Multicast Network Routers and End-Size Performance Analysis
|
|
|
- Sophia Tyler
- 5 years ago
- Views:
Transcription
1 Transience of Peers & Streaming Media Mayank Bawa, Hrishikesh Deshpande, Hector Garcia-Molina Computer Science Department, Stanford University Stanford, CA ABSTRACT Application level multicast schemes have traditionallybeen evaluated with respect to the eciency penalties incurred in migrating the multicast functionality from the network layer to the application layer. We argue that the current performance measures, and therefore design strategies, are incomplete as they do not consider transience of peers. The routers in application level multicast systems are participantclients, and not infrastructureunits. As such, the assumptions on the behavior of these application routers are signicantly dierent from the infrastructure routing units that traditional research has dealt with, especially in a peerto-peer setting where peers are multi-use and the managementis decentralized. We argue that the transience in peer behavior has implications on end-performance enabled. We outline a design philosophy that seeks to separate policy decisions in handling peer behavior from the end-application at a basic infrastructural peering layer. As a proof of concept, we have implementedapeering layer prototype, which isavailable for download. 1. INTRODUCTION Live streaming media will form a signicant fraction of internet trac in the near future. Recent trade reports indicate that if the current acceptance rate among end-users persists, streaming media could overtake television with respect to the size of the client base[1]. We expect the adoption trends for streaming media to be particularly remarkable in the context of peer-to-peer (P2P) systems. Since video streams are high bandwidth applications, even a small number of clients receiving the stream by unicast are often sucient to saturate bandwidth at the source. IP-Multicast [2] was proposed as an extension to Internet architecture to support multiple clients at network level. The deployment of IP Multicast has been slowed by dicult issues related to scalability, and support for higher layer This research was supported in part by NSF (Grant No. IIS ). Mayank Bawa is supported by a Sequoia Capital Stanford Graduate Fellowship. functionality like congestion control and reliability. Several recent research projects [3, 4, 5, 6] have argued for a multicast service at the application layer (end-host multicast). The service is to be simulated over unicast-links between hosts, forming an overlay network over end-hosts. The end-hosts in P2P systems form ad-hoc networks to contribute resources to the community, and in turn use resources provided by other members for a personal goal. Thus, members of a P2P system can be expected to share their bandwidth to spread a media stream to other clients. In principle then, an end-host multicast solution seems to be an ideal t. Indeed, several such schemes [7, 8, 9] have been developed over the last year. In practice, we believe however, that the migration of the multicast functionality from the network layer to the application layer leads to a subtle mismatch that has implications on end-application performance. The mismatch arises from a change in the characteristics of the routing infrastructure assumed by the end-application the behavior of routing elements (clients) in end-host multicast is very dierent from those (routers) in IP-Multicast. For example, consider the following scenario in streamingmedia delivery via multicast. During an end-hosts multicast session, a large fraction of clients (that were acting as routers) might unsubscribe together in the middle of the stream, partitioning the overlay network. The time taken to repair the partitions will result in loss of packets transmitted during the transience period. Such anevent, while probable in end-host multicast, is in contrast to network-level multicast where clients only occur as leaves in the multicast tree built on routers. Router failures are not as frequent, and the chances of simultaneous failures of a large number of routers, occurring frequently over the stream duration, is extremely small. Hence, while packet losses due to router failures is not a probable eventuality in IP-Multicast, it must be accountedforinanevaluation of an end-host multicast proposal. Unfortunately, conventional evaluations of such proposals have glossed over such implications on endapplication performance. It is our thesis that the primary challenge in any P2Parchitecture will be the masking of such peer transience. We will argue that end-applications are not easily insulated from the behavior of the new infrastructure units of a P2P network. A P2P network can be large with hundreds of nodes at
2 any given instant. More signicantly, peers are autonomous, unpredictable, and may have short (of the order of minutes) lifetimes. Thus, it is critical for widespread adoption of any P2P application that the service be capable of good performance over a large and dynamic system, and the underlying architecture handle such transience gracefully. Correspondingly, in this position paper, we will argue the following two points: We revisit the issue of evaluating an end-host multicast scheme and urge the use of end-application metrics to account for the loss in performance due to the transience of routing units (Section 3). Weintroduce the design philosophy ofapeering layer that insulates peer transience from end-applications. As a proof of concept, we presentanarchitecture for streaming media over a P2P network that uses the peering layer to eciently enable a connected topology (Sections 4 and 5). The rest of this position paper outlines the end-host multicast problem and presents conventional evaluation metrics (Section 2), summarizes current implementation status of the peering layer 1 (Section 6), and relates this work to other projects (Section 7). We conclude in Section PROBLEM AND PRELIMINARIES In this section, we give an overview of a simple end-host multicast architecture to establish the vocabulary, and then point out conventional schemes used to evaluate end-host multicast proposals. A media stream is a time ordered sequence of packets that is logically composed of two channels: data (served using unreliable RTP/UDP) and control (sent using reliable RTSP/TCP) channels. A live stream has the important property of being history-agnostic: a group-member is only interested in the stream from the instant of its subscription onwards. S P P 1 P 2 P 2 3 P 3 Unicast edges on physical network topology : Router, S: Source, P i : Peer i P 4 P 1 Application-level multicast tree Figure 1: An application level multicast tree built on the peers A simple architecture for an end-host multicast service organizes the group members into a source-specic spanning tree as shown in Figure 1. The gure uses dotted lines to show the ow of data packets, while the solid lines represent the underlying physical wires. Each nodep i (including the source S) forwards the stream to all its immediate children 1 Askeletal implementation of the peering layer is available for download from [11]. S P 4 (if any). Eectively, each host acts as a multicast router, replicating and forwarding packets, and assuming responsibility for group management. The multicast tree is maintained incrementally as nodes join and leave. The scheme species protocols to enable an incoming client P i to identify an existing node in the tree that can act as P i's parent (join policy), and to enable a repair of partitions in the tree when a client opts out of its multicast session (leave policy). The bandwidth requirements of S are now shared by the network of clients, providing a potentially scalable solution for media broadcast. However, there is a loss in eciency entailed by moving the multicast functionality up the stack. For example, observe that the multicast tree is an overlay network the actual forwarding paths in the physical network might visit the same network router multiple times. Thus, in Figure 1, the router on the path from S to P1 will see each packet twice: once when S sends the packet to P1, and next when P1 forwards the packet to P2. Moreover, routing packets along the overlay network results in increased delay from the source S to a client P i. Stemming from the inuential work of [3] that identied such eciency concerns, subsequent proposals have been evaluated with respect to the metrics of stress, relative delay penalty, and normalized resource usage. Thestress ofaphys- ical link is dened as the number of identical copies of a packet carried by the link. The ratio of the delay between the source and a recipient along the overlay to the unicast delay between them is dened as the relative delay penalty. Finally, resource usage characterizes the network resources consumed in the process of data P delivery to all recipients. L Correspondingly, it is dened as di i=1 si, where L is the number of links active inmulticast, d i is the delay of link i, and s i is the stress of link i. Observe that these metrics succinctly capture concerns on the loss in eciency. However, note also that it is not possible to predict the eects of transience on end-application performance using the above eciency metrics. 3. PERFORMANCE ANALYSIS FOR END- SYSTEM MULTICAST In this section, we dene a new set of end-system metrics to characterize performance of an end-host multicast solution. We then present a performance analysis scheme to enable the study of eects of router-transience on such metrics under a candidate solution. An end-performance evaluation must, fundamentally, be inuenced by the application semantics. A streaming media application exhibits the following characteristics that can stress the candidate architecture: Sensitivity to data loss that requires minimal packet loss while accommodating changes in membership, and Timeliness constraints that require changes in membership to be accommodated quickly. Correspondingly, our end-system metrics to characterize performance for streaming media are packet-losses, median lostblock widths, relative delay-penalty, and time to rst packet (response time) dened as follows:
3 Let N i be the total number of packets streamed by S during a client P i's lifetime. Let N li be the number of packets that were streamed by S during P i's lifetime, but not received by P i. Then, packet losses observed at P i is dened as N li=n i. The disruptions in the stream become visible to the enduser when packet losses at P i are consecutive, occurring as blocks of lost packets. Hence, it is important to record the sizes of lost packet-blocks at each client P i. The median lost-block width at a client P i, dened as the median of all lost packet-blocks observed over the lifetime of P i, accounts for such disruptions. The response-time for a client P i is dened as the time taken to receive the rst stream packet at P i after a subscribe request was sent by P i. The relative delay-penalty ataclient is dened as before (Section 2). Given the above set of performance metrics, we next outline an analysis scheme. We propose that an evaluation of a multicast proposal must answer the following questions: What are the eects of the join policies on the endsystem metrics? What are the parameter ranges over which the join policies can scale? What are the eects of the leave policies on the shape of the multicast topology? Are the leave policies successful in keeping the topology connected, compact, and stable? Which combinations of join and leave policies perform optimally with respect to the packet loss metrics? How do the policies compare against a centralized unicast scheme on the response time metric of time to rst packet? Does the architecture scale gracefully with increase in the size of the client-base? Live streaming media often gives rise to ash crowds at the source, as the clients attempt to subscribe within a short interval of the start of the event. How doesthe architecture respond to such ashcrowds? The clients receiving a stream have unpredictable lifetimes. How does the architecture behave under a range of expected lifetimes of the clients? Does the topology remain stable and connected for small lifetimes of clients? The clients may have a range of bandwidth capacities, from T3 to symmetric DSL. What is the eect of available uplink bandwidth capacity at a node on the endsystem metrics? A third and nal piece remains to be specied the behavior model of peers in a P2P network. We believe suchmodeling will be the source of interesting future work. Several P2P systems enjoy considerable deployment and can be used to collect behavioral traces. With these three pieces in hand, an end-host multicast proposal can be evaluated either through analysis or simulations. To summarize, we believe that the eciency metrics discussed in Section 2, while essential, were designed to characterize the eects of a functionality migration on the lower (network) layer alone. Unfortunately, it is not only the lower layers that have to bear a penalty for such a migration. Current end-applications are not designed to handle such unpredictability in the behavior of the infrastructure units, resulting in degradation of end-performance returned. We believe that an evaluation of a candidate multicast scheme under the analysis scheme proposed above will enable a more realistic and accurate test of feasibility. 4. THE PEERING LAYER As we argued in Section 1, masking peer transience is the primary challenge in any P2P architecture that supports an end application. In this section, we describe the peering layer design philosophy that serves to hide topology changes from the above layers. The peering layer is envisaged as a basic P2P infrastructure layer that exists below the end application. The peering layer is a placeholder for policies that govern topology maintainance insertion and deletion of peers. By layering the end service on top of a core transience management service in the peering layer, we believe P2P systems will gain in ease of development. As a proof of concept that the peering layer functionality is useful in the development of P2P services, we have designed a simple tree-based multicast architecture layered on the peering layer. The solution, called PeerCast, uses the peering layers at dierent nodes to establish and maintain a multicast tree. The PeerCast solution can work with short-lived nodes. Importantly, as we show elsewhere[10], by separating transience management from end applications, we were able to enable existing implementations of media players at a peer to use the peering layer. Thus peers were conveniently enabled for stream distribution without changing their existing code bases. 4.1 The Design Philosophy We start by motivating the existence of a peering layer as a practical utility. Notice that a media stream is logically composed of two channels: data and control. An instance of the data and control channels taken together, between a server and a client constitutes a data-transfer session. Such a session is distinguished from an application session which begins when a client subscribes to a stream from a source, and ends when the client unsubscribes. An application session can subsume several data-transfer sessions as the client changes servers from which it receives feed for a given stream. However, current implementations of most applications assume a unicast service, and bind the two sessions irrevocably together. We introduce a basic P2P infrastructure layer between the application and the transport layers for streaming that breaks the coupling between the two sessions. All communication between application and transport layers passes through the peering layer, as shown in Figure 2. Data transfer sessions are established between the peering layers at the two nodes. The end-points are identied by the tuple h Server IP-address, Server port, Client IP-address, Client port, Stream URL i. The rst four components identify the transport end-points involved in the session. The last component serves to identify the specic stream data is intended for. Application sessions are established between the peering layer and the end application. The peering layer allows the appli-
4 Live Video Stream Peer #1 Application Layer (QuickTime, RealPlayer) RTSP Peering Layer TCP UDP TCP IP layer downwards Appln Layers Peer #2 Application Layer (QuickTime, RealPlayer) RTSP Peering Layer UDP IP layer downwards 4.4 Managing Unsubscribe of Nodes If a node n wishes to unsubscribe from the stream, it sends a leave message to its parent p. The parent p frees up resources dedicated to n at its side. However, the descendants of n are now disconnected from s, and experience a break in the stream. To enable a recovery following its unsubscribe, n sends redirects all its immediate children C to some target t (e.g., the source s, ortheparentofn). The nodes in C then start the process of nding an unsaturated server by contacting t, as discussed above. Figure 2: A layered architecture of a peer cation layer above to specify the stream to obtain, through a \get-stream" interface. Given a stream URL, the peering layer locates a server which can provide the stream, and establishes a data-transfer session with the server. In the event of a data-transfer session termination, it locates a new server for data feed, and restarts the ow of data. If an alternate server cannot be found, an error is agged to the application above. The application session survives these changes, leaving the end application unaware and, indeed, unconcerned, of shifts in the underlying multicast topology, as it should be. The guarantees provided by the peering layer reect those of the transport layer protocol used in the data-transfer session (for which it has to maintain state). In addition, it guarantees that the data feed to the application above will be maintained as long as an unsaturated server can be found. 4.2 The Redirect Primitive The peering layer supports a simple, lightweight redirect primitive used to eect changes in the topology. The peering layer uses redirects as hints, to enable discovery of an unsaturated node in the network. A redirect message is sent by a peer p to another peer c which is either opening a data-transfer session with p, or has a session already open. The message species a target peer t. On receipt of the redirect message, c closes its data-transfer session with p, and tries to establish a data-transfer session with t, for the same stream URL. Note that such redirect messages are produced and used at the peering layer, and the application above is unaware of such messages. Thus, the application session persists despite changes in the datatransfer sessions. 4.3 Discovering an Unsaturated Server A new node n seeking the live stream needs to be able to discover an unsaturated node in the multicast group. The node n contacts the source s of the stream at the known URL. If s is unsaturated, it accepts n as its child and establishes a data-transfer session with n. Otherwise, s redirects n to one of its immediate children c. Then, n attempts to setup a data-transfer session with c. The process continues iteratively, until n gets accommodated. If n is unable to nd an unsaturated node within some specied number of tries, the peering layer ags a resource unavailable error to the upper application-layer. 4.5 Handling Failures of Nodes Intermediate nodes might fail, without being either able to inform their parent, or send redirect messages to their children. The overlay network needs to rst detect such a failure, and then recover from it. The peering layer at a node uses a heart-beat mechanism to detect failures, and recovers by following the unsaturated-server discovery process as mentioned in Section POLICIES FOR TOPOLOGY MAINTE- NANCE The peering layer discussed in Section 4 was said to serve as a placeholder for join and leave policies. Clearly, the nature of policies depend on the unique end application supported. In this section, we discuss simple candidate policies to show that the twin goals of performance and eciency can be attained simultaneously by decisions conned at the peering layer. 5.1 Improving End-Application Performance As we observed in Section 3, the end-system performance is characterized by packet losses, packet delays, and response times. It can be shown that the shape of the multicast tree has implications on the end-system metrics. In fact, it is easy to derive the following result. Theorem 1. Under homogeneous unicast edge and node characteristics, an almost-complete spanning tree is the optimal overlay tree for packet loss, packet delay, and time to rst packet metrics. The shape of the multicast tree is determined by the topology maintaining policy. Thus, an optimal policy is one that maintains an almost-complete spanning tree. Such a policy can then be implemented using the mechanisms we discussed in Section Improving Overlay Efficiency (or Adapting to Network Dynamics) The multicast tree that has been formed using the policies discussed in Section 4 does not consider network attributes like link latencies, congestion, or peer bandwidths. Moreover, these quantities are dynamic, and it is important that the topology is rearranged in keeping with dynamic measurements of these quantities. Indeed, a lot of the previous work [3, 4, 5, 6, 12] in end-hosts multicast has focussed on these aspects, and suggested useful heuristics that can be included in the protocol to enable low penalties in eciency
5 metrics. We indicate below how such heuristics can be used with our tree management policies of Section 4. Nodes x and y that seek to establish a data-transfer session from x to y can compute a cost function F (x y) tocharacterize network proximity, unicast latency, and bandwidth capacity between them [4]. Given such a cost value, new members can join the multicast tree as suggested below. Knock-Downs : Each node n periodically recomputes F (n c) for each of its children c. For each incoming peer x that contacts a node n in the tree, F (n x) is computed. If n is unsaturated, it accepts x asachild. If n is saturated, it compares F (n x) with the maximum F (n c) among all of its children c. If F (n x) ischeaper, then n accepts x as its child, and redirects the child with the most cost. Otherwise, x contacts each ofn's children, and tries to connect to the least cost candidate node. Join-Flip: Each internal node n periodically computes F (p n) for its parent p. A new incoming client x sends a F (p x) along with its request to n. If F (p x)+f (x n) is less than F (p n)+f (n x), n closes its data transfer session with p, redirects x to p, and then itself to x. Such a policy is used in [6] to form ecient trees. We can also dene incremental optimization heuristics that rearrange an existing overlay to improve eciency. Maintain-Flip: This policy is similar to the Join-Flip discussed above. Instead of working with a new incoming client, existing nodes in the overlay tree are swapped. Each node n computes F (p n), F (n c) for its parent p and each of its children c periodically. If F (p n) + F (n c) is more than F (p c)+f (c n) for some child c, the positions of n and c are swapped. The work in [6] provides similar policies to build near-optimal trees. The work in [3, 5] uses such measures as part of their routing protocols to build a spanning tree with low eciency penalties. Leaf-Sink: The authors in [13] propose a centralized algorithm to sink unstable or low-bandwidth nodes to the bottom of the tree. They also propose Redundant Virtual Links in the tree, which allow nodes to receive the same packet from multiple dierent sources, leading to decreased packet losses. 6. STATUS The PeerCast system as described is under development. A few simple join and leave policies have been designed, implemented, and eld tested. A discrete event based simulator has been implemented to evaluate PeerCast as outlined in Section 3. The initial results from eld tests and simulations are encouraging. We are in the process of designing and conducting more detailed simulations. 7. RELATED WORK To place our work in the context of proposed end-host multicast solutions, we cartooned existing proposals as in Figure 3 that illustrates the domain characteristics catered to. The horizontal axis plots the size of multicast group that can be supported. The vertical axis plots the assumed lifetime of hosts over which the overlay network is formed. The solutions indicated in Figure 3 are a representative set of wider work done in the eld. Longetivity of nodes (relative to session length) Narada NaradaConf ALMI (Conferencing) Tens Overcast ScatterCast (Enterprise-wide streaming) Bayeux Delaunay CAN-based (Reliable file transfers) PeerCast (Unreliable media streaming) Hundreds Thousands Size of multicast group Figure 3: Classifying dierent end-host multicast proposals. Solutions in the left portion of the grid [3, 4, 12] have been proposed for multicast over a group of tens of nodes, most of which live through the duration of the session. An example application domain is video conferencing, wherein participants are few (tens of members), and members live through most of the session. The top-right portion of the grid lists proposals [5, 6] that can scale to thousands of nodes, but assume existence of reliable, long-lived infrastructure hosts over which overlays are constructed. As such, these solutions are not adaptable to P2P systems. The middle-right portion lists proposals [7, 8, 9] that rely on primitives proposed in a P2P context to accommodate thousands of clients. These solutions have been proposed and tested in domains in which most of the members are expected to persist through the session. To the best of our knowledge, these proposals have not been proven to scale for hundreds of short-lived nodes forming a dynamic group. The solution we propose, PeerCast, by being aware of the need to manage and mask peer transience from the endapplication is able to push down on the longetivity axis in the grid. PeerCast is designed to scale to hundreds of short lifetime nodes that participate in long-durationed multicast session transmitted over unreliable unicast UDP/RTP. 8. CONCLUSIONS In this paper, we argued that the migration of the multicast functionality from the network layer to the application layer results in a fundamental shift in the underlying infrastructure. The infrastructure units are now participating clients, that are known to be more whimsical and transient that network routers. The observation is especially true for P2P networks, where the participating peers are the providers of an end-service. We urge that the end-host multicast schemes be evaluated on end-system performance metrics of relative delay-penalty, response time, packet losses, and lost-block widths. We indicated that masking peer transience is a primary challenge in such a domain. We introduced the design philosophy of a peering layer at each peer that isolates policies for maintaining the topology from end-application functionality. The applications at a peer now need not be aware of a change in the server providing its data feed. 9. REFERENCES [1] Shannon Dorey, \Streaming media - will it overtake television?,"
6 [2] S. Deering, \Multicast routing in a datagram internetwork," PhD Thesis, Stanford University, California, [3] Y. Chu, S. Rao, and H. Zhang, \A case for end system multicast," in Measurement and Modeling of Computer Systems, 2000, pp. 1{12. [4] Y. Chu, S. G. Rao, S. Seshan, and H. Zhang, \Enabling conferencing applications on the internet using an overlay multicast architecture," in Proc. of the ACM SIGCOMM, [5] Y. Chawathe, \Scattercast: An architecture for internet broadcast distribution as an infrastructure service," PhD Thesis, University of California, Berkeley, [6] J. Jannotti, D. Giord, K. Johnson, M. Kaashoek, and J. O'Toole, \Overcast: Reliable multicasting with an overlay network," in Proceedings of the Fourth Symposium on Operating Systems Design and Implementation, 2000, pp. 197{212. [7] S. Ratnasamy, M. Handley, R. Karp, and S. Shenker, \Application-level multicast using content-addressable networks," in Networked Group Communication, 2001, pp. 14{29. [8] S. Zhuang, B. Zhao, A. Joseph, R. Katz, and J. Kubiatowicz, \Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination," in Proceedings of the Eleventh International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 2001), [9] J. Liebeherr, M. Nahas, and W. Si, \Application-level multicast with delaunay triangulations," Tech. Rep. CS , University of Virginia, CS Dept., [10] H. Deshpande, M. Bawa, and H. Garcia-Molina, \Streaming live media over peers," Tech. Rep , CS Dept., Stanford University, [11] \ [12] D. Pendarakis, S. Shi, D. Verma, and M. Waldvogel, \ALMI: An application level multicast infrastructure," in Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), 2001, pp. 49{60. [13] V. Roca and A. El-Sayed, \A host-based multicast (hbm) solution for group communications," in 1st IEEE International Conference on Networking, 2001.
Streaming Live Media over Peers
Streaming Live Media over eers aper Id: 620, No. of pages: 14 Abstract The high bandwidth required by live streaming video greatly limits the number of clients that can be served by a source using unicast.
The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points
The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points Kay Sripanidkulchai, Aditya Ganjam, Bruce Maggs, and Hui Zhang Instructor: Fabian Bustamante Presented
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
Design and Deployment of Locality-aware Overlay Multicast Protocol for Live Streaming Services
Design and Deployment of Locality-aware Overlay Multicast Protocol for Live Streaming Services Xuping Tu, Hai Jin, Dafu Deng, Chao Zhang, and Quan Yuan Cluster and Grid Computing Lab Huazhong University
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
Efficient Data Retrieving in Distributed Datastreaming
Efficient Data Retrieving in Distributed Datastreaming Environments Yunhao Liu, Jun Miao, Lionel M. Ni, and Jinsong Han Department of Computer Science Hong Kong University of Science and Technology Clear
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat
HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Reliable Peer-to-peer End System Multicasting through Replication
Reliable Peer-to-peer End System Multicasting through Replication Jianjun Zhang, Ling Liu, Calton Pu and Mostafa Ammar College of Computing, Georgia Institute of Technology {zhangjj, lingliu, calton, ammar}@cc.gatech.edu
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
Traceroute-Based Topology Inference without Network Coordinate Estimation
Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water
Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks
: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks Liangzhong Yin and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 16802
Thesis work and research project
Thesis work and research project Hélia Pouyllau, INRIA of Rennes, Campus Beaulieu 35042 Rennes, [email protected] July 16, 2007 1 Thesis work on Distributed algorithms for endto-end QoS contract
Oscillations of the Sending Window in Compound TCP
Oscillations of the Sending Window in Compound TCP Alberto Blanc 1, Denis Collange 1, and Konstantin Avrachenkov 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France 2 I.N.R.I.A. 2004
Research on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
Argonne National Laboratory, Argonne, IL USA 60439
LEGS: A WSRF Service to Estimate Latency between Arbitrary Hosts on the Internet R Vijayprasanth 1, R Kavithaa 2,3, and Rajkumar Kettimuthu 2,3 1 Department of Information Technology Coimbatore Institute
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network
White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming
Load Balancing Mechanisms in Data Center Networks
Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Network Research Group, School of Computer Sciences Universiti Sains Malaysia11800 Penang, Malaysia Abstract
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
An Efficient Load Balancing Technology in CDN
Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University
Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities
Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities Kavitha Ranganathan, Adriana Iamnitchi, Ian Foster Department of Computer Science, The University
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea [email protected], [email protected],
How To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
Denial of Service Attacks and Resilient Overlay Networks
Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University Motivation: Network Service Availability Motivation:
Facility Usage Scenarios
Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
Whitepaper. Controlling the Network Edge to Accommodate Increasing Demand
Whitepaper Controlling the Network Edge to Accommodate Increasing Demand February 2007 Introduction A common trend in today s distributed work environment is to centralize applications and the data previously
Fatemeh Rahimian [email protected]. Amir Payberah [email protected]
P2P Live Streaming Fatemeh Rahimian [email protected] Amir Payberah [email protected] 1 Outline Introduction P2P multicast algorithms Comparison Future work Summary 2 Outline Introduction Infrastructure-based
Chapter 4 Multi-Stage Interconnection Networks The general concept of the multi-stage interconnection network, together with its routing properties, have been used in the preceding chapter to describe
Global Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 [email protected]
Experiment of network services invocation in the Orange testbed The CINA interface
Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs [email protected] Workshop «Optimisation of Network
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer
A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China [email protected]
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University
diversifeye Application Note
diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs
AN INITIAL PEER CONFIGURATION ALGORITHM
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS Tomoyuki Ishii and Atsushi Inoie * Department of Network Engineering, Kanagawa Institute of Technology, Atsugi-city, Japan
A Conference Control Protocol for Highly Interactive Video-conferencing
A Conference Control Protocol for Highly Interactive Video-conferencing Ruibiao Qiu Fred Kuhns Jerome R. Cox Applied Research Laboratory Department of Computer Science Washington University Saint Louis,
AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
How To Monitor Performance On Eve
Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,
TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding
MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with
MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican
Internet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, [email protected] Ling Guan, [email protected] 1 Outline Internet video streaming Overview Video coding Approaches for video
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
A Tool for Multimedia Quality Assessment in NS3: QoE Monitor
A Tool for Multimedia Quality Assessment in NS3: QoE Monitor D. Saladino, A. Paganelli, M. Casoni Department of Engineering Enzo Ferrari, University of Modena and Reggio Emilia via Vignolese 95, 41125
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Truffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast
Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
David R. McIntyre CS Department, Cleveland State University Cleveland, Ohio 44101
Data Distribution in a Wireless Environment with Migrating Nodes David A. Johnston EECS Department, Case Western Reserve University Cleveland, Ohio 44106 David R. McIntyre CS Department, Cleveland State
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
P2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross [email protected], {YongLiu, Panwar, Ross}@poly.edu, [email protected]
Multimedia Networking and Network Security
CMPT371 12-1 Multimedia Networking and Network Security 1 Multimedia Networking and Network Security This note is based on Chapters 7 and 8 of the text book. Outline of multimedia networking Multimedia
Modular Communication Infrastructure Design with Quality of Service
Modular Communication Infrastructure Design with Quality of Service Pawel Wojciechowski and Péter Urbán Distributed Systems Laboratory School of Computer and Communication Sciences Swiss Federal Institute
Disaster-Resilient Backbone and Access Networks
The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada ([email protected])
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks
1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many
An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 81 An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks Krishna Phani Gummadi, Madhavarapu
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Bandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
Multicasting in Mobile Ad-Hoc Networks: Achieving High Packet Delivery Ratios
Multicasting in Mobile Ad-Hoc Networks: Achieving High Packet Delivery Ratios Thomas Kunz Systems and Computer Engineering Carleton University Abstract Multicasting is intended for group-oriented computing.
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
