the existing measures to prevent them, we design speci¿c solutions to improve the security of P2PSIP communication systems. To this end, we focus on the service that stands as the cornerstone of P2PSIP communication systems¿ security: access control. Among the new designed solutions stand out: a certi¿cation model based on the segregation of the identity of users and nodes, a model for secure access control for on-the-¿y P2PSIP systems
and an authorization framework for P2PSIP systems built on the recently published Internet Attribute Certi¿cate Pro¿le for Authorization.
Finally, based on the existing measures and the new solutions designed, we de¿ne a set of security recommendations that should be considered for the design, implementation and maintenance of P2PSIP communication systems.Postprint (published version
- …