ENHANCED DISTRIBUTED MULTIMEDIA SERVICES USING ADVANCED NETWORK TECHNOLOGIES

Size: px
Start display at page:

Download "ENHANCED DISTRIBUTED MULTIMEDIA SERVICES USING ADVANCED NETWORK TECHNOLOGIES"

Transcription

1 ENHANCED DISTRIBUTED MULTIMEDIA SERVICES USING ADVANCED NETWORK TECHNOLOGIES By SUNGWOOK CHUNG A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2010

2 c 2010 Sungwook Chung 2

3 Dedicated to my family 3

4 ACKNOWLEDGMENTS I would like to thank all people who provided me with their help during my Ph.D years. First of all, I would like to thank my advisor, Dr. Jonathan C.L. Liu for all his support and encouragement. Without his constant inspiration, this dissertation would not have been possible. The discussion with him on any topic has also made me pleasant and relaxed. I am also grateful to my supervisory committee members, Dr. Shigang Chen, Dr. Douglas D. Dankel II, Dr. Paul Fishwick, and Dr. Paul W. Chun for their invaluable suggestions and comments for my research. In addition, I would thank all my Korean friends and families who shared happy memories in Gainesville. Last but not least, I truly appreciate my parents, Sangkab Chung and Malnam Seo, who have been supporting me and have always stood behind me for my whole life, heartfeltly believing in me without any doubt even at a moment. I also appreciate my sister, Kyungae Chung, who has pleasantly helped me out with her warm heart all the time. I would also like to thank all my family members and friends in Korea. 4

5 TABLE OF CONTENTS page ACKNOWLEDGMENTS LIST OF TABLES LIST OF FIGURES LIST OF ALGORITHMS ABSTRACT CHAPTER 1 INTRODUCTION Overview Problem Nature Problem Definitions and Requirements Proposed Schemes Design of Multiple-Loop Architecture An Efficient Storage Scheme A Practically Constructible Multiple-Loop Architecture Technical Background Multimedia-enabled Small Area Network Fiber Channel Arbitration Loop Outline of Dissertation A SCALABLE PVR-BASED CONTENT SHARING ARCHITECTURE Motivation Related Work A Scalable TV Content Sharing Architecture Single Loop Architecture Multiple Loop Architecture Design of a Scalable Loop Topology Linear Topology Ring Topology Complete Topology Edge-Added Topology Multiple-Interfaced Shared Disks Experimental Evaluation Scalability Comparison among Different Topologies Impact of the Number of Interfaces per Disk Summary

6 3 A STORAGE SAVING SCHEME TO SHARE HD-QUALITY CONTENT Motivation Related Work TV Content Distribution Architecture for Community Networks Extending Content Storage Hours Design Issues for Storage Efficiency Impact of Duplicated Storage of Programs Storage Saving Schemes Replacement Schemes Experimental Evaluation Effectiveness of Proposed Schemes in a Single Loop Effectiveness of Proposed Schemes in Multiple Loops Effectiveness of Our Proposed Architecture Impact of PVRs Storage Portion for Time-Shifting Impact of Storage Capacity Summary AN MST-BASED NETWORK ARCHITECTURE FOR SHARING BROADCAST TV PROGRAMS Motivation Related Work TV Content-Sharing Architecture Multiple Loop Architecture Enhanced Multiple-loop Network Architecture Overview Problem Definition and Formulation Problem Statement Minimum Spanning Tree Minimum Spanning Tree-based Graph Performance Evaluations Average Loop Size Total Traffic and Average Reject Ratio Summary CONCLUSIONS AND FUTURE WORK REFERENCES BIOGRAPHICAL SKETCH

7 Table LIST OF TABLES page 2-1 Traffic on each edge in a six loop linear topology Traffic on each edge in a six loop ring topology m values in the complete topology Simulation parameters PVRs Contributable Storage in the PVR-based FC-AL system Symbols for replacement algorithms Simulation parameters The ratio of pvrs and network disks in a community network Simulation parameters

8 Figure LIST OF FIGURES page 1-1 Overview of TV content broadcasting and sharing system Overall TV content distribution architecture Examples of multiple loop architectures Examples of topology with six loops Examples of complete topologies using multiple-interfaced shared disks Total traffic of different topologies according to the number of loops Number of shared disks required by different topologies according to the number of loops Number of attached devices of different topologies according to the number of loops Number of attached devices in the complete topology according to the number of interfaces per disk Average block overhead time according to the number of interfaces per disk Examples of multiple loop architectures Probability of storing each program according to its popularity Effects of PVRs and network disks Effects of P alive and threshold Effectiveness of our proposed architecture Impact of PVRs storage portion for time-shifting Impact of storage capacity Overall TV content distribution architecture How to relay a TV program using shared disks in a triple-loop Examples of CG, MST, and MSG architectures MST formulations MSG formulations Flowchart for load-balanced MSG

9 4-7 Impact on average setup time in a double-loop Average loop size Total traffic and average reject ratio

10 Algorithm LIST OF ALGORITHMS page 3-1 Program placement algorithm (input: new program) Replacement algorithm for PVRs (input: new program) Replacement algorithm for network disks (input: new program)

11 Abstract of Dissertation Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Chair: Jonathan C.L. Liu Major: Computer Engineering ENHANCED DISTRIBUTED MULTIMEDIA SERVICES USING ADVANCED NETWORK TECHNOLOGIES By Sungwook Chung August 2010 A variety of enhanced multimedia services, including multimedia live streaming and high-quality content sharing, have been enabled by the recent advances in network, storage, and compression technologies. Especially, the improvement of the network technologies has allowed the organization of a peer-to-peer (P2P) network where people can easily share their content with others. Integrated with the progress in multimedia technology, the advent of new electronic devices has accelerated to achieve those advanced multimedia services efficiently. In particular, a personal video recorder (PVR), one of those electronic devices, has emerged as an effective peer device in a P2P network, since it can store broadcast TV programs on its own embedded hard disk. In this dissertation, we develop an efficient network architecture such that all users can access high-quality multimedia content easily and the system can support various channels of access to the content. In order to achieve these goals, we adopt two leading technologies in our architecture in addition to a pool of disks as a backup storage; a fiber channel arbitration loop (FC-AL) as a reliable and broadband network connection and PVR as a peer in a P2P network. We have thus demonstrated the feasibility of a PVR-based network architecture by supporting the high-quality content sharing and distribution using the FC-AL. In fact, the promotion of the storage pool and the PVR 11

12 capability on the FC-AL loop has enabled the system to become quite feasible for serving the emerging P2P streaming services. Nevertheless, the suggested PVR-based FC-AL network architecture has a critical limitation in terms of the number of attachable PVRs, since the FC-AL is intrinsically based on a single loop organization and the single loop only allows 127 attachable devices. We therefore develop a novel multiple-loop architecture providing a scalable network organization without using expensive switches. To connect multiple loops in our architecture, we then introduce shared disks that relay TV programs between loops like bridges. When extending into a multiple-loop architecture using the shared disks, it is realized that a topology design for the multiple-loop architecture has a major effect on the imposed total traffic in the whole system. We thus present and compare all possible topologies including linear, ring, edge-added, and complete graph (CG) topology. Finally, the analysis and experimental results reveal that the CG topology among all the possible topologies provides the best scalability. In addition, we recognize that, as the network size grows using the multiple-loop architecture, popular programs tend to be stored redundantly in many PVRs due to users viewing skewness, thereby wasting the storage space that could otherwise be used to store additional TV programs. Thus, we also propose to extend program storage hours in terms of the whole system by presenting efficient storage saving algorithms for both PVRs and a backup storage. Through extensive simulations, we finally show that our proposed schemes significantly extend program storage hours by an average of 69.7%. Lastly, we present a practically constructible architecture solution, named MSG, which maintains both advantages of CG and MST. Thus, the MSG can be expected to be employed in a real constructible network infrastructure by its balance between system performance and cost. 12

13 CHAPTER 1 INTRODUCTION 1.1 Overview The rapid advances in multimedia technologies including network, storage, and compression technologies have led various advanced multimedia services, such as video-on-demand (VOD) and HD-quality content distribution in our society. It is also very common that people can enjoy those multimedia services using various electronic devices, including personal digital assistants (PDAs), mobile phones, or portable multimedia players (PMPs). In addition, with the invention of MPEG (Motion Picture Expert Group) standards such as MPEG-2/4/7/21 [75, 80, 81], people can easily use and utilize consumer electronic devices to receive and store high-quality TV programs or video titles. Typical examples of the electronic devices are video cassette recorders (VCRs), DVD player/recorder and digital video recorders (DVRs) with a hard disk such as TiVo. At the same time, the advances in networking technologies have enabled people to experience various channels for enjoying live streaming services, such as broadcasting TV programs, and to share their content much more efficiently in a way that a user can access other users content, and vice versa. In particular, the progress of the network technologies have accelerated to distribute high-quality multimedia contents and to share their contents as a peer-to-peer (P2P) network. Fundamentally, the distributed multimedia services try to deliver live multimedia contents, i.e., streaming video/audio, via networks in real time. Thus, the rapid advances in computing technology, compression technology, large bandwidth storage devices, and high speed network technology have made it feasible to provide realtime multimedia services over the networks. In order to achieve this goal, various issues have to be considered so that an end user can easily enjoy the live multimedia services. Hence, the main distributed multimedia research issues are as follows: multimedia content 13

14 compression, application-layer quality of service (QoS), continuous data distribution medium, and streaming servers. Multimedia Content Compression: The size of multimedia data is quite substantial compared to regular Web-based data. Thus, in order to support a realtime playback at the user side, it is essential to compress the raw multimedia data. The well-known compression methods include MPEG-1/MPEG-2/MPEG-4, H.120, and H.262/H.263/H.264 [24, 58, 66]. Application-layer Quality of Service (QoS): It is crucial that the quality of realtime-delivered multimedia data can satisfy an end user s expected service quality. In order to meet the requirements, various application-layer QoS control techniques on the top of possible IP protocols have been presented in [20, 69, 77, 82]. Continuous Data Distribution Medium: In order to deliver multimedia data in realtime effectively, it is essential to serve an appropriate network support since the network support can reduce transmission delay and data loss ratio. Especially, it is desirable to provide large and reliable network bandwidth for the multimedia data transfer [2, 27, 32]. Streaming Servers: To offer quality streaming services, streaming servers are required to process multimedia data under timing constraints. That is, a next data block needs to be transmitted completely before the previously delivered data block is processed by a given playback rate. In addition, the streaming servers can support a large capacity of storage in order to hold various multimedia data since the size of multimedia data is intrinsically considerable [23, 26, 29, 40, 72]. We consider these fundamental facts to develop an effective TV content sharing and distribution network architecture. Thus, in order to handle the broadcast TV programs, our system supports the MPEG-2 compression in addition to the reliable and broadband network technology by which our network architecture can deliver HD-quality TV programs. Furthermore, our network architecture maintains minimized server-functional system components for a target program routing and a backup storage. That is, in order to support an appropriate QoS control, our system provides the necessary information to find and retrieve a requested program. Also, a distributed/networked system storagecan offer the backup storage function in our system. Thus, our system can provide the mentioned four key functions so that it can serve effectively as a distributed multimedia system. 14

15 A Various TV content distributions... Small Area Networks B P2P network in a single building C Small area P2P network Figure 1-1. Overview of TV content broadcasting and sharing system Specifically, Fig. 1-1A illustrates possible TV content distributions using the advanced network architecture demonstrated in Fig. 1-1B, where users can easily obtain various TV programs and they can share their content with others using home content-storing devices. Particularly, people enjoy the TV programs as they are broadcast or from the TV-content providing server via a global network, i.e., the Internet. In addition, small area networks in the community can be formed as P2P 15

16 networks as shown in Fig. 1-1C. The P2P network provider can serve several ways for content-providing with the pool of storage devices for large capacities and reliable backup storages while all users within the P2P networks can do content-sharing between the peers. How to build these P2P networks with effective schemes is the major theme of this study. It is indeed an important topic since there have been several research efforts [31, 59] that have tried to facilitate all of those state-of-art technologies together, such as advanced network technologies and electric appliances, for enhanced multimedia services. However, these systems do not necessarily guarantee the overall system performance and efficiency since they are based on Internet infrastructure. Via a pilot study [38] based on the Fiber Channel Arbitration Loop (FC-AL), we have demonstrated the feasibility of a PVR-based network architecture by supporting high-quality content sharing and distribution, where PVRs can work as peers via the FC-AL loop. The FC-AL is one of leading network technologies, offering such advantages as large bandwidth (e.g., up to 1Gbps), long distance coverage (e.g., 10km), and a fairness arbitration algorithm, which is a typical structure to organize storage area networks (SANs) [56, 70, 73, 74]. One unique design consideration that we have built into the system is the promotion of Digital Video Recorder(DVR) to the concept of Personal Video Recorder(PVR). Traditionally, VCR users would record the broadcast programs on video home system (VHS) tapes. Similarly, today s users can simply store the digital video, including broadcast movies and TV programs, on the embedded hard disk in the DVRs. Just like VHS tapes with recorded video content can be shared with friends, the user-stored digital video on the hard disks can also be shared among friends. Instead of physically sending the tapes or DVDs, digital video content can be shared simply by on-the-fly transmission. At this moment, DVRs on the market have only limited transmission capability (mainly for downloading the program details). It is expected that eventually 16

17 the DVR will be equipped with high-speed networking interfaces. Therefore, DVRs have evolved into Personal Video Recorders (PVRs) for the next-generation DVRs, which will be used in the rest of this dissertation as the P2P electronic devices for content-sharing. Consequently, with the enabled transmission capability, a true P2P system can be achieved among PVR users with their stored contents. Due to the promotion of the storage disk pool and the PVR capability on FC-AL loops, the system becomes quite flexible on supporting the emerging P2P streaming services. Usually, a multimedia streaming service can be classified in one of the following: pure streaming, implicit duplication, and explicit duplication. In pure streaming, a video file is played in real time without storing onto a local hard disk. The implicit duplication specifies that a certain portion of the video is buffered, in order to support an effective media playing without enduring a delay or a jitter. Lastly, in the explicit duplication, the entire video file should be downloaded for playing the file. Our system can support the implicit and explicit duplication as ways of P2P content-sharing, since our architecture has the capability that stores a program using the embedded local disk in PVRs and transmits a received content in realtime with the high-speed network, i.e., FC-AL. In other words, a program can be shared in a way that a PVR is receiving and transmitting it to the other PVRs at the same time. In fact, with all advanced functions combined, PVRs have the potentials to emerge as one of the advanced multimedia electric appliances that support various advanced services, such as VCR-like operations, electronic program guides (EPGs), and time-shifting TV programs. In particular, we are interested in an intensive investigation on the degree of time-shift. Fundamentally, PVRs are able to store realtime broadcast TV programs on their own embedded hard disks. Thus, the advent of PVRs has led to the change of people s TV viewing patterns [52] because people can become independent of the specific TV broadcasting time with the PVR s time-shifting functionality. Significantly, the PVRs have 17

18 enabled the stored TV programs to be shared among the PVR users like a P2P network as shown in Fig Problem Nature Problem Definitions and Requirements Fundamentally, it is very essential to support a broadband network bandwidth in order to serve high-quality multimedia services. In addition, it is also important to satisfy realtime constraints for such multimedia services. Moreover, to build up a multimedia-service-enabled network architecture, we should adopt an appropriate broadband network as a network connection. In addition, each user can have a multimedia-compatible appliance to enjoy and share the multimedia contents effectively. Furthermore, several system components as well as PVRs are also necessary in order to coordinate each system component and to support various access channels for multimedia contents, such as backup storages. Since each PVR is under an individual user s control, we also need to develop a scheme to utilize the whole system effectively, regardless of each user s discretion. Last but not least, a network architecture has to be scalable without a limitation on the number of accommodable users, so that the network architecture can be applicable for various purposes, while still supporting its originated advantages Proposed Schemes In order to provide high-quality multimedia services within a small area like a single building, the feasibility of an FC-AL-based architecture for sharing high-quality TV programs between PVRs has been investigated. The suggested architecture consists of PVR users, a group of network disks, the content management server and FC-AL connection to share and distribute high-quality programs reliably and efficiently. As a matter of fact, that architecture has been shown to perform effectively with extensive simulations [38]. 18

19 Design of Multiple-Loop Architecture Although its feasibility and effectiveness has been thoroughly examined and explored successfully, it has a critical limitation in terms of scalability, i.e., the number of accommodable PVR users, despite its advantages such as various multimedia services at a low cost, since the suggested architecture is merely based on a single-loop FC-AL structure, Specifically, the FC-AL standard allows only 7-bit address space [34], which means that all attachable PVRs are limited at most to 127 PVRs. Hence, this indicates that the single-loop architecture is not suitable where many users have to be accommodated by the network architecture, such as a densely populated building or a regional network area like a community or a campus. In this dissertation, we first develop a scalable PVR-based network architecture based on the FC-AL-based network with multiple loops. There can be several considerations to determine a better design. Fundamentally, a topology design affects the configuration of a multiple-loop architecture and the organized multiple-loop architecture has its own characteristics according to the selected topology design. For example, if a multiple-loop architecture is configured by a linear topology, the middle loops and shared disks have to be involved more than both end loops but have the least connectivity between loops. On the other hand, a ring topology imposes less traffic load in the middle loops and shared disks but requires more connectivity compared to the linear topology. Noticeably, the topology design for a multiple-loop architecture has an effect on the traffic load and the connectivity, which is closely related to the number of necessary shared disks. An additional observation is that the obtainable scalability, i.e., the number of attachable devices including PVRs, network disks, and shared disks, is affected by the number of required shared disks. That is, if a multiple-loop architecture needs more shared disks, the multiple-loop architecture provides less scalability at the cost of deployed shared disks with respect to the given number of loops. In other words, if a 19

20 network architecture wants to accommodate more PVR users with the given number of loops, it is more desirable that the architecture topology can support more scalability. Therefore, we analyze and compare possible multiple-loop topologies: a linear topology, a ring topology, an edge-added topology, and a complete topology. With the goal of finding the topology to provide the most scalability, we determine which topology design is the most suitable for the multiple-loop network architecture, enabling many more PVRs to share and distribute high-quality contents between them with up to 10km coverage. We then introduce a shared disk to connect different loops and relay a requested program from one to the other, which is a key system component with multiple interfaces in order to organize a multiple-loop architecture, working as a bridge. We propose the multiple-loop architecture using the shared disks by comparing possible topology designs via thorough analyses and extensive simulations. Finally, we determine which topology design is the most desirable in terms of scalability, supporting high-quality content sharing and distribution effectively at a low cost An Efficient Storage Scheme Once the multiple-loop architecture is deployed as a network infrastructure, PVR users can share other PVRs contents without a limitation on the number of PVR users in the network. Ideally, the operations of each PVR should be under its own control by its user in the proposed multiple-loop architecture. Users can therefore arbitrarily store or remove any programs on their PVRs independently of how other PVRs are storing or deleting the same program. As the network architecture is extended with added loops, i.e., as more PVRs are added, however, the storage of popular programs tends to be duplicated in many PVRs, thereby wasting the storage space that could otherwise be used to store additional TV programs. This implies that we should extend program storage hours by reducing duplicated storage of programs among PVRs local storage and network disks in the system. 20

21 In order to devise an efficient storage scheme, we need to take advantage of PVRs access pattern to popular programs, i.e., which program is more of less likely to be accessed by PVRs. In addition, PVRs pattern for dynamic liveness also has to be defined because a PVR s on/off is at its user s discretion, so that the PVR can work as a peer in the network. Furthermore, we need to devise schemes regarding how to direct incoming programs to either a PVR or a network disk and which program should be replaced to reduce the redundancy for both PVRs and network disks. Essentially, the criteria to apply all the placements and the replacements have to be determined for the efficient use of the whole system storage including PVRs and network disks. With our proposed schemes, we demonstrate that our architecture can extend program storage hours significantly by our simulation results. In fact, we have found the program storage redundancy tends to rapidly increase when more loops and more PVRs are attached. Therefore, a good scheme should utilize the whole system storage efficiently while reducing to store popular programs from the whole system point of views. In this study, we demonstrate that an efficient storage-saving scheme can be designed to store fewer duplicated programs in the whole system. Via our thorough simulation, the experimental results reveal that our storage-saving scheme can utilize the system storage capacities efficiently, while extending the program storage hours by the average of 67.7% A Practically Constructible Multiple-Loop Architecture We have firstly selected the complete graph topology as our multiple-loop architecture design, mainly considering scalability to accommodate more users in a given number of loops. Thus, we introduce the concept of total traffic which directly affects the scalability. Nevertheless, it has a critical limitation on the suggested topology design in terms of a practical constructibility. That is, although the complete graph shows the best scalability due to the least total traffic by 1-hop reachability to every loop, it seems impractical, especially when many more loops are deployed or the distance 21

22 between 2 loops is very huge. In addition, it is inevitable that the size of modified loop should become larger in order to link a shared disk when it is placed between any 2 loops. In other words, the insertion of shared disk increases the modified loop size which results in the worse system performance and cost. Nevertheless, the suggested topology requires too many shared disks, just for the topology connectivity. Specifically, if there are n loops in the architecture, the system demands at least n C 2 shared disks just for the system organization, thereby making it less likely to be able to construct a real network architecture. Therefore, we present a practically constructible multiple-loop topology which considers both the system performance and cost. We firstly describe the minimum spanning tree (MST) topology for the system cost. However, it shows unacceptable system performance since it is a tree-based topology where the traffic load is consecrated on the selected fixed-path every time. Consequently, we add graph characteristics to the MST topology so that the load distribution can be achieved for satisfactory system performance. We finally describe how to configure our proposed topology, what characteristics it has, and how effectively to expose its superiority in terms of both performance and cost. 1.3 Technical Background Multimedia-enabled Small Area Network It is not an easy task to deliver high-quality multimedia content from a content server to an end user via the Internet, especially when the geographical location between them is very far. In fact, the Internet is fundamentally designed for a best-effort service to transfer data with unreliable and limited network bandwidth, which is not quite suitable for the multimedia services. Hence, in order to support the conventional server/client network architecture to transmit multimedia data on the global network such as the Internet, multimedia-enabled small area networks have been studied in [40, 62, 71, 76]. 22

23 In fact, once a small area network can support a multimedia service to its users, there are several performance advantages including various content providing channels and a decrease of network load since the small area network can work as a proxy server [47, 57, 84]. However, the proxy server functions mainly discuss how to reduce the number of outside requests and how to absorb the request in its network by cache/prefetch schemes. Our proposed system further adds P2P functions within the network architecture in addition to the basic functions of a small area network. That is, the residents in the network cannot only serve their contents to their neighbors as content providers but they can also retrieve their target programs from others, thereby providing more system load distribution and reliable content sharing Fiber Channel Arbitration Loop Fiber Channel provides an interface to a pair of cables that can connect a computer to all other computers and shared peripherals it might need to reach, at data rates up to 1 Gbps. It has an extremely flexible interconnection topology, with definitions for point-to-point, switched, and loop connection topologies. The architecture defines mappings of Fiber Channel data transport to Upper Level Protocols (ULPs), such as the Internet Protocol (IP), the Small Computer Systems Architecture Standard (e.g., SCSI) for high-speed disk attachment, and so on. With the Fiber Channel, it is possible to have an IP connection, disk and storage peripheral access, and a link to an ATM switch, all operating over a single network card with a pair of attached cables, each of which is transmitting data at more than 1 Gbps [7, 15, 55, 61]. One of the FC-AL fabric topologies is the Fiber Channel Arbitration Loop (FC-AL) that is emerging to be employed in the Storage Area Network (SAN) architecture [4, 21, 44, 74]. In the FC-AL topology, the outgoing and incoming fibers to a port are split off to attach to different remote ports, such that the aggregation of fibers forms a unidirectional loop which passes through every port exactly once. The general picture of 23

24 traffic generation on this topology is that a single port arbitrates for usage of the entire loop. Once it obtains loop access, it opens up communications with another port on the loop, and then transmits normal Fiber Channel traffic at the full guaranteed link bandwidth until it is done, when it releases the loop for usage by another port to begin another round of full bandwidth communication. One notable advantage of FC-AL is that it provides fairness to all attached devices. Each device participates in the arbitration in order to access to the Fiber Channel, and thereby no device suffers starvation due to the arbitration protocol. In addition, Fiber Channel can cover up to 10km distance which is highly appropriate to organize a small area network such as a community or a campus. With these advantages, there has been research to organize a multimedia-enabled network architecture using FC-AL [12, 13, 22]. However, these systems are mainly focused on the feasibility and performance attainability, not aiming for a real resident network architecture. We have investigated a further consideration for the actual network infrastructure. In other words, we are focusing how to make it feasible to be scalable so that many more user can be supported, by overcoming the intrinsic FC-AL accommodatable limitation. Thus, we consider an effective system design in terms of topology, and furthermore we develop a practically constructible topology design which makes a balance between system performance and cost. 1.4 Outline of Dissertation The remainder of this dissertation is organized as follows: Chapter 2 describes our proposed FC-AL multiple-loop architectures for small area networks. We analyze various topology types, (e.g., complete, ring, edge-added, and complete topology) to determine the better architecture design in terms of scalability, i.e., the number of attachable devices. With thorough investigation and extensive simulations, we reveal that the complete topology design provides the most scalability, and thereby is most appropriate for the multiple-loop network architectures. 24

25 Chapter 3 proposes storage-saving schemes based on our multiple-loop architectures, which utilize people s viewing patterns, i.e., the popular programs tend to be watched much more, thereby storing same programs redundantly. Therefore, we propose efficient storage-saving schemes which try to store fewer program copies in order to reduce the redundant copies of same programs. Chapter 4 explains a practically constructible architecture solution which tries to find a balance between system performance and cost. In fact, the CG topology can be impractical when the number of loops becomes large. Thus, an minimum spanning tree-based graph topology, called MSG, is devised which is derived from an MST topology but also reflects the CG topology s advantages. The MSG then reveals its superiority by showing a constant average loop size as well as an acceptable total traffic and reject ratio compared to both GC and MST. Chapter 5 concludes this dissertation regarding all the topics and presents our research directions for future work. 25

26 CHAPTER 2 A SCALABLE PVR-BASED CONTENT SHARING ARCHITECTURE 2.1 Motivation In this chapter, we focus on developing a novel multiple-loop architecture capable of supporting a scalable community network, as one of small area networks, in an economical way without using fiber channel switches. In addition, a personal video recorder (PVR) is an electronic home appliance that can record broadcast TV programs onto its embedded hard disk in a digital format [52]. Unlike the conventional video cassette recorder (VCR), it uses a hard disk as a storage medium rather than a tape. However, it still supports advanced features including electronic program guide (EPG) and time-shifting (e.g. to pause live TV), in addition to conventional VCR-like operations, such as fast forward, rewind, pause, and play. Remarkably, the PVR s time-shifting functionality has a major effect on people s TV watching patterns. That is, the time-shifting feature allows people to become independent of a TV broadcasting time. Moreover, they can even pause a live TV program or skip some parts of a live TV show due to the time-shifting functionality. Furthermore, a PVR has the capability to be connected by a broadband network, thereby serving as a network component to share stored TV programs with other PVRs. This feasibility of a PVR-based P2P network has been investigated and tested in the Share-it project [49] and the ShareTV by NDS [35]. Therefore, we adopt this PVR as a multimedia device in each home, so that each user can not only enjoy various multimedia services but our system can also be organized for a P2P network using each user s PVR. That is, our system assumes that each user has a PVR so that he can store his TV watching TV contents that can be retrieved by other users in the proposed network architecture which serves as a P2P network. 26

27 In our proposed architecture, each loop thus connects all PVRs to the loop as a high-speed interconnecting network. Then, PVRs equipped with network devices can share TV programs stored on their hard disks with others as a peer as in a P2P network, especially within the community network. To connect multiple loops in our architecture, we introduce shared disks that are responsible for relaying TV programs between loops like bridges. With shared disks, multiple loops can be configured by various types of topologies in order to construct a community network. To see which topology can provide the best scalability in terms of the total number of devices that can be attached to all loops, we analyze four possible types of topologies: linear, ring, edge-added, and complete topology where a node and an edge represent a loop and a shared disk, respectively. The four topologies are classified according to how many adjacent edges each node has. As the number of the shared disks increases, the total number of devices attached to all loops decreases because they are attached to more than one loop at the same time. Thus, we need to reduce the total number of shared disks to provide better scalability. We have observed that the system s total loaded traffic affects the required number of shared disks. In addition, the total traffic depends on the system s topology design, i.e., which topology is employed for the whole system s configuration design. Ultimately, the system s topology design determines the necessary number of shared disks to organize an effective multiple-loop architecture. This is because each topology generates a different number of hops to reach a destination loop from a source loop. In order to see how each topology affects the total traffic, we analyze four different topologies. The analysis reveals that the complete topology has the least total traffic among four topologies. The reason for this is that any loop can always reach another loop within a minimum number of hops, i.e., one hop. We also examine the impact of the number of interfaces per shared disk on the system scalability. 27

28 The simulation results show that the complete topology has the best scalability among four possible topologies in terms of the number of devices attached to the system. It is also shown that the system scalability is not significantly affected by the number of interfaces per shared disk. It can be therefore seen that our proposed architecture can adaptively increase the community network simply by adding loops without using expensive fiber channel switches even though community size continues to grow. The remainder of this chapter is organized as follows: Section 2.2 describes related work. Section 2.3 proposes a scalable TV content-sharing architecture including shared disks and directory servers. Section 2.4 analyzes the impact of topology types of a community network and the number of interfaces per disk on the system scalability. Section 2.5 presents extensive simulation results. Finally, Section 2.6 offers summarizations. 2.2 Related Work The design issues pertinent to organizing a community network have been analyzed in [6, 68], but they have focused on how to organize a community network rather than how to construct a scalable architecture for a community network including various types of topologies. In addition, PVRs impact on TV viewing patterns has been described in [45] and various functionalities of PVRs have been studied in [43, 83]. However, they concentrated on PVR-specific applications such as time-shifting and video-rate adaptation. In the meantime, the fiber channel has been proposed as one of the standards to organize the storage area network [34]. Thus, its feasibility and capability have been studied as a high-speed network in [18]. Additionally, the FC-AL-based storage systems have been studied for multimedia server architectures in [13, 22]. Moreover, the 28

29 multimedia content sharing architecture with PVRs has been introduced in [10, 49], but they do not address the scalability issue of the system. When organizing network topologies, design issues have been introduced in [11, 33, 48]. However, they studied autonomous systems or clusters as target systems. A The structure of an FC-AL single loop B A community network for a large number of devices Figure 2-1. Overall TV content distribution architecture 29

30 2.3 A Scalable TV Content Sharing Architecture In this section, we describe a scalable TV content sharing architecture for a community network. We first explain the FC-AL single loop architecture and then propose a scalable multiple loop architecture using shared disks for sharing HD-quality TV contents among PVRs Single Loop Architecture Fig. 2-1A illustrates a structure of an FC-AL single loop that can be constructed in a small area. In order to provide high-quality content sharing in real time among PVRs, it is essential to adopt a high speed network as an interconnecting infrastructure. The fiber channel (FC) has emerged as a leading technology due to its several advantages. First of all, FC can provide high bandwidth, i.e., currently 800Mbps, and large coverage, i.e. 10km, which are very suitable to organize a community network where a large number of PVRs are involved. In addition, the FC-AL employs a fairness arbitration algorithm that can guarantee there is no starvation among all attached devices. Therefore, we employ FC-AL technology to connect all system components within a community network [38]. Once PVRs become equipped with network devices, they can share contents stored on their hard disks with others. In other words, each PVR can work as a peer as in a P2P network, especially within a community network. The community members can share the high-quality TV contents via the PVRs that are connected to the FC-AL. PVRs record live TV programs that users want. They also continue to record broadcast TV programs which users have watched for a given duration so that users can time-shift the programs. As mentioned above, however, the single loop can accommodate only 127 devices because the FC-AL standard allows a 7-bit address space [34]. In other words, it is not suitable as a community network if the community has more than 127 consumer devices. Therefore, it is essential to extend the community network in an economical 30

31 way without using fiber channel switches that are very expensive and likely to become more load-concentrated. A Two and Three loop configuration B Four and Five loop configuration Figure 2-2. Examples of multiple loop architectures Multiple Loop Architecture We develop a scalable multiple loop architecture that is able to accommodate a large number of devices in a community network as shown in Fig. 2-1B. To extend the single loop architecture to the multiple loop architecture, we employ two additional system components: one is a shared disk and the other is a directory server. Shared disk (SDisk) 31

32 In the multiple loop architecture, we need a bridging mechanism between loops. The shared disks are used to connect two distinct loops and relay the requested program from one loop to the other. Since the FC standard allows multiple interface devices for such reasons as durability, we can implement the shared disks without modifying FC protocols [34]. Since disks attached to the FC-AL are at least dual-interfaced, we can connect each interface to one of multiple loops. Directory server (DS) The directory server coordinates the content sharing between PVRs within a loop and among loops. Located in every loop, it keeps collecting and exchanging the information on which PVRs are storing which programs. Based on this information, it can perform the scheduling of requests for content sharing. Fig. 2-2 illustrates our proposed multiple loop architecture with two, three, four, and five loop configurations. Note that each loop represents a single loop architecture shown in 2-1A. It can be seen that the shared disks work as bridges between loops. In order to effectively extend the architecture with a given number of loops, it is important to determine how many shared disks should be employed between loops. The more disks are designated as shared disks, the worse scalability we may achieve. Moreover, it can be a performance bottleneck when they are overloaded due to improper design. 2.4 Design of a Scalable Loop Topology In this section, we present how to obtain better scalability for the multiple loop architecture with a given number of loops. As mentioned above, the FC-AL single loop can attach at maximum 127 devices. In the meantime, the shared disks worsen the scalability because they are attached to more than one loop at the same time. Thus, we can obtain the total number of devices that can be attached to a multiple loop architecture using shared disks as follows: 127 (number of loops) (total number of shared disks) (2 1) 32

33 A Linear and Ring topology B Edge-added and Complete topology Figure 2-3. Examples of topology with six loops From Eq. 2 1, it is clear that we should reduce the total number of shared disks to provide better scalability. As mentioned above, we have observed that the total traffic loaded on all shared disks depends on the type of topology constructing a multiple loop architecture. This is because the required number of hops to transfer data between a specific pair of loops differs according to each topology. In order to see how each topology affects the total traffic loaded on all shared disks, we illustrate four different topology configurations with six loops as shown in Fig Since the configurations with a larger number of loops are much harder to illustrate in figures, we use the six-loop configurations for detailed analysis of each topology in this section. 33

34 Fig. 2-3A and 2-3B show a linear, ring, edge-added, and complete topology, respectively. A node and an edge represent a single loop and a shared disk, respectively. We compare these topologies in terms of the total traffic with a given number of loops. We use dual-interfaced shared disks for the convenience of comparison. We then examine the impact of the number of interfaces per shared disk on the system scalability Linear Topology The simplest way to configure a multiple-loop architecture with a given number of loops is to use a linear topology as shown in Fig. 2-3A. In the linear topology, it can be seen that the number of edges is less by one than the number of nodes. In our multiple-loop architecture, when a PVR requests a program, the system first tries to find the requested program within the local loop where the requesting PVR is located. If the program is not found in the local loop, i.e., the program is stored only in other loops, the requesting PVR must receive the program from one of other loops via all shared disks located between the two loops. The routing is determined based on the total number of hops between a source and a destination loop, i.e., the shortest path is chosen among possible paths. It is assumed that the programs are stored evenly among PVRs and the popularity of programs is uniform so that the amount of data traffic between all pairs of loops can be fairly evaluated. In the linear topology, it is obvious that the edges closely located to a center node handle more traffic because they tend to be more involved in relaying programs between loops. For example, in Fig. 2-3A, the center edge (i.e., edge c) handles the most traffic among all five edges due to the task of relaying programs. The second and fourth edge (i.e., edge b and edge d) handle the second most traffic for the same reason. The first and the fifth edge (i.e., edge a and edge e) have the least traffic. Specifically, when denoting m a relative unit of traffic, the very left node (i.e. node 1) generates traffic as much as (5/5)m, (4/5)m, (3/5)m, (2/5)m, and (1/5)m to edge a, edge b, edge c, edge d, 34

35 Table 2-1. Traffic on each edge in a six loop linear topology Node 1 Node 2 Node 3 Node 4 Node 5 Node 6 Total Traffic EDGE A EDGE B EDGE C EDGE D EDGE E 5 5 m 4 5 m 3 5 m 2 5 m 1 5 m 1 5 m 4 5 m 3 5 m 2 5 m 1 5 m 1 5 m 2 5 m 3 5 m 2 5 m 1 5 m 1 5 m 2 5 m 3 5 m 2 5 m 1 5 m 1 5 m 2 5 m 3 5 m 4 5 m 1 5 m 1 5 m 2 5 m 3 5 m 4 5 m 5 5 m 2m 16 5 m 18 5 m 16 5 m 2m where m is a relative unit of traffic. and edge e, respectively. Similarly, node 2 generates traffic as much as (1/5)m, (4/5)m, (3/5)m, (2/5)m, and (1/5)m to edge a, edge b, edge c, edge d, and edge e, respectively. Table 2-1 shows the total traffic on each edge in the linear topology with six loops. The total traffic on edge a, edge b, edge c, edge d, and edge e are 2m, (16/5)m, (18/5)m, (16/5)m, and 2m, respectively. The total traffic on all edges is computed as 14m simply by summing the traffic on five edges. In general, we can derive the total traffic in the linear topology according to the number of loops as follows: (n 1) 4 (n 1) 2 (k 2 n k) m, n : odd & n 5 n 1 k=2 2 (k 2 n n k) + 2 m, n : even & n 6 2 (n 1) n 2 k=2 (2 2) where n is the number of loops and m is a relative unit of traffic. 35

36 2.4.2 Ring Topology Since the ring topology has a circular connection among loops as shown in Fig. 2-3A, all the nodes have two edges and we cannot designate any edge as a center edge. A node can reach any other node within as many hops as half the total nodes. Table 2-2. Traffic on each edge in a six loop ring topology EDGE A EDGE B EDGE C EDGE D EDGE E EDGE F Node m 2 5 m 1 5 m m 2 5 m Node m 3 5 m 2 5 m 1 5 m m Node m 2 5 m 3 5 m 2 5 m 1 5 m 0 Node m 2 5 m 3 5 m 2 5 m 1 5 m Node m m 2 5 m 3 5 m 2 5 m Node m 1 5 m m 2 5 m 3 5 m Total Traffic 9 5 m 9 5 m 9 5 m 9 5 m 9 5 m 9 5 m In order to find out how much traffic is generated in the ring topology, we first obtain the traffic of each edge. In Fig. 2-3B, node 1 generates traffic as much as (3/5)m, (2/5)m, (1/5)m, (1/5)m, and 2/5)m to edge a, edge b, edge c, edge e, and edge f, respectively. Note that when there is a tie in determining the routing path in terms of the number of hops, we choose the loop in the clockwise direction. Thus, edge d does not have any traffic generated by node 1 due to this tie-breaking policy based on the shortest path routing. Similarly, we can calculate the traffic on other edges as shown in 36

37 Table 2-2. We can thus generally formulate the traffic of each node as follows: 2 (n 1) 2 (n 1) n 1 2 k=1 n 2 2 k=1 k = n + 1 m, 4 n/2 k + m = 2 (n 1) [ n 2 ] 4(n 1) n : odd m, n : even (2 3) With Eq. 2 3, we can obtain the total traffic in the ring topology simply by multiplying the traffic of each edge by the number of edges as follows: [ ] [ ] (n + 1) n(n + 1) n m = m, n : odd [ 4 4 n 2 ] [ 4(n 1) n n m = 3 ] m, n : even 4(n 1) (2 4) Complete Topology The complete topology represents a simple graph where every pair of distinct nodes is connected via a distinct edge. Thus, every node can have all other nodes as adjacent nodes. In other words, a node can reach any other node with only one hop. In the complete topology, there are thus n C 2 = n(n-1)/2 edges in total because all nodes are paired. Each node has (n 1) adjacent edges because each node has all other nodes as neighbors. First, we derive the traffic of each edge. In Fig. 2-3B, each node generates (1/5)m traffic to all other adjacent edges. Since each edge receives the same traffic from two connected nodes, the traffic of each edge is (2/5)m. follows: Thus, we can generally derive the traffic of each edge in the complete topology as [ ] 2 m (2 5) (n 1) Since the total number of edges in the complete topology is n(n 1)/2, we compute the total traffic for all edges by multiplying the traffic of each edge by the total number of 37

38 edges as follows: [{ } ] 2 n(n 1) m (n 1) 2 = n m (2 6) The total traffic of the complete topology with six loops in Fig. 2-3B is 6m. Compared to the total traffic of the linear and ring topology with six loops in Fig. 2-3A, amounting to 14m and 10.8m, respectively, it can be seen that the complete topology has the least traffic Edge-Added Topology We have analyzed the total traffic of the linear, ring, and complete topology. Note that each node has two and (n 1) adjacent edges in the ring and complete topology, respectively. However, it is also necessary to examine other topologies where each node has 3 to (n 2) adjacent edges to compare all possible topologies. In this chapter, the ring-based topologies where each node has 3 to (n 2) adjacent edges are edge-added topologies as shown in Fig. 2-3B. However, it is hard to derive general formulae for the total traffic in the edge-added topologies due to their irregularities. Thus, we have performed extensive simulations to investigate the total traffic of all the topologies where each node has 2 to (n 1) adjacent edges including ring and complete topology. The simulation results will be presented in Section Multiple-Interfaced Shared Disks In the previous section, we analyzed the linear, ring, edge-added, and complete topology that are based on dual-interfaced shared disks. In the complete topology, at least n C 2 shared disks are required to connect all pairs of loops. Thus, as the number of loops increases, the required minimum number of shared disks increases more rapidly, proportional to n(n 1)/2. In this section, we investigate whether multiple-interfaced shared disks can provide better scalability than dual-interfaced shared disks can. In other words, we examine whether or not the smaller number of multiple-interfaced shared disks can maintain the same connectivity as the larger number of dual-interfaced 38

39 shared disks can. As mentioned above, this is feasible since the fiber channel standard allows multiple fiber channel-interfaced hard disks. Table 2-3. m values in the complete topology NUMBER OF INTERFACES PER SHARED DISK loops 3 1 N/A N/A N/A N/A N/A N/A N/A 4 loops N/A N/A N/A N/A N/A N/A 5 loops N/A N/A N/A N/A N/A 6 loops N/A N/A N/A N/A 7 loops N/A N/A N/A 8 loops N/A N/A 9 loops N/A 10 loops We first derive the minimum number of multiple-interfaced shared disks in the complete topology where any node can reach any other node with only one hop as follows: (n 1) n M = (k 1) k (2 7) where n, k, and M represent the number of loops, the number of interfaces that one shared disk supports, and the minimum required number of shared disks, respectively. The complete topology comprising dual-interfaced shared disks is a special case where k = 2 in Eq Table 2-3 illustrates M values when varying the number of loops and interfaces per disk. Fig. 2-4 shows three examples of complete topologies using multiple-interfaced shared disks. Fig. 2-4A shows the complete topology with four loops and three three-interfaced shared disks. In this topology, shared disk a, b, and c connect loop 1/2/4, 1/2/3, and 2/3/4, respectively. Fig. 2-4A shows the complete topology with eight loops and four five-interfaced shared disks. Similarly, four disks connect eight loops 39

40 A n=4,k=3,m=3 and n=8,k=5,m=4 B n=10,k=10,m=1 Figure 2-4. Examples of complete topologies using multiple-interfaced shared disks using five interfaces so that every pair of loops can be reached with only one hop. Fig. 2-4B shows the complete topology that can be constructed with only one shared disk. This is possible because the shared disk has ten interfaces that are able to connect ten loops at a time. We can thus derive the traffic of each shared disk with k interfaces as follows: [ (k 1) (n 1) k ] m (2 8) 40

41 Then we can also obtain the total traffic of the complete topology with k-interfaced shared disks using Eq. 2 7 and 2 8 as follows: (n 1) [{ } ] (k 1) (n 1) k n m (k 1) k = n m (2 9) It can be seen from Eq. 2 6 and 2 9 that the total traffic of the complete topology with multiple-interfaced shared disks is same as that of dual-interfaced shared disks. This may imply that the total traffic is not affected by which type of shared disk is employed. However, note that we may need more shared disks as the traffic of each edge becomes heavier even though only one shared disk can connect all loops as shown Fig. 2-4B. Since each shared disk has a limitation on handling traffic, we should also take processing capability of each shared disk into account to estimate the real scalability. In the next section, we will show the actual required number of shared disks considering both the processing capability of each shared disk and the traffic loaded on it. Table 2-4. Simulation parameters CATEGORY PARAMETER VALUE FC-AL Disk data transfer rate propagation delay per node delay capacity cache data transfer rate seek time rotational latency 400 MB/s 3.5 ns/meter 240 ns 300 GB 32 MB MB/s 4.7 ms 3.0 ms 41

42 2.5 Experimental Evaluation To validate the effectiveness of our proposed architecture in terms of scalability, we have performed extensive simulations for various types of topologies while varying the number of loops and interfaces per disk. It is assumed that each TV program has HD quality of 19.4 Mbps playback rate and is 60 minutes long. We employ dual-interfaced shared disks between two distinct loops in order to organize a multiple loop architecture unless otherwise indicated. We also vary the number of interfaces per shared disk to show the impact on the overall scalability. The programs are distributed evenly among loops and the probability that each program is requested is uniform so that the amount of data traffic between each pair of loops can be fairly compared. The request rate of program playback follows a Poisson distribution. Each available PVR issues requests for different programs every 60 minutes. It is also assumed that 126 PVRs are connected to each loop and half of them on average are available at a specific time. Note that the routing between two loops is determined by the number of hops and the tie-breaking policy as mentioned above. The details of parameters used for disks and FC-AL are also illustrated in Table 2-4. The simulation results demonstrate that the complete topology provides the best scalability, which supports our analysis presented in the previous section Scalability Comparison among Different Topologies In this section, we evaluate the scalability degree of up to eight topologies (i.e., when the number of nodes is ten) by measuring their total traffic in terms of the number of programs being serviced. Since the minimum number of nodes to form a ring topology is three, we vary the number of nodes up to ten, starting from three. Since the number of edges per node of a ring topology is two, we keep adding one adjacent edge to each node to construct edge-added topologies until it is (n 1), i.e., it becomes a complete topology. Note that, due to the irregularities of edge-added topologies, when adding one edge to each node, it is not possible to strictly keep the numbers of edges 42

43 adjacent to nodes all the same. Thus, we try to distribute additional edges among nodes as evenly as possible so that the average number of edges adjacent to nodes can be maintained consistently depending on the number of added edges. Figure 2-5. Total traffic of different topologies according to the number of loops Fig. 2-5 shows the total traffic according to topology type while varying the number of nodes (i.e., loops) from three to ten. The topology type is determined by the number of average edges connected to each node. For instance, in the case of n=10, the topologies with two and nine edges per node denote the ring and complete topology, respectively. The six topologies with three to eight edges per node represent all possible edge-added topologies. It can be seen that, as the number of edges per node increases, the total traffic on each topology decreases. For example, in the case of n=10, when each node has two edges, i.e., the ring topology, the total traffic is approximately 1,579 programs on average. On the other hand, when each node has nine edges, i.e., the complete topology, the total traffic is on average only 577 programs. This trend is consistent with all other topologies with different numbers of nodes. The reason for this 43

44 Figure 2-6. Number of shared disks required by different topologies according to the number of loops Figure 2-7. Number of attached devices of different topologies according to the number of loops 44

45 is that each topology generates a different number of hops to transfer data between a source and a destination node. Note that, in the complete topology, any PVR can receive a program from any other PVR in another loop with only one hop (i.e., one shared disk). Thus, we can see that the complete topology generates the least total traffic among all possible topologies to construct multiple loop architectures using shared disks. It is clear that the topologies with less traffic require fewer shared disks. This implies that we can achieve better scalability because shared disks are attached to more than one loop at the same time. Fig. 2-6 illustrates the required number of shared disks for each topology type while varying the number of nodes. In the case of n=10, the complete topology requires only 135 shared disks while the ring topology requires 320 shared disks. Note that the number of shared disks per edge in the ring topology is much larger than that in the complete topology even though the number of edges in the ring topology is smaller. Fig. 2-7 shows the total number of attached devices for each topology. As expected, the complete topology can support the greatest number of attached devices among all the topologies to construct a multiple loop architecture. For example, in the case of n= 10, the complete topology can attach 1,125 devices while the ring topology supports 940 devices, which indicates 19.68% improved scalability. It can be also seen that the complete topology outperforms all the other topologies for all the cases with different numbers of nodes Impact of the Number of Interfaces per Disk Fig. 2-8 shows the impact of the number of interfaces per shared disk in the complete topology while varying the number of loops. It can be seen that the difference in the number of attached devices is negligible for all the numbers of loops from two to ten. For example, in the case of n= 10, the number of attached devices is 1,125 when employing the dual-interfaced shared disks while the system with ten interfaced shared 45

46 Figure 2-8. Number of attached devices in the complete topology according to the number of interfaces per disk disks supports 1,144. This indicates only 1.69% difference in scalability even though the average processing utilization of shared disks is quite a bit lower with dual-interfaced disks than with ten interfaced disks. This is because, as the number of interfaces increases, the overhead including loop arbitration increases rapidly. Fig. 2-9 illustrates the increased average one-block (512KB) processing time as the imposed overhead, according to the number of interfaces per shared disks in the 10-loop architecture. Thus, we can see that more interfaced disks do not contribute significantly to the system scalability. 2.6 Summary In order to deliver high-quality multimedia content, it is essential to support high bandwidth in a network area. To address these requirements, a content-sharing architecture based on an FC-AL loop has been proposed. Since a single loop allows only 127 attachable components due to its 7-bit address space, it is not suitable for a network area in a high-density community area. Therefore, as an alternative to 46

47 Figure 2-9. Average block overhead time according to the number of interfaces per disk expensive switches for a network area, we have proposed a scalable multiple-loop architecture using shared disks that relay the requested programs from one loop to the other. In order to determine which topology has the best scalability, we analyzed the total traffic for four possible topologies such as linear, ring, edge-added, and complete topology. Through analysis and extensive simulations, we showed that the complete topology has the best scalability because it requires the fewest number of shared disks by generating the least traffic among the four topologies. We also showed that the system scalability is not affected by the number of interfaces per disk significantly. We showed that ten loops connected via shared disks can serve more than 1,120 devices without employing switch devices. Our proposed architecture is therefore expected to be a very scalable community network capable of supporting many more PVRs with the increased number of loops since the fiber channel standard technically allows up to 10 km coverage. 47

48 CHAPTER 3 A STORAGE SAVING SCHEME TO SHARE HD-QUALITY CONTENT 3.1 Motivation In the previous chapter, we have developed a multiple-loop FC-AL-based architecture for a community network with the concept of shared disks, which play a role for bridges to connect the different loops [14]. With the shared disks in the system, communication between the hosts/disks in different loops becomes feasible. Therefore, our design focus on the system is shifted to make sure the given storage space is effectively utilized. Unlike the conventional SCSI-based servers that manage the video file allocation issues in the dominating role, FC-AL-based P2P networks provide the system more flexibility in that every PVR can equally access all the disks on the networks. Thus content-sharing among the local disks in PVRs is quite feasible, which allows the system to be more dynamic for using the whole system storage compared to the server-only system. Thus, the PVR-based FC-AL architecture in general should not require as many copies of the programs as the conventional SCSI-based servers/systems. Therefore, PVR-based FC-AL systems may reduce the required number of copies of programs significantly and effectively. We believe that the operations of each PVR should be under the control of its user. Users can therefore arbitrarily store or remove any programs on their PVRs independently of how other PVRs are storing or deleting the same program. As the community network can be extended with added loops in order to accommodate more PVRs, however, the storage of popular programs tends to be duplicated in many PVRs. This implies that the community network overall would waste the storage space that could otherwise be used to store additional TV programs. In addition, PVRs can support the feature of auto-record with their pre-assigned local storage, by which the PVRs can function for time-shifting service like TiVo [5]. Consequently, this implies that we can 48

49 extend program storage hours by reducing duplicated storage of programs with PVRs auto-record storage within a community network. We therefore analyze the problem, and propose novel schemes to extend program storage hours in a community network. These schemes include the algorithm to determine the minimal number of copies of the associated programs, and storage-saving algorithms for both PVRs and network disks. These schemes jointly consider the storage system design issues including access skew among programs and PVRs limited availability. We then perform extensive simulations while considering the various system parameters in order to demonstrate the effectiveness of our proposed architecture and algorithms. The simulation results successfully demonstrate that our architecture can extend program storage hours significantly. The remainder of this chapter is organized as follows: Section 3.2 describes previous work related to our chapter. Section 3.3 explains the overall architecture for our proposed community networks, especially FC-AL multiple loop architecture, to deliver high-quality multimedia data. Section 3.4 explains our storage saving schemes for PVRs and network disks. Section 3.5 illustrates extensive simulation results. Finally, Section 3.6 offers a summarization. 3.2 Related Work In order to provide broad bandwidth stability and reliability, the fiber channel has been proposed as one standard to organize a storage area network [34].Thus, its feasibility and capability have been studied as a high-speed network [18, 19] and its attainable performances have been analyzed [30, 60]. There has been research on FC-AL-based multimedia server architectures using FC-AL storage systems [12, 13, 22]. There has also been literature on PVRs that can offer entertainment services at home such that the end-users can share what they are storing in their own PVRs in P2P networks [3, 36, 49, 79]. In addition, high-quality streaming services based on content distribution networks have been exploited [9, 16, 53] although those services 49

50 have focused on unidirectional distribution from servers to end-users, rather than on bi-directional content-sharing among users. A novel FC-AL-based content sharing architecture in a residential area has been proposed so that HD-content sharing among PVRs can be provided [39]. However, this system only focused on the feasibility of the system architecture with the single-loop FC-AL configuration. Thus, it has limitations as a community network infrastructure because it can accommodate only a limited number of community members. In addition, as the network and multimedia technologies have advanced, the multimedia streaming has become much more feasible in a variety of services such as P2P sharing. Multimedia streaming over P2P network can be categorized in three types: pure streaming, implicit duplication, and explicit duplication as described in Section 1.1. To date, there have been introduced several P2P multimedia applications such as Joost [51], PPLive [? ], TvAnts [63], Cabos [65], Kiwi Alpha [54], Shareaza [50], BitTorrent [41], BitComet [46], Azureus [67], and so on. The pure streaming types are Joost [51], PPLive [? ], and TvAnts [63]. Next, the implicit duplication types are Cabos [65], Kiwi Alpha [54], and Shareaza [50]. Lastly, the explicit duplication types include BitTorrent [41], BitComet [46], and Azureus [67]. In our system, we adopt implicit duplication as a P2P content-sharing, so that the program stored in each PVR can be effectively shared with other PVR users without suffering a delay or a jitter. In addition, our system can also work as by explicit duplication method once a whole program is recorded in a PVR until when the program is deleted. 3.3 TV Content Distribution Architecture for Community Networks In order to provide content distribution and sharing among community members, it is important to build an infrastructure to sustain those services as a community network. In particular, in order to support real time HD-quality content sharing, it is required 50

51 to provide sufficient storage bandwidth, huge storage capacity and each member s willingness to contribute their resources to the community. In this section, we introduce a novel TV content distribution architecture for a community network to meet these requirements. We have explained the FC-AL single-loop community network in section Then, we describe and review a scalable multiple-loop architecture using shared disks as the infrastructure of the community network. The proposed architecture can adaptively increase the community network simply by adding loops even though community size continues to grow [14]. We therefore develop the scalable multiple-loop architecture for a community network that has no limitation on the number of attached devices as shown in Fig. 2-1B. When extending the single loop system to the multiple loop system, however, we need to devise a bridging mechanism to relay the requested program between different loops. Thus, we adopt shared disks that connect two distinct loops and relay the requested program from one loop to the other. Since the FC standard allows multiple interface devices for such reasons as durability, we can implement the shared disks without modifying FC protocols. Fig. 3-1 illustrates proposed multiple-loop architectures in order to support an infrastructure of a community network, using the shared disks and the directory server with possible 2-loop, 3-loop, and 4-loop configurations. Note that each loop indicates a single-loop architecture, as in Fig. 3-1A. Fig. 3-1A shows the fundamental architecture to extend from single loop to double loop using shared disks. In this architecture, we can see that the shared disks work like bridges, which enable the multiple-loop architecture and can be a path between the loops. Fig. 3-1A illustrates a 3-loop architecture. With more than 3 loops, we notice that there will be some design issues in terms of how to organize a multiple-loop architecture with the shared disks. However, in order to organize effectively in terms of accessibility so that each loop can reach all the other loops without involving more shared disks and 51

52 A Two-loop and three-loop configuration B Four loop configuration Figure 3-1. Examples of multiple loop architectures more loops, it is desirable to deploy a shared disk between every two loops as in Fig. 3-1A. For example, we can see from Fig. 3-1A that the loop-1 can reach the loop-3 with only one shared disk between them, rather than passing through the loop-2 with two shared disks involved. Similarly, we can organize a 4-loop architecture as in Fig. 3-1B. We can also see that the every loop can reach any other loops via only one shared disk in Fig. 3-1B. 52

53 Although this may need slightly more shared disks to connect different loops, it is clear that the shared disks involved as the routing path between loops should be the fewest, i.e., one shared disk. Thus, in order to configure a multiple-loop architecture effectively, this organization is preferable in terms of the routing efficiency since there will be more routing delays and jitters when more shared disks are involved in the path, which is not suitable especially for HD-quality multimedia content delivery. Therefore, with applying this multiple-loop organization, we can construct the following formula in order to obtain the number of attachable devices with respect to the given loop number: (number ofattachable devices) = 127 n n 2 (3 1) where n is the number of loops. Now, we can organize the multiple-loop architecture by using the shared disks for the community network infrastructure. With the proposed multiple-loop architectures, we can deliver the HD-quality content sharing and distribution among community members, i.e., PVRs, without limiting the number of community members [14]. 3.4 Extending Content Storage Hours We have proposed a novel TV content distribution architecture for community networks by configuring the multiple loops and network disks. In order to further utilize the given system storage capacity, we investigate how to extend TV content storage hours in a community network. The basic idea is to increase the storage efficiency of a community network by decreasing duplicated program storage on PVRs and network disks. We first describe design issues to increase the storage efficiency in a community network. We then evaluate the impact of duplicated storage of programs and present the efficient replacement schemes for both PVRs and network disks to extend program storage hours significantly. 53

54 3.4.1 Design Issues for Storage Efficiency In our proposed architecture, the total storage capacity of a community network depends on the numbers of PVRs and network disks. As the size of a community network grows, more PVRs can be attached to that community network. Accordingly, the number of PVRs that store each program also increases. Moreover, in such a closed system, the number of PVRs storing popular programs will go up rapidly. Consequently, due to the duplicated storage of programs, the community network wastes storage capacity that could otherwise be used to store additional programs. Also, PVRs in a community network have the characteristic of being transient like the peers in the peer-to-peer (P2P) networks. That is, even though PVRs may be active at any moment, they can leave the community network at any time. In order to increase storage efficiency in a community network, we therefore need to address such design issues in the joint consideration of access skew among programs (because of the differences in popularity) and the limited availability of live PVRs Impact of Duplicated Storage of Programs It is known that the degree of access skew for popular programs usually follows the Zipf distribution [1, 42]. Thus, the probability that each PVR records the ith most popular program among the $n$ programs can be computed as follows: P i,α pop = 1 α 1/i (3 2) n 1/k 1 α where α represents the access skewness degree (i.e., as α increases, the skewness degree decreases). To show the impact of storage duplication of programs, Fig. 3-2 illustrates an k=1 example where there are 50 TV channels, i.e., 50 different programs are always being broadcast. In addition, we set the α to 0.271, which is a typical parameter for popularity distribution of video rentals. 54

55 Figure 3-2. Probability of storing each program according to its popularity We can see from Fig. 3-2 that the first ranked (the most popular) program needs be stored in 13.3% of all PVRs, while the 50th ranked program needs to be stored in about 1% of PVRs. In other words, if we deploy 1,000 PVRs, 133 copies of the first ranked program will be recorded and only 10 copies of the 50th ranked program will be recorded. This indicates that, if there are too many duplicated copies of popular programs among PVRs, the community network will waste storage space significantly. In addition, the conventional file server systems based on SCSI do not share the interface bandwidth among connected disks since all disks are fully controlled by the servers [78]. The SCSI-based disks are passive in nature, and only a server can access them by the SCSI commands. Moreover, the servers are less successful in getting the program contents from the clients promptly and adaptively compared to the P2P approach. However, the FC-AL with PVRs enables the system to share the disk bandwidth. They also have more advantages such as peer-matching and peer-switching [39], which allow the system to piggy-back on the existing streams. 55

56 Table 3-1. PVRs Contributable Storage in the PVR-based FC-AL system Sharing Storage Portion of each PVR Program Numbers to Store Additionally 10% % % % % % % % % % 1824 Furthermore, content-sharing among the local disks in PVRs allows the system to be more flexible compared to the server-only system for using the whole system storage. Thus, the PVR-based FC-AL architecture in general does not require as many copies of the programs as the conventional SCSI-based servers/systems. Table 3-1 explains that PVRs contributable storage space in terms of the number of programs in the PVR-based FC-AL architecture when assuming half of PVRs are deployed, that half of them are alive, and each PVR provides the indicated sharing portion to the system, which is comparable to the passive SCSI-based system. Ideally, PVR-based FC-AL systems can reduce the required number of copies of programs significantly and effectively. In our architecture, a PVR can receive any program stored on other PVRs or network disks. When a PVR requests a program that more than one alive PVR or the network disks are storing, it can receive the program from one of the alive PVRs or network disks via P2P streaming within the community network. Thus, as long as we can guarantee that sufficient copies of each program are available at any given time, we 56

57 may remove redundant copies, thereby saving the storage space for additional programs that can be added later Storage Saving Schemes First, we explain the behavior characteristics of a PVR. That is, each PVR is only operated by its owner s orders such as watch, store, or remove. Furthermore, we assume the PVRs in the system can support the feature of auto-record, which service has been adopted in TiVo [5]. In our system, the PVRs auto-record can work automatically for time-shifting services, once the storage is set by its user. For example, if a PVR has 500GB storage and its user sets 10% of storage for auto-record, then 50GB is assigned for storing time-shifting programs. Specifically, once a PVR watches a program, the program is automatically stored in the auto-record storage of the PVR. Our scheme has been devised based on these facts. That is, our scheme proposes to store only a sufficient number of the programs, initially broadcast with a given existence probability. In other words, if we define a threshold value for a program existence, we can determine how many PVRs should be alive at least, in order to obtain the required number of copies for that program with respect to that threshold value. Given those alive PVRs having the target program, we can determine the minimum copy numbers of the program as follows: 1 (1 P alive ) m threshold m log (1 Palive )(1 threshold) (3 3) where m is the minimum required number of copies for a program and P alive is the probability of each PVR s being alive. For example, if the existence threshold value is given as 0.9 and the P alive is 0.5, then we can get the minimum copy number for PVRs, m, as 4 from Eq That is, if 4 alive PVRs each have the target program, our system determines that that program can be regarded as minimal-copy with respect to the given threshold value and P alive. 57

58 In addition, our system provides the network disks as the backup storage for the programs. In order to avoid over-duplicated copies of programs, we can see that it is sufficient to store a program either as 1-copy at the network disks or m-copy among the alive PVRs. Therefore, our proposed scheme is fundamentally trying to maintain minimal-copy of each requested program between alive PVRs and network disks. That is, in order to save the system storage consisting of network disks and PVR storage, if the network disks have the target program, then not all PVRs need to store the corresponding program. On the other hand, if there exist m-copies of the target program among alive PVRs, then the network disks do not need to store the corresponding program, either. Table 3-2. Symbols for replacement algorithms SYMBOL p i S i S ND m N i N ND i A program with index i DEFINITION A set of programs stored in a PVR with index i A set of programs stored in network disks The minimum required copy number to store a program onto alive PVRs with respect to the given threshold The number of copies of the program with index i among alive PVRs The number of copies of the program with index i among the network disks Table 3-2 shows the symbols used in our storage saving schemes such as program placement and replacement algorithms. The program placement algorithm in Algorithm 3-1 tries to hold at least the sufficient number of programs on behalf of the whole system. If the PVRs try to store mth copies of a program when the network disks currently hold that program, the system allows the PVRs to store mth copy but it 58

59 Algorithm 3-1 Program placement algorithm (input: new program) 1: if ((N i == m)&&(n ND i == 0)) then 2: Do not store that program to any storage; 3: else if ((N i < m)&&(n ND i == 0))) then 4: Store that program both PVR and network disk; 5: else if ((N i == (m 1))&&(N ND i 6: Store that program to PVR; == 1))) then 7: Remove that program from network disk; 8: else if (N i == (m 1)) then 9: Store that program to PVR; 10: else 11: not reachable; 12: end if 13: return removes the program from the network disks, so that the system can free up the space for the other program s placement Replacement Schemes Since every PVR is under each user s control, it can be difficult to predict what programs each PVR will record. As mentioned above, due to the skewed demand for access to the popular programs, there must be storage duplication of the programs among PVRs. Moreover, PVRs have dynamic behavior characteristics like the ability to freely leave or join a community network as a peer in P2P networks. In order to avoid storing redundant copies of each program among many PVRs, we also devise efficient replacement schemes, which cooperate with the PVRs and the network disks. The design goal is therefore to maintain at least sufficient copies of each program on the alive PVRs or the network disks for later access, while also reducing the excessive redundant copies. We therefore propose replacement schemes for both 59

60 PVRs and network disks to increase storage efficiency of the community network by choosing the most appropriate program. Algorithm 3-2 Replacement algorithm for PVRs (input: new program) 1: if (S i S ND φ) then 2: Find a set of programs belonging to S i S ND ; 3: Choose the oldest program among them; 4: else if ({p i p i S i N i > 1} = φ)) then 5: Find a set of programs belonging to {p i p i S i N i > 1}; 6: Choose the program that has the largest N i among them; 7: else 8: //there exist only programs that have one copy in the community network 9: Choose the oldest program among them; 10: Move it to network disks; 11: end if 12: Replace the chosen program with new program; 13: return The replacement algorithm for PVRs determines what program a PVR should replace with a new incoming program as shown in Algorithm 3-2. The algorithm first checks whether or not there exist any programs that are also stored on network disks: i.e., if S i S ND φ. As long as network disks store the programs, PVRs may not need to store them any longer because the network disks are always available, providing sufficient disk bandwidth. If so, we choose the oldest program among them, i.e., the program that had been stored earliest, because the oldest one is less likely to be accessed in the future. The system will send an automatic message to recommend the PVR owner remove the program copy with the assurance that the copies on the network disks will remain available. If there is no program satisfying the above condition, we check whether there exist any programs that are also stored in other alive PVRs: i.e., if {p i p i S i N i > 1} = φ. If found, we choose the program that has the most number 60

61 of copies among a set of the programs satisfying the condition so that this program is likely to have the most number of redundant copies. Finally, if there are programs that have the last copy in a community network, we also choose the oldest one among them but move it to the network disks. The reason for doing this is that we need to maintain at least one copy of each program within a community network before removing all the other copies of the program. Algorithm 3-3 Replacement algorithm for network disks (input: new program) 1: if ({p i N i > 0} = φ) then 2: Find a set of programs belonging to {p i N i > 0}; 3: Choose the program that has the largest N i among them; 4: else 5: //there exist only programs that have one copy in the community network 6: Choose the oldest program among them; 7: end if 8: Replace the chosen program with new program; 9: return The replacement algorithm for the network disks also addresses which program a pool of network disks should replace with an incoming program, shown in Algorithm 3-3. We first check whether there exist any programs that are stored in any alive PVRs: i.e., if {p i N i > 0} = φ. If so, we choose the program that has the most number of copies in Algorithm 3-2. If not found, it indicates that all the programs stored in network disks have only one copy within a community network. Thus, we choose the oldest program among them and replace it with the incoming program. 3.5 Experimental Evaluation To validate the effectiveness of our proposed architecture and algorithms in terms of storage efficiency, we have performed extensive simulations while varying several system parameters, such as the number of PVRs, storage capacity, and the portion of storage assigned for time shifting. 61

62 3.5.1 Effectiveness of Proposed Schemes in a Single Loop The default values of these parameters are shown in Table 3-3. They are used throughout our simulations unless otherwise indicated. It is assumed that each TV program has HD quality of 19.4Mbps playback rate. The degree of access skewness among TV programs follows the Zipf distribution with α = 0.271, which is typically used for video rental distribution [17, 79]. Table 3-3. Simulation parameters CATEGORY PARAMETER VALUE data transfer rate 400 MB/s FC-AL propagation delay 3.5 ns/meter per node delay 240 ns capacity 500 GB cache 32 MB Disk data transfer rate MB/s seek time 4.7 ms rotational latency 3.0 ms probability of each PVR being alive 70% threshold 0.9 Storage saving scheme storage portion for time-shifting 30% Zipf distribution (α value) shared disk interface configuration dual-loop interface Multiple-loop number of network disks 10% of all devices Our proposed storage-saving schemes are first evaluated in the single-loop architecture with various parameter settings such as the ratio of PVRs and network disks, P alive values and threshold values. Fig. 3-3A shows the improved storage hours according to the different number of network disks deployed in terms of percentage with our proposed schemes. We can see that the improvement reaches almost 133% better with seven network disks, (i.e., 119 PVRs). The improvements tend to decrease with 62

63 an increase in the number of network disks. This is because the number of PVRs is decreasing when adding more network disks. Thus, we can confirm that our schemes work better when more PVRs are deployed (i.e., the trend). In addition, Fig. 3-3B shows the effect of the ratio of PVRs to network disks. When the ratio is increasing, the improvement tends to get better up to 16%, which implies that the improvement cannot reach higher without adding many network disks. Lastly, Fig. 3-4A demonstrates how the various P alive can affect the system performance. As we expected, the larger the value of P alive, the better system performance. That is, the performance is improved when a large value of P alive is set by the users. This means that when the probability that each PVR can be alive is high, the system shows better performance. Fig. 3-4B illustrates the effects of various threshold values. As the value gets larger, the system performance is decreased. This is because the system needs more PVRs in order to meet the given threshold values. Thus, the larger threshold shows the smaller number of storage hours in terms of the system performance Effectiveness of Proposed Schemes in Multiple Loops In addition, we employ dual-loop interfaced shared disks between two distinct loops in order to organize the multiple loop architectures. We configure multiple loops so that each loop can reach any other loop with only one hop. This means that any PVR can access any other PVR or network disks in the other loops via only one shared disk. Table 3-4 shows how many PVRs and network disks there are in a community network depending on the number of loops. Though we are still searching for the optimal ratio, we have chosen to assign 10% of all possible attached devices to network disks in this chapter. It can be seen that, when employing ten loops, our architecture can support more than 1100 devices in a community network. The simulation results demonstrate that our proposed architecture significantly increases program storage hours by reducing the duplicated storage of popular programs in a community network. The following 63

64 A Improved storage hours B Effects of PVR to NDisk ratio Figure 3-3. Effects of PVRs and network disks 64

65 A Effects of P alive Figure 3-4. Effects of P alive and threshold B Effects of threshold 65

66 Table 3-4. The ratio of pvrs and network disks in a community network NUMBER OF LOOPS NUMBER OF PVRS NUMBER OF NETWORK DISKS subsections describe the achieved efficiency of the system performance based on various system aspects. Figure 3-5. Effectiveness of our proposed architecture 66

67 3.5.3 Effectiveness of Our Proposed Architecture While varying the number of PVRs, we compare program storage hours, which is the main performance metric in our architecture. The direct comparison is between our replacement scheme when on (called scheme on case) and off (called scheme off case). With scheme off case as the baseline system, the system stores at least one copy of each program on network disks irrespective of the number of copies of the program on PVRs, so that PVRs can always access the programs even if they are not stored on their local hard disks. Fig. 3-5 shows that scheme on case outperforms scheme off case by an average of 69.7%. This is because the scheme on case can reduce the duplicated storage of programs effectively, considering the characteristics of TV recording pattern, i.e., access skewness to popular TV programs. As the number of PVRs increases, the number of copies of each program also increases. This implies that, as more PVRs are involved, our scheme can be further improved by reducing the number of redundant copies of each program. This also enables network disks to save storage space that would otherwise store excessive copies of popular programs. Note that the number of PVRs in Fig. 3-5 is proportional to the number of loops, as listed in Table Impact of PVRs Storage Portion for Time-Shifting We then examine the impact of PVRs storage portion assigned for time-shifting on the performance. As expected, Fig. 3-6 shows that, as a higher storage portion is assigned for time shifting, performance improvement also increases. For example, let us consider the case where we employ 900 PVRs in a community network. Compared to when only 10% of PVRs storage is reserved for time-shifting, the program storage hours become 17.1%, 32.9%, 44.7%, and 56.1% longer when 20%, 30%, 40%, and 50% are reserved, respectively. There are likely to be more duplicated programs as we have more storage space for time-shifting. 67

68 Figure 3-6. Impact of PVRs storage portion for time-shifting It is also interesting that the degree of improvement percentage decreases as the portions increase. For example, when employing 900 PVRs, extended hours between each of two consecutive portions from 10 to 50% are 24, 21, 18, and 16 hours, respectively. Thus, it can be seen that, as more programs are accommodated, our architecture continues to improve the performance but the improvement percentage decreases Impact of Storage Capacity In this section, we investigate the impact of disk storage capacity of each PVR on storage hours. We employed three different disk capacities of 100GB, 300GB, and 500GB for scheme on and off cases, respectively. Fig. 3-7 shows that scheme on case on average achieved the performance improvement by 56.3%, 65.3%, and 69.7% for 100GB, 300GB, and 500GB, respectively, compared to the scheme off case. That is, as the storage capacity of each PVR increases, the program storage hours get longer. This is because PVRs storage portion for time shifting increases with the increased storage 68

69 Figure 3-7. Impact of storage capacity capacity as their storage capacity is larger. It can be also seen that the performance at 300GB in the scheme on case can work similarly as 500GB in the scheme off case. This implies that our proposed architecture can achieve acceptable performance even with relatively little storage capacity. 3.6 Summary Community networks can serve to share HD-quality contents among the community members. To provide an infrastructure of community networks, we propose the multiple-loop FC-AL-based community network architecture with shared disks, which can overcome the limitations of single-loop-based architecture without expensive FC-AL switches. Based on the multiple-loop-enabled community network infrastructures, we have proposed storage saving schemes for both PVRs and network disks. The goal of storage saving schemes is to reduce the number of duplicated copies of popular programs to extend program storage hours of TV programs. The extensive simulations 69

70 show that our proposed architecture can extend the program storage hours significantly. Since communities will require more storage capacity in the future with increased content quality, our proposed architecture is expected to be widely applied to large-scale community networks. 70

71 CHAPTER 4 AN MST-BASED NETWORK ARCHITECTURE FOR SHARING BROADCAST TV PROGRAMS 4.1 Motivation The suggested multiple-loop architectures using the shared disks in the previous chapters are based on the complete graph (CG) topology for less total traffic. We determined how the complete graph topology could minimize the total traffic and would be suitable for the multiple-loop architectures with shared disks. Nevertheless, it has a critical limitation in terms of topology organization. In other words, the CG topology requires many connect-disks, i.e., shared disks, just for the topology connectivity. Namely, if there are n loops in the architecture, the system demands at least n C 2 shared disks merely for the system organization, thereby making it less likely to be able to construct a real network architecture, especially if the number of loops is increasing. Additionally, in multiple-loop organization, the initial shape of a loop should be changed in order to place a shared disk between loops, which results in an increase in the loop size as shared disks are added. For example, in order to connect two loops that are physically somewhat apart, it is clear that the insertion of the shared disk requires the modification of those two loops. As a result, the size of each loop increases when a shared disk is located between any two loops. It is well known that, to provide better performance, the size of an FC-AL loop is significant in order to be suitable for high-quality content delivery in realtime [60]. This indicates that the average loop size should be larger when each loop has more neighbor loops connected by shared disks and would deliver worse performance due to increased propagation delays and arbitration times. Therefore, in this chapter, we first introduce a novel multiple-loop architecture using a minimum spanning tree (MST) based topology with less connectivity and less average loop size. In fact, the CG topology is an extreme case, having the most number of connectivities by 1-hop reachability and thus the least total traffic with distributed traffic 71

72 load, while the MST-based topology is an example of another extreme case, having the least number of connectivities and thus concentrating traffic load on the shared disks that are selected for the MST topology. We then describe how we can organize the MST-based topology, so that average loop size in the topology can be minimized and every loop can reach any other loops within a 2-hop or 3-hop, which affects the topology-caused total traffic since the loaded traffic is additive when more hops are involved in routing. Nonetheless, once the topology is determined, the MST-based topology only permits a fixed routing path, which still causes a traffic load concentration on the fixed routing path. Consequently, we propose an innovative MST-based graph topology, named MSG topology, which is based on the 2-hop and 3-hop MST topology, but allows multiple paths and graph organizations, using enabling traffic load distribution via a less-loaded path among those possible paths. We describe how the MSG topology is achieved and compare the MSG topology with the MST topology and the CG topology. Our simulation results, then, reveal that the MSG topology multiple-loop architecture can provide a very close average loop size compared to MST topology cases with remaining constant and close enough in terms of total traffic and average reject ratio compared to the CG cases even with much less topology connectivity. The remainder of this chapter is organized as follows: Section 4.2 describes previous work related to this chapter. Section 4.3 explains the overall architecture for the FC-AL multiple-loop architecture with shared disks. Section specifies the motivation by which the MSG-based topology is devised. Section 4.5 presents the detailed algorithms on how to organize 2-hop/3-hop MSTs and MSGs, respectively. Section 4.6 illustrates extensive simulation results with CGs, MSTs, and MSGs. Finally, Section 4.7 offers conclusions. 72

73 4.2 Related Work The functionalities and the effects of PVRs have been introduced in [45, 52]. Moreover, the capabilities of TV content-sharing between PVRs have been examined in [35, 49]. Meanwhile, the fiber channel has been presented as one of standards to configure the storage area networks [34] and the performance and characteristics of FC-AL have been analyzed in [19, 37, 60]. Additionally, S. Chen et al. have investigated the multimedia server organization based on FC-AL by several advantages such as a direct attachment to the storages and the desirable performance at a low cost [12, 13]. Integrating all those components including PVRs and the FC-AL, the feasibility of a multimedia content-sharing architecture has been proposed in [14, 38]. However, E. Kim et al. have not considered the scalability issues to construct the FC-AL-based PVR network architecture [38] and the complete graph topology has been mainly discussed in designing a scalable multiple-loop architecture [14]. 4.3 TV Content-Sharing Architecture In this section, we introduce a novel TV content distribution architecture that supports sufficient storage bandwidth, massive storage capacity, and each user s capability/willingness to contribute their resources to the network. We first explain the FC-AL single-loop architecture, then we describe the suggested multiple-loop architecture using shared disks as the PVR network infrastructure [14] Multiple Loop Architecture We have developed a scalable multiple-loop network architecture that has no limitation on the number of attached devices as long as the FC-AL loops can be technically configured in the multiple-loop architecture [14]. When extending the single-loop system to the multiple-loop system, however, we need to devise a bridging mechanism to relay the requested program between loops. We thus adopt shared disks that connect two distinct loops and relay requested programs from one loop to the other. 73

74 TV Broadcasting Server Small PVR Network Internet Service Provider Service Provider SDisk Large PVR Network PVR Home A TV broadcasting to PVR networks B The structure of an FC-AL single loop C Sample three-loop architecture with shared disks Figure 4-1. Overall TV content distribution architecture 74

75 Since the FC standard allows multiple interface devices for such reasons as durability [34], we can implement the shared disks without modifying FC protocols. Shared disks are essential components in the multiple-loop architecture because they are responsible for relaying programs between loops. We adopt dual-interfaced hard disks as shared disks and connect each interface to different loops in order to organize the multiple-loop architecture. Note that the number of shared disks between a specific pair of loops depends on estimated network traffic. For instance, although the number of shared disks between any loop in Fig. 4-1C is one, it can be greater than one if ongoing traffic is more than can be covered by a single shared disk as shown in Fig To make it feasible to relay programs between a pair of system components without involving servers, we adopt FC disks that provide a direct data transfer function among them such as extended copy (X-copy or E-copy) and disk-to-disk (D2D) transfer. With this function, a server only designates involved disks for their roles, i.e., one for source and the other for destination. In fact, this function has already been developed by several companies for serverless data backup technologies using FC disks with limited processing capabilities [8]. In our architecture, each loop has a DS that maintains a list of TV programs stored in all components. The DS is responsible for triggering X-copy module embedded in each shared disk as an initiator when performing the direct data transfer. This function can reduce a data-relaying latency and avoid the situation where servers become a performance bottleneck when they must relay all the data among loops through their main memory. The program relaying process in our system is performed in two phases: location and routing determination using FC-AL protocol and actual block read/write between two devices using FC protocol. In the first phase, the PVR first asks a DS where the requested program is located and then the DS informs the PVR of the entire routing path 75

76 DS0 Sdisks DS1 Sdisks DS2 Ndisks Loop 0 Sdisk(b) Loop 1 Sdisk(c) Loop 2 Ndisks PVR(a) Ndisks PVRs PVRs PVRs PVR(d) Figure 4-2. How to relay a TV program using shared disks in a triple-loop from target PVR from which it the PVR can receive the program. In the second phase, the actual data block transfer from the target PVR via shared disks is performed. Fig. 4-2 illustrates how a program can be transferred from a requesting PVR to a target PVR via shared disks in a triple loop using FC-AL and FC protocols. Basically, each DS provides necessary information to a requesting PVR and also works as an initiator to trigger the X-copy function between any pair of two devices. In the first phase, when PVR(a) has a request for a TV program, it asks DS0 which device it can be served from (1). The DS0 then finds out from its maintained information that it is located in PVR(d) and determines a routing path, including proper loops, i.e., loop-1 (2) and loop-2 (3) in this scenario. Once the routing path including multiple loops is determined (4), the DS0 informs PVR(a) of a relaying device, Sdisk(b). By repeating this procedure until reaching the target PVR, PVR(a) obtains a connection path to PVR(d) through shared disks, i.e., Sdisk(b) and Sdisk(c). In order to establish an actual connection to the target PVR, PVR(a) sends ARB(a) to loop-0 for an arbitration and then sends OPN(b) to Sdisk(b) to open a connection to Sdisk(b) after winning the arbitration. Sdisk(b) then sends R RDY back to PVR(a) to settle a communication with PVR(a) (5). At the same time, DS1 issues a direct data transfer command to Sdisk(b) so that Sdisk(b) should 76

77 setup a communication with Sdisk(c) in the loop-1. Similar to 5, ARB(b), OPN(c) and R RDY is also sent in the loop-1 for the communication between Sdisk(b) and Sdisk(c) (6). In the loop-2, DS2 coordinates the communication between Sdisk(c) and PVR(d) as an initiator with the same commands as ones used in previous loops (7). After all routing connections are established from PVR(a) to PVR(d) via Sdisk(b) and Sdisk(c), in the second phase, data blocks are transmitted along with the determined path. DS2 issues an X-copy command to PVR(d) so that PVR(d) should write the requested program onto Sdisk(c). PVR(d) thus sends FCP CMND IU to Sdisk(c) as a write operation. Sdisk(c) then sends FCP XFER RDY IU to PVR(d) to receive data blocks and PVR(d) sends FCP DATA IU back to Sdisk(c) to transmit an additional data block. This pair of FCP XFER RDY IU and FCP DATA IU between Sdisk(c) and PVR(d) continues to be transferred within a specific period of time, i.e., cycle time, until all the block-writing to Sdisk(c) is finished (8). In fact, each DS coordinates the block transmissions so that each relaying shared disk can continuously transfer the incoming data blocks to the next device with only storing them into its buffer temporarily, not storing them onto its hard disk. Similar to 8, the data block transmission between Sdisk(c) and Sdisk(b) (9) and between Sdisk(b) and PVR(a) (10) is performed with the same commands such as FCP CMND IU, FCP XFER RDY IU, and FCP DATA IU, by the coordination of each loop s DS, i.e., DS1 and DS0, respectively. Note that, if a requesting PVR can receive the requested program from a target PVR in the same loop, other DSs and shared disks do not need to be involved. Based on the program relaying mechanism via shared disks, Fig. 4-1C illustrates the fundamental architecture configuration with three loops and shared disks. Specifically, every loop is directly connected by all the other loops via a shared disk per loop. For example, loop-0 is directly linked to loop-1 and loop-2 by each shared disk. This organization allows every loop to reach all the other loops with only one hop, i.e., one 77

78 shared disk. In other words, the multiple-loop architecture organized by the CG topology connects all loops by providing 1-hop reachability between any two loops. Thus, we can make one important observation: the CG topology requires at least as many shared disks as the directly connected loop number only for the purpose of maintaining topology connectivity. We therefore analyze this problematic topology connectivity issue and propose a novel multiple-loop topology in Section 4.4, in order to organize an efficient multiple-loop architecture. 4.4 Enhanced Multiple-loop Network Architecture Overview The CG topology multiple-loop architecture is likely to be impractical when we organize a real network infrastructure since every loop needs to be attached by all the other loops for 1-hop connectivity. Additionally, this would be extremely expensive because all loops are connected by a physical fiber channel without considering how far they are actually apart. Therefore, we need to develop a tree-based multiple-loop architecture for high-quality content sharing among PVR users by facilitating all the pairwise reachabilities. When placing a shared disk between two loops, we can regard the modified shape of each loop, as in Fig. 4-3A, without loss of generality, while maintaining each loop structure in order to organize the multiple-loop architecture. Specifically, if two loops are d kilometers apart, we then put a shared disk in the middle of the distance, i.e., d/2 kilometers, by attaching each loop to its shared disk. Fig. 4-3A illustrates how, as a basic case, each loop can be modified when a shared disk is inserted between two different loops. The key observation here is that each loop size should increase in order to reach a contact point, i.e., the shared disk between two loops. In addition, Fig. 4-3B shows how we organize a CG topology with four loops, demonstrating how each shared disk can be directly connected in order to maintain each loop structure. In fact, we can link the inserted shared disk to any device on the loop as long as the extended loop size 78

79 A 2-loop generic for multiple loops B 4-loop CG C 4-loop MST D 4-loop MSG Figure 4-3. Examples of CG, MST, and MSG architectures can be reduced and the loop structure can be maintained. Nevertheless, the loop size tends to increase whenever a shared disk is located between two different loops. This means that the CG topology multiple-loop architecture would have the largest loop size compared to any other topology architectures since it has the most connected loops, as many as (n 1) neighbors, where n is the number of deployed loops. 79

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion CONTENTS 1. Introduction 2. How To Store Data 3. How To Access Data 4. Manage Data Storage 5. Benefits Of SAN 6. Conclusion 1. Introduction: A Storage Area Network (SAN) is a dedicated network that carries

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center

Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center What You Will Learn IT departments are facing increasing pressure to accommodate numerous changing

More information

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w) Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 0.1w) Michael Galea, Marzio Pozzuoli RuggedCom Inc. - Industrial Strength Networks Woodbridge, Ontario, Canada Introduction Ethernet

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

LINEAR VIDEO DELIVERY FROM THE CLOUD. A New Paradigm for 24/7 Broadcasting WHITE PAPER

LINEAR VIDEO DELIVERY FROM THE CLOUD. A New Paradigm for 24/7 Broadcasting WHITE PAPER WHITE PAPER LINEAR VIDEO DELIVERY FROM THE CLOUD A New Paradigm for 24/7 Broadcasting Copyright 2016 Elemental Technologies. Linear Video Delivery from the Cloud 1 CONTENTS Introduction... 3 A New Way

More information

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Ali Al-Dhaher, Tricha Anjali Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

Network Systems for Emerging WAN Applications

Network Systems for Emerging WAN Applications Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking

More information

Module 2 Storage Network Architecture

Module 2 Storage Network Architecture Module 2 Storage Network Architecture 1. SCSI 2. FC Protocol Stack 3. SAN:FC SAN 4. IP Storage 5. Infiniband and Virtual Interfaces FIBRE CHANNEL SAN 1. First consider the three FC topologies pointto-point,

More information

Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995

Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995 Network Working Group Y. Rekhter Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995 Status of this Memo Routing in a Multi-provider Internet This memo

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System Ubaid Abbasi and Toufik Ahmed CNRS abri ab. University of Bordeaux 1 351 Cours de la ibération, Talence Cedex 33405 France {abbasi,

More information

Content distribution networks over shared infrastructure : a paradigm for future content network deployment

Content distribution networks over shared infrastructure : a paradigm for future content network deployment University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 Content distribution networks over shared infrastructure :

More information

Backup Exec 9.0 for Windows Servers. SAN Shared Storage Option

Backup Exec 9.0 for Windows Servers. SAN Shared Storage Option WHITE PAPER Optimized Performance for SAN Environments Backup Exec 9.0 for Windows Servers SAN Shared Storage Option 1 TABLE OF CONTENTS Executive Summary...3 Product Highlights...3 Approaches to Backup...4

More information

Introduction to Cisco ASR 9000 Series Network Virtualization Technology

Introduction to Cisco ASR 9000 Series Network Virtualization Technology White Paper Introduction to Cisco ASR 9000 Series Network Virtualization Technology What You Will Learn Service providers worldwide face high customer expectations along with growing demand for network

More information

Broadband Backhaul Asymmetric Wireless Transmission

Broadband Backhaul Asymmetric Wireless Transmission Broadband Backhaul Asymmetric Wireless Transmission Abstract Ceragon Networks offers its customers an innovative way to increase mobile backhauling capacity over microwave networks. Based on a unique asymmetric

More information

L3/L4 Multiple Level Cache concept using ADS

L3/L4 Multiple Level Cache concept using ADS L3/L4 Multiple Level Cache concept using ADS Hironao Takahashi 1,2, Hafiz Farooq Ahmad 2,3, Kinji Mori 1 1 Department of Computer Science, Tokyo Institute of Technology 2-12-1 Ookayama Meguro, Tokyo, 152-8522,

More information

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

1. INTRODUCTION light tree First Generation Second Generation Third Generation

1. INTRODUCTION light tree First Generation Second Generation Third Generation 1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical

More information

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Master s Thesis Title A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Supervisor Professor Masayuki Murata Author Hideto Horiuchi February 14th, 2007 Department

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay 6.1.2 Repeaters A single Ethernet segment can have a maximum length of 500 meters with a maximum of 100 stations (in a cheapernet segment it is 185m). To extend the length of the network, a repeater may

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

An optically transparent ultra high speed LAN-ring employing OTDM

An optically transparent ultra high speed LAN-ring employing OTDM An optically transparent ultra high speed LAN-ring employing OTDM K. Bengi, G. Remsak, H.R. van As Vienna University of Technology, Institute of Communication Networks Gusshausstrasse 25/388, A-1040 Vienna,

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION TO DATA COMMUNICATION NETWORKS Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable.

More information

IP Video Network Gateway Solutions

IP Video Network Gateway Solutions IP Video Network Gateway Solutions INTRODUCTION The broadcast systems of today exist in two separate and largely disconnected worlds: a network-based world where audio/video information is stored and passed

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Mark Sandstrom ThroughPuter, Inc.

Mark Sandstrom ThroughPuter, Inc. Hardware Implemented Scheduler, Placer, Inter-Task Communications and IO System Functions for Many Processors Dynamically Shared among Multiple Applications Mark Sandstrom ThroughPuter, Inc mark@throughputercom

More information

IPTV Explained. Part 1 in a BSF Series.

IPTV Explained. Part 1 in a BSF Series. IPTV Explained Part 1 in a BSF Series www.aucklandsatellitetv.co.nz I N T R O D U C T I O N As a result of broadband service providers moving from offering connectivity to services, the discussion surrounding

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

The fundamentals of Ethernet!

The fundamentals of Ethernet! Building Ethernet Connectivity Services for Provider Networks" " Eduard Bonada i Cruells" Tesi Doctoral UPF / 2012 Dirigida per Dra. Dolors Sala i Batlle Departament de Tecnologies de la Informació i les

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Accelerating Video Using Cisco Wide Area Application Services and Digital Media Systems

Accelerating Video Using Cisco Wide Area Application Services and Digital Media Systems Accelerating Video Using Cisco Wide Area Application Services and Digital Media Systems Most enterprises understand the power of video-based information delivered directly to their employees in the workplace.

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/220850337 On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement

More information

InfiniBand SDR, DDR, and QDR Technology Guide

InfiniBand SDR, DDR, and QDR Technology Guide White Paper InfiniBand SDR, DDR, and QDR Technology Guide The InfiniBand standard supports single, double, and quadruple data rate that enables an InfiniBand link to transmit more data. This paper discusses

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

The Industrial Intranet: a Cause For Change

The Industrial Intranet: a Cause For Change The Industrial Intranet: a Cause For Change by S Graham, Schneider Automation Electricity + Control March 2000 Most plant data collection applications today use a batch approach, where data is transmitted

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information

An Effective Neighborhood Initial-Playback Based Caching Scheme for Video on Demand over Mobile Ad Hoc Network

An Effective Neighborhood Initial-Playback Based Caching Scheme for Video on Demand over Mobile Ad Hoc Network An Effective Neighborhood Initial-Playback Based Caching Scheme for Video on Demand over Mobile Ad Hoc Network Saleh Ali Alomari, Member, IACSIT, Vaithegy Doraisamy, and Putra Sumari Abstract Video on

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Integrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC)

Integrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC) Digital Local Loop Technologies Integrated t Services Digital it Network (ISDN) Handles voice and data Relatively l high h cost for low bandwidth (Skip) Digital Subscriber Line (DSL) Cable modems Hybrid

More information

Module 16: Distributed System Structures

Module 16: Distributed System Structures Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition,

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition, Module 16: Distributed System Structures, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

Veeam and HP: Meet your backup data protection goals

Veeam and HP: Meet your backup data protection goals Sponsored by Veeam and HP: Meet your backup data protection goals Eric Machabert Сonsultant and virtualization expert Introduction With virtualization systems becoming mainstream in recent years, backups

More information

RECOMMENDATION ITU-R BT.1720 *

RECOMMENDATION ITU-R BT.1720 * Rec. ITU-R BT.1720 1 RECOMMENDATION ITU-R BT.1720 * Quality of service ranking and measurement methods for digital video broadcasting services delivered over broadband Internet protocol networks (Question

More information

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS Research Article DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS S. Swarna Parvathi, Dr. K. S. Eswarakumar Address for Correspondence S. Swarna Parvathi, PhD Scholar Department

More information

Cost Effective and Scalable Video Streaming Techniques

Cost Effective and Scalable Video Streaming Techniques 25 Cost Effective and Scalable Video Streaming Techniques Kien A. Hua Mounir Tantaoui School of Electrical Engineering and Computer Science University of Central Florida Orlando, Florida, USA kienhua@cs.ucf.edu,tantaoui@cs.ucf.edu

More information

OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange

OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange Bernhard Schandl, University of Vienna bernhard.schandl@univie.ac.at Users wishing to find multimedia material about interesting events

More information

A Proposal for a High Speed Multicast Switch Fabric Design

A Proposal for a High Speed Multicast Switch Fabric Design A Proposal for a High Speed Multicast Switch Fabric Design Cheng Li, R.Venkatesan and H.M.Heys Faculty of Engineering and Applied Science Memorial University of Newfoundland St. John s, NF, Canada AB X

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Community College WAN Design Considerations

Community College WAN Design Considerations Considerations Design The Cisco Community College reference design is a multi-campus design where a campus consists of multiple buildings and services. The campuses are interconnected through various transports

More information

Not all SD-WANs are Created Equal: Performance Matters

Not all SD-WANs are Created Equal: Performance Matters SD-WAN Lowers Costs and Increases Productivity As applications increasingly migrate from the corporate data center into the cloud, networking professionals are quickly realizing that traditional WANs were

More information

SoftNAS Cloud Performance Evaluation on Microsoft Azure

SoftNAS Cloud Performance Evaluation on Microsoft Azure SoftNAS Cloud Performance Evaluation on Microsoft Azure November 30, 2016 Contents SoftNAS Cloud Overview... 3 Introduction... 3 Executive Summary... 4 Key Findings for Azure:... 5 Test Methodology...

More information

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)

More information

Precomputation Schemes for QoS Routing

Precomputation Schemes for QoS Routing 578 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 4, AUGUST 2003 Precomputation Schemes for QoS Routing Ariel Orda, Senior Member, IEEE, and Alexander Sprintson, Student Member, IEEE Abstract Precomputation-based

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

DEPARTMENT of. Computer & Information Science & Engineering

DEPARTMENT of. Computer & Information Science & Engineering CIS-6930: Distributed Multimedia Systems Enhancing aggregate QoS for video streaming Authors: Chung wei Lee, Randy Chow, Jonathan C.L. Liu Aditi Malviya Presented By: Anubha DEPARTMENT of Computer & Information

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

Table of Contents. Cisco Introduction to EIGRP

Table of Contents. Cisco Introduction to EIGRP Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP

More information

A Deployable Framework for Providing Better Than Best-Effort Quality of Service for Traffic Flows

A Deployable Framework for Providing Better Than Best-Effort Quality of Service for Traffic Flows A Deployable Framework for Providing Better Than Best-Effort Quality of Service for Traffic Flows Proposal Presentation Raheem A. Beyah July 10, 2002 Communications Systems Center Presentation Outline

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM

SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM ABSTRACT: SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM J.Priyanka 1, P.Rajeswari 2 II-M.E(CS) 1, H.O.D / ECE 2, Dhanalakshmi Srinivasan Engineering College, Perambalur. Recent years have witnessed

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (1 st Week) Outline Course Information and Policies Course Syllabus 1. Data Communications, Data Networks, and the Internet

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Lecture 1 Overview - Data Communications, Data Networks, and the Internet DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking

More information

Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands

Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands Utility networks are going through massive transformations towards next

More information

Cisco I/O Accelerator Deployment Guide

Cisco I/O Accelerator Deployment Guide Cisco I/O Accelerator Deployment Guide Introduction This document provides design and configuration guidance for deploying the Cisco MDS 9000 Family I/O Accelerator (IOA) feature, which significantly improves

More information

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved. 1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than

More information

Competitive Public Switched Telephone Network (PSTN) Wide- Area Network (WAN) Access Using Signaling System 7 (SS7)

Competitive Public Switched Telephone Network (PSTN) Wide- Area Network (WAN) Access Using Signaling System 7 (SS7) Competitive Public Switched Telephone Network (PSTN) Wide- Area Network (WAN) Access Using Signaling System 7 (SS7) Definition Using conventional Internet access equipment, service providers may access

More information

Request for Comments: 304 NIC: 9077 February 17, 1972 Categories: D3, D4, D7 Obsoletes: none Updates: none

Request for Comments: 304 NIC: 9077 February 17, 1972 Categories: D3, D4, D7 Obsoletes: none Updates: none Network Working Group D. B. McKay Request for Comments: 304 IBM NIC: 9077 February 17, 1972 Categories: D3, D4, D7 Obsoletes: none Updates: none Introduction A Data Management System Proposal for the ARPA

More information

RAID SEMINAR REPORT /09/2004 Asha.P.M NO: 612 S7 ECE

RAID SEMINAR REPORT /09/2004 Asha.P.M NO: 612 S7 ECE RAID SEMINAR REPORT 2004 Submitted on: Submitted by: 24/09/2004 Asha.P.M NO: 612 S7 ECE CONTENTS 1. Introduction 1 2. The array and RAID controller concept 2 2.1. Mirroring 3 2.2. Parity 5 2.3. Error correcting

More information

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network 87-01-01 DATA SECURITY MANAGEMENT NETWORK TECHNOLOGIES FOR INFORMATION SECURITY PRACTITIONERS: PART 1 Chris Hare INSIDE What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches;

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

The Functional User Requirement Analysis of a Web Broadcasting Management System

The Functional User Requirement Analysis of a Web Broadcasting Management System The Functional User Requirement Analysis of a Web Broadcasting Management System Gyeyoung Lee, Jaegeol Yim Dept. of Computer Engineering, Dongguk University at Gyeongju Korea {lky, yim}@dongguk.ac.kr Abstract.

More information

Hybrid Coax-Wireless Multimedia Home Networks Using Technology. Noam Geri, Strategic Marketing Manager

Hybrid Coax-Wireless Multimedia Home Networks Using Technology. Noam Geri, Strategic Marketing Manager White Paper Hybrid Coax-Wireless Multimedia Home Networks Noam Geri, Strategic Marketing Manager Cable Broadband Communications Group, Texas Instruments Introduction Wireless home networking has emerged

More information

White Paper Broadband Multimedia Servers for IPTV Design options with ATCA

White Paper Broadband Multimedia Servers for IPTV Design options with ATCA Internet channels provide individual audiovisual content on demand. Such applications are frequently summarized as IPTV. Applications include the traditional programmed Video on Demand from a library of

More information

Loopback: Exploiting Collaborative Caches for Large-Scale Streaming

Loopback: Exploiting Collaborative Caches for Large-Scale Streaming Loopback: Exploiting Collaborative Caches for Large-Scale Streaming Ewa Kusmierek Yingfei Dong David Du Poznan Supercomputing and Dept. of Electrical Engineering Dept. of Computer Science Networking Center

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications CHAPTER 1 Tenth Edition by William Stallings Data Communications, Data Networks, and the Internet Data and Computer Communications, Tenth Edition by William Stallings,

More information

Enhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER

Enhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER 40 CHAPTER Chapter Goals Identify the four key technologies employed by (EIGRP). Understand the Diffusing Update Algorithm (DUAL), and describe how it improves the operational efficiency of EIGRP. Learn

More information

BUILDING LARGE VOD LIBRARIES WITH NEXT GENERATION ON DEMAND ARCHITECTURE. Weidong Mao Comcast Fellow Office of the CTO Comcast Cable

BUILDING LARGE VOD LIBRARIES WITH NEXT GENERATION ON DEMAND ARCHITECTURE. Weidong Mao Comcast Fellow Office of the CTO Comcast Cable BUILDING LARGE VOD LIBRARIES WITH NEXT GENERATION ON DEMAND ARCHITECTURE Weidong Mao Comcast Fellow Office of the CTO Comcast Cable Abstract The paper presents an integrated Video On Demand (VOD) content

More information