Source vs Data-driven Approach for Live P2P Streaming

Size: px
Start display at page:

Download "Source vs Data-driven Approach for Live P2P Streaming"

Transcription

1 Source vs Data-driven Approach for Live P2P Streaming Thomas Silverston and Olivier Fourmaux Université Pierre et Marie Curie-Paris6 Laboratoire d Informatique de Paris 6 8 rue du Capitaine Scott 7515 Paris, France {Thomas.Silverston, Olivier.Fourmaux}@lip6.fr Abstract Live streaming applications are increasing on the Internet. These applications are delay sensitive and need group communication. Presently, protocols designed for this kind of communication do not rely on the classical client/server model used in the Internet but organize the receivers into an overlay network, where they are supposed to collaborate with each other following the peer-to-peer model. Live p2p streaming protocols can be classified in three different categories: source-driven, receiver-driven and datadriven protocols. Each of them manages the overlay differently. In this paper we compare them by simulation to specify what is the most appropriate approach for these protocols. We implement a new simulator of p2p network and we choose two well-known protocols for simulations: a sourcedriven and a data-driven protocol. To our knowledge, our works are the first to compare with the same simulator and scenarii different approaches for live p2p streaming. Our simulations show that nodes organization on the overlay influences drastically network global performances, and data-driven approach seems to be the most appropriate approach for these protocols because it is less sensitive to dynamicity of nodes which is the main problem to resolve for these applications. 1. Introduction Success of the Internet generated deep changes in its use. As its number of users increases, new applications appeared and contributed to accelerate its development. For example, web and more recently p2p file sharing applications. Nowadays, a new kind of application is getting success: live p2p streaming application like TVs or radios on the Internet. They target a lot of people therefore they need group communication functionalities. Moreover, streaming applications are delay sensitive and consume many resources thus they need mechanisms to manage resources. Opposite to client/server model usually used in the Internet in which roles of participants are clearly separated between users, which receive content, and server, which provides it, in p2p model, roles of participants are not clearly defined: each of them can be client, server, or client and server at the same time and then all entities collaborate with each other. Compare with client/server model, p2p model allows a more efficient data diffusion because content can be found in more than one point of the network. Thus, it is not only one server which shares its resources (bandwidth, processing time) but all receivers to allow the broadcast. Originally, the Internet is designed for point-to-point communication. However, new applications involve the need for the Internet to have group communication mechanisms (point-to-multipoint). Group communication requires to duplicate all packets to receivers. A first proposal was to implement these mechanisms on the network layer. The advantage of this solution is to not overload networks links. However this solution has been slowed down for several reasons ([9]). Group communication of network layer requires routers to maintain state for group, that means that the core of the Internet must do complex tasks, which goes against the driving principles of the Internet: intelligence in the edge of the network and simplicity in the core of the network. Moreover, Internet providers prevent uncontrolled group communication because they could not forecast the traffic in their network. Another solution for group communication is to implement these functionalities on the edge of the network, i.e. in the hosts. In this case, hosts themselves duplicate packets to other hosts. This is called applicative multicast because group communication functionalities are implemented to the applicative layer. This solution is flexible and easy to deploy and do not require Internet infrastructure modifications. However, packets duplication by the hosts can be a drawback because hosts are not dedicated entities like routers. Routers are entities performing continuing process and are not prone to many breakdowns or failures whereas

2 hosts can be very dynamic: they can join and quit the network whenever they want and can suffer breakdowns or failures. If a host in charge for the duplication of packets to other hosts leaves the network (explicitly or not), it will affect directly the other hosts. Finally, implementation of group communication functionalities into applicative layer is easier to deploy than implementation in network layer but involves another problem to deal with: the dynamicity of the hosts. In live streaming applications, hosts have to reach group communication. Thus, every host considers they are directly connected to some other hosts that constitute its neighborhood. This vision of the network is independent of underlying network topology. Nodes have an abstract, a virtual vision of the network and then organize themselves into an overlay network (figure 1). The objective for the nodes is to organize into an efficient virtual topology (overlay) to diffuse messages to every member of the group. Spanning Tree, mesh or ring are examples of virtual topology. C1 C1 C11 C15 C11 C15 C14 2 C14 C6 C1 C6 1 C5 C1 Overlay Network C5 C4 3 4 C4 Real Network Figure 1. Virtual vision of the network. Nowadays, applications needing group communications implement these functionnalities in the hosts, on the edge of the network. That is why hosts organize themselves into an overlay network. However, application-layer multicast is not performing as well as network layer multicast. Indeed, on the overlay, each host transmits messages to its neighbors therefore only one copy of the message gets across the overlay link but different links on the overlay can rely on the same links in the underlying network. Thus, mechanisms have to be added to allow a better utilization of network resources. Hosts on the overlay have to collaborate for sharing judiciously available resources to reach their objective: group communication for all hosts. It means, hosts can be organized in a collaborative network on the overlay: a p2p overlay network C13 C9 C C9 7 C2 C8 C7 C2 C8 C7 C3 C3 Streaming applications read and decode the stream during their reception. Thus, streaming applications are delay sensitive because packets need to be read in time to ensure a good quality of reception to the user. Moreover, these applications like TVs or radios on the Internet need group communication functionalities because they target a lot of receivers. Streaming applications require to implement all mechanisms previously presented: an overlay to ensure group communication and a p2p network to involve all receivers and their resources in the communication. Protocols for live P2P streaming application can be classified in three categories: source-driven, receiver-driven and data-driven approach. Topologies built in the overlay can be identical but the way to construct them or to use them are different depending on the approach The objective of this work is to specify the better approach to use for live p2p streaming. We choose to implement a new discret event simulator because simulation is an efficient technique to observe global comportment of the protocols. We simulate a source-driven protocol with PeerCast ([6]) and a data-driven protocol with Donet ([21]). These protocols have been chosen because they are representative of the approach they use, and they are very often cited. Moreover these two protocols have already been implemented and used with success on the Internet ([5], [2], [1]). The rest of this paper is organized as follows. Section 2 discusses of the different approaches and related work. Section 3 shows the results of simulations and comparisons between source-driven and data-driven approaches. Finally, we conclude the work in section 4 and present our future work. 2. Related Works Streaming applications target a lot of receivers simultaneously, therefore they need group communication mechanisms. Thus, protocols organize receivers into a p2p overlay network. Each of these protocols can create totally different overlay topology like spanning trees or meshes. However, it is the approach they use to manage the overlay which differentiates them: source-driven, receiver-driven or data-driven approaches Source-driven Approach According to this approach, we differentiate a control plan and a data plan. Data plan is used to send data to all peers whereas control plan is used to manage the group and dynamicity of peers (arrivals and departures). Usually, data plans result from control plans. With Peercast ([6]), control plan is a tree the root of which is the source of the stream, and data plan uses the same tree. Differently, Narada ([8])

3 control plan is a mesh between peers, and data plan is a tree built on top of the mesh, where the root is the source. There are other control plan topologies like Nice ([3]) which defines hierarchical organization of peers into a cluster, and data plan is again a tree built on top of the control plan. Zigzag ([18]) is working like Nice with a clustering control plan and a tree data plan, but seems to improve nodes degree metrics compared to Nice. Bullet ([12]) builds a tree for control plan and data plan but adds some mechanisms which make it less dependent of the overlay topology. For all of these protocols, control plan can be radically different from each other but data plan is always a spanning tree built on top of control plan and where the root is the source. A data plan which is a tree where the root is the source characterizes source-driven approach. Basically, source-driven approach transposes network layer multicast to applicative layer Data-driven Approach Unlike source-driven approach, data-driven approach does not clearly separate control plan and data plan. Group members (peers) exchange control messages about data availability in the network. Each peer chooses itself its neighborhood according to the data it wants ([21], [4], [16], [2]). Protocols like Donet ([21]) use epidemic algorithms and there is not really a control plan or a data plan built in the overlay. Epidemic algorithm is based on the following mechanisms: an entity wishing to send a message to all the other entities, send it to randomly selected entities. These entities send it again randomly to other entities. At the end, this mechanism makes the message possible in order to be transmitted to all receivers without a clearly defined topology built in the overlay. A main difficulty to resolve for group communication implemented at applicative layer is the dynamicity of the hosts. Indeed, it is inconsistent to structure the overlay in a fixed topology if the hosts are very dynamic, because arrivals and departures of hosts can have a deep impact on all the overlay network. That is why data-driven approach, which does not really structure the overlay, could be less sensitive to dynamicity of hosts, and then could be the best approach to use for live p2p streaming protocols Receiver-driven Approach With receiver-driven approach, control plan and data plan are clearly separated similarly to source-driven approach, and control plan can be a tree, a cluster or a mesh. Conversely, with receiver-driven approach, data plan is a tree and it is rooted at the receiver side instead of the source side. The receivers organize resources (peers of the network) as well as they can to obtain the stream ([11]). However, receiver-driven approach is usually related to data encoding like layered coding ([14]) or multiple description coding (MDC, [1]) as in [17], [19], [7], [13]. With layered coding, data is encoded in several layers and it is necessary to receive at least the main layer. The other layers will only improve the quality of reception. With MDC, it is almost like layered coding but it is not necessary to receive a particular layer. For all of these techniques, you have to get the most possible layers to obtain the best quality of reception. An advantage of receiver-driven approach is to authorize limited capacities hosts to take part in the stream broadcast. However, this approach allows -by nature- a not optimal quality of stream reception since a host could only receive a part of the layers. Since we choose to work on the distribution structure of streams, data encoding used by receiverdriven approach could be considered as an optimization for previous approaches. That is why we did not include this approach in our current work yet. 3. Results of Simulations We simulate Donet and three implementations of Peercast (Peercast-C2 building a tree with 2 children per node, Peercast-C3 with 3 children per node and Peercast-C1 with 1 children per node) to estimate their global performances according to different metrics. Then, we could compare them thanks to these metrics. Typically, users of live p2p streaming applications need to receive a stream of good quality, i.e. a continuous stream. In other words, protocols should limit packet losses which happen when clients leave the networks and depending peers have to recover the stream. Since it is about live streaming, protocols should minimize the duration between the moment where the clients enter the network and the moment they receive their first packet of the stream. This is all the more true if a client asks for the stream consequently to departures of peers. Thus, we compare approaches used by these protocols according to 2 important metrics: average time to first packet (t2fp) and data packet losses rate for all the network. For all the simulations, we have some invariants assumptions. We generated a thousand autonomous systems (AS) topology with BRITE ([15]). We choose AS granularity because it is usually the inter-as delays which are more important than intra-as delays where resources are well configured to reach an efficiency routing. The delays used in the topology are close to delays we could find in the Internet. Each client is randomly connected to a topology node. The delay towards the node is fixed at 2ms, as we can observe with residential connexions. Finally, each client enters the network at instant s.

4 3.1. Average Time to First Packet In these simulations we want to know the delays it takes to receive the first packet of the stream according to the protocols and their different implementations. We varied the number of clients from 1 to 1. Each plotted value is an average of a hundred simulation runs. This was done in order to represent the network global behavior. Time to first packet (T2fp) - milliseconds average T2fp - Peercast-C2 average T2fp - Peercast-C3 average T2fp - Peercast-C1 average T2fp - Donet Number of clients in the overlay network Figure 2. Average time to first packet for all simulated protocols Figure 2 resumes the average time to first packet for all the simulated protocols. Average time to first packet for Peercast increases logarithmically with the number of clients. Donet suffers an increase for its average time to first packet and then stabilizes, and stays almost constant with the number of clients. The increase is well identified and is due to our implementation of Donet protocol where deputy clients do not have to perform three requests to get the stream whereas other clients have to ([21]). Firstly, figure 2 shows average time to first packet for Donet is shorter than for Peercast. Secondly, average time to first packet for Peercast is longer for implementations with less children and increases logarithmically. For the three implementations of Peercast, a tree has been built into the overlay and each client should get across the tree to find a peer able to accept it as its child, and we know a tree traversal is logarithmic. However, the more a node accepts children, the more resources it shares with the other peers. With Peercast-C1, shared resources will be more important in the network, therefore a client will have to perform less requests to find a peer able to accept it as its child because the tree will be not as deep. In other words, the average time to first packet will be shorter in a tree where nodes are able to accept the greatest number of children. Finally, Donet has an average time to first packet shorter than all implementations of Peercast. It means Donet is better than Peercast according to this metric. This is due to the approach used with Donet to establish peering relationships. With Donet, clients establish peering relationships with peers randomly obtained from deputy clients. It is more often probable to be redirected towards a peer having still enough resources, contrary to Peercast where a client should meticulously get across all the tree structure of the overlay. Clients in Peercast-C1 network have an average time to first packet shorter than with other Peercast implementations because with Peercast-C1, clients share more resources in the network. However, clients in Donet network have an average time to first packet shorter than clients in Peercast-C1 network although in Donet network, clients share as many resources as clients in Peercast-C1 network. Indeed, with our implementation of Donet, a client can eventually send the stream to ten peers like Peercast- C1. Donet improves the global performances of the network according to this metric. This improvement is due to the approach used by Donet and the randomness provided by epidemic algorithms Distribution of clients in the overlay structure Simulations show distribution of clients according to the distance -in hops- to the source, i.e. according to the level in overlay topology. In this experience, we fixed the number of clients to 1. Each plotted value is an average of a hundred simulation runs. This was done in order to represent the network global behavior. Figure 3(a) shows, with Peercast-C1 that there is a pike of clients at the 3rd and 4th level of the overlay structure, therefore most of the clients are at 3 or 4 hops of the source. Some clients can also be at 7 hops of the source. With Peercast-C3, distribution is more fairly balanced from 4th to 1th level, which corresponds to a distance from 4 to 1 hops from the source. Some clients can eventually be at 15 hops from the source. With Peercast-C2, the distribution seems well balanced from 6th to 14th level and is similar to a Gaussian distribution. Some clients can also reach the 21th level. With Donet, most of the clients are situated between 4th to 1th level as with Peercast-C3 and some clients can also reach the 14th level. For all implementations of Peercast, Peercast-C1 has its clients closer to the source. When a node can accept more children, the tree built in the overlay is not as deep for a same size network. This corroborates the previous observation about average time to first packet. With Peercast-C1, clients are closer to the source in hops, therefore delays and time to first packet are consequently shorter than in all other Peercast implementations. With Donet, clients distribution in the overlay (with regards to the source) seems similar to clients distribution

5 percentage of Clients Peercast-C1 Donet Peercast-C3 Peercast-C2 percentage of data packet losses rate Peercast-C2 Peercast-C3 Peercast-C1 Donet percentage of data packet losses rate Peercast-C2 Peercast-C3 Peercast-C1 Donet Level in the overlay (a) Distribution of clients in the overlay structure number of leaving clients (b) Data packet losses rates according to number of leaving clients Figure 3. Time to first Packet level of departures (c) Data packet losses rates according to leaving level of clients with Peercast-C3. However, average time to first packet for Donet is shorter than for Peercast-C3 (figure 2). Indeed, with Donet, each client gets the first packet with random peering relationships, without any consideration with its direct distance from the source. In a Donet network, a client does not have to get across all the structure to receive the stream. This is due to data-driven approach used by Donet which does not structure the overlay and makes it possible for a client not to depend on the overlay structure Data packet losses rates according to dynamicity of clients In these experiences, we measure the data packet losses rates in all the network in relation to dynamicity of clients. We simulated a one minute long stream, and clients leave explicitly the network during the simulation. We measure data packet losses rates with two sets of simulations: one where we varied the number of leaving clients and one where leaving clients left the network according to their level in the overlay topology. In this experience, we fixed the network size to 1 clients. Each plotted value is an average of ten simulation runs. This was done in order to represent the network global behavior. Clients leave the network after 3s. Figure 3(b) shows data packet losses rates are increasing with the number of client leaving the network. The data packet losses rate of Donet is smaller than data packet losses rates of all Peercast implementations. In addition, the data packet losses rate of Peercast-C1 is smaller than the data packet losses rate of Peercast-C3 which is also smaller to the rate of Peercast-C2. Figure 3(c) shows the Donet data packet losses rate is much smaller than all Peercast losses rates but varie lightly (from.1% to.2%) with leaving level included from 4th to 1th. Peercast losses rates are globally decreasing but at higher rates. This experience shows, leaving levels have not the same effect with Donet and PeerCast. In Donet network (figure 3(b)), clients get a set of randomly chosen peers to establish peering relationships and continue to discover other peers during all the streaming duration. If a peer leaves the network, affected peers already know other peers to recover the stream and do not suffer many data packet losses. With Peercast, clients are redirected in the structure and have to get across the structure again to find a peer able to accept them. It can be quite long and causes many data packet losses, particularly if a client has to get across the entire overlay structure. In a Donet network, if all peers known by a client have left the network, the client has to restart a complete join procedure. We observed previously (figure 2), average time to first packet of Donet is shorter than with Peercast, therefore clients in Donet network will not suffer as many losses as in Peercast network. With Donet, the variation between 4th and 1th level comes from the distribution of clients which are mainly distributed within these levels (figure 3(a)). The increase is due to the number of leaving clients but not the level of leaving clients. With Peercast, the overlay topology is a tree and there is less clients at smaller levels than at higher levels. Nevertheless, data packet losses rates are more important at smaller level than at higher level. In other words, for Donet, if the leaving level is densely populated (there are a lot of client in the leaving level), Donet network will suffer a relatively high data packet losses rate whereas for Peercast, leaving levels close to the source will cause many data packet losses although these levels are sparsely populated. With Peercast, topologies are rigorously structured in a tree, and downstream clients depend directly on upstream clients. Thanks to data-driven approach, Donet does not structure the overlay, and departures of nodes have only local effects and there are no dependencies between levels in its overlay topology. For all simulations, we observe that the Donet data packet losses rate is smaller than all Peercast data packet losses rates. According to this metric, Donet is better than Peercast. Donet resists to massive departures of clients

6 thanks to redundancy informations about other peers and makes the clients not depending on the overlay structure with random mechanisms. As informations redundancy and randomness are mechanisms provided by the approach used by Donet, this is clearly data-driven approach which allows Donet to exceed source-driven approach used by Peercast. 4. Conclusion Live p2p streaming applications are increasing on the Internet. They have an inconsistent use of the Internet because the Internet provides a best effort service whereas these applications are delay sensitive. Protocols used by these applications have to be well designed, so that users receive stream with required properties and network resources are optimised. From our works, we note p2p live streaming protocols can use several different approaches to manage the overlay and it influences drastically the network global performances of the network. We compared two main approaches with our simulator according to two important metrics: average time to first packet and data packet losses rates. The simulations results allow us to conclude that datadriven approach is better than source-driven approach. Indeed, p2p live streaming protocols require group communications functionnalities which have to be implemented at the hosts, but hosts can be very dynamic on the Internet. Data-driven approach, thanks to epidemic algorithms, does not structure the clients in the overlay and uses random mechanisms and redundant informations which prevent and anticipate the effects of the dynamicity of the clients. That is why data-driven approach seems to be the best approach to use for this kind of communication. Our present works turn toward improving simulated scenarii through more realistic network parameters and topologies. Thus we could obtain a better model to appreciate the impact of data-driven p2p live streaming applications on the hosts and the network itself. We are studying the traffic of recent streaming p2p applications and particularly applications using data-driven approach to get the finest evaluation of data transmitted. Moreover, we want to evaluate several aspects related to the data-driven approach and precisely its scalability since this approach adds redundant informations in the network. References [1] [2] [3] S. Banerjee, B. Bhattacharjee, and C. Kommareddy. Scalable application layer multicast. In SIGCOMM 2: Proceedings of the 22 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, 22. ACM Press. [4] S. Banerjee, S. Lee, B. Bhattacharjee, and A. Srinivasan. Resilient multicast using overlays. In SIGMETRICS 3: Proceedings of the 23 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages , New York, NY, USA, 23. ACM Press. [5] M. Bawa, H. Deshpande, and H. Garcia-Molina. Streaming live media over peers. In Technical Report, 22. [6] M. Bawa, H. Deshpande, and H. Garcia-Molina. Transience of peers & streaming media. SIGCOMM Comput. Commun. Rev., 33(1):17 112, 23. [7] M. Castro, P. Druschel, A.-M. Kermarrec, A. Nandi, A. I. T. Rowstron, and A. Singh. Splitstream: High-bandwidth content distribution in cooperative environments. In IPTPS, pages , 23. [8] Y.-H. Chu, S. G. Rao, and H. Zhang. A case for end system multicast. In Measurement and Modeling of Computer Systems, pages 1 12, 2. [9] C. Diot, B. N. Levine, B. Lyles, H. Kassem, and D. Balensiefen. Deployment issues for the IP multicast service and architecture. IEEE Network, 14(1):78 88, / 2. [1] V. K. Goyal. Multiple description coding: Compression meets the network. IEEE Signal Processing Magazine, 18(5):74 93, September 21. [11] M. Hefeeda, A. Habib, B. Boyan, D. Xu, and B. Bhargava. PROMISE: peer-to-peer media streaming using CollectCast. In MM 3, 23. [12] D. Kostic, A. Rodriguez, J. Albrecht, and A. Vahdat. Bullet: High bandwidth data dissemination using an overlay mesh. In Proc ACM SOSP., 23. [13] J. Li. Peerstreaming: A practical receiver-driven peer-topeer media streaming system. In MSR-TR-24-11, 24. [14] S. McCanne, V. Jacobson, and M. Vetterli. Receiver-driven layered multicast. In ACM SIGCOMM, volume 26,4, pages , New York, Aug ACM Press. [15] A. Medina, A. Lakhina, I. Matta, and J. Byers. BRITE: An approach to universal topology generation. In Proc. ACM Mascots, 21. [16] V. S. Pai, K. Kumar, K. Tamilmani, V. Sambamurthy, and A. E. Mohr. Chainsaw: Eliminating trees from overlay multicast. In IPTPS, pages , 25. [17] R. Rejaie and A. Ortega. Pals: peer-to-peer adaptive layered streaming. In NOSSDAV 3: Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video, pages , New York, NY, USA, 23. ACM Press. [18] D. Tran, K. Hua, and T. Do. Zigzag: An efficient peerto-peer scheme for media streaming. In IEEE INFOCOM, 23. [19] P. C. V.N. Padmanbhan, H.J. Wang. Resilient peer-to-peer streaming. In Proc. IEEE ICNP, 23. [2] M. Zhang, L. Zhao, Y. Tang, J.-G. Luo, and S.-Q. Yang. Large-scale live media streaming over peer-to-peer networks through global internet. In P2PMMS 5: Proceedings of the ACM workshop on Advances in peer-to-peer multimedia streaming, pages 21 28, New York, NY, USA, 25. ACM Press. [21] X. Zhang, J. Liu, B. Li, and T. P. Yum. Coolstreaming/donet: A data-driven overlay network for peer-to-peer live media streaming. In Proc. IEEE Infocom, 25.

MOVING P2P LIVE STREAMING TO MOBILE AND UBIQUITOUS ENVIRONMENT. Xiaofei Liao, Hai Jin, Wenbin Jiang

MOVING P2P LIVE STREAMING TO MOBILE AND UBIQUITOUS ENVIRONMENT. Xiaofei Liao, Hai Jin, Wenbin Jiang Computing and Informatics, Vol. 28, 2007, 823 835 MOVING P2P LIVE STREAMING TO MOBILE AND UBIQUITOUS ENVIRONMENT Xiaofei Liao, Hai Jin, Wenbin Jiang Cluster and Grid Computing Lab. Services Computing Technology

More information

AN INITIAL PEER CONFIGURATION ALGORITHM

AN INITIAL PEER CONFIGURATION ALGORITHM AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS Tomoyuki Ishii and Atsushi Inoie * Department of Network Engineering, Kanagawa Institute of Technology, Atsugi-city, Japan

More information

David R. McIntyre CS Department, Cleveland State University Cleveland, Ohio 44101

David R. McIntyre CS Department, Cleveland State University Cleveland, Ohio 44101 Data Distribution in a Wireless Environment with Migrating Nodes David A. Johnston EECS Department, Case Western Reserve University Cleveland, Ohio 44106 David R. McIntyre CS Department, Cleveland State

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

BCBS: An Efficient Load Balancing Strategy for Cooperative Overlay Live-Streaming

BCBS: An Efficient Load Balancing Strategy for Cooperative Overlay Live-Streaming BCBS: An Efficient Load Balancing Strategy for Cooperative Overlay Live-Streaming Thorsten Strufe and Günter Schäfer Department of Telematik and Computer Networks Technische Universität Ilmenau Langewiesener

More information

Fatemeh Rahimian fatemeh@sics.se. Amir Payberah amir@sics.se

Fatemeh Rahimian fatemeh@sics.se. Amir Payberah amir@sics.se P2P Live Streaming Fatemeh Rahimian fatemeh@sics.se Amir Payberah amir@sics.se 1 Outline Introduction P2P multicast algorithms Comparison Future work Summary 2 Outline Introduction Infrastructure-based

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,

More information

Peer-to-Peer Multimedia Streaming Using BitTorrent

Peer-to-Peer Multimedia Streaming Using BitTorrent Peer-to-Peer Multimedia Streaming Using BitTorrent Purvi Shah Jehan-François Pâris Department of Computer Science University of Houston, Houston, TX 77204-3010 {purvi, paris}@cs.uh.edu Abstract We propose

More information

Design and Deployment of Locality-aware Overlay Multicast Protocol for Live Streaming Services

Design and Deployment of Locality-aware Overlay Multicast Protocol for Live Streaming Services Design and Deployment of Locality-aware Overlay Multicast Protocol for Live Streaming Services Xuping Tu, Hai Jin, Dafu Deng, Chao Zhang, and Quan Yuan Cluster and Grid Computing Lab Huazhong University

More information

The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points

The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points Kay Sripanidkulchai, Aditya Ganjam, Bruce Maggs, and Hui Zhang Instructor: Fabian Bustamante Presented

More information

Outreach: Peer-to-Peer Topology Construction towards Minimized Server Bandwidth Costs

Outreach: Peer-to-Peer Topology Construction towards Minimized Server Bandwidth Costs Outreach: Peer-to-Peer Topology Construction towards Minimized Server Bandwidth Costs Tara Small, Member, IEEE, Baochun Li, Senior Member, IEEE, and Ben Liang, Member, IEEE Abstract On-demand and live

More information

Traceroute-Based Topology Inference without Network Coordinate Estimation

Traceroute-Based Topology Inference without Network Coordinate Estimation Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water

More information

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1

More information

Adaptive Hybrid Multicast with Partial Network Support

Adaptive Hybrid Multicast with Partial Network Support Adaptive Hybrid Multicast with Partial Network Support Huan Luo and Khaled Harfoush Department of Computer Science North Carolina State University Raleigh, NC,USA 27695 hluo,harfoush@cs.ncsu.edu Abstract

More information

Content Distribution Network (CDN)

Content Distribution Network (CDN) Content Distribution Network (CDN) Amir H. Payberah (amir@sics.se) Fatemeh Rahimian (fatemeh@sics.se) 1 GOAL What is Content Distribution Network (CDN)? The solutions for CDN. CDN applications File Sharing

More information

MON: On-demand Overlays for Distributed System Management

MON: On-demand Overlays for Distributed System Management MON: On-demand Overlays for Distributed System Management Jin Liang, Steven Y. Ko, Indranil Gupta and Klara Nahrstedt University of Illinois at Urbana-Champaign {jinliang, sko, indy, klara}@cs.uiuc.edu

More information

Self-organization in Cooperative Content Distribution Networks

Self-organization in Cooperative Content Distribution Networks Self-organization in Cooperative Content Distribution Networks Marc Schiely, Lars Renfer, Pascal elber Computer Science Department, University of Neuchâtel CH-7, Neuchâtel, Switzerland {marc.schiely, lars.renfer,

More information

Journal of Network and Computer Applications

Journal of Network and Computer Applications Journal of Network and Computer Applications 34 (2011) 137 150 Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage: www.elsevier.com/locate/jnca Peer-to-peer

More information

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand

More information

Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming

Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming Abdullah Faruq Ibn Ibrahimy, Islam Md. Rafiqul, Farhat Anwar and Muhammad Ibn Ibrahimy Department of

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

A Case Study of Traffic Locality in Internet P2P Live Streaming Systems

A Case Study of Traffic Locality in Internet P2P Live Streaming Systems A Case Study of Traffic Locality in Internet PP Live Streaming Systems Yao Liu, Lei Guo, Fei Li, and Songqing Chen Dept. of Computer Science Yahoo! Inc. George Mason University Sunnyvale, California, USA

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing

More information

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar

More information

Challenges for a Global Solution Addressing Quality of Service Problems in P2P IPTV Systems

Challenges for a Global Solution Addressing Quality of Service Problems in P2P IPTV Systems International Journal of Computer Networks and Communications Security VOL. 3, NO. 12, DECEMBER 2015, 432 437 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Challenges

More information

SplitStream: High-bandwidth content distribution in cooperative environments

SplitStream: High-bandwidth content distribution in cooperative environments SplitStream: High-bandwidth content distribution in cooperative environments Miguel Castro 1 Peter Druschel 2 Anne-Marie Kermarrec 1 Animesh Nandi 2 Antony Rowstron 1 Atul Singh 2 1 Microsoft Research,

More information

Differentiated Chunk Scheduling for P2P Video-on- Demand System

Differentiated Chunk Scheduling for P2P Video-on- Demand System The 8th Annual IEEE Consumer Communications and Networking Conference - Special Session IPTV and Multimedia CDN Differentiated Chunk Scheduling for P2P Video-on- Demand System Ubaid Abbasi 1, Gaétan Simo

More information

Multimedia Data Transmission over Wired/Wireless Networks

Multimedia Data Transmission over Wired/Wireless Networks Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: bb@cs.purdue.edu

More information

A Theory-Driven Distribution Algorithm for Peer-to-Peer Real Time Streaming

A Theory-Driven Distribution Algorithm for Peer-to-Peer Real Time Streaming A Theory-Driven Distribution Algorithm for Peer-to-Peer Real Time Streaming Lorenzo Bracciale, Dario Luzzi, Francesca Lo Piccolo Nicola Blefari Melazzi, Giuseppe Bianchi, Stefano Salsano Universitá di

More information

Partial Video Replication for Peer-to-peer Streaming

Partial Video Replication for Peer-to-peer Streaming Partial Video Replication for Peer-to-peer Streaming Sailaja Uppalapati and Ali Şaman Tosun Department of Computer Science University of Texas at San Antonio San Antonio, TX 78249 suppalap,tosun @cs.utsa.edu

More information

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China shuwanneng@yahoo.com.cn

More information

Measurement of Commercial Peer-To-Peer Live Video Streaming

Measurement of Commercial Peer-To-Peer Live Video Streaming Measurement of Commercial Peer-To-Peer Live Video Streaming Shahzad Ali, Anket Mathur and Hui Zhang School of Computer Science Carnegie Mellon University Abstract Peer-to-peer technologies have proved

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

A Framework for Architecting Peer-to-Peer Receiver-driven Overlays

A Framework for Architecting Peer-to-Peer Receiver-driven Overlays A Framework for Architecting Peer-to-Peer Receiver-driven Overlays Reza Rejaie Department of Computer Science University of Oregon reza@cs.uoregon.edu Shad Stafford Department of Computer Science University

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Parallel overlays for high data-rate multicast data transfer

Parallel overlays for high data-rate multicast data transfer Computer Networks 51 (27) 31 42 www.elsevier.com/locate/comnet Parallel overlays for high data-rate multicast data transfer K.K. To, Jack Y.B. Lee * Department of Information Engineering, The Chinese University

More information

Is High-Quality VoD Feasible using P2P Swarming?

Is High-Quality VoD Feasible using P2P Swarming? Is High-Quality VoD Feasible using P2P Swarming? Siddhartha Annapureddy New York University New York City, NY, USA reddy@scs.stanford.edu Dinan Gunawardena Microsoft Research Cambridge, UK dinang@microsoft.com

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Network Topology and Traceroutes

Network Topology and Traceroutes A Distributed Approach to End-to-End Network Topology Inference Xing Jin Qiuyan Xia S.-H. Gary Chan Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear

More information

Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing

Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing Adeel Anwar Abbasi*, Tahir Mehmood** {*Department of Computer Sciences, Shaheed Zulfiqar Ali Bhutto Institute of Science and

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Supporting IP Multicast Streaming Using Overlay Networks

Supporting IP Multicast Streaming Using Overlay Networks Supporting IP Multicast Streaming Using Overlay Networks Marc Brogle, Dragan Milic, Torsten Braun University of Bern Institute of Computer Science and Applied Mathematics Neubrueckstrasse 10 CH-3012 Bern,

More information

A Measurement Study of SOPCast

A Measurement Study of SOPCast A Measurement Study of SOPCast Florin Coras, Thomas Silverston 2, Jordi Domingo-Pascual, and Albert Cabellos-Aparicio Universitat Politècnica de Catalunya, Barcelona, Spain {fcoras,acabello,jordi.domingo}@ac.upc.edu

More information

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution

More information

Efficient Data Retrieving in Distributed Datastreaming

Efficient Data Retrieving in Distributed Datastreaming Efficient Data Retrieving in Distributed Datastreaming Environments Yunhao Liu, Jun Miao, Lionel M. Ni, and Jinsong Han Department of Computer Science Hong Kong University of Science and Technology Clear

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

DigiMetro An Application-Level Multicast System for Multi-party Video Conferencing

DigiMetro An Application-Level Multicast System for Multi-party Video Conferencing DigiMetro An Application-Level Multicast System for Multi-party Video Conferencing Chong Luo, Jiang Li, and Shipeng Li Microsoft Research Asia Abstract: The increasing demand for multi-party video conferencing

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

The Scalability of Swarming Peer-to-Peer Content Delivery

The Scalability of Swarming Peer-to-Peer Content Delivery The Scalability of Swarming Peer-to-Peer Content Delivery Daniel Stutzbach 1, Daniel Zappala 2, and Reza Rejaie 3 1 University of Oregon, Eugene, Oregon, agthorr@cs.uoregon.edu 2 Brigham Young University,

More information

Cooperative Monitoring for Internet Data Centers

Cooperative Monitoring for Internet Data Centers Cooperative Monitoring for Internet Data Centers Kuai Xu Feng Wang Arizona State University Division of Mathematical and Natural Sciences New College of Interdisciplinary Arts & Sciences P.O. Box 371,

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Receiver-Cooperative Bandwidth Management for Layered Multicast

Receiver-Cooperative Bandwidth Management for Layered Multicast Receiver-Cooperative Bandwidth Management for Layered Multicast Hirozumi Yamaguchi Keiichi Yasumoto Teruo Higashino Kenichi Taniguchi Graduate School of Eng. Sci., Osaka University Faculty of Economics,

More information

Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network

Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Jian Ni, Danny H. K. Tsang, Ivan S. H. Yeung, Xiaojun Hei Department of Electrical & Electronic Engineering Hong Kong University

More information

Differenciated Bandwidth Allocation in P2P Layered Streaming

Differenciated Bandwidth Allocation in P2P Layered Streaming Differenciated Bandwidth Allocation in P2P Layered Streaming Abbas Bradai, Toufik Ahmed CNRS-LaBRI University of Bordeaux- 5, Cours de la libération. Talence, 45 {bradai, tad} @labri.fr Abstract There

More information

An Efficient Hybrid P2P MMOG Cloud Architecture for Dynamic Load Management. Ginhung Wang, Kuochen Wang

An Efficient Hybrid P2P MMOG Cloud Architecture for Dynamic Load Management. Ginhung Wang, Kuochen Wang 1 An Efficient Hybrid MMOG Cloud Architecture for Dynamic Load Management Ginhung Wang, Kuochen Wang Abstract- In recent years, massively multiplayer online games (MMOGs) become more and more popular.

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] Efficient Uplink Bandwidth Utilization in P2P-TV Streaming Systems Original Citation: A. Carta,M. Mellia,M. Meo,S. Traverso (21). Efficient

More information

Content Distribution over IP: Developments and Challenges

Content Distribution over IP: Developments and Challenges Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Optimal Rate Allocation in Overlay Content Distribution

Optimal Rate Allocation in Overlay Content Distribution Optimal Rate Allocation in Overlay Content Distribution Chuan Wu and Baochun Li Department of Electrical and Computer Engineering University of Toronto {chuanwu, bli}@eecg.toronto.edu Abstract. This paper

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Reliable Peer-to-peer End System Multicasting through Replication

Reliable Peer-to-peer End System Multicasting through Replication Reliable Peer-to-peer End System Multicasting through Replication Jianjun Zhang, Ling Liu, Calton Pu and Mostafa Ammar College of Computing, Georgia Institute of Technology {zhangjj, lingliu, calton, ammar}@cc.gatech.edu

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

A Review on Peer-to-Peer Live Video Streaming Topology

A Review on Peer-to-Peer Live Video Streaming Topology A Review on Peer-to-Peer Live Video Streaming Topology Ammar Waysi AlTuhafi National Advanced IPv6 Center (NAv6) Universiti Sains Malaysia ABSTRACT Peer-to-peer systems become a promising alternative for

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

A Survey of Channel Switching Schemes for IPTV

A Survey of Channel Switching Schemes for IPTV FONSECA LAYOUT_Layout 1 8/1/13 3:54 PM Page 120 IP-BASED TV TECHNOLOGIES, SERVICES, AND MULTIDISCIPLINARY APPLICATIONS A Survey of Channel Switching Schemes for IPTV Daniel A. G. Manzato and Nelson L.

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

Deploying Video-on-Demand Services on Cable Networks

Deploying Video-on-Demand Services on Cable Networks Deploying Video-on-Demand Services on Cable Networks Matthew S. Allen, Ben Y. Zhao and Rich Wolski Department of Computer Science, U. C. Santa Barbara {msa, ravenben, rich}@cs.ucsb.edu Abstract Efficient

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

Network Architecture and Topology

Network Architecture and Topology 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end

More information

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

Computer Network Topologies: Models and Generation Tools

Computer Network Topologies: Models and Generation Tools Consiglio Nazionale delle Ricerche Technical Report n. 5/200 Computer Network Topologies: Models and Generation Tools Giuseppe Di Fatta, Giuseppe Lo Presti 2, Giuseppe Lo Re CE.R.E. Researcher 2 CE.R.E.,

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

diversifeye Application Note

diversifeye Application Note diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs

More information

Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud

Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud Pramod Kumar H N Post-Graduate Student (CSE), P.E.S College of Engineering, Mandya, India Abstract: Now days, more

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran

Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Network Research Group, School of Computer Sciences Universiti Sains Malaysia11800 Penang, Malaysia Abstract

More information

RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications

RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications Jin Liang and Klara Nahrstedt Department of Computer Science University of Illinois at Urbana-Champaign Urbana, IL 6181 Email:

More information

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University

More information