Tracker vs. DHT Performance Comparison for P2P Streaming

Similar documents
Giving life to today s media distribution services

1000Mbps Ethernet Performance Test Report

Storage Systems Autumn Chapter 6: Distributed Hash Tables and their Applications André Brinkmann

Design and Implementation of a Storage Repository Using Commonality Factoring. IEEE/NASA MSST2003 April 7-10, 2003 Eric W. Olsen

CS5412: TIER 2 OVERLAYS

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November ISSN

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Iperf Tutorial. Jon Dugan Summer JointTechs 2010, Columbus, OH

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Monitoring Android Apps using the logcat and iperf tools. 22 May 2015


1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

An apparatus for P2P classification in Netflow traces

DT-WBAN: Disruption Tolerant Wireless Body Area Networks in Healthcare Applications

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis

Citrix & Terminal Services Considerations (Ascent Capture 7.5 Enterprise with Citrix & Terminal Services FAQs)

query enabled P2P networks Park, Byunggyu

Performance of Host Identity Protocol on Nokia Internet Tablet

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

TOPOLOGIES NETWORK SECURITY SERVICES

TCP over ATM Performance in NASA NREN and CTI

A distributed system is defined as

Theoretical Aspects of Storage Systems Autumn 2009

TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES

Hyacinth An IEEE based Multi-channel Wireless Mesh Network

The BitTorrent Protocol

Introduction, Rate and Latency

TCP Labs. WACREN Network Monitoring and Measurement Workshop Antoine Delvaux perfsonar developer

Skype characteristics

Client-aware Cloud Storage

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss

Lawful Interception in P2Pbased

Course Project Topics for CSE5469. Chunyi Peng Fall 2015

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD

diversifeye Application Note

Strategies. Addressing and Routing

An Efficient Strategy for Data Recovery in Wi-Fi Systems

WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli

Supporting VoIP in IEEE Distributed WLANs

Computer Networks - CS132/EECS148 - Spring

On the Placement of Management and Control Functionality in Software Defined Networks

High-Capacity, High-Throughput: New Satellite Systems Meet Big Oil s Big Data

Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago

Making Multicore Work and Measuring its Benefits. Markus Levy, president EEMBC and Multicore Association

An Optimization Model of Load Balancing in P2P SIP Architecture

Limitations of Packet Measurement

ZingMe Practice For Building Scalable PHP Website. By Chau Nguyen Nhat Thanh ZingMe Technical Manager Web Technical - VNG

Computer Networks Homework 1

Measurement Study of Wuala, a Distributed Social Storage Service

Mul$media Networking. #3 Mul$media Networking Semester Ganjil PTIIK Universitas Brawijaya. #3 Requirements of Mul$media Networking

Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt. John Buford, Avaya Labs Research

An Introduction to Peer-to-Peer Networks

TECHNICAL CHALLENGES OF VoIP BYPASS

ENABLING SEMANTIC SEARCH IN STRUCTURED P2P NETWORKS VIA DISTRIBUTED DATABASES AND WEB SERVICES

Network performance in virtual infrastructures

CSCI-1680 CDN & P2P Chen Avin

Research of User Experience Centric Network in MBB Era ---Service Waiting Time

Understanding Latency in Software Defined Networks

IJMIE Volume 2, Issue 7 ISSN:

RapidStream: P2P Streaming on Android

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters

P2P and IMS Cooperation / Integration

P2P File Sharing: BitTorrent in Detail

Professor: Ian Foster TAs: Xuehai Zhang, Yong Zhao. Winter Quarter.

Achieving Resilient and Efficient Load Balancing in DHT-based P2P Systems

Azure Media Service Cloud Video Delivery KILROY HUGHES MICROSOFT AZURE MEDIA

The Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen Storage Platforms. Abhijith Shenoy Engineer, Hedvig Inc.

A Talari Networks White Paper. Turbo Charging WAN Optimization with WAN Virtualization. A Talari White Paper

IMPROVED PROXIMITY AWARE LOAD BALANCING FOR HETEROGENEOUS NODES

EETS 8316 Wireless Networks Fall 2013

QoS & Traffic Management

Ring Protection: Wrapping vs. Steering

RAID Performance Analysis

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Web Page Response Time

Network testing with iperf

Graph Analytics in Big Data. John Feo Pacific Northwest National Laboratory

SPINS: Security Protocols for Sensor Networks

DDoS Vulnerability Analysis of Bittorrent Protocol

Software Defined Networking What is it, how does it work, and what is it good for?

Influence of Load Balancing on Quality of Real Time Data Transmission*

Index Terms : Load rebalance, distributed file systems, clouds, movement cost, load imbalance, chunk.

HIVE STREAMING. Mikael Högqvist Senior Research Engineer 07/05/14 1

WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks

Converging P2P with clouds towards advanced real time media distribution architectures.

Transcription:

Tracker vs. DHT Performance Comparison for P2P Streaming draft-hu-ppsp-tracker-dht-performance-comparison Yan Hu, NEC Labs China Yong Xia, NEC Labs China Jan Seedorf, NEC Labs Europe

Outline Introduction Resource discovery performance comparison Chunk discovery performance comparison Conclusion NEC Labs China 2009 2

Introduction Different methods for a peer to discover specific resource Tracker-based method: centralized server peer reports its resources to tracker; tracker stores and returns resources info to the requesting peer DHT-based method: fully-distributed lookup resources info is stored by many peers in the P2P network This draft estimates the performance of the two methods Assume there are D resources shared by N peers in a P2P system For P2P streaming N: number of active users in a P2P streaming software about 10 million (10 7 ) active users D: number of channels (live streaming) or videos (VoD) about 100 thousand (10 5 ) resources NEC Labs China 2009 3

Resource discovery Two performance comparisons Resource discovery: coarse level only compare the discovery performance of resource info Chunk discovery: grain level also compare the discovery performance of chunk info Resource discovery performance comparison Tracker-based method: tracker stores and returns resource info, chunk info is exchanged using peer gossip DHT-based method: resource info is obtained using DHT method, chunk info is exchanged using peer gossip (Assumption: DHT nodes are widely distributed on the Internet) NEC Labs China 2009 4

Parameters and assumptions Lookup efficiency N: number of peers, N = 10,000,000 D: number of resources, D = 100,000 RTT: average RTT in the network, RTT = 200ms Lookup efficiency comparison Tracker-based DHT-based Lookup message O(1) O(log(N)) = 23 Lookup operations O(1) log(n)*o(1) = 23 Lookup latency O(1)*RTT = 200ms O(log(N))*RTT = 4.6s Summary: Tracker-based method is much faster than DHT-based method, the 4.6s lookup latency is relatively high in P2P streaming applications. NEC Labs China 2009 5

Parameters and assumptions Network traffic N: number of peers, N = 10,000,000 T: each peer requests new resource every T seconds, T = 60sec S: average size of one request/response message, S = 1KBytes Network traffic comparison Tracker-based DHT-based Number of messages per second N/T*2 = 3.3*100,000 N/T*2*log(N) = 7.7*1,000,000 Size of messages per second N/T*2*S = 0.33GBytes N/T*2*log(N) *S = 7.7GBytes Number of messages in node join/leave O(1) O((logN) 2 ) = 541 Summary: Tracker-based method has smaller network traffic overhead than DHT-based method, both methods are acceptable in P2P streaming applications. NEC Labs China 2009 6

Host requirement Parameters and assumptions T: each peer requests new resource every T seconds, T = 60sec S: average size of one request/response message, S = 1KBytes C: one peer has C resources, C = 10 P: each peer is represented by P Bytes, P = 20 Bytes Host requirement comparison Tracker-based DHT-based Memory requirement N*C*P = 2GBytes (N*C/D)*P = 20KBytes Number of requests received per sec Size of request/response messages per sec N/T = 1.67*100,000 log(n)/t = 0.4 N/T*2*S = 0.33GBytes 2*log(N)/T*S = 0.8 Kbytes Summary: DHT-based has much less host resources requirement than tracker-based method. For performance considerations, multiple trackers can be used. NEC Labs China 2009 7

Chunk discovery Two performance comparisons Resource discovery: coarse level only compare the discovery performance of resource info Chunk discovery: grain level also compare the discovery performance of chunk info Chunk discovery performance comparison Tracker-based method: tracker stores and returns resource info, chunk info is exchanged using peer gossip DHT-based method: both resource info and chunk info are obtained using DHT method (i.e., the first solution in Chunk Discovery for P2P Streaming ) NEC Labs China 2009 8

Lookup efficiency Parameters and assumptions N: number of peers, N = 10,000,000 D: number of resources, D = 100,000 RTT: average RTT in the network, RTT = 200ms M: each peer gossip with M neighbors, M = 20 Lookup efficiency comparison Tracker side Tracker-based Peer side DHT-based Lookup message O(1) M*O(1) = 20 O(log(N)) = 23 Lookup operations O(1) O(1) log(n)*o(1) = 23 Lookup latency O(1)*RTT = 200ms O(1)*RTT = 200ms O(log(N))*RTT = 4.6s Summary: Tracker-based method is much faster than DHT-based method, the 4.6s lookup latency is relatively high in P2P streaming applications. NEC Labs China 2009 9

Parameters and assumptions Network traffic T: each peer requests new resource every T seconds, T = 60sec S: average size of one request/response message, S = 1KBytes I: peer sends gossip messages every I seconds, I = 10 sec R: video rate, R = 32 KBytes/sec; Z: chunk size, Z = 16 KBytes Network traffic comparison Tracker-based Tracker side Peer side DHT-based Number of messages per sec N/T*2 = 3.3*100,000 M*N/I*2 = 4*10,000,000 N*(R/Z)*2log(N) = 1,000,000,000 Size of messages per sec N/T*2*S = 0.33GBytes M*N/I*2*S = 40GBytes N*(R/Z)*2log(N)*S = 1TBytes Summary: Tracker-based method has smaller network traffic overhead than DHT-based method, both methods are acceptable in P2P streaming applications. NEC Labs China 2009 10

Host requirement Parameters and assumptions C: one peer has C resources, C = 10 P: each peer is represented by P Bytes, P = 20 Bytes Bm: bitmap size, Bm = 1KBytes H: number of chunks in one resource, H = 10000 Host requirement comparison Tracker side Tracker-based Peer side DHT-based Memory requirement Number of requests received per sec Size of req/resp messages per sec N*C*P = 2GBytes M*Bm = 20KBytes (N*C/D)*P*(D*H/N) = 2MBytes N/T = 1.67*100,000 M/I = 2 (R/Z)*log(N) = 46 N/T*2*S = 0.33GBytes M/I*2*S = 4KBytes (R/Z) *log(n)*2*s= 92 Kbytes Summary: DHT-based has much less host resources requirement than tracker-based method. For performance considerations, multiple trackers can be used. NEC Labs China 2009 11

Conclusion This draft compares resource discovery and chunk discovery performance of Tracker-based and DHT-based method Tracker-based method has much short response time than DHT-based method DHT-based method s response time can be long, not suitable for delay sensitive streaming applications Per-host requirement of tracker is higher than DHT nodes, but still within reach of a small number of commodity PCs. NEC Labs China 2009 12

Thanks!