A society-integrated testbed architecture for peer-to-peer telecommunications

Exploiting and deploying telecommunication services on Internet Telephony are imperative for a large market share. However, the distributed nature of peer-to-peer (P2P) network makes services implementation very difficult. In order to meet the research goals of achieving P2P telecommunication services through the union of social and computer networks, we present a society-integrated testbed architecture for P2P voice over IP (VoIP). By introducing an architecture that exploits and entailing social structure based connection establishment, the testbed presents an organic integration of social functionalities with good portability. The testbed also serves as a flexible tool suite that can be used to run experiments and obtain timely feedback based on the performance measurements.

[1]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[2]  Xuxian Jiang,et al.  Billing Attacks on SIP-Based VoIP Systems , 2007, WOOT.

[3]  Jan Seedorf,et al.  Lawful Interception in P2P-Based VoIP Systems , 2008, IPTComm.

[4]  Anne-Marie Kermarrec,et al.  Lightweight probabilistic broadcast , 2003, TOCS.

[5]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[6]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[7]  R. Guerraoui,et al.  Lightweight Probabilistic Broadcast £ Ý , 2004 .

[8]  L. Stein,et al.  Probability and the Weighing of Evidence , 1950 .

[9]  Ram Dantu,et al.  Achieving Peer-to-Peer Telecommunication Services through Social Hashing , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[10]  John Kubiatowicz,et al.  Handling churn in a DHT , 2004 .

[11]  Ge Zhang,et al.  Revealing the Calling History of SIP VoIP Systems by Timing Attacks , 2009, 2009 International Conference on Availability, Reliability and Security.

[12]  Henning Schulzrinne,et al.  Using an External DHT as a SIP Location Service , 2006 .

[13]  Feng Cao,et al.  Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).

[14]  Henning Schulzrinne,et al.  Framework for Emergency Calling Using Internet Multimedia , 2011, RFC.

[15]  Ram Dantu,et al.  Inferring Social Groups Using Call Logs , 2008, OTM Workshops.

[16]  David E. Culler,et al.  SEDA: an architecture for well-conditioned, scalable internet services , 2001, SOSP.

[17]  L. J. Savage,et al.  Probability and the weighing of evidence , 1951 .

[18]  Nilanjan Banerjee,et al.  Anti-vamming trust enforcement in peer-to-peer VoIP networks , 2006, IWCMC '06.

[19]  Peter Druschel,et al.  Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .