SlideShare a Scribd company logo
RELAYING
In Reference
of
Skype
SURINDER KAUR
2012CS13
02-10-2012
1 Introduction
Skype is peer-to-peer VoIP application . It is used for voice calls and text
messages. Now file transfer and video conferencing is also alloweed.
It was launched in 2003 by Niklas Zennstrom and JanusFriis. Now
Microsoft owns it.The first generation of VoIP is MSN and IM It is the sec-
ond generation of VoIP technology and its successsor i.e. the third generation
of voIP is represented by Google Talk
The term VoIP stands for Voice over Internet Protocol. and it refers to the
protocol and the technologies employed for voice communication and multi-
media session over the IP. The other commonly used for the same purpose
are Interent Telephony or IP telephony. Using these technologies a user can
make telephone calls via internet rather than the traditional public switched
telephone networks. IT is a complete process that involve various steps. these
ssteps are listed below:
• Signaaling and media channel setup
• Digitization of analog voice signals
• encoding of signals
• Packetization
• Transmission of packets over IP network
2 Services provided by Skype
Skype provides following services:
• Messaging
For text messaging the additional features provided are group chat,
emoticons record of messaging history and even editing of previous mes-
sages.
• Voice chat
It allows telephone calls between a pair of skype users, conferencing
and use of a proprietary audio codec. The telephone call between a
pair of skype user for a group of country charges are same as charges
for calls within the country.
1
• Video conferencing
Now it supports video conferencing for all major software platform like
windows, Mac OS X, Linux. It can support video call upto 5 people.
The latest version of skype supports high quality video for windows.
• Audio conferencing
Like video conferencing audio conferencing is also supported by all
major platforms. However the number of user participate in audio
conferencing is much more than that in video conferencing . It can
support upto 25 participants.
3 Technical details
Skype is hybrid peer-to-peer and client-server system. The most interesting
feature of skype is that it is able to work efficiently even in the presence
of firewalls and NAT i.e. it is able to penetrate the NAT and firewall in
peer-to-peer approach.
It uses decentralized approach. It has no central server other than the
logon server. The whole network is maintained in the decentralized manner
using overlay peer-to-peer technology. Since it is usin g peer-to-peer technol-
ogy . Hence each node that is part of the network has to contribute to the
network, its bandwidth and the some percent of CPU cycles. In this way the
whole network load gets distributed among all the participating nodes.
Some important terms used in the Skype technology are described in follow-
ing section:
Skype Client
Each Skype user is termed Skype client. All the skype users are similar
i.e. peers and all are termed Skype client. There is ony one server that
maintains the login details of the user.
Ports
Skype client opens the TCP or UDP connection on the specified port
number. The Port number is given at the time of installation.
Host Cache
Host cache is a table that contain the list of super nodes. Each entry of
super noder has its IP address and port number. Each SC refresh this
2
cache at regular interval. Refreshing the table is the most important
part of entire Skype operation. This cache helps client to find the list
of all reachable nodes.
Codecs
The codec is used to convert the analog voice signals to digital signals.
Skype codecs allow frequencies between 50-8000 Hz to pass through.
This range is the characteristic of wideband codec.
Buddy list
Buddy list i.e. the list of all the Skype clients to which a user wants
to communicate to. The information about the buddies is stored in
the Windows registry. The buddy list is digitally signed and encrypted.
The list is local to the SC’s machine and is not stored on the central
server. Hence when a client uses a different machine it need to log on
to Skype network and reconstruct its buddy list.
Encryption
Skype uses 256-bit encryption algrithm AES i.e. Advanced Encryp-
tion Standard to encrypt the digital data before transmitting it on the
internet.
NAT and firerwall
SC uses STUN and TURN to determine the type of NAT and firewall
behind which the SC is working. Like the buddy list it is also stored
locally on the windows registry. Hence it needs to refreshed periodically.
4 Skype Functions
The step by step description of the Skype Functions is as following:
Startup When the Skype Client run the software for the first time,
this step is required.Once it get installed further this step is not needed.
Login Each time the SC wants to use Skype it needs to login. It
requries to enter its login details i.e. username and password. Then
the central server autenticates it with the stored details. The login step
also notifies the other SC about the presence of the currently logined
SC. In this step the NAT and Firewall are also determined.
User search Skype uses the Global Index Technology to search
foe the other users.This search is distributed. It is claimed by the Skype
3
and observed during various researches that it is guranteed to find a user
if it exists and has logged in during the llast 72 hours. Skype provides
a search dialog box where user can enter the SC it is searching for and
press the find button. The search process proceed s in differntly on the
different type of networks. The search process is explained briefly :
When the SC is on public IP address The SC sends a TCP
packet to its Super Node(SN).
SN in turn provide SC list of four nodes with their IP address and
port number to contact.
Now SC sends UDP packet to these 4 nodes asking wheter they
are the node SC is looking for. If it find the nodde SC stops the
search. In case it fails to find the node, it informs the SN using
TCP packet.
Now SN provide it list of 8 different nodes to contact to. Again
SC asks these nodes using UDP, if it is successful this time it stops
otherwise it proceed in the same manner until it finds the user or
it is determined that user doesn’t exists.
However the researches shows thst the Skype able to find the user
if it exists within few seconds.
When Sc is behind port-restricted NAT A SC behind a port re-
stricted NAT exchanges data between SN, and some of the nodes
which responds to its UDP request during login process.
SC behind port-restricted NAT, UDP-restricted firewall
SC sends its search request over TCP to its SN.
The SN then performs the search on the behalf of the SC. Then SN
informs SC of the search results. Thus in this case the SC itself
does not contact any of the nodes.
It is worth noting that the search results are cached at the
intermediate nodes.
Call establishment and Tear Down
Call can be made to a user in the Buddy list or to the user not in
the buddy list. The process for call establishment is explained in the
following :
When the callee is in the buddy list When the callee is already
there in the SC’s buddy list the SC just need to call the buddy.
However the call establishment mechanism is different for differ-
ent network setup. The following points desccribe the call setup
process in detail.
4
Caller and the callee both are on the public IP
As the caller clicks on the call button, the caller sends a
TCP : SYN message to establish the connection. The callee
acknowledges the caller’s request by sending a TCP : ACK
packet.
In this way TCP connection between the caller and the callee
establishes. After wards the caller and the callee communi-
cates using TCP connection.
Caller behind port-restricted NAT, callee on public IP
In this case the signaling and messages don’t flow directly
between the caller and the callee. The caller sends signaling
informationover TCP to a super node.
Now the super node forwardds the signal to callee over TCP.
In this way the call gets established.
Both are behind the port-restricted NAT, UDP-restricted firewall
The call is established via supernode over TCP connection.
and then they communicate.
When the callee is not in the buddy list
When the callee is not in the buddy list of the caller, the caller first
need search the callee over the networ, using the above mentioned
approaches. When it finds the callee , add it to its buddy list and
then call establisment is done in the same way when the callee is
in the buddy list of the caller.
TEARDOWN : The process of tear down is same as the process
of call establishment.
Media Transfer and Codecs:
The process is explained in the following points:
When both the caller and the callee are on the public IP
The media flows over the UDP betweent he caller and the callee.
Either of the caller or the callee is behind the port-restricted NAT
In this case the audio data is transmitted via a supernode over
UDP.
Both are behind port-restricted NAT and UDP-restricted firewall
5
The communication is done via supernode over TCP.
Some important feature supported by the Skype during audio/video
transfer:
• Silence Suppression : Slice suppression means that when nei-
ther the caller nor the callee is sending any data i.e. not speaking,
then the voice packets should not flow between them. However
the Skype does not support silence suppression.
• Skype supports puttingcallonhold.
• The experiements shows that the Codec frequency range is 50 Hz
to 8000 Hz.
Conferencing
5 Security in Skype
Skype uses 256 − bit encryption algorithm AES i.e. Advanced Encryption
Standard. This algorithm is considered to be the strongest encryption algo-
rithm, which is also used by the U.S. govt. organizations.
6 Relaying in Skype
6.1 Relaying
When the two peers in any peer-to-peer network could not communicatte
directly due to any reason, they communicate via another peer or node in
p2p network. Such communication techniques is termed as relaying.
Relaying plays a very important role in Skype p2p networking.
6.2 Relaying is needed in the following cases:
• When callee is behind NAT ,in this case if the caller attempts to
establish the connection in usual way or directly, then the caller initi-
ated communication will be considered as outside to inside connection
attempt by the NAT aat callee’s end. So the NAT will simply refuse
the connection attempt.
6
Hence the caller need the assistance from relay server to establish the
connection. The caller is connected to a superpeer, When it wants
to call the callee, it first informs the superpeer that it wants to have
connection with the specified callee.
The superpeer then communicate this request to the non-NATed su-
perpeer to which the callee is connected. The callee’s superpeer then
informs this to the callee.
The callee then sends a fake message addressed to the caller, this will
make a hole in the NAT.
Now the caller’s message can enter the callee’s network. Because these
messages will be considered as response to the callee’s fake message.
• Boththecaller and the callee isbehind NAT, in this case neither
the caller nor the callee can accept a call initiated by the other, making
the call seemingly impossible.
Now the super peers are used for relaying.The caller should have con-
nection with a non-NATed superpeer to be able to call a callee behind
the NAT. On the callee’s end it is required that the callee should also
have a connection with a non-NATed super peer to recieve the calls
from a caller behind NAT.
When the caller wants to call callee behindNAT, it first informs to the
non-NATed superpeer to which it already has the connection cconnec-
tion that it wants to make call to the specific callee by mentioning its
IP and port.
The superpeer inturn will inform to the superpeer to which the callee is
connected that the caller with given IP and port wants to have commu-
nicaation wih the callee. Now the callee’s superpeer informs the callee
that the caller wants to communicate with you.
Now its upto callee, whether it accepts the call or not. If callee accepts
the caller’s request the involved super eers select a third party non-
NATed superpeer , this superpeer is termed the relay node and its role
is to relay the messages between the caller and the callee through the
communication.
The superpeer connected to the caller and callee then instructs the
caller and the callee respectively to establish a connection with the cho-
sen superpeer.
Now the caller and the callee both get connected to a common superpeer-
the relay node.
7
When caller wants to send message to the calle, it first transmits the
message to the relay node, which forward the packet to the callee.
When the callee wants to response to the caller, the callee simply sends
this response to the relay node, which forward it to the caller.
In this way the whole communication between the caller and callee
behind NAt communicates.
8

More Related Content

What's hot

Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Sridhar Kumar N
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)
KHNOG
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
sangusajjan
 
Aboutsip - SIP Routing
Aboutsip - SIP RoutingAboutsip - SIP Routing
Aboutsip - SIP Routing
Jonas Borjesson
 
Introduction to SIP
Introduction to SIP  Introduction to SIP
Introduction to SIP
neerav_adhikari
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3
Carl Ford
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
Chris McAndrew
 
Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
Ronan Dunne, CEH, SSCP
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP
ThousandEyes
 
Wireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solutionWireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solution
United International University
 
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Đồng Quốc Vương
 
IPV6 by Philip Smith
IPV6 by Philip SmithIPV6 by Philip Smith
IPV6 by Philip Smith
MyNOG
 
Voice over IP ppt
Voice over IP pptVoice over IP ppt
Voice over IP ppt
Akash Sharma
 
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF InfoCom
 
ccna project
ccna projectccna project
ccna project
Amardeep Singh Brar
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
Shailesh Pachori
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
Prince Gautam
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
SaranyaK68
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
Sagar Shashank
 
Network interview questions
Network interview questionsNetwork interview questions
Network interview questions
rajasekar1712
 

What's hot (20)

Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Aboutsip - SIP Routing
Aboutsip - SIP RoutingAboutsip - SIP Routing
Aboutsip - SIP Routing
 
Introduction to SIP
Introduction to SIP  Introduction to SIP
Introduction to SIP
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP
 
Wireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solutionWireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solution
 
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
 
IPV6 by Philip Smith
IPV6 by Philip SmithIPV6 by Philip Smith
IPV6 by Philip Smith
 
Voice over IP ppt
Voice over IP pptVoice over IP ppt
Voice over IP ppt
 
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
 
ccna project
ccna projectccna project
ccna project
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
Network interview questions
Network interview questionsNetwork interview questions
Network interview questions
 

Viewers also liked

Tích hợp microsoft lync, asterisk va skype
Tích hợp microsoft lync, asterisk va skypeTích hợp microsoft lync, asterisk va skype
Tích hợp microsoft lync, asterisk va skype
laonap166
 
ChuDe03_K37103046
ChuDe03_K37103046ChuDe03_K37103046
ChuDe03_K37103046
Hung Doan
 
An analysis of the skype peer to-peer
An analysis of the skype peer to-peerAn analysis of the skype peer to-peer
An analysis of the skype peer to-peer
xiaoran815
 
Welcome To The World Of Skype1
Welcome To The World Of Skype1Welcome To The World Of Skype1
Welcome To The World Of Skype1
guestf80db0b
 
Tìm hiểu công cụ web 2.0 skype
Tìm hiểu công cụ web 2.0 skypeTìm hiểu công cụ web 2.0 skype
Tìm hiểu công cụ web 2.0 skype
Kim Thảo
 
Skype
SkypeSkype
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephony
Kundan Singh
 
Chude03 tim hieu Skype - k37.103.088
Chude03 tim hieu Skype - k37.103.088Chude03 tim hieu Skype - k37.103.088
Chude03 tim hieu Skype - k37.103.088cam tuyet
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
Jahanzaib Niazi
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
Uwe Schmidt
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
icanhasfay
 

Viewers also liked (12)

Tích hợp microsoft lync, asterisk va skype
Tích hợp microsoft lync, asterisk va skypeTích hợp microsoft lync, asterisk va skype
Tích hợp microsoft lync, asterisk va skype
 
ChuDe03_K37103046
ChuDe03_K37103046ChuDe03_K37103046
ChuDe03_K37103046
 
An analysis of the skype peer to-peer
An analysis of the skype peer to-peerAn analysis of the skype peer to-peer
An analysis of the skype peer to-peer
 
Welcome To The World Of Skype1
Welcome To The World Of Skype1Welcome To The World Of Skype1
Welcome To The World Of Skype1
 
Tìm hiểu công cụ web 2.0 skype
Tìm hiểu công cụ web 2.0 skypeTìm hiểu công cụ web 2.0 skype
Tìm hiểu công cụ web 2.0 skype
 
Skype
SkypeSkype
Skype
 
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephony
 
Chude03 tim hieu Skype - k37.103.088
Chude03 tim hieu Skype - k37.103.088Chude03 tim hieu Skype - k37.103.088
Chude03 tim hieu Skype - k37.103.088
 
Ch09
Ch09Ch09
Ch09
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 

Similar to Skype

Skype
SkypeSkype
Skype and icq referat final - copy
Skype and icq referat   final - copySkype and icq referat   final - copy
Skype and icq referat final - copy
Matej Kostroš
 
Apple Facetime Protocol
Apple Facetime ProtocolApple Facetime Protocol
Apple Facetime Protocol
kshitijmehta23
 
VOIP services
VOIP servicesVOIP services
VOIP services
Pankaj Saharan
 
Analysis & Signature of Skype VoIP Session Traffic.pptx
Analysis & Signature of Skype VoIP Session Traffic.pptxAnalysis & Signature of Skype VoIP Session Traffic.pptx
Analysis & Signature of Skype VoIP Session Traffic.pptx
AhmedSohair2
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 
Dotnet network prog_chap07
Dotnet network prog_chap07Dotnet network prog_chap07
Dotnet network prog_chap07
Truong NGUYEN
 
R43019698
R43019698R43019698
R43019698
IJERA Editor
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
Jaya Prasanna
 
Profile_Prateek
Profile_PrateekProfile_Prateek
Profile_Prateek
Prateek Mathur
 
IPV6
IPV6IPV6
Mcse question
Mcse questionMcse question
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3
John Mathias
 
Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP
FRSecure
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
junaidahmedsaba
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
apel7
 
The Kyoto Protocol ( Kp )
The Kyoto Protocol ( Kp )The Kyoto Protocol ( Kp )
The Kyoto Protocol ( Kp )
Tara Hardin
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
githe26200
 
Internet Internet Protocols.pptx( technology)
Internet Internet Protocols.pptx( technology)Internet Internet Protocols.pptx( technology)
Internet Internet Protocols.pptx( technology)
ujjawalr9027
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
Pranshu Pareek
 

Similar to Skype (20)

Skype
SkypeSkype
Skype
 
Skype and icq referat final - copy
Skype and icq referat   final - copySkype and icq referat   final - copy
Skype and icq referat final - copy
 
Apple Facetime Protocol
Apple Facetime ProtocolApple Facetime Protocol
Apple Facetime Protocol
 
VOIP services
VOIP servicesVOIP services
VOIP services
 
Analysis & Signature of Skype VoIP Session Traffic.pptx
Analysis & Signature of Skype VoIP Session Traffic.pptxAnalysis & Signature of Skype VoIP Session Traffic.pptx
Analysis & Signature of Skype VoIP Session Traffic.pptx
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
Dotnet network prog_chap07
Dotnet network prog_chap07Dotnet network prog_chap07
Dotnet network prog_chap07
 
R43019698
R43019698R43019698
R43019698
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
Profile_Prateek
Profile_PrateekProfile_Prateek
Profile_Prateek
 
IPV6
IPV6IPV6
IPV6
 
Mcse question
Mcse questionMcse question
Mcse question
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3
 
Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
 
The Kyoto Protocol ( Kp )
The Kyoto Protocol ( Kp )The Kyoto Protocol ( Kp )
The Kyoto Protocol ( Kp )
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Internet Internet Protocols.pptx( technology)
Internet Internet Protocols.pptx( technology)Internet Internet Protocols.pptx( technology)
Internet Internet Protocols.pptx( technology)
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 

More from Surinder Kaur

Lucene
LuceneLucene
Agile
AgileAgile
MapReduce
MapReduceMapReduce
MapReduce
Surinder Kaur
 
Apache Hive
Apache HiveApache Hive
Apache Hive
Surinder Kaur
 
JSON Parsing
JSON ParsingJSON Parsing
JSON Parsing
Surinder Kaur
 
Analysis of Emergency Evacuation of Building using PEPA
Analysis of Emergency Evacuation of Building using PEPAAnalysis of Emergency Evacuation of Building using PEPA
Analysis of Emergency Evacuation of Building using PEPA
Surinder Kaur
 
NAT
NATNAT
XSLT
XSLTXSLT
Dom
Dom Dom
java API for XML DOM
java API for XML DOMjava API for XML DOM
java API for XML DOM
Surinder Kaur
 
intelligent sensors and sensor networks
intelligent sensors and sensor networksintelligent sensors and sensor networks
intelligent sensors and sensor networks
Surinder Kaur
 
MPI n OpenMP
MPI n OpenMPMPI n OpenMP
MPI n OpenMP
Surinder Kaur
 

More from Surinder Kaur (12)

Lucene
LuceneLucene
Lucene
 
Agile
AgileAgile
Agile
 
MapReduce
MapReduceMapReduce
MapReduce
 
Apache Hive
Apache HiveApache Hive
Apache Hive
 
JSON Parsing
JSON ParsingJSON Parsing
JSON Parsing
 
Analysis of Emergency Evacuation of Building using PEPA
Analysis of Emergency Evacuation of Building using PEPAAnalysis of Emergency Evacuation of Building using PEPA
Analysis of Emergency Evacuation of Building using PEPA
 
NAT
NATNAT
NAT
 
XSLT
XSLTXSLT
XSLT
 
Dom
Dom Dom
Dom
 
java API for XML DOM
java API for XML DOMjava API for XML DOM
java API for XML DOM
 
intelligent sensors and sensor networks
intelligent sensors and sensor networksintelligent sensors and sensor networks
intelligent sensors and sensor networks
 
MPI n OpenMP
MPI n OpenMPMPI n OpenMP
MPI n OpenMP
 

Recently uploaded

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 

Recently uploaded (20)

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 

Skype

  • 2. 1 Introduction Skype is peer-to-peer VoIP application . It is used for voice calls and text messages. Now file transfer and video conferencing is also alloweed. It was launched in 2003 by Niklas Zennstrom and JanusFriis. Now Microsoft owns it.The first generation of VoIP is MSN and IM It is the sec- ond generation of VoIP technology and its successsor i.e. the third generation of voIP is represented by Google Talk The term VoIP stands for Voice over Internet Protocol. and it refers to the protocol and the technologies employed for voice communication and multi- media session over the IP. The other commonly used for the same purpose are Interent Telephony or IP telephony. Using these technologies a user can make telephone calls via internet rather than the traditional public switched telephone networks. IT is a complete process that involve various steps. these ssteps are listed below: • Signaaling and media channel setup • Digitization of analog voice signals • encoding of signals • Packetization • Transmission of packets over IP network 2 Services provided by Skype Skype provides following services: • Messaging For text messaging the additional features provided are group chat, emoticons record of messaging history and even editing of previous mes- sages. • Voice chat It allows telephone calls between a pair of skype users, conferencing and use of a proprietary audio codec. The telephone call between a pair of skype user for a group of country charges are same as charges for calls within the country. 1
  • 3. • Video conferencing Now it supports video conferencing for all major software platform like windows, Mac OS X, Linux. It can support video call upto 5 people. The latest version of skype supports high quality video for windows. • Audio conferencing Like video conferencing audio conferencing is also supported by all major platforms. However the number of user participate in audio conferencing is much more than that in video conferencing . It can support upto 25 participants. 3 Technical details Skype is hybrid peer-to-peer and client-server system. The most interesting feature of skype is that it is able to work efficiently even in the presence of firewalls and NAT i.e. it is able to penetrate the NAT and firewall in peer-to-peer approach. It uses decentralized approach. It has no central server other than the logon server. The whole network is maintained in the decentralized manner using overlay peer-to-peer technology. Since it is usin g peer-to-peer technol- ogy . Hence each node that is part of the network has to contribute to the network, its bandwidth and the some percent of CPU cycles. In this way the whole network load gets distributed among all the participating nodes. Some important terms used in the Skype technology are described in follow- ing section: Skype Client Each Skype user is termed Skype client. All the skype users are similar i.e. peers and all are termed Skype client. There is ony one server that maintains the login details of the user. Ports Skype client opens the TCP or UDP connection on the specified port number. The Port number is given at the time of installation. Host Cache Host cache is a table that contain the list of super nodes. Each entry of super noder has its IP address and port number. Each SC refresh this 2
  • 4. cache at regular interval. Refreshing the table is the most important part of entire Skype operation. This cache helps client to find the list of all reachable nodes. Codecs The codec is used to convert the analog voice signals to digital signals. Skype codecs allow frequencies between 50-8000 Hz to pass through. This range is the characteristic of wideband codec. Buddy list Buddy list i.e. the list of all the Skype clients to which a user wants to communicate to. The information about the buddies is stored in the Windows registry. The buddy list is digitally signed and encrypted. The list is local to the SC’s machine and is not stored on the central server. Hence when a client uses a different machine it need to log on to Skype network and reconstruct its buddy list. Encryption Skype uses 256-bit encryption algrithm AES i.e. Advanced Encryp- tion Standard to encrypt the digital data before transmitting it on the internet. NAT and firerwall SC uses STUN and TURN to determine the type of NAT and firewall behind which the SC is working. Like the buddy list it is also stored locally on the windows registry. Hence it needs to refreshed periodically. 4 Skype Functions The step by step description of the Skype Functions is as following: Startup When the Skype Client run the software for the first time, this step is required.Once it get installed further this step is not needed. Login Each time the SC wants to use Skype it needs to login. It requries to enter its login details i.e. username and password. Then the central server autenticates it with the stored details. The login step also notifies the other SC about the presence of the currently logined SC. In this step the NAT and Firewall are also determined. User search Skype uses the Global Index Technology to search foe the other users.This search is distributed. It is claimed by the Skype 3
  • 5. and observed during various researches that it is guranteed to find a user if it exists and has logged in during the llast 72 hours. Skype provides a search dialog box where user can enter the SC it is searching for and press the find button. The search process proceed s in differntly on the different type of networks. The search process is explained briefly : When the SC is on public IP address The SC sends a TCP packet to its Super Node(SN). SN in turn provide SC list of four nodes with their IP address and port number to contact. Now SC sends UDP packet to these 4 nodes asking wheter they are the node SC is looking for. If it find the nodde SC stops the search. In case it fails to find the node, it informs the SN using TCP packet. Now SN provide it list of 8 different nodes to contact to. Again SC asks these nodes using UDP, if it is successful this time it stops otherwise it proceed in the same manner until it finds the user or it is determined that user doesn’t exists. However the researches shows thst the Skype able to find the user if it exists within few seconds. When Sc is behind port-restricted NAT A SC behind a port re- stricted NAT exchanges data between SN, and some of the nodes which responds to its UDP request during login process. SC behind port-restricted NAT, UDP-restricted firewall SC sends its search request over TCP to its SN. The SN then performs the search on the behalf of the SC. Then SN informs SC of the search results. Thus in this case the SC itself does not contact any of the nodes. It is worth noting that the search results are cached at the intermediate nodes. Call establishment and Tear Down Call can be made to a user in the Buddy list or to the user not in the buddy list. The process for call establishment is explained in the following : When the callee is in the buddy list When the callee is already there in the SC’s buddy list the SC just need to call the buddy. However the call establishment mechanism is different for differ- ent network setup. The following points desccribe the call setup process in detail. 4
  • 6. Caller and the callee both are on the public IP As the caller clicks on the call button, the caller sends a TCP : SYN message to establish the connection. The callee acknowledges the caller’s request by sending a TCP : ACK packet. In this way TCP connection between the caller and the callee establishes. After wards the caller and the callee communi- cates using TCP connection. Caller behind port-restricted NAT, callee on public IP In this case the signaling and messages don’t flow directly between the caller and the callee. The caller sends signaling informationover TCP to a super node. Now the super node forwardds the signal to callee over TCP. In this way the call gets established. Both are behind the port-restricted NAT, UDP-restricted firewall The call is established via supernode over TCP connection. and then they communicate. When the callee is not in the buddy list When the callee is not in the buddy list of the caller, the caller first need search the callee over the networ, using the above mentioned approaches. When it finds the callee , add it to its buddy list and then call establisment is done in the same way when the callee is in the buddy list of the caller. TEARDOWN : The process of tear down is same as the process of call establishment. Media Transfer and Codecs: The process is explained in the following points: When both the caller and the callee are on the public IP The media flows over the UDP betweent he caller and the callee. Either of the caller or the callee is behind the port-restricted NAT In this case the audio data is transmitted via a supernode over UDP. Both are behind port-restricted NAT and UDP-restricted firewall 5
  • 7. The communication is done via supernode over TCP. Some important feature supported by the Skype during audio/video transfer: • Silence Suppression : Slice suppression means that when nei- ther the caller nor the callee is sending any data i.e. not speaking, then the voice packets should not flow between them. However the Skype does not support silence suppression. • Skype supports puttingcallonhold. • The experiements shows that the Codec frequency range is 50 Hz to 8000 Hz. Conferencing 5 Security in Skype Skype uses 256 − bit encryption algorithm AES i.e. Advanced Encryption Standard. This algorithm is considered to be the strongest encryption algo- rithm, which is also used by the U.S. govt. organizations. 6 Relaying in Skype 6.1 Relaying When the two peers in any peer-to-peer network could not communicatte directly due to any reason, they communicate via another peer or node in p2p network. Such communication techniques is termed as relaying. Relaying plays a very important role in Skype p2p networking. 6.2 Relaying is needed in the following cases: • When callee is behind NAT ,in this case if the caller attempts to establish the connection in usual way or directly, then the caller initi- ated communication will be considered as outside to inside connection attempt by the NAT aat callee’s end. So the NAT will simply refuse the connection attempt. 6
  • 8. Hence the caller need the assistance from relay server to establish the connection. The caller is connected to a superpeer, When it wants to call the callee, it first informs the superpeer that it wants to have connection with the specified callee. The superpeer then communicate this request to the non-NATed su- perpeer to which the callee is connected. The callee’s superpeer then informs this to the callee. The callee then sends a fake message addressed to the caller, this will make a hole in the NAT. Now the caller’s message can enter the callee’s network. Because these messages will be considered as response to the callee’s fake message. • Boththecaller and the callee isbehind NAT, in this case neither the caller nor the callee can accept a call initiated by the other, making the call seemingly impossible. Now the super peers are used for relaying.The caller should have con- nection with a non-NATed superpeer to be able to call a callee behind the NAT. On the callee’s end it is required that the callee should also have a connection with a non-NATed super peer to recieve the calls from a caller behind NAT. When the caller wants to call callee behindNAT, it first informs to the non-NATed superpeer to which it already has the connection cconnec- tion that it wants to make call to the specific callee by mentioning its IP and port. The superpeer inturn will inform to the superpeer to which the callee is connected that the caller with given IP and port wants to have commu- nicaation wih the callee. Now the callee’s superpeer informs the callee that the caller wants to communicate with you. Now its upto callee, whether it accepts the call or not. If callee accepts the caller’s request the involved super eers select a third party non- NATed superpeer , this superpeer is termed the relay node and its role is to relay the messages between the caller and the callee through the communication. The superpeer connected to the caller and callee then instructs the caller and the callee respectively to establish a connection with the cho- sen superpeer. Now the caller and the callee both get connected to a common superpeer- the relay node. 7
  • 9. When caller wants to send message to the calle, it first transmits the message to the relay node, which forward the packet to the callee. When the callee wants to response to the caller, the callee simply sends this response to the relay node, which forward it to the caller. In this way the whole communication between the caller and callee behind NAt communicates. 8