Airlift: Video Conferencing as a Cloud Service using Inter- Datacenter Networks

Size: px
Start display at page:

Download "Airlift: Video Conferencing as a Cloud Service using Inter- Datacenter Networks"

Transcription

1 Airlift: Video Conferencing as a Cloud Service using Inter- Datacenter Networks Yuan Feng Baochun Li Bo Li University of Toronto HKUST 1

2 Multi-party video conferencing 2

3 Multi-party video conferencing Source Conferencing session Bandwidth demanding and delay sensitive! 2

4 Existing solutions 3

5 Existing solutions Client-server Google+ Hangouts Dedicated server re-distributes video flows Resource bottleneck as the system scales up 3

6 Existing solutions Client-server Google+ Hangouts Dedicated server re-distributes video flows Resource bottleneck as the system scales up Peer-to-peer Skype Peers in the same conferencing session cooperate to relay video flows 3

7 Peer-to-Peer Bottleneck 1 3 link 2 4 4

8 Peer-to-Peer Bottleneck 1 3 link 2 4 4

9 Peer-to-Peer Bottleneck 1 3 link 2 4 needs to minimize the load on the bottleneck 4

10 Peer-to-Peer Bottleneck 1 3 link 2 4 needs to minimize the load on the bottleneck But where is the bottleneck? 4

11 With a single datacenter 1 3 D

12 With a single datacenter 1 3 D

13 With a single datacenter 1 3 D

14 With a single datacenter 1 3 D1 2 4 may still send multiple copies at the bottleneck 5

15 Inter-datacenter networks 6

16 Inter-datacenter networks Cloud providers usually deploy a number of geographically distributed datacenters e.g., Amazon EC2 6

17 Inter-datacenter networks Cloud providers usually deploy a number of geographically distributed datacenters e.g., Amazon EC2 Those datacenters are inter-connected through high-capacity links 6

18 Inter-datacenter networks Cloud providers usually deploy a number of geographically distributed datacenters e.g., Amazon EC2 Those datacenters are inter-connected through high-capacity links Can we use inter-datacenter networks in the cloud to support better video conferencing services? 6

19 With the inter-datacenter network 1 3 D1 D

20 With the inter-datacenter network 1 3 D1 D

21 With the inter-datacenter network 1 3 D1 D

22 With the inter-datacenter network distribute the video on behalf 1 3 of the sender D1 D2 2 4 Maximize the flow rate naturally, yet with a simplified protocol design 7

23 Motivation through experiments Cloud / P2P Throughput (Mbps) Delay (msec) Toronto-Beijing 2.2 / / 148 Cambridge-Sao Paulo 1.7 / / 204 Seoul-Moscow 7.2 / / 436 Substantially improved throughput with similar delays! 8

24 Our design: Airlift 9

25 Key idea 10

26 Key idea Source video 10

27 Key idea Full-service broker 10

28 Key idea Full-service broker Rate control 10

29 Key idea Full-service broker Rate control 10

30 Key idea Full-service broker Rate control 10

31 Aggregated sessions Aggregating video flows from the same source datacenter to the same subset of destination datacenters Each aggregated session is a multicast session in the inter-datacenter network 11

32 12

33 12

34 12

35 12

36 Objective: maximize the total throughput with a constraint on endto-end delays 12

37 Maximizing the total throughput across all multicast sessions Traditional wisdom resorts to Steiner tree packing, which is NP-Complete In Airlift, we use network coding to formulate the optimization problem as a linear program 13

38 Conceptual flows with network coding Source D1 D2 14

39 Conceptual flows with network coding Source a b a b a a+b b a+b a+b D1 D2 14

40 Conceptual flows with network coding Source a b a b a a+b b a+b a+b D1 D2 14

41 Conceptual flows with network coding split Source replicate a b The effective flow is the merge maximal a b conceptual flow a a+b b in the same session a+b a+b D1 D2 14

42 Realizing conceptual flows (1) Replicate (2) Split (3) Merge 15

43 Realizing conceptual flows (1) Replicate (2) Split (3) Merge Source routing 15

44 Realizing conceptual flows (1) Replicate (2) Split (3) Merge Source routing Perform network coding with incoming flows 15

45 Formulating the problem max s.t. X Xapple X x i j(p)/w i, 8i, j =1,...,k i X p2p i j x i j(p) apple x i (e), 8i, j =1,...,k i p2pj i(e) X x i (e) apple C(e), 8e 2E i x i j(p) 0, x i (e) 0, X 0, 8p 2P i j, 8i, j =1,...,k i, 8e 2E 16

46 Formulating the problem max s.t. X X Total throughput Xapple x i j(p)/w i, 8i, j =1,...,k i X p2p i j x i j(p) apple x i (e), 8i, j =1,...,k i p2pj i(e) X x i (e) apple C(e), 8e 2E i x i j(p) 0, x i (e) 0, X 0, 8p 2P i j, 8i, j =1,...,k i, 8e 2E 16

47 Formulating the problem max s.t. X X Total throughput Xapple x i j(p)/w i, 8i, j =1,...,k i X p2p i j Weighted proportional fairness x i j(p) apple x i (e), 8i, j =1,...,k i p2pj i(e) X x i (e) apple C(e), 8e 2E i x i j(p) 0, x i (e) 0, X 0, 8p 2P i j, 8i, j =1,...,k i, 8e 2E 16

48 Formulating the problem max s.t. X X Total throughput Xapple x i j(p)/w i, 8i, j =1,...,k i X p2p i j Weighted proportional fairness x i j(p) apple x i (e), 8i, j =1,...,k i p2pj i(e) X Effective flow on edge e x i (e) apple C(e), 8e 2E i x i j(p) 0, x i (e) 0, X 0, 8p 2P i j, 8i, j =1,...,k i, 8e 2E 16

49 Formulating the problem max s.t. X X Total throughput Xapple x i j(p)/w i, 8i, j =1,...,k i X p2p i j Weighted proportional fairness x i j(p) apple x i (e), 8i, j =1,...,k i p2pj i(e) X Effective flow on edge e x i (e) apple C(e), 8e 2E i Capacity constraint on edge e x i j(p) 0, x i (e) 0, X 0, 8p 2P i j, 8i, j =1,...,k i, 8e 2E 16

50 Formulating the problem max s.t. X X Total throughput Xapple x i j(p)/w i, 8i, j =1,...,k i X p2p i j Weighted proportional fairness Linear program that x i j(p) apple x i (e), 8i, j =1,...,k i p2pcan j i(e) be solved by any X Effective flow on edge e xstandard i (e) apple C(e), LP 8e 2E solver i Capacity constraint on edge e x i j(p) 0, x i (e) 0, X 0, 8p 2P i j, 8i, j =1,...,k i, 8e 2E 16

51 Having the optimal flow rate in each aggregated session, what should be the protocol design in Airlift? 17

52 Transport with network coding Packets in a generation Coded packets h e h e Video flow l Encode Decode l l o l o generations One coded packet = c 1 h+c 2 e+c 3 l+c 4 l+c 5 o 18

53 Transport with network coding Packets in a generation Coded packets h e h e Video flow l Encode Decode l l o l o generations One coded packet = c 1 h+c 2 e+c 3 l+c 4 l+c 5 o Use UDP as the transport protocol, together with TFRC 18

54 The sliding window Combine the design of a sliding window with generations A sliding window shows all packets that have been sent but haven t been acknowledged at the destination Destination will hold multiple buckets for different generations, and will acknowledge the degrees of freedom 19

55 Sliding window Generation 1 Generation RTT Source S i Time ACK (4,3,2) ACK (3,2) ACK (4,2) ACK (2) Destination R i j Time Active bucket Inactive bucket 20

56 Performance evaluation 21

57 Experimental setup We have implemented Airlift, and used the Amazon EC2 inter-datacenter network in our experiments Used PlanetLab nodes as users Logged statistics every 30 seconds, and used link capacities measured live Compared with P2P 22

58 End-to-end delay (Airlift) Total throughput (Airlift) End-to-end delay (P2P) Total throughput (P2P) msec Mbps 23

59 230 End-to-end delay (Airlift) Total throughput (Airlift) End-to-end delay (P2P) Total throughput (P2P) msec Mbps Toronto-Beijing Vancouver-Berin Seoul-Rio 0 23

60 230 End-to-end delay (Airlift) Total throughput (Airlift) End-to-end delay (P2P) Total throughput (P2P) msec Mbps Toronto-Beijing Vancouver-Berin Seoul-Rio 0 23

61 230 End-to-end delay (Airlift) Total throughput (Airlift) End-to-end delay (P2P) Total throughput (P2P) msec Mbps Toronto-Beijing Vancouver-Berin Seoul-Rio 0 23

62 230 End-to-end delay (Airlift) Total throughput (Airlift) End-to-end delay (P2P) Total throughput (P2P) The total throughput is msec to 24 times better, with similar delays 20 Mbps Toronto-Beijing Vancouver-Berin Seoul-Rio 0 23

63 Airlift: towards cloud-based video conferencing Uses inter-datacenter networks to provide a multi-party video conferencing service with high quality The objective is to maximize the total throughput within a delay constraint 24

64 25

65 Thank you iqua.ece.toronto.edu 25

Airlift: Video Conferencing as a Cloud Service using Inter-Datacenter Networks

Airlift: Video Conferencing as a Cloud Service using Inter-Datacenter Networks Airlift: Video Conferencing as a Cloud Service using Inter-Datacenter Networks Yuan Feng, Baochun Li Department of Electrical and Computer Engineering University of Toronto Abstract It is typical for enterprises

More information

On the Benefits of Network Coding in Multi-party Video Conferencing. Yiwei Pu

On the Benefits of Network Coding in Multi-party Video Conferencing. Yiwei Pu On the Benefits of Network Coding in Multi-party Video Conferencing by Yiwei Pu A thesis submitted in conformity with the requirements for the degree of Master of Applied Science Graduate Department of

More information

Six reasons to access cloud services over a private connection and not the Internet

Six reasons to access cloud services over a private connection and not the Internet 1 Six reasons to access cloud services over a private connection and not the Internet The benefits of moving to cloud computing are stronger than ever for New Zealand organisations. Selecting the best

More information

VoIP over P2P networks

VoIP over P2P networks VoIP over P2P networks Víctor Ramos UAM-Iztapalapa Redes y Telecomunicaciones Victor.Ramos@ieee.org http://laryc.izt.uam.mx/~vramos What is the Internet? The IP protocol suite and related mechanisms and

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

Content Distribution over IP: Developments and Challenges

Content Distribution over IP: Developments and Challenges Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,

More information

How To Write A Blog Post On Dropbox

How To Write A Blog Post On Dropbox Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IMC 2012 Boston Motivation and goals 1/14 Personal cloud storage

More information

Bandwidth Allocation in a Network Virtualization Environment

Bandwidth Allocation in a Network Virtualization Environment Bandwidth Allocation in a Network Virtualization Environment Juan Felipe Botero jfbotero@entel.upc.edu Xavier Hesselbach xavierh@entel.upc.edu Department of Telematics Technical University of Catalonia

More information

Strategies. Addressing and Routing

Strategies. Addressing and Routing Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IRTF Vancouver Motivation and goals 1 Personal cloud storage

More information

Giving life to today s media distribution services

Giving life to today s media distribution services Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching,

More information

Dynamic Load Balancing and Node Migration in a Continuous Media Network

Dynamic Load Balancing and Node Migration in a Continuous Media Network Dynamic Load Balancing and Node Migration in a Continuous Media Network Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Draft: April 9, 2001 Abstract This report examines current technologies

More information

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University

More information

CStream: Neighborhood Bandwidth Aggregation For Better Video Streaming

CStream: Neighborhood Bandwidth Aggregation For Better Video Streaming CStream: Neighborhood Bandwidth Aggregation For Better Video Streaming by Thangam Vedagiri Seenivasan A Thesis Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE In partial fulfillment of

More information

Multimedia Applications. Streaming Stored Multimedia. Classification of Applications

Multimedia Applications. Streaming Stored Multimedia. Classification of Applications Chapter 2: Basics Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Multimedia Transfer and Protocols Quality of Service and Resource Management

More information

Advanced Computer Networks. Scheduling

Advanced Computer Networks. Scheduling Oriana Riva, Department of Computer Science ETH Zürich Advanced Computer Networks 263-3501-00 Scheduling Patrick Stuedi, Qin Yin and Timothy Roscoe Spring Semester 2015 Outline Last time Load balancing

More information

Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran

Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Network Research Group, School of Computer Sciences Universiti Sains Malaysia11800 Penang, Malaysia Abstract

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Abhishek Kashyap, Anuj Rawat and Mark Shayman Department of Electrical and Computer Engineering, University

More information

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 63-68 Impact Journals AUTOMATED AND ADAPTIVE DOWNLOAD

More information

Microsoft s Cloud Networks

Microsoft s Cloud Networks Microsoft s Cloud Networks Page 1 Microsoft s Cloud Networks Microsoft s customers depend on fast and reliable connectivity to our cloud services. To ensure superior connectivity, Microsoft combines globally

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

Server Selection and Topology Control for Multi-Party Video Conferences

Server Selection and Topology Control for Multi-Party Video Conferences erver election and Topology ontrol for Multi-Party Video onferences huopeng Zhang Di Niu Yaochen Hu Fangming Liu 3 University of Waterloo, anada University of Alberta, anada 3 Huazhong University of cience

More information

David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design

David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design WAN - VPN Network Design David Tipper Graduate Telecommunications and Networking Program University it of Pittsburgh Telcom 2110 Network Design, Slides 11 WAN Network Design WAN typically have a mesh or

More information

Voice over IP: RTP/RTCP The transport layer

Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input

More information

Cairo, May 18, 2009 INET. Olaf Kolkman

Cairo, May 18, 2009 INET. Olaf Kolkman Olaf Kolkman The Hourglass: A Simplified Model Application Layer: Applications use IP for connectivity The Network Access Layer: Components in the Network Access Layer deliver IP connectivity The IP Layer:

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

Realtime Multi-party Video Conferencing Service over Information Centric Networks

Realtime Multi-party Video Conferencing Service over Information Centric Networks Realtime Multi-party Video Conferencing Service over Information Centric Networks (Anil Jangam, Ravishankar Ravindran, Asit Chakraborti, Xili Wan, Guoqiang Wang ) University of Maryland, Baltimore County,

More information

Computer Networks. Examples of network applica3ons. Applica3on Layer

Computer Networks. Examples of network applica3ons. Applica3on Layer Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Measurement Study of Commercial Video Conferencing Systems

Measurement Study of Commercial Video Conferencing Systems Measurement Study of Commercial Video Conferencing Systems Yang Xu, Chenguang Yu, Jingjiang Li, Hao Hu, Yong Liu and Yao Wang Department of Electrical and Computer Engineering Polytechnic Institute of

More information

Jetway: Minimizing Costs on Inter-Datacenter Video Traffic

Jetway: Minimizing Costs on Inter-Datacenter Video Traffic Jetway: Minimizing Costs on Inter-Datacenter Video Traffic Yuan Feng, Baochun Li Department of Electrical and Computer Engineering University of Toronto Bo Li Department of Computer Science Hong Kong University

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

Advanced Networking Voice over IP: RTP/RTCP The transport layer

Advanced Networking Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Limitations of Packet Measurement

Limitations of Packet Measurement Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing

More information

Utility Maximization in Peer-to-Peer Systems with Applications to Video Conferencing

Utility Maximization in Peer-to-Peer Systems with Applications to Video Conferencing 1 Utility Maximization in Peer-to-Peer Systems with Applications to Video Conferencing Minghua Chen, Miroslav Ponec, Sudipta Sengupta, Jin Li, and Philip A. Chou Abstract In this paper, we study the problem

More information

Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago

Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University

More information

Challenges of Sending Large Files Over Public Internet

Challenges of Sending Large Files Over Public Internet Challenges of Sending Large Files Over Public Internet CLICK TO EDIT MASTER TITLE STYLE JONATHAN SOLOMON SENIOR SALES & SYSTEM ENGINEER, ASPERA, INC. CLICK TO EDIT MASTER SUBTITLE STYLE OUTLINE Ø Setting

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

1 All authors contributed equally to this paper and their names are listed in no particular order.

1 All authors contributed equally to this paper and their names are listed in no particular order. A Comparative Evaluation of Internet Pricing Models: Smart Markets and Dynamic Capacity Contracting Ranjitha Singh, Murat Yuksel, Shivkumar Kalyanaraman, T. Ravichandran 1 Rensselaer Polytechnic Institute,

More information

Outline. Clouds of Clouds lessons learned from n years of research Miguel Correia

Outline. Clouds of Clouds lessons learned from n years of research Miguel Correia Dependability and Security with Clouds of Clouds lessons learned from n years of research Miguel Correia WORKSHOP ON DEPENDABILITY AND INTEROPERABILITY IN HETEROGENEOUS CLOUDS (DIHC13) August 27 th 2013,

More information

Skype over UMTS. Tobias Hoßfeld www3.informatik.uni-wuerzburg.de. University of Würzburg Informatik III (Distributed Systems) Prof. Dr. P.

Skype over UMTS. Tobias Hoßfeld www3.informatik.uni-wuerzburg.de. University of Würzburg Informatik III (Distributed Systems) Prof. Dr. P. Inmatik III () Prof. Dr. P. Tran-Gia Skype over UMTS Talk (25+5min) ITG Fachgruppe 5.2.4 VoIP over Wireless 15th May 2006, WürzburgW P2P Applications Across Mobile Networks When Do We Need Rate Control

More information

Optimizing Cost and Performance for Content Multihoming

Optimizing Cost and Performance for Content Multihoming Optimizing Cost and Performance for Content Multihoming Hongqiang Harry Liu Ye Wang Yang Richard Yang Hao Wang Chen Tian Aug. 16, 2012 Yale LANS Content Multihoming is Widely Used Content Publisher Content

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric

More information

Protecting Mobile Devices From TCP Flooding Attacks

Protecting Mobile Devices From TCP Flooding Attacks Protecting Mobile Devices From TCP Flooding Attacks Yogesh Swami % and Hannes Tschofenig* % Nokia Research Center, Palo Alto, CA, USA. * Siemens Corporate Technology, Munich, DE. 1 Motivation Anatomy of

More information

The Problem with TCP. Overcoming TCP s Drawbacks

The Problem with TCP. Overcoming TCP s Drawbacks White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Data Center Content Delivery Network

Data Center Content Delivery Network BM 465E Distributed Systems Lecture 4 Networking (cont.) Mehmet Demirci Today Overlay networks Data centers Content delivery networks Overlay Network A virtual network built on top of another network Overlay

More information

Using Proxies to Accelerate Cloud Applications

Using Proxies to Accelerate Cloud Applications Using Proxies to Accelerate Cloud Applications Jon Weissman and Siddharth Ramakrishnan Department of Computer Science and Engineering University of Minnesota, Twin Cities Abstract A rich cloud ecosystem

More information

Principles of Network Applications. Dr. Philip Cannata

Principles of Network Applications. Dr. Philip Cannata Principles of Network Applications Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers).

More information

GATE CS Topic wise Questions Computer Network

GATE CS Topic wise Questions Computer Network www.gatehelp.com GATE CS Topic wise Questions YEAR 23 Question. 1 Which of the following assertions is false about the internet Protocol (IP)? (A) It is possible for a computer to have multiple IP addresses

More information

Voice-Over-IP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Voice-Over-IP. Daniel Zappala. CS 460 Computer Networking Brigham Young University Voice-Over-IP Daniel Zappala CS 460 Computer Networking Brigham Young University Coping with Best-Effort Service 2/23 sample application send a 160 byte UDP packet every 20ms packet carries a voice sample

More information

How To Compare Available Bandwidth On A Network With A Powerline To A Network On A Testbed On A Computer Or Network On An Ipad Or Ipad On A 2Mbb (Or Ipad) On A 4Ghz Network On The

How To Compare Available Bandwidth On A Network With A Powerline To A Network On A Testbed On A Computer Or Network On An Ipad Or Ipad On A 2Mbb (Or Ipad) On A 4Ghz Network On The 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Path-F3: Improving Accuracy and Network Load in Available Estimation

More information

ASPERA HIGH-SPEED TRANSFER SOFTWARE. Moving the world s data at maximum speed

ASPERA HIGH-SPEED TRANSFER SOFTWARE. Moving the world s data at maximum speed ASPERA HIGH-SPEED TRANSFER SOFTWARE Moving the world s data at maximum speed PRESENTERS AND AGENDA PRESENTER John Heaton Aspera Director of Sales Engineering john@asperasoft.com AGENDA How Cloud is used

More information

SIP Trunking The Provider s Perspective

SIP Trunking The Provider s Perspective SIP Trunking The Provider s Perspective Presented by Pete Sandstrom, CTO BandTel Advanced SIP Session Overview 1. Open Systems Interconnection Model (OSI) is more than a model 2. Quality of Service (QoS)

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Final Review Stefan Savage Final Mechanics Will cover entire year of material (but likely with some bias to the material post-midterm) Based on lecture material,

More information

Introduce Quality of Service in your IP_to_IP W@N unreliable infrastructure

Introduce Quality of Service in your IP_to_IP W@N unreliable infrastructure Introduce Quality of Service in your IP_to_IP W@N unreliable infrastructure QV QoS Proxy server The QV-PROXY supplies two features : introduction of Error Correction mechanism improving the QoS and delivery

More information

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15 1 Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15 ote: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit

More information

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

Chapter 3. Internet Applications and Network Programming

Chapter 3. Internet Applications and Network Programming Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure

More information

P2P Video Streaming Strategies based on Scalable Video Coding

P2P Video Streaming Strategies based on Scalable Video Coding P2P Video Streaming Strategies based on Scalable Video Coding F. A. López-Fuentes Departamento de Tecnologías de la Información Universidad Autónoma Metropolitana Unidad Cuajimalpa México, D. F., México

More information

Photonic Switching Applications in Data Centers & Cloud Computing Networks

Photonic Switching Applications in Data Centers & Cloud Computing Networks Photonic Switching Applications in Data Centers & Cloud Computing Networks 2011 CALIENT Technologies www.calient.net 1 INTRODUCTION In data centers and networks, video and cloud computing are driving an

More information

An Evaluation of Peering and Traffic Engineering in the Pan- African Research and Education Network

An Evaluation of Peering and Traffic Engineering in the Pan- African Research and Education Network An Evaluation of Peering and Traffic Engineering in the Pan- African Research and Education Network *Clifford Sibanda (National University of Science and Technology- Bulawayo) *Josiah Chavula (Mzuzu University

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1

More information

Web Conferencing: It should be easy THE REASONS WHY IT IS NOT AND THE PATHS TO OVERCOME THE CHALLENGES.

Web Conferencing: It should be easy THE REASONS WHY IT IS NOT AND THE PATHS TO OVERCOME THE CHALLENGES. September 2013 Daitan White Paper Web Conferencing: It should be easy THE REASONS WHY IT IS NOT AND THE PATHS TO OVERCOME THE CHALLENGES. Highly Reliable Software Development Services http://www.daitangroup.com/webconferencing

More information

Design and Implementation of Video Conference System Over the Hybrid Peer-to- Peer Networks

Design and Implementation of Video Conference System Over the Hybrid Peer-to- Peer Networks Design and Implementation of Conference System Over the Hybrid Peer-to- Peer Networks Hyen Ki Kim Department of Multimedia Engineering Andong National University 388 Songcheon-dong Andong city Kyungbuk

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

Performance Analysis Proposal

Performance Analysis Proposal 1. Title Performance Analysis Proposal Performance Analysis of P2P VoIP Applications 2. Objective To evaluate the dynamic behavior (i.e., CODEC usage) of VoIP P2P applications (e.g. Skype, Google Talk)

More information

A Performance Study of VoIP Applications: MSN vs. Skype

A Performance Study of VoIP Applications: MSN vs. Skype This full text paper was peer reviewed by subject matter experts for publication in the MULTICOMM 2006 proceedings. A Performance Study of VoIP Applications: MSN vs. Skype Wen-Hui Chiang, Wei-Cheng Xiao,

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com Sveronese@networkphysics.com September 2003 1 Agenda Today s IT challenges Introduction to Network

More information

Large-Scale Distributed Systems. Datacenter Networks. COMP6511A Spring 2014 HKUST. Lin Gu lingu@ieee.org

Large-Scale Distributed Systems. Datacenter Networks. COMP6511A Spring 2014 HKUST. Lin Gu lingu@ieee.org Large-Scale Distributed Systems Datacenter Networks COMP6511A Spring 2014 HKUST Lin Gu lingu@ieee.org Datacenter Networking Major Components of a Datacenter Computing hardware (equipment racks) Power supply

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency

More information

Fundamentals of MPLS for Broadcast Applications

Fundamentals of MPLS for Broadcast Applications Fundamentals of MPLS for Broadcast Applications Ron Clifton, P. Eng., BAS c, MAS c CliftonGroup International Limited Page: 1 The Paradigm Shift The connectivity and technology exist today to implement

More information

Design of Light-Tree Based Optical Inter-Datacenter Networks

Design of Light-Tree Based Optical Inter-Datacenter Networks Lin et al. VOL. 5, NO. 12/DECEMBER 2013/J. OPT. COMMUN. NETW. 1443 Design of Light-Tree Based Optical Inter-Datacenter Networks Rongping Lin, Moshe Zukerman, Gangxiang Shen, and Wen-De Zhong Abstract Nowadays,

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

How To Design A Layered Network In A Computer Network

How To Design A Layered Network In A Computer Network A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control

More information

A Digital Fountain Approach to Reliable Distribution of Bulk Data

A Digital Fountain Approach to Reliable Distribution of Bulk Data A Digital Fountain Approach to Reliable Distribution of Bulk Data John Byers, ICSI Michael Luby, ICSI Michael Mitzenmacher, Compaq SRC Ashu Rege, ICSI Application: Software Distribution New release of

More information

Journal of Network and Computer Applications

Journal of Network and Computer Applications Journal of Network and Computer Applications 34 (2011) 137 150 Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage: www.elsevier.com/locate/jnca Peer-to-peer

More information

Tradeoffs in CDN Designs for Throughput Oriented Traffic

Tradeoffs in CDN Designs for Throughput Oriented Traffic Tradeoffs in CDN Designs for Throughput Oriented Traffic Minlan Yu Wenjie Jiang Haoyuan Li Ion Stoica University of Southern California Princeton University University of California Berkeley ABSTRACT Internet

More information

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA ssharma5@ncsu.edu Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction

More information

Quality of Service Management for Teleteaching Applications Using the MPEG-4/DMIF

Quality of Service Management for Teleteaching Applications Using the MPEG-4/DMIF Quality of Service Management for Teleteaching Applications Using the MPEG-4/DMIF Gregor v. Bochmann and Zhen Yang University of Ottawa Presentation at the IDMS conference in Toulouse, October 1999 This

More information

Dependability in Web Services

Dependability in Web Services Dependability in Web Services Christian Mikalsen chrismi@ifi.uio.no INF5360, Spring 2008 1 Agenda Introduction to Web Services. Extensible Web Services Architecture for Notification in Large- Scale Systems.

More information

Chapter 19 Cloud Computing for Multimedia Services

Chapter 19 Cloud Computing for Multimedia Services Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

TOWARDS A P2P VIDEOCONFERENCING SYSTEM BASED ON LOW-DELAY NETWORK CODING. Attilio Fiandrotti, Anooq Muzaffar Sheikh, Enrico Magli

TOWARDS A P2P VIDEOCONFERENCING SYSTEM BASED ON LOW-DELAY NETWORK CODING. Attilio Fiandrotti, Anooq Muzaffar Sheikh, Enrico Magli 20th European Signal Processing Conference (EUSIPCO 202) Bucharest, Romania, August 27-3, 202 TOWARDS A P2P VIDEOCONFERENCING SYSTEM BASED ON LOW-DELAY NETWORK CODING Attilio Fiandrotti, Anooq Muzaffar

More information

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Securing Virtualization with Check Point and Consolidation with Virtualized Security Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized

More information

QoE-Aware Multimedia Content Delivery Over Next-Generation Networks

QoE-Aware Multimedia Content Delivery Over Next-Generation Networks QoE-Aware Multimedia Content Delivery Over Next-Generation Networks M. Oğuz Sunay July 9, 2013 Second Romeo Workshop PAGE: 1 M. Oğuz Sunay, Özyeğin University Istanbul, July 9, 2013 Romeo High-quality

More information

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering Islamic University of Gaza Faculty of Engineering Computer Engineering Department Networks Discussion ECOM 4021 Lecture # 2 CH1 Computer Networks and the Internet By Feb 2013 (Theoretical material: page

More information