Skip to main content
Log in

A survey on peer-to-peer SIP based communication systems

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information on each participating peer without help of the central servers. The concept of self-configuration, self-establishment greatly improves the robustness of the network system compared with the traditional Client/Server based systems. In this paper, we survey P2PSIP solutions proposed recently both in the academic and industrial research. We consider technical issues that include Chord overlay topology, P2PSIP session initiation (including enrollment and bootstrap, NAT traversal, message routing, P2PSIP interworking, P2PSIP Client, etc), and security issues. Our survey is based on recent research publications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. STUN: Simple Traversal of User Datagram Protocol through NATs.

  2. TURN: Traversal Using Relay NAT.

  3. ICE: Interactive Connectivity Establishment.

References

  1. Make the most of Skype - free internet calls and cheap calls. p. http://www.skype.com/

  2. Nokia - Nokia on the Web. p. http://www.nokia.com/

  3. Sony Ericsson. p. http://www.sonyericsson.com/

  4. The SIP Center - A portal for the commercial development of SIP Session Initiation Protocol. p. http://www.sipcenter.com

  5. Kundan S, Henning S (2005) Peer-to-peer internet telephony using SIP, in Proceedings of the international workshop on Network and operating systems support for digital audio and video. Stevenson, Washington, ACM

  6. Bryan DA, Lowerkamp BB,Jennings C (2005) SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA’05), pp 42–49.

  7. P2PSIP. p. http://www.p2p-sip.org

  8. Peer-to-Peer. p. http://www1.cs.columbia.edu/~salman/peer/

  9. SIPDHT2. p. http://sipdht.sourceforge.net/sipdht2/index.html

  10. MjSip. p. http://www.mjsip.org

  11. Matuszewski M, Kokkonen E (Jan, 2008) Mobile P2PSIP - Peer-to-Peer SIP Communication in Mobile Communities, in 5th IEEE Consumer Communications and Networking Conference, 2008. CCNC 2008. Las Vegas

  12. Seedorf J (2006) Security challenges for P2P-SIP. IEEE Network Special Issue on Securing Voice over IP 20(5):38–45

    Google Scholar 

  13. Bryan DA, Lowekamp BB, Zangrilli M (April, 2008) The Design of a versatile, secure P2PSIP communications architecture for the public internet, in IEEE international Parallel and Distributed Processing Symposium. Lyon, France

  14. Naoki W, Masayuki M (2006) Overlay network symbiosis: evolution and cooperation, in Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems. Cavalese, ACM

  15. David K, Eric L, Tom L, Rina P, Matthew L, Daniel L (1997) Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web, in Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. El Paso, ACM

  16. Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans Netw 11(1):17–32

    Article  Google Scholar 

  17. Junjie J, Ruo P, Changyong L, Weinong W (2005) Bi-Chord: An IMproved Approach for Lookup Routing in Chord. Lect Notes Comput Sci

  18. Ben L, Barbara L, Erik DD (2006) EpiChord: parallelizing the Chord lookup algorithm with reactive routing state management. Comput Commun 29(9):1242–1259

    Google Scholar 

  19. Vasilios D, Nicolas L, Oliver H, Andreas M, Ralf S (2006) Cacheing indices for efficient lookup in structured overlay networks. Lect Notes Comput Sci 4118:81–93

    Article  Google Scholar 

  20. Bhattacharjee B, Chawathe S, Gopalakrishnan V, Keleher P, Silaghi B (2003) Efficient peer-to-peer searches using result-caching. Lect Notes Comput Sci 2735:225–236

    Google Scholar 

  21. Zheng X, Oleshchuk V (June, 2008) Improving Chord lookup protocol for P2PSIP-based Communication Systems. 2009 International Conference on New Trends in Information and Service Science (3rd NISS)

  22. Zoels S, Despotovic Z, Kellerer W (2008) On hierarchical DHT systems - An analytical approach for optimal designs. Comput Commun 31(3):576–590

    Article  Google Scholar 

  23. Joung Y-J, Wang J-C (2007) Chord2: a two-layer Chord for reducing maintenance overhead via heterogeneity. Comput Netw 51(3):712–731

    Article  MATH  Google Scholar 

  24. Le L, Kuo G-S (June, 2007) Hierarchical and Breathing Peer-to-Peer SIP System, in IEEE International Conference on Communications, 2007. ICC’07

  25. Shi J, Wang Y, Gu L, Li L, Lin W, Li Y, Ji Y, Zhang P (Nov. 2007) A Hierarchical Peer-to-Peer SIP System for Heterogeneous Overlays Interworking, in Global Telecommunications Conference (GLOBECOM’07), IEEE

  26. Rosenberg J, Weinberger J, Huitema C, Mahy R (March 2003) STUN-Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs). RFC 3289

  27. Stukas M, Sicker DC (2004) An evaluation of VoIP traversal of firewalls and NATs within an enterprise environment. Information Systems Frontiers 6(3):219–228

    Article  Google Scholar 

  28. Welcome to the UPnP Forum ! : p. http://www.upnp.org

  29. Sterman B, Schwartz D. NAT Traversal in SIP. IEC Annual Review of Communications

  30. Martinez-Yelmo I, Bikfalvi A, Cuevas R, Guerrero C, Garcia J (2009) H-P2PSIP: interconnection of P2PSIP domain for global multimedia services based on a hierarchical DHT overlay network. Comput Netw 53(4):556–568

    Article  MATH  Google Scholar 

  31. Hautakorpi J, Salinas A, Harjula E, Ylianttila M (Sept, 2008) Interconnecting P2PSIP and IMS, in Next Generation Mobile Applications, Services and Technologies. Wales

  32. Fessi A, Niedermayer H, Kinkelin H, Carle G (July, 2007) A cooperative SIP Infrastructure for Highly Reliable Telecommunication Services. IPTCOMM’07

  33. Cao F, Bryan DA, Lowekamp BB (Feb, 2006) Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers. International Conference on Internet and Web Applications and Services (ICIW)

  34. Seedorf J (Oct, 2006) Security challenges for peer-to-peer SIP. IEEE Netw 20(Issue 5)

  35. Josang A, Hayward R, Pope S. Trust network analysis with subjective logic, in Proceedings of the 29th Australasian Computer Science Conference, 2006, Australia

  36. Zheng X, Oleshchuk V (Nov, 2009) Trust-based Framework for Security Enhancement of P2PSIP Communication Systems, in The 4th International Conference for Internet Technology and Secured Transactions (ICITST-2009). London

  37. Zheng X, Oleshchuk V (Oct, 2009) A Secure Architecture for P2PSIP-based Communication Systems, in 2nd International Conference on Security of Information and Networks (SIN 2009). North Cyprus

  38. Zheng X, Oleshchuk V (Nov, 2008) Providing Privacy Service for P2PSIP based Communication Systems, in Norsk informasjonssikkerhetkonferanse (NISK). Kristiansand, Norway

  39. Zheng X, Oleshchuk V, Jiao H (Dec, 2007) A System Architecture for SIP/IMS-based Multimedia Services in International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xianghan Zheng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zheng, X., Oleshchuk, V. A survey on peer-to-peer SIP based communication systems. Peer-to-Peer Netw. Appl. 3, 257–264 (2010). https://doi.org/10.1007/s12083-009-0064-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-009-0064-4

Keywords

Navigation