Students

  • GSoC 2015 wrap-up: NAT traversal via hole punching Set of Rules

    As you know, we participated in the Google summer of code 2015. One of the projects accepted for our organization was "NAT traversal via hole punching Set of Rules" by the student Max Mertens. In this post, Max tells us about his experience. Thanks!

    Peer-to-peer software is a great idea, as you do not need a central server and save bandwidth necessary for relaying. As I have been interested in networking and protocol development for a few years, I was happy to find the P2PSP organization and that it is participating in the Google Summer of Code 2015. So I asked the P2PSP developers if they would need an implementation of NAT traversal in their software, and applied for GSoC with the project "NAT traversal via hole punching Set of Rules as a Python implementation". The main idea of the NAT Traversal Set of rules (NTS) is that two peers (computers) that are each behind a different router (Network Address Translator, NAT) can connect to each other, without prior configuration of port forwarding and without UPnP or similar techniques. This enables multimedia to be streamed between such peers, e.g. between PCs or mobile devices each behind a home router.
    The mentors Vicente González Ruiz and Juan Pablo García Ortiz accepted the project ("any improvement in the NAT's war is also interesting for us") and I was very happy to be able to work with this organization over the summer.

    I began with the project by examining existing NAT traversal software and setting up a testing environment. Then I worked on a simple Python script doing nothing but NAT traversal. After testing and improving it, I added the NTS classes to the P2PSP software and added more and more functionality, until NAT traversal was working for all theoretically possible combinations.

    Virtual network setup used for testing; each box represents a virtual machine or Linux network namespace.
    Virtual network setup used for testing; each box represents a virtual machine or Linux network namespace.


    During the project, I sent status report emails once or several times a week, and my mentors Vicente and Juan Pablo helped me if I was unclear about P2PSP code or principles, and they had creative ideas on extending the NTS code. Also they were always open to merge changes to existing P2PSP code that were necessary or helpful during development.
    A few practices emerged that were helpful during development: To stick closely to the timeline that was planned in the proposal and to keep track of outstanding tasks, I had a frequently updated task list with finished tasks for each week and a to-do list sorted by priority. This way it was easy for my mentors and me to see how many tasks are left and what is to be done next. Documentation can turn out to be much more work than necessary if you document any change you made to the project. So I aimed at documenting each small part of the code just after it was finished and was not likely to be changed much anymore, and finalized the documentation before the midterm and the final evaluation to fully match the code.

  • Our first participation in Google Summer of Code

    P2PSP is an open application-layer protocol for the real-time streaming of media content over a peer-to-peer overlay, where every peer is connected with each other following a push-based fully connected mesh scheme. This project was born of the necessity of teaching about computer networks in a more exciting way to students of computer science at University of Almería (a small university in the south of Spain) and … it worked!

    In 2015 was the first time we participated as a mentoring organization in the GSoC program. We supervised three excellent students withgreat ideas. Their work has not only consisted of writing code but also thinking about new algorithms and researching about the problem in depth. We’d like to outline their projects.

    NAT traversal via hole punching Set of Rules (Max Mertens)
    Connection-filtering-NATs are becoming increasingly frequent, and this is a situation thathindersthe connectivity between peers. In this project Max worked in proposing and creating an extra functionality to handle those peers that are behind restricted-cone NATs and symmetric NATs. Max coded and tested his implementation in different scenarios.

    Implementation of Content Integrity Set of rules for P2PSP (Ilya Shakirov)
    Pollution attacks are a challenging security-related problem in peer-to-peer streaming platforms. We proposed two different theoretical strategies in order todetect a pollution attack in the context of the P2PSP live streaming system. In this project, Ilya coded the strategies, got statistical results and proposed improvements for the strategies.