Using Home Routers as Proxies for Energy-Efficient BitTorrent Downloads to Mobile Phones
|
|
- Merilyn Pope
- 5 years ago
- Views:
Transcription
1 CONSUMER COMMUNICATIONS AND NETWORKING Using Home Routers as Proxies for Energy-Efficient BitTorrent Downloads to Mobile Phones Imre Kelényi and Ákos Ludányi, Budapest University of Technology and Economics Jukka K. Nurminen, Aalto University This work is connected to the scientific program of the The Development of Quality-Oriented and Cooperative R+D+I Strategy and Functional Model at BUTE project. This project is supported by Nokia Research Center and the New Hungary Development Plan (Project ID: TÁMOP-4.2.1/B- 9/1/KMR-21-2). Most of this research was done when Jukka K. Nurminen was working for Nokia Research Center. ABSTRACT Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this article, we analyze the implications of hosting a BitTorrent proxy on a broadband router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a router is limited; therefore, our interest is in how to efficiently use memory to download BitTorrent content as fast as possible and at the same time transfer it to the mobile phone in an energy-efficient way. We investigate these aspects via a series of measurements. The results show that the proxy-based solution outperforms the torrent client running on the phone in terms of energy and download time. We also simulate the BitTorrent operation to understand how these memory-limited devices would influence the operation of the whole community. INTRODUCTION Most peer-to-peer applications, including Bit- Torrent, were originally designed for PC devices. When they are used on handheld devices, such as mobile phones, new problems arise because of limited resources and more constrained communication. A particular worry, which is also the target of this article, is how the applications influence the energy consumption of the device. Frequent need to recharge is inconvenient for the user, and at times the electricity grid can be inaccessible. BitTorrent is currently the most popular peerto-peer content sharing solution, used all around the Internet. BitTorrent s key idea is that clients downloading content, which is often referred to as torrents, also become uploaders, and share the downloaded pieces with other peers. This enables scalability and robustness, making BitTorrent a serious alternative to centralized content sharing solutions such as FTP or HTTP. Running BitTorrent on mobile phones is clearly interesting for users as evidenced by close to 1, downloads of the native BitTorrent client for Symbian-based mobile phones in [1]. In our earlier work to improve the energy efficiency of content downloading [2] we investigated ways of using an intermediate server hosted in the Internet to download Bit- Torrent content. In that case, the transfer was split into two parts. Regular BitTorrent was used to download the content to the server, which was hosted on the Amazon EC2 cloud computing platform, and normal HTTP was used to transfer the complete file from the server to the phone. When receiving content from the proxy, the mobile phone experienced a higher bit rate, which, as earlier studies show [3], improves the energy efficiency of file transfer. The speed of BitTorrent download can vary considerably and is often well below the capacity of the wireless interface. In contrast, a proxy equipped with a high bandwidth upload link can send the data to the mobile phone in a fast energy-efficient burst. A practical problem of the proxy solution is where to host the proxies. One possibility is that the proxy is hosted on the Internet, but it is unclear how to cover the hosting costs of such a service. Another alternative is that users run the proxies on their PCs. This requires that PCs be accessible from mobile devices and powered on all the time, requiring careful security and energy consumption considerations. The third option, and the focus of this article, is that proxies are run on broadband routers in homes. The router platform is attractive for a number of reasons. First, since most homes are equipped with them, the installed base of routers is large. Second, many of the router platforms allow modifying the operating system. Third, routers are typically powered up all the time, and the energy consumption of the router is almost constant no matter how actively it is used. Running proxies on broadband routers would thus introduce no new costs. A number of new problems, however, arise because a broadband router has more limited resources than an average PC computer. Although some models allow hardware extensions with USB devices, and some high-end router models even have built-in support for tor /11/$ IEEE IEEE Communications Magazine June 211
2 rent download, typically, the memory size is limited and no mass memory is available. Future routers are likely to be more capable but we think that it is important to be able to work on minimalistic hardware, especially if we consider the generality of the idea, other extension cases in the future, and utilization of today s home routers. Prior research has investigated the use of helper nodes, peers that assist in content downloading without their own interest in the content [4, 5]. These ideas are related to our research but, in contrast to our work, they assume that the helper nodes are regular PCs with plentiful resources. In this research, we extend the earlier work in two directions. First, our explicit interest is in how the system can use a proxy peer to energyefficiently deliver a torrent to a battery powered, wirelessly connected mobile device. Second, in our solution we use regular router models, which do not have space to store the whole torrent. The ability to store and share pieces that a peer has already downloaded is one of the key concepts of BitTorrent. If the storage space is limited, downloaded pieces have to be discarded when the memory fills up, and thus cannot be shared any longer. Consequently, we investigate how this influences BitTorrent s behavior and what policies and mechanisms are needed to manage the memory. Our target is that these solutions are compatible with the existing Bit- Torrent clients and that they do not harm the download performance of regular peers. We explore these mechanisms in detail. We describe our prototype implementation and the measurement results of the performance of the system. We discuss our simulations for analyzing the effect of our key mechanisms to the performance of both proxy and regular peers on a large scale. We briefly review related studies, and then conclude the article and discuss some ideas for further research. THE ROUTER PROXY SOLUTION AND ITS DIFFICULTIES With the proxy solution, the torrent download is divided into two overlapping activities. To the swarm (the set of peers downloading and sharing a particular torrent) the proxy looks like a regular BitTorrent peer; it downloads and uploads content with the normal mechanisms. At the same time, it forwards downloaded content to the mobile phone. Because these two activities have to be done using the limited memory of the router, two interesting questions arise: how to serve other peers when the whole torrent does not fit into the memory and when to communicate with the mobile device. A key assumption of BitTorrent operation is that when a peer has completely downloaded a piece of the torrent, it announces the availability of the piece to its peers. The peers can then assume that the announced piece is available for download. This is, however, not the case if only part of the content fits in the router memory. To be able to download the whole torrent, the router has to delete some pieces after they have been sent to the mobile device, and then reuse the memory to download additional pieces. The assumption that a piece a peer has downloaded is available for others is thus no longer valid. The trivial solution to this problem is to ignore it. The BitTorrent client in the router would announce the pieces normally. Then it would later receive requests for pieces that have already been deleted from the memory and cannot be uploaded to other peers anymore. This would have a negative effect on the download speed because most clients stop serving or even disconnect peers that cannot serve a requested piece. Another alternative is to announce no pieces at all and miss the opportunity to serve other peers. However, this free-rider behavior is bad for the proxy itself because BitTorrent s tit-fortat algorithm ranks it low, resulting in slow download speed. Furthermore, if the number of such proxies in the BitTorrent swarm is high, it can have a negative effect on the download speed of other peers. In order to both serve other peers and ensure that all of the piece announcements the proxy peer makes are valid, our solution divides the available memory into two buffers. The download buffer holds transient data on the way to the mobile; the pieces are downloaded from peers, sent to the mobile device, and discarded. Then the same memory space is reused to download other pieces. The content of the download buffer is thus constantly changing as the download of the torrent progresses. The upload buffer, on the other hand, stores pieces that are served to the swarm. After a piece in the upload buffer has been downloaded and sent to the mobile device, it remains in the memory and is made available for other peers with the normal BitTorrent piece transfer mechanisms. The concept is illustrated in Fig. 1. The system also has to decide when to communicate with the mobile device. We use a parameter, chunk size, to indicate how many pieces should be completely available before they are sent to the mobile. Intuitively, a bigger chunk size would reduce download speed and waste memory because a number of completely downloaded pieces are waiting for other pieces to complete. On the other hand, sending a bigger set of data to the mobile phone in one pass would improve energy-efficiency. UPLOAD/DOWNLOAD BUFFER ALLOCATION Determining how to allocate the router s memory to upload and the download buffers is not trivial. A large download buffer would allow downloading more pieces in parallel. However, if the peer cannot serve others, BitTorrent s titfor-tat mechanism may prevent it from utilizing its full download capacity. As a rule of thumb, the peer should allocate as much of its storage capacity for downloading as needed to maintain the maximum number of parallel downloads, while using the remaining capacity for uploading to maintain a good tit-fortat ranking. Because the number of parallel downloads depends on the dynamic characteristics of the swarm, a static upload/download buffer ratio does not work in all cases. There- Future routers are likely to be more capable but we think that it is important to be able to work on minimalistic hardware, especially if we consider the generality of the idea, other extension cases in the future, and utilization of today s home routers. IEEE Communications Magazine June
3 Router memory BitTorrent Upload buffer (3 pieces) Figure 1. ProxyTorrent architecture. Download buffer (4 pieces) fore, we developed an adaptive buffer allocation algorithm to optimize the download speed of torrents with different swarm characteristics. The main idea of the algorithm is to try to start downloading from as many peers as possible, and then dynamically reallocate the unused part of the download buffer to the upload buffer. Thus, after joining the swarm and establishing the connections, we set the number of download pieces to be equal to the number of accessible peers with pieces we like to download. Then we periodically check the utilization of the download buffer. If it is underutilized, we reallocate some space from the download buffer to the upload buffer. In this way, the download buffer size can only shrink during the download process. This is in line with the fact that the number of peers we are interested in is also likely to decrease as the download progresses because when the peer is getting more pieces, the number of peers in possession of still missing pieces gets smaller. ENERGY MEASUREMENTS AND RESULTS THE ROUTER-BASED BITTORRENT PROXY PROTOTYPE Standard BitTorrent traffic via TCP High speed bursty transfers In our prototype system we used a Linux-based router to host the proxy. The Linux distribution we installed on the routers is DD-WRT [6], which is an open source embedded operating system especially tailored for routers. In addition to giving us the ability to fully control the router s network configuration setup, DD-WRT allows us to build and execute custom applications on a wide range of commercially available routers. We used Asus WL-5gP, which has a 266 MHz CPU, 8 Mbytes flash storage, and 32 Mbytes RAM. For the BitTorrent downloads we used the Enhanced CTorrent BitTorrent client [7], which we extended with the proxy functionality. CTorrent is a standard BitTorrent client designed to be quick and lightweight, which are the key requirements for a client running on a router with limited resources. The modified version allows us to specify the size of the upload and download buffers plus the chunk size. We used Nokia N82 phones to perform the measurements. The energy consumption was measured using Nokia Energy Profiler [8]. We developed a mobile client with Java ME, which can start torrent downloads and receive the downloaded pieces from the proxy. The mobile client establishes multiple TCP connections with the proxy and uses them in parallel when downloading new pieces from the proxy. We varied the number of parallel TCP connections and found that more connections resulted in higher speeds. However, increasing the number of connections beyond five did not improve the speed anymore. Therefore, we used five sessions for the measurements. We allocated roughly 13 Mbytes of the router s RAM memory for ProxyTorrent to have capacity for 1 BitTorrent pieces (of 128 kbyte in size); the remaining memory was used by the operating system and services running on the router. We performed a set of tests with different memory buffer allocations, which showed that for good performance the majority of the memory should be allocated for the upload buffer. This was also verified by the simulations. Consequently, we used a fixed allocation of 75 percent upload buffer and 25 percent download buffer. We performed all of the measurements in a one-week period. We repeated each measurement at least three times, and calculated the average download time and energy consumption. The scenario was to download a popular, heavily seeded 15-Mbyte torrent with 128-kbyte piece size to the phone. During the tests, the swarm had around 5 peers and around 1:5 leecher/ seeder ratio. For comparison, we also downloaded the same torrent with SymTorrent, the phonebased standard BitTorrent client, and CloudTorrent, our Amazon EC2-based centralized proxy solution. MEASUREMENT RESULTS The third-generaton (3G) and WLAN-based measurement results are shown in Fig. 2. The router-based proxy results are labeled Proxy- Torrent plus the chunk size used for the transfer (e.g., CS 5 means five pieces are sent to the phone in one chunk). ProxyTorrent outperforms both SymTorrent and CloudTorrent. Compared with SymTorrent, using the router-based proxy consumes 4 percent less energy with 3G and 55 percent less with WLAN. As expected, doing transfers at higher speeds significantly improves the energy efficiency. In addition to better bandwidth utilization, shorter download times and lower protocol overhead contribute to energy savings. Figure 2 also shows that transferring data in larger chunks reduces the energy consumption of 3G downloads to some degree (the difference between using 1 and 1 chunks is 9 percent), but with WLAN the chunk size does not influence 144 IEEE Communications Magazine June 211
4 energy consumption. The reason for the different behavior is the power saving mechanisms of these two radio technologies; WLAN can switch the radio interface to idle mode rapidly after a transfer has finished, while with 3G returning to idle state after a completed transfer typically takes around 1 s (the exact time depends on the operator). Thus, with WLAN the best strategy is to send each received piece immediately to the mobile because it reduces the total download time. In contrast, for 3G bigger chunk sizes are better. One strange phenomenon is the relatively poor performance of CloudTorrent. CloudTorrent first downloads the full torrent to the cloud server; then the client starts requesting the content file by file via HTTP requests. During the measurements, we experienced transfers to the mobile from the cloud being much slower than transfers from the proxy. A possible explanation is the different geographical locations (the router proxy was in the same city as the phone) and the different technologies used for transferring the data (CloudTorrent used parallel HTTP transfers with complete files; ProxyTorrent transferred smaller chunks of data via TCP connections). Nevertheless, CloudTorrent still outperformed the dedicated mobile client with both 3G and WLAN, and the proxy-based solution was more energy-efficient and faster than both alternatives. BITTORRENT SWARM SIMULATIONS SIMULATION SETUP The goal of the simulations was to investigate how the system would work on a larger scale and to validate the proposed adaptive upload/download buffer allocation algorithm. We used a modified version of a discrete-event BitTorrent simulator originally developed by Microsoft Research [9]. The simulator models most Bit- Torrent mechanisms, including tit-for-tat, choking, and rarest first piece selection. Support for end-game mode is missing, which increases the download time of the last few pieces of the torrent; however, since all of the simulated peers suffer from this, their relative performance is not affected significantly. The network model is based on a fluid model of connections, which assumes that the flows traversing a link share the link bandwidth equally. The dynamics of TCP connections are not modeled. Thus, it is assumed that the bottleneck link is either the uplink of the sending node or the downlink of the receiving node. The simulated proxy peers were configured to use chunk size 1 and stopped uploading to other BitTorrent peers while uploading to the mobile. SIMULATION RESULTS In the simulations, we focused on two cases: a swarm with a small number of proxy peers (5 percent) and a swarm with 5 percent of proxy peers. We used different static upload/download buffer allocation ratios as well as the adaptive strategy introduced earlier. It should also be noted that in contrast with the measurements, a larger, 5-Mbyte torrent was used, so that different buffer allocation strategies have a more Energy consumptino (J) 15 1 WLAN energy 3G energy WLAN download time 8 3G download time CloudTorrent SymTorrent ProxyTorrent - CS 1 ProxyTorrent - CS 5 Figure 2. Measured energy consumption and download time of a 15-Mbyte torrent with different systems and access technologies. Different chunk sizes (CS) were used in the three ProxyTorrent measurements. Download time (s) Unlimited Adaptive /1 25/75 visible effect. The results are shown in Figs. 3 and 4. The labels on the X axis refer to the different allocation strategies; for example, 25/75 means that 25 percent of the storage was used for the upload buffer and 75 percent for the download buffer. We also simulated unlimited buffer capacity, which equals using standard Bit- Torrent without any limitations. In both the 5 and 5 percent simulations, choosing the right allocation strategy has a significant effect on the download speed of the proxy peers (the download time difference between /1 and 75/25 is more than 25 percent). Furthermore, it is clearly visible that increasing the size of the upload buffer (and decreasing the size of the download buffer) is beneficial until some point (somewhere around 9/1), but after that, further decreasing the size of the download buffer starts to have a negative effect on the proxy peer since the client cannot ProxyTorrent - CS 1 Figure 3. The simulated effect of different memory allocation alternatives to torrent download times with 5 percent proxy peers. 5/5 75/25 9/1 95/5 4 2 Standard peer Proxy peer 99/1 Download time (s) IEEE Communications Magazine June
5 Download time (s) Download buffer size Unlimited 1 Adaptive 2 do enough parallel transfers. Using only 25 percent of the memory (3 Mbytes) for uploads, which is less than 1 percent of the full size of the torrent, already resulted in a major increase in download performance, compared with the freerider case. In the 5 percent case, the download speed of the standard peers is only slightly affected by the buffer allocation strategy, which is not surprising, since the low number of limited peers cannot have a real impact on the swarm s performance. In the 5 percent case, however, using different buffer sizes has a more significant effect, since a larger portion of the peers and their capacities are affected. Although proxy peers start to suffer if they have an undersized download buffer, standard peers always benefit from a larger number of upload slots. /1 3 25/75 Figure 4. The simulated effect of different memory allocation alternatives on torrent download times: the case of 5 percent proxy peers. Time since join (s) Figure 5. Simulated effect of the adaptive buffer allocation algorithm. The average share of download buffer of proxy peers as a function of the time spent since joining the network. 5/5 4 75/25 5 9/1 6 Standard peer Proxy peer 95/5 5% limited 5% limited 7 99/1 8 The adaptive strategy performed well, matching the best download times achieved with static allocation strategies. Figure 5 shows how the adaptive algorithm controls the download buffer size as time passes (the charts show average values over all proxy peers). The buffer allocation gradually settles to around 9/1 upload/download ratio. A slight difference between the 5 percent and 5 percent cases is also visible: in the swarm with the larger number of standard peers, the proxy peers are also served a bit more frequently, thus their download buffer size remains at a higher level for a longer period. RELATED WORK So far the energy efficiency of BitTorrent, or peer-to-peer file downloading in general, has mainly been investigated from two different angles: how to reduce the standby energy consumption of PC peers [1, 11] and how to perform active content download energy-efficiently with a mobile peer [2, 12, 13]. In another track, the use of helper nodes to speed up torrent downloads has shown promising results [5, 4]. The use of memory-limited devices to help torrent downloads seems to be absent in prior work. In general, the use of proxies to improve energy efficiency of mobile applications has been widely studied. For instance, Flinn and Satyanarayanan [14] discuss how to create energyadaptive applications based on proxies and Shenov and Radkov [15] use a proxy to improve the energy-efficiency of streaming content to mobile devices. The nano data center concept [16] provides services with hardware distributed at homes. This operator-controlled community solution is based on enhanced versions of normal routers. While savings in the overall energy consumption is a key target, the focus is on the infrastructure side, not on the energy-efficient operation of the terminal devices. CONCLUSIONS In this article, we have analyzed how proxies running on resource-limited broadband routers can help mobile phones download content with BitTorrent. The particular challenge of hosting the proxy on a router is that the memory capacity is very limited. Therefore, new mechanisms for efficient memory use are needed. The most important conclusions of this study are: The proxy peer solution helps the mobile device save battery power when downloading Bit- Torrent content. The amount of energy saved depends on several factors, including the popularity of the torrent, and the bandwidth of the proxy and the mobile phone. In comparison to downloading the torrent directly to the phone with a native client, we can save around 4 5 percent energy according to our measurement results. The performance of the router proxy depends strongly on efficient use of the limited memory space of the router. The amount of memory allocated to serve uploads to other peers strongly influences the torrent download speed. We introduced an adaptive buffer allocation algorithm 146 IEEE Communications Magazine June 211
6 that can be used to determine the optimal allocation ratio. The download speed is also influenced by the amount of data that is sent to the mobile in one pass, especially in 3G networks. The energy consumption of the mobile phone depends on both the torrent download speed and the chunk size. Higher download speeds and bigger chunk sizes result in energy savings. This is especially true with 3G cellular networks. With WLAN connections, using optimal parameters is less important. REFERENCES [1] SymTorrent, [2] I. Kelényi and J. K. Nurminen, CloudTorrent Energy- Efficient BitTorrent Content Sharing for Mobile Devices via Cloud Services, Proc. 7th IEEE CCNC, Las Vegas, NV, 21. [3] J. K. Nurminen, Parallel Connections and their Effect on the Battery Consumption of a Mobile Phone, Proc. 7th IEEE CCNC, Las Vegas, NV, 21. [4] P. Garbacki et al., 2Fast: Collaborative Downloads in P2P Networks, Proc. 6th IEEE P2P, Los Alamitos, CA, 26. [5] J., Wong, Enhancing collaborative Content Delivery with Helpers, Master s yhesis, Univ. of British Columbia, 24. [6] DD-WRT, [7] Enhanced CTorrent, [8] G. Bosch Creus and M. Kuulusa, Optimizing Mobile Software with Built-in Power Profiling, F. Fitzek and F. Reichert, Eds., Mobile Phone Programming and Uts Application to Wireless Networking, Springer, 27. [9] A. Bharambe, C. Herley, and V. N. Padmanabhan, Analyzing and Improving a BitTorrent Network s Performance Mechanisms, Proc. 25th IEEE INFOCOM, 26. [1] J. Blackburn and K. Christensen, A Simulation Study of a New Green BitTorrent, Proc. 1st Int l. Wksp. Green Commun., 29. [11] M. Jimeno and K. Christensen, A Prototype Power Management Proxy for Gnutella Peer-to-Peer File Sharing, Proc. 32nd IEEE Conf. Local Computer Networks, 27. [12] J. K. Nurminen and J. Nöyränen, Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing, Proc. 5th IEEE CCNC, Las Vegas, NV, 28. [13] I. Kelényi and J. K. Nurminen. Energy-Efficient Peer-to-Peer Content Sharing Using Application-Level Traffic Sharing, Proc. 4th ACM PM2HW2N, Tenerife, Spain, 29. [14] J. Flinn and M. Satyanarayanan, Energy-Aware Adaptation for Mobile Applications, Proc. 17th ACM Symp. Operating Systems Principles, Charleston, SC, [15] P. J. Shenoy and P. Radkov, Proxy-Assisted Power-Friendly Streaming to Mobile Devices, Proc. SPIE, 23. [16] V. Valancius et al., Greening the Internet with Nano Data Centers, Proc. CoNEXT 9, 29. BIOGRAPHIES IMRE KELÉNYI (imre.kelenyi@aut.bme.hu) is currently an assistant professor in the Department of Automation and Applied Informatics, Budapest University of Technology and Economics (BME), Hungary. He received his Master s degree in technical informatics from BME in 27. He completed BME s Ph.D. course in 21. Currently he is preparing his Ph.D. dissertation on energy-efficient mobile peer-to-peer systems, which is also his primary research interest. He is the creator of the world s first ever mobile BitTorrent and Gnutella clients, SymTorrent and Symella. He has worked as a contract software engineer for various companies including Nokia, Nokia Siemens Networks, and T-Mobile. ÁKOS LUDANYI (llutyo@gmail.com) received an outstanding B.Sc. degree in computer engineering from BME in 21. Now he is attending an M.Sc. course on applied informatics at BME. His research interest is mobile P2P applications. He worked at NavNGo, developing car navigation systems. Currently he is working as a software engineer for BME s Applied Mobile Research Group and Nokia. JUKKA K. NURMINEN (jukka.k.nurminen@aalto.fi) is a professor of data communication software at Aalto University in Finland. Before returning to academia he spent almost 25 years at Nokia Research Center working on a variety of topics related to mobile applications and services. His current interests are mobile computing, peer-to-peer applications, and the energy efficiency of distributed solutions. He received his M.Sc. degree in 1986 and Ph.D. degree in 23 from Helsinki University of Technology. The energy consumption of the mobile phone depends on both the torrent download speed and the chunk size. Higher download speeds and bigger chunk sizes result in energy savings. This is especially true with 3G cellular networks. With WLAN connections, using optimal parameters is less important. IEEE Communications Magazine June
UNCORRECTED PROOF AUTHOR'S PROOF. Keywords Energy-efficiency. Proxy. Peer-to-peer. BitTorrent. Broadband router. Mobile.
1 3 2 DOI 10.1007/s12083-011-0107-5 4 Modeling resource constrained BitTorrent proxies for energy 5 efficient mobile content sharing 6 Imre Kelényi & Jukka K. Nurminen & Ákos Ludányi & 7 Tamás Lukovszki
More informationMobile P2P Energy-efficiency issues on mobile phones
Mobile P2P Energy-efficiency issues on mobile phones Dr. Zhonghong Ou Department of Computer Science and Engineering, Aalto University 1 Slides are partially from Prof. Jukka Nurmimen Slow growth in battery
More informationBursty Content Sharing Mechanism for Energy-Limited Mobile Devices
Bursty Content Sharing Mechanism for Energy-Limited Mobile Devices Imre Kelényi Budapest University of Technology and Economics Budapest, Hungary imre.kelenyi@aut.bme.hu Jukka K. Nurminen Nokia Research
More informationEnergy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing
Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing Jukka K. Nurminen, Janne Nöyränen Nokia Research Center {jukka.k.nurminen, janne.noyranen}@nokia.com Abstract Battery consumption
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationP2P content distribution Jukka K. Nurminen
P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient
More informationP2P content distribution
P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer
More informationBitTorrent and CoolStreaming
BitTorrent and CoolStreaming Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen Aalto University P2P Networks BitTorrent
More informationHybrid Peer-to-Peer Content Sharing in Mobile Networks
JOURNAL OF NETWORKS, VOL. 4, NO. 2, APRIL 2009 119 Hybrid Peer-to-Peer Content Sharing in Mobile Networks P Ekler Department of Automation and Applied Informatics, Budapest, Hungary Email: peter.ekler@aut.bme.hu
More informationEfficiency of Data Distribution in BitTorrent-Like Systems
Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department
More informationBitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.
BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and
More informationBuilding Motion and Noise Detector Networks from Mobile Phones
Magyar Kutatók 9. Nemzetközi Szimpóziuma 9 th International Symposium of Hungarian Researchers on Computational Intelligence and Informatics Building Motion and Noise Detector Networks from Mobile Phones
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationP2P and Handheld Devices Jukka K. Nurminen
P2P and Handheld Devices Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials P2P and handheld devices Mainly experimental systems so far. E.g. Symella, TymTorrent, P2PSIP Paradigm: bring existing
More informationPeer to Peer Systems and Probabilistic Protocols
Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good
More informationPeer-to-peer & Energy Consumption
Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science
More informationPeer Assisted Content Distribution over Router Assisted Overlay Multicast
Peer Assisted Content Distribution over Router Assisted Overlay Multicast George Xylomenos, Konstantinos Katsaros and Vasileios P. Kemerlis Mobile Multimedia Laboratory & Department of Informatics Athens
More informationOn maximum throughput in BitTorrent
Gradus Vol 3, No 2 (2016) 67-72 ISSN 2064-8014 On maximum throughput in BitTorrent Elvira Dobjánné Antal 1, and Tamás Vinkó 2 1 Department of Natural Sciences and Engineering, Faculty of Mechanical Engineering
More informationBitTorrent Based Solution for Efficient Content Sharing on Next Generation Networks
1 BitTorrent Based Solution for Efficient Content Sharing on Next Generation Networks P. Ekler, I. Dévai, B. Bakos, A. J. Kiss Abstract As the architecture of participation became the main design principle
More informationBitTorrent Fairness Analysis
BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)
More informationDo incentives build robustness in BitTorrent?
Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN
More informationPeer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K.
Peer-to-peer T-110.7100 Applications and Services in Internet, Fall 2009 Jukka K. Nurminen 1 V1-Filename.ppt / 2008-10-22 / Jukka K. Nurminen Schedule Tue 15.9.2009 12-14 Tue 22.9.2009 12-14 Introduction
More informationLecture 17: Peer-to-Peer System and BitTorrent
CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and
More informationEnhancing Downloading Time By Using Content Distribution Algorithm
RESEARCH ARTICLE OPEN ACCESS Enhancing Downloading Time By Using Content Distribution Algorithm VILSA V S Department of Computer Science and Technology TKM Institute of Technology, Kollam, Kerala Mailid-vilsavijay@gmail.com
More informationIntroduction to Distributed Computing Systems
Introduction to Distributed Computing Systems Alexandru Iosup Parallel and Distributed Systems Group Delft University of Technology Some material kindly provided by the PDS group. 1 What is a Distributed
More informationExtreme Computing. BitTorrent and incentive-based overlay networks.
Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some
More informationT Computer Networks Green ICT
T-110.4100 Computer Networks Green ICT 08.05.2012 Matti Siekkinen External sources: Y. Xiao: Green communications. T-110.5116 lecture. Aalto. 2010. Which one is Green ICT? Source: Google image What is
More informationCollaborative Multi-Source Scheme for Multimedia Content Distribution
Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx
More informationIntroduction to P P Networks
Introduction to P P Networks B Sc Florian Adamsky florianadamsky@iemthmde http://florianadamskyit/ cbd Internet Protocols and Applications SS B Sc Florian Adamsky IPA / Outline Introduction What is P P?
More informationOn Feasibility of P2P Traffic Control through Network Performance Manipulation
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE On Feasibility of P2P Traffic Control through Network Performance Manipulation HyunYong Lee Masahiro Yoshida
More informationP2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems
P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically
More informationIntelligent Energy Aware Networks - a Content Perspective
Intelligent Energy Aware Networks - a Content Perspective Jaafar Elmirghani, University of Leeds, UK j.m.h.elmirghani@leeds.ac.uk Outline Introduction The Intelligent Energy Aware Networks (INTERNET) project
More informationApplication-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks
COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example
More informationMulti-threading technology and the challenges of meeting performance and power consumption demands for mobile applications
Multi-threading technology and the challenges of meeting performance and power consumption demands for mobile applications September 2013 Navigating between ever-higher performance targets and strict limits
More informationimproving the performance and robustness of P2P live streaming with Contracts
MICHAEL PIATEK AND ARVIND KRISHNAMURTHY improving the performance and robustness of P2P live streaming with Contracts Michael Piatek is a graduate student at the University of Washington. After spending
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.
More informationImplementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)
CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal
More informationLoopback: Exploiting Collaborative Caches for Large-Scale Streaming
Loopback: Exploiting Collaborative Caches for Large-Scale Streaming Ewa Kusmierek Yingfei Dong David Du Poznan Supercomputing and Dept. of Electrical Engineering Dept. of Computer Science Networking Center
More informationContent Distribution and BitTorrent [Based on slides by Cosmin Arad]
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying
More informationImproving BitTorrent: A Simple Approach
Improving BitTorrent: A Simple Approach Alix L.H. Chow Univ. of Southern California Leana Golubchik Univ. of Southern California Vishal Misra Columbia University Abstract Measurement studies have shown
More informationThe Scalability of Swarming Peer-to-Peer Content Delivery
The Scalability of Swarming Peer-to-Peer Content Delivery Daniel Zappala Brigham Young University zappala@cs.byu.edu with Daniel Stutzbach Reza Rejaie University of Oregon Page 1 Motivation Small web sites
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80
More informationDoctoral Written Exam in Networking, Fall 2010
Doctoral Written Exam in Networking, Fall 2010 December 14, 2010 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Friday, December 17,
More informationP3 Insights Separate T-Mobile Binge On Fact from Fiction
P3 Insights Separate T-Mobile Binge On Fact from Fiction P3 Group s Analysis of Crowdsourced Data Reveals Unlimited Mobile Video Plans Can Result in Win-Win-Win for Carriers, Consumers and Content Providers
More informationPMP 450 MaxBurst MIR
PMP 450 MaxBurst MIR TABLE OF CONTENTS Carrier Class Ethernet Control 3 Capping Bandwidth 3 MIR and Burst Data Rate 4 Implementing the Burst Bucket in Multipoint Access Networks 4 PMP 450: Higher Throughput
More informationChunk Scheduling Strategies In Peer to Peer System-A Review
Chunk Scheduling Strategies In Peer to Peer System-A Review Sanu C, Deepa S S Abstract Peer-to-peer ( P2P) s t r e a m i n g systems have become popular in recent years. Several peer- to-peer systems for
More informationIt s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley
It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley 1 A Brief History! Fall, 2006: Started Conviva with Hui Zhang (CMU)! Initial goal: use p2p technologies to reduce distribution
More informationElimination Of Redundant Data using user Centric Data in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant
More informationTaming the Flood: How I Learned to Stop Worrying and Love the Swarm Yogesh Vedpathak Cleversafe
Taming the Flood: How I Learned to Stop Worrying and Love the Swarm Yogesh Vedpathak Cleversafe Topics Popular data Creating broadcasting storage system Bittorrent protocol Creating swarms and destroying
More informationCooperation in Open Distributed Systems. Stefan Schmid
Cooperation in Open Distributed Systems Stefan Schmid T-Labs, Berlin, July 2, 2009 Distributed Systems 2008/9 Wireless: Many mobile phones today have WLAN (and even Skype) P2P: Olympic games 2008 live-broadcast
More informationCSE 486/586 Distributed Systems Peer-to-Peer Architectures
CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How
More informationMarcos Katz. Wireless Communications Research Seminar 2012
Marcos Katz Wireless Communications Research Seminar 2012 Outline Mobile Clouds: Definition Some applications Santa Cloud Project Brief project description Current development Visions Mobile Clouds We
More informationA Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network. * M. Padmavathi, ** R. M. Suresh
A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network * M. Padmavathi, ** R. M. Suresh * Assistant Professor, Department of Information Technology, RMD Engineering College, PO box
More informationScalability of the BitTorrent P2P Application
Scalability of the BitTorrent P2P Application Kolja Eger, Ulrich Killat Hamburg University of Technology 5.Würzburger Workshop 8.-9. July 2005 Overview File dissemination in peer-to-peer (p2p) networks
More informationRECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,
More informationOctoshape. Commercial hosting not cable to home, founded 2003
Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server
More informationAnalyzing and Improving a BitTorrent Network s Performance Mechanisms
Analyzing and Improving a BitTorrent Network s Performance Mechanisms Ashwin R. Bharambe Cormac Herley Venkata N. Padmanabhan Carnegie Mellon University Microsoft Research Microsoft Research Abstract In
More informationA Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme
A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme Yue Zhang 1 and Yunxia Pei 2 1 Department of Math and Computer Science Center of Network, Henan Police College, Zhengzhou,
More informationAN4777 Application note
Application note Implications of memory interface configurations on low-power STM32 microcontrollers Introduction The low-power STM32 microcontrollers have a rich variety of configuration options regarding
More informationEnergy Efficient BitTorrent for Green P2P File Sharing
Energy Efficient BitTorrent for Green P2P File Sharing Giuseppe Anastasi Pervasive Computing & Networking Lab (Perlab) Dept. of Information Engineering, University of Pisa E-mail: giuseppe.anastasi@iet.unipi.it
More informationPerformance Consequences of Partial RED Deployment
Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationCSC 4900 Computer Networks: Introduction
CSC 4900 Computer Networks: Introduction Professor Henry Carter Fall 2017 What s this all about? 2 A Modern Day Silk Road We live with nearly constant access to the most extensive system ever built by
More informationContent Overlays (continued) Nick Feamster CS 7260 March 26, 2007
Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured
More informationPeer-to-Peer Applications Reading: 9.4
Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,
More informationA Case For OneSwarm. Tom Anderson University of Washington.
A Case For OneSwarm Tom Anderson University of Washington http://oneswarm.cs.washington.edu/ With: Jarret Falkner, Tomas Isdal, Alex Jaffe, John P. John, Arvind Krishnamurthy, Harsha Madhyastha and Mike
More informationBitTorrent Optimization Techniques. (from various online sources)
BitTorrent Optimization Techniques (from various online sources) Announcement No recitation next week! Final review session Next Sunday (5/2) 5-7pm, GHC 4215 Let us know what you want at http://www.doodle.com/6qvsnubhmam2zkxp
More informationCharacterizing Gnutella Network Properties for Peer-to-Peer Network Simulation
Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Selim Ciraci, Ibrahim Korpeoglu, and Özgür Ulusoy Department of Computer Engineering, Bilkent University, TR-06800 Ankara,
More informationinria , version 1-6 Sep 2006
Rarest First and Choke Algorithms Are Enough Arnaud Legout I.N.R.I.A. Sophia Antipolis France arnaud.legout@sophia.inria.fr G. Urvoy-Keller and P. Michiardi Institut Eurecom Sophia Antipolis France {Guillaume.Urvoy,Pietro.Michiardi}@eurecom.fr
More informationDoctoral Written Exam in Networking, Fall 2009
Doctoral Written Exam in Networking, Fall 2009 November 9, 2009 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, November
More informationPartners: Nokia, NSN, Aalto/ComNet, Aalto/CSE, UH, VTT Future Internet SHOK preconference Johanna Nieminen (Nokia)
Partners: Nokia, NSN, Aalto/ComNet, Aalto/CSE, UH, VTT Future Internet SHOK preconference 30.5.2012 Johanna Nieminen (Nokia) Vision: Future Internet = a mission cri1cal backbone of global informa1on society
More informationLecture 8: Application Layer P2P Applications and DHTs
Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationImpact of Inner Parameters and Overlay Structure on the Performance of BitTorrent
Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Guillaume Urvoy-Keller Institut Eurecom, France Email: urvoy@eurecom.fr Pietro Michiardi Institut Eurecom, France Email:
More informationBitTorrent. Internet Technologies and Applications
BitTorrent Internet Technologies and Applications Aims and Contents Aims Show benefits of P2P for file downloads Explain concepts of BitTorrent as a P2P file sharing application Show how BitTorrent protocol
More informationDynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1
Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1 Contents: Introduction Multicast on parallel distributed systems Multicast on P2P systems Multicast on clouds High performance
More informationDelayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology
Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India
More informationThe Google File System
The Google File System Sanjay Ghemawat, Howard Gobioff and Shun Tak Leung Google* Shivesh Kumar Sharma fl4164@wayne.edu Fall 2015 004395771 Overview Google file system is a scalable distributed file system
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More informationLow pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of
More informationMoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005
MoB: A Mobile Bazaar for Wide Area Wireless Services R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005 What is MoB? It is an infrastructure for collaborative wide-area wireless data services.
More informationUnicasts, Multicasts and Broadcasts
Unicasts, Multicasts and Broadcasts Part 1: Frame-Based LAN Operation V1.0: Geoff Bennett Contents LANs as a Shared Medium A "Private" Conversation Multicast Addressing Performance Issues In this tutorial
More informationCS 640: Introduction to Computer Networks
CS 640: Introduction to Computer Networks Midterm II 12/14/2006 Allotted time: 11:00AM to 12:40 PM (100 minutes) Name: UW -ID Number: 1. There are 7 questions in this mid-term. All 7 must be answered for
More informationThe Design Trade-offs of BitTorrent-like File Sharing Protocols
The Design Trade-offs of BitTorrent-like File Sharing Protocols Bin Fan John C.S. Lui Dah-Ming Chiu Abstract The BitTorrent BT file sharing protocol is very popular due to its scalability property and
More informationMEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST
International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250 1568 Vol.2, Issue 2 June 2012 72-78 TJPRC Pvt. Ltd., MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationA Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis
A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis Chih-Lin HU* and Zong-Xian LU Department of Communication Engineering, National Central University,
More informationHigh-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
More informationbuilding BitTyrant, a (more) strategic BitTorrent client
M I C H A E L P I A T E K, T O M A S I S D A L, T O M A N D E R S O N, A R V I N D K R I S H N A M U R T H Y, A N D A R U N V E N K A T A R A M A N I building BitTyrant, a (more) strategic BitTorrent client
More informationThe Impact of the DOCSIS 1.1/2.0 MAC Protocol on TCP
The Impact of the DOCSIS 11/20 MAC Protocol on TCP Jim Martin Department of Computer Science Clemson University Clemson, SC 29634-0974 jimmartin@csclemsonedu Abstract-- The number of broadband cable access
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationSystematic Cooperation in P2P Grids
29th October 2008 Cyril Briquet Doctoral Dissertation in Computing Science Department of EE & CS (Montefiore Institute) University of Liège, Belgium Application class: Bags of Tasks Bag of Task = set of
More informationAn Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems
An Query Processing Method according to System Environments in Database Broadcasting Systems M. KASHITA T. TERADA T. HARA Graduate School of Engineering, Cybermedia Center, Graduate School of Information
More informationPeer-to-Peer Streaming Systems. Behzad Akbari
Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues
More informationHandling Flash Crowds from your Garage
Handling Flash Crowds from your Garage Jeremy Elson, Jon Howell Microsoft Research presented by: Vrije Universiteit Amsterdam March 2, 2012 Overview Flash crowds Building blocks of a scalable system Scaling
More informationMultipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network
1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay
More informationWireless Data Efficiency Get the Most Megabytes for Your Buck Mobile Explosion 08 Las Vegas, January 25, 2008
Wireless Data Efficiency Get the Most Megabytes for Your Buck Mobile Explosion 08 Las Vegas, January 25, 2008 Peter Rysavy Rysavy Research http://www.rysavy.com 1 Copyright 2006-2008 Rysavy Research Agenda
More informationCMSC 332 Computer Networks P2P and Sockets
CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that
More informationJournal of Electronics and Communication Engineering & Technology (JECET)
Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X
More informationConfiguring Advanced Radio Settings on the WAP371
Article ID: 5069 Configuring Advanced Radio Settings on the WAP371 Objective Radio settings are used to configure the wireless radio antenna and its properties on the wireless access point (WAP) device
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More information