2010 7th IEEE Consumer Communications and Networking Conference 2010
DOI: 10.1109/ccnc.2010.5421852
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Delays in a Peer-to-Peer Session Initiation Protocol Overlay Network

Abstract: Peer-to-Peer Session Initiation Protocol (P2PSIP) is a new decentralized person-to-person communication system that is currently being standardized in the Internet Engineering Task Force (IETF). P2PSIP uses the Session Initiation Protocol (SIP) to enable real-time communication in a peer-to-peer environment.The underlying lookup mechanism is implemented using a Distributed Hash Table (DHT). In this paper, we study delays associated with joining, leaving, and initiating calls in a P2PSIP system through experime… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…While peer-to-peer for Session Initiation Protocol (P2PSIP) also uses Chord to organize SIP proxies, the performance measure of P2PSIP and SARP are different. In P2PSIP, the main performance measure is the session setup delay, which is closely related to the query delay in the Chord system [33], [34]. On the other hand, in SARP, the main focus is handover delay.…”
Section: Comparison Of Sarp With Standard Pmipv6mentioning
confidence: 99%
“…While peer-to-peer for Session Initiation Protocol (P2PSIP) also uses Chord to organize SIP proxies, the performance measure of P2PSIP and SARP are different. In P2PSIP, the main performance measure is the session setup delay, which is closely related to the query delay in the Chord system [33], [34]. On the other hand, in SARP, the main focus is handover delay.…”
Section: Comparison Of Sarp With Standard Pmipv6mentioning
confidence: 99%
“…As in any self-organizing network, the participants have to perform maintenance tasks in order to adapt themselves to the changing nature of the network: the routing tables should be revised and the data should be relocated in accordance with the new topology. The cost of these maintenance operations (an excellent analysis of this cost in P2PSIP system is presented in [252], [253] and [254]), added to the expense for the network of the bootstrapping process of each new joining node, could be used by a malicious user, or a coalition of them, to quickly and repeatedly join and leave the network to try to destabilize the system. This, commonly known as Join and Leave Attack, could from increasing the delay to establish a multimedia communication session or update a user's status to completely collapse the system.…”
Section: Join and Leave Attackmentioning
confidence: 99%