On the Impact of Network Address Translation on Locality-aware P2P Live Streaming Systems
|
|
- Jocelin Malone
- 6 years ago
- Views:
Transcription
1 On the Impact of Network Address Translation on Locality-aware P2P Live Streaming Systems Mohammad Z Masoud, Xiaojun Hei, Wenqing Cheng Huazhong University of Science and Technology, Wuhan, China engmohammadmasoud@gmailcom, heixj@husteducn, chengwq@husteducn Abstract More that 7% of all Internet hosts are behind network address translation (NAT) devices In this paper, we study the impact of the NAT devices on application layer traffic optimization (ALTO) schemes NAT brings forth difficulty if not impossible for peers to connect to one another, which may lead sever performance penalty of P2P applications Most localityaware P2P systems only consider network location such as autonomous system (AS) number In this paper, we first demonstrated that peers may be expelled from the system with a high probability in P2P live streaming systems because NAT devices degrade the peer s capacity for contributing upload bandwidth We proposed a simple model to compute the theoretical upper and lower bounds for the number of displaced peers We also propose a simple peer selection algorithm with the NAT consideration in mind to build a non-random peer list that reduces transit traffic, increases peer connectivity and minimizes the playback start-up time for ALTO schemes We conducted a ns2 simulation study to evaluate the performance of the proposed algorithm Based on multiple simulation experiments, we demonstrated that the proposed algorithm decreases the number of expelled peers while it reduces the start-up delay of peers and reduces the interdomain traffic Keywords: network address translation, peer-to-peer; live streaming; Internet service provider; locality awareness I INTRODUCTION Peer-to-Peer (P2P) live streaming systems are live Video, life or on-demand occupies more than 7% of P2P Internet traffic [1] Application layer Traffic Optimization (ALTO) schemas have been proposed to reduce the load of P2P systems This includes live streaming on ISP s inter/intra-domain traffic [2] Optimization should increase the efficiency of these applications while decreasing inter/intra-domain traffic loads This is considered a win-win solution Simulation studies of optimization schemas for P2P file sharing systems have proven promising [3], [4], [5] In P4P [4] approach, the author showed that a collaboration mechanism reduced the download time (Increased the efficiency) by 4% while reducing transit traffic Real trace results for optimization have lead to different opinions [6], [7] They have shown that such mechanisms can decrease the efficiency of P2P file sharing systems by increasing download time ISP s may use caches to reduce the download time to obtain the required output [7] Why is there such a difference between trace data and simulation results? The answer is the parameters Simulation studies do not consider all real life parameters When researchers start to consider a new parameter, new unexpected results can become manifest Upload capacity and peer distributions are two parameters that were studied in [6] The author has shown that under normal distribution AS s both homogeneous configuration of upload and average upload capacities are higher than the video rate from which both P2P and ISP can derive benefits For Internet parameters with heterogeneous upload capacity, skewed peer distribution and unpredictable upload capacity will benefit ISP s rather than P2P s and this can have a negative effect upon the latter In this work we will study another important parameter that can reduce the connectivity of P2P live streaming systems, that is, the Network Address Translation (NAT) parameter NAT, has been used to solve the shortage in IPv4 address space (connectivity) as well as to hide the service provider s internal network structure (security) [8] NAT solution is popular on the Internet More than 73% of Internet users use NATing [9] NAT is suitable for the Internet s structure or the client server approach Clients initiate connections to servers with static public IP addresses These servers send responses to clients using their dynamic public IP addresses This is not the case with P2P systems A peer is a hybrid between a client and a server; it requests services and responses to requests Peers can have a public IP address without NATing, which is termed (opened or public) or a private IP address mapped to the public one after NATing Such an address is termed (private) The connection between peers can take the form of one of four types: private-to-private, public-to-public, privateto-public and public-to-private Methods have been proposed to solve private-to-private connectivity because it is the one that will most probably occur These methods cannot provide connectivity for all types of NATing[1] This parameter has a tremendous negative effect on connectivity in live streaming systems In file sharing systems, it can increase the download time because of the reduction in the number of donor peers but in live streaming, it expels peers out of the system In any live streaming system, the peer starts to join by sending a message to the source The source answers with a peer list The node then starts to contact these peers to obtain the full stream If it cannot obtain the full stream, it tries other peers in the system with a second connection round The number of rounds depends on the P2P streaming system s design With an increasing number of rounds, the probability of finding suitable parents increases including the playback start-up delay time Zattoo [1] for example, uses three rounds before the peer stops trying When the peer stops trying, we call it expulsion In this paper, we show that in any live streaming network
2 there is a high probability that, peers will be expelled We introduce theoretical upper and lower boundaries for the number of kicked-out peers We also propose a novel and easy to implement parent selection algorithm to build a non-random peer list that reduces transit traffic, increases peer connectivity and diminishes playback start time delay by reducing the number of rounds This mechanism tries to keep the number of expelled peers as close as possible to the lower boundary We found that neighbor selection algorithms that depend only upon AS awareness are not enough for live P2P streaming system We will also show that there is a trade-off between traffic locality and peer connectivity The rest of this paper is organized as follows We end this section by describing related works done in this area Section II, introduces the theoretical boundaries of the expelled peers and ends with the algorithm that reduces this number We conducted a simulation study to validate our proposed P2P streaming architecture and then analyzed the simulation results in Section III Finally, we conclude this paper in Section V A Related Work To develop the rationale for this work, we had to consider previous research in P2P measurements that have studied NATing The real traces from Zattoo s system show that peers can be expelled from the system because of NATing issues [1], [11] These works also show the percentage of NAT types in Zattoo s network (in Europe) and the popularity of symmetric NATing In [12], the author studied P2P VoD systems The author proved the popularity of symmetric NATing in these systems also In [13] the author completed a measurement study on a P2P file sharing system The author demonstrated that the percentage of each NATing type can depend on a particular country (location) This result shows that a locality awareness option without awareness of NATing can lead to reduction of connectivity among peers In addition, the author demonstrated the popularity of UDP disabled and symmetric NATing, which are not P2P friendly Our work does not propose a new method to allow peers or nodes behind NAT devices to connect with each other, such as hole punching [14] or NAT traversal [15] This work proposes a way for a peer to find its NAT matching peers to allow hole punching to work correctly To understand this concept, hole punching uses the idea of a third parity server to initiate the connection between peers and leaves them to exchange data by themselves This schema is easy to implement but it cannot be used to connect two hosts behind symmetric devices Our method proposes a way to construct the peer neighbor list by considering peers NATing types In this way, peers can easily find their NAT matches Other methods have been used to solve the NAT mismatch problem, for example relays with public IP address stay in the middle until the termination of the communication channel between the peers [16] This method is famous in P2P VoIP world [17] In [18], the author studied the effects of NATing relay nodes on traffic locality and transit load He proposed a simple algorithm to select relays from the same domain Avr Upload Speed 2R/5 R/2 4R/5 R 2R Upper boundary Lower boundary Percentage of Kicked out Peers Fig 1 Kicked-Out Peer Percentage to the Avg Upload Capacity in order to reduce transit traffic Unfortunately, these relays cannot be used with P2P live streaming for two reasons: first, the video rate can consume the upload capacities of relay nodes and make them useless for many other nodes Secondly, any online node in the P2P streaming system is actively watching (nodes cannot be online and inactive like Skype), which means it uses its entire upload and download capacity for itself This means that, peers with symmetric NATing cannot connect to one another in live streaming systems Many schemas have been proposed to build a peer neighbor list These solutions considered the reduction of inter/intradomain traffic or peers locality as the main point but have neglected their effects on the performance of P2P systems For example, Zattoo uses an AS-aware method to build the neighbor lists in its system However, [11] shows that peers can expelled from Zattoo network because of NATing For our best knowledge, no one has studied NATing type as a parameter to build neighbor lists until now Finally, in [19] the author demonstrated the effect of NATing on P2P file sharing The model demonstrated the probability that a peer can be expelled from a P2P networks Unfortunately, this model is not useful for our work for two reasons: first, this research assumed that there are two kinds of peers namely, public and NATed NATed peers can only connect to public peers while the latter can connect to both kinds This is not the fact as seen in table I Secondly, the researcher s model did not construct to study the effects of NAT configurations (NAT types) on the system It studied only the effects of NATing II THE PROPOSED SYSTEM One main target of our algorithm is to diminish the number of expelled peers To do this we have to predict the theoretical highest number of peers that can connect to the system under the NATing percentages and average upload capacities of the peers in the system This section begins by deriving the boundaries of expelled peers The proposed algorithm is then presented, which attempts to reach the lower boundary
3 Avg Upload Speed 2R/5 R/2 4R/5 R 2R Lower Boundary Upper Boundary Avg Number of Combination Tries with Zero Kicked out Peers Fig 2 Zero Kicked-Out Peer Percentage combination tries to the Avg Upload Capacity TABLE I NAT CONNECTIVITY Type name Type Open 1 Full Cone 2 IP restricted 3 Port restricted 4 Symmetric 5 UDP disabled 6 A Expelled Peers boundaries To prove that NATing can expel peers from P2P live streaming system, we need to understand how this can happen Four types of NATing can be found: Full Cone, Port Restricted, IP Restricted, and Symmetric In P2P live streaming systems, peers can be NATed with one of these four types plus another two configuration options: Open (without NATing) and UDP disabled Table I shows the ability to establish a connection among these types From the table we can observe that even with NATing solutions, such as, NAT traversal, not all NAT types can connect to one another What, however, is the probability of this scenario? To answer this question, we wrote all possible combinations of NAT configuration percentages that any network may have We used the traces from [1], [11], [12], [13] as constrains to write only the possible percentages combinations To anneal our prediction, we used five different average speed classes 3,764 different possible combinations of NAT percentage scenarios were constructed We used C language to write a program that construct random pairs of types Each pair, simulates a connection between any two NATing types The output of any pair, has one of two status outputs: true or false False status means that peers from these NAT types in this pair cannot connect with each other and one of them will be expelled We used 1 runs to create 1 random possible ways for each type to find its match We done this in each one of the combination that we created to find the scenario with the highest connected peers (lower boundary) and the scenario with the lowest connected peers (highest boundary) Within our theoretical boundaries, we used five NAT configurations (port restricted and IP restricted are the same in our model depending on table I) To predict the minimum theoretical number of peers expelled in a system, peers with open configurations should connect with UDP disabled peers in a higher priority and vice versa Peers with symmetric NATing must connect with full cone peers as a first priority then with open peers Full cone peers must connect with any type except open configuration peers and themselves For the restricted configuration, (IP or port) peers can connect with themselves as a first priority then with other types The percentage of IP restricted is always high [1], [11], [12], [13] If peers follow this schema, the number of expelled peers will be at a minimum We name it the Lower Boundary Algorithm 1 To obtain the upper boundary, which is the worst case, we found that every type of NATed peers must connect only with itself In such a case all UDP disabled and symmetric NATed peers will be expelled with other peers depending on the average upload capacity We found that from these 3764 different combinations of NAT percentage in any network with average upload capacity equal to half of the video rate, only 14% of these tries have 1% connected peers Fig 1 shows the percentage of expelled peers with different video rates This figure shows that the upload capacity can decrease the number of expelled peers but cannot eliminate it Fig 2 shows number of tries where no peers were expelled From this figure, we can conclude that for low average upload capacities the probability of having no expelled peers is approximately zero for random selection and high for priority selection B The Algorithm Our proposed algorithm converts the random selected list to a prioritized one depending on the AS number and the NATing type as in Algorithm 1 The algorithm starts to check the AS number of the new joining peer and chooses all peers from the same AS Subsequently, the algorithm selects the best peers depending on the NATing type If the peer has a disabled UDP configuration, the list will consist of Open Peers only (without NATing) If the peer has a symmetric NATing, the list will consist of Cone NATing as well as Open Peers with higher priority for the former If the peer is restricted (IP or Port), the list will consist of restricted (Port and IP) peers and they will have a higher priority than other types If the peer is opened, the list will consist of any type except open peers The UDP disabled peers in the list will get a higher priority Finally, if the peer is Cone NATed, the list will consist of symmetric and restricted peers only with a higher priority for symmetric ones If the list became full, the streaming provider server will send it If the list did not complete, the streaming server will fill the rest of the list with peers from different AS s after checking their NAT types This solution will increase the ability to find the best neighbors from the first round, which will diminish the playback start time This solution will reduce transit traffic and increase connectivity Unfortunately, the reduction in transit traffic will not offer
4 transit load reduction similar to the reduction of the solutions that depend only on AS-locality awareness but it will reduce the number of expelled peers to the theoretical low boundary and reduces the start up time From [13], we can see that there is a relationship between the location and the NATing distribution This can lead to reduction of peers conductivities under AS-locality awareness in some locations or domains and to an increasing in others Considering NATing as a parameter when construct the neighbor list, will allow the system to have a balanced peers connectivity in all domains Algorithm 1 The Theocratical upper bound algorithm for Kicked Peers P (i): Peer with i NATing type R: Video Rate in Kbps U p(i) : upload capacity of a Peer with NATing type i i: NATing configuration 1=open, 2=port restricted, 3=symetric, 4=UDP disabled K: Number of kicked out Peers for all Nodes in the sameas do if ΣU P (1) >= (ΣP (4) R) then K = Available = ΣU p(1) (ΣP (4) R) if (ΣU P (2) + Avalible) >= (ΣP (3) R) then if ΣU P (2) >= (ΣP (3) R) then K = Available = Available+(ΣU p(2) (ΣP (3) R)) else K = Available = (ΣU p(2) +Available) (ΣP (3) R) end if else K = K + ((ΣP (3) R) ΣU p(2) ) end if else K = K + ((ΣP (3) R) ΣU p(2) ) end if end for III THE EXPERIMENT We used NS2 simulator [2] in our experiment A pull-push streaming protocol was employed We used a pull-push system for two reasons: first, tree based system with high streaming rate creates many nodes without children peers Second, the mesh topology is good but it has a huge overhead and as we have recently experienced in the last few years the most wellknown mesh system (coolstreaming) has adopted a pull-push approach called (coolstreaming+) For our comparisons, we have implemented three algorithms to construct the neighbor list: the random, the AS-aware and the NAT aware algorithms In the AS-locality aware algorithm the list is constructed depending on the AS number In NAT aware algorithm, the list s construction depends upon the algorithm that we have discussed in this paper In the next section, we will discuss the streaming protocol that was implemented to be used in NS2 simulator A The Streaming System The streaming system consists of peers and a streaming server When a new peer joins the system, it sends a request to the server which in turn answers with a list consisting of 2-5 peers When the peer receives the list, it sends requests (to obtain the whole sub-streams lists) to the above number of peers If the NATing type between the two peers allows them to connect, the peer then answers with a message that contains the latest sequence number for each sub-stream If the NATing does not allow them to connect, the peer will not answer The peer then selects the parents depending upon the sequence number Subsequently, the peer sends a joining message to these nodes with the sub-stream number If the peer is unable to obtain the whole stream from its connected peers, it will ask for a new list from the server (another round) When the peer receives the streams, it checks the quality of the system every five seconds If the quality of any sub-stream is less compared to others, the peer disconnects the sub-stream and asks for the disconnected sub-stream from another parent If the quality remains the same for three rounds, the peer disconnects the whole stream and asks for a new list from the server B Topology and parameters Four AS s were located and connected to each other via a backbone as in figure 3[6]The number of peers in the first AS is 1, the second 2, the third 3 and the fourth 4, which gives 1 peers in total The effective upload capacity of these peers was chosen based upon a normal distribution from 12 to 65 Kbps The NAT configuration we used in our simulation was similar to the one in [11] Five hundred peers tried to join the system in the first second After 1 minute the remaining peers connect The rest of simulation parameters can be found in table II AS 1 1 Peers AS 3 4 Peers Inter-connection Streaming Server Fig 3 AS 2 2 Peers AS 4 3 Peers Simulation Topology In the second configuration we changed the upper boundary of the upload speed from 65 to 1 kbps We kept the rest of the parameters as before IV RESULTS The performance metric we used is divided into two categories One category is for ISP Measurement while the second one pertains to the P2P system Number of connected peers,
5 TABLE II SIMULATION PARAMETERS Definition Value Routers 2 PoPs 4 Video Rate (R) 5Kbps Peer 1 Video Duration 5 min Sub-Streams 1 Channels 1 Server BW 45Kbps playback start time including its Stability and the number of join messages are the metrics to measure the effects of P2P systems Transit in, out and the number of exchanged packets in the same domain are the metrics to measure the load on the Internet Service Provider The number of connected peers at the theoretical upper and lower boundaries was counted The connected peers were measured using the simulation and the boundaries were computed using the algorithm as in Fig 4 In these figure we can observe that the theoretical lower number of kicked out peers is 2% for both the random and the AS-aware algorithms and 22% for the NAT-aware algorithm We can observe in the figure that the practical number of kicked out peers in the NAT aware algorithm is 265% which is close to the theoretical boundary For the algorithm the expelled peers percentage is 368% and for the upper boundary it is 467% which shows that 368% is in the middle between the two boundaries In the AS-aware algorithm the number of expelled peers produced the highest value of 544% which is very close to the upper boundary of 56% Avg Numbr of connected Peers (%) High Boundary Number of Connected Peers Low Boundary Neighbor List Construction Algorithms Fig 4 Avg Number of connected Peers In Fig 5, we measured the effects that pertain to the second AS which has 2 peers From this figure we can conclude that the decreasing of transit traffic in, out and the maximum number of exchange packets in the domain is the optimum for the AS-aware algorithm For the NAT-aware algorithm, the reduction is higher than the Algorithm but it is higher than the Locality Aware one The AS aware reduced of the transit traffic by 54% but for the algorithm the corresponding reduction was 35% and this represent a tradeoff between both algorithms Avg throughput "MB" Transit In In Domain Exchanging Transit Out Neighbor List Contruction Algorithms Fig 5 Effects on ISPs Fig 6, shows the playback start time of the peers From this figure we can observe the stability of the system with the NAT-aware algorithm Stability here means that all peers playback start time is around the average playback start time In the figure the scattered points of both the random and the AS aware algorithms show that our algorithm is more stable than both of them In the figure we used 1 as start time for nodes that tried all the simulation times to connect but they failed to do so CDF As Aware Playback Delay (S) Fig 6 Stability of the Algorithms As we said before, upload speed is one of the constraints that we discovered Therefore, we changed the range of the upload speed and measure the number of kicked out peers, start up time and the average number of join messages Fig 7, shows the number of connected peers against upload speed As we can observe, with the increasing of upload speed the number of connected peers also increases but we did not reach 1% and as before, the AS-aware algorithm obtained the lowest connectivity of the three algorithms We also can observe that with our algorithm a higher number of connected peers can be found even with less upload capacity of the peers Fig 8 shows the average start up time of the whole system Without doubt our protocol has the lowest average upload time for two reasons, first less number of rounds to connect as we will observe in Fig 9 Secondly, NAT-aware algorithm build a full useful list not like the other algorithms which send a list
6 Percentage of Connected Peers Avg Playback delay (S) Fig 7 Effects of upload speed Fig 8 Avg Start-up Time of the Whole System with percentage of useful peers Fig 9, shows the average number of rounds that peers need to join the system By reducing this number we are decreasing the playback start time and the overhead of the system Our algorithm has decreased the average join messages but this number increased with the reduction of the upload speed Most of the peers in our system uses only one round Peers that did not connect to the system have increased this number which in turn increased the average number Avg # of Join Messages Sent from Peers Fig 9 Avg number of Join Messages Fig 1, shows the average playback start time of nodes with UDP Disabled NATing We can observe that the and the algorithms did not reduce or even effect the playback start time of peers with these NATing configurations Another misleading conclusion than can be obtain from this figure is that the playback start-up time decreases when the average upload rate decreases This reduction in playback startup occurs because the number of connected peers that have been expelled from the system increases with the reduction of average upload speed This lead to only few connected peers of this type that connected in the beginning Avg Playback Start up Time (S) Fig 1 Avg Playback tart-up time of Peers with UDP-disabled NATing Fig11 shows the average playback start-up time of symmetric Nating This figure demonstrate that our algorithm can reduce this start-up time more efficient than AS aware and random algorithms Another observation can be concluded from Fig11 and 1 that the start-up time of symmetric NATing peers is less than UDP disabled NAting peers even when we use our algorithm The reasons behind this are: first Symmetric NATing can connect with two types of NATing unlike UDP Disabled only one Secondly the percentage of Port Restricted NATing is higher than Open NATing Our algorithm tried to keep the average playback start time close as possible to the average start up time of the network Avg Playback Strat up Time (S) Fig 11 Avg Playback tart-up time of Peers with Symmetric NATing V CONCLUSION AND FUTURE WORK NATing can make it difficult, if not impossible, for peers to connect to each other In live streaming systems, peers can be expelled as a result
7 Locality aware solutions replace the random peer list with a selection mechanism that depends on the AS number of the peers when constructing neighbor lists In this paper, we have shown that the AS-aware algorithm can provide benefits to ISPs and harm P2P live streaming system AS-aware algorithm can satisfy ISPs need for reducing inter/intra-domain traffic with no benefits for P2P live streaming systems, when it is used with a high average upload capacity We also showed that in any live streaming network there is a high probability that peers will be expelled We introduced theoretical upper and lower boundaries for the number of expelled peers We also proposed a novel and easy method to implement a selection algorithm to build a non-random peer list that reduces transit traffic, increases peer connectivity and diminishes playback start-up time Our proposal tries to keep the number of expelled peers as close as possible to the lower boundary We found that neighbor selection algorithms that are dependent upon AS numbers are not enough for P2P live streaming systems Our simulation study also shows that there is a trade-off between the reduction in transit in the network and the number of connected peers Our algorithm reduced transit traffic but not to the extent achieved by the AS aware algorithm We can conclude that these solutions have limits in order to keep both P2P providers and ISPs satisfied ACKNOWLEDGEMENT This work has been in part supported by the NSFC under Grant No and the Technology Support Plan of the National Twelfth Five-Year-Plan of China under Grant No 211BAK8B1 REFERENCES [1] K Kerpez, Bandwidth Reduction via Localized Peer-to-Peer (P2P) Video, OFC, 29 [2] V Hilt, I Rimac, M Tomsu, and E Marocco, A survey of research on the application-layer traffic optimization problem and the need for layer cooperation, IEEE Communications Magazine, august 29 [3] X Weng, Y Hongliang, S Guangyu, C Jian, W Xu, S Jing, and Z Weimin, Understanding Locality-Awareness in Peer-to-Peer Systems, in IEEE ICPP, 28 [4] H Xie, Y R Yang, A Krishnamurthy, Y G Liu, and A Silberschatz, P4P: provider portal for applications, in ACM SIGCOMM, 28 [5] C David and B Fabián, Taming the Torrent: a practical approach to reducing cross-isp traffic in Peer-to-Peer systems, in ACM SIGCOMM, August 28 [6] Lehrieder, F Oechsner, S Hossfeld, T Despotovic, Z Kellerer, and M W Michel, Can P2P-users benefit from locality-awareness? in IEEE P2P, Aug 21 [7] IETF, China telecom ALTO/P4P trial, 29, [8] I Beijnum, IPv4 Address Consumption, The Internet Protocol Journal, 27 [9] M Cadaco and MFreedman, Illuminati Opportunistic Network and Web Measurement, Sep 27, [1] H Chang, S Jamin, and W Wang, Live Streaming Performance of the Zattoo Network, in ACM IMC, 29 [11] K Shami, D Magoni, H Chang, W Wang, and J S, Impacts of Peer Characteristics on P2PTV Networks Scalability, in IEEE INFOCOM, 29 [12] Y Huang, T Z Fu, D-M Chiu, J C Lui, and C Huang, Challenges, design and analysis of a large-scale P2P-VoD system, in ACM SIG- COMM, August 28 [13] L D Acunto, J Pouwelse, and H Sips, A measurement of NAT and firewall characteristics in peer-to-peer systems, in Proc 15-th ASCI Conference, June 29 [14] B Ford, P Srisuresh, and D Kegel, Peer-to-Peer communication across network address translators, ATEC, 25 [15] X WANG and Q DENG, VIP : A P2P communication platform for NAT traversal, in Parallel and distributed processing and applications International symposium No3, Nov 25 [16] S Ren, L Guo, and X Zhang, ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP, in IEEE ICDCS, 26 [17] W Kho, S Baset, and H Schulzrinne, Skype relay calls: Measurements and experiments, in IEEE INFOCOM Workshops, Apr 28 [18] R Cuevas, A Cuevas, A Cabellos-Aparicio, L Jakab, and C Guerrero, A collaborative P2P scheme for NAT Traversal Server discovery based on topological information, Comput Netw, August 21 [19] Y Liu and J Pan, The impact of NAT on BitTorrent-like P2P systems, in IEEE P2P, Sept 29 [2] Network Simulator (NS2),
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration ABSTRACT Mohammad Z. M. Masoud Huazhong University of Science and Technology, Wuhan, China NAT has been design to work with
More informationOn Feasibility of P2P Traffic Control through Network Performance Manipulation
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE On Feasibility of P2P Traffic Control through Network Performance Manipulation HyunYong Lee Masahiro Yoshida
More informationOn Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services
On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement
More informationA Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem
A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem draft-rimac-p2prg-alto-survey-00 Marco Tomsu, Ivica Rimac, Volker Hilt, Vijay Gurbani, Enrico Marocco 75 th IETF Meeting,
More informationALTO Problem Statement
ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting Outline History The problem Main issues Use cases The cache location sub-problem Internet
More informationA Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems
2013 Third International Conference on Intelligent System Design and Engineering Applications A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems Liu Guanxiu, Ye Suqi, Huang Xinli Department
More informationEnhancing Downloading Time By Using Content Distribution Algorithm
RESEARCH ARTICLE OPEN ACCESS Enhancing Downloading Time By Using Content Distribution Algorithm VILSA V S Department of Computer Science and Technology TKM Institute of Technology, Kollam, Kerala Mailid-vilsavijay@gmail.com
More informationOctoshape. Commercial hosting not cable to home, founded 2003
Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server
More informationUnderstanding the effect of streaming overlay construction on AS level traffic
Understanding the effect of streaming overlay construction on AS level traffic Reza Motamedi and Reza Rejaie Information and Computer Science Department University of Oregon e-mail: {reza.motamedi,reza}@cs.uoregon.edu
More informationSECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM
ABSTRACT: SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM J.Priyanka 1, P.Rajeswari 2 II-M.E(CS) 1, H.O.D / ECE 2, Dhanalakshmi Srinivasan Engineering College, Perambalur. Recent years have witnessed
More informationChunk Scheduling Strategies In Peer to Peer System-A Review
Chunk Scheduling Strategies In Peer to Peer System-A Review Sanu C, Deepa S S Abstract Peer-to-peer ( P2P) s t r e a m i n g systems have become popular in recent years. Several peer- to-peer systems for
More informationExperimental Study of Skype. Skype Peer-to-Peer VoIP System
An Experimental Study of the Skype Peer-to-Peer VoIP System Saikat Guha (Cornell) Neil Daswani (Google) Ravi Jain (Google) IPTPS 2006 About Skype Voice over IP (VoIP) 50 million users Valued at $2.6 billion
More informationA Collaborative P2P Scheme for NAT Traversal Server Discovery based on Topological Information
A Collaborative P2P Scheme for NAT Traversal Server Discovery based on Topological Information Rubén Cuevas a, Ángel Cuevas a Albert Cabellos-Aparicio b Loránd Jakab b Carmen Guerrero a a Universidad Carlos
More informationPage 14:, this requires some special protocols like Universal Plug and Play (UPnP) to be
Page 6:..., as well as the correlation between the two...., as well as the relationship between the two. Page 9: in the design and enhancement of peer-to-peer video streaming system in the design and enhancement
More informationA Proposed Peer Selection Algorithm for Transmission Scheduling in P2P-VOD Systems
A Proposed Peer Selection Algorithm for Transmission Scheduling in P2P-VOD Systems Hatem Fetoh Department of Information Technology Faculty of Computers and Information Mansoura University, Egypt Waleed
More informationPitfalls for ISP-friendly P2P design. Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD
Pitfalls for ISP-friendly P2P design Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD P2P & ISPs P2P systems: Large volume of traffic (20 80% of total)
More informationInternet Networking recitation #
recitation # UDP NAT Traversal Winter Semester 2013, Dept. of Computer Science, Technion 1 UDP NAT Traversal problems 2 A sender from the internet can't pass a packet through a NAT to a destination host.
More informationPeer-to-Peer Streaming Systems. Behzad Akbari
Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues
More informationBroadcast Routing. Chapter 5 Multicast and P2P. In-network Duplication. Spanning Tree
Chapter 5 Multicast and PP Broadcast Routing Deliver packets from source to all other nodes Source duplication is inefficient: A note on the use of these ppt slides: All material copyright 996-7 J.F Kurose
More informationA Scheme of Multi-path Adaptive Load Balancing in MANETs
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication
More informationCOOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System
COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System Ubaid Abbasi and Toufik Ahmed CNRS abri ab. University of Bordeaux 1 351 Cours de la ibération, Talence Cedex 33405 France {abbasi,
More informationAn Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs
An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,
More informationTowards Low-Redundancy Push-Pull P2P Live Streaming
Towards Low-Redundancy Push-Pull P2P Live Streaming Zhenjiang Li, Yao Yu, Xiaojun Hei and Danny H.K. Tsang Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
More informationAn Empirical Study of Flash Crowd Dynamics in a P2P-based Live Video Streaming System
An Empirical Study of Flash Crowd Dynamics in a P2P-based Live Video Streaming System Bo Li,GabrielY.Keung,SusuXie,Fangming Liu,YeSun and Hao Yin Hong Kong University of Science and Technology Tsinghua
More informationResearch Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network
Research Journal of Applied Sciences, Engineering and Technology 7(2): 221-226, 2014 DOI:10.19026/rjaset.7.244 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: March
More informationThe hidden locality in swarms
The hidden locality in swarms John S. Otto and Fabián E. Bustamante Northwestern University {jotto,fabianb}@eecs.northwestern.edu Abstract People use P2P systems such as BitTorrent to share an unprecedented
More informationCache Capacity Allocation to Overlay Swarms
Cache Capacity Allocation to Overlay Swarms Ioanna Papafili 1, George D. Stamoulis 1, Frank Lehrieder 2, Benjamin Kleine 2, Simon Oechsner 2, 1 Athens University of Economics and Business, Athens, Greece
More informationMax-1: Algorithm for Constructing Tree Topology for heterogeneous networks for Peer-To-Peer Live Video Streaming
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:04 14 : Algorithm for Constructing Topology for heterogeneous networks for Peer-To-Peer Live Video Streaming Ammar Waysi AlTuhafi
More informationCourse Routing Classification Properties Routing Protocols 1/39
Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent
More informationPredicting connection quality in peer-to-peer real-time video streaming systems
Predicting connection quality in peer-to-peer real-time video streaming systems Alex Giladi Jeonghun Noh Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,
More informationCollaborative Multi-Source Scheme for Multimedia Content Distribution
Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx
More informationNode selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth
American Journal of Networks and Communications 2013; 2(2): 40-46 Published online June 10, 2013 (http://www.sciencepublishinggroup.com/j/ajnc) doi: 10.11648/j.ajnc.20130202.13 Node selection in Peer-to-Peer
More informationA Streaming Method with Trick Play on Time Division based Multicast
A Streaming Method with Trick Play on Time Division based Yoshitaka Nakamura, Kazuki Murakoshi Yoh Shiraishi and Osamu Takahashi School of Systems Information Science, Future University Hakodate, Japan
More informationPerformance analysis of optimization techniques in peer-to-peer video streaming systems with tree/forest topology
2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) Performance analysis of optimization techniques in peer-to-peer video streaming systems with tree/forest
More informationOptimal Cache Allocation for Content-Centric Networking
Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,
More informationENERGY-EFFICIENT PROTOCOL IN OMNET++ SIMULATION ENVIRONMENT. Krzysztof Daniluk
159 ENERGY-EFFICIENT PROTOCOL IN OMNET++ SIMULATION ENVIRONMENT Krzysztof Daniluk Abstract: New idea for energy-efficient extension for OSPF protocol is presented. New concept is based on Dijkstra s algorithm,
More informationSkype Video Responsiveness to Bandwidth Variations
Skype Video Responsiveness to Bandwidth Variations L. De Cicco,, V. Palmisano Dipartimento di Elettronica ed Elettrotecnica Politecnico di Bari Italy -1- Motivation 1/2 Multimedia real-time applications
More informationPacket Classification Using Dynamically Generated Decision Trees
1 Packet Classification Using Dynamically Generated Decision Trees Yu-Chieh Cheng, Pi-Chung Wang Abstract Binary Search on Levels (BSOL) is a decision-tree algorithm for packet classification with superior
More informationOn the Applicability of knowledge based NAT-Traversal for Home Networks
On the Applicability of knowledge based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany
More informationScaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks
1896 1920 1987 2006 Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks Ying Cui Shanghai Jiao Tong University, Shanghai, China Joint work with Fan Lai, Feng Qiu, Wenjie
More informationThe Novel HWN on MANET Cellular networks using QoS & QOD
The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.
More informationOn the Applicability of Knowledge Based NAT-Traversal for Home Networks
On the Applicability of Knowledge Based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany
More informationSurveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web
Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306
More informationDelft University of Technology Parallel and Distributed Systems Report Series
Delft University of Technology Parallel and Distributed Systems Report Series Modeling and Analyzing the Effects of Firewalls and NATs in P2P Swarming Systems Lucia D Acunto, Michel Meulpolder, Rameez
More informationA Data Storage Mechanism for P2P VoD based on Multi-Channel Overlay*
A Data Storage Mechanism for P2P VoD based on Multi-Channel Overlay* Xiaofei Liao, Hao Wang, Song Wu, Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer
More informationMultimedia Streaming. Mike Zink
Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=
More informationContent Distribution and BitTorrent [Based on slides by Cosmin Arad]
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying
More informationA ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China
More informationService Quality Assurance Mechanisms for P2P SIP VoIP
Service Quality Assurance Mechanisms for P2P SIP VoIP Xiaofei Liao, Fengjiang Guo, and Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and
More informationQoE-aware Traffic Shaping for HTTP Adaptive Streaming
, pp.33-44 http://dx.doi.org/10.14257/ijmue.2014.9.2.04 QoE-aware Traffic Shaping for HTTP Adaptive Streaming Xinying Liu 1 and Aidong Men 2 1,2 Beijing University of Posts and Telecommunications No.10
More informationTracker-based Peer Selection using ALTO Map Information
Tracker-based Peer Selection using ALTO Map Information draft-yang-tracker-peer-selection-00 Y. Richard Yang Richard Alimi, Ye Wang, David Zhang, Kai Lee Challenges Tracker Scalability Many peers distributed
More informationNetwork Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example
Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying
More informationEncouraging bandwidth efficiency for peer-to-peer applications
Encouraging bandwidth efficiency for peer-to-peer applications Henning Schulzrinne Dept. of Computer Science Columbia University New York, NY P2Pi Workshop Overview Video bandwidth consumption Cost of
More informationImprovement of Buffer Scheme for Delay Tolerant Networks
Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science
More informationDynamic Routing Tables Using Simple Balanced. Search Trees
Dynamic Routing Tables Using Simple Balanced Search Trees Y.-K. Chang and Y.-C. Lin Department of Computer Science and Information Engineering National Cheng Kung University Tainan, Taiwan R.O.C. ykchang@mail.ncku.edu.tw
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 173 A Review of Various Approaches to Multipath Routing Maryada M.Tech. Student, Department of Computer Science
More informationRouting Basics. What is Routing? Routing Components. Path Determination CHAPTER
CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role
More informationTO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL
TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING Seyed Mehran Ronaghi 1 and Behzad Akbari 2 1 Department of Electrical and Computer Engineering, Qazvin Islamic Azad University, Qazvin,
More informationEnabling Cooperation between ISPs and P2P Systems toward IPTV Service Delivery
Enabling Cooperation between ISPs and P2P Systems toward IPTV Service Delivery Mubashar Mushtaq 1,2 and Toufik Ahmed 1 1 CNRS LaBRI Lab. University of Bordeaux, 351, Cours de la Libération, Talence, 33405,
More informationScalability And The Bandwidth Efficiency Of Vod Systems K.Deepathilak et al.,
Asian Journal of Electrical Sciences (AJES) Vol.3.No.1 2015 pp 33-37. available at: www.goniv.com Paper Received :08-03-2015 Paper Accepted:20-03-2015 Paper Reviewed by: 1. R. Venkatakrishnan 2. R. Marimuthu
More informationA Top Catching Scheme Consistency Controlling in Hybrid P2P Network
A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),
More informationAdvanced Computer Networks
Advanced Computer Networks VoIP Jianping Pan Summer 2007 6/6/07 csc485b/586b/seng480b 1 Feedback on reading & summaries Be aware of deadlines the day before the presentation Read papers not someone else's
More informationAn Efficient NAT Traversal for SIP and Its Associated Media sessions
An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationEARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.
: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department
More informationInterdomain Routing Design for MobilityFirst
Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network
More informationArchitecture for Cooperative Prefetching in P2P Video-on- Demand System
Architecture for Cooperative Prefetching in P2P Video-on- Demand System Ubaid Abbasi and Toufik Ahmed CNRS LaBRI Lab. University of Bordeaux, France 351, Cours de la Libération Talence Cedex, France {abbasi,
More informationPush pull techniques in peer-to-peer video streaming systems with tree/forest topology
2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) Push pull techniques in peer-to-peer video streaming systems with tree/forest topology Paolo Giacomazzi,
More informationIs IPv4 Sufficient for Another 30 Years?
Is IPv4 Sufficient for Another 30 Years? October 7, 2004 Abstract TCP/IP was developed 30 years ago. It has been successful over the past 30 years, until recently when its limitation started emerging.
More informationComputer Science 461 Final Exam May 22, :30-3:30pm
NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge
More informationAN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS
AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS Shaikh Shariful Habib Assistant Professor, Computer Science & Engineering department International Islamic University Chittagong Bangladesh
More informationA Super-Peer Selection Strategy for Peer-to-Peer Systems
, pp.25-29 http://dx.doi.org/10.14257/astl.2016.125.05 A Super-Peer Selection Strategy for Peer-to-Peer Systems Won-Ho Chung 1 1 Department of Digital Media, Duksung Womens University whchung@duksung.ac.kr
More informationRouting and Channel Assignment for Multicast in Multi- Channel Multi-Radio Wireless Mesh Networks
Routing and Channel Assignment for Multicast in Multi- Channel Multi-Radio Wireless Mesh Networks Wen-Xiao Shi, Ke-Qiang Cui, and Yuan Chai College of Communication Engineering, Jilin University, Changchun,
More informationJoint Optimization of Content Replication and Server Selection for Video-On-Demand
Joint Optimization of Content Replication and Server Selection for Video-On-Demand Huan Huang Pengye Xia S.-H. Gary Chan Department of Compute Science and Engineering The Hong Kong University of Science
More informationPeer-to-Peer Media Streaming
SEMINAR: RECHNERNETZE UND VERTEILTE SYSTEME HS08 Peer-to-Peer Media Streaming Francisco Piña Garrido University Jaen (Spain) November 26th, 2008 Overview > Introduction Definition of Peer to Peer Streaming
More informationA Joint Replication-Migration-based Routing in Delay Tolerant Networks
A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West
More informationA Tale of Three CDNs
A Tale of Three CDNs An Active Measurement Study of Hulu and Its CDNs Vijay K Adhikari 1, Yang Guo 2, Fang Hao 2, Volker Hilt 2, and Zhi-Li Zhang 1 1 University of Minnesota - Twin Cities 2 Bell Labs,
More informationStochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems
Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems Fan Bin Dah-Ming Chiu John C.S. Lui Abstract In this paper, we present the mathematical analysis of two important
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationFor layered video encoding, video sequence is encoded into a base layer bitstream and one (or more) enhancement layer bit-stream(s).
3rd International Conference on Multimedia Technology(ICMT 2013) Video Standard Compliant Layered P2P Streaming Man Yau Chiu 1, Kangheng Wu 1, Zhibin Lei 1 and Dah Ming Chiu 2 Abstract. Peer-to-peer (P2P)
More informationLoad Balancing the Network Traffic in the N th Mode of IPtables
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationEfficiency of Data Distribution in BitTorrent-Like Systems
Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department
More informationMEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST
International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250 1568 Vol.2, Issue 2 June 2012 72-78 TJPRC Pvt. Ltd., MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST
More informationAn Efficient Algorithm for AS Path Inferring
An Efficient Algorithm for AS Path Inferring Yang Guoqiang and Dou Wenhua National Univernity of Defence Technololy, China yanggq@nudt.edu.cn Abstract Discovering the AS paths between two ASes are invaluable
More informationDiagnosing Network-wide P2P Live Streaming Inefficiencies
Diagnosing Network-wide P2P Live Streaming Inefficiencies Chuan Wu Baochun Li Shuqiao Zhao Department of Computer Science Dept. of Electrical and Computer Engineering Multimedia Development Group The University
More informationElimination Of Redundant Data using user Centric Data in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant
More informationReversing Ticket Based Probing Routing Protocol for MANET
Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationPeer-to-Peer (P2P) Architectures
Peer-to-Peer (P2P) Architectures ECE/CS 658 Internet Engineering Dilum Bandara dilumb@engr.colostate.edu Outline Background Unstructured P2P Napster, Gnutella, & BitTorrent Structured P2P Chord & Kademlia
More informationDesign and Implementation of an Anycast Efficient QoS Routing on OSPFv3
Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University
More informationMaster s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems
Master s Thesis Title A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Supervisor Professor Masayuki Murata Author Hideto Horiuchi February 14th, 2007 Department
More informationSOLVING NETWORK TESTBED MAPPING PROBLEM WITH GENETIC ALGORITHM
SOLVING NETWORK TESTBED MAPPING PROBLEM WITH GENETIC ALGORITHM Yi Liu, Kaiping Xiao and Yanping Li Department of Computer, Xi'an Jiaotong University, Xi'an, Shannxi, 710049, China E-mail: Liuyi97@263.net
More informationMulticast Technology White Paper
Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationUsing Orthogonal Channels for Supporting Multicast Service in Multi-channel Wireless Mesh Networks
Using Orthogonal Channels for Supporting Multicast Service in Multi-channel Wireless Mesh Networks ABSTRACT Abbas Nargesi 1 and Mehdi Ghasemi 2 1 Department of IT Engineering, Azad University, Qazvin,
More informationMarkov Model Based Congestion Control for TCP
Markov Model Based Congestion Control for TCP Shan Suthaharan University of North Carolina at Greensboro, Greensboro, NC 27402, USA ssuthaharan@uncg.edu Abstract The Random Early Detection (RED) scheme
More informationarxiv:cs/ v4 [cs.ni] 19 Apr 2007
P2P IPTV Measurement: A Comparison Study Thomas Silverston and Olivier Fourmaux arxiv:cs/633v4 [cs.ni] 9 Apr 27 Université Pierre et Marie Curie - Paris 6 4 avenue du Président Kennedy, 756 Paris, France
More informationOverlay Networks for Multimedia Contents Distribution
Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)
More information