Traffic Localization for P2P-Applications: The ALTO Approach

Size: px
Start display at page:

Download "Traffic Localization for P2P-Applications: The ALTO Approach"

Transcription

1 Traffic Localization for P2P-Applications: The ALTO Approach Jan Seedorf, Sebastian Kiesel, Martin Stiemerling NEC Laboratories Europe Kurfuerstenanlage 36 Heidelberg, Germany Abstract Today, most P2P applications do not consider locality on the underlying network topology when choosing their neighbors on the P2P routing layer. As a result, participating peers may experience long delays and peers ISPs suffer from a large amount of (costly) inter-isp traffic. One potential solution to mitigate these problems is to have ISPs or third parties convey information regarding the underlying network topology to P2P-clients through a dedicated service. Following this approach, the IETF has recently formed an Application Layer Traffic Optimization (ALTO) working group for standardizing a protocol to enable P2P applications to obtain information regarding network layer topology. This paper comprises the problem space for such an ALTO approach, taking into account recent developments in the IETF ALTO Working Group. In particular, we will describe requirements for an ALTO protocol identified in the IETF, concrete protocols which have been proposed so far, and the overall challenges. In addition, we will discuss related issues such as privacy considerations, the relationship of an ALTO service with existing caching solutions, discovery mechanisms for an ALTO service, and security considerations. Keywords-P2P traffic localization; layer cooperation I. INTRODUCTION At large, P2P applications do not consider locality on the underlying network topology when choosing their neighbors on the P2P routing layer. As a result, participating peers may experience long delays and peers ISPs suffer from a large amount of (costly) inter-isp traffic. To cope with these problems, several potential solutions have been suggested which propose P2P traffic localization, i.e., having peers take the underlying network topology into account when selecting their neighbors. For instance, peers can measure message delay to other peers themselves or exploit existing content distribution networks to infer network layer topology distance [1]. One promising approach for P2P traffic localization is to have ISPs or third parties convey information regarding the underlying network topology to P2P-clients through a special service. To this end, the EU FP7 project Napa-Wine [2] is investigating solutions for providing network layer information to peers through such a dedicated service. In addition, the IETF has recently formed a working group for Application-Layer Traffic Optimization (ALTO) [3]. This working group has the intention of developing Internet standards which will help P2P-clients choose better neighbors in terms of mapping the overlay topology to the underlying IP network. Specifically, the main goal of the ALTO WG is to design a query-response protocol for an ALTO service which P2P-applications can query for information to achieve better-than-random neighbor peer selection [3] [4] [5]. In this paper, we summarize challenges and design issues for such an ALTO approach, especially focusing on recent developments in the IETF ALTO WG. Our goal is to highlight the status quo of ALTO standardization and to discuss open issues. The rest of this paper is organized as follows. In section II, we survey existing approaches for P2P traffic localization where network layer information is provided to the P2Player for improved P2P neighbor selection. In section III, we describe current work in the IETF ALTO working group. In addition, in III-D we discuss related issues such as privacy considerations (i.e., ISPs potentially disclosing network topology information to P2P-clients as well as P2P-clients potentially disclosing candidate neighbor peers to ISPs), the relationship of an ALTO service with existing caching solutions, discovery mechanisms for an ALTO service (i.e., how to find an ALTO server given mobility of P2P-nodes), and security considerations. Section IV concludes the paper with a summary. II. PROVIDING NETWORK LAYER INFORMATION TO P2P APPLICATIONS: EXISTING WORK Researchers have started to propose and investigate approaches where information (such as topology, cost, or policies) provided by the underlying network layer can help reduce problems caused by P2P-traffic (such as a high volume of inter-isp traffic). The overall idea is that P2Pclients can choose their neighbors more efficiently (for both the application and the network) by using such information. In particular, the amount of inter-isp traffic which is costly for the network and generates congestion for the application may be reduced. One key goal of such approaches is localization: giving peers information which enables them to choose neighbors not randomly but close to themselves in the underlying network topology. One of the first works to consider locality information provided by the ISP in order to improve P2P-traffic has been [6]. This work studies regular BitTorrent and shows

2 that it is very inefficient from an ISP s perspective, i.e., regular BitTorrent is locality-unaware. To circumvent this, the authors briefly sketch a solution where ISPs intercept P2P-traffic at edge routers and redirect them to P2P-clients within the same ISP. However, they do not investigate such a solution in detail. A more concrete proposal to improve P2P-locality through network layer topology information has been proposed in [7]. The overall idea is simple: Instead of random peer selection, peers are supposed to select all but k peers from their ISP. For instance, if peers have a connectivity degree d (i.e., they are connected to d peers on the overlay layer), d k neighbours for each peer are supposed to be located within the same ISP while k links exist to peers in different ISPs for each peer. This obviously increases locality in peer selection. This is called biased neighbour selection. In [7] the authors envision two ways to implement biased neighbour selection: Either by using a modified tracker or by modifying traffic shaping devices which intercept P2P traffic at edge routers of each ISP. Both solutions assume a way (for trackers or traffic shaping devises) to access information regarding ISP locality. A similar approach has been presented in [8]. This approach is more general and in principle enables neighbour selection on other criteria than network locality. The authors propose to have an oracle to be operated by each ISP, which the P2P-clients in the ISP s network can query to obtain information about the underlying network. The overall idea is that instead of choosing their neighbours randomly, P2P clients can use the ISP oracle in order to choose neighbours with care and insight. More specifically, the oracle ranks a list of potential neighbours based on the ISP s preferences. Such a list can be obtained by the P2P-client through regular P2P operations and then sent to the oracle for guidance on which peers to prefer. The authors evaluate this sorting oracle approach through simulation as well as actual implementation. Their results demonstrate that this approach can increase locality of P2P-traffic with respect to AS diameter, while not increasing the average hop count or node degree. A decentralized alternative for conveying network layer information to P2P-clients is proposed in [1]. This approach re-uses information provided by content delivery networks (CDNs) to guide peer selection for P2P-applications. This idea is based on the fact that CDNs try to minimise download latency. To achieve this, clients are directed to CDN replica servers via dynamic DNS. It is reasonable to assume that if two clients are sent to the same CDN replica server they are likely to be located close to each other on the network topology. As a metric to express network layer locality between peers based on CDN redirection, using the cosine similarity of the replication server ratio maps between two peers is proposed [1]. More recently, [9] investigated what extent of locality is beneficial to P2P-applications in general. Clearly, some degree of inter-isp links needs to be preserved in order to guarantee robustness and prevent network partitioning in the case of node failure. The authors define locality as the percentage of intra-isp connections over all connections with respect to the average peer. Their study concludes that compared to the regular BitTorrent protocol up to two orders of magnitude can be saved on inter-isp traffic if locality is used. Further, they show in a test environment with modified BitTorrent implementations that the capacity of the initial content-seed has strong implications on the potential benefit of employing locality-biased neighbor selection. The P4P [10] research project has developed a framework which ISPs can use to convey network information to P2P applications [10] [11]. The framework of the P4P project is based on two main architectural entities: the itracker and the p-distance. P4P envisions each network provider to operate a so-called itracker. This itracker serves as the portal to be used by P2P applications within this network provider s network to acquire network layer information. Such an itracker can either communicate with the P2P-client directly or indirectly via a P2P-application tracker. At the heart of the P4P framework lies the notion of the p-distance. An itracker can be queried by P2P applications about the p-distance between peers. This p-distance is computed by the network provider (e.g., based on routing policies, topology information, inter-isp cost agreements, etc.). For instance, an ISP could compute p-distances in such a way that connections with higher financial costs for the ISP result in a higher p-distance. The P4P framework has been evaluated through simulation and PlanetLab experiments [11]. In addition, several ISPs have conducted field tests [12]. All these studies provide strong indication that the P4P architecture is suitable for improving download speeds for P2P users while decreasing inter-isp traffic caused by P2Papplications. In summary, research indicates that improved peer selection algorithms based on information provided by an ISP, such as network layer topology or maximum available access bandwidth at a peer, can indeed help in reducing costs for ISPs as well as increase overall download rates for P2P applications 1. These research results made the IETF realize the importance of layer-cooperation in the context of P2P communications. To investigate potential IETF standardization work in this area, the IETF organized a P2P infrastructure workshop [14] in May At this workshop three complimentary work areas for the IETF were identified: provisioned QoS (not followed up), new approaches to congestion (followed up in the LEDBAT working group) and finally traffic localization (handled in the IETF ALTO working group). 1 A good survey on related work can also be found in [13].

3 ALTO service Application overlay topology Resource Query ALTO Guidance Client Application Protocol Peer 1 Peer 2 Peer 3?? Resource From ISP: Static topology information Operational costs Policies text text text Routing state information Physical topology Figure 1. ALTO scenario III. THE IETF ALTO WORKING GROUP As a result of efforts to investigate traffic localization, the IETF formed a working group for Application-Layer Traffic Optimization (ALTO). This working group shall develop Internet standards for better-than-random peer selection by providing information regarding the underlying network. A. Goals and Rationale As noted in the charter of the ALTO WG [3], the goal of this working group is to design a query-response protocol for a service which P2P-applications can query to optimize peer selection: The Working Group will design and specify an Application-Layer Traffic Optimization (ALTO) service that will provide applications with information to perform better-than-random initial peer selection. ALTO services may take different approaches at balancing factors such as maximum bandwidth, minimum cross-domain traffic, lowest cost to the user, etc. The WG will consider the needs of BitTorrent, tracker-less P2P, and other applications, such as content delivery networks (CDN) and mirror selection. Figure 1 shows the overall idea behind such an ALTO service. Assume that Peer 2 in the figure wants to download a particular resource. Assume further that Peer 2 has received (e.g., using a tracker, a DHT, or similar resource directories) several candidate peers from the P2P network which can offer the desired resource. In the figure, Peer 2 can potentially download the desired resource from Peer 1 or Peer 3. At this stage, Peer 2 can query an ALTO service for guidance on which peer to select for downloading. The ALTO service is a source of information for the querying peer regarding network layer information which the peer cannot obtain (or not obtain easily) otherwise. The ALTO service can answer queries based on information provided by the peer s ISP 2 such as information regarding the topology, routing state, policies, or operational costs. In the example depicted it is likely that the ALTO service would suggest to download from Peer 3 because this peer is physically located in the same network as Peer 2. Figure 2 illustrates the scope of ALTO standardization in a schematic way [4] [5]. The ALTO protocol specifies the query-response message exchange between an ALTO client and an ALTO service. The provisioning of topology information (or other kinds of information, e.g., policies) to an ALTO service as well as the P2P application protocol itself are out of scope for ALTO. Note that an ALTO client can be a P2P-client application (Figure 2(a)) or a P2P resource directory such as a BitTorrent tracker (Figure 2(b)). In the latter case, peers would not query the ALTO service directly. Instead, the resource directory of the P2P application would query the ALTO service frequently and use this information as part of the P2P application, i.e., when directing peers to resources (see Figure 2(b)). The underlying assumption for an ALTO service to work and be used in practice is that a Win/Win-situation between P2P-applications and network providers arises. Network providers can benefit from offering an ALTO service by reducing the amount of inter-isp traffic and potentially also by 2 In principle, such information can be provided by the peer s network operator or a third party.

4 Source of topo. info ALTO service Source of topo. info ALTO service Resource directory ("tracker") ALTO client protocol Application protocol Provisioning protocol Peers ALTO client protocol Application protocol Provisioning protocol Peers (a) Application without tracker (b) Application with tracker Figure 2. ALTO architecture achieving better intra-isp localization (e.g., reducing intra- ISP backbone traffic by localization within access networks). Thus, network providers have a clear incentive to offer an ALTO service. P2P applications, on the other hand, can hardly be forced to use an ALTO service. Thus, such a service is optional and will only be used by P2P applications if they experience a gain by using it. A possible benefit experienced by P2P applications can be faster starting of downloads. Also, benefits related to pricing models in users contracts may make an ALTO service attractive for P2P applications. For instance, in the case an operator allows unlimited (flatrate) traffic within its own network but puts a cap on external traffic per user, it can be very useful for a P2P application to know which peers offering a desired resource are located with its own ISP. The overall rationale behind ALTO is that presumably both parties, network providers and P2P applications, will benefit from such a service and therefore will offer/use it. B. Requirements for an ALTO protocol Besides general requirements and detailed requirements regarding protocol semantics, the following high-level requirements for an ALTO protocol have been identified in [5]: Error handling and overload protection: An ALTO server must be able to express certain errors which can occur. Specifically, an ALTO server must be able to inform clients in the case it is overloaded. ALTO server discovery: There must be a discovery mechanism available so that ALTO clients can find ALTO servers. Security and privacy: Authentication and authorization between ALTO entities must be supported by the protocol. In addition, the ALTO protocol must include some protection against Denial-of-Service attacks against ALTO servers. To protect the privacy of users as well as to support the desire of network providers to hide details of their interior network topology, the ALTO protocol must support different levels of granularity regarding ALTO guidance in queries and responses. C. Proposed Solutions While the work of the IETF ALTO working group still focuses on a clear definition of the problem and the requirements, there are already several solution proposals from individual contributors. In addition to smaller issues such as the encoding of messages, the main difference between the proposed protocols and architectures is the allocation of functions between ALTO clients and servers, respectively. These decisions are mainly motivated by scalability and privacy requirements. In all proposals, the basic steps are as follows: 1) The application instance learns the IP addresses (and other connection-relevant parameters, if applicable) of candidate resource providers, which can be contacted to access the desired resource. This aquisition of candidate IP addresses can be done using centralized or distributed databases, such as BitTorrent Trackers, DNS, DHTs, through message exchange (e.g., gossiping), or any other application-specific mechanism. 2) The application passes the list of candidate IP addresses to the local ALTO client. The ALTO client contacts the ALTO server(s) as needed and together they generate the ALTO guidance. This invocation of ALTO can be done by the peer which will eventually access the desired resource (see Figure 2(a)), or it can be done by a third party, such as a tracker, on behalf of the peer (see Figure 2(b)). 3) The ALTO client returns the list of addresses to the application, together with the ALTO guidance. The guidance can be expressed implicitly by sorting the address list according to some rating criteria, and/or explicitly by giving rating attribute values for each address.

5 4) The application instance can combine the ALTO guidance with locally generated ratings (e. g., based on measurements) and then connect to one or several resource providers that have been rated best. If the application is not satisfied with the actually experienced performance, it can connect to other resource providers further down the sorted list, it may query ALTO again, or it can proceed without ALTO guidance. Proxidor: The PROXIDOR protocol [15] is based on the sorting oracle approach [8]. Here, the ALTO client sends the list of candidate IP addresses to the ALTO server, which sorts them according to evaluation criteria. The sorted list is returned to the ALTO client and eventually to the application. P4P: This protocol proposal [16] follows a different approach than proposed in [15]. Here, the ALTO client can download a more-or-less static set of guiding information, which describes regions in the network topology or groups of hosts (usually expressed as IP address ranges) and the parameters that are valid for these regions or groups, respectively. The assessment and comparison of specific candidate peers is then performed inside the ALTO client instance. H12: The two proposals introduced so far have significant differences with respect to information disclosure between the involved parties and privacy concerns (i. e., what can ALTO operators infer about the user s behavior and what can the users learn about the network topology see next section). A second difference is the amount of data that has to be exchanged. When using the approach proposed in [16], the downloaded information may contain detailed information about network regions that do not contain a single candidate peer. On the other hand, the information may be cached at the client and used for the evaluation of candidate peers that were not even known at the time the ALTO guidance was requested. The H12 protocol proposal [17] tries to balance the interests of Internet Service Providers and users. The ALTO client may not only send the addresses of individual candidate peers to the server for having them rated, but also larger network regions or host groups. This reduces the amount of data that has to be transmitted and allows the client to conceal the candidate peer s true identity in an anonymity group. Following the same rationale, the server may answer with more or less detail to the query, according to its own privacy policies. D. Current Issues In this section, we discuss issues which the ALTO WG is currently facing and addressing. For a better understanding of these issues the reader is referred to [4]. Privacy considerations: With the envisioned ALTO protocol, an ALTO client queries an ALTO service for guidance. In order to guide the client, the ALTO service needs at least some information regarding the client s candidate peers. Some P2P applications might consider such information about their potential neighbors in the P2P routing topology as private. In particular, P2P applications might be reluctant to disclose a list of concrete IP-addresses from candidate peers to an ALTO service. Also, applications might consider their criteria for rating candidate peers private and would not be willing to share this information with an ALTO service. However, the less knowledge the ALTO service has about the client s actual needs, the less help its responses might be to the client. On the other hand, ISPs might fear that ALTO responses disclose too much information about their interior network topology or routing policies. Potentially, an answer to an ALTO query might enable the client to infer (at least in part) some details regarding its ISP s business relationship with neighboring autonomous networks. In particular, even if ALTO responses only contain a punctual view on the ISPs preferences, sensitive information could be deduced by sending multiple varying queries to an ALTO server and carefully analyzing the responses. A potential solution to this privacy trade-off could be to convey only disguised or partial information to each other party. For instance, an ALTO client may only send a list of IP-prefixes to an ALTO service and request a sorting of such a list. Depending on the prefix length, the client would disclose only few or partial information regarding its candidate peers. Similarly, an ALTO service may only return a list of very few preferred prefixes or address ranges even if the client requested a sorting of a long list of concrete IP-addresses. In general, the ALTO protocol should not mandate the disclosure of sensitive information by either party and be flexible enough to allow different levels of granularity in requests and responses. Security considerations: Potentially, ALTO servers can misguide ALTO clients on purpose [4]. For instance, an ALTO server could try to prevent a peer from downloading from a certain other peer or a certain administrative domain through its responses. Also, an ALTO server could intentionally guide the requesting peer towards a certain peer which would offer a modified version of the desired resource. However, since ALTO is optional for P2P applications, it is believed that such hostile ALTO servers would eventually be detected by P2P applications and avoided. Furthermore, it is likely that P2P applications will not solely rely on ALTO for peer selection. Instead peers may combine information retrieved through an ALTO service with information retrieved on their own (e.g., through measurements). In other words, P2P applications will only use ALTO services in the long run if they experience a benefit by using ALTO. Another possible security concern for ALTO servers are Denial-of-Service attacks. Depending on the workload a simple ALTO query generates at the server, there is a risk that ALTO servers can be easily overloaded with a large

6 amount of bogus requests. A possible countermeasure could be to use a cookie mechanism 3 as used in other protocols (e.g., IPSec) to protect against Denial-of-Service attacks. In addition, ALTO implementations could be attacked by exploiting software vulnerabilities such as buffer overflows. However, such software security issues are not specific to ALTO and generic techniques may be applied to harden ALTO implementations (e.g., security testing using fuzzing, static analysis of code, or similar techniques). Relationship of an ALTO service with existing caching solutions: Installing caches in or close to the network core is another effective means for optimizing the performance of P2P systems, and ALTO can assist finding a cache which is nearby or has other desired connectivity properties. Advanced issues in the interaction between ALTO and caches, e. g., using ALTO to direct a peer to the cache if the information is already stored there but directing it to other peers otherwise, are still the subject of ongoing research. Discovery mechanisms for an ALTO service: The ALTO guidance will be used for rating alternative resource providers. This must also consider the topological location of the resource consumer, which will eventually initiate the data transfer, because all predictions regarding performance, cost, or other rating criteria have to be made from the viewpoint of this resource consumer. An ALTO server s knowledge may depend on the deployment scenario. It is possible to setup an ALTO server that has a model of the overall Internet topology and can consequently create ratings for any combinations of resource provider and resource consumer location. However, it is also possible that an ALTO server is provided by an ISP and has only a partial view on the overall topology. This kind of server would only be able to produce recommendations for resource consumers that are located in the respective ISP s access network. In the latter case it is important for a peer seeking ALTO guidance to send the ALTO queries to the right ALTO server, in order to receive suitable recommendations. If the ALTO client is integrated into the resource consumer (see Figure 2(a)), the problem boils down to finding the ALTO server of the ISP of the client s access network. This can be done using, e. g., a DHCP or PPP option, which will have to be standardized. If, however, the ALTO query is performed by a third party (e. g., a tracker) on behalf of the acutal resource consumer (see Figure 2(b)), the situation becomes more difficult, as a cross-domain discovery mechanism and/or a referral mechanism between ALTO servers is needed. Several proposals, mostly based on the Domain Name System (DNS), are still under investigation. 3 where each request is first answered with a cookie to prevent fake queries from spoofed IP-addresses IV. CONCLUSION Recent research activities have shown that P2P traffic localization can help in reducing the overall amount of inter- ISP traffic caused by today s P2P applications. At the same time, traffic localization can improve the performance of P2P applications. One promising approach for P2P traffic localization is to explicitly convey network layer information to P2P applications through a dedicated service. Following this approach, the IETF has recently formed a working group for Application Layer Traffic Optimization (ALTO). The goal of the ALTO working group is to define a queryresponse protocol so that P2P-clients can query a dedicated service regarding the underlying network topology. In this paper, we have presented the problem space for such an approach and the corresponding issues for standardizing an ALTO protocol. We explained the overall rationale behind this approach and pointed out requirements for an ALTO protocol. In addition, we discussed current issues such as privacy considerations, security considerations, cooperation with caching mechanisms, and discovery mechanisms for ALTO services. Our goal is to help in defining a proper protocol so that network providers and P2P applications can benefit from ALTO in the near future. ACKNOWLEDGMENT This work was partially supported by NAPA-WINE, a research project supported by the European Commission under its 7th Framework Program (contract no ). The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the NAPA-WINE project or the European Commission. The authors would like to thank Vijay Gurbani, Enrico Marocco, Eric Burger, Jon Peterson, and the members of the IETF ALTO working group for extensive discussions regarding ALTO standardization. In addition, the authors would like to thank the Napa-Wine team for various discussions related to network-aware P2P applications. REFERENCES [1] D. R. Choffnes and F. E. Bustamante, Taming the Torrent: A practical approach to reducing cross-isp traffic in peer-topeer systems, ACM SIGCOMM Computer Communications Review (CCR), vol. 38, no. 4, pp , Oct [2] EU FP7 Project NAPA-WINE, [3] J. Peterson, V. Gurbani, E. Marocco et al., ALTO Working Group Charter, alto-charter.html. [4] J. Seedorf and E. Burger, Application-Layer Traffic Optimization (ALTO) Problem Statement, Internet Engineering Task Force, Internet-Draft draft-ietf-alto-problem-statement- 01, May 2009, work in Progress. [Online]. Available:

7 [5] S. Kiesel, L. Popkin, S. Previdi, R. Woundy, and Y. R. Yang, Application-Layer Traffic Optimization (ALTO) Requirements, Internet Engineering Task Force, Internet-Draft draft-ietf-alto-reqs-00, Apr. 2009, work in Progress. [Online]. Available: [6] T. Karagiannis, P. Rodriguez, and K. Papagiannaki, Should Internet Service Providers Fear Peer-Assisted Content Distribution? in ACM Internet Measurement Conference, Oct [16] R. Penno and Y. Yang, ALTO Protocol, Internet Engineering Task Force, Internet-Draft draft-penno-alto-protocol-01, Mar. 2009, work in Progress. [Online]. Available: org/html/draft-penno-alto-protocol [17] S. Kiesel and M. Stiemerling, ALTO H12, Internet Engineering Task Force, Internet-Draft draft-kiesel-alto-h12-00, Mar. 2009, work in Progress. [Online]. Available: [7] R. Bindal, P. Cao, W. Chan, J. Medved, G. Suwala, T. Bates, and A. Zhang, Improving Traffic Locality in BitTorrent via Biased Neighbor Selection, in 26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006, Jul. 2006, pp [8] V. Aggarwal, A. Feldmann, and C. Scheideler, Can ISPs and P2P Systems Co-operate for Improved Performance? ACM SIGCOMM Computer Communications Review (CCR), vol. 37, no. 3, pp , Jul [9] S. Le Blond, A. Legout, and W. Dabbous, Pushing BitTorrent Locality to the Limit, Technical Report, Inria, Dec [Online]. Available: v1/ [10] R. Alimi, D. Pasko, L. Popkin, Y. Wang, and Y. Yang, P4P: Provider Portal for P2P Application, Internet Engineering Task Force, Internet-Draft draft-p4p-framework- 00, Nov. 2008, work in Progress. [Online]. Available: http: //www-net.cs.yale.edu/projects/p4p/draft-p4p-framework.txt [11] H. Xie, R. Y. Yang, A. Krishnamurthy, Y. G. Liu, and A. Silberschatz, P4P: Provider Portal for Applications, ACM SIGCOMM Computer Communications Review (CCR), vol. 38, no. 4, pp , Oct [Online]. Available: [12] C. Griffiths, J. Livingood, and R. Woundy, Comcast s ISP Experiences In a Recent P4P Technical Trial, Internet Engineering Task Force, Internet-Draft draftlivingood-woundy-p4p-experiences-07, May 2009, work in Progress. [Online]. Available: draft-livingood-woundy-p4p-experiences [13] V. Hilt, I. Rimac, M. Tomsu, V. Gurbani, and E. Marocco, A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem, Internet Engineering Task Force, Internet-Draft draft-hilt-alto-survey-00, Jul. 2008, work in Progress. [Online]. Available: html/draft-hilt-alto-survey [14] J. Peterson and A. Cooper, Report from the IETF workshop on P2P Infrastructure, May 28, 2008, Internet Engineering Task Force, Internet-Draft draft-p2pi-cooper-workshop-report-01, Feb. 2009, work in Progress. [Online]. Available: internet-drafts/draft-p2pi-cooper-workshop-report-01.txt [15] O. Akonjang, A. Feldmann, S. Previdi, B. Davie, and D. Saucez, The PROXIDOR Service, Internet Engineering Task Force, Internet-Draft draft-akonjang-alto-proxidor-00, Mar. 2009, work in Progress. [Online]. Available: http: //tools.ietf.org/html/draft-akonjang-alto-proxidor

Network Positioning System

Network Positioning System Network Positioning System How service provider infrastructure can support rapid growth of video, cloud and application traffic Stefano Previdi sprevidi@cisco.com Distinguished Engineer Cisco Systems 1

More information

Monitoring and Abstraction for Networked Clouds

Monitoring and Abstraction for Networked Clouds Monitoring and Abstraction for Networked Clouds Michael Scharf, Thomas Voith, W. Roome, Bob Gaglianello, Moritz Steiner, Volker Hilt, Vijay K. Gurbani Alcatel-Lucent Bell Labs E-mail: {first.last}@alcatel-lucent.com

More information

Improving Deployability of Peer-assisted CDN Platform with Incentive

Improving Deployability of Peer-assisted CDN Platform with Incentive Improving Deployability of Peer-assisted CDN Platform with Incentive GLOBECOM 2009 Dec 2, 2009 Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa, and Ryoichi Kawahara NTT Service Integration

More information

The Performance and Locality Tradeoff in BitTorrent-like P2P File-Sharing Systems

The Performance and Locality Tradeoff in BitTorrent-like P2P File-Sharing Systems The Performance and Locality Tradeoff in BitTorrent-like P2P File-Sharing Systems Wei Huang, Chuan Wu, Francis C.M. Lau Department of Computer Science, The University of Hong Kong {whuang,cwu,fcmlau}@cs.hku.hk

More information

Peer-to-Peer (P2P) applications, including both P2P streaming and P2P

Peer-to-Peer (P2P) applications, including both P2P streaming and P2P Description of Working Group Peer-to-Peer (P2P) applications, including both P2P streaming and P2P file-sharing applications, make up a large fraction of traffic in the Internet today. One way to reduce

More information

P4P: ISPs and P2P. Laird Popkin, Pando Networks Doug Pasko, Verizon Communications

P4P: ISPs and P2P. Laird Popkin, Pando Networks Doug Pasko, Verizon Communications P4P: ISPs and P2P Laird Popkin, Pando Networks Doug Pasko, Verizon Communications Overview P2P and ISPs P2P market is maturing What are ISPs telling us? How can P2P firms work with ISPs? P4P What is in

More information

ALTO and Content Delivery Networks dra7- penno- alto- cdn

ALTO and Content Delivery Networks dra7- penno- alto- cdn ALTO and Content Delivery Networks dra7- penno- alto- cdn Stefano Previdi, sprevidi@cisco.com Richard Alimi, ralimi@google.com Jan Medved, jmedved@juniper.net Reinaldo Penno, rpenno@juniper.net Richard

More information

arxiv:1011.1892v1 [cs.ni] 8 Nov 2010

arxiv:1011.1892v1 [cs.ni] 8 Nov 2010 Pushing Locality to the Limit Stevens Le Blond a, Arnaud Legout a,, Walid Dabbous a a INRIA, EPI Planete, 004 route des lucioles, B.P. 93, 0690 Sophia Antipolis CEDEX, France arxiv:0.89v [cs.ni] 8 Nov

More information

Internet Anonymity and the Design Process - A Practical Approach

Internet Anonymity and the Design Process - A Practical Approach anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, mwright@uta.edu,

More information

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and

More information

ETMS: A System for Economic Management of Overlay Traffic

ETMS: A System for Economic Management of Overlay Traffic Towards the Future Internet G. Tselentis et al. (Eds.) IOS Press, 2010 2010 The authors and IOS Press. All rights reserved. doi:10.3233/978-1-60750-539-6-1 1 ETMS: A System for Economic Management of Overlay

More information

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar

More information

Deployment considerations draft-ietf-alto-deployments-08

Deployment considerations draft-ietf-alto-deployments-08 Deployment considerations draft-ietf-alto-deployments-08 Martin Stiemerling, Sebastian Kiesel, Stefano Previdi, Michael Scharf Presented by Vijay Gurbani IETF 88, Vancouver, Canada, Nov. 2013 Status of

More information

BitTorrent Peer To Peer File Sharing

BitTorrent Peer To Peer File Sharing BitTorrent Peer To Peer File Sharing CS290F: Networking for Multimedia Mini PhD Major Area Exam I) Introduction Content distribution is an important topic in networking and has been evolving from the start

More information

Lawful Interception in P2Pbased

Lawful Interception in P2Pbased Lawful Interception in P2Pbased VoIP Systems Jan Seedorf (jan.seedorf_at_nw.neclab.eu) NEC Laboratories Europe Heidelberg, Germany July Page 2008 1-1 IPTCOMM 2008 Heidelberg, Germany Outline 1.

More information

ABSTRACT Acknowledgments List of Abbreviations Contents ABSTRACT 3 Acknowledgments 5 List of Abbreviations 7 List of Figures 15 List of Tables 23 1 Introduction 25 2 Motivation and background 29 3 Overview

More information

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services

ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services How can an ISP merge with a CDN? Kideok Cho, Hakyung Jung, Munyoung Lee, Diko Ko, Ted Taekyoung Kwon, and Yanghee

More information

Imperial College London

Imperial College London Imperial College London Department of Computing Challenges in Cooperation between Internet Service Providers and Peer-to-Peer Applications by Konstantinos G. Gkerpinis Submitted in partial fulfilment of

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

A PKI For IDR Public Key Infrastructure and Number Resource Certification

A PKI For IDR Public Key Infrastructure and Number Resource Certification A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect

More information

How To Understand The Power Of Icdn

How To Understand The Power Of Icdn MobiArch 2014 R-iCDN: an Approach Supporting Flexible Content Routing for ISP-operated CDN Song Ci High Performance Network Lab, Institute of Acoustics, Chinese Academy of Sciences Outline I. Background

More information

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1

Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1 Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1 Peter Triantafillou (contact author) Department of Computer Engineering and Informatics, University of Patras Rio

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

A Case for Dynamic Selection of Replication and Caching Strategies

A Case for Dynamic Selection of Replication and Caching Strategies A Case for Dynamic Selection of Replication and Caching Strategies Swaminathan Sivasubramanian Guillaume Pierre Maarten van Steen Dept. of Mathematics and Computer Science Vrije Universiteit, Amsterdam,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Lecture 6 Content Distribution and BitTorrent

Lecture 6 Content Distribution and BitTorrent ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent

More information

Mitigation of Random Query String DoS via Gossip

Mitigation of Random Query String DoS via Gossip Mitigation of Random Query String DoS via Gossip Stefano Ferretti, Vittorio Ghini Department of Computer Science, University of Bologna Bologna, Italy {sferrett, ghini}@cs.unibo.it arxiv:9.v2 [cs.cr] 2

More information

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Internet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr

Internet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Internet Architecture for Robust Mobility Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Contents Introduction IETF Activity Home Agent Reliability Protocol P2P-based Approaches ROAM and SAMP

More information

File sharing using IP-Multicast

File sharing using IP-Multicast File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion

More information

Should Internet Service Providers Fear Peer-Assisted Content Distribution?

Should Internet Service Providers Fear Peer-Assisted Content Distribution? Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis, UC Riverside Pablo Rodriguez, Microsoft Research Cambridge Konstantina Papagiannaki, Intel Research Cambridge

More information

Optimizing Server Power Consumption in Cross-Domain Content Distribution Infrastructures

Optimizing Server Power Consumption in Cross-Domain Content Distribution Infrastructures Optimizing Server Power Consumption in Cross-Domain Content Distribution Infrastructures Chang Ge, Ning Wang, Zhili Sun Centre for Communication Systems Research University of Surrey, Guildford, UK {C.Ge,

More information

Collaborative ISP-CP Live Streaming

Collaborative ISP-CP Live Streaming Collaborative ISP-CP Live Streaming C.-H. Him Cheng S.-H. Gary Chan Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong

More information

Peer to peer networks: sharing between peers. Trond Aspelund

Peer to peer networks: sharing between peers. Trond Aspelund Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server

More information

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

CPNI VIEWPOINT. SECURITY IMPLICATIONS OF IPv6. Disclaimer: MARCH 2011

CPNI VIEWPOINT. SECURITY IMPLICATIONS OF IPv6. Disclaimer: MARCH 2011 CPNI VIEWPOINT SECURITY IMPLICATIONS OF IPv6 MARCH 2011 Abstract: IPv6 is coming to a network near you. CPNI has extracted salient points from recently published documents to highlight some of the major

More information

DDoS Vulnerability Analysis of Bittorrent Protocol

DDoS Vulnerability Analysis of Bittorrent Protocol DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number

More information

CME: A Middleware Architecture for Network-Aware Adaptive Applications

CME: A Middleware Architecture for Network-Aware Adaptive Applications CME: A Middleware Architecture for Network-Aware Adaptive Applications Jun-Zhao Sun, Jari Tenhunen, and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500 4SOINFO,

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Performance Comparison of low-latency Anonymisation Services from a User Perspective

Performance Comparison of low-latency Anonymisation Services from a User Perspective Performance Comparison of low-latency Anonymisation Services from a User Perspective Rolf Wendolsky Hannes Federrath Department of Business Informatics University of Regensburg 7th Workshop on Privacy

More information

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

The Challenges of Stopping Illegal Peer-to-Peer File Sharing The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

An Efficient Load Balancing Technology in CDN

An Efficient Load Balancing Technology in CDN Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University

More information

Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure

Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure O. Ardaiz, F. Freitag, L. Navarro Computer Architecture Department, Polytechnic University of Catalonia,

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks

WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks K. D. Cho et al., IEEE INFOCOM 2012 Workshop, pp. 316-321, March 2012. January 17, 2013 Byeong-Gi Kim Park Laboratory,

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

QoE-Aware Multimedia Content Delivery Over Next-Generation Networks

QoE-Aware Multimedia Content Delivery Over Next-Generation Networks QoE-Aware Multimedia Content Delivery Over Next-Generation Networks M. Oğuz Sunay July 9, 2013 Second Romeo Workshop PAGE: 1 M. Oğuz Sunay, Özyeğin University Istanbul, July 9, 2013 Romeo High-quality

More information

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,

More information

Video Streaming with Network Coding

Video Streaming with Network Coding Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,

More information

Data Center Content Delivery Network

Data Center Content Delivery Network BM 465E Distributed Systems Lecture 4 Networking (cont.) Mehmet Demirci Today Overlay networks Data centers Content delivery networks Overlay Network A virtual network built on top of another network Overlay

More information

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,

More information

Experimentation with the YouTube Content Delivery Network (CDN)

Experimentation with the YouTube Content Delivery Network (CDN) Experimentation with the YouTube Content Delivery Network (CDN) Siddharth Rao Department of Computer Science Aalto University, Finland siddharth.rao@aalto.fi Sami Karvonen Department of Computer Science

More information

A Dell Technical White Paper Dell Storage Engineering

A Dell Technical White Paper Dell Storage Engineering Networking Best Practices for Dell DX Object Storage A Dell Technical White Paper Dell Storage Engineering THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND

More information

How To Create A P2P Network

How To Create A P2P Network Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised

More information

A Survey on Content Delivery of Web-Pages

A Survey on Content Delivery of Web-Pages International Journal of Computer Sciences and Engineering Open Access Survey Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Survey on Content Delivery of Web-Pages Aaqib Bashir 1 and Prof. T. H. Gurav 2

More information

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014 Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

Learning Management Redefined. Acadox Infrastructure & Architecture

Learning Management Redefined. Acadox Infrastructure & Architecture Learning Management Redefined Acadox Infrastructure & Architecture w w w. a c a d o x. c o m Outline Overview Application Servers Databases Storage Network Content Delivery Network (CDN) & Caching Queuing

More information

Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks

Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks Haiyong Xie, Yang Richard Yang, and Avi SilberSchatz Computer Science Department, Yale University, New Haven CT 06511, USA {haiyong.xie,yang.r.yang,avi.silberschatz}@yale.edu

More information

Using ICN in disaster scenarios (draft-seedorf-icn-disaster-00)

Using ICN in disaster scenarios (draft-seedorf-icn-disaster-00) Using ICN in disaster scenarios (draft-seedorf-icn-disaster-00) M. Arumaithurai, J. Seedorf, A. Tagami, K. Ramakrishnan, N. Blefari Melazzi IETF 87, Berlin ICNRG August 2013 Outline 1. Background of this

More information

for guaranteed IP datagram routing

for guaranteed IP datagram routing Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation

More information

2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System

2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System 2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System SUZUKI Ayako, OHMORI Keisuke, MATSUSHIMA Ryu, KAWABATA Mariko, OHMURO Manabu, KAI Toshifumi, and NISHIYAMA Shigeru IP traceback

More information

Building MPLS VPNs with QoS Routing Capability i

Building MPLS VPNs with QoS Routing Capability i Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358

More information

PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS

PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University

More information

SwiftStack Global Cluster Deployment Guide

SwiftStack Global Cluster Deployment Guide OpenStack Swift SwiftStack Global Cluster Deployment Guide Table of Contents Planning Creating Regions Regions Connectivity Requirements Private Connectivity Bandwidth Sizing VPN Connectivity Proxy Read

More information

SANE: A Protection Architecture For Enterprise Networks

SANE: A Protection Architecture For Enterprise Networks Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS

More information

Content Delivery Network (CDN) and P2P Model

Content Delivery Network (CDN) and P2P Model A multi-agent algorithm to improve content management in CDN networks Agostino Forestiero, forestiero@icar.cnr.it Carlo Mastroianni, mastroianni@icar.cnr.it ICAR-CNR Institute for High Performance Computing

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Before the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives

Before the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives Testimony of Fiona M. Alexander Associate Administrator, Office of International Affairs National Telecommunications and Information Administration United States Department of Commerce Before the Committee

More information

LOAD BALANCING AS A STRATEGY LEARNING TASK

LOAD BALANCING AS A STRATEGY LEARNING TASK LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT

More information

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering anidathi@yahoo.co.in jkumaribharat@yahoo.com

More information

Examining Proxies to Mitigate Pervasive Surveillance

Examining Proxies to Mitigate Pervasive Surveillance Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and

More information

Scalable Data Collection for Internet-based Digital Government Applications

Scalable Data Collection for Internet-based Digital Government Applications Scalable Data Collection for Internet-based Digital Government Applications [ Appeared in Proceedings of the 1st National Conference on Digital Government Research, 2001 ] W. C. Cheng C.-F. Chou L. Golubchik

More information

Towards a Peer-to-Peer Extended Content Delivery Network

Towards a Peer-to-Peer Extended Content Delivery Network Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi

More information

Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast

Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical

More information

Service Provider awareness Universal Apparatus

Service Provider awareness Universal Apparatus 1. Invention Title. Service Provider awareness Universal Apparatus 2. Invention Summary. An apparatus for universal Service Provider awareness by host computers. 3. Invention Description. a. Describe the

More information

DYNAMIC LOAD BALANCING IN A DECENTRALISED DISTRIBUTED SYSTEM

DYNAMIC LOAD BALANCING IN A DECENTRALISED DISTRIBUTED SYSTEM DYNAMIC LOAD BALANCING IN A DECENTRALISED DISTRIBUTED SYSTEM 1 Introduction In parallel distributed computing system, due to the lightly loaded and overloaded nodes that cause load imbalance, could affect

More information

The BitTorrent Protocol

The BitTorrent Protocol The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions

More information

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi,

More information

A Survey of Peer-to-Peer Network Security Issues

A Survey of Peer-to-Peer Network Security Issues 1 of 8 1/9/2008 12:32 PM A Survey of Peer-to-Peer Network Security Issues James Li Abstract In recent years, peer-to-peer (P2P) networks have soared in popularity in the form of file sharing applications.

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Network Security - ISA 656 Application Firewalls

Network Security - ISA 656 Application Firewalls Network Security - ISA 656 Application Angelos Stavrou August 20, 2008 Moving Up the Stack Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats

More information

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons

More information

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE., AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore

More information

An overview on Internet Measurement Methodologies, Techniques and Tools

An overview on Internet Measurement Methodologies, Techniques and Tools An overview on Internet Measurement Methodologies, Techniques and Tools AA 2012/2013 emiliano.casalicchio@uniroma2.it (Agenda) Lezione 24/04/2013 Part 1 Intro basic concepts ISP Traffic exchange (peering)

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

How To Understand The Power Of A Content Delivery Network (Cdn)

How To Understand The Power Of A Content Delivery Network (Cdn) Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information