• Non ci sono risultati.

[1] F. Audet and C. Jennings, Network Address Translation (NAT) Behavioral Requirements for Unicast UDP. RFC 4787 (Best Current Practice), Jan. 2007.

N/A
N/A
Protected

Academic year: 2021

Condividi "[1] F. Audet and C. Jennings, Network Address Translation (NAT) Behavioral Requirements for Unicast UDP. RFC 4787 (Best Current Practice), Jan. 2007."

Copied!
9
0
0

Testo completo

(1)

[1] F. Audet and C. Jennings, Network Address Translation (NAT) Behavioral Requirements for Unicast UDP. RFC 4787 (Best Current Practice), Jan. 2007.

[2] M. Baldi, F. Marinone, F. Risso, and L. Torrero, ALEX: Im- proving SIP Support in Systems with Multiple Network Addresses, in Proceedings of the 5th IEEE International Symposium on Signal Pro- cessing and Information Technology, Dec. 2005.

[3] M. Baldi, F. Risso, and L. Torrero, Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol, 2007.

[4] S. A. Baset and H. Schulzrinne, An Analysis of the Skype Peer-to- Peer Internet Telephony Protocol, tech. rep., Department of Computer Science, Columbia University, Mar. 2004.

[5] M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman, The Secure Real-time Transport Protocol (SRTP). RFC 3711 (Proposed Standard), Mar. 2004.

[6] T. Berners-Lee, R. Fielding, and L. Masinter, Uniform Re- source Identifiers (URI): Generic Syntax. RFC 2396 (Draft Standard), Aug. 1998. Obsoleted by RFC 3986, updated by RFC 2732.

[7] BitTorrent Community Forum, Bittorrent. http://www.

bittorrent.org/.

[8] , Protocol Specifications v1.0. http://www.bittorrent.org/

(2)

[9] , Experimental Draft: BitTorrent Trackerless DHT Protocol Spec- ifications v1.0. http://www.bittorrent.org/Draft_DHT_protocol.

html, 2006.

[10] Boost Community, Boost C++ Libraries. http://www.boost.org/.

[11] D. Bryan, B. Lowekamp, and C. Jennings, A P2P Approach to SIP Registration and Resource Location. Internet-Draft draft-bryan- sipping-p2p-02, Mar. 2006.

[12] , dSIP: A P2P Approach to SIP Registration and Resource Location.

Internet-Draft draft-bryan-p2psip-dsip-00, Feb. 2007.

[13] D. Bryan, P. Matthews, E. Shim, and D. Willis, Concepts and Terminology for Peer to Peer SIP. Internet-Draft draft-willis-p2psip- concepts-04, Mar. 2007.

[14] D. A. Bryan and B. B. Lowekamp, SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System, tech. rep., College of William and Mary, Williamsburg,, Nov. 2004.

[15] D. A. Bryan, B. B. Lowekamp, and C. Jennings, SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System, in AAA- IDEA 2005, June 2005.

[16] D. A. Bryan, M. Zangrilli, and B. B. Lowekamp, Challenges of DHT Design for a Public Communications System, tech. rep., College ofWilliam & Mary, Computer Science Department, June 2006.

[17] G. Camarillo, K. El Malki, and V. Gurbani, IPv6 Transition in the Session Initiation Protocol (SIP). Internet-Draft draft-ietf-sipping- v6-transition-04, Sept. 2006.

[18] G. Camarillo, G. Eriksson, J. Holler, and H. Schulzrinne, Grouping of Media Lines in the Session Description Protocol (SDP).

RFC 3388 (Proposed Standard), Dec. 2002.

(3)

[19] G. Camarillo and J. Rosenberg, The Alternative Network Address Types (ANAT) Semantics for the Session Description Protocol (SDP) Grouping Framework. RFC 4091 (Proposed Standard), June 2005.

[20] B. Campbell, J. Rosenberg, H. Schulzrinne, C. Huitema, and D. Gurle, Session Initiation Protocol (SIP) Extension for Instant Mes- saging. RFC 3428 (Proposed Standard), Dec. 2002.

[21] M. Casado and M. J. Freedman, Illuminati: Opportunistic network and web measurement. http://illuminati.coralcdn.org/stats/, Apr. 2007.

[22] S. Cheshire, M. Krochmal, and K. Sekar, NAT Port Mapping Protocol (NAT-PMP). Internet-Draft draft-cheshire-nat-pmp-02, Sept.

2006.

[23] E. Cooper and P. Matthews, The Effect of NATs on P2PSIP Overlay Architecture. Internet-Draft draft-matthews-p2psip-nats-and- overlays-01, Mar. 2007.

[24] E. Cooper, P. Matthews, D. Bryan, and B. Lowekamp, NAT Traversal for dSIP. Internet-Draft draft-matthews-p2psip-dsip-nat- traversal-00, Feb. 2007.

[25] J. Coutaz, PAC, an Object-Oriented Model for Dialog Design, in IN- TERACT 87 - 2nd IFIP International Conference on Human-Computer Interaction, Sept. 1987.

[26] L. Daigle and IAB, IAB Considerations for UNilateral Self-Address Fixing (UNSAF) Across Network Address Translation. RFC 3424 (In- formational), Nov. 2002.

[27] R. Draves, Default Address Selection for Internet Protocol version 6 (IPv6). RFC 3484 (Proposed Standard), Feb. 2003.

[28] B. Ford, Peer-to-peer communication across network address trans-

lators, in USENIX Annual Technical Conference, Anaheim, CA, April

(4)

[29] J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, and L. Stewart, HTTP Authentication:

Basic and Digest Access Authentication. RFC 2617 (Draft Standard), June 1999.

[30] Free Software Foundation, GNU General Public License. http:

//www.gnu.org/copyleft/gpl.html, June 1991.

[31] E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Pat- terns, Addison-Wesley Professional, January 1995.

[32] R. G. Garroppo, Voice over IP (VoIP): aspetti architetturali e di progettazione, Edizioni Plus, 2006.

[33] giFT Team, giFT-FastTrack. http://gift-fasttrack.berlios.de/.

[34] S. Glassman, M. Manasse, and J. Mogul, Y10K and Beyond.

RFC 2550 (Informational), Apr. 1999.

[35] Gnutella Team, Gnutella Protocol Development. http://www.

the-gdf.org/.

[36] S. Guha and P. Francis, Characterization and Measurement of TCP Traversal through NATs and Firewalls, in Proceedings of the IMC ’05, 2005.

[37] R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica, The impact of dht routing geometry on resilience and prox- imity, in ACM SIGCOMM, 2003.

[38] M. Handley, V. Jacobson, and C. Perkins, SDP: Session De- scription Protocol. RFC 4566 (Proposed Standard), July 2006.

[39] M. Handley, H. Schulzrinne, E. Schooler, and J. Rosenberg, SIP: Session Initiation Protocol. RFC 2543 (Proposed Standard), Mar.

1999. Obsoleted by RFCs 3261, 3262, 3263, 3264, 3265.

(5)

[40] ITU-T Study Group 16, Packet-Based Multimedia Communication System. ITU-T Recommendation H.323v5, 2003.

[41] M. Jelasity, R. Guerraoui, A.-M. Kermarrec, and M. van Steen, The Peer Sampling Service: Experimental Evaluation of Un- structured Gossip-based Implementations, in Proceedings of the 5

th

ACM/IFIP/USENIX international conference on Middleware, 2004.

[42] C. Jennings and R. Mahy, Managing Client Initiated Connections in the Session Initiation Protocol (SIP). Internet-Draft draft-ietf-sip- outbound-08, Jan. 2007.

[43] A. Johnston and R. Sparks, Session Description Protocol (SDP) Offer/Answer Examples. RFC 4317 (Informational), Dec. 2005.

[44] J. Li, J. Stribling, R. Morris, M. Kaashoek, and T. Gil, A per- formance vs. cost framework for evaluating DHT design tradeoffs under churn, in INFOCOMM 2005, Mar. 2005.

[45] E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, A Survey and Comparison of Peer-to-Peer Overlay Network Schemes.

IEEE Communications Survery and Tutorial, Mar. 2004.

[46] R. Mahy, V. Gurbani, and B. Tate, Connection Reuse in the Session Initiation Protocol (SIP). Internet-Draft draft-ietf-sip-connect- reuse-07, Oct. 2006.

[47] H. Manhaiem, R. Silon, G. Fartuk, and S. Refael, Packet Loss Concealment Techniques and Algorithms. for the course in Protocols and Computer Networks at Tel Aviv University, 2004.

[48] P. Maymounkov and D. Mazieres, Kademlia: A peer-to-peer infor- mation system based on the XOR metric, in Proceedings of IPTPS02, Mar. 2002.

[49] A. Moizard, The eXtended osip library. http://savannah.nongnu.

org/projects/exosip.

(6)

[50] , The GNU oSIP library. http://www.gnu.org/software/osip/.

[51] Napster, Napster. http://www.napster.com/.

[52] Nokia Research Center, Sofia-SIP Library. http://sofia-sip.

sourceforge.net/.

[53] Ns2 team, The Network Simulator – ns-2. http://www.isi.edu/

nsnam/ns/.

[54] OpenWengo Community, OpenWengo: Freedom to Call, Freedom to Code. http://www.openwengo.org/, 2007.

[55] P2psip Working Group, Peer-to-Peer Session Initiation Protocol (p2psip). http://www.ietf.org/html.charters/p2psip-charter.

html.

[56] C. G. Plaxton, R. Rajaraman, and A. W. Richa, Access- ing Nearby Copies of Replicated Objects in a Distributed Environment, in ACM Symposium on Parallel Algorithms and Architectures, 1997, pp. 311–320.

[57] J. Postel, Transmission Control Protocol. RFC 793 (Standard), Sept.

1981. Updated by RFC 3168.

[58] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A Scalable Content Addressable Network, in ACM SIG- COMM, Berkeley, CA, Aug. 2001.

[59] Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, and E. Lear, Address Allocation for Private Internets. RFC 1918 (Best Current Practice), Feb. 1996.

[60] E. Rescorla and N. Modadugu, Datagram Transport Layer Secu- rity. RFC 4347 (Proposed Standard), Apr. 2006.

[61] P. Resnick, Internet Message Format. RFC 2822 (Proposed Standard),

Apr. 2001.

(7)

[62] S. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Rat- nasamy, S. Shenker, I. Stoica, and H. Yu, OpenDHT: A Public DHT Service and Its Uses, in Proceedings of ACM SIGCOMM, Aug.

2005.

[63] A. B. Roach, Session Initiation Protocol (SIP)-Specific Event Notifi- cation. RFC 3265 (Proposed Standard), June 2002.

[64] J. Rosenberg, A Presence Event Package for the Session Initiation Protocol (SIP). RFC 3856 (Proposed Standard), Aug. 2004.

[65] , Discovering Outbound Proxies and Providing High Availabil- ity with Client Initiated Connections in the Session Initiation Proto- col (SIP). Internet-Draft draft-rosenberg-sip-outbound-discovery-mid- dialog-00, Oct. 2006.

[66] , Interactive Connectivity Establishment (ICE): A Methodology for Network Address Translator (NAT) Traversal for Offer/Answer Proto- cols. Internet-Draft draft-ietf-mmusic-ice-15, Mar. 2007.

[67] J. Rosenberg, C. Huitema, R. Mahy, and D. Wing, Session Traversal Utilities for (NAT) (STUN). Internet-Draft draft-ietf-behave- rfc3489bis-06, Mar. 2007.

[68] J. Rosenberg, R. Mahy, and C. Huitema, Obtaining Relay Ad- dresses from Simple Traversal Underneath NAT (STUN). Internet-Draft draft-ietf-behave-turn-03, Mar. 2007.

[69] J. Rosenberg and H. Schulzrinne, Reliability of Provisional Re- sponses in Session Initiation Protocol (SIP). RFC 3262 (Proposed Stan- dard), June 2002.

[70] , Session Initiation Protocol (SIP): Locating SIP Servers. RFC 3263 (Proposed Standard), June 2002.

[71] , An Extension to the Session Initiation Protocol (SIP) for Sym-

metric Response Routing. RFC 3581 (Proposed Standard), Aug. 2003.

(8)

[72] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, SIP:

Session Initiation Protocol. RFC 3261 (Proposed Standard), June 2002.

Updated by RFCs 3265, 3853, 4320.

[73] J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy, STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs). RFC 3489 (Proposed Standard), Mar. 2003.

[74] A. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Ob- ject Location, and Routing for Large-Scale Peer-to-Peer Systems, Lec- ture Notes in Computer Science, 2218 (2001), pp. 329–??

[75] Sharman Networks, Kazaa. http://www.kazaa.com/.

[76] K. Singh and H. Schulzrinne, SIPPEER: A Session Initiation Pro- tocol (SIP)-based Peer-to-Peer Internet Telephony Client Adaptor, tech.

rep., Computer Science Department, Columbia University, Jan. 2005.

[77] , Using an External DHT as a SIP Location Service, tech. rep., Columbia University, Jan. 2006.

[78] Skype, Skype. http://www.skype.com/.

[79] R. Sparks, Multiple Dialog Usages in the Session Initiation Protocol.

Internet-Draft draft-ietf-sipping-dialogusage-06, Jan. 2007.

[80] P. Srisuresh, B. Ford, and D. Kegel, State of Peer-to-Peer(P2P) Communication Across Network Address Translators(NATs). Internet- Draft draft-ietf-behave-p2p-state-02, Feb. 2007.

[81] R. Stewart, Q. Xie, K. Morneault, C. Sharp,

H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang,

and V. Paxson, Stream Control Transmission Protocol. RFC 2960

(Proposed Standard), Oct. 2000. Updated by RFC 3309.

(9)

[82] I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Bal- akrishnan, Chord: A scalable Peer-To-Peer lookup service for Internet Applications, in Proceedings of the 2001 ACM SIGCOMM Conference, 2001, pp. 149–160.

[83] D. Stutzbach and R. Rejaie, Understanding Churn in Peer-to-Peer Networks, in Proceedings of the 6

th

ACM SIGCOMM on Internet mea- surement, 2006.

[84] D. Stutzbach, R. Rejaie, N. Duffield, S. Sen, and W. Will- inger, On Unbiased Sampling for Unstructured Peer-to-Peer Networks, in Proceedings of the IMC ’06, 2006.

[85] Telecom Italia, SIPDHT. http://sipdht.sourceforge.net/, 2007.

[86] G. Tsirtsis and P. Srisuresh, Network Address Translation - Proto- col Translation (NAT-PT). RFC 2766 (Proposed Standard), Feb. 2000.

Updated by RFC 3152.

[87] UPnp Forum, UPnP Device Architecture Version 1.0.1, Dec. 2003.

[88] D. J. Watts and S. H. Strogatz, Collective dynamics of ’small- world’ networks, Nature, 393 (1998), pp. 440–442.

[89] W. Weibull, A Statistical Distribution Function of Wide Applicability, Journal of Applied Mechanics, (1951).

[90] B. Zhao, L. Huang, J. Stribling, S. Rhea, A. Joseph, and J. Kubiatowicz, Tapestry: A resilient global-scale overlay for ser- vice deployment, IEEE Journal on Selected Areas in Communications, (2003).

The network icons used in this work are copyrighted by the Tango Project

1

and licensed under the terms of the Creative Commons License

2

.

1

http://tango.freedesktop.org/

Riferimenti

Documenti correlati

in Mathematics, Rutgers University, New Jersey, USA 1981 Laurea in Matematica, 110 e lode, Sapienza Università di Roma.. Research Interests: Lie Theory, Vertex Operator

NAT overload sometimes called PAT (Port Address Translation) maps multiple unregistered or private IP addresses to a single registered or public IP address by using different

In presenza di un router che applica il NAT in modalità IP masquerading, è possibile che un server Web della rete interna sia raggiungibile anche da client della

Gli indirizzi delle reti private non possono essere annunciati dai router collegati a Internet, in quanto tali indirizzi non hanno validità globale e possono essere riutilizzati

Abstract Network Monitoring is a complex distributed activity: we distinguish agents that issue requests and use of the results, other that operate the monitoring activity and

Ad esempio, una regola NAT manuale viene posizionata nella parte superiore della tabella NAT, in modo che le regole più specifiche posizionate più in basso nella tabella NAT non

– Trap into kernel on write (in child or parent) – Copy page and resume execution.. Paging and Fast

– Trap into kernel on write (in child or parent) – Copy page and resume execution.. Paging and Fast