P2P Content Distribution
|
|
- James Ward
- 6 years ago
- Views:
Transcription
1 , University of Hannover Wolf-Tilo Balke and Wolf Siberski *With slides from K. Wehrle (RWTH), A. Bharambe (CMU), P. Rodriguez, P. Chou (MSRC), Chiu (CUHK) Peer-to-Peer Systems and Applications, Springer LNCS Early approach to download Napster/Gnutella/Fasttrack Download whole file from one peer If download fails: repeat search, resume download from alternative Issues No load distribution Poor performance Main reason: Asymmetric uplink/downlink bandwidth (ADSL) Low reliability (except for small files) 2
2 Swarming Approach Chunks Split large files into small chunks Identify/protect chunks via hash values 0x9A3C 0x7C23 0x194F 0xDE6A Parallelization Download different chunks from different sources Utilize upload capacity of multiple sources Sources: Destination: 3 Swarming Properties Advantages Peer failures: no loss of files, only chunks Increased throughput Strategiest Chunk selection Avoid scarcity Best overall availability? Fairness Systems Free-Riding Bandwidth allocation BitTorrent Avalanche 4
3 BitTorrent Overview Bittorrent or BitTorrent Torrent = big stream Author: Bram Cohen, 2003 Only for file distribution, no search features Designed for Content providers Flash crowds Central components Web server for search Tracker for peer coordination 5 BitTorrent Parts Peers Torrent Contains metadata about the files Contains the address of a tracker Specification of backup trackers possible Swarm All peers sharing a torrent are called a swarm Tracker Keeps track of which peers are in a swarm Coordinates communication between the peers 6
4 BitTorrent joining a torrent new leecher 2 join peer list 3 tracker torrent 1 data request 4 website seed/leecher Peers divided into: seeds: have the entire file leechers: still downloading 1. obtain the torrent 2. contact the tracker 3. obtain a peer list (contains seeds & leechers) 4. contact peers from that list for data 7 BitTorrent exchanging data leecher B leecher A I have! seed leecher C Verify pieces using hashes Download sub-pieces in parallel Advertise received pieces to the entire peer list Look for the rarest pieces 8
5 BitTorrent - unchoking leecher B leecher A seed leecher D leecher C Periodically calculate data-receiving rates Upload to (unchoke) the fastest downloaders Optimistic unchoking periodically select a peer at random and upload to it continuously look for the fastest partners 9 Torrent A Torrent file Passive component Files are typically fragmented into 256KB pieces Typically hosted on a web server Metadata file structure Describes the files in the torrent URL of tracker File name File length Piece length SHA-1 hashes of pieces Allow peers to verify integrity Creation date 10
6 Tracker Peer cache IP, port, peer id State information Completed Downloading Clients report status periodically to tracker Returns random list 50 random leechers/seeds Client first contacts of them and more if some do not respond 11 Tracker 12
7 Tracker-less approaches Tracker issues Single point of failure Scalability Piratebay tracker nearly overloaded (>5 Mio. Peers) Decentralized tracker Replace with DHT (Kademlia) Does not tackle distributed search Currently not widely used 13 Chunk Selection Which chunk next? 1. Strict Priority Finish active chunks 2. Rarest First Improves availability of rare chunks Delays download of common chunks 3. Random First Chunk Get first chunk quickly (rarest chunk probably slow to get) 4. Endgame Mode Send requests for last sub-chunks to all known peers End of download not stalled by slow peers 14
8 Choking Choking mechanism Ensures that nodes cooperate Eliminates the free-rider problem Cooperation involves uploaded sub-pieces that you have on your peer Choking Temporary refusal to upload Downloading occurs as normal Connection is kept open No Setup costs TCP congestion control Based on game-theoretic concepts Tit-for-tat strategy in repeated games 15 Game Theory Basic Ideas of Game Theory Studies situations where players choose different actions in an attempt to maximize their returns Studies the ways in which strategic interactions among rational players produce outcomes with respect to the players preferences The outcomes might not have been intended by any of them Game theory offers a general theory of strategic behavior Described in mathematical form Plays an important role in Modern economics Decision theory Multi-agent systems 16
9 Game Theory Developed to explain the optimal strategy in two-person interactions. von Neumann and Morgenstern Initially John Nash Zero-sum games Works in game theory and differential geometry Nonzero-sum games Nash equilibrium 1994 Nobel Prize in Economics Harsanyi, Selten Incomplete information 17 Definitions Games Situations are treated as games. Rules The rules of the game state who can do what And when they can do it. Player's Strategies Plan for actions in each possible situation in the game Player's Payoffs Is the amount that the player wins or looses in a particular situation Dominant Strategy If players best strategy doesn t depend on what other players do 18
10 Prisoner's Dilemma Famous example of game theory A and B are arrested by the police They are questioned in separate cells Unable to communicate with each other. They know how it works If they both resist interrogation and proclaim their mutual innocence, they will get off with a three year sentence for robbery. If one of them confesses to the entire string of robberies and the other does not, the confessor will be rewarded with a light, one year sentence and the other will get a severe eight year sentence. If they both confess, then the judge will sentence both to a moderate four years in prison 19 Prisoner's Dilemma B Confess Not Confess A Confess 4 years each 1 year for B and 8 years for A Not Confess 8 years for A and 1 year for B 3 years each 20
11 A s Decision Tree There are two cases to consider If B Confesses If B Does Not Confess A A Confess Not Confess Confess Not Confess 4 Years in Prison 8 Years in Prison 1 Year in Prison 3 Years in Prison Best Strategy Best Strategy The dominant strategy for A is to confess No matter what B does, confessing is better choice Nash equilibrium: both A and B will confess 21 Repeated Games A repeated game Game that the same players play more than once Differ from one-shot games because people's current actions can depend d on the past behavior of other players. Cooperation is encouraged Book recommendation Thinking strategically by A.Dixit and B Nalebuff German translation: Spieltheorie für Einsteiger 22
12 Tit for tat Tit for tat Highly effective strategy An agent using this strategy will initially cooperate Then respond in kind to an opponent's previous action If the opponent previously was cooperative, the agent is cooperative. If not, the agent is not. Dependent on four conditions Unless provoked, the agent will always cooperate If provoked, the agent will retaliate The agent is quick to forgive The agent must have a good chance of competing against the opponent more than once 23 Bittorrent Choking mechanism Ensures that nodes cooperate Eliminates the free-rider problem Cooperation involves uploaded sub-pieces that you have to your peer Based on game-theoretic concepts Tit-for-tat strategy in repeated games Goal is to have several bidirectional connections running continuously Upload to peers who have uploaded d to you recently Unutilized connections are uploaded to on a trial basis to see if better transfer rates could be found using them 24
13 Choking Details A peer always unchokes a fixed number of its peers Default of 4 Choking decision based on current download rates Evaluated on a rolling 20-second average Choking evaluation performed every 10 seconds Prevents wastage of resources by rapidly choking/unchoking peers Optimistic Unchoking Each BitTorrent peer has a single optimistic unchoke which is uploaded regardless of the current download rate from it. This peer rotates every 30s Reason: To discover currently unused connections that are better than the ones being used 25 Anti-Snubbing Choking policy When over a minute has gone by without receiving a single sub-piece from a particular peer, do not upload to it except as an optimistic unchoke Problem A peer might find itself being simultaneously choked by all its peers that it was just downloading from Download will lag until optimistic unchoke finds better peers Solution If choked by everyone, increase the number of simultaneous optimistic unchokes to more than one 26
14 Choking for Seeds Open issue: upload-only choking Once download is complete, a peer has no download rates to use for comparison nor has any need to use them The question is, which h nodes to upload to? Policy Upload to those with the best upload rate. Advantages Ensures that t pieces get replicated faster Peers that have good upload rates are probably not being served by others 27 Experimental Evaluation 1 Comprehensive analysis of BitTorrent to assess its performance "Dissecting BitTorrent: Five Months in a Torrent's Lifetime" by M. Izal, G. Urvoy-Keller, E.W. Biersack, P.A. Felber, A. Al Hamra, and L. Garces-Erice, Passive and Active Network Measurement 2004 Obtained the "tracker" log Case study of 1.77GB Linux Redhat 9 distribution For its first 5 months of activity More than 180,000 clients More than 50,000 clients initiating a download in the first five days 28
15 Experiments Number of active peers over time 29 Experiments Number of active peers in first 5 days 30
16 Experiments Data Volume uploaded by seeds and leachers 31 Experiments Proportions of seeds and leachers 32
17 Experiments Session types and their characteristics 33 Experimental Evaluation 2 Simulation-based evaluation Analyzing and Improving a BitTorrent Network s Performance Mechanisms by A. Bharambe, C. Herley, and V. N. Padmanabhan, SIGCOMM2006 Motivating Questions Are download rates optimal? Can we do better? Does rate-based Tit-for-tat (TFT) work? Is ste the Rarest aestfirst stpocy policy really eaybeeca beneficial? Must nodes continue seeding after downloading? 34
18 Experimental Setup Discrete-event simulator Models BitTorrent joins, leaves, block exchanges Models queuing delays, no propagation p delay Assumes bandwidth bottlenecks only at the edge Common parameters 100 MB file; 400 blocks of 256 KB 1 seed always on, flash-crowd: 100 joins/sec Seed-uplink = 6 Mbps, Nodes = 1500/400 kbps #nodes = 1000, #neighbors = Scalability: Uplink Utilization Upload utilization is constantly very high 36 36
19 Problem Case: Slow Seed Node capacities Uplink: 400 kbps Downlink: 1500 kbps Seed capacity Uplink: varies from 200 kbps 1000 kbps Scenario: seed uplink = 400 kbps If BitTorrent is performing optimally, we should see near 100% uplink utilizatoin Problem Case: Slow Seed The seed node decides which blocks to serve Vanilla BitTorrent: Connected nodes decide which blocks to request from seed Avoid sending duplicate blocks from seed at all costs 38 38
20 Improving Fairness Goal: ensure nodes upload as much as they download ISPs have begun to charge heavy P2P users Uploaders will bear the brunt of the charges BitTorrent s rate-based TFT and optimistic unchoke can result in high unfairness Proposed solution: pair-wise block-based TFT Bound the difference between blocks uploaded and downloaded Improving Fairness Questions: In the worst case, how many blocks does a node serve? Measure as ratio to #blocks downloaded What is the overall uplink utilization? TFT advocates blocking a link even when there is data to send Can hurt link utilization 40 40
21 Improving Fairness: Blocks served Vanilla BitTorrent results in high unfairness Block-level TFT effective Matching Tracker useful Improving Fairness: Uplink Utilization Matching Tracker helps increase utilization Pairwise TFT needs higher node degrees for better utilization 42 42
22 Fairness / Efficiency Tradeoff in Swarming Protocols Equal download bandwidth for all peers Download bandwidth proportional to upload contribution "The Delicate Tradeoff of BitTorrent-like File Sharing Protocol Design", by B Fan, DM chiu and JCS Lui,,IEEE ICNP BitTorrent: Summary Optimized file transfer system No file search, no fancy GUI, etc. Very effective High throughput & scalability Nearly perfect utilization of bandwidth Fairness and load distribution not optimal, but good enough Commercially successful Distribution of RedHat distribution BBC evaluates the distribution ib i of TV content (not in real-time) Centralized Easier to take down than other approaches 44
23 Avalanche Developed at Microsoft Research "Network Coding for Large Scale Content Distribution by C. Gkantsidis and P. Rodriguez, INFOCOM 2005 Main application scenario: software update distribution Cope with huge flash crowds Evolution of swarming approach Better control of chunk distribution Network coding Keep BitTorrent advantages 45 Goals Improve on following issues Rare blocks are hard to obtain Tit-for-tat incentive mechanisms decrease speeds Arrival of new users slows down old users Heterogeneous nodes do not interact well Same information travels repeatedly over bottleneck links Too much dependency from seeds Sudden departures can prevent peers from finishing 46
24 Network Coding Term Network Coding coined in "Distributed Source Coding for Satellite Communications by R.W. Yeung, Z. Zhang, IEEE Transactions on Information Theory,1999 Basic ideas Optimize transfer via multiple paths Instead of directly transferring data blocks, use linear combinations 47 Network Coding can Increase Throughput sender s 1 receiver t b 2 rate r 1 XOR a XOR b a b sender s XOR receiver t 1 2 rate r 2 a r 2 r 2 Routing only: Capacity region? Network Coding: r 1 r 1 48
25 Network Coding Capacity a,b a b a b a b a+b a+b a+b a,b b,a optimal routing throughput = 1 network coding throughput = 2 Network coding achieves multicast capacity sender receiver coding node Network information flow by R. Ahlswede, N. Cai, S. R. Li, R. W. Yeung:. IEEE Transactions on Information Theory, Network Coding and Latency a b a b b a b a+b b a a a+b optimal routing delay = 3 network coding delay = 2 Network coding minimizes delay A comparison of network coding and tree packing by Y. Wu, P.A. Chou, K. Jain, ISIT
26 Network Coding - Theory vs. Practice Theory: Symbols flow synchronously throughout network Edges have unit (or known integer) capacities Centralized knowledge of topology assumed to compute encoding and decoding functions Practice: Information travels asynchronously in packets Packets subject to random delays and losses Edge capacities often unknown, time-varying Difficult to obtain centralized knowledge, or to arrange reliable broadcast of functions Need simple technology, applicable in practice 51 Linear Network Coding Assume file: F = [x 1 x 2 ], where x i is a block. Define code E i (a i,1, a i,2 ) = a i,1 *x 1 + a i,2 *x 2, where a i,1, i( i,1 i,2 ) i,1 1 i,2 2 i,1 a i,2 are numbers. Infinite number of E i s. Any two linearly independent E i (a i,1, a i,2 ) can recover [x 1 x 2]. Similar as solving a system of linear equations. 52
27 Making Network Coding Practical Packetization Include matrix coefficients in chunk header Decoding becomes simple matrix operation Header removes need for centralized knowledge of graph topology and encoding/decoding functions Overhead: ~ 3% Buffering Allows asynchronous packets arrivals & departures with arbitrarily varying rates, delay, loss 53 Avalanche Coding Content initially encoded at the server Clients can produce new encoded packets out of partial files File B 1 B 2 B n Server α 1 α 2 β 1 β 2 βn α n Client A E 1 E 2 ω 1 ω 2 Client B E 3 54
28 Avalanche Robustness If server goes down (after serving the full file once) All Avalanche users are able to complete the download Only 10% of users using typical file-swarming techniques are able to complete. # of Peers Finished Avalanche NC FEC LR Typical file-swarming systems Time 55 Avalanche Download Time Much lower and predictable download times Finish Times Avalanche NC Typical swarming Random Peers that did not finish Nodes (sorted by order of arrival) 56
29 No need for nodes to stay around No need for nodes to stay after they finish the download Performance remains unchanged Finish Times Nodes stay for ever Nodes leave immediately Nodes (sorted by order of arrival) 57 Decoding Performance Avalanche tradeoff decision Impose more processing load on peers Optimize network utilization Decoding time less than 4% of the total download File Size (MB) Blocks Time sec sec m 21 sec m 38 sec Measured on Pentium III, 650MHz, 512MB RAM. 58
30 Avalanche: Summary Optimized version of BitTorrent Advantages Improves chunk availability by network coding No endgame required, because many different chunks are usable Reduces need for seed significantly Keeps BitTorrent advantages (scalability, etc.) Disadvantage Increased local load Processing Memory Harddisk 59 Swarming: Summary Solves the problem of efficient file distribution Scalable Handles flash crowds Areas for optimization Incentive models Tracker-less approaches Further endgame improvements Next step: content streaming Real-time constraints Chunk order 60
Distributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig
Distributed Data Management Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 8.0 Content Provisioning 8.0 Content Distribution 8.1 Swarming
More informationDistributed Data Management
Distributed Data Management Wolf-Tilo Balke Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 8.0 Content Provisioning 8.0 Content Distribution
More informationDistributed Data Management
Distributed Data Management Profr. Dr. Wolf-Tilo Balke Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de Network Models and Content Provisioning Network Models
More informationContent Distribution and BitTorrent [Based on slides by Cosmin Arad]
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying
More informationContent Overlays (continued) Nick Feamster CS 7260 March 26, 2007
Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured
More informationBitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.
BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and
More informationLecture 17: Peer-to-Peer System and BitTorrent
CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and
More informationScalability of the BitTorrent P2P Application
Scalability of the BitTorrent P2P Application Kolja Eger, Ulrich Killat Hamburg University of Technology 5.Würzburger Workshop 8.-9. July 2005 Overview File dissemination in peer-to-peer (p2p) networks
More informationP2P content distribution Jukka K. Nurminen
P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient
More informationEfficiency of Data Distribution in BitTorrent-Like Systems
Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department
More informationDo incentives build robustness in BitTorrent?
Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN
More informationP2P content distribution
P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer
More informationBitTorrent Optimization Techniques. (from various online sources)
BitTorrent Optimization Techniques (from various online sources) Announcement No recitation next week! Final review session Next Sunday (5/2) 5-7pm, GHC 4215 Let us know what you want at http://www.doodle.com/6qvsnubhmam2zkxp
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationCooperative End-to-end content distribution. Márk Jelasity
Cooperative End-to-end content distribution Márk Jelasity Content distribution So far we looked at search Content distribution is about allowing clients (peers) to actually get a file or other data after
More informationBitTorrent and CoolStreaming
BitTorrent and CoolStreaming Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen Aalto University P2P Networks BitTorrent
More informationExtreme Computing. BitTorrent and incentive-based overlay networks.
Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some
More informationBandwidth Trading in Unstructured P2P Content Distribution Networks
Bandwidth Trading in Unstructured P2P Content Distribution Networks Kolja Eger and Ulrich Killat Department of Communication Networks Hamburg University of Technology (TUHH) {eger, killat}@tu-harburg.de
More informationPerformance Analysis of BitTorrent Protocol
Performance Analysis of BitTorrent Protocol Parul Sharma Department of Computer Science Engineering sharma.parul111@gmail.com Anuja Bhakuni Department of Computer Science Engineering anuja.bhakuni13@gmail.com
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationPeer-to-Peer Networks 12 Fast Download
Peer-to-Peer Networks 12 Fast Download Arne Vater Technical Faculty Computer Networks and Telematics University of Freiburg IP Multicast Motivation - Transmission of a data stream to many receivers Unicast
More informationPeer-to-Peer Applications Reading: 9.4
Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,
More informationAVALANCHE: A NETWORK CODING ANALYSIS
COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application
More informationGame Theory. Presented by Hakim Weatherspoon
Game Theory Presented by Hakim Weatherspoon Game Theory Main Question: Can we cheat (and get away with it)? BitTorrent P2P file distribution tool designed with incentives for contribution Users contribute
More informationIntroduction to P P Networks
Introduction to P P Networks B Sc Florian Adamsky florianadamsky@iemthmde http://florianadamskyit/ cbd Internet Protocols and Applications SS B Sc Florian Adamsky IPA / Outline Introduction What is P P?
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80
More informationUnderstanding and Deconstructing BitTorrent Performance
Understanding and Deconstructing BitTorrent Performance Ashwin R. Bharambe Carnegie Mellon University Cormac Herley Venkata N. Padmanabhan Microsoft Research January 25 Technical Report MSR-TR-25-3 Microsoft
More informationAnalyzing and Improving a BitTorrent Network s Performance Mechanisms
Analyzing and Improving a BitTorrent Network s Performance Mechanisms Ashwin R. Bharambe Cormac Herley Venkata N. Padmanabhan Carnegie Mellon University Microsoft Research Microsoft Research Abstract In
More informationImproving BitTorrent: A Simple Approach
Improving BitTorrent: A Simple Approach Alix L.H. Chow Univ. of Southern California Leana Golubchik Univ. of Southern California Vishal Misra Columbia University Abstract Measurement studies have shown
More informationThe Design Trade-offs of BitTorrent-like File Sharing Protocols
The Design Trade-offs of BitTorrent-like File Sharing Protocols Bin Fan John C.S. Lui Dah-Ming Chiu Abstract The BitTorrent BT file sharing protocol is very popular due to its scalability property and
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationMETHODOLOGIES TO IMPROVE THE PERFORMANCE OF A BITTORRENT LIKE PEER TO PEER NETWORK
METHODOLOGIES TO IMPROVE THE PERFORMANCE OF A BITTORRENT LIKE PEER TO PEER NETWORK 1 M.PADMAVATHI, 2 R.M.SURESH 1 Associate Professor, Department of Information Technology, RMD Engineering College, PO
More informationBitTorrent from swarms to collectives
BitTorrent from swarms to collectives Some on-going research in the tribler team at TU Delft name: David Hales date: Sept. 21, 2009 event: ECCS 2009 Tribler team: 35 + collaborators tribler.org Tribler
More informationCSE 486/586 Distributed Systems Peer-to-Peer Architectures
CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How
More informationTHE PEER-TO-PEER (P2P) paradigm has proved to be
140 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 12, NO. 2, SECOND QUARTER 2010 A Survey of BitTorrent Performance Raymond Lei Xia and Jogesh K. Muppala, Senior Member, IEEE Abstract Since its inception,
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 25 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer peer-to-peer systems overview
More informationImproving the Download Time of BitTorrent-like Systems
Improving the Download Time of BitTorrent-like Systems Chi-Jen Wu, Cheng-Ying Li, and Jan-Ming Ho Institute of Information Science Academia Sinica, Taiwan {cjwu, cyli, hoho}@iis.sinica.edu.tw Abstract
More informationAnatomy of a P2P Content Distribution System with Network Coding
Anatomy of a P2P Content Distribution System with Network Coding Christos Gkantsidis, John Miller, and Pablo Rodriguez Microsoft Research, Cambridge Anatomy of a P2P Content Distribution System with Network
More informationARTICLE IN PRESS. Journal of Network and Computer Applications
Journal of Network and Computer Applications 32 (29) 666 683 Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage: www.elsevier.com/locate/jnca Principles
More informationDissecting BitTorrent: Five Months in a Torrent s Lifetime
Dissecting BitTorrent: Five Months in a Torrent s Lifetime M. Izal, G. Urvoy-Keller, E.W. Biersack, P.A. Felber, A. Al Hamra, and L. Garcés-Erice Institut Eurecom, 2229, route des Crêtes, 694 Sophia-Antipolis,
More informationinria , version 1-6 Sep 2006
Rarest First and Choke Algorithms Are Enough Arnaud Legout I.N.R.I.A. Sophia Antipolis France arnaud.legout@sophia.inria.fr G. Urvoy-Keller and P. Michiardi Institut Eurecom Sophia Antipolis France {Guillaume.Urvoy,Pietro.Michiardi}@eurecom.fr
More informationBiToS: Enhancing BitTorrent for Supporting Streaming Applications
BiToS: Enhancing BitTorrent for Supporting Streaming Applications Aggelos Vlavianos, Marios Iliofotou and Michalis Faloutsos Department of Computer Science and Engineering University of California Riverside
More informationBitTorrent Fairness Analysis
BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)
More informationPerformance Analysis and Improvement for BitTorrent-like File Sharing Systems
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. 2007; 00:1 7 [Version: 2002/09/19 v2.02] Performance Analysis and Improvement for BitTorrent-like File Sharing
More informationPeer to Peer Systems and Probabilistic Protocols
Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good
More informationimproving the performance and robustness of P2P live streaming with Contracts
MICHAEL PIATEK AND ARVIND KRISHNAMURTHY improving the performance and robustness of P2P live streaming with Contracts Michael Piatek is a graduate student at the University of Washington. After spending
More informationBoosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading
Boosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading Raphael Eidenbenz Thomas Locher Stefan Schmid Raphael+Roger: ETH Zurich DCG Thomas: ABB Research Roger Wattenhofer T-Labs Stefan:
More informationLecture 8: Application Layer P2P Applications and DHTs
Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationThe Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design Bin Fan Dept. of Computer Science Eng. The Chinese University of Hong Kong Email: bfan@cse.cuhk.edu.hk Dah-Ming Chiu Dept. of Information
More informationPeer-to-Peer Streaming Systems. Behzad Akbari
Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues
More informationA Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis
A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis Chih-Lin HU* and Zong-Xian LU Department of Communication Engineering, National Central University,
More informationKey question: how to set CongestionWindow which, in turn, affects ARQ s sending rate? linear increase/exponential decrease AIMD
TCP congestion control Recall: EffectiveWindow = MaxWindow (LastByteSent LastByteAcked) where MaxWindow = min{ AdvertisedWindow, CongestionWindow } Key question: how to set CongestionWindow which, in turn,
More informationOPTIMIZATION QUESTIONS IN BITTORRENT COMMUNITIES
OPTIMIZATION QUESTIONS IN BITTORRENT COMMUNITIES Elvira Antal Department of Natural Sciences and Engineering, Faculty of Mechanical Engineering and Automation, E-mail: antal.elvira@gamf.kefo.hu Abstract
More informationApplication Layer: P2P File Distribution
Application Layer: P2P File Distribution EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationSALSA: Super-Peer Assisted Live Streaming Architecture
SALSA: Super-Peer Assisted Live Streaming Architecture Jongtack Kim School of EECS, INMC Seoul National University Email: jkim@netlab.snu.ac.kr Yugyung Lee School of Computing and Engineering University
More informationDesign Space Analysis for Modeling Incentives in Distributed Systems
Design Space Analysis for Modeling Incentives in Distributed Systems by Rameez Rahman, Tamas Vinko, David Hales, Johan Pouwelse, and Henk Sips Delft University of Technology 1 Incentives in Distributed
More informationProblems of Network Coding in P2P - and how to overcome it. Christian Schindelhauer. joint work with Christian Ortolf & Arne Vater
Problems of Network Coding in P2P - and how to overcome it Christian Schindelhauer joint work with Christian Ortolf & Arne Vater presented in SPAA 09 & 10 Albert-Ludwig University Freiburg Department of
More informationA Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network. * M. Padmavathi, ** R. M. Suresh
A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network * M. Padmavathi, ** R. M. Suresh * Assistant Professor, Department of Information Technology, RMD Engineering College, PO box
More informationApplication-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks
COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example
More informationThe Scalability of Swarming Peer-to-Peer Content Delivery
The Scalability of Swarming Peer-to-Peer Content Delivery Daniel Zappala Brigham Young University zappala@cs.byu.edu with Daniel Stutzbach Reza Rejaie University of Oregon Page 1 Motivation Small web sites
More informationBitTorrent. Internet Technologies and Applications
BitTorrent Internet Technologies and Applications Aims and Contents Aims Show benefits of P2P for file downloads Explain concepts of BitTorrent as a P2P file sharing application Show how BitTorrent protocol
More informationCS5412: TORRENTS AND TIT-FOR-TAT
1 CS5412: TORRENTS AND TIT-FOR-TAT Lecture VII Ken Birman BitTorrent 2 Widely used download technology Implementations specialized for setting Some focus on P2P downloads, e.g. patches Others focus on
More informationNew Technique to Improve BitTorrent Performance Based on Application Layer Traffic Optimization
International Journal of Computing and Network Technology ISSN 2210-1519 Int. J. Com. Net. Teach. 3, No. 1 (Jan. 2015) New Technique to Improve BitTorrent Performance Based on Application Layer Traffic
More informationarxiv:cs.ni/ v1 21 Nov 2006
Clustering and Sharing Incentives in BitTorrent Systems Arnaud Legout Nikitas Liogkas Eddie Kohler Lixia Zhang I.N.R.I.A. University of California, Los Angeles Sophia Antipolis, France Los Angeles, CA,
More informationTraffic Patterns in Peer-to-Peer-Networking. Christian Schindelhauer. joint work with Amir Alsbih Thomas Janson
Traffic Patterns in Peer-to-Peer-Networking Christian Schindelhauer joint work with Amir Alsbih Thomas Janson to be presented at ITA Albert-Ludwig University Freiburg Department of Computer Science Computer
More informationImpact of Inner Parameters and Overlay Structure on the Performance of BitTorrent
Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Guillaume Urvoy-Keller Institut Eurecom, France Email: urvoy@eurecom.fr Pietro Michiardi Institut Eurecom, France Email:
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new
More informationIntroduction to Distributed Computing Systems
Introduction to Distributed Computing Systems Alexandru Iosup Parallel and Distributed Systems Group Delft University of Technology Some material kindly provided by the PDS group. 1 What is a Distributed
More informationPerformance Analysis of Peer-to-Peer Networks for File Distribution
Performance Analysis of Peer-to-Peer Networks for File Distribution Ernst W. Biersack, Pablo Rodriguez, and Pascal Felber Institut EURECOM, France {erbi,felber}@eurecom.fr Microsoft Research, UK pablo@microsoft.com
More informationModeling, Analysis and Improvement for BitTorrent-Like File Sharing Networks
Modeling, Analysis and Improvement for BitTorrent-Like File Sharing etworks Ye Tian, Di Wu, and Kam Wing g Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin,.T.,
More informationImproving Peer-to-Peer File Distribution: Winner Doesn t Have to Take All
Improving Peer-to-Peer File Distribution: Winner Doesn t Have to Take All ABSTRACT Ben Leong, Youming Wang, Su Wen, Cristina Carbunaru, Yong Meng Teo National University of Singapore 13 Computing Drive
More informationStochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems
Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems Fan Bin Dah-Ming Chiu John C.S. Lui Abstract In this paper, we present the mathematical analysis of two important
More informationLive P2P Streaming with Scalable Video Coding and Network Coding
School of Computing Science Simon Fraser University, Canada Live P2P Streaming with Scalable Video Coding and Network Coding Mohamed dhefeeda (Joint work with Shabnam Mirshokraie) 22 February 2010 Mohamed
More informationUnderstanding BitTorrent: An Experimental Perspective
Understanding BitTorrent: An Experimental Perspective Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi To cite this version: Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi. Understanding
More informationOn Feasibility of P2P Traffic Control through Network Performance Manipulation
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE On Feasibility of P2P Traffic Control through Network Performance Manipulation HyunYong Lee Masahiro Yoshida
More informationDoctoral Written Exam in Networking, Fall 2008
Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December
More informationDISTRIBUTED SYSTEMS CSCI 4963/ /4/2015
1 DISTRIBUTED SYSTEMS CSCI 4963/6963 12/4/2015 2 Info Quiz 7 on Tuesday. Project 2 submission URL is posted on the web site Submit your source code and project report (PDF!!!) in a single zip file. If
More informationImproving Performance of BitTorrent Network through Incentive Mechanism
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Summer 2011 Improving Performance of BitTorrent Network through Incentive Mechanism Mingzhe Li San Jose
More informationT-Chain: A General Incentive Scheme for Cooperative Computing
: A General Incentive Scheme for Cooperative Computing Kyuyong Shin, Carlee Joe-Wong, Sangtae Ha, Yung Yi, Injong Rhee, Douglas Reeves Korea Military Academy, Princeton University, University of Colorado
More information416 Distributed Systems. Mar 3, Peer-to-Peer Part 2
416 Distributed Systems Mar 3, Peer-to-Peer Part 2 Scaling Problem Millions of clients server and network meltdown 2 P2P System Leverage the resources of client machines (peers) Traditional: Computation,
More informationIMPLEMENTATION AND EVALUATION OF THE MULTICAST FILE TRANSFER PROTOCOL (MCFTP)
IMPLEMENTATION AND EVALUATION OF THE MULTICAST FILE TRANSFER PROTOCOL (MCFTP) Masterarbeit der Philosophisch-naturwissenschaftlichen Fakultät der Universität Bern vorgelegt von Alican Gecyasar Dezember,
More informationCS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017
CS 43: Computer Networks BitTorrent & Content Distribution Kevin Webb Swarthmore College September 28, 2017 Agenda BitTorrent Cooperative file transfers Briefly: Distributed Hash Tables Finding things
More informationPerformance Improvements of Peer-to-Peer File Sharing
0 Performance Improvements of Peer-to-Peer File Sharing Dongyu Qiu Concordia University Canada 1. Introduction In recent years, Peer-to-Peer (P2P) applications, in which peers serve as both clients and
More informationAdministrivia. CMSC 411 Computer Systems Architecture Lecture 19 Storage Systems, cont. Disks (cont.) Disks - review
Administrivia CMSC 411 Computer Systems Architecture Lecture 19 Storage Systems, cont. Homework #4 due Thursday answers posted soon after Exam #2 on Thursday, April 24 on memory hierarchy (Unit 4) and
More informationA game-theoretic framework for ISPs interactions in the context of Economic Traffic Management
Euro-NF International Workshop on Traffic and Congestion Control for the Future Internet Volos, Greece, April 1 st, 2011 A game-theoretic framework for ISPs interactions in the context of Economic Traffic
More informationPeer Assisted Content Distribution over Router Assisted Overlay Multicast
Peer Assisted Content Distribution over Router Assisted Overlay Multicast George Xylomenos, Konstantinos Katsaros and Vasileios P. Kemerlis Mobile Multimedia Laboratory & Department of Informatics Athens
More informationOn Randomness in ISP-friendly P2P Applications
2012 26th IEEE International Conference on Advanced Information Networking and Applications On Randomness in ISP-friendly P2P Applications S M Saif Shams Simula Research Lab University of Oslo Oslo, Norway
More informationUnderstanding BitTorrent: An Experimental Perspective
Understanding BitTorrent: An Experimental Perspective Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi To cite this version: Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi. Understanding
More informationReti P2P per file distribution: BitTorrent
Reti P2P per file distribution: BitTorrent Corso di Applicazioni Telematiche A.A. 2008-09 Lezione n.22 Prof. Roberto Canonico Università degli Studi di Napoli Federico II Facoltà di Ingegneria P2p file-sharing
More informationBitTorrent for Really Selfish Peers T4T Trading over Cycles
Semester Thesis BitTorrent for Really Selfish Peers T4T Trading over Cycles Roger Odermatt oroger@student.ethz.ch Professor: Dr. Roger Wattenhofer Advisor: Raphael Eidenbenz Department of Information Technology
More informationAdaptive Server Allocation for Peer-assisted VoD
Adaptive Server Allocation for Peer-assisted VoD Konstantin Pussep, Osama Abboud, Florian Gerlach, Ralf Steinmetz, Thorsten Strufe Konstantin Pussep Konstantin.Pussep@KOM.tu-darmstadt.de Tel.+49 6151 165188
More informationMiddleware and Distributed Systems. Peer-to-Peer Systems. Peter Tröger
Middleware and Distributed Systems Peer-to-Peer Systems Peter Tröger Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers) Each
More informationStay or Go? Participation in Under-Provisioned Video Streams
Stay or Go? Participation in Under-Provisioned Video Streams Dave Levin Daniel Malter Neil Spring Bobby Bhattacharjee University of Maryland, Computer Science Department, Robert H. Smith School of Business
More informationCodes, Bloom Filters, and Overlay Networks. Michael Mitzenmacher
Codes, Bloom Filters, and Overlay Networks Michael Mitzenmacher 1 Today... Erasure codes Digital Fountain Bloom Filters Summary Cache, Compressed Bloom Filters Informed Content Delivery Combining the two
More informationCooperation in Open Distributed Systems. Stefan Schmid
Cooperation in Open Distributed Systems Stefan Schmid T-Labs, Berlin, July 2, 2009 Distributed Systems 2008/9 Wireless: Many mobile phones today have WLAN (and even Skype) P2P: Olympic games 2008 live-broadcast
More informationCSC 4900 Computer Networks: P2P and Sockets
CSC 4900 Computer Networks: P2P and Sockets Professor Henry Carter Fall 2017 Recap SMTP is the language that mail servers use to exchange messages. SMTP is push-based... why? You can run SMTP from a telnet
More informationReducing ISP Cost by Caching of P2P Traffic
Reducing ISP Cost by Caching of P2P Traffic Course Project for EE695B Sabyasachi Roy and Zheng Zhang Instructor: Prof. Sanjay Rao Purdue University West Lafayette, IN 47907 {roy0, zhang97}@purdue.edu Abstract
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer
More information