Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
NUTSS: a SIP-based approach to UDP and TCP network connectivity
Guha S., Takeda Y., Francis P.  Future directions in network architecture (Proceedings of the ACM SIGCOMM Workshop on Future Directions in Network Architecture, Portland, OR, Aug 30, 2004)43-48.2004.Type:Proceedings
Date Reviewed: Feb 21 2006

Network address translations (NATs) have proven to be a costly hurdle in the widespread deployment of voice over IP (VoIP). The cost can be measured in financial terms, as well as missed opportunities for a wider deployment of the technology. For a long time, the Internet Engineering Task Force (IETF) ignored NATs, hoping that they would go away. That indecision enabled the marketplace to become both judge and jury on what a NAT is, and how it should work, all without explicit guidance from the IETF. The result of this indecision is visible today most vividly in the VoIP area, where getting two VoIP peers to establish a voice session between autonomous organization boundaries is extremely difficult. Recently, the IETF has paid much more attention to the NAT issue, which is good news indeed.

So what does this have to do with the paper? The paper argues that the session initiation protocol (SIP), the foremost signaling protocol for establishing, maintaining, and terminating multimedia sessions, should be used as the protocol to establish all kinds of peer-to-peer (P2P) communications. In other words, SIP should become the middleware that P2P hosts use to figure out the reachability of each other across NAT-infested networks. SIP has had considerable success in defining its own extensions, and, sometimes, defining brand new protocols to address the NAT traversal issue.

The paper goes on to outline the NUTSS architecture, which is still in nascent form, and to provide a transmission control protocol (TCP) solution using it (TCP has proven to be problematic when used with NATs, for various reasons outlined in the paper).

Using SIP as middleware for network discovery among P2P peers is an interesting idea. However, it would seem more appropriate if the P2P peers used the underlying ideas and protocols from SIP to discover peers, rather than SIP itself. In other words, SIP uses secondary protocols like serial tunneling (STUN) and traversal using relay NAT (TURN), and a unifying protocol called interactive connection establishment (ICE) to discover peers. STUN, TURN, and ICE are orthogonal to SIP. It would seem more appropriate for P2P hosts to use STUN, TURN, and ICE directly, instead of implementing the SIP transactional state machines and offer/answer model to discover peers, especially if they have no use for interactive multimedia sessions.

Reviewer:  Vijay Gurbani Review #: CR132457 (0612-1250)
Bookmark and Share
  Reviewer Selected
 
 
Protocol Architecture (C.2.2 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Protocol Architecture": Date
Efficient at-most-once messages based on synchronized clocks
Liskov B., Shrira L., Wroclawski J. ACM Transactions on Computer Systems 9(2): 125-142, 1991. Type: Article
May 1 1992
Communications for cooperating systems
Cypser R., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1991. Type: Book (9780201507751)
Oct 1 1992
Data communications: the implications of communication systems for protocol design
Goldstein B., Jaffe J. IBM Systems Journal 26(1): 122-136, 1987. Type: Article
Feb 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy