Feeds

How does Skype get through Firewalls and NAT Routers?

SuperNodes

  • alert
  • submit to reddit

Build a business case: developing custom apps

If, like some of our readers, you are either confused about how the new Skype Voice over IP system gets past firewalls and NAT routers, or you are skeptical about it, it's worth noting the answer that Niklas Zennstrom, one of the key architects of both Kazaa and Skype gave us on the subject.

Readers were concerned that the peer to peer networking guru had found a way to creep in the back door, managing to open a port from outside and wanting re-assurance that he hadn't. We asked him how does Skype manage to route the call to the appropriate PC without special configuration being done on the router, and a Skype software router in place on the LAN to process the incoming data and route it to the relevant PC?

His answer was, "Without being too technical, each Skype client is always connected to a SuperNode (any Skype client can become a SuperNode, the SuperNode is acting as a hub). SuperNodes are always on routable open IP addresses. When a call is set up the established TCP connection with the SuperNode is used to signal that a call is coming. Dependent on the firewall status of the client the data stream is set up either as UDP (if firewall allows) or in worse case as outgoing TCP which is almost always allowed. If both clients are only allowed to do outgoing TCP calls are routed through another peer."

In other words you get to know there is a call for you and you make the outgoing connection to a known supernode to meet the call. Neat.

Skype yesterday went past 1 million downloads from the half a million when we first wrote about it two weeks ago. From when we first began writing this story until it was finished, a further 2,000 downloads occurred. Faultline would have downloaded it, but we still use Windows 98, and can't get it yet.

Related Research
Get the Faultline Newsletter, click here

Build a business case: developing custom apps

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Microsoft says 'weird things' can happen during Windows Server 2003 migrations
Fix coming for bug that makes Kerberos croak when you run two domain controllers
Cisco says network virtualisation won't pay off everywhere
Another sign of strain in the Borg/VMware relationship?
VVOL update: Are any vendors NOT leaping into bed with VMware?
It's not yet been released but everyone thinks it's the dog's danglies
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.