On the Impact of Network Address Translation on Locality-aware P2P Live Streaming Systems

Size: px
Start display at page:

Download "On the Impact of Network Address Translation on Locality-aware P2P Live Streaming Systems"

Transcription

1 On the Impact of Network Address Translation on Locality-aware P2P Live Streaming Systems Mohammad Z Masoud, Xiaojun Hei, Wenqing Cheng Huazhong University of Science and Technology, Wuhan, China engmohammadmasoud@gmailcom, heixj@husteducn, chengwq@husteducn Abstract More that 7% of all Internet hosts are behind network address translation (NAT) devices In this paper, we study the impact of the NAT devices on application layer traffic optimization (ALTO) schemes NAT brings forth difficulty if not impossible for peers to connect to one another, which may lead sever performance penalty of P2P applications Most localityaware P2P systems only consider network location such as autonomous system (AS) number In this paper, we first demonstrated that peers may be expelled from the system with a high probability in P2P live streaming systems because NAT devices degrade the peer s capacity for contributing upload bandwidth We proposed a simple model to compute the theoretical upper and lower bounds for the number of displaced peers We also propose a simple peer selection algorithm with the NAT consideration in mind to build a non-random peer list that reduces transit traffic, increases peer connectivity and minimizes the playback start-up time for ALTO schemes We conducted a ns2 simulation study to evaluate the performance of the proposed algorithm Based on multiple simulation experiments, we demonstrated that the proposed algorithm decreases the number of expelled peers while it reduces the start-up delay of peers and reduces the interdomain traffic Keywords: network address translation, peer-to-peer; live streaming; Internet service provider; locality awareness I INTRODUCTION Peer-to-Peer (P2P) live streaming systems are live Video, life or on-demand occupies more than 7% of P2P Internet traffic [1] Application layer Traffic Optimization (ALTO) schemas have been proposed to reduce the load of P2P systems This includes live streaming on ISP s inter/intra-domain traffic [2] Optimization should increase the efficiency of these applications while decreasing inter/intra-domain traffic loads This is considered a win-win solution Simulation studies of optimization schemas for P2P file sharing systems have proven promising [3], [4], [5] In P4P [4] approach, the author showed that a collaboration mechanism reduced the download time (Increased the efficiency) by 4% while reducing transit traffic Real trace results for optimization have lead to different opinions [6], [7] They have shown that such mechanisms can decrease the efficiency of P2P file sharing systems by increasing download time ISP s may use caches to reduce the download time to obtain the required output [7] Why is there such a difference between trace data and simulation results? The answer is the parameters Simulation studies do not consider all real life parameters When researchers start to consider a new parameter, new unexpected results can become manifest Upload capacity and peer distributions are two parameters that were studied in [6] The author has shown that under normal distribution AS s both homogeneous configuration of upload and average upload capacities are higher than the video rate from which both P2P and ISP can derive benefits For Internet parameters with heterogeneous upload capacity, skewed peer distribution and unpredictable upload capacity will benefit ISP s rather than P2P s and this can have a negative effect upon the latter In this work we will study another important parameter that can reduce the connectivity of P2P live streaming systems, that is, the Network Address Translation (NAT) parameter NAT, has been used to solve the shortage in IPv4 address space (connectivity) as well as to hide the service provider s internal network structure (security) [8] NAT solution is popular on the Internet More than 73% of Internet users use NATing [9] NAT is suitable for the Internet s structure or the client server approach Clients initiate connections to servers with static public IP addresses These servers send responses to clients using their dynamic public IP addresses This is not the case with P2P systems A peer is a hybrid between a client and a server; it requests services and responses to requests Peers can have a public IP address without NATing, which is termed (opened or public) or a private IP address mapped to the public one after NATing Such an address is termed (private) The connection between peers can take the form of one of four types: private-to-private, public-to-public, privateto-public and public-to-private Methods have been proposed to solve private-to-private connectivity because it is the one that will most probably occur These methods cannot provide connectivity for all types of NATing[1] This parameter has a tremendous negative effect on connectivity in live streaming systems In file sharing systems, it can increase the download time because of the reduction in the number of donor peers but in live streaming, it expels peers out of the system In any live streaming system, the peer starts to join by sending a message to the source The source answers with a peer list The node then starts to contact these peers to obtain the full stream If it cannot obtain the full stream, it tries other peers in the system with a second connection round The number of rounds depends on the P2P streaming system s design With an increasing number of rounds, the probability of finding suitable parents increases including the playback start-up delay time Zattoo [1] for example, uses three rounds before the peer stops trying When the peer stops trying, we call it expulsion In this paper, we show that in any live streaming network

2 there is a high probability that, peers will be expelled We introduce theoretical upper and lower boundaries for the number of kicked-out peers We also propose a novel and easy to implement parent selection algorithm to build a non-random peer list that reduces transit traffic, increases peer connectivity and diminishes playback start time delay by reducing the number of rounds This mechanism tries to keep the number of expelled peers as close as possible to the lower boundary We found that neighbor selection algorithms that depend only upon AS awareness are not enough for live P2P streaming system We will also show that there is a trade-off between traffic locality and peer connectivity The rest of this paper is organized as follows We end this section by describing related works done in this area Section II, introduces the theoretical boundaries of the expelled peers and ends with the algorithm that reduces this number We conducted a simulation study to validate our proposed P2P streaming architecture and then analyzed the simulation results in Section III Finally, we conclude this paper in Section V A Related Work To develop the rationale for this work, we had to consider previous research in P2P measurements that have studied NATing The real traces from Zattoo s system show that peers can be expelled from the system because of NATing issues [1], [11] These works also show the percentage of NAT types in Zattoo s network (in Europe) and the popularity of symmetric NATing In [12], the author studied P2P VoD systems The author proved the popularity of symmetric NATing in these systems also In [13] the author completed a measurement study on a P2P file sharing system The author demonstrated that the percentage of each NATing type can depend on a particular country (location) This result shows that a locality awareness option without awareness of NATing can lead to reduction of connectivity among peers In addition, the author demonstrated the popularity of UDP disabled and symmetric NATing, which are not P2P friendly Our work does not propose a new method to allow peers or nodes behind NAT devices to connect with each other, such as hole punching [14] or NAT traversal [15] This work proposes a way for a peer to find its NAT matching peers to allow hole punching to work correctly To understand this concept, hole punching uses the idea of a third parity server to initiate the connection between peers and leaves them to exchange data by themselves This schema is easy to implement but it cannot be used to connect two hosts behind symmetric devices Our method proposes a way to construct the peer neighbor list by considering peers NATing types In this way, peers can easily find their NAT matches Other methods have been used to solve the NAT mismatch problem, for example relays with public IP address stay in the middle until the termination of the communication channel between the peers [16] This method is famous in P2P VoIP world [17] In [18], the author studied the effects of NATing relay nodes on traffic locality and transit load He proposed a simple algorithm to select relays from the same domain Avr Upload Speed 2R/5 R/2 4R/5 R 2R Upper boundary Lower boundary Percentage of Kicked out Peers Fig 1 Kicked-Out Peer Percentage to the Avg Upload Capacity in order to reduce transit traffic Unfortunately, these relays cannot be used with P2P live streaming for two reasons: first, the video rate can consume the upload capacities of relay nodes and make them useless for many other nodes Secondly, any online node in the P2P streaming system is actively watching (nodes cannot be online and inactive like Skype), which means it uses its entire upload and download capacity for itself This means that, peers with symmetric NATing cannot connect to one another in live streaming systems Many schemas have been proposed to build a peer neighbor list These solutions considered the reduction of inter/intradomain traffic or peers locality as the main point but have neglected their effects on the performance of P2P systems For example, Zattoo uses an AS-aware method to build the neighbor lists in its system However, [11] shows that peers can expelled from Zattoo network because of NATing For our best knowledge, no one has studied NATing type as a parameter to build neighbor lists until now Finally, in [19] the author demonstrated the effect of NATing on P2P file sharing The model demonstrated the probability that a peer can be expelled from a P2P networks Unfortunately, this model is not useful for our work for two reasons: first, this research assumed that there are two kinds of peers namely, public and NATed NATed peers can only connect to public peers while the latter can connect to both kinds This is not the fact as seen in table I Secondly, the researcher s model did not construct to study the effects of NAT configurations (NAT types) on the system It studied only the effects of NATing II THE PROPOSED SYSTEM One main target of our algorithm is to diminish the number of expelled peers To do this we have to predict the theoretical highest number of peers that can connect to the system under the NATing percentages and average upload capacities of the peers in the system This section begins by deriving the boundaries of expelled peers The proposed algorithm is then presented, which attempts to reach the lower boundary

3 Avg Upload Speed 2R/5 R/2 4R/5 R 2R Lower Boundary Upper Boundary Avg Number of Combination Tries with Zero Kicked out Peers Fig 2 Zero Kicked-Out Peer Percentage combination tries to the Avg Upload Capacity TABLE I NAT CONNECTIVITY Type name Type Open 1 Full Cone 2 IP restricted 3 Port restricted 4 Symmetric 5 UDP disabled 6 A Expelled Peers boundaries To prove that NATing can expel peers from P2P live streaming system, we need to understand how this can happen Four types of NATing can be found: Full Cone, Port Restricted, IP Restricted, and Symmetric In P2P live streaming systems, peers can be NATed with one of these four types plus another two configuration options: Open (without NATing) and UDP disabled Table I shows the ability to establish a connection among these types From the table we can observe that even with NATing solutions, such as, NAT traversal, not all NAT types can connect to one another What, however, is the probability of this scenario? To answer this question, we wrote all possible combinations of NAT configuration percentages that any network may have We used the traces from [1], [11], [12], [13] as constrains to write only the possible percentages combinations To anneal our prediction, we used five different average speed classes 3,764 different possible combinations of NAT percentage scenarios were constructed We used C language to write a program that construct random pairs of types Each pair, simulates a connection between any two NATing types The output of any pair, has one of two status outputs: true or false False status means that peers from these NAT types in this pair cannot connect with each other and one of them will be expelled We used 1 runs to create 1 random possible ways for each type to find its match We done this in each one of the combination that we created to find the scenario with the highest connected peers (lower boundary) and the scenario with the lowest connected peers (highest boundary) Within our theoretical boundaries, we used five NAT configurations (port restricted and IP restricted are the same in our model depending on table I) To predict the minimum theoretical number of peers expelled in a system, peers with open configurations should connect with UDP disabled peers in a higher priority and vice versa Peers with symmetric NATing must connect with full cone peers as a first priority then with open peers Full cone peers must connect with any type except open configuration peers and themselves For the restricted configuration, (IP or port) peers can connect with themselves as a first priority then with other types The percentage of IP restricted is always high [1], [11], [12], [13] If peers follow this schema, the number of expelled peers will be at a minimum We name it the Lower Boundary Algorithm 1 To obtain the upper boundary, which is the worst case, we found that every type of NATed peers must connect only with itself In such a case all UDP disabled and symmetric NATed peers will be expelled with other peers depending on the average upload capacity We found that from these 3764 different combinations of NAT percentage in any network with average upload capacity equal to half of the video rate, only 14% of these tries have 1% connected peers Fig 1 shows the percentage of expelled peers with different video rates This figure shows that the upload capacity can decrease the number of expelled peers but cannot eliminate it Fig 2 shows number of tries where no peers were expelled From this figure, we can conclude that for low average upload capacities the probability of having no expelled peers is approximately zero for random selection and high for priority selection B The Algorithm Our proposed algorithm converts the random selected list to a prioritized one depending on the AS number and the NATing type as in Algorithm 1 The algorithm starts to check the AS number of the new joining peer and chooses all peers from the same AS Subsequently, the algorithm selects the best peers depending on the NATing type If the peer has a disabled UDP configuration, the list will consist of Open Peers only (without NATing) If the peer has a symmetric NATing, the list will consist of Cone NATing as well as Open Peers with higher priority for the former If the peer is restricted (IP or Port), the list will consist of restricted (Port and IP) peers and they will have a higher priority than other types If the peer is opened, the list will consist of any type except open peers The UDP disabled peers in the list will get a higher priority Finally, if the peer is Cone NATed, the list will consist of symmetric and restricted peers only with a higher priority for symmetric ones If the list became full, the streaming provider server will send it If the list did not complete, the streaming server will fill the rest of the list with peers from different AS s after checking their NAT types This solution will increase the ability to find the best neighbors from the first round, which will diminish the playback start time This solution will reduce transit traffic and increase connectivity Unfortunately, the reduction in transit traffic will not offer

4 transit load reduction similar to the reduction of the solutions that depend only on AS-locality awareness but it will reduce the number of expelled peers to the theoretical low boundary and reduces the start up time From [13], we can see that there is a relationship between the location and the NATing distribution This can lead to reduction of peers conductivities under AS-locality awareness in some locations or domains and to an increasing in others Considering NATing as a parameter when construct the neighbor list, will allow the system to have a balanced peers connectivity in all domains Algorithm 1 The Theocratical upper bound algorithm for Kicked Peers P (i): Peer with i NATing type R: Video Rate in Kbps U p(i) : upload capacity of a Peer with NATing type i i: NATing configuration 1=open, 2=port restricted, 3=symetric, 4=UDP disabled K: Number of kicked out Peers for all Nodes in the sameas do if ΣU P (1) >= (ΣP (4) R) then K = Available = ΣU p(1) (ΣP (4) R) if (ΣU P (2) + Avalible) >= (ΣP (3) R) then if ΣU P (2) >= (ΣP (3) R) then K = Available = Available+(ΣU p(2) (ΣP (3) R)) else K = Available = (ΣU p(2) +Available) (ΣP (3) R) end if else K = K + ((ΣP (3) R) ΣU p(2) ) end if else K = K + ((ΣP (3) R) ΣU p(2) ) end if end for III THE EXPERIMENT We used NS2 simulator [2] in our experiment A pull-push streaming protocol was employed We used a pull-push system for two reasons: first, tree based system with high streaming rate creates many nodes without children peers Second, the mesh topology is good but it has a huge overhead and as we have recently experienced in the last few years the most wellknown mesh system (coolstreaming) has adopted a pull-push approach called (coolstreaming+) For our comparisons, we have implemented three algorithms to construct the neighbor list: the random, the AS-aware and the NAT aware algorithms In the AS-locality aware algorithm the list is constructed depending on the AS number In NAT aware algorithm, the list s construction depends upon the algorithm that we have discussed in this paper In the next section, we will discuss the streaming protocol that was implemented to be used in NS2 simulator A The Streaming System The streaming system consists of peers and a streaming server When a new peer joins the system, it sends a request to the server which in turn answers with a list consisting of 2-5 peers When the peer receives the list, it sends requests (to obtain the whole sub-streams lists) to the above number of peers If the NATing type between the two peers allows them to connect, the peer then answers with a message that contains the latest sequence number for each sub-stream If the NATing does not allow them to connect, the peer will not answer The peer then selects the parents depending upon the sequence number Subsequently, the peer sends a joining message to these nodes with the sub-stream number If the peer is unable to obtain the whole stream from its connected peers, it will ask for a new list from the server (another round) When the peer receives the streams, it checks the quality of the system every five seconds If the quality of any sub-stream is less compared to others, the peer disconnects the sub-stream and asks for the disconnected sub-stream from another parent If the quality remains the same for three rounds, the peer disconnects the whole stream and asks for a new list from the server B Topology and parameters Four AS s were located and connected to each other via a backbone as in figure 3[6]The number of peers in the first AS is 1, the second 2, the third 3 and the fourth 4, which gives 1 peers in total The effective upload capacity of these peers was chosen based upon a normal distribution from 12 to 65 Kbps The NAT configuration we used in our simulation was similar to the one in [11] Five hundred peers tried to join the system in the first second After 1 minute the remaining peers connect The rest of simulation parameters can be found in table II AS 1 1 Peers AS 3 4 Peers Inter-connection Streaming Server Fig 3 AS 2 2 Peers AS 4 3 Peers Simulation Topology In the second configuration we changed the upper boundary of the upload speed from 65 to 1 kbps We kept the rest of the parameters as before IV RESULTS The performance metric we used is divided into two categories One category is for ISP Measurement while the second one pertains to the P2P system Number of connected peers,

5 TABLE II SIMULATION PARAMETERS Definition Value Routers 2 PoPs 4 Video Rate (R) 5Kbps Peer 1 Video Duration 5 min Sub-Streams 1 Channels 1 Server BW 45Kbps playback start time including its Stability and the number of join messages are the metrics to measure the effects of P2P systems Transit in, out and the number of exchanged packets in the same domain are the metrics to measure the load on the Internet Service Provider The number of connected peers at the theoretical upper and lower boundaries was counted The connected peers were measured using the simulation and the boundaries were computed using the algorithm as in Fig 4 In these figure we can observe that the theoretical lower number of kicked out peers is 2% for both the random and the AS-aware algorithms and 22% for the NAT-aware algorithm We can observe in the figure that the practical number of kicked out peers in the NAT aware algorithm is 265% which is close to the theoretical boundary For the algorithm the expelled peers percentage is 368% and for the upper boundary it is 467% which shows that 368% is in the middle between the two boundaries In the AS-aware algorithm the number of expelled peers produced the highest value of 544% which is very close to the upper boundary of 56% Avg Numbr of connected Peers (%) High Boundary Number of Connected Peers Low Boundary Neighbor List Construction Algorithms Fig 4 Avg Number of connected Peers In Fig 5, we measured the effects that pertain to the second AS which has 2 peers From this figure we can conclude that the decreasing of transit traffic in, out and the maximum number of exchange packets in the domain is the optimum for the AS-aware algorithm For the NAT-aware algorithm, the reduction is higher than the Algorithm but it is higher than the Locality Aware one The AS aware reduced of the transit traffic by 54% but for the algorithm the corresponding reduction was 35% and this represent a tradeoff between both algorithms Avg throughput "MB" Transit In In Domain Exchanging Transit Out Neighbor List Contruction Algorithms Fig 5 Effects on ISPs Fig 6, shows the playback start time of the peers From this figure we can observe the stability of the system with the NAT-aware algorithm Stability here means that all peers playback start time is around the average playback start time In the figure the scattered points of both the random and the AS aware algorithms show that our algorithm is more stable than both of them In the figure we used 1 as start time for nodes that tried all the simulation times to connect but they failed to do so CDF As Aware Playback Delay (S) Fig 6 Stability of the Algorithms As we said before, upload speed is one of the constraints that we discovered Therefore, we changed the range of the upload speed and measure the number of kicked out peers, start up time and the average number of join messages Fig 7, shows the number of connected peers against upload speed As we can observe, with the increasing of upload speed the number of connected peers also increases but we did not reach 1% and as before, the AS-aware algorithm obtained the lowest connectivity of the three algorithms We also can observe that with our algorithm a higher number of connected peers can be found even with less upload capacity of the peers Fig 8 shows the average start up time of the whole system Without doubt our protocol has the lowest average upload time for two reasons, first less number of rounds to connect as we will observe in Fig 9 Secondly, NAT-aware algorithm build a full useful list not like the other algorithms which send a list

6 Percentage of Connected Peers Avg Playback delay (S) Fig 7 Effects of upload speed Fig 8 Avg Start-up Time of the Whole System with percentage of useful peers Fig 9, shows the average number of rounds that peers need to join the system By reducing this number we are decreasing the playback start time and the overhead of the system Our algorithm has decreased the average join messages but this number increased with the reduction of the upload speed Most of the peers in our system uses only one round Peers that did not connect to the system have increased this number which in turn increased the average number Avg # of Join Messages Sent from Peers Fig 9 Avg number of Join Messages Fig 1, shows the average playback start time of nodes with UDP Disabled NATing We can observe that the and the algorithms did not reduce or even effect the playback start time of peers with these NATing configurations Another misleading conclusion than can be obtain from this figure is that the playback start-up time decreases when the average upload rate decreases This reduction in playback startup occurs because the number of connected peers that have been expelled from the system increases with the reduction of average upload speed This lead to only few connected peers of this type that connected in the beginning Avg Playback Start up Time (S) Fig 1 Avg Playback tart-up time of Peers with UDP-disabled NATing Fig11 shows the average playback start-up time of symmetric Nating This figure demonstrate that our algorithm can reduce this start-up time more efficient than AS aware and random algorithms Another observation can be concluded from Fig11 and 1 that the start-up time of symmetric NATing peers is less than UDP disabled NAting peers even when we use our algorithm The reasons behind this are: first Symmetric NATing can connect with two types of NATing unlike UDP Disabled only one Secondly the percentage of Port Restricted NATing is higher than Open NATing Our algorithm tried to keep the average playback start time close as possible to the average start up time of the network Avg Playback Strat up Time (S) Fig 11 Avg Playback tart-up time of Peers with Symmetric NATing V CONCLUSION AND FUTURE WORK NATing can make it difficult, if not impossible, for peers to connect to each other In live streaming systems, peers can be expelled as a result

7 Locality aware solutions replace the random peer list with a selection mechanism that depends on the AS number of the peers when constructing neighbor lists In this paper, we have shown that the AS-aware algorithm can provide benefits to ISPs and harm P2P live streaming system AS-aware algorithm can satisfy ISPs need for reducing inter/intra-domain traffic with no benefits for P2P live streaming systems, when it is used with a high average upload capacity We also showed that in any live streaming network there is a high probability that peers will be expelled We introduced theoretical upper and lower boundaries for the number of expelled peers We also proposed a novel and easy method to implement a selection algorithm to build a non-random peer list that reduces transit traffic, increases peer connectivity and diminishes playback start-up time Our proposal tries to keep the number of expelled peers as close as possible to the lower boundary We found that neighbor selection algorithms that are dependent upon AS numbers are not enough for P2P live streaming systems Our simulation study also shows that there is a trade-off between the reduction in transit in the network and the number of connected peers Our algorithm reduced transit traffic but not to the extent achieved by the AS aware algorithm We can conclude that these solutions have limits in order to keep both P2P providers and ISPs satisfied ACKNOWLEDGEMENT This work has been in part supported by the NSFC under Grant No and the Technology Support Plan of the National Twelfth Five-Year-Plan of China under Grant No 211BAK8B1 REFERENCES [1] K Kerpez, Bandwidth Reduction via Localized Peer-to-Peer (P2P) Video, OFC, 29 [2] V Hilt, I Rimac, M Tomsu, and E Marocco, A survey of research on the application-layer traffic optimization problem and the need for layer cooperation, IEEE Communications Magazine, august 29 [3] X Weng, Y Hongliang, S Guangyu, C Jian, W Xu, S Jing, and Z Weimin, Understanding Locality-Awareness in Peer-to-Peer Systems, in IEEE ICPP, 28 [4] H Xie, Y R Yang, A Krishnamurthy, Y G Liu, and A Silberschatz, P4P: provider portal for applications, in ACM SIGCOMM, 28 [5] C David and B Fabián, Taming the Torrent: a practical approach to reducing cross-isp traffic in Peer-to-Peer systems, in ACM SIGCOMM, August 28 [6] Lehrieder, F Oechsner, S Hossfeld, T Despotovic, Z Kellerer, and M W Michel, Can P2P-users benefit from locality-awareness? in IEEE P2P, Aug 21 [7] IETF, China telecom ALTO/P4P trial, 29, [8] I Beijnum, IPv4 Address Consumption, The Internet Protocol Journal, 27 [9] M Cadaco and MFreedman, Illuminati Opportunistic Network and Web Measurement, Sep 27, [1] H Chang, S Jamin, and W Wang, Live Streaming Performance of the Zattoo Network, in ACM IMC, 29 [11] K Shami, D Magoni, H Chang, W Wang, and J S, Impacts of Peer Characteristics on P2PTV Networks Scalability, in IEEE INFOCOM, 29 [12] Y Huang, T Z Fu, D-M Chiu, J C Lui, and C Huang, Challenges, design and analysis of a large-scale P2P-VoD system, in ACM SIG- COMM, August 28 [13] L D Acunto, J Pouwelse, and H Sips, A measurement of NAT and firewall characteristics in peer-to-peer systems, in Proc 15-th ASCI Conference, June 29 [14] B Ford, P Srisuresh, and D Kegel, Peer-to-Peer communication across network address translators, ATEC, 25 [15] X WANG and Q DENG, VIP : A P2P communication platform for NAT traversal, in Parallel and distributed processing and applications International symposium No3, Nov 25 [16] S Ren, L Guo, and X Zhang, ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP, in IEEE ICDCS, 26 [17] W Kho, S Baset, and H Schulzrinne, Skype relay calls: Measurements and experiments, in IEEE INFOCOM Workshops, Apr 28 [18] R Cuevas, A Cuevas, A Cabellos-Aparicio, L Jakab, and C Guerrero, A collaborative P2P scheme for NAT Traversal Server discovery based on topological information, Comput Netw, August 21 [19] Y Liu and J Pan, The impact of NAT on BitTorrent-like P2P systems, in IEEE P2P, Sept 29 [2] Network Simulator (NS2),

Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration

Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration ABSTRACT Mohammad Z. M. Masoud Huazhong University of Science and Technology, Wuhan, China NAT has been design to work with

More information

On Feasibility of P2P Traffic Control through Network Performance Manipulation

On Feasibility of P2P Traffic Control through Network Performance Manipulation THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE On Feasibility of P2P Traffic Control through Network Performance Manipulation HyunYong Lee Masahiro Yoshida

More information

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement

More information

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem draft-rimac-p2prg-alto-survey-00 Marco Tomsu, Ivica Rimac, Volker Hilt, Vijay Gurbani, Enrico Marocco 75 th IETF Meeting,

More information

ALTO Problem Statement

ALTO Problem Statement ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting Outline History The problem Main issues Use cases The cache location sub-problem Internet

More information

A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems

A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems 2013 Third International Conference on Intelligent System Design and Engineering Applications A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems Liu Guanxiu, Ye Suqi, Huang Xinli Department

More information

Enhancing Downloading Time By Using Content Distribution Algorithm

Enhancing Downloading Time By Using Content Distribution Algorithm RESEARCH ARTICLE OPEN ACCESS Enhancing Downloading Time By Using Content Distribution Algorithm VILSA V S Department of Computer Science and Technology TKM Institute of Technology, Kollam, Kerala Mailid-vilsavijay@gmail.com

More information

Octoshape. Commercial hosting not cable to home, founded 2003

Octoshape. Commercial hosting not cable to home, founded 2003 Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server

More information

Understanding the effect of streaming overlay construction on AS level traffic

Understanding the effect of streaming overlay construction on AS level traffic Understanding the effect of streaming overlay construction on AS level traffic Reza Motamedi and Reza Rejaie Information and Computer Science Department University of Oregon e-mail: {reza.motamedi,reza}@cs.uoregon.edu

More information

SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM

SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM ABSTRACT: SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM J.Priyanka 1, P.Rajeswari 2 II-M.E(CS) 1, H.O.D / ECE 2, Dhanalakshmi Srinivasan Engineering College, Perambalur. Recent years have witnessed

More information

Chunk Scheduling Strategies In Peer to Peer System-A Review

Chunk Scheduling Strategies In Peer to Peer System-A Review Chunk Scheduling Strategies In Peer to Peer System-A Review Sanu C, Deepa S S Abstract Peer-to-peer ( P2P) s t r e a m i n g systems have become popular in recent years. Several peer- to-peer systems for

More information

Experimental Study of Skype. Skype Peer-to-Peer VoIP System

Experimental Study of Skype. Skype Peer-to-Peer VoIP System An Experimental Study of the Skype Peer-to-Peer VoIP System Saikat Guha (Cornell) Neil Daswani (Google) Ravi Jain (Google) IPTPS 2006 About Skype Voice over IP (VoIP) 50 million users Valued at $2.6 billion

More information

A Collaborative P2P Scheme for NAT Traversal Server Discovery based on Topological Information

A Collaborative P2P Scheme for NAT Traversal Server Discovery based on Topological Information A Collaborative P2P Scheme for NAT Traversal Server Discovery based on Topological Information Rubén Cuevas a, Ángel Cuevas a Albert Cabellos-Aparicio b Loránd Jakab b Carmen Guerrero a a Universidad Carlos

More information

Page 14:, this requires some special protocols like Universal Plug and Play (UPnP) to be

Page 14:, this requires some special protocols like Universal Plug and Play (UPnP) to be Page 6:..., as well as the correlation between the two...., as well as the relationship between the two. Page 9: in the design and enhancement of peer-to-peer video streaming system in the design and enhancement

More information

A Proposed Peer Selection Algorithm for Transmission Scheduling in P2P-VOD Systems

A Proposed Peer Selection Algorithm for Transmission Scheduling in P2P-VOD Systems A Proposed Peer Selection Algorithm for Transmission Scheduling in P2P-VOD Systems Hatem Fetoh Department of Information Technology Faculty of Computers and Information Mansoura University, Egypt Waleed

More information

Pitfalls for ISP-friendly P2P design. Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD

Pitfalls for ISP-friendly P2P design. Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD Pitfalls for ISP-friendly P2P design Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD P2P & ISPs P2P systems: Large volume of traffic (20 80% of total)

More information

Internet Networking recitation #

Internet Networking recitation # recitation # UDP NAT Traversal Winter Semester 2013, Dept. of Computer Science, Technion 1 UDP NAT Traversal problems 2 A sender from the internet can't pass a packet through a NAT to a destination host.

More information

Peer-to-Peer Streaming Systems. Behzad Akbari

Peer-to-Peer Streaming Systems. Behzad Akbari Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues

More information

Broadcast Routing. Chapter 5 Multicast and P2P. In-network Duplication. Spanning Tree

Broadcast Routing. Chapter 5 Multicast and P2P. In-network Duplication. Spanning Tree Chapter 5 Multicast and PP Broadcast Routing Deliver packets from source to all other nodes Source duplication is inefficient: A note on the use of these ppt slides: All material copyright 996-7 J.F Kurose

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System Ubaid Abbasi and Toufik Ahmed CNRS abri ab. University of Bordeaux 1 351 Cours de la ibération, Talence Cedex 33405 France {abbasi,

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Towards Low-Redundancy Push-Pull P2P Live Streaming

Towards Low-Redundancy Push-Pull P2P Live Streaming Towards Low-Redundancy Push-Pull P2P Live Streaming Zhenjiang Li, Yao Yu, Xiaojun Hei and Danny H.K. Tsang Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology

More information

An Empirical Study of Flash Crowd Dynamics in a P2P-based Live Video Streaming System

An Empirical Study of Flash Crowd Dynamics in a P2P-based Live Video Streaming System An Empirical Study of Flash Crowd Dynamics in a P2P-based Live Video Streaming System Bo Li,GabrielY.Keung,SusuXie,Fangming Liu,YeSun and Hao Yin Hong Kong University of Science and Technology Tsinghua

More information

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network Research Journal of Applied Sciences, Engineering and Technology 7(2): 221-226, 2014 DOI:10.19026/rjaset.7.244 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: March

More information

The hidden locality in swarms

The hidden locality in swarms The hidden locality in swarms John S. Otto and Fabián E. Bustamante Northwestern University {jotto,fabianb}@eecs.northwestern.edu Abstract People use P2P systems such as BitTorrent to share an unprecedented

More information

Cache Capacity Allocation to Overlay Swarms

Cache Capacity Allocation to Overlay Swarms Cache Capacity Allocation to Overlay Swarms Ioanna Papafili 1, George D. Stamoulis 1, Frank Lehrieder 2, Benjamin Kleine 2, Simon Oechsner 2, 1 Athens University of Economics and Business, Athens, Greece

More information

Max-1: Algorithm for Constructing Tree Topology for heterogeneous networks for Peer-To-Peer Live Video Streaming

Max-1: Algorithm for Constructing Tree Topology for heterogeneous networks for Peer-To-Peer Live Video Streaming International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:04 14 : Algorithm for Constructing Topology for heterogeneous networks for Peer-To-Peer Live Video Streaming Ammar Waysi AlTuhafi

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Predicting connection quality in peer-to-peer real-time video streaming systems

Predicting connection quality in peer-to-peer real-time video streaming systems Predicting connection quality in peer-to-peer real-time video streaming systems Alex Giladi Jeonghun Noh Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,

More information

Collaborative Multi-Source Scheme for Multimedia Content Distribution

Collaborative Multi-Source Scheme for Multimedia Content Distribution Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx

More information

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth American Journal of Networks and Communications 2013; 2(2): 40-46 Published online June 10, 2013 (http://www.sciencepublishinggroup.com/j/ajnc) doi: 10.11648/j.ajnc.20130202.13 Node selection in Peer-to-Peer

More information

A Streaming Method with Trick Play on Time Division based Multicast

A Streaming Method with Trick Play on Time Division based Multicast A Streaming Method with Trick Play on Time Division based Yoshitaka Nakamura, Kazuki Murakoshi Yoh Shiraishi and Osamu Takahashi School of Systems Information Science, Future University Hakodate, Japan

More information

Performance analysis of optimization techniques in peer-to-peer video streaming systems with tree/forest topology

Performance analysis of optimization techniques in peer-to-peer video streaming systems with tree/forest topology 2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) Performance analysis of optimization techniques in peer-to-peer video streaming systems with tree/forest

More information

Optimal Cache Allocation for Content-Centric Networking

Optimal Cache Allocation for Content-Centric Networking Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,

More information

ENERGY-EFFICIENT PROTOCOL IN OMNET++ SIMULATION ENVIRONMENT. Krzysztof Daniluk

ENERGY-EFFICIENT PROTOCOL IN OMNET++ SIMULATION ENVIRONMENT. Krzysztof Daniluk 159 ENERGY-EFFICIENT PROTOCOL IN OMNET++ SIMULATION ENVIRONMENT Krzysztof Daniluk Abstract: New idea for energy-efficient extension for OSPF protocol is presented. New concept is based on Dijkstra s algorithm,

More information

Skype Video Responsiveness to Bandwidth Variations

Skype Video Responsiveness to Bandwidth Variations Skype Video Responsiveness to Bandwidth Variations L. De Cicco,, V. Palmisano Dipartimento di Elettronica ed Elettrotecnica Politecnico di Bari Italy -1- Motivation 1/2 Multimedia real-time applications

More information

Packet Classification Using Dynamically Generated Decision Trees

Packet Classification Using Dynamically Generated Decision Trees 1 Packet Classification Using Dynamically Generated Decision Trees Yu-Chieh Cheng, Pi-Chung Wang Abstract Binary Search on Levels (BSOL) is a decision-tree algorithm for packet classification with superior

More information

On the Applicability of knowledge based NAT-Traversal for Home Networks

On the Applicability of knowledge based NAT-Traversal for Home Networks On the Applicability of knowledge based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany

More information

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks 1896 1920 1987 2006 Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks Ying Cui Shanghai Jiao Tong University, Shanghai, China Joint work with Fan Lai, Feng Qiu, Wenjie

More information

The Novel HWN on MANET Cellular networks using QoS & QOD

The Novel HWN on MANET Cellular networks using QoS & QOD The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.

More information

On the Applicability of Knowledge Based NAT-Traversal for Home Networks

On the Applicability of Knowledge Based NAT-Traversal for Home Networks On the Applicability of Knowledge Based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

Delft University of Technology Parallel and Distributed Systems Report Series

Delft University of Technology Parallel and Distributed Systems Report Series Delft University of Technology Parallel and Distributed Systems Report Series Modeling and Analyzing the Effects of Firewalls and NATs in P2P Swarming Systems Lucia D Acunto, Michel Meulpolder, Rameez

More information

A Data Storage Mechanism for P2P VoD based on Multi-Channel Overlay*

A Data Storage Mechanism for P2P VoD based on Multi-Channel Overlay* A Data Storage Mechanism for P2P VoD based on Multi-Channel Overlay* Xiaofei Liao, Hao Wang, Song Wu, Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer

More information

Multimedia Streaming. Mike Zink

Multimedia Streaming. Mike Zink Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=

More information

Content Distribution and BitTorrent [Based on slides by Cosmin Arad]

Content Distribution and BitTorrent [Based on slides by Cosmin Arad] ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Service Quality Assurance Mechanisms for P2P SIP VoIP

Service Quality Assurance Mechanisms for P2P SIP VoIP Service Quality Assurance Mechanisms for P2P SIP VoIP Xiaofei Liao, Fengjiang Guo, and Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and

More information

QoE-aware Traffic Shaping for HTTP Adaptive Streaming

QoE-aware Traffic Shaping for HTTP Adaptive Streaming , pp.33-44 http://dx.doi.org/10.14257/ijmue.2014.9.2.04 QoE-aware Traffic Shaping for HTTP Adaptive Streaming Xinying Liu 1 and Aidong Men 2 1,2 Beijing University of Posts and Telecommunications No.10

More information

Tracker-based Peer Selection using ALTO Map Information

Tracker-based Peer Selection using ALTO Map Information Tracker-based Peer Selection using ALTO Map Information draft-yang-tracker-peer-selection-00 Y. Richard Yang Richard Alimi, Ye Wang, David Zhang, Kai Lee Challenges Tracker Scalability Many peers distributed

More information

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying

More information

Encouraging bandwidth efficiency for peer-to-peer applications

Encouraging bandwidth efficiency for peer-to-peer applications Encouraging bandwidth efficiency for peer-to-peer applications Henning Schulzrinne Dept. of Computer Science Columbia University New York, NY P2Pi Workshop Overview Video bandwidth consumption Cost of

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Dynamic Routing Tables Using Simple Balanced. Search Trees

Dynamic Routing Tables Using Simple Balanced. Search Trees Dynamic Routing Tables Using Simple Balanced Search Trees Y.-K. Chang and Y.-C. Lin Department of Computer Science and Information Engineering National Cheng Kung University Tainan, Taiwan R.O.C. ykchang@mail.ncku.edu.tw

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 173 A Review of Various Approaches to Multipath Routing Maryada M.Tech. Student, Department of Computer Science

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING

A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING Seyed Mehran Ronaghi 1 and Behzad Akbari 2 1 Department of Electrical and Computer Engineering, Qazvin Islamic Azad University, Qazvin,

More information

Enabling Cooperation between ISPs and P2P Systems toward IPTV Service Delivery

Enabling Cooperation between ISPs and P2P Systems toward IPTV Service Delivery Enabling Cooperation between ISPs and P2P Systems toward IPTV Service Delivery Mubashar Mushtaq 1,2 and Toufik Ahmed 1 1 CNRS LaBRI Lab. University of Bordeaux, 351, Cours de la Libération, Talence, 33405,

More information

Scalability And The Bandwidth Efficiency Of Vod Systems K.Deepathilak et al.,

Scalability And The Bandwidth Efficiency Of Vod Systems K.Deepathilak et al., Asian Journal of Electrical Sciences (AJES) Vol.3.No.1 2015 pp 33-37. available at: www.goniv.com Paper Received :08-03-2015 Paper Accepted:20-03-2015 Paper Reviewed by: 1. R. Venkatakrishnan 2. R. Marimuthu

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks VoIP Jianping Pan Summer 2007 6/6/07 csc485b/586b/seng480b 1 Feedback on reading & summaries Be aware of deadlines the day before the presentation Read papers not someone else's

More information

An Efficient NAT Traversal for SIP and Its Associated Media sessions

An Efficient NAT Traversal for SIP and Its Associated Media sessions An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Interdomain Routing Design for MobilityFirst

Interdomain Routing Design for MobilityFirst Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network

More information

Architecture for Cooperative Prefetching in P2P Video-on- Demand System

Architecture for Cooperative Prefetching in P2P Video-on- Demand System Architecture for Cooperative Prefetching in P2P Video-on- Demand System Ubaid Abbasi and Toufik Ahmed CNRS LaBRI Lab. University of Bordeaux, France 351, Cours de la Libération Talence Cedex, France {abbasi,

More information

Push pull techniques in peer-to-peer video streaming systems with tree/forest topology

Push pull techniques in peer-to-peer video streaming systems with tree/forest topology 2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) Push pull techniques in peer-to-peer video streaming systems with tree/forest topology Paolo Giacomazzi,

More information

Is IPv4 Sufficient for Another 30 Years?

Is IPv4 Sufficient for Another 30 Years? Is IPv4 Sufficient for Another 30 Years? October 7, 2004 Abstract TCP/IP was developed 30 years ago. It has been successful over the past 30 years, until recently when its limitation started emerging.

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS Shaikh Shariful Habib Assistant Professor, Computer Science & Engineering department International Islamic University Chittagong Bangladesh

More information

A Super-Peer Selection Strategy for Peer-to-Peer Systems

A Super-Peer Selection Strategy for Peer-to-Peer Systems , pp.25-29 http://dx.doi.org/10.14257/astl.2016.125.05 A Super-Peer Selection Strategy for Peer-to-Peer Systems Won-Ho Chung 1 1 Department of Digital Media, Duksung Womens University whchung@duksung.ac.kr

More information

Routing and Channel Assignment for Multicast in Multi- Channel Multi-Radio Wireless Mesh Networks

Routing and Channel Assignment for Multicast in Multi- Channel Multi-Radio Wireless Mesh Networks Routing and Channel Assignment for Multicast in Multi- Channel Multi-Radio Wireless Mesh Networks Wen-Xiao Shi, Ke-Qiang Cui, and Yuan Chai College of Communication Engineering, Jilin University, Changchun,

More information

Joint Optimization of Content Replication and Server Selection for Video-On-Demand

Joint Optimization of Content Replication and Server Selection for Video-On-Demand Joint Optimization of Content Replication and Server Selection for Video-On-Demand Huan Huang Pengye Xia S.-H. Gary Chan Department of Compute Science and Engineering The Hong Kong University of Science

More information

Peer-to-Peer Media Streaming

Peer-to-Peer Media Streaming SEMINAR: RECHNERNETZE UND VERTEILTE SYSTEME HS08 Peer-to-Peer Media Streaming Francisco Piña Garrido University Jaen (Spain) November 26th, 2008 Overview > Introduction Definition of Peer to Peer Streaming

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

A Tale of Three CDNs

A Tale of Three CDNs A Tale of Three CDNs An Active Measurement Study of Hulu and Its CDNs Vijay K Adhikari 1, Yang Guo 2, Fang Hao 2, Volker Hilt 2, and Zhi-Li Zhang 1 1 University of Minnesota - Twin Cities 2 Bell Labs,

More information

Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems

Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems Fan Bin Dah-Ming Chiu John C.S. Lui Abstract In this paper, we present the mathematical analysis of two important

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

For layered video encoding, video sequence is encoded into a base layer bitstream and one (or more) enhancement layer bit-stream(s).

For layered video encoding, video sequence is encoded into a base layer bitstream and one (or more) enhancement layer bit-stream(s). 3rd International Conference on Multimedia Technology(ICMT 2013) Video Standard Compliant Layered P2P Streaming Man Yau Chiu 1, Kangheng Wu 1, Zhibin Lei 1 and Dah Ming Chiu 2 Abstract. Peer-to-peer (P2P)

More information

Load Balancing the Network Traffic in the N th Mode of IPtables

Load Balancing the Network Traffic in the N th Mode of IPtables ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Efficiency of Data Distribution in BitTorrent-Like Systems

Efficiency of Data Distribution in BitTorrent-Like Systems Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department

More information

MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST

MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250 1568 Vol.2, Issue 2 June 2012 72-78 TJPRC Pvt. Ltd., MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST

More information

An Efficient Algorithm for AS Path Inferring

An Efficient Algorithm for AS Path Inferring An Efficient Algorithm for AS Path Inferring Yang Guoqiang and Dou Wenhua National Univernity of Defence Technololy, China yanggq@nudt.edu.cn Abstract Discovering the AS paths between two ASes are invaluable

More information

Diagnosing Network-wide P2P Live Streaming Inefficiencies

Diagnosing Network-wide P2P Live Streaming Inefficiencies Diagnosing Network-wide P2P Live Streaming Inefficiencies Chuan Wu Baochun Li Shuqiao Zhao Department of Computer Science Dept. of Electrical and Computer Engineering Multimedia Development Group The University

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Reversing Ticket Based Probing Routing Protocol for MANET

Reversing Ticket Based Probing Routing Protocol for MANET Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Peer-to-Peer (P2P) Architectures

Peer-to-Peer (P2P) Architectures Peer-to-Peer (P2P) Architectures ECE/CS 658 Internet Engineering Dilum Bandara dilumb@engr.colostate.edu Outline Background Unstructured P2P Napster, Gnutella, & BitTorrent Structured P2P Chord & Kademlia

More information

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University

More information

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Master s Thesis Title A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Supervisor Professor Masayuki Murata Author Hideto Horiuchi February 14th, 2007 Department

More information

SOLVING NETWORK TESTBED MAPPING PROBLEM WITH GENETIC ALGORITHM

SOLVING NETWORK TESTBED MAPPING PROBLEM WITH GENETIC ALGORITHM SOLVING NETWORK TESTBED MAPPING PROBLEM WITH GENETIC ALGORITHM Yi Liu, Kaiping Xiao and Yanping Li Department of Computer, Xi'an Jiaotong University, Xi'an, Shannxi, 710049, China E-mail: Liuyi97@263.net

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Using Orthogonal Channels for Supporting Multicast Service in Multi-channel Wireless Mesh Networks

Using Orthogonal Channels for Supporting Multicast Service in Multi-channel Wireless Mesh Networks Using Orthogonal Channels for Supporting Multicast Service in Multi-channel Wireless Mesh Networks ABSTRACT Abbas Nargesi 1 and Mehdi Ghasemi 2 1 Department of IT Engineering, Azad University, Qazvin,

More information

Markov Model Based Congestion Control for TCP

Markov Model Based Congestion Control for TCP Markov Model Based Congestion Control for TCP Shan Suthaharan University of North Carolina at Greensboro, Greensboro, NC 27402, USA ssuthaharan@uncg.edu Abstract The Random Early Detection (RED) scheme

More information

arxiv:cs/ v4 [cs.ni] 19 Apr 2007

arxiv:cs/ v4 [cs.ni] 19 Apr 2007 P2P IPTV Measurement: A Comparison Study Thomas Silverston and Olivier Fourmaux arxiv:cs/633v4 [cs.ni] 9 Apr 27 Université Pierre et Marie Curie - Paris 6 4 avenue du Président Kennedy, 756 Paris, France

More information

Overlay Networks for Multimedia Contents Distribution

Overlay Networks for Multimedia Contents Distribution Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)

More information