SlideShare a Scribd company logo
1 of 9
Discussion On Routing Modes IETF72 P2PSIP WG   draft-jiang-p2psip-sep-01 ,[object Object],[object Object],[object Object]
Routing Modes  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Relay Peer And Direct Response?  Improve Success Rate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where Is Relay/Direct Response Helpful?  Dynamic Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Relay Peer Works - 1 A B C D Z X Y Request Originator Intermediate  Peer Destination Peer Relay Peer Pre-established connection 1 2 3 4 5 5 5 6 7 8 Request Symmetric Recursive Relay Peer
How Relay Peer Works - 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Concerns – Relay Peer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Concerns – DoS Attack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Next Step ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor NetworkAnjan Mondal
 
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...Eswar Publications
 
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSAN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSIJNSA Journal
 
Paper id 212014111
Paper id 212014111Paper id 212014111
Paper id 212014111IJRAT
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...IRJET Journal
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathIMPULSE_TECHNOLOGY
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE ijp2p
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkPhearin Sok
 
I Link Search And Routing In Social Networks
I Link Search And Routing In Social NetworksI Link Search And Routing In Social Networks
I Link Search And Routing In Social Networksnkaf61
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationIJCNCJournal
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621IJRAT
 
Csit54201
Csit54201Csit54201
Csit54201csandit
 
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisMulticasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisNagendra Posani
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERJournal For Research
 
Mncs 16-03-4주-변승규-a probabilistic and opportunistic flooding algorithm in wir...
Mncs 16-03-4주-변승규-a probabilistic and opportunistic flooding algorithm in wir...Mncs 16-03-4주-변승규-a probabilistic and opportunistic flooding algorithm in wir...
Mncs 16-03-4주-변승규-a probabilistic and opportunistic flooding algorithm in wir...Seung-gyu Byeon
 

What's hot (18)

Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor Network
 
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
 
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSAN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
 
Paper id 212014111
Paper id 212014111Paper id 212014111
Paper id 212014111
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypath
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
 
I Link Search And Routing In Social Networks
I Link Search And Routing In Social NetworksI Link Search And Routing In Social Networks
I Link Search And Routing In Social Networks
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Csit54201
Csit54201Csit54201
Csit54201
 
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisMulticasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
 
Jcomss 8358 final
Jcomss 8358 finalJcomss 8358 final
Jcomss 8358 final
 
Mncs 16-03-4주-변승규-a probabilistic and opportunistic flooding algorithm in wir...
Mncs 16-03-4주-변승규-a probabilistic and opportunistic flooding algorithm in wir...Mncs 16-03-4주-변승규-a probabilistic and opportunistic flooding algorithm in wir...
Mncs 16-03-4주-변승규-a probabilistic and opportunistic flooding algorithm in wir...
 
PHIN 2009 | PHLIP RnR Presentation
PHIN 2009  |  PHLIP RnR PresentationPHIN 2009  |  PHLIP RnR Presentation
PHIN 2009 | PHLIP RnR Presentation
 

Viewers also liked

WebRTC standards update - November 2014
WebRTC standards update - November 2014WebRTC standards update - November 2014
WebRTC standards update - November 2014Victor Pascual Ávila
 
電子書籍を売る方法
電子書籍を売る方法電子書籍を売る方法
電子書籍を売る方法Fumito Mizuno
 
IMS Value in a World of WebRTC and Mobile -- WebRTC Expo, Santa Clara, CA (No...
IMS Value in a World of WebRTC and Mobile -- WebRTC Expo, Santa Clara, CA (No...IMS Value in a World of WebRTC and Mobile -- WebRTC Expo, Santa Clara, CA (No...
IMS Value in a World of WebRTC and Mobile -- WebRTC Expo, Santa Clara, CA (No...Victor Pascual Ávila
 
Telco-OTT: infrastructure challenges and solutions
Telco-OTT: infrastructure challenges and solutionsTelco-OTT: infrastructure challenges and solutions
Telco-OTT: infrastructure challenges and solutionsVictor Pascual Ávila
 
WebRTC standards update (April 2014)
WebRTC standards update (April 2014)WebRTC standards update (April 2014)
WebRTC standards update (April 2014)Victor Pascual Ávila
 

Viewers also liked (8)

WebRTC standards update - November 2014
WebRTC standards update - November 2014WebRTC standards update - November 2014
WebRTC standards update - November 2014
 
IETF-74 Alto Discovery
IETF-74 Alto DiscoveryIETF-74 Alto Discovery
IETF-74 Alto Discovery
 
電子書籍を売る方法
電子書籍を売る方法電子書籍を売る方法
電子書籍を売る方法
 
IETF-74 PPSP BOF
IETF-74 PPSP BOFIETF-74 PPSP BOF
IETF-74 PPSP BOF
 
IETF-71 P2PSIP SEP
IETF-71 P2PSIP SEPIETF-71 P2PSIP SEP
IETF-71 P2PSIP SEP
 
IMS Value in a World of WebRTC and Mobile -- WebRTC Expo, Santa Clara, CA (No...
IMS Value in a World of WebRTC and Mobile -- WebRTC Expo, Santa Clara, CA (No...IMS Value in a World of WebRTC and Mobile -- WebRTC Expo, Santa Clara, CA (No...
IMS Value in a World of WebRTC and Mobile -- WebRTC Expo, Santa Clara, CA (No...
 
Telco-OTT: infrastructure challenges and solutions
Telco-OTT: infrastructure challenges and solutionsTelco-OTT: infrastructure challenges and solutions
Telco-OTT: infrastructure challenges and solutions
 
WebRTC standards update (April 2014)
WebRTC standards update (April 2014)WebRTC standards update (April 2014)
WebRTC standards update (April 2014)
 

Similar to IETF-72 P2PSIP Routing Modes

IEEE ICPADS 2008 - Kalman Graffi - SkyEye.KOM: An Information Management Over...
IEEE ICPADS 2008 - Kalman Graffi - SkyEye.KOM: An Information Management Over...IEEE ICPADS 2008 - Kalman Graffi - SkyEye.KOM: An Information Management Over...
IEEE ICPADS 2008 - Kalman Graffi - SkyEye.KOM: An Information Management Over...Kalman Graffi
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct doxBaig Mirza
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptxFamiDan
 
02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems02 - Topologies of Distributed Systems
02 - Topologies of Distributed SystemsDilum Bandara
 
Traffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuTraffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuMyNOG
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed ComputingAbhishek Jaisingh
 
Ccna interview questions
Ccna interview questions Ccna interview questions
Ccna interview questions Hub4Tech.com
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
 
raim-2015-paper31
raim-2015-paper31raim-2015-paper31
raim-2015-paper31John Wu
 
Top 20 ccna interview questions and answers pdf
Top 20 ccna interview questions and answers pdfTop 20 ccna interview questions and answers pdf
Top 20 ccna interview questions and answers pdfHub4Tech.com
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
NANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI EffectivenessNANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI EffectivenessAPNIC
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithmsAnurag Dashputre
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 

Similar to IETF-72 P2PSIP Routing Modes (20)

Attack tor
Attack torAttack tor
Attack tor
 
IEEE ICPADS 2008 - Kalman Graffi - SkyEye.KOM: An Information Management Over...
IEEE ICPADS 2008 - Kalman Graffi - SkyEye.KOM: An Information Management Over...IEEE ICPADS 2008 - Kalman Graffi - SkyEye.KOM: An Information Management Over...
IEEE ICPADS 2008 - Kalman Graffi - SkyEye.KOM: An Information Management Over...
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct dox
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptx
 
02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems
 
Traffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuTraffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie Liu
 
SOAP vs REST
SOAP vs RESTSOAP vs REST
SOAP vs REST
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
 
Ccna interview questions
Ccna interview questions Ccna interview questions
Ccna interview questions
 
slides
slidesslides
slides
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
 
raim-2015-paper31
raim-2015-paper31raim-2015-paper31
raim-2015-paper31
 
Top 20 ccna interview questions and answers pdf
Top 20 ccna interview questions and answers pdfTop 20 ccna interview questions and answers pdf
Top 20 ccna interview questions and answers pdf
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
NANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI EffectivenessNANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI Effectiveness
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
 
QSpiders - Presentation JMeter
QSpiders - Presentation JMeterQSpiders - Presentation JMeter
QSpiders - Presentation JMeter
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 

More from Victor Pascual Ávila

IETF98 - 3rd-Party Authentication for SIP
IETF98 - 3rd-Party Authentication for SIPIETF98 - 3rd-Party Authentication for SIP
IETF98 - 3rd-Party Authentication for SIPVictor Pascual Ávila
 
WebRTC standards overview -- WebRTC Barcelona Meetup MWC16
WebRTC standards overview -- WebRTC Barcelona Meetup MWC16WebRTC standards overview -- WebRTC Barcelona Meetup MWC16
WebRTC standards overview -- WebRTC Barcelona Meetup MWC16Victor Pascual Ávila
 
WebRTC standards update (April 2015)
WebRTC standards update (April 2015)WebRTC standards update (April 2015)
WebRTC standards update (April 2015)Victor Pascual Ávila
 
Upperside WebRTC conference - WebRTC intro
Upperside WebRTC conference - WebRTC introUpperside WebRTC conference - WebRTC intro
Upperside WebRTC conference - WebRTC introVictor Pascual Ávila
 
Guidelines to support RTCP end-to-end in Back-to-Back User Agents (B2BUAs)
Guidelines to support RTCP end-to-end in Back-to-Back User Agents (B2BUAs)Guidelines to support RTCP end-to-end in Back-to-Back User Agents (B2BUAs)
Guidelines to support RTCP end-to-end in Back-to-Back User Agents (B2BUAs)Victor Pascual Ávila
 
WebRTC from the service provider prism
WebRTC from the service provider prismWebRTC from the service provider prism
WebRTC from the service provider prismVictor Pascual Ávila
 
WebRTC Standards Update (October 2014)
WebRTC Standards Update (October 2014)WebRTC Standards Update (October 2014)
WebRTC Standards Update (October 2014)Victor Pascual Ávila
 
IETF 90 - DTLS-SRTP Handling in SIP B2BUAs
IETF 90 - DTLS-SRTP Handling in SIP B2BUAsIETF 90 - DTLS-SRTP Handling in SIP B2BUAs
IETF 90 - DTLS-SRTP Handling in SIP B2BUAsVictor Pascual Ávila
 
IETF 90 -- Guidelines to support RTCP end-to-end in SIP Back-to-Back User Age...
IETF 90 -- Guidelines to support RTCP end-to-end in SIP Back-to-Back User Age...IETF 90 -- Guidelines to support RTCP end-to-end in SIP Back-to-Back User Age...
IETF 90 -- Guidelines to support RTCP end-to-end in SIP Back-to-Back User Age...Victor Pascual Ávila
 
Digital Services Congress - OTT track - WebRTC panel: "Will WebRTC Mean a Mor...
Digital Services Congress - OTT track - WebRTC panel: "Will WebRTC Mean a Mor...Digital Services Congress - OTT track - WebRTC panel: "Will WebRTC Mean a Mor...
Digital Services Congress - OTT track - WebRTC panel: "Will WebRTC Mean a Mor...Victor Pascual Ávila
 
Realistic Future Service Provider Opportunities -- WebRTC Expo, Santa Clara, ...
Realistic Future Service Provider Opportunities -- WebRTC Expo, Santa Clara, ...Realistic Future Service Provider Opportunities -- WebRTC Expo, Santa Clara, ...
Realistic Future Service Provider Opportunities -- WebRTC Expo, Santa Clara, ...Victor Pascual Ávila
 
WebRTC standards update (13 Nov 2013)
WebRTC standards update (13 Nov 2013)WebRTC standards update (13 Nov 2013)
WebRTC standards update (13 Nov 2013)Victor Pascual Ávila
 
WebRTC Standards -- The 10 Minutes guide
WebRTC Standards -- The 10 Minutes guideWebRTC Standards -- The 10 Minutes guide
WebRTC Standards -- The 10 Minutes guideVictor Pascual Ávila
 
WebRTC and VoIP: bridging the gap (Kamailio world conference 2013)
WebRTC and VoIP: bridging the gap (Kamailio world conference 2013)WebRTC and VoIP: bridging the gap (Kamailio world conference 2013)
WebRTC and VoIP: bridging the gap (Kamailio world conference 2013)Victor Pascual Ávila
 

More from Victor Pascual Ávila (20)

IETF98 - 3rd-Party Authentication for SIP
IETF98 - 3rd-Party Authentication for SIPIETF98 - 3rd-Party Authentication for SIP
IETF98 - 3rd-Party Authentication for SIP
 
IETF meeting - SIP OAuth use cases
IETF meeting - SIP OAuth use casesIETF meeting - SIP OAuth use cases
IETF meeting - SIP OAuth use cases
 
WebRTC standards overview -- WebRTC Barcelona Meetup MWC16
WebRTC standards overview -- WebRTC Barcelona Meetup MWC16WebRTC standards overview -- WebRTC Barcelona Meetup MWC16
WebRTC standards overview -- WebRTC Barcelona Meetup MWC16
 
WebRTC standards update (April 2015)
WebRTC standards update (April 2015)WebRTC standards update (April 2015)
WebRTC standards update (April 2015)
 
Upperside WebRTC conference - WebRTC intro
Upperside WebRTC conference - WebRTC introUpperside WebRTC conference - WebRTC intro
Upperside WebRTC conference - WebRTC intro
 
Guidelines to support RTCP end-to-end in Back-to-Back User Agents (B2BUAs)
Guidelines to support RTCP end-to-end in Back-to-Back User Agents (B2BUAs)Guidelines to support RTCP end-to-end in Back-to-Back User Agents (B2BUAs)
Guidelines to support RTCP end-to-end in Back-to-Back User Agents (B2BUAs)
 
DTLS-SRTP Handling in SIP B2BUAs
DTLS-SRTP Handling in SIP B2BUAsDTLS-SRTP Handling in SIP B2BUAs
DTLS-SRTP Handling in SIP B2BUAs
 
WebRTC from the service provider prism
WebRTC from the service provider prismWebRTC from the service provider prism
WebRTC from the service provider prism
 
WebRTC Standards Update (October 2014)
WebRTC Standards Update (October 2014)WebRTC Standards Update (October 2014)
WebRTC Standards Update (October 2014)
 
IETF 90 - DTLS-SRTP Handling in SIP B2BUAs
IETF 90 - DTLS-SRTP Handling in SIP B2BUAsIETF 90 - DTLS-SRTP Handling in SIP B2BUAs
IETF 90 - DTLS-SRTP Handling in SIP B2BUAs
 
IETF 90 -- Guidelines to support RTCP end-to-end in SIP Back-to-Back User Age...
IETF 90 -- Guidelines to support RTCP end-to-end in SIP Back-to-Back User Age...IETF 90 -- Guidelines to support RTCP end-to-end in SIP Back-to-Back User Age...
IETF 90 -- Guidelines to support RTCP end-to-end in SIP Back-to-Back User Age...
 
WebRTC standards update (Jul 2014)
WebRTC standards update (Jul 2014)WebRTC standards update (Jul 2014)
WebRTC standards update (Jul 2014)
 
Digital Services Congress - OTT track - WebRTC panel: "Will WebRTC Mean a Mor...
Digital Services Congress - OTT track - WebRTC panel: "Will WebRTC Mean a Mor...Digital Services Congress - OTT track - WebRTC panel: "Will WebRTC Mean a Mor...
Digital Services Congress - OTT track - WebRTC panel: "Will WebRTC Mean a Mor...
 
WebRTC DataChannels demystified
WebRTC DataChannels demystifiedWebRTC DataChannels demystified
WebRTC DataChannels demystified
 
Realistic Future Service Provider Opportunities -- WebRTC Expo, Santa Clara, ...
Realistic Future Service Provider Opportunities -- WebRTC Expo, Santa Clara, ...Realistic Future Service Provider Opportunities -- WebRTC Expo, Santa Clara, ...
Realistic Future Service Provider Opportunities -- WebRTC Expo, Santa Clara, ...
 
WebRTC standards update (13 Nov 2013)
WebRTC standards update (13 Nov 2013)WebRTC standards update (13 Nov 2013)
WebRTC standards update (13 Nov 2013)
 
WebRTC Standards -- The 10 Minutes guide
WebRTC Standards -- The 10 Minutes guideWebRTC Standards -- The 10 Minutes guide
WebRTC Standards -- The 10 Minutes guide
 
WebRTC and VoIP: bridging the gap (Kamailio world conference 2013)
WebRTC and VoIP: bridging the gap (Kamailio world conference 2013)WebRTC and VoIP: bridging the gap (Kamailio world conference 2013)
WebRTC and VoIP: bridging the gap (Kamailio world conference 2013)
 
IETF84 - SIP over Websockets
IETF84 - SIP over WebsocketsIETF84 - SIP over Websockets
IETF84 - SIP over Websockets
 
IETF83 - SIP over Websockets
IETF83 - SIP over WebsocketsIETF83 - SIP over Websockets
IETF83 - SIP over Websockets
 

IETF-72 P2PSIP Routing Modes

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. How Relay Peer Works - 1 A B C D Z X Y Request Originator Intermediate Peer Destination Peer Relay Peer Pre-established connection 1 2 3 4 5 5 5 6 7 8 Request Symmetric Recursive Relay Peer
  • 6.
  • 7.
  • 8.
  • 9.