A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems

Size: px
Start display at page:

Download "A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems"

Transcription

1 2013 Third International Conference on Intelligent System Design and Engineering Applications A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems Liu Guanxiu, Ye Suqi, Huang Xinli Department of Computer Science and Technology, East China Normal University, Shanghai , China gxliu920@gmail.com, ysq227@163.com, xlhuang@cs.ecnu.edu.cn Abstract The Peer-to-Peer (P2P) file sharing system is one of the most widely-used P2P applications. Its traffic represents about 60%~80% of the whole Internet traffic. BitTorrent is a representative P2P file sharing system. In such systems, the schemes of choosing neighbors and selecting pieces are mainly based on the knowledge of overlay topologies, without considering the underlying Internet topology, which may lead to too much inter-isp (Internet Service Provider) traffic and serious performance degrading of the whole systems. To overcome these problems, we design a new scheme to improve the performance of BitTorrent-like P2P file sharing systems, inspired by the idea of Application Level Traffic Optimization (ALTO). Firstly, we propose a novel approach to make BitTorrent node aware of the topology of underlying networks. Then we modify BitTorrent's original algorithms and replace them with three new localized algorithms based on autonomous system (AS) hops. Finally, we conduct comprehensive experiments to verify the correctness and effectiveness of our scheme based on the General Peer-to-Peer Simulator (GPS). The simulation result shows that, with our scheme, nodes in BitTorrent-like systems have better sense of the topology of their underlying networks, and can interact more efficiently. Besides, our scheme can help to decrease inter-as or inter-isp traffic, optimize traffic distribution across the whole networks, and improve the quality of experience of P2P users. Keywords-Peer-to-Peer Networks; File Sharing Systems; Traffic Optimization; BitTorrent; AS Hops I. INTRODUCTION Peer-to-Peer (P2P) systems have gained tremendous popularity in the past few years. More and more users are continually joining such systems and more resources are being made available, which attracts even more users to join. P2P applications including file sharing systems such as BitTorrent, edonkey have seized about 60%~80% of the entire Internet traffic. The ever-increasing traffic not only brings enormous revenues to Internet Service Providers (ISPs), but also poses a significant engineering challenge to ISPs. By building overlay networks that are oblivious to the underlying Internet topology and routing, P2P systems make several network resources irrationally utilized and P2P traffic always starves the bandwidth of other applications like web traffic. In fact, previous studies have shown that many of the requested P2P objects were downloaded from peers outside the local network even though they were locally available. ISPs have to pay more for the inter-isp traffic. That increases the operating cost of ISPs. The reason why BitTorrent-like P2P file sharing systems bring so much inter-isp traffic is that BitTorrent-like P2P file sharing systems always use random methods to choose neighbors and don t concern the impact brought by data transmission between inter-isp peers which may lead to performance degrading of the whole network. Besides, the limited links may be occupied by the vast inter-isp traffic and these ISPs would be overloaded. In this way, the opposing reaction of ISPs will occur. Meanwhile, the inter-isp links are always the network bottleneck of heavy congestion. Consequently, the download rate of P2P systems may be influenced and then the function will be weakened. All of this may result in serious performance degrading of the whole systems. Usually, ISPs limit the traffic of BitTorrent-like P2P file sharing systems by closing download ports and limiting bandwidth to decrease operating cost. These approaches can only decrease the data transmission rate, but it can t decrease the whole P2P traffic essentially. On the other hand, the links between ISPs are limited. These links are important because they bear the transmission responsibilities of data and route information. Consequently, they may become bottlenecks when the traffic is heavy. There are many solutions such as estimating topology information focusing on predicting network distance in terms of latency, constructing some entities to feed back the underlying topology information to overlay and etc. We, in this paper, adopt partial idea of the latter, and cluster the P2P nodes based on which Autonomous System (AS) they belong to. Under the administering of the leaders, the P2P nodes load will be lightened. In order to guide the behaviors of all peers in terms of global view, we also construct resource indexing entities. These entities can also initiate load balancing process according to the information which they have known. We perform event-based simulations to evaluate the performance of our algorithm with BitTorrent protocol. The results also show that our scheme can improve the performance of P2P file sharing systems. The rest of this paper is organized as follows. In Section II, we introduce the Application Layer Traffic Optimization (ALTO) problem, the BitTorrent-like P2P file sharing systems and some existing solutions. Our improved algorithms are described in Section III. In Section IV, we evaluate the performance of our algorithms using event-driven simulation. Section V concludes the paper. II. RELATED WORK A. The Application Layer Traffic Optimization (ALTO [1]) Approach As is often the case, P2P systems ensure that popular contents are received by peers in the overlay. However, most P2P systems usually employ an arbitrary peer selection policy that ignores the underlying Internet /12 $ IEEE DOI /ISDEA

2 topology and ISP link costs, establishing connections between randomly chosen subsets of cooperating peers from around the world. This behavior may lead to suboptimal choices. Most distributed hash tables (DHT) use greedy forwarding algorithms to reach their destination, making decisions that may not turn out to be globally optimized. This naturally leads to the ALTO problem: how to best provide the topology of the underlying network while at the same time allowing the requesting node to use such information to effectively reach the node on which the content resides. Thus, it would appear that P2P networks with their application layer routing strategies based on overlay topologies are in direct competition against the Internet routing and topology [2]. One way to solve the ALTO problem is to build network coordinate systems which embed the network topology into a low dimensional coordinate space and enable network distance estimations based on latency. But this is not always without errors. Because the latency may be fluctuating, which impact the accuracy of distance estimations. Furthermore, while routing in a low dimensional coordinate space, the problem of local minima [3] is inevitable. Instead of building topology network coordinate systems on the application level through distributed measurements, this information could also be provided by ISPs or other entities. Because they have full knowledge of the topology of the networks they operate on. In order to avoid congestion on critical links, they are interested in helping applications to optimize the traffic they generate. P4P architecture proposed in [4] has been adopted by many P2P software distributors and technology researchers with the goal of optimizing utilization of network resources. The key role in the P4P architecture is played by servers called itrackers, deployed by ISPs and accessed by P2P applications (or the P2P systems) in order to make optimal decisions when selecting a peer to connect. B. The BitTorrent-Like P2P File Sharing Systems After Napster appeared in 1999, many P2P file sharing systems have been developed such as Gnutella, KaZaA, FastTrack, BitTorrent and edonkey. BitTorrent, which is seen as a revolutionary download tool, inherits many technological advantages of several former P2P file sharing systems and has become one of the most popular P2P file sharing systems currently. [5] shows that the total traffic produced by BitTorrent is more than half of that produced by all P2P file sharing systems. The rapid-increasing users and traffic of BitTorrent have attracted many institutions attention. The research direction of BitTorrent could be classified as follows. Firstly, BitTorrent technology has been applied to many other domains. [6] built a CDN system on P2P network, and designed a novel route protocol based on content which can support large-scale and highly dynamic distributed applications. [7] embedded BitTorrent technology into VOD of stream media which gained a good performance. Secondly, researchers studied and simulated some novel algorithms on BitTorrent itself. [5] analyzed BitTorrent system on 4 aspects including the usability of network, the response of system when users increase rapidly, the integrality and the performance of system while downloading. [8] analyzed the traffic of BitTorrent network, load and characteristics of network. At present, there are many P2P file sharing systems. Actually, they are packed based on BitTorrent and add some GUIes. Some P2P applications add some functions to the kernel of BitTorrent which can solve some usual problems while using BitTorrent systems. The piece selection and peer selection algorithms are very important in BitTorrent file sharing systems. They can affect the performance of BitTorrent systems enormously. The main piece selection algorithms of BitTorrent are Strict-priority, Rarest first, Random first piece and Endgame mode. The main peer selection algorithms are Random algorithm, Choke/Unchoke algorithm and Optimistic unchoking algorithm in BitTorrent. In our scheme, we will improve some of these algorithms. III. ALTO FOR BITTORRENT-LIKE P2P FILE SHARING SYSTEMS According to Choke/Unchoke algorithm, peers choose the peers whose download or upload rate is the fastest as their candidate neighbors in BitTorrent system. However, the neighbor selection algorithm of BitTorrent is random. So the chance of peer selecting external networks is large. This probably leads to much unnecessary inter-isp traffic. To overcome these problems, we introduce the generation of AS topology and the improved algorithms in the following. A. The Generation of AS Topology In order to make the traffic of BitTorrent stay in the local network by using ALTO approach, we need to adopt some methods to let BitTorrent know some information of underlying topology. We can obtain a peer s AS number through its IP address and some public AS searching institutions. So it s not difficult to know which AS an IP address belongs to. After collecting such information, we can get a map table of peers IP addresses and its corresponding AS numbers, i.e. AS-IP map table. Next we will show how to obtain an integrated AS topologic map through this map table. If all BitTorrent peers belong to N ASes, we select one peer randomly from every AS, then we run traceroute between any two peers to obtain their end-to-end route on IP layer (only run times at least). If traceroute program fails to return, we can try to select other two peers which belong to those two ASes to find route. Next, we find all peers AS numbers in this route through AS-IP map table. Thus an end-to-end route passes through several ASes linearly. Then we treat the consecutive IP addresses in the same AS as an AS node. Thus, we convert IP layer s route to AS s route and then obtain an integrated AS topologic map. At last, with Floyd algorithm, we could get a table with shortest hops of any two ASes and save it in trackers. B. Algorithm Design 1) Tracker Localized Algorithm In order to make trackers concern the local characteristics, we modified the random select algorithm of peers. When we receive a request from a peer, the tracker sorts AS hops of the request peer to each 136

3 candidate peers first. The candidate peers usually exist in a table and they are managed by the trackers. We suppose the default number of candidate peers in the table is 50. If the number of candidate peers in the table is 50 or less than 50, the tracker sends the table to the request peer directly. If the number is more than 50 and the AS number of the 50 th peer is different from the 51 st s, the tracker returns the first 50 peers. If the AS number of the 50 th peer is the same as the 51 st s, we take down the AS number of the 50 th peer and suppose its AS number is n, then remove the peers whose AS numbers are n until the AS number of the 50 th peer is different from the 51 st s, then the tracker returns the first 50 peers. At last, the request peer asks for files from the peers that the tracker returns directly. 2) Chocker Localized Algorithm In original BitTorrent, seeds select 4 download peers whose download rate is the largest to unchoke, download peers select 4 upload peers whose upload rate is the largest to unchoke. This behavior ignores the physical position of peers and usually brings extra inter-isp traffic. So, we modified the choking/unchoking algorithm to make peers unchoke their neighbors based on AS hops. Although the distance of two peers seldom change, the modified algorithm will not make peers always select the same neighbors. The reason is that the choking/unchoking algorithm selects appropriate peers just among its interested neighbors; in other words, it selects peers among the neighbors whose pieces collection is different from the request peer. Although pieces collection of every peer changes continuously, the interested neighbors of each peer change continuously too, the algorithm can ensure that a peer always exchanges data with its closest neighbor. We deploy a similar choking/unchoking policy on seeds. A seed keeps unchoking only with 4 closest neighbors who still have not finished downloading. Only after one of the 4 neighbors has downloaded all pieces of a file, will the seed unchoke another closest neighbor. This is opposite to the design of the original BitTorrent. The original BitTorrent gives priority to neighbors whose download/upload rate is the largest, but our algorithm is based on distance and it ensures that a seed sends pieces to its closest neighbor first. If the upload rate of all peers that have the same interest is similar, the closest peer to the seed has the largest probability to finish downloading first and becomes a seed. This will make seeds pervade all around from the center. 3) Piecepicker Localized Algorithm As we know, the piece selection policy in BitTorrent includes Strict-priority, Rarest first, Random first piece and Endgame mode. Rarest first is the main factor of incurring inter-isp traffic among these piece selection policies. This paper deploys the Piecepicker localized algorithm instead of Rarest first algorithm to encourage the peer to first download the closest pieces to itself. Firstly, the download peer will count the distance value to each piece. The distance value refers to the average value of AS hops between the peers who own this piece and the download peer. For instance, 3 peers own a piece that the download peer needs, their AS hops to the download peer is 0, 2 and 4, so the distance value of this piece to the download peer is 2. Piecepicker localized algorithm chooses the piece whose distance value is the smallest to download first. Different from Rarest first policy of the original BitTorrent, which intends to enhance the dispersing of the smaller interest swarm, Piecepicker localized algorithm intends to make pieces pervade from the center of seeds to around based on AS hops. IV. EVALUATION AND PERFORMANCE ANALYSIS A. Experimental Setup In order to verify whether our scheme is feasible or not, we use the Java-based General Peer-to-Peer Simulator (GPS) [9] as our simulation platform. GPS is a message-level, event-driven P2P simulation framework aiming at modeling P2P protocols accurately and effectively in a realistic and dynamic environment. It can also simulate the topology and characteristics of networks precisely. Firstly, we generate 1024 nodes randomly on the topology that GPS simulates, and distribute them in AS 0, AS 1, AS 2, AS 3 and AS 4. The AS topology is shown in figure of these 1024 nodes are core nodes which only take charge of transmitting data. The bandwidth of links between the core nodes is evenly fluctuant between 100Mbps and 200Mbps. The other 992 nodes are edge nodes. The bandwidth of links between the core nodes and the edge nodes is evenly fluctuant between 20Mbps and 100Mbps. In these edge nodes, 512 nodes are peers, some of these 512 peers are seeds (the size of the shared file is 50M). Then we let a different number of peers download the file randomly every 10 seconds. Figure 1. The AS topology in our simulations In order to add more authority to our experiment results, we set several scenes including 16 peers, 32 peers, 45 peers, 64 peers, 128 peers and 512 peers and take more than 5 rounds in every scene. In each round, all conditions including the position of nodes, the bandwidth of links, the delay of links, the seeds and the download events are all generated randomly in some special range except for factors such as the number of nodes and peers, the size of files, the number of edges, the number of ASes and AS topology. Finally, we average the experimental results obtained from the scene which the number of download peers is N and then compare them with that of the original algorithm. B. Performance that Users Care About We compare the performance that users care about in this part; these performance metrics include the average 137

4 download time of peers and the breaking time of peers. The results are presented as follows. Figure 2 shows the average download time of peers for each localized algorithm and the original BitTorrent algorithm. We can conclude that when we use the Tracker localized algorithm, the download time of peers decreases to the largest extent, but when there are few download peers, it doesn t decrease but increase a bit. That is because peers select neighbors randomly to transmit data in original BitTorrent. When there are a few download peers, the bandwidth of inter-as links is large enough so that the download rate is faster. However, after the trackers are localized, the peers always select neighbors locally. Because the bandwidth of local links is smaller than that of inter-as links, the data transmission rate is slower on local links. With the increase of download peers, the peers in the original BitTorrent still select neighbors randomly which may lead to congestion on the inter-as links and performance degrading of the whole network. The Tracker localized algorithm makes the traffic localized and utilizes bandwidth effectively. However, the breaking time is the most when using Tracker localized algorithm. With the increase of download peers, the improvement for breaking time of all localized algorithms is getting more and more obvious. Figure 3. The time of all peers breaking downloading for each localized algorithm and the original BitTorrent algorithm C. Performance that ISP Cares About In this part, we present the performance that ISP cares about. The performance metrics include the inter-as traffic and the traffic of different AS hops. At last, we compare the original BitTorrent and the improved algorithm based on these performances. The result is shown as follows. Figure 2. Average download time of peers for each localized algorithm and the original BitTorrent algorithm Besides, from figure 2 we can see that the decrease extent of peers download time using Chocker localized algorithm is a bit larger than using Piecepicker localized algorithm. When there are only a few download peers, the average download time decreases a little in these two localized algorithms. The reason is that peers always select the closest among random neighbors to unchoke or download the closest pieces, which makes the download efficiency raised a lot even when there are few seeds. If there are many download peers, there will be more and more seeds after many peers have finished their downloading, the decrease extent of peers average download time is a bit larger when using Chocker localized algorithm and Piecepicker localized algorithm and tends to keep steady. If peers can t find some pieces of a file during the process of downloading, then the downloading will be in an interrupted state until the peers have received the pieces. Figure 3 shows the time of peers breaking downloading. We can see that the breaking time of peers is the least when using Chocker localized algorithm and the following is the Piecepicker localized algorithm. Figure 4. The traffic of inter-isp for each localized algorithm and the original BitTorrent algorithm Figure 4 shows the traffic of inter-as links. All the three localized algorithms have optimized the traffic of inter-as, and the decreasing extent is similar. It is worth noticing that the extent of traffic decrease is more obvious with the increase of the download peers. It is because, after downloading for a period of time, there are quantities of seeds in every AS. Peers can download files in the ASes they belong to. From figure 4 we can also see that the Piecepicker localized algorithm decreases the traffic of inter-as most obviously when there are many download peers. The reason is that the number of seeds in an AS is constantly increasing, which makes the Piecepicker localized algorithm optimize the performance more. 138

5 ACKNOWLEDGMENT This work is supported by the National Natural Science Foundation of China (Grant No ) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No ). Figure 5. The traffic volume of different AS hops To show the traffic of different AS hops using different algorithms, we fix the number of download peers at 64 and keep other conditions unchanged, then we measure the traffic of different AS hops. For example, 3 AS hops traffic means the traffic brought by the seeds whose AS hops are 3 and their download peers. As shown in figure 5, the traffic volume of different AS hops in different localized algorithms is similar. Chocker localized algorithm brings more local traffic than other algorithms. Besides, compared with the original BitTorrent, the 0 AS hop s traffic increases a lot in the three localized algorithms and this indicates that our scheme can effectively decrease the inter-isp traffic. V. CONCLUSION AND FUTURE WORK In this paper, we presented the design, implementation and evaluation of an effective and scalable approach for improving the performance of BitTorrent-like P2P file sharing systems inspired by the idea of ALTO. Firstly, we proposed a novel approach to make BitTorrent node aware of the topology of the underlying networks. Then we modified BitTorrent's original algorithms involving choosing neighbors, selecting pieces and choking/unchoking, and replaced them with Tracker localized algorithm, Chocker localized algorithm and Piecepicker localized algorithm. Finally, we conducted comprehensive experiments to verify the correctness and effectiveness of our scheme based on GPS a well-known P2P simulator. Experimental evaluation has shown that, with our scheme, nodes in BitTorrent-like systems have better sense of the underlying networks topology, and can interact more efficiently. Besides, our scheme can help to decrease the inter-as or inter-isp traffic without sacrificing performance, optimize the traffic distribution across the whole networks, and improve the quality of the personal experience of P2P users. In order to perfect our scheme, we still need to do a lot of work in the future. For instance, we can add some other strategies to our scheme; we can consider the file fragmentation; we can predict the users next tendency for what kind of resources they will be interested by analyzing their behaviors and so on. All of this needs us to do deeper research. REFERENCE [1] J. Seedorf, S. Kiesel, M. Stiemerling, Traffic Localization for P2P-Applications: The ALTO Approach, In: Ninth International Conference on Peer-to-peer Computing (IEEE P2P 2009), pp , Seattle, [2] I. Rimac, V. Hilt, M. Tomsu, V. Gurbani, E. Marcocco, A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem, RFC 6029 (Informational), 2010(10). [3] Q. Fang, J. Gao, L.J. Guibas, V.D. Silva, L. Zhang, GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks, In: IEEE INFOCOM, vol. 1, pp , Florida, [4] H.Y. Xie, A. Krishnamurthy, A. Silberschatz, Y. Yang, P4P: Explicit Communications for Coorperative Control Between P2P and Network Providers, P4PWG Whitepaper, 2007(5). [5] J. Pouwelse, P. Garbacki, D. Epema, H. Sips, The BitTorrent P2P File-Sharing System: Measurements and Analysis, In: 4th International Workshop on Peer-to-Peer Systems, vol. 3640, pp , New York, [6] S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, A scalable content-addressable network, In: Proceedings of the International Conference of the Special Interest Group on Data Communication, vol. 31, pp , New York, [7] C. Dana, D. Li, D. Harrison, C.-N. Chuah, BASS: BitTorrent Assisted Streaming System for Video-on-Demand, In: 7th Workshop on Multimedia Signal Processing, pp. 1-4, California, [8] H. Chen, Z.L. Yang, J.H. Sun, Critical load of peer-to-peer networks, Journal of Huazhong University of Science and Technology (Natural Science Edition) 35(3), 35-37, [9] W. Yang, N. Abu-Ghazaleh, GPS: A General Peer-to-Peer Simulator and its Use for Modeling BitTorrent, In: 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, pp , Atlanta,

New Technique to Improve BitTorrent Performance Based on Application Layer Traffic Optimization

New Technique to Improve BitTorrent Performance Based on Application Layer Traffic Optimization International Journal of Computing and Network Technology ISSN 2210-1519 Int. J. Com. Net. Teach. 3, No. 1 (Jan. 2015) New Technique to Improve BitTorrent Performance Based on Application Layer Traffic

More information

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

On Feasibility of P2P Traffic Control through Network Performance Manipulation

On Feasibility of P2P Traffic Control through Network Performance Manipulation THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE On Feasibility of P2P Traffic Control through Network Performance Manipulation HyunYong Lee Masahiro Yoshida

More information

CS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017

CS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017 CS 43: Computer Networks BitTorrent & Content Distribution Kevin Webb Swarthmore College September 28, 2017 Agenda BitTorrent Cooperative file transfers Briefly: Distributed Hash Tables Finding things

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem draft-rimac-p2prg-alto-survey-00 Marco Tomsu, Ivica Rimac, Volker Hilt, Vijay Gurbani, Enrico Marocco 75 th IETF Meeting,

More information

Understanding the effect of streaming overlay construction on AS level traffic

Understanding the effect of streaming overlay construction on AS level traffic Understanding the effect of streaming overlay construction on AS level traffic Reza Motamedi and Reza Rejaie Information and Computer Science Department University of Oregon e-mail: {reza.motamedi,reza}@cs.uoregon.edu

More information

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall

More information

Peer-to-Peer Streaming Systems. Behzad Akbari

Peer-to-Peer Streaming Systems. Behzad Akbari Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

Content Distribution and BitTorrent [Based on slides by Cosmin Arad]

Content Distribution and BitTorrent [Based on slides by Cosmin Arad] ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying

More information

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth American Journal of Networks and Communications 2013; 2(2): 40-46 Published online June 10, 2013 (http://www.sciencepublishinggroup.com/j/ajnc) doi: 10.11648/j.ajnc.20130202.13 Node selection in Peer-to-Peer

More information

SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM

SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM ABSTRACT: SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM J.Priyanka 1, P.Rajeswari 2 II-M.E(CS) 1, H.O.D / ECE 2, Dhanalakshmi Srinivasan Engineering College, Perambalur. Recent years have witnessed

More information

P2P Traffic Optimization Based on Dynamic Network Information Aware

P2P Traffic Optimization Based on Dynamic Network Information Aware Int. J. Communications, Network and System Sciences, 2017, 10, 90-104 http://www.scirp.org/journal/ijcns ISSN Online: 1913-3723 ISSN Print: 1913-3715 P2P Traffic Optimization Based on Dynamic Network Information

More information

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured

More information

Chunk Scheduling Strategies In Peer to Peer System-A Review

Chunk Scheduling Strategies In Peer to Peer System-A Review Chunk Scheduling Strategies In Peer to Peer System-A Review Sanu C, Deepa S S Abstract Peer-to-peer ( P2P) s t r e a m i n g systems have become popular in recent years. Several peer- to-peer systems for

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Lecture 8: Application Layer P2P Applications and DHTs

Lecture 8: Application Layer P2P Applications and DHTs Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

ALTO Problem Statement

ALTO Problem Statement ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting Outline History The problem Main issues Use cases The cache location sub-problem Internet

More information

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud 2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous

More information

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University

More information

CS 43: Computer Networks. 14: DHTs and CDNs October 3, 2018

CS 43: Computer Networks. 14: DHTs and CDNs October 3, 2018 CS 43: Computer Networks 14: DHTs and CDNs October 3, 2018 If Alice wants to stream Mad Men over a highspeed Internet connection her browser may choose a video rate A. in the range of Mbps. B. in the range

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

High-Quality P2P Video Streaming System Considering the Cooperation of Constitution Information and Delivery Status

High-Quality P2P Video Streaming System Considering the Cooperation of Constitution Information and Delivery Status The 8th Annual IEEE Consumer Communications and Networking Conference - Multimedia & Entertainment Networking and Services High-Quality P2P Video Streaming System Considering the Cooperation of Constitution

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

Pitfalls for ISP-friendly P2P design. Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD

Pitfalls for ISP-friendly P2P design. Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD Pitfalls for ISP-friendly P2P design Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD P2P & ISPs P2P systems: Large volume of traffic (20 80% of total)

More information

Extreme Computing. BitTorrent and incentive-based overlay networks.

Extreme Computing. BitTorrent and incentive-based overlay networks. Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

P2P content distribution Jukka K. Nurminen

P2P content distribution Jukka K. Nurminen P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

Enhancing Downloading Time By Using Content Distribution Algorithm

Enhancing Downloading Time By Using Content Distribution Algorithm RESEARCH ARTICLE OPEN ACCESS Enhancing Downloading Time By Using Content Distribution Algorithm VILSA V S Department of Computer Science and Technology TKM Institute of Technology, Kollam, Kerala Mailid-vilsavijay@gmail.com

More information

Peer Assisted Content Distribution over Router Assisted Overlay Multicast

Peer Assisted Content Distribution over Router Assisted Overlay Multicast Peer Assisted Content Distribution over Router Assisted Overlay Multicast George Xylomenos, Konstantinos Katsaros and Vasileios P. Kemerlis Mobile Multimedia Laboratory & Department of Informatics Athens

More information

Scalability of the BitTorrent P2P Application

Scalability of the BitTorrent P2P Application Scalability of the BitTorrent P2P Application Kolja Eger, Ulrich Killat Hamburg University of Technology 5.Würzburger Workshop 8.-9. July 2005 Overview File dissemination in peer-to-peer (p2p) networks

More information

Collaborative Multi-Source Scheme for Multimedia Content Distribution

Collaborative Multi-Source Scheme for Multimedia Content Distribution Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx

More information

A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis

A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis Chih-Lin HU* and Zong-Xian LU Department of Communication Engineering, National Central University,

More information

Preliminary Research on Distributed Cluster Monitoring of G/S Model

Preliminary Research on Distributed Cluster Monitoring of G/S Model Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 860 867 2012 International Conference on Solid State Devices and Materials Science Preliminary Research on Distributed Cluster Monitoring

More information

Joint Optimization of Content Replication and Server Selection for Video-On-Demand

Joint Optimization of Content Replication and Server Selection for Video-On-Demand Joint Optimization of Content Replication and Server Selection for Video-On-Demand Huan Huang Pengye Xia S.-H. Gary Chan Department of Compute Science and Engineering The Hong Kong University of Science

More information

Introduction to P P Networks

Introduction to P P Networks Introduction to P P Networks B Sc Florian Adamsky florianadamsky@iemthmde http://florianadamskyit/ cbd Internet Protocols and Applications SS B Sc Florian Adamsky IPA / Outline Introduction What is P P?

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80

More information

Peer-to-Peer Applications Reading: 9.4

Peer-to-Peer Applications Reading: 9.4 Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer

More information

A Super-Peer Selection Strategy for Peer-to-Peer Systems

A Super-Peer Selection Strategy for Peer-to-Peer Systems , pp.25-29 http://dx.doi.org/10.14257/astl.2016.125.05 A Super-Peer Selection Strategy for Peer-to-Peer Systems Won-Ho Chung 1 1 Department of Digital Media, Duksung Womens University whchung@duksung.ac.kr

More information

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System Ubaid Abbasi and Toufik Ahmed CNRS abri ab. University of Bordeaux 1 351 Cours de la ibération, Talence Cedex 33405 France {abbasi,

More information

Improvement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks

Improvement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 1133 1140 2012 International Conference on Solid State Devices and Materials Science Improvement of AODV Routing Protocol with QoS

More information

Do incentives build robustness in BitTorrent?

Do incentives build robustness in BitTorrent? Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN

More information

AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS

AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS Tomoyuki Ishiiand Atsushi Inoie * Department of Network Engineering, Kanagawa Institute of Technology, Atsugi-city, Japan

More information

University of Würzburg Institute of Computer Science Research Report Series

University of Würzburg Institute of Computer Science Research Report Series University of Würzburg Institute of Computer Science Research Report Series Pushing the Performance of Biased Neighbor Selection through Biased Unchoking Simon Oechsner 1, Frank Lehrieder 1, Tobias Hoßfeld

More information

Efficiency of Data Distribution in BitTorrent-Like Systems

Efficiency of Data Distribution in BitTorrent-Like Systems Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

On characterizing BGP routing table growth

On characterizing BGP routing table growth University of Massachusetts Amherst From the SelectedWorks of Lixin Gao 00 On characterizing BGP routing table growth T Bu LX Gao D Towsley Available at: https://works.bepress.com/lixin_gao/66/ On Characterizing

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Peer to Peer Systems and Probabilistic Protocols

Peer to Peer Systems and Probabilistic Protocols Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

A Bandwidth-Broker Based Inter-Domain SLA Negotiation

A Bandwidth-Broker Based Inter-Domain SLA Negotiation A Bandwidth-Broker Based Inter-Domain SLA Negotiation Haci A. Mantar θ, Ibrahim T. Okumus, Junseok Hwang +, Steve Chapin β θ Department of Computer Engineering, Gebze Institute of Technology, Turkey β

More information

Peer-to-Peer (P2P) Architectures

Peer-to-Peer (P2P) Architectures Peer-to-Peer (P2P) Architectures ECE/CS 658 Internet Engineering Dilum Bandara dilumb@engr.colostate.edu Outline Background Unstructured P2P Napster, Gnutella, & BitTorrent Structured P2P Chord & Kademlia

More information

STUDYING OF CLASSIFYING CHINESE SMS MESSAGES

STUDYING OF CLASSIFYING CHINESE SMS MESSAGES STUDYING OF CLASSIFYING CHINESE SMS MESSAGES BASED ON BAYESIAN CLASSIFICATION 1 LI FENG, 2 LI JIGANG 1,2 Computer Science Department, DongHua University, Shanghai, China E-mail: 1 Lifeng@dhu.edu.cn, 2

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

TCP Probe: A TCP with built-in Path Capacity Estimation 1

TCP Probe: A TCP with built-in Path Capacity Estimation 1 TCP Probe: A TCP with built-in Path Capacity Estimation Anders Persson, Cesar A. C. Marcondes 2, Ling-Jyh Chen, Li Lao, M. Y. Sanadidi, and Mario Gerla Computer Science Department University of California,

More information

A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes

A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes 1,* Chengpei Tang, 1 Jiao Yin, 1 Yu Dong 1

More information

Hirochika Asai U. Tokyo Hiroshi Esaki U. Tokyo Tsuyoshi Momose Cisco Systems

Hirochika Asai U. Tokyo Hiroshi Esaki U. Tokyo Tsuyoshi Momose Cisco Systems Hirochika Asai , U. Tokyo Hiroshi Esaki , U. Tokyo Tsuyoshi Momose , Cisco Systems July 28 th, 2010, P2P RG, IETF 78 The Internet Autonomous

More information

Model the P2P Attack in Computer Networks

Model the P2P Attack in Computer Networks International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

LIBSWIFT P2P PROTOCOL: AN ANALYSIS AND EXTENSION

LIBSWIFT P2P PROTOCOL: AN ANALYSIS AND EXTENSION Master Thesis - TRITA-ICT-EX-2012-262 LIBSWIFT P2P PROTOCOL: AN ANALYSIS AND EXTENSION Fu Tang Design and Implementation of ICT products and systems Royal Institute of Technology (KTH) fut@kth.se October

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Frequency Oriented Scheduling on Parallel Processors

Frequency Oriented Scheduling on Parallel Processors School of Mathematics and Systems Engineering Reports from MSI - Rapporter från MSI Frequency Oriented Scheduling on Parallel Processors Siqi Zhong June 2009 MSI Report 09036 Växjö University ISSN 1650-2647

More information

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved. BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and

More information

Peer-to-Peer Networks 12 Fast Download

Peer-to-Peer Networks 12 Fast Download Peer-to-Peer Networks 12 Fast Download Arne Vater Technical Faculty Computer Networks and Telematics University of Freiburg IP Multicast Motivation - Transmission of a data stream to many receivers Unicast

More information

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2 416 Distributed Systems Mar 3, Peer-to-Peer Part 2 Scaling Problem Millions of clients server and network meltdown 2 P2P System Leverage the resources of client machines (peers) Traditional: Computation,

More information

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Master s Thesis Title A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Supervisor Professor Masayuki Murata Author Hideto Horiuchi February 14th, 2007 Department

More information

Lecture 17: Peer-to-Peer System and BitTorrent

Lecture 17: Peer-to-Peer System and BitTorrent CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and

More information

Multi-path based Algorithms for Data Transfer in the Grid Environment

Multi-path based Algorithms for Data Transfer in the Grid Environment New Generation Computing, 28(2010)129-136 Ohmsha, Ltd. and Springer Multi-path based Algorithms for Data Transfer in the Grid Environment Muzhou XIONG 1,2, Dan CHEN 2,3, Hai JIN 1 and Song WU 1 1 School

More information

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking

More information

Quasi-Chord: physical topology aware structured P2P network

Quasi-Chord: physical topology aware structured P2P network Quasi-Chord: physical topology aware structured PP network UN Mingsong ZHANG Zhongqiu Network Information Center, Harbin University of cience and Technology, China College of Computer ci&tech, Harbin University

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network

Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network Wireless Sensor Network, 2010, 2, 710-717 doi:10.4236/wsn.2010.29086 Published Online September 2010 (http://www.scirp.org/journal/wsn) Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor

More information

Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network

Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network Send Orders for Reprints to reprints@benthamscience.ae 690 The Open Electrical & Electronic Engineering Journal, 2014, 8, 690-694 Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation

More information

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer

More information

Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks

Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

Performing MapReduce on Data Centers with Hierarchical Structures

Performing MapReduce on Data Centers with Hierarchical Structures INT J COMPUT COMMUN, ISSN 1841-9836 Vol.7 (212), No. 3 (September), pp. 432-449 Performing MapReduce on Data Centers with Hierarchical Structures Z. Ding, D. Guo, X. Chen, X. Luo Zeliu Ding, Deke Guo,

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks

Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Damien Magoni Université Louis Pasteur LSIIT magoni@dpt-info.u-strasbg.fr Abstract. Although distributed

More information

A Search Theoretical Approach to P2P Networks: Analysis of Learning

A Search Theoretical Approach to P2P Networks: Analysis of Learning A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.

More information

Overlay/Underlay Routing Issues in Wireless Mesh Networks

Overlay/Underlay Routing Issues in Wireless Mesh Networks Overlay/Underlay Routing Issues in Wireless Mesh Networks Stefano AVALLONE 1, Roberto CANONICO 1, Francesco Paolo D ELIA 1 1 University of Naples Federico II, Via Claudio 21, Naples, 80125, Italy Tel:

More information