Sie sind auf Seite 1von 6

Skype B2B Business Model

Ajay Yadav
Department of Information Technology
Shah And Anchor Kutchhi Engineering College
Mumbai,India
ashwini.deshmukh.sakec@analysis.urkund.com

Abstract—Skype employs a cost structure quite different to that


We believe that each Skype node uses a variant of the
of its telecom rivals. Free calls are made using Internet, generally
STUN [5] protocol to determine the type of NAT and firewall
with p-to-p technology. It does not manage its own network,
therefore, costs is less for client software and the hosting it is behind. There is no global NAT and firewall traversal
accounts. SkypeOut charges are higher than those Skype itself server because this would lead to exchanged traffic with it
incurs for calls routed through wholesale carriers. Skype makes during the login and calling t phases in the many experiments
revenues from licensing brand partners, such as mobile operator we performed.
3 in the UK, with devices of Logitech, and from a number of The Skype network is a overlay network and thus each
plugin services they co-market. client needs to build and refresh a table of reachable nodes. In
Skype, this table is called host cache and it contains IP
INTRODUCTION address and port number of super nodes. Starting with Skype
Skype [1] is a peer-to-peer (p2p) VoIP client developed by version1.0, the HC is stored in an XML file.
the organization that created Kazaa [2]. Skype allows users to Skype have implemented a ‘3G P2P’ or ‘Global Index’
place calls and text messages to other clients. In essence, it is technology, which is guaranteed to find a user if that user has
very similar to the MSN and Yahoo IM applications, as it has logged in the Skype network in the last 72 hours.
capabilities for voice-calls, instant messaging, audio
conferencing, and buddy lists. However, the underlying
protocols and techniques it employs are quite different. Skype wideband codecs maintains reasonable call quality
Similar to Kazaa, Skype uses an overlay peer-to-peer at an available bw of 32 kb/s. It uses TCP for signal, and UDP
network. There are two types of nodes in this overlay network, and TCP for transporting media traffic.
ordinary hosts and super nodes (SN). An ordinary host can be
used to place voice calls and text messages. A super node is an
ordinary host’s end-point on the Skype network. Any node
with a public IP address having specified hardware
specifications CPU, memory, and network bandwidth is a can
become a super node. An host connects to a node and
authenticates itself with the Skype login server. Skype login
server is an important entity in the Skype network as it saves
user names and passwords at the login server. This server
ensures that login names are unique . Buddy list is also stored
on the login server. Diagram illustrates the relationship
between hosts, nodes and the login server.
Apart from the login server, there are SkypeOut [3] and
SkypeIn [4] servers which provide PC-to-PSTN and PSTN-to-
PC bridging. SkypeOut and SkypeIn servers do not help in
PC-to-PC call establishment and hence it cannot be considerd
as a part of the Skype peer -to-peer network. Therfore the
login server is only considered to be the only central
component in the Skype p2p network. Online and offline user
information decentralized.
TCP connection and fragment of the config.xml
KEY exchange information with file.
COMPONENTS OF THE SKYPE any HC entry. If it was
SOFTWARE unable to do so, it will
E. Encryption
A Skype client listens on reported a login failure. In
Skype v1.2 and the onwards, The Skype website
ports for incoming calls, explains: “Skype uses
maintains a table of Skype if a SC is unable to node
Advanced Encryption
nodes known as host cache, establish a TCP connection
Standard, also known
uses wideband codecs, which with any HC entry, it Rijndael, which is used by
maintains a buddy list, tries to establish a TCP U.S. Government
encrypts a messages end-to- protocol connection and organizations to protect
end, and the determines if it exchange information with sensitive, information. Skype
is behind a NAT one of the seven bootstrap IP uses the 256-bit encryption,
addresses and port pairs are which has a total 1.1 x 10 77
hard-coded in the Skype possible keys, in order to
executable. A SC for encrypt the data in Skype
Windows XP stores the host call or instant message.
cache as a XML file Skype uses the 1024 bit RSA
‘shared.xml’ in to negotiate the symmetric
C:\Documents and AES keys. User public keys
Settings\<XP are certified by Skype
User>\Application server at the login using
Data\Skype. A SC for Linux 1536 or 2048-bit RSA
stores the HC as a XML file certificates.”
‘shared.xml’ at $
(HOMEDIR)/.Skype. After F. NAT and Firewall
running a SC for two days, We conjecture that SC
we observed that HC uses a variation of the STUN
contained a maximum of 200 [5] and TURN [19] protocols
entries. Host and peer caches to determine the type of NAT
are not new to Skype. and firewall it is behind. SC
Chord , another p-to-p refreshes this information
A. Ports protocol, has a finger table, periodically. This
which is used to find a node. information is also stored in
A Skype client opens a
shared.xml file.
TCP and a UDP listening C. Codecs
port at the port number as in Unlike its file sharing
its connection dialog box. Skype uses the iLBC ,
counter part Kazaa, a Skype
SC randomly chooses the iSAC , and iPCM codecs.
client cannot prevent itself
port number upon These codecs have been
from becoming a super node.
installation. In addition, SC developed by
also opens TCP listening GlobalIPSound [15]. For SC SKYPE
ports at port number 80 and v1.4 the Skype codecs allow FUNCTIO
443 which, are used to listen frequencies between 50- NS
for incoming HTTP and 8,000 Hz to pass through.
HTTP-over-TLS requests. Skype functions can be
This is the characteristic of a classified into startup, login,
No default TCP or UDP
listening port. connection wideband codec. user search, call
dialog box. This figure establishment and tear down,
shows the ports on which a D. Buddy List1 media transfer, and presence
SC listens for incoming In Windows XP, Skype messages. This section
connections. stores the buddy information discusses each of them in
in an XML file config in C detail.
B. Host Cache drive and Settings\<XP
user>\Application A. Startup
The host cache (HC) is a
list of super node IP Data\Skype\<skype id>. In When SC v1.4 was run for
addresses and port pairs that Linux, the first time after installation,
Skype stores the ‘same file it sent a HTTP 1.1 GET
SC builds and it refreshes
in $ request to the Skype server
regularly. It is a very critical
(HOMEDIR)/.Skype/<skype (skype.com). The first line of
part to the Skype operation. user id>. Starting with
In SC v0.97, there must be at this request contains the
Skype version 1.2 for
least one valid entry present Windows XP, the buddy list keyword ‘installed’.
in the HC. A valid entry is an is also stored on a central The complete startup
IP addresses and port server whose IP addresses is messages for Skype v0.97
numbers of an online Skype 202.72.49.142. The buddy are reported in the technical
node. At login time, a SC list is stored unencrypted on report .
v0.97 tried to establish a another computer. shows a
The system time was hard-coded in Skype you-go option. Purchase
B. Login printed whenever the executable. some Skype Credit, at very
Login is the most critical connect() and sendto() In order to see the low rates and then call
function to the Skype functions were called to minimal set of messages a whoever you want. Skype
operation. It is during this accurately profile the time at SC exchanges with other Credits are a good option if
process a SC authenticates which Skype sends its login you need to make a few calls
entities for a successful
its user name and password messages. Also, before and only want to pay for
login, we performed the
with the login server, running the Skype HC XML
following experiment. The what you use.
advertises its presence to file was detected . Then SC
HC was deleted and For a Skype Number one
other peers and its buddies, is run, and e a login attempt
permitted inbound and has to pay monthly for.
determines the type of NAT is made . It is observed that
outbound UDP and TCP People can call from their
and the firewall it is behind, the SC first sent a UDP
traffic. A SC was started and mobile or landline and you
are discovers online Skype packet of 18 bytes to every
a login attempt was made. pick the call up in Skype. A
nodes with public IP one of the seven bootstrap
The login attempt succeeded. Skype Number is needed if
addresses, and checks the SN IP address and port
this experiment was repeated you, or your friends and
availability of the latest 33033. If there is no
for the same Skype user id
response after five seconds, family live in different
Skype version. two more times. Fig shows
SC tried to establish a TCP countries, or plan to travel
1) Login Process the messages exchanged
connection with the each of abroad and want an
Using the library these seven default SNs and between SC, SN, bootstrap
function call overloading SN,and the login server in a affordable way to keep in
the IP address on port touch.
technique described in 333033. the connection condensed form.
section III.B, we overrode attempts failed, then it In these experiments it
the connect(), and sendto() Skype to Go is a pay-as-you-
repeats the whole process was observed that the
calls such that these calls go option that allows users to
after six seconds. This first and the
always returned with a call people any where in the
experiment is repeated for 15
failure. However, permitted a minutes, and strangely Skype world for the price of a local
Start
TCP connection to localhost never reported a login call by giving you a local
since Skype refuses to run if failure. Figure 3 shows these number to call them on.
cannot establish this login attempts as a flow Send UDP Skype to Go is a great option
connection. chart.
packets to seven
bootstrap SNs at if someone are abroad and
port 33033
want to avoid any extra
443. port). However, it was
not succesfull such attempts international calling charges
for Skype Linux v1.2. when calling to other
Response within countries.
Since the HC file had 6 seconds

been deleted, and since it Skype Business Model


was seen the same bootstrap Yes Skype employs a cost
IP address and the port pairs structure quite different from
in subsequent failed login its telecom rivals. Free calls
TCP connection
attempt, it was conclude that attempts
are routed through the
these IP address and port with seven
bootstrap SN Internet, generally with p-to-
pairs were hard-coded in the IP addresses
and port p technology. Skype does not
Skype executable. 33033
manage its own network,
We have observed that a therefore, and incurs only
Success
SC must establish a TCP minor costs for client
connection with a SN in software and the hosting
Connect
order to connect to the Skype ed accounts. SkypeOut charges
network.It will report a login Yes
are only slightly higher than
failure if it cannot connect to the of Skype itself incurs for
a super node,. No
calls routed through
In another experiment, Skype Subscriptions wholesale carriers. Skype
we filled the SC HC with an Subscriptions are also earns licensing revenues
invalid IP address and port from brand partners, such as
calling plans monthly that let
pair. Initially,the SC was mobile operator 3 in the UK,
you make unlimited, or
not able to establish a TCP with devices from Logitech,
fixed-minute calls to
connections with this invalid and from a number of plugin
entries ;the however, after landlines (and mobiles where
applicable). A subscription is services they co-market.
some time, it established
TCP connection with one of good if you make a lot of
the bootstrap SNs. Since in calls. All subscriptions are
renewed automatically, offer In summary, Skype
hc IP address and port makes its money:
number of any bootstrap SN a savings compared to our
standard rates, and you 1. From user services:
was not present , it gives
can cancel at anytime. a. Premium services
more credence to our belief
are that build on free
that some SN IP address and
Skype Credit * is a pay-as- services: group video,
the port numbers pairs are
group screen sharing,
live chat and the
unlimited calls to
selected countries.
b. Accessory services:
TV, mobiles & tablet
computer
c. Sale of
applications: business,
games, translation, etc.

2. From licensing
opportunities, e.g.
a. Skype-Nokia and
Skype-MySpace
relationships

b. Hardware Royalties

c. c. Carrier
relationships, such as the
Skypephone on 3 ecample
noted below
3. Advertising opportunities yet to be properly developed.

The model is successful, with impressive statistics:


CONCLUSION
1. Skype has added over 350,000 new account registrations In this paper, we have tried to analyze various aspects of
every day. It had 32 miilion users in February 2012. the Skype protocol by analyzing the Skype network traffic and
2. Users are spread across the world. by intercepting the shared library and system calls of Skype. It
3. Skype now has over 100 billion cumulative calling was not observed that Skype can work almost seamlessly
minutes. behind NATs and firewalls.. Skype uses TCP for signaling. It
4. More then 8% of the world's international calling uses wide band codecs and has licensed them from
minutes is through Skype. GlobalIPSound Skype communication is encrypted.
5. Skype delivers free video, these increasing from 27% to
34% of call time from December 2007 to December Skype has a central server which stores login names,
2008. password and buddy list of each and every user. Since Skype
6. Steady increase in call lengths. packets are encrypted, it is not possible to say with certainty
7. Skype needs its users to make one more call per day to what else informations are stored on the login server. We did
be a billion dollar business. not observe any subsequent exchange of information with the
login server after a user logged onto the Skype network.
8. for business 35% of users use Skype primarily, or often,.
9. Three markets remain largely untapped: core consumer (, Compared to Yahoo, MSN, and Google Talk and other
mobile and business. applications, Skype was reported the best mouth-to-ear
latency.
Skype is a selfish application and it tries to obtain the best
available network and CPU resources for its execution. It
changes its application priority to the high priority in Windows
during the time call was established. It evades blocking by
routing its login messages over large no. of SNs. This also
implies that Skype is relying on SNs, who can misbehave, to
route login messages to the login server. Skype does not allow
a user to prevent its machine from becoming a SN although it
is possible to prevent Skype from becoming a SN by putting a
bandwidth limiter on the Skype applications when no calls are
under progress. Theoretically , if all Skype users decided to
put bandwidth limiter on their applications, then Skype
network can possibly collapse since the SNs hosted by Skype
may not have enough bandwidth to relay all calls.
From our experience of analyzing the Skype protocol, we
gather that packet intercept and blocking can be used for
protocol reverse engineering. Classical packet sniffing tools
such as Ethereal are very less useful when packet content is
encrypted. Shared library and system call interception
techniques can be used to manipulate the network traffic of a
black box executable.

REFERENCES
[1] Skype. http://www.skype.com
[2] Kazaa. http://www.kazaa.com
[3] SkypeOut. http://www.skype.com/products/skypeout/
[4] SkypeIn. http://www.skype.com/products/skypein/
[5] J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy. STUN: simple
traversal of user datagram protocol (UDP) through network address
translators (NATs). RFC 3489, IETF, Mar. 2003.
[6] Global Index (GI): http://www.skype.com/skype_p2pexplained.html
[7] Ethereal. http://www.ethereal.com
[8] Net Peeker. http://www.net-peeker.com
[9] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. R. Johnston, J. Peterson,
R. Sparks, M. Handley, and E. Schooler. SIP: session initiation protocol.
RFC 3261, IETF, June 2002.
[10] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T.
Berners-Lee. HTTP: hyper text transfer protocol. RFC 2616, IETF, June
1999.

Das könnte Ihnen auch gefallen