A Digital Fountain Approach to Reliable Distribution of Bulk Data



Similar documents
Definition. A Historical Example

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Performance measurements of STANAG 5066 and Applications Running over STANAG 5066

The Impact of QoS Changes towards Network Performance

Dynamic Load Balancing and Node Migration in a Continuous Media Network

TCP for Wireless Networks

The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN

ASPERA HIGH-SPEED TRANSFER SOFTWARE. Moving the world s data at maximum speed

Portable Wireless Mesh Networks: Competitive Differentiation

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Frequently Asked Questions

The Interaction of Forward Error Correction and Active Queue Management

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

Classes of multimedia Applications

Key Components of WAN Optimization Controller Functionality

Network Coding for Distributed Storage

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

Transforming cloud infrastructure to support Big Data Ying Xu Aspera, Inc

Choosing the right Internet solution for your business.

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Mobile Computing/ Mobile Networks

EonStor DS remote replication feature guide

Digital Audio and Video Data

Protocols. Packets. What's in an IP packet

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

OFFSHORE BANDWIDTH BOOST TECHNICAL WHITEPAPER

Steelcape Product Overview and Functional Description

16/5-05 Datakommunikation - Jonny Pettersson, UmU 2. 16/5-05 Datakommunikation - Jonny Pettersson, UmU 4

Technical papers Virtual private networks

Requirements of Voice in an IP Internetwork

Lecture 33. Streaming Media. Streaming Media. Real-Time. Streaming Stored Multimedia. Streaming Stored Multimedia

Accelerating File Transfers Increase File Transfer Speeds in Poorly-Performing Networks

SYSTEMATIC NETWORK CODING FOR LOSSY LINE NETWORKS. (Paresh Saxena) Supervisor: Dr. M. A. Vázquez-Castro

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Video Streaming with Network Coding

Mobile Communications Chapter 9: Mobile Transport Layer

Input / Ouput devices. I/O Chapter 8. Goals & Constraints. Measures of Performance. Anatomy of a Disk Drive. Introduction - 8.1

Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71

How To Make A Delay Tolerant Network (Dtn) Work When You Can'T Get A Signal From A Long Delay (Tcp/Ip) To A Long Time (Tokus) Or From A Short Delay (Ip) (Tko

Proactive Prioritized Mixing of Scalable Video Packets in Push-Based Network Coding Overlays

HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL

Traffic Engineering & Network Planning Tool for MPLS Networks

A comparison of TCP and SCTP performance using the HTTP protocol

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

WebEx. Network Bandwidth White Paper. WebEx Communications Inc

VIA CONNECT PRO Deployment Guide

PEER TO PEER FILE SHARING USING NETWORK CODING

Understanding Latency in IP Telephony

A Novel Routing and Data Transmission Method for Stub Network of Internet of Things based on Percolation

Data Link Layer Overview

Quality of Service Management for Teleteaching Applications Using the MPEG-4/DMIF

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems

NETWORK ISSUES: COSTS & OPTIONS

An Introduction to Dispersive Virtualized Networks

Module 15: Network Structures

The Evolution of 3G CDMA Wireless Networks. David W. Paranchych IEEE CVT Luncheon January 21, 2003

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Growth Codes: Maximizing Sensor Network Data Persistence

Overview : Computer Networking. Components of Integrated Services. Service Interfaces RSVP. Differentiated services

Wireless Video Best Practices Guide

Four Ways High-Speed Data Transfer Can Transform Oil and Gas WHITE PAPER

Integration Guide. EMC Data Domain and Silver Peak VXOA Integration Guide

RTT 60.5 msec receiver window size: 32 KB

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Traffic Monitoring in a Switched Environment

CS 61C: Great Ideas in Computer Architecture. Dependability: Parity, RAID, ECC

WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Giving life to today s media distribution services

Efficient and low cost Internet backup to Primary Video lines

ADVANTAGES OF AV OVER IP. EMCORE Corporation

Application Note How To Determine Bandwidth Requirements

RVS-Seminar Implementation and Evaluation of WinJTAP Interface. Milan Nikolic Universität Bern

Cisco Application Networking for IBM WebSphere

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

Unequal Error Protection using Fountain Codes. with Applications to Video Communication

Video Transmission over Wireless LAN. Hang Liu

Axceleon s CloudFuzion Turbocharges 3D Rendering On Amazon s EC2

Supporting VoIP in IEEE Distributed WLANs

VIA COLLAGE Deployment Guide

The Problem with TCP. Overcoming TCP s Drawbacks

Data Networks Summer 2007 Homework #3

Service Overview CloudCare Online Backup

Lustre Networking BY PETER J. BRAAM

Chapter 14: Distributed Operating Systems

Mul$media Networking. #3 Mul$media Networking Semester Ganjil PTIIK Universitas Brawijaya. #3 Requirements of Mul$media Networking

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran

Transcription:

A Digital Fountain Approach to Reliable Distribution of Bulk Data John Byers, ICSI Michael Luby, ICSI Michael Mitzenmacher, Compaq SRC Ashu Rege, ICSI

Application: Software Distribution New release of widely used software. Hundreds of thousands of clients or more. Bulk data: tens or hundreds of MB Heterogeneous clients: Modem users: hours Well-connected users: minutes

Primary Objectives Scale to vast numbers of clients No ARQs or NACKs Minimize use of network bandwidth Minimize overhead at receivers: Computation time Useless packets Compatibility Networks: Internet, satellite, wireless Scheduling policies, i.e. congestion control

Impediments Packet loss wired networks: congestion satellite networks, mobile receivers Receiver heterogeneity packet loss rates end-to-end throughput Receiver access patterns asynchronous arrivals and departures overlapping access intervals

Digital Fountain k k k Source Encoding Stream Received Message Instantaneous Transmission Instantaneous Can recover file from any set of k encoding packets.

Digital Fountain Solution File Transmission 0 hours 1 hour 2 hours 3 hours 4 hours User 1 User 2 5 hours

Is FEC Inherently Bad? Faulty Reasoning FEC adds redundancy Redundancy increases congestion and losses More losses necessitate more transmissions FEC consumes more overall bandwidth But Each and every packet can be useful to all clients Each client consumes minimum bandwidth possible FEC consumes less overall bandwidth by compressing bandwidth across clients

DF Solution Features Users can initiate the download at their discretion. Users can continue download seamlessly after temporary interruption. Tolerates moderate packet loss. Low server load - simple protocol. Does scale well. Low network load.

Approximating a Digital Fountain k Source Encoding Stream Encoding Time (1 + c) k k Received Message Decoding Time

Approximating a DF: Performance Measures Time Overhead: Time to decode (or encode) as a function of k. Decoding Inefficiency: packets needed to decode k

Work on Erasure Codes Standard Reed-Solomon Codes Dense systems of linear equations. Poor time overhead (quadratic in k) Optimal decoding inefficiency of 1 Tornado Codes [LMSSS 97] Sparse systems of equations. Fast encoding and decoding (linear in k) Suboptimal decoding inefficiency

Tornado Z: Encoding Structure Irregular bipartite graph Irregular bipartite graph k stretch factor = 2 k = 16,000 nodes = source data = redundancy

Encoding/Decoding Process a b c d a b f a b c d g c e g h b d e f g h e f g h

Timing Comparison Encoding time, 1K packets Size Reed-Solomon Tornado Z 250 K 500 K 1 MB 2 MB 4 MB 8 MB 16 MB 4.6 sec. 19 sec. 93 sec. 442 sec. 30 min. 2 hrs. 8 hrs. 0.11 sec. 0.18 sec. 0.29 sec. 0.57 sec. 1.01 sec. 1.99 sec. 3.93 sec. Decoding time, 1K packets Size Reed-Solomon Tornado Z 250 K 500 K 1 MB 2 MB 4 MB 8 MB 16 MB 2.06 sec. 8.4 sec. 40.5 sec. 199 sec. 13 min. 1 hr. 4 hrs. 0.18 sec. 0.24 sec. 0.31 sec. 0.44 sec. 0.74 sec. 1.28 sec. 2.27 sec. Tornado Z: Average inefficiency = 1.055 Both codes: Stretch factor = 2

Cyclic Interleaving Transmission File Blocks Encoded Blocks Interleaved Encoding Encoding Copy 1 Encoding Copy 2 Tornado Encoding

Cyclic Interleaving: Drawbacks The Coupon Collector s Problem Waiting for packets from the last blocks: T B blocks More blocks: faster decoding, larger inefficiency

Scalability over File Size Decoding Inefficiency 1.6 1.5 1.4 1.3 1.2 1.1 Decoding Inefficiency, 500 Receivers, p = 0.1 Interleaved, T = 20, Max. Interleaved, T = 20, Avg. Interleaved, T = 50, Max. Interleaved, T = 50, Avg. Tornado Z, Max. Tornado Z, Avg. 1 100 1000 10000 File Size, KB

Scalability over Receivers Decoding Inefficiency on a 1MB File, p = 0.1 Decoding Inefficiency 1.8 1.6 1.4 1.2 Interleaved, T = 20 Interleaved, T = 50 Tornado Z 1 1 10 100 1000 10000 Receivers

Digital Fountain Prototype Built on top of IP Multicast. Tolerating heterogeneity: Layered multicast Congestion control [VRC 98] Experimental results over MBONE.

Research Directions Other applications for digital fountains Dispersity routing Accessing data from multiple mirror sites in parallel Improving the codes Implementation and deployment Scale to large number of clients Network interactions