P2P Dissemination / ALM

Size: px
Start display at page:

Download "P2P Dissemination / ALM"

Transcription

1 P2P Dissemination / ALM Teague Bick < > Su Fu < > Zixuan Wang < >

2 Definitions P2P Dissemination Want fast / efficient methods for transmitting data between peers ALM Application Layer Multicast Virtual connections because IP does not provide a method Non-virtual methods are not widespread Digital Fountain Use encoding Sources can make any combination of codes Intermediary nodes can add to encodings

3 Techniques Informed Content Delivery Across Adaptive Overlay Networks ACM Sigcomm J. Byers, J. Considine, M. Mitzenmacher, S. Rost Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh Dejan Kosti c, Adolfo Rodriguez, Jeannie Albrecht, and Amin Vahdat Enabling Content Dissemination Using Efficient andscalable Multicast Tae Won Cho, Machael Rabinovich, K.K. Ramakrishnan, Divesh Srivastava, Yin Zhang

4 Paper 1 Informed Content Delivery Across Adaptive Overlay Networks

5 Paper 1 Purpose: Nodes need to communicate Want a small # of transmissions and bits transmitted Techniques: Coarse-Grain (Estimation of differences) Set estimation allows estimation of how alike two nodes are (want to connect to diverse peers) Fine-Grained(Bloom filters / Reconciliation trees) Allows nodes to determine what data to encode and transmit

6 Paper 1 Techniques Encoding Digital Fountain Can encode any symbols to create many others, almost to an infinite degree Re-encoding Intermediary nodes can input information they have, regardless of whether or not they have the entire file Need only receive a certain # of distinct packets Typically need only receive a few % more bits than the original file size We transmit more but gain in throughput

7 Paper 1 - Background Erasure Coding Encode information (such as bitwise xor, or ReedSolomen codes) Need only receive the file size worth of unique coded packets to decode Can not decode until entire file received Digital Fountain technique Servers use Erasure Coding techniques Can create a code from any combination of data Intermediary nodes can add information to codes

8 Paper 1 - Background Unicast (Client-Server) Wastes bandwidth by transmitting multiple copies over links Sends way more data than is necessary Server is huge bottleneck Does not scale! Multicast (Peer to Peer (P2P)) Eliminates server bottleneck Accommodates asynchronous data / clients Not widely supported Use Virtual multicast (Overlays) Near optimal scaling!

9 Paper 1 - Background Overlay topologies Clients connect to each other via TCP and form their own virtual network Accommodates multicast (unlike TCP/IP) Can be dynamically altered to accommodate changes in the network Allows modification of en-route nodes to be smarter and to be incorporated in the data distribution Basis for P2P applications

10 Paper 1 - Main Issues Peers need to find out what data each other have Want to keep message transmissions down Want to keep message size down Main Question: How do we represent data on a node? System is/needs to deal with: Asynchronous - messages / processing times Heterogeneous - speed / size / data set Transience - failures / topology changes Scalable - the more nodes, the harder to keep state

11 Paper 1 - Main Issues Scalable Can not keep global state (too much info / too dynamic) Keeping track takes too much processing time / memory Want to avoid negotiating as much as possible Want to keep system diverse (so that information sent is not duplicated) Diversity of data on nodes Erasure coding

12 Paper 1 - Solutions Erasure Coding Scalable Resistant to packet loss Do not need a specific original file segment Data spread across multiple packets Can recover original file from any subset of received packets >= original file size (usually a few % more) Digital Fountain Uses erasure coding Any node may add new data to a packet without increasing its size Must still be wary of making sure all nodes receive a variety of packets

13 Paper 1 - Solutions Data Representation / Transfer We want the most cost effective method Methods: Coarse Grained Want to get a general feel for differences between data sets on nodes Several methods to estimate Speculate Transfers Make educated guess about what to send then transmit (may have duplicates) Fine Grained Compact ways to determine nearly-exact sets of data on a node More detailed than coarse-grain, but supply more information

14 Paper 1 - Coarse Grain Framework Containment Estimates fraction of elements useless to A Resemblance Estimates how similar the two data sets are to each other SA = data set on Node A, SB = data set on Node B Techniques Random sampling (look at your values at random and Tx) Sample only along modulo k (smaller set, variable size) Min-wise sketches (remedies issues of other two)

15 Paper 1 - Coarse Grain Represent data as a key (~64 bits) Send a 1KB packet from B->A with as many keys as possible Transferred data acts as a sample of keys on B A looks at transferred data and compares to local data to estimate differences Data can be chosen: At random At pre-determined locations (0 modulo k) Min-wise sketches

16 Paper 1 - Min-wise Sketches Min-wise sketches Pick some working set of contained data Permute data (predetermined functions) Represent working set as minimum from permutations Compare number of matching minimum on two nodes Elements are equal with probability of the resemblance Can be used to compare between separate sets

17 Paper 1 - Minwise Sketches

18 Paper 1 - Reconciling Differences If two nodes are different, what data should be sent? Must be quick method Must involve little communication The more accurate the better Coarse-grain does not supply a way to find differences (only know that they exist)

19 Paper 1 - Fine Grained Exact Methods: Send list of all elements Very data-heavy! Transmit a hash of data Less data-heavy Probability of double mappings Instead of going for exact representation, just go for close as possible

20 Paper 1 - Fine Grained Bloom Filters Used to find most (at a minimum, some) of the differences between nodes Very compact Operation Use m bits, initially all set to zero Hash n original elements with k = m-1 hash functions Set the hash result bits to 1 in the m-bit array To check if an element is in array, check to see if bits of hash all have value 1 May result in a false positive with probability

21 Paper 1 - Fine Grained B sends Bloom filter to A A checks to see if filter contains elements With m=4, chance of error is 14.7% With m=8, chance of error is 2.2% Use four bits for brevity Can use a new technique, approximate reconciliation trees Combines Bloom filters and merkle trees

22 Paper 1 - Reconciliation Trees Bloom filters, where each parent element represents an entire set Allows traversing tree to find out which elements are different between two sets If parents match, assume no differences in sub-tree Fast search for set differences If too many false positive, force continued search of tree

23 Paper 1 - Reconciliation Trees

24 Paper 1 - Re-encoding Have intermediate (routing) nodes add in their data to content Requires erasure coding content Increases probability of transmitting a useful element Technique: Divide file into l equal sized blocks XOR blocks together Add header indicating what symbols included Receiving a symbol (or set) allows partial decoding

25 Paper 1 - Results Parameters 128MB file 1400 byte-long symbols (95,870 symbols) 64-bit identifiers Average overhead of 2.5% Tested methods: Uninformed collaboration Speculative collaboration Reconciled collaboration

26 Paper 1- Results Results for overhead as expected Uninformed > Speculative > Reconciled Slack = % original file available to nodes Overhead decreases as more file duplicates available

27 Paper 1 - Results Speed up of 1.95 with reconciliation with overhead Best results obtained when updates transferred every symbol updates

28 Paper 1 - Conclusion Main contribution is the format for representing the data that a node has in a succinct manner Erasure Coding data is import to ensure a piece of data is valuable to receiver Paper doesn't address theoretic limits (we only know they outperform other basic methods) Coding methods other than XOR may improve performance further Paper does not address security concerns

29 Paper 2 Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh

30 Brief Intro to the paper What? A high-bandwidth system for data distribution from a single source to a large number of receivers How? Basic components Data Encoding --> improves efficiency RanSub --> distributes disjoint data Delivery Techniques TCP Friendly Rate Control --> maintains steady sending rates

31 Brief Intro to the paper How? Bullet--mesh over overlay tree Finding overlay peers Recovering data from peers Making data disjoint Evaluation Creating disjoint data Evaluating Bullet on a Lossy Network Monitoring performance under node failures

32 Brief Intro to the paper Contributions An algorithm for sending data to any node in a equal possibility A scalable and decentralized algorithm that allows nodes to locate and recover missing data items A complete implementation and evaluation of Bullet, across Internet and a large scale emulation environment

33 ABSTRACT Goal: High-bandwidth data distribution from a single source to a large number of receivers. Argument: An overlay mesh can deliver fundamentally higher bandwidth and reliability relative to typical overlay tree structures. Presented Method: Bullet, a scalable and distributed algorithm that enables nodes spread across the Internet to self-organize into a high bandwidth overlay mesh.

34 1 INTRODUCTION Structure In a tree, children receive identical data sets from parent In a mesh, children receive disjoint (divide + subdivide) data from parents and peers Must maintain properties TCP Friendly Impose low control overhead Algorithm --> decentralized Approach --> robust to individual node failure

35 1 INTRODUCTION How Bullet works? Nodes begin by self-organizing into an overlay tree. Each Bullet node transmits a disjoint set of data to its children A scalable and efficient algorithm to enable nodes to quickly locate multiple peers with missing data items to the node is performed Bullet uses TFRC (TCP Friendly Rate Control) to transfer data both down the overlay tree and among peers

36 1 INTRODUCTION Mesh VS Tree Tree limitation: high overhead associated with the tree construction protocol

37 2 SYSTEM COMPONENTS Data encoding RanSub Informed Content Delivery Techniques TCP Friendly Rate Control (TFRC)

38 2.1 Data Encoding What & Why Depending on the type of the data being distributed through the system, a number of data encoding schemes can improve system efficiency How? Redundant Tornado - Encoding scheme addressed by this paper

39 2.2 RanSub What? A scalable approach to distributing changing, uniform random subsets of global state to all nodes of an overlay tree Step Collect: Leaves--> Root Distribute: Root--> Leaves

40 2.2 RanSub

41 2.3 Informed Content Delivery Techniques What we need: Method for reconciling the differences in the data Bandwidth-efficient method with low computational overhead How? As the methods mentioned in Paper 1

42 2.3 Informed Content Delivery Techniques

43 2.4 TCP Friendly Rate Control What? TFRC targets unicast streaming multimedia applications with a need for less drastic responses to single packet losses Goal Maintaining a relatively steady sending rate while still being responsive to congestion Sending rate given by:

44 3 BULLET What? An efficient data distribution system for bandwidth intensive applications Rather than using a tree, it uses a mesh on top of an overlay tree to increase overall bandwidth to all nodes

45 3.1 Finding Overlay Peers RanSub delivers subsets of uniformly random selected nodes to each participant in the overlay Bullet receivers use the RanSub lists to locate remote peers able to transmit missing data items with good bandwidth

46 3.2 Recovering Data From Peers Sender --> Bloom filter --> Receiver Receiver Installs the received Bloom filter Bloom filter says what data sender has Periodically transmits keys not present in the filter to Bloom filter originator

47 3.2 Recovering Data From Peers

48 3.3 Making Data Disjoint A node p maintains for every child: sfi: sending factor proportion of its stream the child gets according the descendants the child has lfi: limiting factor proportion of the parent rate beyond the sending factor that each child can handle

49 3.3 Making Data Disjoint

50 3.4 Improving the Bullet Mesh Attempt to make each node have max senders and receivers How to make the current peering relationship optimal Each node evaluates the bandwidth performance it is receiving from its sending peers. If receiving too many duplicate --> drop If small portion of data is useful --> drop

51 4 EVALUATION

52 4.1 Offline Bottleneck Bandwidth Tree Currently, there is no overlay mesh constructed using Bullet (relative to the best possible tree) So a simple greedy offline algorithm determines the connectivity of the tree likeliest to deliver a high level of bandwidth Need the bottleneck to have bounds Have some assumptions Based these assumptions, concentrate on estimating the throughput available between two participants in the overlay

53 4.2 Bullet vs. Streaming

54 4.2 Bullet vs. Streaming

55 4.2 Bullet vs. Streaming

56 4.2 Bullet vs. Streaming

57 4.3 Creating Disjoint Data

58 4.4 Epidemic Approaches

59 4.5 Bullet on a Lossy Network

60 4.6 Performance Under Failure

61 4.6 Performance Under Failure

62 4.7 PlanetLab

63 CONCLUSION Argument: an overlay mesh is able to deliver fundamentally higher bandwidth than a tree Difficulty: nodes in the mesh do not repeatedly receive the same data from peers Solution: Bullet --> a scalable and efficient overlay construction algorithm that overcomes this challenge to deliver significant bandwidth improvements relative to traditional tree structure

64 Paper 3 Enabling Content Dissemination Using Efficient and Scalable Multicast

65 Intro to This Paper Multicast uses network and server resources in an efficient manner to disseminate info to groups Challenges: a. Network should focus more on information b. Dealing with increasing number of groups c. Support of persistent group membership d. Scalability

66 Proposed Solution - MAD Overview to MAD: MAD stands for Multicast with Adaptive Dual-state. MAD offers efficient multicast services at massive scale. MAD supports large numbers of multicast groups.

67 Intro to Multicast Multicast provides efficient and explicit performance benefits Multicast not been widely used: Lack of support by ISPs Lack of application demand

68 Revival of Multicast Internet is becoming more informationcentered Expectations of scalable and efficient delivery of information to large user groups For instance: IPTV Multi-player online games Video conferencing Grid computing File sharing

69 Sources of demand for multicast Increasing: Number of groups Time of group membership Range of activities across groups Flexibility of activities in a group

70 MAD Specifications Strengths of MAD: Decouples group membership from forwarding state, thus supporting persistence in group membership Has different treatments for active and inactive groups, thus realizing data forwarding efficiency and scalability of group numbers Gives transparency in the environment of dynamic changes in group's activity levels

71 MAD Specifications Related methods in terms of multicast: IP multicast-style Multicast forwarding state reduction Peer-to-Peer content distribution Points of departure (nodes leave tree)

72 Deeper exploration into MAD MAD environment: Manages user profile, authenticates users, and provides access control in a fine-grained way MAD example IP multicast tree illustrates a set of routers that forms a traditional IP multicast tree. There are 5 users to this single multicast group.

73 Membership Tree Nodes and Final Membership Tree States

74 Modular Design of MAD Protocol 5 key components*: Membership tree sub-protocol Distribution tree sub-protocol State transition Mechanisms Failure Recovery Ways of operating across domain boundaries (* Refer to the paper for details on realizing these components)

75 Scaling of MAD Trees Several figures of simulation results on network topologies are shown. The state need of MAD trees are examined. The trade-off between state reduction and forward cost are analyzed.

76 Conclusion Multicast uses network and server resources in an efficient way to distribute data to groups Challenges include: information-centric network, increasing number of groups, supporting persistent group membership, and scalability. MAD is devised to provide efficient multicast service and offers good scalability through decoupling group membership and forwarding state, and targets active and inactive groups with different methods

77 Conclusion Cont'd A high-level analysis of multimedia trees and membership trees is illustrated, together with mathematical derivations. Moreover, MAD protocols are analyzed, simulated and implemented. The results indicate that MAD achieves about 10% reduction in control overhead and state requirements. Increasing demands from networks are met in an more efficient and scalable way.

78 Main Paper SplitStream: High-Bandwidth Multicast in Cooperative Environments

79 Introduction Another alternative for IP multicast: endsystem or application-level multicast Advantages: applies only unicast network services to route and disseminate messages Main theme of this paper: application-level multicast in p2p / cooperative environments Feature of this environment: peers are awarded for contributing resources and are allowed to use the service

80 Shortcomings Conventional Multicast: Primarily relies on tree-based multicast, not a good match for the desired cooperative environment Copying and forwarding traffic is done through a small portion of peers inside nodes in the tree topology A large portion of nodes are at the leaf and make no contributions Conflict 1: not all nodes are contributing in this cooperative environment Conflict 2: in high BW applications, a peer's limited capacity may be prohibitive in applications like video

81 Briefly, what does SplitStream do? Splits the content into k stripes and multicasts each stripe using a separate tree Peers may be asked to join many trees, in terms of desired stripes, and can set an upper limit on the number of stripes they wish to forward Challenges: building a forest of various trees so that inside nodes are leaf nodes in all the other trees within the forest, under the constraints of per-node BandWidth

82 Advantages of SplitStream Improves system flexibility in the case of node failures by striping across multiple trees The role of SplitStream: the majority of nodes are interior nodes to only one tree Result 1: on average, a node's failure leads to a loss of <=1 stripes Result 2: the tree topology is more fault-tolerant for the benefits of multicast

83 Challenges in Designing SplitStream Build the multicast forest in a scalable, decentralized, independent and efficient way for the joined nodes Depends on a p2p overlay to build and maintain the trees Using the PlanetLab Internet testbed and a large-scale network simulator to evaluate SplitStream's performance

84 2. SplitStream Approach Overview Tree-based multicast SplitStream Applications Properties

85 Tree-based multicast The interior nodes are in charge of sending all the forwarding multicast messages. In a balanced tree with fanout f and height h, we obtain that the number of leafs is f, and the number of interior nodes is (fh-1)/(f-1)

86 SplitStream Why SplitStream? To solve the issue of unbalanced load forwarding in the previous tree-based multicast system To disseminate the forwarding load in a balanced way to the corresponding nodes To split the multicast stream into several stripes To use separate multicast trees to disseminate each stripe

87 SplitStream Example: The original content is split into two stripes and multicast separate trees. The content is separated into Besides the source, every peer receives both stripes inducing an inbound bandwidth. k stripes. peers receive a portion of the stripes, and have the inbound bandwidth requirement in increments of B/K. B = inbound BW

88 Applications SplitStream: Offers an infrastructure for content distribution with high-bandwidth Manages how content is encoded and split into stripes Constructs the multicast trees for the stripes, and is constrained by the per-node bandwidth limits Applications: Need mechanisms to obtain content from other peers in the system Control when to create and tear down a SplitStream forest

89 Properties Necessary and sufficient conditions for the feasibility for building the SplitStream tree Condition 1: Sum of desired in-degrees cannot exceed the sum of forwarding capacities Condition 2: Any node whose forwarding capacity exceeds their indegree must receive or forward all stripes

90 Background SplitStream is implemented using tree-based application-level multicast. Many proposals exist for building and maintaining overlay multicast trees Two methods of implementation: Pastry Scribe

91 Pastry Scalable and self-organizing structured p2p overlay network Similar to CAN, Chord, and Tapestry Given a message and a key, Pastry routes the message to the node with the node ID which is numerically closest to the key. This is called the key's root. Each node maintains a routing table and a leaf set. Each Pastry node also maintains the set of neighboring nodes

92 Pastry

93 Scribe An application-level group communication system constructed on Pastry A pseudo-random Pastry key is chosen from each multicast group. It is known as groupid. A multicast tree of a certain group is formed by unioning Pastry routes from each group member to the groupid's root Messages are multicast from the root to the members using reverse path forwarding.

94 Scribe Pastry s local route convergence ensures that the load imposed on the physical network is small because most message replication occurs at intermediate nodes that are close in the network to the leaf nodes in the tree. Scribe can support lots of groups, arbitrary numbers of group members, and groups with highly dynamic membership well.

95 Pastry

96 4. SplitStream Design

97 4.1 Building interior-node-disjoint trees Tree --> interior-node-disjoint if Each interior node is in at most one tree Leaf node in the other tree

98 4.1 Building interior-node-disjoint trees

99 4.2 Limiting node degree Inbound BW is proportional to desired indegree Desired indegree --> number of stripes node chooses to receive Assumption: each node receives and forwards at least the stripe whose stripeid shares a prefix with its nodeid --> interior node Outbound BW May exceed a node's forwarding capacity without limiting its outdegree

100 4.2 Limiting Node Degree Scribe has a built-in mechanism to limit outdegree in the following procedure When node reaches max outdegree, receives request from perspective children Reply with a list of current children Perspective child seek the one with lowest delay Root --> Leaves to terminate BUT NOT FOR SPILITSTREAM

101 4.3 Locating parents Node adopts the prospective child regardless of limit Evaluate its new set of children to select one to reject Look for stripeid that does not share a prefix with local nodeid If prospective node's ID matches --> select If not, randomly select from set Look for nodeid with shortest prefix match If prospective node's ID matches --> select If not, randomly select from set Then the chosen child is orphaned

102 4.3 Locating parents

103 4.3 Locating Parents For an orphaned child to locate new parent Examines former siblings and attempts to attach to a random former sibling that shares a prefix match with the stripeid for which it seeks a parent Siblings use same algorithm Execute recursively If orphan hasn't found a parent, use the spare capacity group

104 4.4 Spare Capacity Group (SCG) Spare capacity group includes all nodes that have less children in their stripe trees than their forwarding capacity limit Scribe delivers anycast message to SCG near the orphan DFS For nodes: if no children, check whether it receives the stripe the orphan tried to receive

105 4.4 Spare Capacity Group

106 4.5 Correctness and Complexity 2 assumptions: The communication is reliable to ensure all spare capacity in the system is available in spare capacity group Nodes do not leave the system either voluntarily or due to failures

107 4.5 Correctness and complexity Estimate the probability that the algorithm leaves an orphan that cannot find a desired stripe

108 4.5 Correctness and complexity 2 ways for a node i to acquire a parent for each selected stripe s (1): joining the stripe tree directly without using the spare capacity group (2): anycasting to the spare capacity group if s.stripeid starts with the same digit as i. nodeid (1) will be used, may orphan other node (2) will never be used

109 4.5 Correctness and complexity If s.stripeid does not start with the same digit as i.nodeid i may fail after being pushed down at most h times (h = height of the tree) using (1) Does not make other node orphan Balanced tree h = log N

110 4.5 Correctness and complexity If i and s share digits, and i finds a parent in s, and j becomes orphan, j attempts use (1), 3 cases: (a): j looses a stripe r (r!= s) (b): j looses stripe s and the identifiers of j and s do not share the first digit (c): j looses stripe s and the identifiers of j and s share the first digit In (a) and (b), j either finds a parent or fails to find a parent after being pushed down for h times In (c), j = i

111 4.5 Correctness and complexity If orphan j attempts to locate a parent for stripe r by anycasting, it may fail to find a node in the spare capacity group that receives stripe r. This probability --> Pf

112 4.5 Correctness and complexity Pf An upper bound of Pf Assuming set 1...L nodes in spare group, with indegree I1...IL If all nodes join at least Imin stripes, no indegrees needed

113 4.5 Correctness and complexity This bound holds even with concurrent anycasts, because we use the minimum spare capacity in the system to compute the bound.

114 4.5 Correctness and complexity At most N nodes join at most k stripes for each node The number of anycasts issued during forest construction that may fail is bounded by N * k The P that algorithm fails to build a feasible forest The probability of failure is very low even with a modest amount of spare capacity in the system. Guarantee: build a forest if desired indegrees do not exceed forwarding capacities even with no spare capacity

115 4.5 Correctness and complexity Complexity ( of forest construction) The expected amount of the state maintained by each mode O(log N ) The expected number of messages to build the forest is O( N log N ) --> well balanced O( N 2) --> worst case

116 5. Experimental Evaluation Experimental Setup Added in own propagation delay (1ms) Ignores (impedes large-scale simulation): Queuing Delay Packet loss Cross traffic Physical SplitStream setup: LAN for setting up

117 5. Experimental Evaluation Three Models used: GATech Georgia Tech random graph generator Average of 10 topologies used Mercator Topology generated from measurements of the Internet Includes AS generation CorpNet Measurements of Microsoft's corporate network

118 5. Experimental Evaluation Gnutella Trace for actual data SplitStream Configuration Split files into l=16 stripes 320Kbps / stream 20Kbps / stripe SplitStream Implementation Optimizations to: Reduce stored path complexity Batch together transmissions Reduce total transmissions

119 5. Experimental Evaluation Metrics Node Stress - Average number of messages received per node Link Stress - Total number of messages sent over a link

120 5.2 Forest Construction Overhead Setup 90% complete by stress level 100. Stress level varies little as more nodes added 6.8 times lower setup than Centralized system with equivalent number of nodes

121 5.3 Forest Multicast Performance Over 40,000 nodes - performed well Results: RAD = Average (delay per stripe / IP multicast) RMD=(max delay per stripe)/(max delay IP multicast)

122 5.4 Resilience to Node Failures 25% failures instantaneous(of 10,000) One failure affects entire system Recovers after ~1 minute

123 5.4 Resilience to Node Failures PlanetLab 72 total systems, 8 brought down at t=35 Huge drop, recovery takes some time

124 5.4 Resilience to Node Failures Large churn on Gnutella trace Results over 7 minute interval Figure shows control messages per time

125 Conclusions Did not address non-lan setup Much of design ignored node failures Paper runs with delay of 1ms (unrealistic)

126 Questions

Multicast. Presented by Hakim Weatherspoon. Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010

Multicast. Presented by Hakim Weatherspoon. Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010 Multicast Presented by Hakim Weatherspoon Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010 Midterm report abstract, introduction, background, related work, and design section. These sections should

More information

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination By Shelley Zhuang,Ben Zhao,Anthony Joseph, Randy Katz,John Kubiatowicz Introduction Multimedia Streaming typically involves

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General 1 ELT-53206 Peer-to-Peer Networks Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original

More information

High-Bandwidth Data Dissemination for Large-Scale Distributed Systems

High-Bandwidth Data Dissemination for Large-Scale Distributed Systems High-Bandwidth Data Dissemination for Large-Scale Distributed Systems DEJAN KOSTIĆ Ecole Polytechnique Fédérale de Lausanne ALEX C. SNOEREN, AMIN VAHDAT, RYAN BRAUD, CHARLES KILLIAN, and JAMES W. ANDERSON

More information

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General 1 ELT-53207 P2P & IoT Systems Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original

More information

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Master s Thesis Title A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Supervisor Professor Masayuki Murata Author Hideto Horiuchi February 14th, 2007 Department

More information

Understanding Mesh-based Peer-to-Peer Streaming

Understanding Mesh-based Peer-to-Peer Streaming Understanding Mesh-based Peer-to-Peer Streaming Nazanin Magharei, Reza Rejaie Department of Computer and Information Science University of Oregon {nazanin,reza}@cs.uoregon.edu ABSTRACT A common approach

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Peer Assisted Content Distribution over Router Assisted Overlay Multicast

Peer Assisted Content Distribution over Router Assisted Overlay Multicast Peer Assisted Content Distribution over Router Assisted Overlay Multicast George Xylomenos, Konstantinos Katsaros and Vasileios P. Kemerlis Mobile Multimedia Laboratory & Department of Informatics Athens

More information

SAAR: A Shared Control Plane for Overlay Multicast

SAAR: A Shared Control Plane for Overlay Multicast SAAR: A Shared Control Plane for Overlay Multicast Animesh Nandi Aditya Ganjam Peter Druschel T. S. Eugene Ng Ion Stoica Hui Zhang Bobby Bhattacharjee Φ Max Planck Institute for Software Systems Rice University

More information

Debunking some myths about structured and unstructured overlays

Debunking some myths about structured and unstructured overlays Debunking some myths about structured and unstructured overlays Miguel Castro Manuel Costa Antony Rowstron Microsoft Research, 7 J J Thomson Avenue, Cambridge, UK Abstract We present a comparison of structured

More information

Overlay Networks for Multimedia Contents Distribution

Overlay Networks for Multimedia Contents Distribution Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)

More information

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi Efficient Content Delivery and Low Complexity Codes Amin Shokrollahi Content Goals and Problems TCP/IP, Unicast, and Multicast Solutions based on codes Applications Goal Want to transport data from a transmitter

More information

L3S Research Center, University of Hannover

L3S Research Center, University of Hannover , University of Hannover Dynamics of Wolf-Tilo Balke and Wolf Siberski 21.11.2007 *Original slides provided by S. Rieche, H. Niedermayer, S. Götz, K. Wehrle (University of Tübingen) and A. Datta, K. Aberer

More information

Codes, Bloom Filters, and Overlay Networks. Michael Mitzenmacher

Codes, Bloom Filters, and Overlay Networks. Michael Mitzenmacher Codes, Bloom Filters, and Overlay Networks Michael Mitzenmacher 1 Today... Erasure codes Digital Fountain Bloom Filters Summary Cache, Compressed Bloom Filters Informed Content Delivery Combining the two

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 22: Overlay networks Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

! Naive n-way unicast does not scale. ! IP multicast to the rescue. ! Extends IP architecture for efficient multi-point delivery. !

! Naive n-way unicast does not scale. ! IP multicast to the rescue. ! Extends IP architecture for efficient multi-point delivery. ! Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination ACM NOSSDAV 001 Shelley Q. Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John D. Kubiatowicz {shelleyz, ravenben,

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

Interdomain Routing Design for MobilityFirst

Interdomain Routing Design for MobilityFirst Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network

More information

Peer-to-Peer Streaming Systems. Behzad Akbari

Peer-to-Peer Streaming Systems. Behzad Akbari Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues

More information

Arvind Krishnamurthy Fall 2003

Arvind Krishnamurthy Fall 2003 Overlay Networks Arvind Krishnamurthy Fall 003 Internet Routing Internet routing is inefficient: Does not always pick the lowest latency paths Does not always pick paths with low drop rates Experimental

More information

08 Distributed Hash Tables

08 Distributed Hash Tables 08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per

More information

Informed Content Delivery Across Adaptive Overlay Networks

Informed Content Delivery Across Adaptive Overlay Networks Informed Content Delivery Across Adaptive Overlay Networks John Byers byers@cs.bu.edu Jeffrey Considine jconsidi@cs.bu.edu Dept. of Computer Science Boston University Boston, Massachusetts Michael Mitzenmacher

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 5, OCTOBER Informed Content Delivery Across Adaptive Overlay Networks

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 5, OCTOBER Informed Content Delivery Across Adaptive Overlay Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 5, OCTOBER 2004 767 Informed Content Delivery Across Adaptive Overlay Networks John W. Byers, Jeffrey Considine, Michael Mitzenmacher, Member, IEEE, and

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

An Evaluation of Three Application-Layer Multicast Protocols

An Evaluation of Three Application-Layer Multicast Protocols An Evaluation of Three Application-Layer Multicast Protocols Carl Livadas Laboratory for Computer Science, MIT clivadas@lcs.mit.edu September 25, 2002 Abstract In this paper, we present and evaluate three

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

Routing Protocol comparison

Routing Protocol comparison Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate

More information

Efficient and Flexible Parallel Retrieval using Priority Encoded Transmission

Efficient and Flexible Parallel Retrieval using Priority Encoded Transmission Efficient and Flexible Parallel Retrieval using Priority Encoded Transmission Ramaprabhu Janakiraman, Lihao Xu Department of Computer Science and Engineering Washington University in St. Louis St. Louis,

More information

Overlay Multicast. Application Layer Multicast. Structured Overlays Unstructured Overlays. CAN Flooding Centralised. Scribe/SplitStream Distributed

Overlay Multicast. Application Layer Multicast. Structured Overlays Unstructured Overlays. CAN Flooding Centralised. Scribe/SplitStream Distributed Overlay Multicast Application Layer Multicast Structured Overlays Unstructured Overlays CAN Flooding Centralised Scribe/SplitStream Distributed PeerCast 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt

More information

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 Security for Structured Peer-to-peer Overlay Networks By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 1 Acknowledgement Some of the following slides are borrowed from talks by Yun Mao

More information

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured

More information

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

Live Streaming in Overlay Networks

Live Streaming in Overlay Networks Live Streaming in Overlay Networks Mário Rui Vazão Vasco Ferreira mvvf@gsd.inesc-id.pt Instituto Superior Técnico (Advisor: Professor Luís Rodrigues) Abstract. Overlay networks have emerged as a promising

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivation CS 268: IP Multicast Routing Ion Stoica April 8, 2003 Many applications requires one-to-many communication - E.g., video/audio conferencing, news dissemination, file updates, etc. Using unicast

More information

Efficient and Load-Balance Overlay Multicast Scheme with Path Diversity for Video Streaming

Efficient and Load-Balance Overlay Multicast Scheme with Path Diversity for Video Streaming Efficient and Load-Balance Overlay Multicast Scheme with Path Diversity for Video Streaming Chao-Lieh Chen 1, Jeng-Wei Lee 2, Jia-Ming Yang 2, and Yau-Hwang Kuo 2 1 Department of Electronic Engineering,

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Fast, Efficient, and Robust Multicast in Wireless Mesh Networks

Fast, Efficient, and Robust Multicast in Wireless Mesh Networks fast efficient and robust networking FERN Fast, Efficient, and Robust Multicast in Wireless Mesh Networks Ian Chakeres Chivukula Koundinya Pankaj Aggarwal Outline IEEE 802.11s mesh multicast FERM algorithms

More information

05 Indirect Communication

05 Indirect Communication 05 Indirect Communication Group Communication Publish-Subscribe Coulouris 6 Message Queus Point-to-point communication Participants need to exist at the same time Establish communication Participants need

More information

Degree Hunter: on the Impact of Balancing Node Degrees in de Bruijn- Based Overlay Networks

Degree Hunter: on the Impact of Balancing Node Degrees in de Bruijn- Based Overlay Networks Degree Hunter: on the Impact of Balancing Node Degrees in de Bruijn- Based Overlay Networks 23 April 2010 Pierre FRAIGNIAUD * - Hoang Anh PHAN** (*) (**) CNRS/LIAFA and University Paris Diderot Loading

More information

Lecture 6: Multicast

Lecture 6: Multicast Lecture 6: Multicast Challenge: how do we efficiently send messages to a group of machines? Need to revisit all aspects of networking Last time outing This time eliable delivery Ordered delivery Congestion

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality

Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Amin Vahdat Department of Computer Science Duke University 1 Introduction Increasingly,

More information

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Load Sharing in Peer-to-Peer Networks using Dynamic Replication Load Sharing in Peer-to-Peer Networks using Dynamic Replication S Rajasekhar, B Rong, K Y Lai, I Khalil and Z Tari School of Computer Science and Information Technology RMIT University, Melbourne 3, Australia

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

From Routing to Traffic Engineering

From Routing to Traffic Engineering 1 From Routing to Traffic Engineering Robert Soulé Advanced Networking Fall 2016 2 In the beginning B Goal: pair-wise connectivity (get packets from A to B) Approach: configure static rules in routers

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure

Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 8, OCTOBER 2002 1489 Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie

More information

Cooperative End-to-end content distribution. Márk Jelasity

Cooperative End-to-end content distribution. Márk Jelasity Cooperative End-to-end content distribution Márk Jelasity Content distribution So far we looked at search Content distribution is about allowing clients (peers) to actually get a file or other data after

More information

A Decentralized Content-based Aggregation Service for Pervasive Environments

A Decentralized Content-based Aggregation Service for Pervasive Environments A Decentralized Content-based Aggregation Service for Pervasive Environments Nanyan Jiang, Cristina Schmidt, Manish Parashar The Applied Software Systems Laboratory Rutgers, The State University of New

More information

Architecture and Implementation of a Content-based Data Dissemination System

Architecture and Implementation of a Content-based Data Dissemination System Architecture and Implementation of a Content-based Data Dissemination System Austin Park Brown University austinp@cs.brown.edu ABSTRACT SemCast is a content-based dissemination model for large-scale data

More information

EE122: Multicast. Kevin Lai October 7, 2002

EE122: Multicast. Kevin Lai October 7, 2002 EE122: Multicast Kevin Lai October 7, 2002 Internet Radio www.digitallyimported.com (techno station) - sends out 128Kb/s MP3 music streams - peak usage ~9000 simultaneous streams only 5 unique streams

More information

Chainsaw: Eliminating Trees from Overlay Multicast

Chainsaw: Eliminating Trees from Overlay Multicast Chainsaw: Eliminating Trees from Overlay Multicast Vinay Pai, Kapil Kumar, Karthik Tamilmani, Vinay Sambamurthy, Alexander E. Mohr Department of Computer Science Stony Brook University {vinay,kkumar,tamilman,vsmurthy,amohr}@cs.stonybrook.edu

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

Efficient Multimedia Distribution in Source Constraint Networks

Efficient Multimedia Distribution in Source Constraint Networks Efficient Multimedia Distribution in Source Constraint Networks Thinh Nguyen, Member, IEEE, Krishnan Kolazhi, Member, IEEE, Rohit Kamath, Member, IEEE, Sen-ching Cheung, Senior Member, IEEE and Duc Tran,

More information

Real-Time Applications. Delay-adaptive: applications that can adjust their playback point (delay or advance over time).

Real-Time Applications. Delay-adaptive: applications that can adjust their playback point (delay or advance over time). Real-Time Applications Tolerant: can tolerate occasional loss of data. Intolerant: cannot tolerate such losses. Delay-adaptive: applications that can adjust their playback point (delay or advance over

More information

EE122: Multicast. Internet Radio. Multicast Service Model 1. Motivation

EE122: Multicast. Internet Radio. Multicast Service Model 1. Motivation Internet Radio EE122: Multicast Kevin Lai October 7, 2002 wwwdigitallyimportedcom (techno station) - sends out 128Kb/s MP music streams - peak usage ~9000 simultaneous streams only 5 unique streams (trance,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1

Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1 Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1 Contents: Introduction Multicast on parallel distributed systems Multicast on P2P systems Multicast on clouds High performance

More information

Introduction to Sync

Introduction to Sync Introduction to Sync Outline NDN Sync overview Sync protocol design issues Sync protocol for mobile ad-hoc networks What is NDN Sync? New transport service for data-centric networking [1] Synchronizing

More information

CS 268: Lecture 7 (Beyond TCP Congestion Control)

CS 268: Lecture 7 (Beyond TCP Congestion Control) Outline CS 68: Lecture 7 (Beyond TCP Congestion Control) TCP-Friendly Rate Control (TFRC) explicit Control Protocol Ion Stoica Computer Science Division Department of Electrical Engineering and Computer

More information

Flash Crowd Handling in P2P Live Video Streaming Systems

Flash Crowd Handling in P2P Live Video Streaming Systems Flash Crowd Handling in P2P Live Video Streaming Systems by Anurag Dwivedi (10327132) Department of Electrical Engineering Indian Institute of Technology, Kanpur May 2015 Flash Crowd Handling in P2P Live

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

AN ABSTRACT OF THE THESIS OF. Krishnan Kolazhi for the degree of Master of Science in Computer Science

AN ABSTRACT OF THE THESIS OF. Krishnan Kolazhi for the degree of Master of Science in Computer Science AN ABSTRACT OF THE THESIS OF Krishnan Kolazhi for the degree of Master of Science in Computer Science presented on June 5, 2006. Title: Node and Topology Management for Content Distribution in Source Constraint

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Advanced Networking. Multicast

Advanced Networking. Multicast Advanced Networking Multicast Renato Lo Cigno Renato.LoCigno@dit.unitn.it Homepage: disi.unitn.it/locigno/index.php/teaching-duties/advanced-networking Multicasting Addresses that refer to group of hosts

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering Hema T. Kaur, Shivkumar Kalyanaraman ECSE Department, Rensselaer Polytechnic Institute, Troy, NY-12180 {hema,shivkuma}@networks.ecse.rpi.edu

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

ECSE-6600: Internet Protocols Spring 2007, Exam 1 SOLUTIONS

ECSE-6600: Internet Protocols Spring 2007, Exam 1 SOLUTIONS ECSE-6600: Internet Protocols Spring 2007, Exam 1 SOLUTIONS Time: 75 min (strictly enforced) Points: 50 YOUR NAME (1 pt): Be brief, but DO NOT omit necessary detail {Note: Simply copying text directly

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

Application Layer Multicast with Proactive Route Maintenance over Redundant Overlay Trees

Application Layer Multicast with Proactive Route Maintenance over Redundant Overlay Trees 56893792 Application Layer Multicast with Proactive Route Maintenance over Redundant Overlay Trees Yohei Kunichika, Jiro Katto and Sakae Okubo Department of Computer Science, Waseda University {yohei,

More information

Fault Tolerant and Secure Architectures for On Chip Networks With Emerging Interconnect Technologies. Mohsin Y Ahmed Conlan Wesson

Fault Tolerant and Secure Architectures for On Chip Networks With Emerging Interconnect Technologies. Mohsin Y Ahmed Conlan Wesson Fault Tolerant and Secure Architectures for On Chip Networks With Emerging Interconnect Technologies Mohsin Y Ahmed Conlan Wesson Overview NoC: Future generation of many core processor on a single chip

More information

Secure and Robust Overlay Content Distribution

Secure and Robust Overlay Content Distribution Secure and Robust Overlay Content Distribution A THESIS SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY Hun Jeong Kang IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

FAULT TOLERANT REAL TIME COMMUNICATION IN MULTIHOP NETWORKS USING SEGMENTED BACKUP

FAULT TOLERANT REAL TIME COMMUNICATION IN MULTIHOP NETWORKS USING SEGMENTED BACKUP Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1074

More information

IPv6 and Multicast. Outline. IPv6 Multicast. S Computer Networks - Spring 2005

IPv6 and Multicast. Outline. IPv6 Multicast. S Computer Networks - Spring 2005 IPv6 and Multicast 188lecture5.ppt Pasi Lassila 1 Outline IPv6 Multicast 2 IPv6 overview Motivation Internet growth (address space depletion and routing information eplosion) CIDR has helped but eventually

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

GNUnet Distributed Data Storage

GNUnet Distributed Data Storage GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview

More information

Octoshape. Commercial hosting not cable to home, founded 2003

Octoshape. Commercial hosting not cable to home, founded 2003 Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Brocade: Landmark Routing on Peer to Peer Networks. Ling Huang, Ben Y. Zhao, Yitao Duan, Anthony Joseph, John Kubiatowicz

Brocade: Landmark Routing on Peer to Peer Networks. Ling Huang, Ben Y. Zhao, Yitao Duan, Anthony Joseph, John Kubiatowicz Brocade: Landmark Routing on Peer to Peer Networks Ling Huang, Ben Y. Zhao, Yitao Duan, Anthony Joseph, John Kubiatowicz State of the Art Routing High dimensionality and coordinate-based P2P routing Decentralized

More information

Approximate Aggregation Techniques for Sensor Databases

Approximate Aggregation Techniques for Sensor Databases Approximate Aggregation Techniques for Sensor Databases John Byers Computer Science Department Boston University Joint work with Jeffrey Considine, George Kollios and Feifei Li Sensor Network Model Large

More information

Topology Optimization in Hybrid Tree/Mesh-based Peer-to-Peer Streaming System

Topology Optimization in Hybrid Tree/Mesh-based Peer-to-Peer Streaming System 88 Topology Optimization in Hybrid Tree/Mesh-based Peer-to-Peer Streaming System Tran Thi Thu Ha 1, Jinsul Kim 1, Jaehyung Park 1 Sunghyun Yoon 2, Ho-Yong Ryu 2 1 School of Electronics & Computer Engineering,

More information

Overlay multicasting of real-time streams in virtual environments

Overlay multicasting of real-time streams in virtual environments University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Overlay multicasting of real-time streams in virtual environments

More information

Location-aware In-Network Monitoring in Wireless Sensor Networks

Location-aware In-Network Monitoring in Wireless Sensor Networks Location-aware In-Network Monitoring in Wireless Sensor Networks Volker Turau and Christoph Weyer Department of Telematics, Technische Universität Hamburg-Harburg Schwarzenbergstraße 95, 21073 Hamburg,

More information

Handling Churn in a DHT

Handling Churn in a DHT Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get

More information