Henning Schulzrinne

Henning Schulzrinne
Columbia University | CU · Department of Computer Science

About

492
Publications
86,462
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
15,743
Citations

Publications

Publications (492)
Preprint
Full-text available
With over 20 million units sold since 2015, Amazon Echo, the Alexa-enabled smart speaker developed by Amazon, is probably one of the most widely deployed Internet of Things consumer devices. Despite the very large installed base, surprisingly little is known about the device's network behavior. We modify a first generation Echo device, decrypt its...
Preprint
Full-text available
The serverless and functions as a service (FaaS) paradigms are currently trending among cloud providers and are now increasingly being applied to the network edge, and to the Internet of Things (IoT) devices. The benefits include reduced latency for communication, less network traffic and increased privacy for data processing. However, there are ch...
Preprint
Full-text available
When the electric grid in a region suffers a major outage, e.g., after a catastrophic cyber attack, a "black start" may be required, where the grid is slowly restarted, carefully and incrementally adding generating capacity and demand. To ensure safe and effective black start, the grid control center has to be able to communicate with field personn...
Preprint
Full-text available
The COVID-19 pandemic and related restrictions forced many to work, learn, and socialize from home over the internet. There appears to be consensus that internet infrastructure in the developed world handled the resulting traffic surge well. In this paper, we study network measurement data collected by the Federal Communication Commission's (FCC) M...
Article
To improve the user engagement, especially under moderate to high traffic demand, it is important to understand the impact of the network and application QoS on user experience. This article comparatively evaluates the impact of impairments, with emphasis on rebufferings, startup delay, and bitrate changes, and their intensity and temporal dynamics...
Conference Paper
The serverless and functions as a service (FaaS) paradigms are currently trending among cloud providers and are now increasingly being applied to the network edge, and to the Internet of Things (IoT) devices. The benefits include reduced latency for communication, less network traffic and increased privacy for data processing. However, there are ch...
Preprint
Full-text available
To improve the quality of experience (QoE), especially under moderate to high traffic demand, it is important to understand the impact of the network and application QoS on user experience. This paper comparatively evaluates the impact of impairments, their intensity and temporal dynamics, on user engagement in the context of video streaming. The a...
Article
Full-text available
Cloud computing researchers confront a similar dilemma. In order to maintain uniformity and efficiency in their data centers, commercial cloud providers generally do not provide ?under the hood? controls that permit modification to the underlying network topology or protocols that comprise the cloud environment. Because IPv6 deployment affects comp...
Patent
A device receives an attack on a Session Initiation Protocol (SIP)-based device, determines a type of the attack, and applies, based on the determined type of the attack, a return routability check filter to the attack.
Patent
Full-text available
A method may include receiving first event information about a first entity; receiving second event information about a second entity different from the first entity; associating the first entity and the second entity based on a user associated with the first entity and the second entity; and deriving presence event information based on the first e...
Patent
Full-text available
Techniques for controlling Session Initiation Protocol (SIP) overload between a sending entity and a receiving entity includes receiving a message at a send buffer at the sending entity and forwarding the message to a receive buffer at the receiving entity if the send buffer is empty of other messages or rejecting the message if the send buffer is...
Article
Full-text available
In this paper, we propose an off-path extension of the IETF Next Steps in Signaling (NSIS) protocol suite. Our proposal updates the NSIS transport layer. This way, the design of an NSIS-compliant application can leverage it without having to deal with low level signaling transport issues. In particular, we propose an extension of the General Intern...
Patent
Full-text available
Systems for providing feedback to sending entities are provided. In some embodiments, systems for providing feedback to at least one sending entity that sends requests are provided, the systems comprising: a receiving entity comprising at least one processor that: determines a number of active sources associated with each of the at least one sendin...
Patent
A method may include receiving a session initiation protocol (SIP) request message and determining whether a dialog exists corresponding to the request message. The method may also include determining whether the dialog is in a first phase or a second phase when a dialog exists corresponding to the session control protocol message and querying a ta...
Patent
A method may include receiving a session control protocol request message and fingerprinting the received session control protocol message. The method may further include comparing the fingerprint of the received request message to a list of fingerprints associated with known malicious user agents and rejecting the request message when the fingerpr...
Chapter
Full-text available
This specification defines a load-control event package for the Session Initiation Protocol (SIP). It allows SIP entities to distribute load-filtering policies to other SIP entities in the network. The load-filtering policies contain rules to throttle calls from a specific user or based on their source or destination domain, telephone number prefix...
Chapter
This chapter introduces a novel approach, namely cooperative roaming, in which mobile nodes can collaborate with each other and share useful information about the network in which they move. This achieves seamless L2 and L3 handoffs regardless of the authentication mechanisms used and without any changes to either the infrastructure or the protocol...
Technical Report
Full-text available
When a large number of clients register with a SIP registrar server at approximately the same time, the server may become overloaded. Near-simultaneous floods of SIP SUBSCRIBE and PUBLISH requests may have similar effects. Such request avalanches can occur, for example, after a power failure and recovery in a metropolitan area. This document descri...
Patent
A device may measure a first performance, associated with legitimate traffic without attack traffic, of a Session Initiation Protocol (SIP)-based protection device implementing authentication; measure a second performance, associated with legitimate traffic and attack traffic, of the SIP-based protection device implementing authentication; and meas...
Article
In this article, security challenges related to a mobile heterogeneous networking environment, and the general access patterns are discussed. A novel, unified networking architecture that enables secure heterogeneous networking, both in terms of networks and user devices is discussed. A comprehensive security framework providing a generalized authe...
Conference Paper
Cloud computing is great for scaling applications but the latency in a guest VM can be unpredictable due to resource contention between neighbors. For telephony applications, which are latency-sensitive, we propose a system to monitor telephony server latencies and adapt the server load based on the measured latencies. We implemented the system and...
Conference Paper
Full-text available
The Internet was designed under the assumption that end-hosts are stationary and have one interface. Current mobile devices have multiple network interfaces, such as Wi-Fi, LTE, WiMAX, and possibly Ethernet. Such diverse network connectivity can be used to increase both reliability and performance by running applications over multiple links sequent...
Patent
A device prevents theft of service attacks on a Session Initiation Protocol (SIP)-based device using an identity assurance protection mechanism, a multiple end-points protection mechanism, and an intrusion detecting protection mechanism.
Article
Full-text available
This document defines a SIP Usage for REsource LOcation And Discovery (RELOAD). The SIP Usage provides the functionality of a SIP proxy or registrar in a fully-distributed system and includes a lookup service for Address of Records (AoRs) stored in the overlay. It also defines Globally Routable User Agent Uris (GRUUs) that allow the registrations t...
Article
Full-text available
This paper shows an innovative solution for distributing dynamic sensor data by using distributed caches. Our proposal is based on the concepts of service modularization and virtualization of network nodes made available by the NetServ hosting environment, which has been defined and implemented with the aim of extending the functions of the network...
Conference Paper
Full-text available
This paper shows an innovative solution for distributing dynamic sensor data by using distributed caches. Our proposal is based on the concepts of service modularization and virtualization of network nodes made available by the NetServ hosting environment, which has been defined and implemented with the aim of extending the functions of the network...
Conference Paper
Full-text available
Wireless networking has recently gained tremendous attention in research and education. Since the concepts taught in wireless courses are difficult to acquire only through lectures, hands-on lab experience is indispensable. While Wi-Fi based networking labs have been introduced before, to the best of our knowledge, labs that use a cellular technolo...
Conference Paper
We present a mobility solution for stateless applications, where the mobile host can change its IP address as well as the content servers used by ongoing client sessions. This allows content retrieval to always use the locally optimal source when the host moves between networks. We refer to this approach as “stateless mobility” since neither the ne...
Patent
Full-text available
An apparatus and method for performing tunnel signaling over an IP tunneling path are provided. The method includes transmitting an end-to-end signaling flow through an end-to-end path connected to the IP tunneling path, generating a tunnel signaling flow corresponding to the end-to-end signaling flow, and transmitting the generated tunnel signalin...
Article
Full-text available
Securing Voice over IP (VoIP) is a crucial requirement for its successful adoption. A key component of this is securing the signaling path, which is performed by the Session Initiation Protocol (SIP). Securing SIP can be accomplished by using Transport Layer Security (TLS) instead of UDP as the transport protocol. However, using TLS for SIP is not...
Conference Paper
Content-centric networks promise to address content networking issues in a better way than today's host-based networking architecture. But content-centric networking does not inherently address the issue of services, particularly service scalability and mobility. We present our work on CCNxServ, a system that allows for dynamic service deployment a...
Article
Content is quickly beginning to emerge as the core of Internet and networking applications today. Among the most important research issues with content is the problem of addressing and naming content, since a robust and naming-centric networking strategy will enable the building of next-generation Internet architectures that can easily scale conten...
Article
Full-text available
Autonomic management capabilities of the Future Internet can be provided through a recently proposed service architecture called NetServ. It consists of the interconnection of programmable nodes which enable dynamic deployment and execution of network and application services. This paper shows how this architecture can be further improved by introd...
Article
Full-text available
In this paper, we propose a new gossip-based signaling dissemination method for the Next Steps in Signaling protocol family. In more detail, we propose to extend the General Internet Signaling Transport (GIST) protocol, so as to leverage these new dissemination capabilities from all NSIS Signaling Layer Protocol applications using its transport cap...
Article
Full-text available
Sense Everything, Control Everything (SECE) is an event-driven system that lets nontechnical users create services that combine communication, location, social networks, presence, calendaring, and physical devices such as sensors and actuators. SECE combines information from multiple sources to personalize services and adapt them to changes in the...
Article
As with any other emerging system, the analysis of the security of Peer-to-Peer Session Initiation Protocol systems is of crucial importance for its secure development and future standardization. In this survey, we analyze the security of these systems by studying the attacks that can be launched against them. After an overview of the services that...
Conference Paper
Full-text available
An important group of location-based services (LBS), including 9-1-1 service, rely on the mapping between a user's location and a service boundary in order to select the appropriate service provider. In such cases, mobile clients can cache the mapping information to reduce service latency and server load. However, caching such a mapping can be burd...
Article
Full-text available
This article shows an autonomic management solution based on the recently defined programmable node architecture NetServ. The article starts with a general description of the classical network management requirements and their adaptation to the expected network evolution. After a description of the major issues characterizing the management of the...
Conference Paper
Full-text available
Many applications in VANETs use broadcast communications to disseminate information or keep proper functionality in a network. When the broadcast is multi-hop, it tends to cause unnecessary resource consumption due to the excessive redundant packets on the network, this is known as the broadcast storm problem. Recently, the broadcast storm problem...
Article
Full-text available
Important calls that originate from persons or organizations connected to the callee with weak social ties are often mis-takenly labeled as unwanted ("spam", "SPIT") since their contact address is not found in the callee's address book. We have focused on the fact that the weak social ties are usually established through other communication means s...
Article
One of the features of cloud computing platforms is the ability to scale applications dynamically. Generally, this feature is used in a web services context where the web service provider adds more web servers during times of high traffic and remove web servers during time of low traffic. Real-time communications service providers can also benefit...
Conference Paper
Full-text available
A handful of proposals address the problem of bootstrapping a large DHT network from scratch, but they all forgo the standard DHT join protocols in favor of their own distributed algorithms that build routing tables directly. Motivating their algorithms, the proposals make a perfunctory claim that the standard join protocols are not designed to han...
Conference Paper
The NGN (Next Generation Network), which can provide advanced multimedia services over an all-IP based network, has been the subject of considerable attention for several years. While there have been tremendous efforts to develop its architecture and protocols, especially for IMS, a key technology of the NGN, its wide deployment is still a long way...
Article
Full-text available
We present NetServ, a node architecture for de-ploying in-network services in the next generation Internet. NetServ-enabled network nodes provide a common execution environment, where network services implemented as modules can be dynamically installed and removed. We demonstrate three such modules. MicroCDN is a dynamic content distribution networ...
Conference Paper
Full-text available
The World Wide Web is becoming increasingly personalized as users provide more of their information on the Web. Thus, Web service functionality is becoming reliant on user profile information and context in order to provide user-specific data. In this paper, we discuss enhancements to SECE (Sense Everything, Control Everything), a platform for cont...
Article
Full-text available
The Web is on its way to becoming a location-aware in-formation system. This transition causes some technical and policy challenges in terms of both design and coordina-tion with existing approaches in this area. In this paper we propose that managing the transition to location-awareness (and some other aspects) requires a more strategic approach t...
Conference Paper
Full-text available
With the increasing interest in deploying 4G/LTE networks, IMS has a potential to be deployed in a wide scale in order to support mobile Internet and value-added services over next-generation networks. Moreover, the effort to create an operator-controlled signaling infrastructure using IP-based protocols has resulted in a large number of functional...
Article
Full-text available
Eyeball ISPs today are under-utilizing an important asset: edge routers. We present NetServ, a programmable node ar-chitecture aimed at turning edge routers into distributed ser-vice hosting platforms. This allows ISPs to allocate router resources to content publishers and application service pro-viders motivated to deploy content and services at t...
Article
Full-text available
We present a one-semester transition course intended to bridge the gap between a Java-based introductory sequence and advanced systems courses. We chose to structure our course as a series of lab assignments that, while independent, are also milestones in a single main project, writing a web server from scratch. By anchoring the course on a single...
Chapter
Full-text available
NSIS Quality of Service (QoS) signaling enables applications to perform QoS reservation along a data flow path. When the data flow path contains IP tunnel segments, NSIS QoS signaling has no effect within those tunnel segments. Therefore, the resulting tunnel segments could become the weakest QoS link and invalidate the QoS efforts in the rest of t...
Conference Paper
Full-text available
The Web Services composition paradigm has been widely used in Information Technology (IT) and Internet environments to create Web applications that both flexible and rapidly deployable. Web Services are a key way to realize Service-Oriented Architectures (SOA). In Telecom, on the other hand, the IMS (IP Multimedia Subsystem) architecture enables va...
Article
Full-text available
This report documents the program and the outcomes of Dagstuhl Seminar 11042 “Learning from the Past: Implications for the Future Internet and its Management?”. The discussion centered around the question if by analyzing the past - especially why certain technologies did or did not succeed - it is possible to reason about the Future Internet, the c...
Article
Content delivery networks play a crucial role in today's Internet. They serve a large portion of the multimedia on the Internet and solve problems of scalability and indirectly network congestion (at a price). However, most content delivery networks rely on a statically deployed configuration of nodes and network topology that makes it hard to grow...
Article
Full-text available
Network delivery services providing "better-than-best-effort" service over the Internet are particu-larly necessary for multimedia applications. The selection and use of a specific delivery service involves negotiation between the user and the network; they agree upon specifications such as the type of service user packets will receive, the constra...
Conference Paper
Full-text available
We address the well-known issue of one-way RTP flows in VoIP communications. We investigate the main causes that usually lead to this type of fault, and we propose a method-ology allowing for their automated online detection and di-agnosis. The envisaged approach exploits node cooperation and is based on a more general framework for network faults...
Conference Paper
The SECE (Sense Everything, Control Everything) system allows users to create services that combine communication, calendaring, location and devices in the physical world. SECE is an event-driven system that uses a natural-English-like language to trigger action scripts. Presence updates, incoming calls, email, calendar and time events, sensor inpu...
Article
The NGN (Next Generation Network), which can provide advanced multimedia services over an all-IP based network, has been the subject of much attention for years. While there have been tremendous efforts to develop its architecture and protocols, especially for IMS, which is a key technology of the NGN, it is far from being widely deployed. However,...
Article
Full-text available
The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more viable choice of SIP transpor...
Article
Providing multi-interface device users the ability to roam between different access networks is becoming a key requirement for service providers. The availability of multiple mobile broadband access technologies together with increasing use of real time multimedia applications is creating strong demand for handover solutions that can seamlessly and...
Article
Full-text available
The 11 papers in this special issue on mission critical networking are divided into three categories: quality of service issues (three papers); security issues (four papers); and configuration and data collection issues (four papers).
Article
For some location-based applications, such as emergency calling or roadside assistance, it appears that the identity of the requester is less important than accurate and trustworthy location information for accomplishing the main function. Accurate and genuine location is important for these applications to avoid misuse. In this paper we point to s...
Article
Next generation 9-1-1 (NG-9-1-1) services will enable the use of multimedia (voice, video, text messages, and data) for emergency communications. This will be made possible using a whole new architecture for emergency communications, one that is based on the internet protocol (IP) and open standards. VOIP based communication services vastly improve...
Conference Paper
Full-text available
We study the performance of four popular IM clients focusing our attention on video-chat. In particular, we analyze how Skype, Windows Live Messenger, Eyebeam and X-Lite react to changes in available bandwidth, presence of HTTP and bit-torrent traffic and random packet losses.