SlideShare a Scribd company logo
1 of 21
Table of Content
• Introduction
– Why WebRTC is Important?
– What We Can Do With WebRTC?
– Browser Supports
• Architecture of WebRTC
– Architecture of WebRTC app
– Signaling
• Security measures in WebRTC
• WebRTC Vulnerabilities
• Advanced Features
WebRTC stands for …?
• Web Real Time Communication
 WebRTC let you to Cooperate with Video, Audio and Data Communication.
 Can Communicate peer to peer without centralized server.
 This standard enables users to communicate in real-time through a web-browser
or a mobile app
Why WebRTC is Important…?
• No centralized server required,
• Adapted by wide range of browsers,
• The WebRTC client makes use of a microphone, speakers, and/or
camera attached to the computer to send audio and/or video.
• This means that a user can communicate with others with basically
nothing but a browser and internet connection.
Browser Supports…
What We Can Do With WebRTC…?
• Potential Use Cases and Inspiration
– File Sharing
– Screen Sharing
– Video Conferencing/Tele presence
– Integrated Text Chat
– Virtual Conference
– Remote Desktop Applications
– Multi Player
Architecture of WebRTC
Architecture of WebRTC app
Signaling…
• WebRTC signaling refers to the process of setting up, controlling, and
terminating a communication session. In order for two endpoints to
begin talking to one another, three types of information must be
exchanged:
– Session control information
– Network Data
– Media Data
Signaling Servers…
• STUN – Session Traversal Utilities for NAT
– NAT – Network Address Translation
• TURN – Traversal Using Relay NAT
• ICE – Interactive Connectivity Establishment
STUN server…
• STUN server allows clients to discover their public IP address and the
type of NAT they are behind.
• In most cases, a STUN server is only used during the connection setup
and once that session has been established, media will flow directly
between clients.
TURN Server
• If a STUN server cannot establish the connection, ICE can turn to TURN
(pardon the pun).
• TURN is an extension to STUN that allows media traversal over a NAT
that does not do the “consistent hole punch” required by STUN traffic.
• TURN servers are often used in the case of a symmetric NAT.
ICE
• ICE is a framework that allows WebRTC to overcome the complexities
of real-world networking.
• It’s ICE’s job to find the best path to connect peers. It may be able to
do that with a direct connection between the clients, but it also works
for clients where a direct connection is not possible (i.e. behind NATs).
Security measures in WebRTC…
● Encrypt the data as it travels between users.So interception could only
be done in the end points or media gateway.
● Browsers will ask users to verify access to their cameras and
microphones.
WebRTC Vulnerabilities
• Access to devices
HTML and JavaScript are executed by the browser as a sandbox
designed to be isolated from the rest of the computer. How ever bug may
be exist.
-Threats
• Web page’s access to user’s camera and microphone without
permission.
• Users can be potentially being recorded with JavaScript code
downloaded from the malicious web server.
Security of the turn server
• Turn is necessary to establish bi-
directional flows.
• Media relaying is an expensive
resource. So it is protected with
credentials.
• Those credentials can be long-term.
If these credentials are stolen the
turn server can be abused.
Protection
• Signaling over TLS
TLS provide privacy ,integrity and authentication. It is also provides
server authentication and client authentication if a client certificate is
provided.
If the client certificate is signed by a trusted certification authority the
real time communication can have legal value. But attacker can use
dummy certificate for the attack. Due to that HTTPS must used when
working with WebRTC.
Advanced features
• Simulcast
• SFU
Simulcast
ability to adopt the quality of video for each participants.
Desktop
Desktop
Mobile
Cr. Book
1080 P
720 P
360 P
1080P
720 P
360 P
SFU
SFU=Selective Forwarding Unit
Selective forwarding unit(SFU)
• Early days MCU(Multipoint Control Unit) used for that case .But this
approach is very expensive computationally.
• Thus, Selective Forwarding Units (SFUs) have become popular as a
more economical solution for multi-party video routing.
• It is selects the which sender stream to forward to a receiver.
• It is making video encoding more flexible.
Thank You

More Related Content

Similar to WebRTC Fundamentals

WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
Janus/SIP @ OpenSIPS 2019
Janus/SIP @ OpenSIPS 2019Janus/SIP @ OpenSIPS 2019
Janus/SIP @ OpenSIPS 2019Lorenzo Miniero
 
minor-project-1.ppt
minor-project-1.pptminor-project-1.ppt
minor-project-1.pptthinkonce1
 
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...Journal For Research
 
How to Architect your WebRTC application, Alberto Gonzalez and Arin Sime, Web...
How to Architect your WebRTC application, Alberto Gonzalez and Arin Sime, Web...How to Architect your WebRTC application, Alberto Gonzalez and Arin Sime, Web...
How to Architect your WebRTC application, Alberto Gonzalez and Arin Sime, Web...Alan Quayle
 
D1-3-Signaling
D1-3-SignalingD1-3-Signaling
D1-3-SignalingOleg Levy
 
What is WebRTC and How does it work?
What is WebRTC and How does it work?What is WebRTC and How does it work?
What is WebRTC and How does it work?SandipPatel533958
 
Architecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeArchitecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeAlan Quayle
 
[Wroclaw #4] WebRTC & security: 101
[Wroclaw #4] WebRTC & security: 101[Wroclaw #4] WebRTC & security: 101
[Wroclaw #4] WebRTC & security: 101OWASP
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?Daniel Appelquist
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALLMoin Islam
 

Similar to WebRTC Fundamentals (20)

WebRTC
WebRTCWebRTC
WebRTC
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
Janus/SIP @ OpenSIPS 2019
Janus/SIP @ OpenSIPS 2019Janus/SIP @ OpenSIPS 2019
Janus/SIP @ OpenSIPS 2019
 
minor-project-1.ppt
minor-project-1.pptminor-project-1.ppt
minor-project-1.ppt
 
WebRTC Seminar Report
WebRTC  Seminar ReportWebRTC  Seminar Report
WebRTC Seminar Report
 
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
 
How to Architect your WebRTC application, Alberto Gonzalez and Arin Sime, Web...
How to Architect your WebRTC application, Alberto Gonzalez and Arin Sime, Web...How to Architect your WebRTC application, Alberto Gonzalez and Arin Sime, Web...
How to Architect your WebRTC application, Alberto Gonzalez and Arin Sime, Web...
 
D1-3-Signaling
D1-3-SignalingD1-3-Signaling
D1-3-Signaling
 
What is WebRTC and How does it work?
What is WebRTC and How does it work?What is WebRTC and How does it work?
What is WebRTC and How does it work?
 
WebRTC presentation
WebRTC presentationWebRTC presentation
WebRTC presentation
 
Architecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeArchitecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin Sime
 
[Wroclaw #4] WebRTC & security: 101
[Wroclaw #4] WebRTC & security: 101[Wroclaw #4] WebRTC & security: 101
[Wroclaw #4] WebRTC & security: 101
 
DevCon 5 (December 2013) - WebRTC & WebSockets
DevCon 5 (December 2013) - WebRTC & WebSocketsDevCon 5 (December 2013) - WebRTC & WebSockets
DevCon 5 (December 2013) - WebRTC & WebSockets
 
Asterisk World (January 2014) - Taking Enterprise Telephony into the Web World
Asterisk World (January 2014) - Taking Enterprise Telephony into the Web WorldAsterisk World (January 2014) - Taking Enterprise Telephony into the Web World
Asterisk World (January 2014) - Taking Enterprise Telephony into the Web World
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

WebRTC Fundamentals

  • 1.
  • 2. Table of Content • Introduction – Why WebRTC is Important? – What We Can Do With WebRTC? – Browser Supports • Architecture of WebRTC – Architecture of WebRTC app – Signaling • Security measures in WebRTC • WebRTC Vulnerabilities • Advanced Features
  • 3. WebRTC stands for …? • Web Real Time Communication  WebRTC let you to Cooperate with Video, Audio and Data Communication.  Can Communicate peer to peer without centralized server.  This standard enables users to communicate in real-time through a web-browser or a mobile app
  • 4. Why WebRTC is Important…? • No centralized server required, • Adapted by wide range of browsers, • The WebRTC client makes use of a microphone, speakers, and/or camera attached to the computer to send audio and/or video. • This means that a user can communicate with others with basically nothing but a browser and internet connection.
  • 6. What We Can Do With WebRTC…? • Potential Use Cases and Inspiration – File Sharing – Screen Sharing – Video Conferencing/Tele presence – Integrated Text Chat – Virtual Conference – Remote Desktop Applications – Multi Player
  • 9. Signaling… • WebRTC signaling refers to the process of setting up, controlling, and terminating a communication session. In order for two endpoints to begin talking to one another, three types of information must be exchanged: – Session control information – Network Data – Media Data
  • 10. Signaling Servers… • STUN – Session Traversal Utilities for NAT – NAT – Network Address Translation • TURN – Traversal Using Relay NAT • ICE – Interactive Connectivity Establishment
  • 11. STUN server… • STUN server allows clients to discover their public IP address and the type of NAT they are behind. • In most cases, a STUN server is only used during the connection setup and once that session has been established, media will flow directly between clients.
  • 12. TURN Server • If a STUN server cannot establish the connection, ICE can turn to TURN (pardon the pun). • TURN is an extension to STUN that allows media traversal over a NAT that does not do the “consistent hole punch” required by STUN traffic. • TURN servers are often used in the case of a symmetric NAT.
  • 13. ICE • ICE is a framework that allows WebRTC to overcome the complexities of real-world networking. • It’s ICE’s job to find the best path to connect peers. It may be able to do that with a direct connection between the clients, but it also works for clients where a direct connection is not possible (i.e. behind NATs).
  • 14. Security measures in WebRTC… ● Encrypt the data as it travels between users.So interception could only be done in the end points or media gateway. ● Browsers will ask users to verify access to their cameras and microphones.
  • 15. WebRTC Vulnerabilities • Access to devices HTML and JavaScript are executed by the browser as a sandbox designed to be isolated from the rest of the computer. How ever bug may be exist. -Threats • Web page’s access to user’s camera and microphone without permission. • Users can be potentially being recorded with JavaScript code downloaded from the malicious web server.
  • 16. Security of the turn server • Turn is necessary to establish bi- directional flows. • Media relaying is an expensive resource. So it is protected with credentials. • Those credentials can be long-term. If these credentials are stolen the turn server can be abused.
  • 17. Protection • Signaling over TLS TLS provide privacy ,integrity and authentication. It is also provides server authentication and client authentication if a client certificate is provided. If the client certificate is signed by a trusted certification authority the real time communication can have legal value. But attacker can use dummy certificate for the attack. Due to that HTTPS must used when working with WebRTC.
  • 19. Simulcast ability to adopt the quality of video for each participants. Desktop Desktop Mobile Cr. Book 1080 P 720 P 360 P 1080P 720 P 360 P SFU SFU=Selective Forwarding Unit
  • 20. Selective forwarding unit(SFU) • Early days MCU(Multipoint Control Unit) used for that case .But this approach is very expensive computationally. • Thus, Selective Forwarding Units (SFUs) have become popular as a more economical solution for multi-party video routing. • It is selects the which sender stream to forward to a receiver. • It is making video encoding more flexible.