Gozar: NAT friendly Peer Sampling with One Hop Distributed NAT Traversal
|
|
- Michael Dennis
- 5 years ago
- Views:
Transcription
1 Gozar: NAT friendly Peer Sampling with One Hop Distributed NAT Traversal Amir H. Payberah Jim Dowling Seif Haridi 1
2 Introduction 2
3 Gossip based Peer Sampling Service Gossip based peer sampling services (PSS) have been widely used in large scale distributed applications. Information dissemination Aggregation Overlay topology management A PSS provides a node with a uniform random sample of live nodes from all nodes in the system (partial view). 3
4 Gossip based Peer Sampling Protocol (1/7) 0 n2 n9 1 n8 n4 n7 n6 4
5 Gossip based Peer Sampling Protocol (2/7) n9 n8 0 n8 n7 0 1 n6 1 n2 n4 n7 n6 5
6 Gossip based Peer Sampling Protocol (3/7) n9 n8 0 n8 n7 0 1 n8 n7 shuffle request n6 1 n2 n4 n7 n6 6
7 Gossip based Peer Sampling Protocol (4/7) n9 n8 0 n8 n7 0 1 n6 shuffle response n8 n7 n6 1 n2 n4 n7 n6 7
8 Gossip based Peer Sampling Protocol (5/7) n9 n8 0 n6 n8 n7 0 1 n8 n7 n6 1 n2 n4 n7 n6 8
9 Gossip based Peer Sampling Protocol (6/7) n9 n8 0 Update State n6 n8 n7 0 1 n8 n7 Update State n6 1 n2 n4 n7 n6 9
10 Gossip based Peer Sampling Protocol (7/7) n9 n8 0 n8 n7 n6 0 1 n8 n7 1 n2 n4 n7 n6 10
11 Gossip based Peer Sampling Design Space Peer Selection View Exchange View Merge 0 n2 n9 1 n8 n4 n7 n6 11
12 Peer Selection Gossip based Peer Sampling Design Space Random Tail 0 n2 View Exchange Push n9 1 Push Pull n8 n4 View Merge Blind n7 n6 Healer Swapper 12
13 Problem Description 13
14 NAT Environments (1/4) Private node 1 n2 0 n4 n9 shuffle request n8 n6 Public node n7 14
15 NAT Environments (1/4) Private node 1 n2 0 n4 n9 shuffle response n8 n6 Public node n7 15
16 NAT Environments (1/4) Update State Private node 1 n2 0 n4 n9 shuffle response n8 n6 Update State Public node n7 16
17 NAT Environments (1/4) Private node 1 n2 0 n4 n9 shuffle request n8 n6 Public node n7 17
18 Impact of NATs on PSS' (1/2) Size of the biggest cluster for an increasing percentage of NATs. [A.M.Kermarrec ICDCS'09] 18
19 Impact of NATs on PSS' (2/2) Ratio of non stale references to private nodes. [A.M.Kermarrec ICDCS'09] 19
20 Solutions for Communicating with Private Nodes (1/3) Relay communications to the private node using a public relay node. 20
21 Solutions for Communicating with Private Nodes (2/3) Use a NAT hole punching algorithm to establish a direct connection to the private node using a public rendezvous node. 21
22 Solutions for Communicating with Private Nodes (3/3) Route the request to private nodes using chains of existing open connections (of unbounded length). 22
23 Research Challenges for a NAT friendly PSS Assuming distributed relay and rendezvous services, how do nodes discover which public nodes act as partners for the private nodes? Is hole punching or relaying preferable for communicating with private nodes? How much data will be sent over the connection and what are the latency requirements? How fairly should the gossiping load be balanced over public versus private nodes? 23
24 Gozar NAT friendly Peer Sampling Service 24
25 Design Space Peer Selection Rand Tail View Propagation Push Push Pull View Selection Blind Healer Swapper 25
26 Design Space Peer Selection Rand Tail View Propagation Push Push Pull Gozar View Selection Blind Healer Swapper 26
27 NAT Friendliness in Gozar In Gozar, each private node connects to one or more public nodes, called partners that act as a relay or rendezvous server on behalf of the private node. A node's descriptor consists of both its own address, its NAT type, and its partners' addresses at the time of descriptor creation. When a node wants to gossip with a private node, it uses the partner addresses in its descriptor to communicate with the private node. 27
28 Partnering (1/10) Bootstrap server n2 n4 28
29 Partnering (2/10) Bootstrap server n2 n4 29
30 Partnering (3/10) Bootstrap server n2, public, null n4, public, null n4 30
31 Partnering (4/10) Bootstrap server request n2, public, null n4, public, null n4 request 31
32 Partnering (5/10) Bootstrap server ACK n2, public, null n4, public, null n4 NACK 32
33 Partnering (6/10) Bootstrap server n2, public, null n4, public, null n4 33
34 Partnering (7/10) Bootstrap server n2, public, null n4, public, null Shuffle exchange n4 n2, private, 34
35 Partnering (8/10) Bootstrap server n2, public, null n4, public, null n4 Shuffle exchange n2, private, n2, private, 35
36 Partnering (9/10) Bootstrap server n2, public, null n4, public, null Shuffle request n4 n2, private, n2, private, 36
37 Partnering (10/10) Bootstrap server n2, public, null n4, public, null Shuffle response n4 n2, private, n2, private, 37
38 Relaying or Hole Punching? Relaying? Lower latency message exchange. Enables lower gossip cycle periods. Necessary in dynamic networks Hole punching? Decreases load on public nodes. But not if shuffle messages are small. Applications that use the PSS can use partners to hole punch or relay messages to private nodes. 38
39 Experiments 39
40 Experiment Setup Using the Kompics as a simulator platform. King dataset is used to model the latencies between nodes nodes, 80% of nodes are private and 20% are public. Compare with Nylon and ARRG. Cyclon is used as a baseline. 40
41 Metrics Randomness properties: Local randomness In degree distribution Clustering coefficient Avg. path length Protocol overhead. Fairness and connectivity in catastrophic failure. 41
42 Randomness 42
43 Protocol Overhead 43
44 Fairness and Connectivity in Failure 44
45 Conclusions 45
46 Conclusions Gozar is a NAT friendly gossip based peer sampling service that also provides a distributed NAT traversal service to clients of the PSS. Public nodes are leveraged to provide both the relaying and hole punching services. Relaying is only used for gossiping to private nodes lower connection latency Enabling a faster gossiping cycle The messages relayed are small 46
47 47
Shuffling with a Croupier: Nat Aware Peer Sampling
Shuffling with a Croupier: Nat Aware Peer Sampling Jim Dowling Amir H. Payberah {jdowling,amir}@sics.se 1 Introduction 2 Gossip based Protocols Gossip based protocols have been widely used in large scale
More informationGossip Peer Sampling in Real World
Gossip Peer Sampling in Real World Amir H. Payberah (amir@sics.se) 1/55 Gossip Peer Sampling 2/55 Peer Sampling Service The peer sampling service provides each node with a list of nodes in the system.
More informationGozar: NAT-friendly Peer Sampling with One-Hop Distributed NAT Traversal
Gozar: NAT-friendly Peer Sampling with One-Hop Distributed NAT Traversal Amir H. Payberah 1,2, Jim Dowling 1, and Seif Haridi 1,2 1 Swedish Institute of Computer Science (SICS) 2 KTH - Royal Institute
More informationGLive: The Gradient overlay as a market maker for mesh based P2P live streaming
GLive: The Gradient overlay as a market maker for mesh based P2P live streaming Amir H. Payberah Jim Dowling Seif Haridi {amir, jdowling, seif}@sics.se 1 Introduction 2 Media Streaming Media streaming
More informationThrough the Wormhole: Low Cost, Fresh Peer Sampling for the Internet
Through the Wormhole: Low Cost, Fresh Peer Sampling for the Internet Roberto Roverso Peerialism AB Email: roberto@peerialism.com Jim Dowling KTH - Royal Institute of Technology, and Swedish Institute of
More informationLightweight Gossip-based Distribution Estimation
Lightweight Gossip-based Distribution Estimation Amir H. Payberah, Hanna Kavalionak, Alberto Montresor, Jim Dowling, Seif Haridi Swedish Institute of Computer Science (SICS) University of Trento, Italy
More informationLive Streaming in P2P and Hybrid P2P-Cloud Environments for the Open Internet AMIR H. PAYBERAH
Live Streaming in P2P and Hybrid P2P-Cloud Environments for the Open Internet AMIR H. PAYBERAH Doctoral Thesis in Information and Communication Technology Stockholm, Sweden 2013 Live Streaming in P2P
More informationGossiping in Distributed Systems Foundations
Gossiping in Distributed Systems Foundations Maarten van Steen 2 of 41 2 of 41 Introduction Observation: We continue to face hard scalability problems in distributed systems: Systems continue to grow in
More informationImproving ICE Service Selection in a P2P System using the Gradient Topology
Improving ICE Service Selection in a P2P System using the Gradient Topology Jim Dowling 1 Jan Sacha 2 Seif Haridi 1 1 Swedish Institute of Computer Science, Kista, Sweden 2 Distributed Systems Group, Trinity
More informationNAT-resilient Gossip Peer Sampling
NAT-resilient Gossip Peer Sampling Anne-Marie Kermarrec, Alessio Pace, Vivien Quema, Valerio Schiavoni To cite this version: Anne-Marie Kermarrec, Alessio Pace, Vivien Quema, Valerio Schiavoni. NAT-resilient
More informationArchitectural Approaches for Social Networks. Presenter: Qian Li
Architectural Approaches for Social Networks Presenter: Qian Li The Gossple Anonymous Social Network Marin Bertier, Davide Frey, Rachid Guerraoui, AnneMarie Kermarrec and Vincent Leroy Gossple overview
More informationBlock lectures on Gossip-based protocols
Block lectures on Gossip-based protocols Lecture 1: dissemination, randomness and aggregation Dr. Etienne Rivière University of Neuchâtel Etienne.Riviere@unine.ch Lectures funded by the EU commission as
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks
More informationOverlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen
Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationConverging an Overlay Network to a Gradient Topology
Converging an Overlay Network to a Gradient Topology Håkan Terelius, Guodong Shi, Jim Dowling, Amir Payberah, Ather Gattami and Karl Henrik Johansson KTH - Royal Institute of Technology, {hakante,guodongs,gattami,kallej}@kth.se
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationFast Topology Management in Large Overlay Networks
Topology as a key abstraction Fast Topology Management in Large Overlay Networks Ozalp Babaoglu Márk Jelasity Alberto Montresor Dipartimento di Scienze dell Informazione Università di Bologna! Topology
More informationA Middleware for Gossip Protocols
A Middleware for Gossip Protocols Michael Chow Cornell University mcc59@cornell.edu Robbert van Renesse Cornell University rvr@cs.cornell.edu Gossip protocols are known to be highly robust in scenarios
More informationInternet Networking recitation #
recitation # UDP NAT Traversal Winter Semester 2013, Dept. of Computer Science, Technion 1 UDP NAT Traversal problems 2 A sender from the internet can't pass a packet through a NAT to a destination host.
More informationKleinberg s Small-World Networks. Normalization constant have to be calculated:
Kleinberg s Small-World Networks Normalization constant have to be calculated: r v u d v u P ), ( 1 ~ ) ( Z v u d v u P r 1 ), ( 1 ) ( u i r i u d Z ), ( 1 Example Choose among 3 friends (1-dimension)
More informationA P2P REcommender system based on Gossip Overlays (PREGO)
10 th IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY Bradford,UK, 29 June - 1 July, 2010 Ranieri Baraglia, Patrizio Dazzi, Matteo Mordacchini ISTI,CNR, Pisa,Italy Laura Ricci University
More informationgradientv: Market-Based P2P Live Media Streaming on the Gradient Overlay
gradientv: Market-Based P2P Live Media Streaming on the Gradient Overlay Amir H. Payberah 1,2, Jim Dowling 1, Fatemeh Rahimian 1,2, and Seif Haridi 1,2 1 Swedish Institute of Computer Science (SICS) 2
More informationPATTERNS IN NETWORK ARCHITECTURE: PRINCIPLES FOR BRIDGING
PATTERNS IN NETWORK ARCHITECTURE: PRINCIPLES FOR BRIDGING REACHABILITY The only purpose for bridging is to extend the reach of networks. NATIVE NETWORK TRANSIT NETWORK FOREIGN NETWORK From a member of
More informationDraft Notes 1 : Scaling in Ad hoc Routing Protocols
Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, 2008 2 Introduction What is the best network wireless network routing protocol? This question is a function
More informationCLive: Cloud-Assisted P2P Live Streaming
CLive: Cloud-Assisted P2P Live Streaming Amir H. Payberah, Hanna Kavalionak, Vimalkumar Kumaresan, Alberto Montresor, Seif Haridi Swedish Institute of Computer Science (SICS), Sweden University of Trento,
More informationMain Memory (Part II)
Main Memory (Part II) Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Main Memory 1393/8/17 1 / 50 Reminder Amir H. Payberah
More informationINF5040 (Open Distributed Systems)
INF5040 (Open Distributed Systems) Lucas Provensi (provensi@ifi.uio.no) Department of Informatics University of Oslo November 12, 2012 An application-level network on top of the Internet (overlay network)
More informationWebGC Gossiping on Browsers without a Server [Live Demo/Poster]
WebGC Gossiping on Browsers without a Server [Live Demo/Poster] Raziel Carvajal-Gómez, Davide Frey, Matthieu Simonin, Anne-Marie Kermarrec To cite this version: Raziel Carvajal-Gómez, Davide Frey, Matthieu
More informationFStream: a decentralized and social music streamer
FStream: a decentralized and social music streamer Antoine Boutet, Konstantinos Kloudas, Anne-Marie Kermarrec To cite this version: Antoine Boutet, Konstantinos Kloudas, Anne-Marie Kermarrec. FStream:
More informationTable of Contents 1 MSDP Configuration 1-1
Table of Contents 1 MSDP Configuration 1-1 MSDP Overview 1-1 Introduction to MSDP 1-1 How MSDP Works 1-2 Protocols and Standards 1-7 MSDP Configuration Task List 1-7 Configuring Basic Functions of MSDP
More informationCloudy Weather for P2P
Cloudy Weather for P2P with a Chance of Gossip Alberto Montresor Luca Abeni Best paper award in P2P'11 Presented by: amir@sics.se 1 Introduction 2 Cloud Computing vs. P2P Similarity: Providing the infinite
More informationBUFFER management is a significant component
1 Stepwise Fair-Share Buffering for Gossip-Based Peer-to-Peer Data Dissemination Oznur Ozkasap, Mine Caglar, Emrah Cem, Emrah Ahi, and Emre Iskender Abstract We consider buffer management in support of
More informationConstructing Overlay Networks through Gossip
Constructing Overlay Networks through Gossip Márk Jelasity Università di Bologna Project funded by the Future and Emerging Technologies arm of the IST Programme The Four Main Theses 1: Topology (network
More informationLAYSTREAM: composing standard gossip protocols for live video streaming
LAYSTREAM: composing standard gossip protocols for live video streaming Miguel Matos, Valerio Schiavoni, Etienne Riviere, Pascal Felber, Rui Oliveira HASLab - High-Assurance Software Lab, INESC TEC & U.
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationBRISA: Combining Efficiency and Reliability in Epidemic Data Dissemination
BRISA: Combining Efficiency and Reliability in Epidemic Data Dissemination Miguel Matos, Valerio Schiavoni, Pascal Felber, Rui Oliveira, Etienne Riviere HASLab - High-Assurance Software Lab, INESC TEC
More informationConfiguring MSDP. MSDP overview. How MSDP works. MSDP peers
Contents Configuring MSDP 1 MSDP overview 1 How MSDP works 1 MSDP support for VPNs 6 Protocols and standards 6 MSDP configuration task list 6 Configuring basic MSDP functions 7 Configuration prerequisites
More informationUpdate Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems
Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
More informationBayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination
Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination By Shelley Zhuang,Ben Zhao,Anthony Joseph, Randy Katz,John Kubiatowicz Introduction Multimedia Streaming typically involves
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Data Sheet Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building
More informationDynamic Load Balancing in Distributed Content-based Publish/Subscribe
Dynamic Load Balancing in Distributed Content-based Publish/Subscribe Alex King Yeung Cheung and Hans-Arno Jacobsen Middleware Systems Research Group University of Toronto, Toronto, Ontario, Canada http://www.msrg.utoronto.ca
More informationConfiguring MSDP. Overview. How MSDP operates. MSDP peers
Contents Configuring MSDP 1 Overview 1 How MSDP operates 1 MSDP support for VPNs 6 Protocols and standards 6 MSDP configuration task list 7 Configuring basic MSDP functions 7 Configuration prerequisites
More informationTable of Contents 1 MSDP Configuration 1-1
Table of Contents 1 MSDP Configuration 1-1 MSDP Overview 1-1 Introduction to MSDP 1-1 How MSDP Works 1-2 Multi-Instance MSDP 1-7 Protocols and Standards 1-7 MSDP Configuration Task List 1-7 Configuring
More informationHeterogeneous Gossip. Davide Frey Rachid Guerraoui Anne-Marie Kermarrec Boris Koldehofe Maxime Monod Martin Mogensen Vivien Quéma
Heterogeneous Gossip Davide Frey Rachid Guerraoui Anne-Marie Kermarrec Boris Koldehofe Maxime Monod Martin Mogensen Vivien Quéma Outline Context Live Streaming Gossip Limitations Heterogeneous Gossip Protocol
More informationCHAPTER 7 COMPARISON OF DIFFERENT ROUTING SCHEMES
80 CHAPTER 7 COMPARISON OF DIFFERENT ROUTING SCHEMES 7.1 PERFORMANCE METRICS In the preceding chapters data delivery rate, buffer space, node density and message delay, average hop count, average buffer
More informationThe Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla
The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -
More informationVirtual Private Networks Advanced Technologies
Virtual Private Networks Advanced Technologies Petr Grygárek rek Agenda: Supporting Technologies (GRE, NHRP) Dynamic Multipoint VPNs (DMVPN) Group Encrypted Transport VPNs (GET VPN) Multicast VPNs (mvpn)
More informationMeet in the Middle: Leveraging Optical Interconnection Opportunities in Chip Multi Processors
Meet in the Middle: Leveraging Optical Interconnection Opportunities in Chip Multi Processors Sandro Bartolini* Department of Information Engineering, University of Siena, Italy bartolini@dii.unisi.it
More informationOptimizing Network Performance in Distributed Machine Learning. Luo Mai Chuntao Hong Paolo Costa
Optimizing Network Performance in Distributed Machine Learning Luo Mai Chuntao Hong Paolo Costa Machine Learning Successful in many fields Online advertisement Spam filtering Fraud detection Image recognition
More informationArchitecture and Implementation of a Content-based Data Dissemination System
Architecture and Implementation of a Content-based Data Dissemination System Austin Park Brown University austinp@cs.brown.edu ABSTRACT SemCast is a content-based dissemination model for large-scale data
More informationChapter 2 ARCHITECTURES
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 2 ARCHITECTURES Plan Software architecture Architectural styles System architectures Centralized
More informationGNUnet Distributed Data Storage
GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview
More informationDIMPLE-II: Dynamic Membership Protocol for Epidemic Protocols 1
DIMPLE-II: Dynamic Membership Protocol for Epidemic Protocols 1 Jin Sun and Byung K. Choi Departments of Computer Science Michigan Technological University, Houghton, MI, USA 49931 {jinsun, bkchoi}@mtu.edu
More informationPresented By: Devarsh Patel
: Amazon s Highly Available Key-value Store Presented By: Devarsh Patel CS5204 Operating Systems 1 Introduction Amazon s e-commerce platform Requires performance, reliability and efficiency To support
More informationPath Optimization in Stream-Based Overlay Networks
Path Optimization in Stream-Based Overlay Networks Peter Pietzuch, prp@eecs.harvard.edu Jeff Shneidman, Jonathan Ledlie, Mema Roussopoulos, Margo Seltzer, Matt Welsh Systems Research Group Harvard University
More informationScalable Application Layer Multicast
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy http://www.cs.umd.edu/projects/nice Group Communication A C A C 1 2 1 2 B D B D Network-layer Multicast Replication
More informationOctoshape. Commercial hosting not cable to home, founded 2003
Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server
More informationGoogle File System, Replication. Amin Vahdat CSE 123b May 23, 2006
Google File System, Replication Amin Vahdat CSE 123b May 23, 2006 Annoucements Third assignment available today Due date June 9, 5 pm Final exam, June 14, 11:30-2:30 Google File System (thanks to Mahesh
More informationDynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality
Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Amin Vahdat Department of Computer Science Duke University 1 Introduction Increasingly,
More informationChord on Demand. Mark Jelasity University of Bologna, Italy.
Chord on Demand Alberto Montresor University of Bologna, Italy montresor@cs.unibo.it Mark Jelasity University of Bologna, Italy jelasity@cs.unibo.it Ozalp Babaoglu University of Bologna, Italy babaoglu@cs.unibo.it
More informationgradientv: Market-based P2P live media streaming on the Gradient overlay
gradientv: Market-based P2P live media streaming on the Gradient overlay Amir H. Payberah 1,2, Jim Dowling 1, Fatemeh Rahimian 1,2, and Seif Haridi 1,2 1 Swedish Institute of Computer Science (SICS) 2
More informationOverview of Sensor Network Routing Protocols. WeeSan Lee 11/1/04
Overview of Sensor Network Routing Protocols WeeSan Lee weesan@cs.ucr.edu 11/1/04 Outline Background Data-centric Protocols Flooding & Gossiping SPIN Directed Diffusion Rumor Routing Hierarchical Protocols
More informationPeer-to-peer systems and overlay networks
Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems
More informationMaking Gnutella-like P2P Systems Scalable
Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems
More informationUser-Relative Names for Globally Connected Personal Devices
User-Relative Names for Globally Connected Personal Devices Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, Frans Kaashoek, Robert Morris Massachusetts Institute of Technology IPTPS February
More informationVirtual Private Networks Advanced Technologies
Virtual Private Networks Advanced Technologies Petr Grygárek rek Agenda: Supporting Technologies (GRE, NHRP) Dynamic Multipoint VPNs (DMVPN) Group Encrypted Transport VPNs (GET VPN) Multicast VPNs (mvpn)
More informationReferences. Introduction. Publish/Subscribe paradigm. In a wireless sensor network, a node is often interested in some information, but
References Content-based Networking H. Karl and A. Willing. Protocols and Architectures t for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 12) P. Th. Eugster, P. A. Felber, R. Guerraoui,
More informationMulticast Technology White Paper
Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More informationA Performance Evaluation Architecture for Hierarchical PNNI and Performance Evaluation of Different Aggregation Algorithms in Large ATM Networks
A Performance Evaluation Architecture for Hierarchical PNNI and Performance Evaluation of Different Aggregation Algorithms in Large ATM Networks Gowri Dhandapani 07/17/2000 Organization PNNI Basics Motivation
More informationSpray: an Adaptive Random Peer Sampling Protocol
: an Adaptive Random Peer Sampling Protocol Brice Nédelec, Julian Tanke, Davide Frey, Pascal Molli, Achour Mostefaoui To cite this version: Brice Nédelec, Julian Tanke, Davide Frey, Pascal Molli, Achour
More informationMapping of Address and Port using Translation (MAP-T) E. Jordan Gottlieb Network Engineering and Architecture
Mapping of Address and Port using Translation (MAP-T) E. Jordan Gottlieb Network Engineering and Architecture jordan.gottlieb@charter.com. What is MAP-T? One of two transport modes of MAP Mapping of Address
More informationConfiguring a Rendezvous Point
Version History Version Number Date Notes 1 03/15/2002 This document was created. The purpose of this document is to outline four recommended methods for configuring a rendezvous point (RP) in a Protocol
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationLecture 10: TCP Friendliness, DCCP, NATs, and STUN
Lecture 10: TCP Friendliness, DCCP, NATs, and STUN TCP Friendliness Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do
More informationCongestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs
Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it
More informationLecture 12: TCP Friendliness, DCCP, NATs, and STUN
Lecture 12: TCP Friendliness, DCCP, NATs, and STUN Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit
More informationGUIDE. Optimal Network Designs with Cohesity
Optimal Network Designs with Cohesity TABLE OF CONTENTS Introduction...3 Key Concepts...4 Five Common Configurations...5 3.1 Simple Topology...5 3.2 Standard Topology...6 3.3 Layered Topology...7 3.4 Cisco
More informationBAR Gossip. Lorenzo Alvisi UT Austin
BAR Gossip Lorenzo Alvisi UT Austin MAD Services Nodes collaborate to provide service that benefits each node Service spans multiple administrative domains (MADs) Examples: Overlay routing, wireless mesh
More informationSemantic Multicast for Content-based Stream Dissemination
Semantic Multicast for Content-based Stream Dissemination Olga Papaemmanouil Brown University Uğur Çetintemel Brown University Stream Dissemination Applications Clients Data Providers Push-based applications
More informationPulp: an Adaptive Gossip-Based Dissemination Protocol for Multi-Source Message Streams
Noname manuscript No. (will be inserted by the editor) Pulp: an Adaptive Gossip-Based Dissemination Protocol for Multi-Source Message Streams Pascal Felber Anne-Marie Kermarrec Lorenzo Leonini Etienne
More informationContents. Configuring MSDP 1
Contents Configuring MSDP 1 Overview 1 How MSDP works 1 MSDP support for VPNs 6 Protocols and standards 6 MSDP configuration task list 7 Configuring basic MSDP features 7 Configuration prerequisites 7
More informationModule SDS: Scalable Distributed Systems. Gabriel Antoniu, KERDATA & Davide Frey, ASAP INRIA
Module SDS: Scalable Distributed Systems Gabriel Antoniu, KERDATA & Davide Frey, ASAP INRIA Staff Gabriel Antoniu, DR INRIA, KERDATA Team gabriel.antoniu@inria.fr Davide Frey, CR INRIA, ASAP Team davide.frey@inria.fr
More informationArvind Krishnamurthy Fall 2003
Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationIPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes:
Overview Protocol Independent Multicast for IPv6 () provides IPv6 multicast forwarding by leveraging static routes or IPv6 unicast routing tables generated by any IPv6 unicast routing protocol, such as
More informationThe Effects of Asymmetry on TCP Performance
The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More informationPower Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul
Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul COST Action IC0804 Workshop in Budapest - Working Group 3 May 19th 2011 supported by TUBITAK
More informationPeer-to-Peer Secure Update for Heterogeneous Edge Devices
Peer-to-Peer Secure Update for Heterogeneous Edge Devices E. Band, H. Herry, C. Perkins, J. Singer School of Computing Science University of Glasgow 1 FRµIT: Federated RaspberryPi µ-infrastructure Testbed
More informationLecture 5: Active & Overlay Networks"
Lecture 5: Active & Overlay Networks" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat and Alex Snoeren Lecture 5 Overview" Brief intro to overlay networking Active networking
More informationAdaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks
Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks Ruchir Gupta, Abhijeet C. Maali, Yatindra Nath Singh, Senior Member IEEE Department of Electrical Engineering, IIT, Kanpur {rgupta, abhicm,
More informationReal-Time Communications for the Web. Presentation of paper by:cullen Jennings,Ted Hardie,Magnus Westerlund
Real-Time Communications for the Web Presentation of paper by:cullen Jennings,Ted Hardie,Magnus Westerlund What is the paper about? Describes a peer-to-peer architecture that allows direct,interactive,rich
More informationLatest Peer-to-Peer Technologies II Artjom Lind 1
Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured
More informationChord on Demand. Ozalp Babaoglu University of Bologna, Italy. Alberto Montresor University of Bologna, Italy
Chord on Demand Alberto Montresor University of Bologna, Italy montresor@cs.unibo.it Márk Jelasity University of Bologna, Italy jelasity@cs.unibo.it Ozalp Babaoglu University of Bologna, Italy babaoglu@cs.unibo.it
More informationPUB-2-SUB: A Content-Based Publish/Subscribe Framework for Cooperative P2P Networks
PUB-2-SUB: A Content-Based Publish/Subscribe Framework for Cooperative P2P Networks Duc A. Tran Cuong Pham Network Information Systems Lab (NISLab) Dept. of Computer Science University of Massachusetts,
More informationImproving peer connectivity in wide-area overlays of virtual workstations
Cluster Comput (2009) 12: 239 256 DOI 10.1007/s10586-009-0075-1 Improving peer connectivity in wide-area overlays of virtual workstations Arijit Ganguly P. Oscar Boykin David I. Wolinsky Renato J. Figueiredo
More information