A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems
|
|
- Moris Todd
- 5 years ago
- Views:
Transcription
1 2013 Third International Conference on Intelligent System Design and Engineering Applications A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems Liu Guanxiu, Ye Suqi, Huang Xinli Department of Computer Science and Technology, East China Normal University, Shanghai , China gxliu920@gmail.com, ysq227@163.com, xlhuang@cs.ecnu.edu.cn Abstract The Peer-to-Peer (P2P) file sharing system is one of the most widely-used P2P applications. Its traffic represents about 60%~80% of the whole Internet traffic. BitTorrent is a representative P2P file sharing system. In such systems, the schemes of choosing neighbors and selecting pieces are mainly based on the knowledge of overlay topologies, without considering the underlying Internet topology, which may lead to too much inter-isp (Internet Service Provider) traffic and serious performance degrading of the whole systems. To overcome these problems, we design a new scheme to improve the performance of BitTorrent-like P2P file sharing systems, inspired by the idea of Application Level Traffic Optimization (ALTO). Firstly, we propose a novel approach to make BitTorrent node aware of the topology of underlying networks. Then we modify BitTorrent's original algorithms and replace them with three new localized algorithms based on autonomous system (AS) hops. Finally, we conduct comprehensive experiments to verify the correctness and effectiveness of our scheme based on the General Peer-to-Peer Simulator (GPS). The simulation result shows that, with our scheme, nodes in BitTorrent-like systems have better sense of the topology of their underlying networks, and can interact more efficiently. Besides, our scheme can help to decrease inter-as or inter-isp traffic, optimize traffic distribution across the whole networks, and improve the quality of experience of P2P users. Keywords-Peer-to-Peer Networks; File Sharing Systems; Traffic Optimization; BitTorrent; AS Hops I. INTRODUCTION Peer-to-Peer (P2P) systems have gained tremendous popularity in the past few years. More and more users are continually joining such systems and more resources are being made available, which attracts even more users to join. P2P applications including file sharing systems such as BitTorrent, edonkey have seized about 60%~80% of the entire Internet traffic. The ever-increasing traffic not only brings enormous revenues to Internet Service Providers (ISPs), but also poses a significant engineering challenge to ISPs. By building overlay networks that are oblivious to the underlying Internet topology and routing, P2P systems make several network resources irrationally utilized and P2P traffic always starves the bandwidth of other applications like web traffic. In fact, previous studies have shown that many of the requested P2P objects were downloaded from peers outside the local network even though they were locally available. ISPs have to pay more for the inter-isp traffic. That increases the operating cost of ISPs. The reason why BitTorrent-like P2P file sharing systems bring so much inter-isp traffic is that BitTorrent-like P2P file sharing systems always use random methods to choose neighbors and don t concern the impact brought by data transmission between inter-isp peers which may lead to performance degrading of the whole network. Besides, the limited links may be occupied by the vast inter-isp traffic and these ISPs would be overloaded. In this way, the opposing reaction of ISPs will occur. Meanwhile, the inter-isp links are always the network bottleneck of heavy congestion. Consequently, the download rate of P2P systems may be influenced and then the function will be weakened. All of this may result in serious performance degrading of the whole systems. Usually, ISPs limit the traffic of BitTorrent-like P2P file sharing systems by closing download ports and limiting bandwidth to decrease operating cost. These approaches can only decrease the data transmission rate, but it can t decrease the whole P2P traffic essentially. On the other hand, the links between ISPs are limited. These links are important because they bear the transmission responsibilities of data and route information. Consequently, they may become bottlenecks when the traffic is heavy. There are many solutions such as estimating topology information focusing on predicting network distance in terms of latency, constructing some entities to feed back the underlying topology information to overlay and etc. We, in this paper, adopt partial idea of the latter, and cluster the P2P nodes based on which Autonomous System (AS) they belong to. Under the administering of the leaders, the P2P nodes load will be lightened. In order to guide the behaviors of all peers in terms of global view, we also construct resource indexing entities. These entities can also initiate load balancing process according to the information which they have known. We perform event-based simulations to evaluate the performance of our algorithm with BitTorrent protocol. The results also show that our scheme can improve the performance of P2P file sharing systems. The rest of this paper is organized as follows. In Section II, we introduce the Application Layer Traffic Optimization (ALTO) problem, the BitTorrent-like P2P file sharing systems and some existing solutions. Our improved algorithms are described in Section III. In Section IV, we evaluate the performance of our algorithms using event-driven simulation. Section V concludes the paper. II. RELATED WORK A. The Application Layer Traffic Optimization (ALTO [1]) Approach As is often the case, P2P systems ensure that popular contents are received by peers in the overlay. However, most P2P systems usually employ an arbitrary peer selection policy that ignores the underlying Internet /12 $ IEEE DOI /ISDEA
2 topology and ISP link costs, establishing connections between randomly chosen subsets of cooperating peers from around the world. This behavior may lead to suboptimal choices. Most distributed hash tables (DHT) use greedy forwarding algorithms to reach their destination, making decisions that may not turn out to be globally optimized. This naturally leads to the ALTO problem: how to best provide the topology of the underlying network while at the same time allowing the requesting node to use such information to effectively reach the node on which the content resides. Thus, it would appear that P2P networks with their application layer routing strategies based on overlay topologies are in direct competition against the Internet routing and topology [2]. One way to solve the ALTO problem is to build network coordinate systems which embed the network topology into a low dimensional coordinate space and enable network distance estimations based on latency. But this is not always without errors. Because the latency may be fluctuating, which impact the accuracy of distance estimations. Furthermore, while routing in a low dimensional coordinate space, the problem of local minima [3] is inevitable. Instead of building topology network coordinate systems on the application level through distributed measurements, this information could also be provided by ISPs or other entities. Because they have full knowledge of the topology of the networks they operate on. In order to avoid congestion on critical links, they are interested in helping applications to optimize the traffic they generate. P4P architecture proposed in [4] has been adopted by many P2P software distributors and technology researchers with the goal of optimizing utilization of network resources. The key role in the P4P architecture is played by servers called itrackers, deployed by ISPs and accessed by P2P applications (or the P2P systems) in order to make optimal decisions when selecting a peer to connect. B. The BitTorrent-Like P2P File Sharing Systems After Napster appeared in 1999, many P2P file sharing systems have been developed such as Gnutella, KaZaA, FastTrack, BitTorrent and edonkey. BitTorrent, which is seen as a revolutionary download tool, inherits many technological advantages of several former P2P file sharing systems and has become one of the most popular P2P file sharing systems currently. [5] shows that the total traffic produced by BitTorrent is more than half of that produced by all P2P file sharing systems. The rapid-increasing users and traffic of BitTorrent have attracted many institutions attention. The research direction of BitTorrent could be classified as follows. Firstly, BitTorrent technology has been applied to many other domains. [6] built a CDN system on P2P network, and designed a novel route protocol based on content which can support large-scale and highly dynamic distributed applications. [7] embedded BitTorrent technology into VOD of stream media which gained a good performance. Secondly, researchers studied and simulated some novel algorithms on BitTorrent itself. [5] analyzed BitTorrent system on 4 aspects including the usability of network, the response of system when users increase rapidly, the integrality and the performance of system while downloading. [8] analyzed the traffic of BitTorrent network, load and characteristics of network. At present, there are many P2P file sharing systems. Actually, they are packed based on BitTorrent and add some GUIes. Some P2P applications add some functions to the kernel of BitTorrent which can solve some usual problems while using BitTorrent systems. The piece selection and peer selection algorithms are very important in BitTorrent file sharing systems. They can affect the performance of BitTorrent systems enormously. The main piece selection algorithms of BitTorrent are Strict-priority, Rarest first, Random first piece and Endgame mode. The main peer selection algorithms are Random algorithm, Choke/Unchoke algorithm and Optimistic unchoking algorithm in BitTorrent. In our scheme, we will improve some of these algorithms. III. ALTO FOR BITTORRENT-LIKE P2P FILE SHARING SYSTEMS According to Choke/Unchoke algorithm, peers choose the peers whose download or upload rate is the fastest as their candidate neighbors in BitTorrent system. However, the neighbor selection algorithm of BitTorrent is random. So the chance of peer selecting external networks is large. This probably leads to much unnecessary inter-isp traffic. To overcome these problems, we introduce the generation of AS topology and the improved algorithms in the following. A. The Generation of AS Topology In order to make the traffic of BitTorrent stay in the local network by using ALTO approach, we need to adopt some methods to let BitTorrent know some information of underlying topology. We can obtain a peer s AS number through its IP address and some public AS searching institutions. So it s not difficult to know which AS an IP address belongs to. After collecting such information, we can get a map table of peers IP addresses and its corresponding AS numbers, i.e. AS-IP map table. Next we will show how to obtain an integrated AS topologic map through this map table. If all BitTorrent peers belong to N ASes, we select one peer randomly from every AS, then we run traceroute between any two peers to obtain their end-to-end route on IP layer (only run times at least). If traceroute program fails to return, we can try to select other two peers which belong to those two ASes to find route. Next, we find all peers AS numbers in this route through AS-IP map table. Thus an end-to-end route passes through several ASes linearly. Then we treat the consecutive IP addresses in the same AS as an AS node. Thus, we convert IP layer s route to AS s route and then obtain an integrated AS topologic map. At last, with Floyd algorithm, we could get a table with shortest hops of any two ASes and save it in trackers. B. Algorithm Design 1) Tracker Localized Algorithm In order to make trackers concern the local characteristics, we modified the random select algorithm of peers. When we receive a request from a peer, the tracker sorts AS hops of the request peer to each 136
3 candidate peers first. The candidate peers usually exist in a table and they are managed by the trackers. We suppose the default number of candidate peers in the table is 50. If the number of candidate peers in the table is 50 or less than 50, the tracker sends the table to the request peer directly. If the number is more than 50 and the AS number of the 50 th peer is different from the 51 st s, the tracker returns the first 50 peers. If the AS number of the 50 th peer is the same as the 51 st s, we take down the AS number of the 50 th peer and suppose its AS number is n, then remove the peers whose AS numbers are n until the AS number of the 50 th peer is different from the 51 st s, then the tracker returns the first 50 peers. At last, the request peer asks for files from the peers that the tracker returns directly. 2) Chocker Localized Algorithm In original BitTorrent, seeds select 4 download peers whose download rate is the largest to unchoke, download peers select 4 upload peers whose upload rate is the largest to unchoke. This behavior ignores the physical position of peers and usually brings extra inter-isp traffic. So, we modified the choking/unchoking algorithm to make peers unchoke their neighbors based on AS hops. Although the distance of two peers seldom change, the modified algorithm will not make peers always select the same neighbors. The reason is that the choking/unchoking algorithm selects appropriate peers just among its interested neighbors; in other words, it selects peers among the neighbors whose pieces collection is different from the request peer. Although pieces collection of every peer changes continuously, the interested neighbors of each peer change continuously too, the algorithm can ensure that a peer always exchanges data with its closest neighbor. We deploy a similar choking/unchoking policy on seeds. A seed keeps unchoking only with 4 closest neighbors who still have not finished downloading. Only after one of the 4 neighbors has downloaded all pieces of a file, will the seed unchoke another closest neighbor. This is opposite to the design of the original BitTorrent. The original BitTorrent gives priority to neighbors whose download/upload rate is the largest, but our algorithm is based on distance and it ensures that a seed sends pieces to its closest neighbor first. If the upload rate of all peers that have the same interest is similar, the closest peer to the seed has the largest probability to finish downloading first and becomes a seed. This will make seeds pervade all around from the center. 3) Piecepicker Localized Algorithm As we know, the piece selection policy in BitTorrent includes Strict-priority, Rarest first, Random first piece and Endgame mode. Rarest first is the main factor of incurring inter-isp traffic among these piece selection policies. This paper deploys the Piecepicker localized algorithm instead of Rarest first algorithm to encourage the peer to first download the closest pieces to itself. Firstly, the download peer will count the distance value to each piece. The distance value refers to the average value of AS hops between the peers who own this piece and the download peer. For instance, 3 peers own a piece that the download peer needs, their AS hops to the download peer is 0, 2 and 4, so the distance value of this piece to the download peer is 2. Piecepicker localized algorithm chooses the piece whose distance value is the smallest to download first. Different from Rarest first policy of the original BitTorrent, which intends to enhance the dispersing of the smaller interest swarm, Piecepicker localized algorithm intends to make pieces pervade from the center of seeds to around based on AS hops. IV. EVALUATION AND PERFORMANCE ANALYSIS A. Experimental Setup In order to verify whether our scheme is feasible or not, we use the Java-based General Peer-to-Peer Simulator (GPS) [9] as our simulation platform. GPS is a message-level, event-driven P2P simulation framework aiming at modeling P2P protocols accurately and effectively in a realistic and dynamic environment. It can also simulate the topology and characteristics of networks precisely. Firstly, we generate 1024 nodes randomly on the topology that GPS simulates, and distribute them in AS 0, AS 1, AS 2, AS 3 and AS 4. The AS topology is shown in figure of these 1024 nodes are core nodes which only take charge of transmitting data. The bandwidth of links between the core nodes is evenly fluctuant between 100Mbps and 200Mbps. The other 992 nodes are edge nodes. The bandwidth of links between the core nodes and the edge nodes is evenly fluctuant between 20Mbps and 100Mbps. In these edge nodes, 512 nodes are peers, some of these 512 peers are seeds (the size of the shared file is 50M). Then we let a different number of peers download the file randomly every 10 seconds. Figure 1. The AS topology in our simulations In order to add more authority to our experiment results, we set several scenes including 16 peers, 32 peers, 45 peers, 64 peers, 128 peers and 512 peers and take more than 5 rounds in every scene. In each round, all conditions including the position of nodes, the bandwidth of links, the delay of links, the seeds and the download events are all generated randomly in some special range except for factors such as the number of nodes and peers, the size of files, the number of edges, the number of ASes and AS topology. Finally, we average the experimental results obtained from the scene which the number of download peers is N and then compare them with that of the original algorithm. B. Performance that Users Care About We compare the performance that users care about in this part; these performance metrics include the average 137
4 download time of peers and the breaking time of peers. The results are presented as follows. Figure 2 shows the average download time of peers for each localized algorithm and the original BitTorrent algorithm. We can conclude that when we use the Tracker localized algorithm, the download time of peers decreases to the largest extent, but when there are few download peers, it doesn t decrease but increase a bit. That is because peers select neighbors randomly to transmit data in original BitTorrent. When there are a few download peers, the bandwidth of inter-as links is large enough so that the download rate is faster. However, after the trackers are localized, the peers always select neighbors locally. Because the bandwidth of local links is smaller than that of inter-as links, the data transmission rate is slower on local links. With the increase of download peers, the peers in the original BitTorrent still select neighbors randomly which may lead to congestion on the inter-as links and performance degrading of the whole network. The Tracker localized algorithm makes the traffic localized and utilizes bandwidth effectively. However, the breaking time is the most when using Tracker localized algorithm. With the increase of download peers, the improvement for breaking time of all localized algorithms is getting more and more obvious. Figure 3. The time of all peers breaking downloading for each localized algorithm and the original BitTorrent algorithm C. Performance that ISP Cares About In this part, we present the performance that ISP cares about. The performance metrics include the inter-as traffic and the traffic of different AS hops. At last, we compare the original BitTorrent and the improved algorithm based on these performances. The result is shown as follows. Figure 2. Average download time of peers for each localized algorithm and the original BitTorrent algorithm Besides, from figure 2 we can see that the decrease extent of peers download time using Chocker localized algorithm is a bit larger than using Piecepicker localized algorithm. When there are only a few download peers, the average download time decreases a little in these two localized algorithms. The reason is that peers always select the closest among random neighbors to unchoke or download the closest pieces, which makes the download efficiency raised a lot even when there are few seeds. If there are many download peers, there will be more and more seeds after many peers have finished their downloading, the decrease extent of peers average download time is a bit larger when using Chocker localized algorithm and Piecepicker localized algorithm and tends to keep steady. If peers can t find some pieces of a file during the process of downloading, then the downloading will be in an interrupted state until the peers have received the pieces. Figure 3 shows the time of peers breaking downloading. We can see that the breaking time of peers is the least when using Chocker localized algorithm and the following is the Piecepicker localized algorithm. Figure 4. The traffic of inter-isp for each localized algorithm and the original BitTorrent algorithm Figure 4 shows the traffic of inter-as links. All the three localized algorithms have optimized the traffic of inter-as, and the decreasing extent is similar. It is worth noticing that the extent of traffic decrease is more obvious with the increase of the download peers. It is because, after downloading for a period of time, there are quantities of seeds in every AS. Peers can download files in the ASes they belong to. From figure 4 we can also see that the Piecepicker localized algorithm decreases the traffic of inter-as most obviously when there are many download peers. The reason is that the number of seeds in an AS is constantly increasing, which makes the Piecepicker localized algorithm optimize the performance more. 138
5 ACKNOWLEDGMENT This work is supported by the National Natural Science Foundation of China (Grant No ) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No ). Figure 5. The traffic volume of different AS hops To show the traffic of different AS hops using different algorithms, we fix the number of download peers at 64 and keep other conditions unchanged, then we measure the traffic of different AS hops. For example, 3 AS hops traffic means the traffic brought by the seeds whose AS hops are 3 and their download peers. As shown in figure 5, the traffic volume of different AS hops in different localized algorithms is similar. Chocker localized algorithm brings more local traffic than other algorithms. Besides, compared with the original BitTorrent, the 0 AS hop s traffic increases a lot in the three localized algorithms and this indicates that our scheme can effectively decrease the inter-isp traffic. V. CONCLUSION AND FUTURE WORK In this paper, we presented the design, implementation and evaluation of an effective and scalable approach for improving the performance of BitTorrent-like P2P file sharing systems inspired by the idea of ALTO. Firstly, we proposed a novel approach to make BitTorrent node aware of the topology of the underlying networks. Then we modified BitTorrent's original algorithms involving choosing neighbors, selecting pieces and choking/unchoking, and replaced them with Tracker localized algorithm, Chocker localized algorithm and Piecepicker localized algorithm. Finally, we conducted comprehensive experiments to verify the correctness and effectiveness of our scheme based on GPS a well-known P2P simulator. Experimental evaluation has shown that, with our scheme, nodes in BitTorrent-like systems have better sense of the underlying networks topology, and can interact more efficiently. Besides, our scheme can help to decrease the inter-as or inter-isp traffic without sacrificing performance, optimize the traffic distribution across the whole networks, and improve the quality of the personal experience of P2P users. In order to perfect our scheme, we still need to do a lot of work in the future. For instance, we can add some other strategies to our scheme; we can consider the file fragmentation; we can predict the users next tendency for what kind of resources they will be interested by analyzing their behaviors and so on. All of this needs us to do deeper research. REFERENCE [1] J. Seedorf, S. Kiesel, M. Stiemerling, Traffic Localization for P2P-Applications: The ALTO Approach, In: Ninth International Conference on Peer-to-peer Computing (IEEE P2P 2009), pp , Seattle, [2] I. Rimac, V. Hilt, M. Tomsu, V. Gurbani, E. Marcocco, A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem, RFC 6029 (Informational), 2010(10). [3] Q. Fang, J. Gao, L.J. Guibas, V.D. Silva, L. Zhang, GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks, In: IEEE INFOCOM, vol. 1, pp , Florida, [4] H.Y. Xie, A. Krishnamurthy, A. Silberschatz, Y. Yang, P4P: Explicit Communications for Coorperative Control Between P2P and Network Providers, P4PWG Whitepaper, 2007(5). [5] J. Pouwelse, P. Garbacki, D. Epema, H. Sips, The BitTorrent P2P File-Sharing System: Measurements and Analysis, In: 4th International Workshop on Peer-to-Peer Systems, vol. 3640, pp , New York, [6] S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, A scalable content-addressable network, In: Proceedings of the International Conference of the Special Interest Group on Data Communication, vol. 31, pp , New York, [7] C. Dana, D. Li, D. Harrison, C.-N. Chuah, BASS: BitTorrent Assisted Streaming System for Video-on-Demand, In: 7th Workshop on Multimedia Signal Processing, pp. 1-4, California, [8] H. Chen, Z.L. Yang, J.H. Sun, Critical load of peer-to-peer networks, Journal of Huazhong University of Science and Technology (Natural Science Edition) 35(3), 35-37, [9] W. Yang, N. Abu-Ghazaleh, GPS: A General Peer-to-Peer Simulator and its Use for Modeling BitTorrent, In: 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, pp , Atlanta,
New Technique to Improve BitTorrent Performance Based on Application Layer Traffic Optimization
International Journal of Computing and Network Technology ISSN 2210-1519 Int. J. Com. Net. Teach. 3, No. 1 (Jan. 2015) New Technique to Improve BitTorrent Performance Based on Application Layer Traffic
More informationOn Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services
On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationBuilding a low-latency, proximity-aware DHT-based P2P network
Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan
More informationOn Feasibility of P2P Traffic Control through Network Performance Manipulation
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE On Feasibility of P2P Traffic Control through Network Performance Manipulation HyunYong Lee Masahiro Yoshida
More informationCS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017
CS 43: Computer Networks BitTorrent & Content Distribution Kevin Webb Swarthmore College September 28, 2017 Agenda BitTorrent Cooperative file transfers Briefly: Distributed Hash Tables Finding things
More informationA Directed-multicast Routing Approach with Path Replication in Content Addressable Network
2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,
More informationA Scalable Content- Addressable Network
A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics
More informationA Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery
A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca
More informationA Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem
A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem draft-rimac-p2prg-alto-survey-00 Marco Tomsu, Ivica Rimac, Volker Hilt, Vijay Gurbani, Enrico Marocco 75 th IETF Meeting,
More informationUnderstanding the effect of streaming overlay construction on AS level traffic
Understanding the effect of streaming overlay construction on AS level traffic Reza Motamedi and Reza Rejaie Information and Computer Science Department University of Oregon e-mail: {reza.motamedi,reza}@cs.uoregon.edu
More informationOverview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste
Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall
More informationPeer-to-Peer Streaming Systems. Behzad Akbari
Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues
More informationMobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm
Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationContent Distribution and BitTorrent [Based on slides by Cosmin Arad]
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying
More informationNode selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth
American Journal of Networks and Communications 2013; 2(2): 40-46 Published online June 10, 2013 (http://www.sciencepublishinggroup.com/j/ajnc) doi: 10.11648/j.ajnc.20130202.13 Node selection in Peer-to-Peer
More informationSECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM
ABSTRACT: SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM J.Priyanka 1, P.Rajeswari 2 II-M.E(CS) 1, H.O.D / ECE 2, Dhanalakshmi Srinivasan Engineering College, Perambalur. Recent years have witnessed
More informationP2P Traffic Optimization Based on Dynamic Network Information Aware
Int. J. Communications, Network and System Sciences, 2017, 10, 90-104 http://www.scirp.org/journal/ijcns ISSN Online: 1913-3723 ISSN Print: 1913-3715 P2P Traffic Optimization Based on Dynamic Network Information
More informationContent Overlays (continued) Nick Feamster CS 7260 March 26, 2007
Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured
More informationChunk Scheduling Strategies In Peer to Peer System-A Review
Chunk Scheduling Strategies In Peer to Peer System-A Review Sanu C, Deepa S S Abstract Peer-to-peer ( P2P) s t r e a m i n g systems have become popular in recent years. Several peer- to-peer systems for
More informationIN recent years, the amount of traffic has rapidly increased
, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed
More informationA Method of Identifying the P2P File Sharing
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications
More informationLecture 8: Application Layer P2P Applications and DHTs
Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationDistriubted Hash Tables and Scalable Content Adressable Network (CAN)
Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................
More informationAn Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs
An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,
More informationALTO Problem Statement
ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting Outline History The problem Main issues Use cases The cache location sub-problem Internet
More informationResearch on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud
2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous
More informationDesign and Implementation of an Anycast Efficient QoS Routing on OSPFv3
Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University
More informationCS 43: Computer Networks. 14: DHTs and CDNs October 3, 2018
CS 43: Computer Networks 14: DHTs and CDNs October 3, 2018 If Alice wants to stream Mad Men over a highspeed Internet connection her browser may choose a video rate A. in the range of Mbps. B. in the range
More informationTCP and UDP Fairness in Vehicular Ad hoc Networks
TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer
More informationHigh-Quality P2P Video Streaming System Considering the Cooperation of Constitution Information and Delivery Status
The 8th Annual IEEE Consumer Communications and Networking Conference - Multimedia & Entertainment Networking and Services High-Quality P2P Video Streaming System Considering the Cooperation of Constitution
More informationAnalysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN
Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor
More informationEarly Measurements of a Cluster-based Architecture for P2P Systems
Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella
More informationA priority based dynamic bandwidth scheduling in SDN networks 1
Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems
More informationPitfalls for ISP-friendly P2P design. Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD
Pitfalls for ISP-friendly P2P design Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD P2P & ISPs P2P systems: Large volume of traffic (20 80% of total)
More informationExtreme Computing. BitTorrent and incentive-based overlay networks.
Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some
More informationDiffServ Architecture: Impact of scheduling on QoS
DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics
More informationP2P content distribution Jukka K. Nurminen
P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient
More informationA Scheme of Multi-path Adaptive Load Balancing in MANETs
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication
More informationEnhancing Downloading Time By Using Content Distribution Algorithm
RESEARCH ARTICLE OPEN ACCESS Enhancing Downloading Time By Using Content Distribution Algorithm VILSA V S Department of Computer Science and Technology TKM Institute of Technology, Kollam, Kerala Mailid-vilsavijay@gmail.com
More informationPeer Assisted Content Distribution over Router Assisted Overlay Multicast
Peer Assisted Content Distribution over Router Assisted Overlay Multicast George Xylomenos, Konstantinos Katsaros and Vasileios P. Kemerlis Mobile Multimedia Laboratory & Department of Informatics Athens
More informationScalability of the BitTorrent P2P Application
Scalability of the BitTorrent P2P Application Kolja Eger, Ulrich Killat Hamburg University of Technology 5.Würzburger Workshop 8.-9. July 2005 Overview File dissemination in peer-to-peer (p2p) networks
More informationCollaborative Multi-Source Scheme for Multimedia Content Distribution
Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx
More informationA Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis
A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis Chih-Lin HU* and Zong-Xian LU Department of Communication Engineering, National Central University,
More informationPreliminary Research on Distributed Cluster Monitoring of G/S Model
Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 860 867 2012 International Conference on Solid State Devices and Materials Science Preliminary Research on Distributed Cluster Monitoring
More informationJoint Optimization of Content Replication and Server Selection for Video-On-Demand
Joint Optimization of Content Replication and Server Selection for Video-On-Demand Huan Huang Pengye Xia S.-H. Gary Chan Department of Compute Science and Engineering The Hong Kong University of Science
More informationIntroduction to P P Networks
Introduction to P P Networks B Sc Florian Adamsky florianadamsky@iemthmde http://florianadamskyit/ cbd Internet Protocols and Applications SS B Sc Florian Adamsky IPA / Outline Introduction What is P P?
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80
More informationPeer-to-Peer Applications Reading: 9.4
Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,
More informationA Top Catching Scheme Consistency Controlling in Hybrid P2P Network
A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),
More information[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations
Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer
More informationA Super-Peer Selection Strategy for Peer-to-Peer Systems
, pp.25-29 http://dx.doi.org/10.14257/astl.2016.125.05 A Super-Peer Selection Strategy for Peer-to-Peer Systems Won-Ho Chung 1 1 Department of Digital Media, Duksung Womens University whchung@duksung.ac.kr
More informationCOOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System
COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System Ubaid Abbasi and Toufik Ahmed CNRS abri ab. University of Bordeaux 1 351 Cours de la ibération, Talence Cedex 33405 France {abbasi,
More informationImprovement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks
Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 1133 1140 2012 International Conference on Solid State Devices and Materials Science Improvement of AODV Routing Protocol with QoS
More informationDo incentives build robustness in BitTorrent?
Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN
More informationAN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS Tomoyuki Ishiiand Atsushi Inoie * Department of Network Engineering, Kanagawa Institute of Technology, Atsugi-city, Japan
More informationUniversity of Würzburg Institute of Computer Science Research Report Series
University of Würzburg Institute of Computer Science Research Report Series Pushing the Performance of Biased Neighbor Selection through Biased Unchoking Simon Oechsner 1, Frank Lehrieder 1, Tobias Hoßfeld
More informationEfficiency of Data Distribution in BitTorrent-Like Systems
Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationOn characterizing BGP routing table growth
University of Massachusetts Amherst From the SelectedWorks of Lixin Gao 00 On characterizing BGP routing table growth T Bu LX Gao D Towsley Available at: https://works.bepress.com/lixin_gao/66/ On Characterizing
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationPeer to Peer Systems and Probabilistic Protocols
Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationA Bandwidth-Broker Based Inter-Domain SLA Negotiation
A Bandwidth-Broker Based Inter-Domain SLA Negotiation Haci A. Mantar θ, Ibrahim T. Okumus, Junseok Hwang +, Steve Chapin β θ Department of Computer Engineering, Gebze Institute of Technology, Turkey β
More informationPeer-to-Peer (P2P) Architectures
Peer-to-Peer (P2P) Architectures ECE/CS 658 Internet Engineering Dilum Bandara dilumb@engr.colostate.edu Outline Background Unstructured P2P Napster, Gnutella, & BitTorrent Structured P2P Chord & Kademlia
More informationSTUDYING OF CLASSIFYING CHINESE SMS MESSAGES
STUDYING OF CLASSIFYING CHINESE SMS MESSAGES BASED ON BAYESIAN CLASSIFICATION 1 LI FENG, 2 LI JIGANG 1,2 Computer Science Department, DongHua University, Shanghai, China E-mail: 1 Lifeng@dhu.edu.cn, 2
More informationLoad Balancing Technology White Paper
Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing
More informationTCP Probe: A TCP with built-in Path Capacity Estimation 1
TCP Probe: A TCP with built-in Path Capacity Estimation Anders Persson, Cesar A. C. Marcondes 2, Ling-Jyh Chen, Li Lao, M. Y. Sanadidi, and Mario Gerla Computer Science Department University of California,
More informationA Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes 1,* Chengpei Tang, 1 Jiao Yin, 1 Yu Dong 1
More informationHirochika Asai U. Tokyo Hiroshi Esaki U. Tokyo Tsuyoshi Momose Cisco Systems
Hirochika Asai , U. Tokyo Hiroshi Esaki , U. Tokyo Tsuyoshi Momose , Cisco Systems July 28 th, 2010, P2P RG, IETF 78 The Internet Autonomous
More informationModel the P2P Attack in Computer Networks
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information
More informationA Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationLIBSWIFT P2P PROTOCOL: AN ANALYSIS AND EXTENSION
Master Thesis - TRITA-ICT-EX-2012-262 LIBSWIFT P2P PROTOCOL: AN ANALYSIS AND EXTENSION Fu Tang Design and Implementation of ICT products and systems Royal Institute of Technology (KTH) fut@kth.se October
More informationA Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol
A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,
More informationFrequency Oriented Scheduling on Parallel Processors
School of Mathematics and Systems Engineering Reports from MSI - Rapporter från MSI Frequency Oriented Scheduling on Parallel Processors Siqi Zhong June 2009 MSI Report 09036 Växjö University ISSN 1650-2647
More informationBitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.
BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and
More informationPeer-to-Peer Networks 12 Fast Download
Peer-to-Peer Networks 12 Fast Download Arne Vater Technical Faculty Computer Networks and Telematics University of Freiburg IP Multicast Motivation - Transmission of a data stream to many receivers Unicast
More information416 Distributed Systems. Mar 3, Peer-to-Peer Part 2
416 Distributed Systems Mar 3, Peer-to-Peer Part 2 Scaling Problem Millions of clients server and network meltdown 2 P2P System Leverage the resources of client machines (peers) Traditional: Computation,
More informationMaster s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems
Master s Thesis Title A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Supervisor Professor Masayuki Murata Author Hideto Horiuchi February 14th, 2007 Department
More informationLecture 17: Peer-to-Peer System and BitTorrent
CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and
More informationMulti-path based Algorithms for Data Transfer in the Grid Environment
New Generation Computing, 28(2010)129-136 Ohmsha, Ltd. and Springer Multi-path based Algorithms for Data Transfer in the Grid Environment Muzhou XIONG 1,2, Dan CHEN 2,3, Hai JIN 1 and Song WU 1 1 School
More informationLast Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1
Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking
More informationQuasi-Chord: physical topology aware structured P2P network
Quasi-Chord: physical topology aware structured PP network UN Mingsong ZHANG Zhongqiu Network Information Center, Harbin University of cience and Technology, China College of Computer ci&tech, Harbin University
More informationDISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES
DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationData-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network
Wireless Sensor Network, 2010, 2, 710-717 doi:10.4236/wsn.2010.29086 Published Online September 2010 (http://www.scirp.org/journal/wsn) Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor
More informationOpen Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network
Send Orders for Reprints to reprints@benthamscience.ae 690 The Open Electrical & Electronic Engineering Journal, 2014, 8, 690-694 Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation
More informationDistributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks
Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer
More informationApplication-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks
COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example
More informationMaking Gnutella-like P2P Systems Scalable
Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationPerforming MapReduce on Data Centers with Hierarchical Structures
INT J COMPUT COMMUN, ISSN 1841-9836 Vol.7 (212), No. 3 (September), pp. 432-449 Performing MapReduce on Data Centers with Hierarchical Structures Z. Ding, D. Guo, X. Chen, X. Luo Zeliu Ding, Deke Guo,
More informationVirtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing
Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,
More informationComparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks
Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit
More informationHierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks
Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Damien Magoni Université Louis Pasteur LSIIT magoni@dpt-info.u-strasbg.fr Abstract. Although distributed
More informationA Search Theoretical Approach to P2P Networks: Analysis of Learning
A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.
More informationOverlay/Underlay Routing Issues in Wireless Mesh Networks
Overlay/Underlay Routing Issues in Wireless Mesh Networks Stefano AVALLONE 1, Roberto CANONICO 1, Francesco Paolo D ELIA 1 1 University of Naples Federico II, Via Claudio 21, Naples, 80125, Italy Tel:
More information