Using Home Routers as Proxies for Energy-Efficient BitTorrent Downloads to Mobile Phones

Size: px
Start display at page:

Download "Using Home Routers as Proxies for Energy-Efficient BitTorrent Downloads to Mobile Phones"

Transcription

1 CONSUMER COMMUNICATIONS AND NETWORKING Using Home Routers as Proxies for Energy-Efficient BitTorrent Downloads to Mobile Phones Imre Kelényi and Ákos Ludányi, Budapest University of Technology and Economics Jukka K. Nurminen, Aalto University This work is connected to the scientific program of the The Development of Quality-Oriented and Cooperative R+D+I Strategy and Functional Model at BUTE project. This project is supported by Nokia Research Center and the New Hungary Development Plan (Project ID: TÁMOP-4.2.1/B- 9/1/KMR-21-2). Most of this research was done when Jukka K. Nurminen was working for Nokia Research Center. ABSTRACT Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this article, we analyze the implications of hosting a BitTorrent proxy on a broadband router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a router is limited; therefore, our interest is in how to efficiently use memory to download BitTorrent content as fast as possible and at the same time transfer it to the mobile phone in an energy-efficient way. We investigate these aspects via a series of measurements. The results show that the proxy-based solution outperforms the torrent client running on the phone in terms of energy and download time. We also simulate the BitTorrent operation to understand how these memory-limited devices would influence the operation of the whole community. INTRODUCTION Most peer-to-peer applications, including Bit- Torrent, were originally designed for PC devices. When they are used on handheld devices, such as mobile phones, new problems arise because of limited resources and more constrained communication. A particular worry, which is also the target of this article, is how the applications influence the energy consumption of the device. Frequent need to recharge is inconvenient for the user, and at times the electricity grid can be inaccessible. BitTorrent is currently the most popular peerto-peer content sharing solution, used all around the Internet. BitTorrent s key idea is that clients downloading content, which is often referred to as torrents, also become uploaders, and share the downloaded pieces with other peers. This enables scalability and robustness, making BitTorrent a serious alternative to centralized content sharing solutions such as FTP or HTTP. Running BitTorrent on mobile phones is clearly interesting for users as evidenced by close to 1, downloads of the native BitTorrent client for Symbian-based mobile phones in [1]. In our earlier work to improve the energy efficiency of content downloading [2] we investigated ways of using an intermediate server hosted in the Internet to download Bit- Torrent content. In that case, the transfer was split into two parts. Regular BitTorrent was used to download the content to the server, which was hosted on the Amazon EC2 cloud computing platform, and normal HTTP was used to transfer the complete file from the server to the phone. When receiving content from the proxy, the mobile phone experienced a higher bit rate, which, as earlier studies show [3], improves the energy efficiency of file transfer. The speed of BitTorrent download can vary considerably and is often well below the capacity of the wireless interface. In contrast, a proxy equipped with a high bandwidth upload link can send the data to the mobile phone in a fast energy-efficient burst. A practical problem of the proxy solution is where to host the proxies. One possibility is that the proxy is hosted on the Internet, but it is unclear how to cover the hosting costs of such a service. Another alternative is that users run the proxies on their PCs. This requires that PCs be accessible from mobile devices and powered on all the time, requiring careful security and energy consumption considerations. The third option, and the focus of this article, is that proxies are run on broadband routers in homes. The router platform is attractive for a number of reasons. First, since most homes are equipped with them, the installed base of routers is large. Second, many of the router platforms allow modifying the operating system. Third, routers are typically powered up all the time, and the energy consumption of the router is almost constant no matter how actively it is used. Running proxies on broadband routers would thus introduce no new costs. A number of new problems, however, arise because a broadband router has more limited resources than an average PC computer. Although some models allow hardware extensions with USB devices, and some high-end router models even have built-in support for tor /11/$ IEEE IEEE Communications Magazine June 211

2 rent download, typically, the memory size is limited and no mass memory is available. Future routers are likely to be more capable but we think that it is important to be able to work on minimalistic hardware, especially if we consider the generality of the idea, other extension cases in the future, and utilization of today s home routers. Prior research has investigated the use of helper nodes, peers that assist in content downloading without their own interest in the content [4, 5]. These ideas are related to our research but, in contrast to our work, they assume that the helper nodes are regular PCs with plentiful resources. In this research, we extend the earlier work in two directions. First, our explicit interest is in how the system can use a proxy peer to energyefficiently deliver a torrent to a battery powered, wirelessly connected mobile device. Second, in our solution we use regular router models, which do not have space to store the whole torrent. The ability to store and share pieces that a peer has already downloaded is one of the key concepts of BitTorrent. If the storage space is limited, downloaded pieces have to be discarded when the memory fills up, and thus cannot be shared any longer. Consequently, we investigate how this influences BitTorrent s behavior and what policies and mechanisms are needed to manage the memory. Our target is that these solutions are compatible with the existing Bit- Torrent clients and that they do not harm the download performance of regular peers. We explore these mechanisms in detail. We describe our prototype implementation and the measurement results of the performance of the system. We discuss our simulations for analyzing the effect of our key mechanisms to the performance of both proxy and regular peers on a large scale. We briefly review related studies, and then conclude the article and discuss some ideas for further research. THE ROUTER PROXY SOLUTION AND ITS DIFFICULTIES With the proxy solution, the torrent download is divided into two overlapping activities. To the swarm (the set of peers downloading and sharing a particular torrent) the proxy looks like a regular BitTorrent peer; it downloads and uploads content with the normal mechanisms. At the same time, it forwards downloaded content to the mobile phone. Because these two activities have to be done using the limited memory of the router, two interesting questions arise: how to serve other peers when the whole torrent does not fit into the memory and when to communicate with the mobile device. A key assumption of BitTorrent operation is that when a peer has completely downloaded a piece of the torrent, it announces the availability of the piece to its peers. The peers can then assume that the announced piece is available for download. This is, however, not the case if only part of the content fits in the router memory. To be able to download the whole torrent, the router has to delete some pieces after they have been sent to the mobile device, and then reuse the memory to download additional pieces. The assumption that a piece a peer has downloaded is available for others is thus no longer valid. The trivial solution to this problem is to ignore it. The BitTorrent client in the router would announce the pieces normally. Then it would later receive requests for pieces that have already been deleted from the memory and cannot be uploaded to other peers anymore. This would have a negative effect on the download speed because most clients stop serving or even disconnect peers that cannot serve a requested piece. Another alternative is to announce no pieces at all and miss the opportunity to serve other peers. However, this free-rider behavior is bad for the proxy itself because BitTorrent s tit-fortat algorithm ranks it low, resulting in slow download speed. Furthermore, if the number of such proxies in the BitTorrent swarm is high, it can have a negative effect on the download speed of other peers. In order to both serve other peers and ensure that all of the piece announcements the proxy peer makes are valid, our solution divides the available memory into two buffers. The download buffer holds transient data on the way to the mobile; the pieces are downloaded from peers, sent to the mobile device, and discarded. Then the same memory space is reused to download other pieces. The content of the download buffer is thus constantly changing as the download of the torrent progresses. The upload buffer, on the other hand, stores pieces that are served to the swarm. After a piece in the upload buffer has been downloaded and sent to the mobile device, it remains in the memory and is made available for other peers with the normal BitTorrent piece transfer mechanisms. The concept is illustrated in Fig. 1. The system also has to decide when to communicate with the mobile device. We use a parameter, chunk size, to indicate how many pieces should be completely available before they are sent to the mobile. Intuitively, a bigger chunk size would reduce download speed and waste memory because a number of completely downloaded pieces are waiting for other pieces to complete. On the other hand, sending a bigger set of data to the mobile phone in one pass would improve energy-efficiency. UPLOAD/DOWNLOAD BUFFER ALLOCATION Determining how to allocate the router s memory to upload and the download buffers is not trivial. A large download buffer would allow downloading more pieces in parallel. However, if the peer cannot serve others, BitTorrent s titfor-tat mechanism may prevent it from utilizing its full download capacity. As a rule of thumb, the peer should allocate as much of its storage capacity for downloading as needed to maintain the maximum number of parallel downloads, while using the remaining capacity for uploading to maintain a good tit-fortat ranking. Because the number of parallel downloads depends on the dynamic characteristics of the swarm, a static upload/download buffer ratio does not work in all cases. There- Future routers are likely to be more capable but we think that it is important to be able to work on minimalistic hardware, especially if we consider the generality of the idea, other extension cases in the future, and utilization of today s home routers. IEEE Communications Magazine June

3 Router memory BitTorrent Upload buffer (3 pieces) Figure 1. ProxyTorrent architecture. Download buffer (4 pieces) fore, we developed an adaptive buffer allocation algorithm to optimize the download speed of torrents with different swarm characteristics. The main idea of the algorithm is to try to start downloading from as many peers as possible, and then dynamically reallocate the unused part of the download buffer to the upload buffer. Thus, after joining the swarm and establishing the connections, we set the number of download pieces to be equal to the number of accessible peers with pieces we like to download. Then we periodically check the utilization of the download buffer. If it is underutilized, we reallocate some space from the download buffer to the upload buffer. In this way, the download buffer size can only shrink during the download process. This is in line with the fact that the number of peers we are interested in is also likely to decrease as the download progresses because when the peer is getting more pieces, the number of peers in possession of still missing pieces gets smaller. ENERGY MEASUREMENTS AND RESULTS THE ROUTER-BASED BITTORRENT PROXY PROTOTYPE Standard BitTorrent traffic via TCP High speed bursty transfers In our prototype system we used a Linux-based router to host the proxy. The Linux distribution we installed on the routers is DD-WRT [6], which is an open source embedded operating system especially tailored for routers. In addition to giving us the ability to fully control the router s network configuration setup, DD-WRT allows us to build and execute custom applications on a wide range of commercially available routers. We used Asus WL-5gP, which has a 266 MHz CPU, 8 Mbytes flash storage, and 32 Mbytes RAM. For the BitTorrent downloads we used the Enhanced CTorrent BitTorrent client [7], which we extended with the proxy functionality. CTorrent is a standard BitTorrent client designed to be quick and lightweight, which are the key requirements for a client running on a router with limited resources. The modified version allows us to specify the size of the upload and download buffers plus the chunk size. We used Nokia N82 phones to perform the measurements. The energy consumption was measured using Nokia Energy Profiler [8]. We developed a mobile client with Java ME, which can start torrent downloads and receive the downloaded pieces from the proxy. The mobile client establishes multiple TCP connections with the proxy and uses them in parallel when downloading new pieces from the proxy. We varied the number of parallel TCP connections and found that more connections resulted in higher speeds. However, increasing the number of connections beyond five did not improve the speed anymore. Therefore, we used five sessions for the measurements. We allocated roughly 13 Mbytes of the router s RAM memory for ProxyTorrent to have capacity for 1 BitTorrent pieces (of 128 kbyte in size); the remaining memory was used by the operating system and services running on the router. We performed a set of tests with different memory buffer allocations, which showed that for good performance the majority of the memory should be allocated for the upload buffer. This was also verified by the simulations. Consequently, we used a fixed allocation of 75 percent upload buffer and 25 percent download buffer. We performed all of the measurements in a one-week period. We repeated each measurement at least three times, and calculated the average download time and energy consumption. The scenario was to download a popular, heavily seeded 15-Mbyte torrent with 128-kbyte piece size to the phone. During the tests, the swarm had around 5 peers and around 1:5 leecher/ seeder ratio. For comparison, we also downloaded the same torrent with SymTorrent, the phonebased standard BitTorrent client, and CloudTorrent, our Amazon EC2-based centralized proxy solution. MEASUREMENT RESULTS The third-generaton (3G) and WLAN-based measurement results are shown in Fig. 2. The router-based proxy results are labeled Proxy- Torrent plus the chunk size used for the transfer (e.g., CS 5 means five pieces are sent to the phone in one chunk). ProxyTorrent outperforms both SymTorrent and CloudTorrent. Compared with SymTorrent, using the router-based proxy consumes 4 percent less energy with 3G and 55 percent less with WLAN. As expected, doing transfers at higher speeds significantly improves the energy efficiency. In addition to better bandwidth utilization, shorter download times and lower protocol overhead contribute to energy savings. Figure 2 also shows that transferring data in larger chunks reduces the energy consumption of 3G downloads to some degree (the difference between using 1 and 1 chunks is 9 percent), but with WLAN the chunk size does not influence 144 IEEE Communications Magazine June 211

4 energy consumption. The reason for the different behavior is the power saving mechanisms of these two radio technologies; WLAN can switch the radio interface to idle mode rapidly after a transfer has finished, while with 3G returning to idle state after a completed transfer typically takes around 1 s (the exact time depends on the operator). Thus, with WLAN the best strategy is to send each received piece immediately to the mobile because it reduces the total download time. In contrast, for 3G bigger chunk sizes are better. One strange phenomenon is the relatively poor performance of CloudTorrent. CloudTorrent first downloads the full torrent to the cloud server; then the client starts requesting the content file by file via HTTP requests. During the measurements, we experienced transfers to the mobile from the cloud being much slower than transfers from the proxy. A possible explanation is the different geographical locations (the router proxy was in the same city as the phone) and the different technologies used for transferring the data (CloudTorrent used parallel HTTP transfers with complete files; ProxyTorrent transferred smaller chunks of data via TCP connections). Nevertheless, CloudTorrent still outperformed the dedicated mobile client with both 3G and WLAN, and the proxy-based solution was more energy-efficient and faster than both alternatives. BITTORRENT SWARM SIMULATIONS SIMULATION SETUP The goal of the simulations was to investigate how the system would work on a larger scale and to validate the proposed adaptive upload/download buffer allocation algorithm. We used a modified version of a discrete-event BitTorrent simulator originally developed by Microsoft Research [9]. The simulator models most Bit- Torrent mechanisms, including tit-for-tat, choking, and rarest first piece selection. Support for end-game mode is missing, which increases the download time of the last few pieces of the torrent; however, since all of the simulated peers suffer from this, their relative performance is not affected significantly. The network model is based on a fluid model of connections, which assumes that the flows traversing a link share the link bandwidth equally. The dynamics of TCP connections are not modeled. Thus, it is assumed that the bottleneck link is either the uplink of the sending node or the downlink of the receiving node. The simulated proxy peers were configured to use chunk size 1 and stopped uploading to other BitTorrent peers while uploading to the mobile. SIMULATION RESULTS In the simulations, we focused on two cases: a swarm with a small number of proxy peers (5 percent) and a swarm with 5 percent of proxy peers. We used different static upload/download buffer allocation ratios as well as the adaptive strategy introduced earlier. It should also be noted that in contrast with the measurements, a larger, 5-Mbyte torrent was used, so that different buffer allocation strategies have a more Energy consumptino (J) 15 1 WLAN energy 3G energy WLAN download time 8 3G download time CloudTorrent SymTorrent ProxyTorrent - CS 1 ProxyTorrent - CS 5 Figure 2. Measured energy consumption and download time of a 15-Mbyte torrent with different systems and access technologies. Different chunk sizes (CS) were used in the three ProxyTorrent measurements. Download time (s) Unlimited Adaptive /1 25/75 visible effect. The results are shown in Figs. 3 and 4. The labels on the X axis refer to the different allocation strategies; for example, 25/75 means that 25 percent of the storage was used for the upload buffer and 75 percent for the download buffer. We also simulated unlimited buffer capacity, which equals using standard Bit- Torrent without any limitations. In both the 5 and 5 percent simulations, choosing the right allocation strategy has a significant effect on the download speed of the proxy peers (the download time difference between /1 and 75/25 is more than 25 percent). Furthermore, it is clearly visible that increasing the size of the upload buffer (and decreasing the size of the download buffer) is beneficial until some point (somewhere around 9/1), but after that, further decreasing the size of the download buffer starts to have a negative effect on the proxy peer since the client cannot ProxyTorrent - CS 1 Figure 3. The simulated effect of different memory allocation alternatives to torrent download times with 5 percent proxy peers. 5/5 75/25 9/1 95/5 4 2 Standard peer Proxy peer 99/1 Download time (s) IEEE Communications Magazine June

5 Download time (s) Download buffer size Unlimited 1 Adaptive 2 do enough parallel transfers. Using only 25 percent of the memory (3 Mbytes) for uploads, which is less than 1 percent of the full size of the torrent, already resulted in a major increase in download performance, compared with the freerider case. In the 5 percent case, the download speed of the standard peers is only slightly affected by the buffer allocation strategy, which is not surprising, since the low number of limited peers cannot have a real impact on the swarm s performance. In the 5 percent case, however, using different buffer sizes has a more significant effect, since a larger portion of the peers and their capacities are affected. Although proxy peers start to suffer if they have an undersized download buffer, standard peers always benefit from a larger number of upload slots. /1 3 25/75 Figure 4. The simulated effect of different memory allocation alternatives on torrent download times: the case of 5 percent proxy peers. Time since join (s) Figure 5. Simulated effect of the adaptive buffer allocation algorithm. The average share of download buffer of proxy peers as a function of the time spent since joining the network. 5/5 4 75/25 5 9/1 6 Standard peer Proxy peer 95/5 5% limited 5% limited 7 99/1 8 The adaptive strategy performed well, matching the best download times achieved with static allocation strategies. Figure 5 shows how the adaptive algorithm controls the download buffer size as time passes (the charts show average values over all proxy peers). The buffer allocation gradually settles to around 9/1 upload/download ratio. A slight difference between the 5 percent and 5 percent cases is also visible: in the swarm with the larger number of standard peers, the proxy peers are also served a bit more frequently, thus their download buffer size remains at a higher level for a longer period. RELATED WORK So far the energy efficiency of BitTorrent, or peer-to-peer file downloading in general, has mainly been investigated from two different angles: how to reduce the standby energy consumption of PC peers [1, 11] and how to perform active content download energy-efficiently with a mobile peer [2, 12, 13]. In another track, the use of helper nodes to speed up torrent downloads has shown promising results [5, 4]. The use of memory-limited devices to help torrent downloads seems to be absent in prior work. In general, the use of proxies to improve energy efficiency of mobile applications has been widely studied. For instance, Flinn and Satyanarayanan [14] discuss how to create energyadaptive applications based on proxies and Shenov and Radkov [15] use a proxy to improve the energy-efficiency of streaming content to mobile devices. The nano data center concept [16] provides services with hardware distributed at homes. This operator-controlled community solution is based on enhanced versions of normal routers. While savings in the overall energy consumption is a key target, the focus is on the infrastructure side, not on the energy-efficient operation of the terminal devices. CONCLUSIONS In this article, we have analyzed how proxies running on resource-limited broadband routers can help mobile phones download content with BitTorrent. The particular challenge of hosting the proxy on a router is that the memory capacity is very limited. Therefore, new mechanisms for efficient memory use are needed. The most important conclusions of this study are: The proxy peer solution helps the mobile device save battery power when downloading Bit- Torrent content. The amount of energy saved depends on several factors, including the popularity of the torrent, and the bandwidth of the proxy and the mobile phone. In comparison to downloading the torrent directly to the phone with a native client, we can save around 4 5 percent energy according to our measurement results. The performance of the router proxy depends strongly on efficient use of the limited memory space of the router. The amount of memory allocated to serve uploads to other peers strongly influences the torrent download speed. We introduced an adaptive buffer allocation algorithm 146 IEEE Communications Magazine June 211

6 that can be used to determine the optimal allocation ratio. The download speed is also influenced by the amount of data that is sent to the mobile in one pass, especially in 3G networks. The energy consumption of the mobile phone depends on both the torrent download speed and the chunk size. Higher download speeds and bigger chunk sizes result in energy savings. This is especially true with 3G cellular networks. With WLAN connections, using optimal parameters is less important. REFERENCES [1] SymTorrent, [2] I. Kelényi and J. K. Nurminen, CloudTorrent Energy- Efficient BitTorrent Content Sharing for Mobile Devices via Cloud Services, Proc. 7th IEEE CCNC, Las Vegas, NV, 21. [3] J. K. Nurminen, Parallel Connections and their Effect on the Battery Consumption of a Mobile Phone, Proc. 7th IEEE CCNC, Las Vegas, NV, 21. [4] P. Garbacki et al., 2Fast: Collaborative Downloads in P2P Networks, Proc. 6th IEEE P2P, Los Alamitos, CA, 26. [5] J., Wong, Enhancing collaborative Content Delivery with Helpers, Master s yhesis, Univ. of British Columbia, 24. [6] DD-WRT, [7] Enhanced CTorrent, [8] G. Bosch Creus and M. Kuulusa, Optimizing Mobile Software with Built-in Power Profiling, F. Fitzek and F. Reichert, Eds., Mobile Phone Programming and Uts Application to Wireless Networking, Springer, 27. [9] A. Bharambe, C. Herley, and V. N. Padmanabhan, Analyzing and Improving a BitTorrent Network s Performance Mechanisms, Proc. 25th IEEE INFOCOM, 26. [1] J. Blackburn and K. Christensen, A Simulation Study of a New Green BitTorrent, Proc. 1st Int l. Wksp. Green Commun., 29. [11] M. Jimeno and K. Christensen, A Prototype Power Management Proxy for Gnutella Peer-to-Peer File Sharing, Proc. 32nd IEEE Conf. Local Computer Networks, 27. [12] J. K. Nurminen and J. Nöyränen, Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing, Proc. 5th IEEE CCNC, Las Vegas, NV, 28. [13] I. Kelényi and J. K. Nurminen. Energy-Efficient Peer-to-Peer Content Sharing Using Application-Level Traffic Sharing, Proc. 4th ACM PM2HW2N, Tenerife, Spain, 29. [14] J. Flinn and M. Satyanarayanan, Energy-Aware Adaptation for Mobile Applications, Proc. 17th ACM Symp. Operating Systems Principles, Charleston, SC, [15] P. J. Shenoy and P. Radkov, Proxy-Assisted Power-Friendly Streaming to Mobile Devices, Proc. SPIE, 23. [16] V. Valancius et al., Greening the Internet with Nano Data Centers, Proc. CoNEXT 9, 29. BIOGRAPHIES IMRE KELÉNYI (imre.kelenyi@aut.bme.hu) is currently an assistant professor in the Department of Automation and Applied Informatics, Budapest University of Technology and Economics (BME), Hungary. He received his Master s degree in technical informatics from BME in 27. He completed BME s Ph.D. course in 21. Currently he is preparing his Ph.D. dissertation on energy-efficient mobile peer-to-peer systems, which is also his primary research interest. He is the creator of the world s first ever mobile BitTorrent and Gnutella clients, SymTorrent and Symella. He has worked as a contract software engineer for various companies including Nokia, Nokia Siemens Networks, and T-Mobile. ÁKOS LUDANYI (llutyo@gmail.com) received an outstanding B.Sc. degree in computer engineering from BME in 21. Now he is attending an M.Sc. course on applied informatics at BME. His research interest is mobile P2P applications. He worked at NavNGo, developing car navigation systems. Currently he is working as a software engineer for BME s Applied Mobile Research Group and Nokia. JUKKA K. NURMINEN (jukka.k.nurminen@aalto.fi) is a professor of data communication software at Aalto University in Finland. Before returning to academia he spent almost 25 years at Nokia Research Center working on a variety of topics related to mobile applications and services. His current interests are mobile computing, peer-to-peer applications, and the energy efficiency of distributed solutions. He received his M.Sc. degree in 1986 and Ph.D. degree in 23 from Helsinki University of Technology. The energy consumption of the mobile phone depends on both the torrent download speed and the chunk size. Higher download speeds and bigger chunk sizes result in energy savings. This is especially true with 3G cellular networks. With WLAN connections, using optimal parameters is less important. IEEE Communications Magazine June

UNCORRECTED PROOF AUTHOR'S PROOF. Keywords Energy-efficiency. Proxy. Peer-to-peer. BitTorrent. Broadband router. Mobile.

UNCORRECTED PROOF AUTHOR'S PROOF. Keywords Energy-efficiency. Proxy. Peer-to-peer. BitTorrent. Broadband router. Mobile. 1 3 2 DOI 10.1007/s12083-011-0107-5 4 Modeling resource constrained BitTorrent proxies for energy 5 efficient mobile content sharing 6 Imre Kelényi & Jukka K. Nurminen & Ákos Ludányi & 7 Tamás Lukovszki

More information

Mobile P2P Energy-efficiency issues on mobile phones

Mobile P2P Energy-efficiency issues on mobile phones Mobile P2P Energy-efficiency issues on mobile phones Dr. Zhonghong Ou Department of Computer Science and Engineering, Aalto University 1 Slides are partially from Prof. Jukka Nurmimen Slow growth in battery

More information

Bursty Content Sharing Mechanism for Energy-Limited Mobile Devices

Bursty Content Sharing Mechanism for Energy-Limited Mobile Devices Bursty Content Sharing Mechanism for Energy-Limited Mobile Devices Imre Kelényi Budapest University of Technology and Economics Budapest, Hungary imre.kelenyi@aut.bme.hu Jukka K. Nurminen Nokia Research

More information

Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing

Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing Jukka K. Nurminen, Janne Nöyränen Nokia Research Center {jukka.k.nurminen, janne.noyranen}@nokia.com Abstract Battery consumption

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

P2P content distribution Jukka K. Nurminen

P2P content distribution Jukka K. Nurminen P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient

More information

P2P content distribution

P2P content distribution P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer

More information

BitTorrent and CoolStreaming

BitTorrent and CoolStreaming BitTorrent and CoolStreaming Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen Aalto University P2P Networks BitTorrent

More information

Hybrid Peer-to-Peer Content Sharing in Mobile Networks

Hybrid Peer-to-Peer Content Sharing in Mobile Networks JOURNAL OF NETWORKS, VOL. 4, NO. 2, APRIL 2009 119 Hybrid Peer-to-Peer Content Sharing in Mobile Networks P Ekler Department of Automation and Applied Informatics, Budapest, Hungary Email: peter.ekler@aut.bme.hu

More information

Efficiency of Data Distribution in BitTorrent-Like Systems

Efficiency of Data Distribution in BitTorrent-Like Systems Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department

More information

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved. BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and

More information

Building Motion and Noise Detector Networks from Mobile Phones

Building Motion and Noise Detector Networks from Mobile Phones Magyar Kutatók 9. Nemzetközi Szimpóziuma 9 th International Symposium of Hungarian Researchers on Computational Intelligence and Informatics Building Motion and Noise Detector Networks from Mobile Phones

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

P2P and Handheld Devices Jukka K. Nurminen

P2P and Handheld Devices Jukka K. Nurminen P2P and Handheld Devices Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials P2P and handheld devices Mainly experimental systems so far. E.g. Symella, TymTorrent, P2PSIP Paradigm: bring existing

More information

Peer to Peer Systems and Probabilistic Protocols

Peer to Peer Systems and Probabilistic Protocols Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good

More information

Peer-to-peer & Energy Consumption

Peer-to-peer & Energy Consumption Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science

More information

Peer Assisted Content Distribution over Router Assisted Overlay Multicast

Peer Assisted Content Distribution over Router Assisted Overlay Multicast Peer Assisted Content Distribution over Router Assisted Overlay Multicast George Xylomenos, Konstantinos Katsaros and Vasileios P. Kemerlis Mobile Multimedia Laboratory & Department of Informatics Athens

More information

On maximum throughput in BitTorrent

On maximum throughput in BitTorrent Gradus Vol 3, No 2 (2016) 67-72 ISSN 2064-8014 On maximum throughput in BitTorrent Elvira Dobjánné Antal 1, and Tamás Vinkó 2 1 Department of Natural Sciences and Engineering, Faculty of Mechanical Engineering

More information

BitTorrent Based Solution for Efficient Content Sharing on Next Generation Networks

BitTorrent Based Solution for Efficient Content Sharing on Next Generation Networks 1 BitTorrent Based Solution for Efficient Content Sharing on Next Generation Networks P. Ekler, I. Dévai, B. Bakos, A. J. Kiss Abstract As the architecture of participation became the main design principle

More information

BitTorrent Fairness Analysis

BitTorrent Fairness Analysis BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)

More information

Do incentives build robustness in BitTorrent?

Do incentives build robustness in BitTorrent? Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN

More information

Peer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K.

Peer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K. Peer-to-peer T-110.7100 Applications and Services in Internet, Fall 2009 Jukka K. Nurminen 1 V1-Filename.ppt / 2008-10-22 / Jukka K. Nurminen Schedule Tue 15.9.2009 12-14 Tue 22.9.2009 12-14 Introduction

More information

Lecture 17: Peer-to-Peer System and BitTorrent

Lecture 17: Peer-to-Peer System and BitTorrent CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and

More information

Enhancing Downloading Time By Using Content Distribution Algorithm

Enhancing Downloading Time By Using Content Distribution Algorithm RESEARCH ARTICLE OPEN ACCESS Enhancing Downloading Time By Using Content Distribution Algorithm VILSA V S Department of Computer Science and Technology TKM Institute of Technology, Kollam, Kerala Mailid-vilsavijay@gmail.com

More information

Introduction to Distributed Computing Systems

Introduction to Distributed Computing Systems Introduction to Distributed Computing Systems Alexandru Iosup Parallel and Distributed Systems Group Delft University of Technology Some material kindly provided by the PDS group. 1 What is a Distributed

More information

Extreme Computing. BitTorrent and incentive-based overlay networks.

Extreme Computing. BitTorrent and incentive-based overlay networks. Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some

More information

T Computer Networks Green ICT

T Computer Networks Green ICT T-110.4100 Computer Networks Green ICT 08.05.2012 Matti Siekkinen External sources: Y. Xiao: Green communications. T-110.5116 lecture. Aalto. 2010. Which one is Green ICT? Source: Google image What is

More information

Collaborative Multi-Source Scheme for Multimedia Content Distribution

Collaborative Multi-Source Scheme for Multimedia Content Distribution Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx

More information

Introduction to P P Networks

Introduction to P P Networks Introduction to P P Networks B Sc Florian Adamsky florianadamsky@iemthmde http://florianadamskyit/ cbd Internet Protocols and Applications SS B Sc Florian Adamsky IPA / Outline Introduction What is P P?

More information

On Feasibility of P2P Traffic Control through Network Performance Manipulation

On Feasibility of P2P Traffic Control through Network Performance Manipulation THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE On Feasibility of P2P Traffic Control through Network Performance Manipulation HyunYong Lee Masahiro Yoshida

More information

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically

More information

Intelligent Energy Aware Networks - a Content Perspective

Intelligent Energy Aware Networks - a Content Perspective Intelligent Energy Aware Networks - a Content Perspective Jaafar Elmirghani, University of Leeds, UK j.m.h.elmirghani@leeds.ac.uk Outline Introduction The Intelligent Energy Aware Networks (INTERNET) project

More information

Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks

Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example

More information

Multi-threading technology and the challenges of meeting performance and power consumption demands for mobile applications

Multi-threading technology and the challenges of meeting performance and power consumption demands for mobile applications Multi-threading technology and the challenges of meeting performance and power consumption demands for mobile applications September 2013 Navigating between ever-higher performance targets and strict limits

More information

improving the performance and robustness of P2P live streaming with Contracts

improving the performance and robustness of P2P live streaming with Contracts MICHAEL PIATEK AND ARVIND KRISHNAMURTHY improving the performance and robustness of P2P live streaming with Contracts Michael Piatek is a graduate student at the University of Washington. After spending

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Loopback: Exploiting Collaborative Caches for Large-Scale Streaming

Loopback: Exploiting Collaborative Caches for Large-Scale Streaming Loopback: Exploiting Collaborative Caches for Large-Scale Streaming Ewa Kusmierek Yingfei Dong David Du Poznan Supercomputing and Dept. of Electrical Engineering Dept. of Computer Science Networking Center

More information

Content Distribution and BitTorrent [Based on slides by Cosmin Arad]

Content Distribution and BitTorrent [Based on slides by Cosmin Arad] ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying

More information

Improving BitTorrent: A Simple Approach

Improving BitTorrent: A Simple Approach Improving BitTorrent: A Simple Approach Alix L.H. Chow Univ. of Southern California Leana Golubchik Univ. of Southern California Vishal Misra Columbia University Abstract Measurement studies have shown

More information

The Scalability of Swarming Peer-to-Peer Content Delivery

The Scalability of Swarming Peer-to-Peer Content Delivery The Scalability of Swarming Peer-to-Peer Content Delivery Daniel Zappala Brigham Young University zappala@cs.byu.edu with Daniel Stutzbach Reza Rejaie University of Oregon Page 1 Motivation Small web sites

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80

More information

Doctoral Written Exam in Networking, Fall 2010

Doctoral Written Exam in Networking, Fall 2010 Doctoral Written Exam in Networking, Fall 2010 December 14, 2010 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Friday, December 17,

More information

P3 Insights Separate T-Mobile Binge On Fact from Fiction

P3 Insights Separate T-Mobile Binge On Fact from Fiction P3 Insights Separate T-Mobile Binge On Fact from Fiction P3 Group s Analysis of Crowdsourced Data Reveals Unlimited Mobile Video Plans Can Result in Win-Win-Win for Carriers, Consumers and Content Providers

More information

PMP 450 MaxBurst MIR

PMP 450 MaxBurst MIR PMP 450 MaxBurst MIR TABLE OF CONTENTS Carrier Class Ethernet Control 3 Capping Bandwidth 3 MIR and Burst Data Rate 4 Implementing the Burst Bucket in Multipoint Access Networks 4 PMP 450: Higher Throughput

More information

Chunk Scheduling Strategies In Peer to Peer System-A Review

Chunk Scheduling Strategies In Peer to Peer System-A Review Chunk Scheduling Strategies In Peer to Peer System-A Review Sanu C, Deepa S S Abstract Peer-to-peer ( P2P) s t r e a m i n g systems have become popular in recent years. Several peer- to-peer systems for

More information

It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley

It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley 1 A Brief History! Fall, 2006: Started Conviva with Hui Zhang (CMU)! Initial goal: use p2p technologies to reduce distribution

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Taming the Flood: How I Learned to Stop Worrying and Love the Swarm Yogesh Vedpathak Cleversafe

Taming the Flood: How I Learned to Stop Worrying and Love the Swarm Yogesh Vedpathak Cleversafe Taming the Flood: How I Learned to Stop Worrying and Love the Swarm Yogesh Vedpathak Cleversafe Topics Popular data Creating broadcasting storage system Bittorrent protocol Creating swarms and destroying

More information

Cooperation in Open Distributed Systems. Stefan Schmid

Cooperation in Open Distributed Systems. Stefan Schmid Cooperation in Open Distributed Systems Stefan Schmid T-Labs, Berlin, July 2, 2009 Distributed Systems 2008/9 Wireless: Many mobile phones today have WLAN (and even Skype) P2P: Olympic games 2008 live-broadcast

More information

CSE 486/586 Distributed Systems Peer-to-Peer Architectures

CSE 486/586 Distributed Systems Peer-to-Peer Architectures CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How

More information

Marcos Katz. Wireless Communications Research Seminar 2012

Marcos Katz. Wireless Communications Research Seminar 2012 Marcos Katz Wireless Communications Research Seminar 2012 Outline Mobile Clouds: Definition Some applications Santa Cloud Project Brief project description Current development Visions Mobile Clouds We

More information

A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network. * M. Padmavathi, ** R. M. Suresh

A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network. * M. Padmavathi, ** R. M. Suresh A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network * M. Padmavathi, ** R. M. Suresh * Assistant Professor, Department of Information Technology, RMD Engineering College, PO box

More information

Scalability of the BitTorrent P2P Application

Scalability of the BitTorrent P2P Application Scalability of the BitTorrent P2P Application Kolja Eger, Ulrich Killat Hamburg University of Technology 5.Würzburger Workshop 8.-9. July 2005 Overview File dissemination in peer-to-peer (p2p) networks

More information

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,

More information

Octoshape. Commercial hosting not cable to home, founded 2003

Octoshape. Commercial hosting not cable to home, founded 2003 Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server

More information

Analyzing and Improving a BitTorrent Network s Performance Mechanisms

Analyzing and Improving a BitTorrent Network s Performance Mechanisms Analyzing and Improving a BitTorrent Network s Performance Mechanisms Ashwin R. Bharambe Cormac Herley Venkata N. Padmanabhan Carnegie Mellon University Microsoft Research Microsoft Research Abstract In

More information

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme Yue Zhang 1 and Yunxia Pei 2 1 Department of Math and Computer Science Center of Network, Henan Police College, Zhengzhou,

More information

AN4777 Application note

AN4777 Application note Application note Implications of memory interface configurations on low-power STM32 microcontrollers Introduction The low-power STM32 microcontrollers have a rich variety of configuration options regarding

More information

Energy Efficient BitTorrent for Green P2P File Sharing

Energy Efficient BitTorrent for Green P2P File Sharing Energy Efficient BitTorrent for Green P2P File Sharing Giuseppe Anastasi Pervasive Computing & Networking Lab (Perlab) Dept. of Information Engineering, University of Pisa E-mail: giuseppe.anastasi@iet.unipi.it

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

CSC 4900 Computer Networks: Introduction

CSC 4900 Computer Networks: Introduction CSC 4900 Computer Networks: Introduction Professor Henry Carter Fall 2017 What s this all about? 2 A Modern Day Silk Road We live with nearly constant access to the most extensive system ever built by

More information

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured

More information

Peer-to-Peer Applications Reading: 9.4

Peer-to-Peer Applications Reading: 9.4 Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,

More information

A Case For OneSwarm. Tom Anderson University of Washington.

A Case For OneSwarm. Tom Anderson University of Washington. A Case For OneSwarm Tom Anderson University of Washington http://oneswarm.cs.washington.edu/ With: Jarret Falkner, Tomas Isdal, Alex Jaffe, John P. John, Arvind Krishnamurthy, Harsha Madhyastha and Mike

More information

BitTorrent Optimization Techniques. (from various online sources)

BitTorrent Optimization Techniques. (from various online sources) BitTorrent Optimization Techniques (from various online sources) Announcement No recitation next week! Final review session Next Sunday (5/2) 5-7pm, GHC 4215 Let us know what you want at http://www.doodle.com/6qvsnubhmam2zkxp

More information

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Selim Ciraci, Ibrahim Korpeoglu, and Özgür Ulusoy Department of Computer Engineering, Bilkent University, TR-06800 Ankara,

More information

inria , version 1-6 Sep 2006

inria , version 1-6 Sep 2006 Rarest First and Choke Algorithms Are Enough Arnaud Legout I.N.R.I.A. Sophia Antipolis France arnaud.legout@sophia.inria.fr G. Urvoy-Keller and P. Michiardi Institut Eurecom Sophia Antipolis France {Guillaume.Urvoy,Pietro.Michiardi}@eurecom.fr

More information

Doctoral Written Exam in Networking, Fall 2009

Doctoral Written Exam in Networking, Fall 2009 Doctoral Written Exam in Networking, Fall 2009 November 9, 2009 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, November

More information

Partners: Nokia, NSN, Aalto/ComNet, Aalto/CSE, UH, VTT Future Internet SHOK preconference Johanna Nieminen (Nokia)

Partners: Nokia, NSN, Aalto/ComNet, Aalto/CSE, UH, VTT Future Internet SHOK preconference Johanna Nieminen (Nokia) Partners: Nokia, NSN, Aalto/ComNet, Aalto/CSE, UH, VTT Future Internet SHOK preconference 30.5.2012 Johanna Nieminen (Nokia) Vision: Future Internet = a mission cri1cal backbone of global informa1on society

More information

Lecture 8: Application Layer P2P Applications and DHTs

Lecture 8: Application Layer P2P Applications and DHTs Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent

Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Guillaume Urvoy-Keller Institut Eurecom, France Email: urvoy@eurecom.fr Pietro Michiardi Institut Eurecom, France Email:

More information

BitTorrent. Internet Technologies and Applications

BitTorrent. Internet Technologies and Applications BitTorrent Internet Technologies and Applications Aims and Contents Aims Show benefits of P2P for file downloads Explain concepts of BitTorrent as a P2P file sharing application Show how BitTorrent protocol

More information

Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1

Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1 Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1 Contents: Introduction Multicast on parallel distributed systems Multicast on P2P systems Multicast on clouds High performance

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

The Google File System

The Google File System The Google File System Sanjay Ghemawat, Howard Gobioff and Shun Tak Leung Google* Shivesh Kumar Sharma fl4164@wayne.edu Fall 2015 004395771 Overview Google file system is a scalable distributed file system

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of

More information

MoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005

MoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005 MoB: A Mobile Bazaar for Wide Area Wireless Services R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005 What is MoB? It is an infrastructure for collaborative wide-area wireless data services.

More information

Unicasts, Multicasts and Broadcasts

Unicasts, Multicasts and Broadcasts Unicasts, Multicasts and Broadcasts Part 1: Frame-Based LAN Operation V1.0: Geoff Bennett Contents LANs as a Shared Medium A "Private" Conversation Multicast Addressing Performance Issues In this tutorial

More information

CS 640: Introduction to Computer Networks

CS 640: Introduction to Computer Networks CS 640: Introduction to Computer Networks Midterm II 12/14/2006 Allotted time: 11:00AM to 12:40 PM (100 minutes) Name: UW -ID Number: 1. There are 7 questions in this mid-term. All 7 must be answered for

More information

The Design Trade-offs of BitTorrent-like File Sharing Protocols

The Design Trade-offs of BitTorrent-like File Sharing Protocols The Design Trade-offs of BitTorrent-like File Sharing Protocols Bin Fan John C.S. Lui Dah-Ming Chiu Abstract The BitTorrent BT file sharing protocol is very popular due to its scalability property and

More information

MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST

MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250 1568 Vol.2, Issue 2 June 2012 72-78 TJPRC Pvt. Ltd., MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis

A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis Chih-Lin HU* and Zong-Xian LU Department of Communication Engineering, National Central University,

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

building BitTyrant, a (more) strategic BitTorrent client

building BitTyrant, a (more) strategic BitTorrent client M I C H A E L P I A T E K, T O M A S I S D A L, T O M A N D E R S O N, A R V I N D K R I S H N A M U R T H Y, A N D A R U N V E N K A T A R A M A N I building BitTyrant, a (more) strategic BitTorrent client

More information

The Impact of the DOCSIS 1.1/2.0 MAC Protocol on TCP

The Impact of the DOCSIS 1.1/2.0 MAC Protocol on TCP The Impact of the DOCSIS 11/20 MAC Protocol on TCP Jim Martin Department of Computer Science Clemson University Clemson, SC 29634-0974 jimmartin@csclemsonedu Abstract-- The number of broadband cable access

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Systematic Cooperation in P2P Grids

Systematic Cooperation in P2P Grids 29th October 2008 Cyril Briquet Doctoral Dissertation in Computing Science Department of EE & CS (Montefiore Institute) University of Liège, Belgium Application class: Bags of Tasks Bag of Task = set of

More information

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems An Query Processing Method according to System Environments in Database Broadcasting Systems M. KASHITA T. TERADA T. HARA Graduate School of Engineering, Cybermedia Center, Graduate School of Information

More information

Peer-to-Peer Streaming Systems. Behzad Akbari

Peer-to-Peer Streaming Systems. Behzad Akbari Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues

More information

Handling Flash Crowds from your Garage

Handling Flash Crowds from your Garage Handling Flash Crowds from your Garage Jeremy Elson, Jon Howell Microsoft Research presented by: Vrije Universiteit Amsterdam March 2, 2012 Overview Flash crowds Building blocks of a scalable system Scaling

More information

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network 1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay

More information

Wireless Data Efficiency Get the Most Megabytes for Your Buck Mobile Explosion 08 Las Vegas, January 25, 2008

Wireless Data Efficiency Get the Most Megabytes for Your Buck Mobile Explosion 08 Las Vegas, January 25, 2008 Wireless Data Efficiency Get the Most Megabytes for Your Buck Mobile Explosion 08 Las Vegas, January 25, 2008 Peter Rysavy Rysavy Research http://www.rysavy.com 1 Copyright 2006-2008 Rysavy Research Agenda

More information

CMSC 332 Computer Networks P2P and Sockets

CMSC 332 Computer Networks P2P and Sockets CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Configuring Advanced Radio Settings on the WAP371

Configuring Advanced Radio Settings on the WAP371 Article ID: 5069 Configuring Advanced Radio Settings on the WAP371 Objective Radio settings are used to configure the wireless radio antenna and its properties on the wireless access point (WAP) device

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information