Network Computing Laboratory ZIGZAG: An Efficient Peer-to-Peer Sch eme for Media Streaming Duc A. Tran Kien A. Hua Tai Do University of Central Florida.

Slides:



Advertisements
Similar presentations
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Advertisements

Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
P2P Media streaming Rutuja Raghoji Ramya Tridandapani Malini Karunagaran.
SplitStream: High- Bandwidth Multicast in Cooperative Environments Monica Tudora.
MMCN 19 Jan 2005 Ooi Wei Tsang Peer-to-Peer Streaming.
1 Turning Heterogeneity into an Advantage in Overlay Routing Gisik Kwon Dept. of Computer Science and Engineering Arizona State University Published in.
Resilient Peer-to-Peer Streaming Paper by: Venkata N. Padmanabhan Helen J. Wang Philip A. Chou Discussion Leader: Manfred Georg Presented by: Christoph.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
A New Approach for the Construction of ALM Trees using Layered Coding Yohei Okada, Masato Oguro, Jiro Katto Sakae Okubo International Conference on Autonomic.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
P2VoD: Providing Fault Tolerant Video-on-Demand Streaming in Peer-to-Peer Environment Tai T.Do, Kien A. Hua, Mounir A. Tantaoui Proc. of the IEEE Int.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Algorithms for Precomputing Constrained Widest Paths and Multicast Trees Paper by Stavroula Siachalou and Leonidas Georgiadis Presented by Jeremy Witmer.
Robust and Efficient Path Diversity in Application-Layer Multicast for Video Streaming Ruixiong Tian, Qian Zhang, Senior Member, IEEE, Zhe Xiang, Yongqiang.
An Alliance based PeeringScheme for P2P Live Media Streaming An Alliance based Peering Scheme for P2P Live Media Streaming Darshan Purandare Ratan Guha.
An Overlay Multicast Infrastructure for Live/Stored Video Streaming Visual Communication Laboratory Department of Computer Science National Tsing Hua University.
ZIGZAG: An Efficient Peer-to-Peer Scheme for Media Streaming Duc A. Tran, Kien A. Hua, Tai Do University of Central Florida INFOCOM Twenty-Second.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Supporting VCR-like Operations in Derivative Tree-Based P2P Streaming Systems Tianyin Xu, Jianzhong Chen, Wenzhong Li, Sanglu Lu Nanjing University Yang.
An Introduction to Peer-to-Peer networks Presentation for CSE620:Advanced networking Anh Le Nov. 4.
OStream: Asynchronous Streaming Multicast in Application-Layer Overlay Networks Yi Cui, Baochun Li, and Klara Nahrstedt IEEE Journal on Selected Areas.
Decentralized Resource Management for a Distributed Continuous Media Server Cyrus Shahabi and Farnoush Banaei-Kashani Presented by Leung Chi Kit.
Nearcast: A Locality-Aware P2P Live Streaming Approach for Distance Education XUPING TU, HAI JIN, and XIAOFEI LIAO Huazhong University of Science and Technology.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
NUS.SOC.CS Roger Zimmermann (based in part on slides by Ooi Wei Tsang) Application-Level Multicast.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Communication (II) Chapter 4
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
ON DESIGING END-USER MULTICAST FOR MULTIPLE VIDEO SOURCES Y.Nakamura, H.Yamaguchi, A.Hiromori, K.Yasumoto †, T.Higashino and K.Taniguchi Osaka University.
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
Resilient Peer-to-Peer Streaming Presented by: Yun Teng.
Page 1/18 Hongbeom Ahn A Survey of Application-Layer Multicast Protocols MOJTABA HOSSEINI, DEWAN TANVIR AHMED, SHERVIN SHIRMOHAMMADI, AND NICOLAS D. GEORGANAS,
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Streaming over Subscription Overlay Networks Department of Computer Science Iowa State University.
Live Streaming over Subscription Overlay Networks CS587x Lecture Department of Computer Science Iowa State University.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Impact of Topology on Overlay Multicast Suat Mercan.
Fair Layered Coding Streaming Jaime García-Reinoso  Iván Vidal  Francisco Valera University Carlos III of Madrid Alex Bikfalvi IMDEA Networks.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
APPLICATION LAYER MULTICASTING
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
NUS.SOC.CS5248 Ooi Wei Tsang Course Matters. NUS.SOC.CS5248 Ooi Wei Tsang Deadlines 11 Oct: Survey Paper Due 18 Oct: Paper Reviews Due.
NUS.SOC.CS5248 Ooi Wei Tsang Application-Level Multicast.
Network Computing Laboratory 1 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published.
Peer-to-Peer Media Streaming ZIGZAG - Ye Lin PROMISE – Chanjun Yang SASABE - Kung-En Lin.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
CS5248 Student Presentation1 Scalable Resilient Media Streaming Suman Banerjee, Seungjoon Lee, Ryan Braud, Bobby Bhattacharjee, Aravind Srinivasan NOSSDAV.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
A Social-Network-Aided Efficient Peer-to-Peer Live Streaming System IEEE/ACM TRANSACTIONS ON NETWORKING, JUNE 2015 Haiying Shen, Yuhua Lin Dept. of Electrical.
Network Computing Laboratory Load Balancing and Stability Issues in Algorithms for Service Composition Bhaskaran Raman & Randy H.Katz U.C Berkeley INFOCOM.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
NUS.SOC.CS Roger Zimmermann (based in part on slides by Ooi Wei Tsang) Application-Level Multicast.
Buffer Analysis of Live P2P Media Streaming Approaches Atif Nazir BSc ’07, LUMS.
1 Roie Melamed, Technion AT&T Labs Araneola: A Scalable Reliable Multicast System for Dynamic Wide Area Environments Roie Melamed, Idit Keidar Technion.
Cost-Effective Video Streaming Techniques Kien A. Hua School of EE & Computer Science University of Central Florida Orlando, FL U.S.A.
Application-Level Multicast
Host Multicast: A Framework for Delivering Multicast to End Users
Peer-to-Peer Streaming: An Hierarchical Approach
Presentation transcript:

Network Computing Laboratory ZIGZAG: An Efficient Peer-to-Peer Sch eme for Media Streaming Duc A. Tran Kien A. Hua Tai Do University of Central Florida Published in IEEE INFOCOM 2003

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 2Outline One line comment Motivation Proposed Solution Performance Evaluation Conclusions Critiques

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 3 One line comment ZIGZAG is multicast scheme for streaming applications Scalable Robust

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 4Motivation Stream live bandwidth-intensive media from a single source to many receivers An individual connection to stream the content to each receiver IP Multicast

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 5 Major design goal Three important issues in designing an efficient P2P technique The end-to-end delay from the source to a receiver may be excess ive Hierarchical, Degree-bounded multicast tree The behavior of receivers is unpredictable A robust techniques to provide a quick and graceful recovery Hierarchical Topology ZIGZAG property of multicast tree The resource limitation at each receiver Minimize the control overhead (increasing the scalability)

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 6 Administrative organization H is the number of layers K>3 is a constant (1) Layer 0 contains all peers (2) Peers in layer j<H-1 are partitioned into clusters of sizes in [ k, 3k ].Layer H-1 has only cluster which has a size in [ 2, 3k ] (3)A peer in a cluster at layer j<H is selected to be the head of that cluster. This head becomes a member of layer j+1 if j<H-1. The server S is the head of any cluster it belongs to.

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 7 Administrative organization (cont.) H = Ө(log k N) where N = # of peers Any peer at a layer j>0 must be the head of the cluster it belongs to at every lower layer

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 8 Terms Subordinate: Non-head peers of a cluster headed by a peer X are called “subordinat e” of X Foreign head: A non-head (or server) clustermate of a peer X at layer j>0 is called a “foreign head” of layer-(j-1) subordinates of X Foreign subordinate: Layer-(j-1) subordinates of X are called “foreign subordinates” of any l ayer-j clustermate of X Foreign cluster: The layer-(j-1) cluster of X is called a “foreign cluster” any layer-j clus termate of X

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 9 Multicast Tree (1)A peer, when not at its highest layer, cannot have any link to or from any other peer. (peer 4 at layer 1) (2)A peer, when at its highest layer, can only link to its foreign subordinates. The only exception is the server; at the highest layer, the server links to each of its subordinates (peer 4 in layer 2 ) (3)At layer j<H-1:non-head members of a cluster get the content directly from a foreign head (peer )

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 10 Multicast Tree (cont.) The worst-case node degree of the multicast tree is O(k 2 ) The height of the multicast tree is O(log k N) where N = # of peers

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 11 Control protocol Each node X in a layer-j cluster periodically communicates with its layer-j cl ustermates, its children and parent on the multicast tree For peers within a cluster, the exchanged information is the peer degree If the recipient is the cluster head, X also sends a list L = {[X 1,d 1 ],[X 2,d 2 ],..}, where [X i,d i ] represents that X is currently forwarding the content to d i peers in the foreign cluster whose head is X i (peer 5 at layer 1 {[S,3],[6, 3]})

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 12 Control protocol (cont.) If the recipient is the parent, X instead sends the following information: A Boolean flag Reachable(X): true iff there exists a path from X to a layer- 0 peer (Reachable(7)=false Reachable(4)=true ) A Boolean flag Addable(X): true iff there exists a path from X to a layer-0 peer whose cluster’s size is in [k,3k-1] Although the worst-case control overhead of a node is O(k*log k N), the amortized worst-case overhead is O(k)

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 13 Client Join If the administrative has one layer, new Client P connects to S D(Y) denotes the currently end-to-end delay from the server observed by a peer Y d(Y,P) is the delay from Y to P measured during the contact between Y to P measured 1. If X is a leaf 2. Add P to the only cluster of X 3. Make P a new child of the parent of X 4. Else 5. If Addable(X) 6. Select a child Y : Addable(Y ) and D(Y )+d(Y, P) is min 7.Forward the join request to Y 8. Else 9. Select a child Y : Reachable(Y ) and D(Y )+d(Y, P) is min 10. Forward the join request to Y The join overhead : O(logkN) in terms of number of nodes to con tact

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 14 Client Join - Split Suppose we decide to split a layer-j( j [1,H-2]) cluster with a head X a nd non-head peers X 1,…X n x il = the number of peers that are both children of X i and layer-(j-1) sub ordinates of X l (1) Partition {X, X 1,…,X n } into two sets U and V,|U|,|V| [k,3k], and is minimized. Suppose X U (2) For each node X i U and each node X l V such that x il > 0,remove a ll the links from X i to layer-(j-1) subordinates of X l and select a random p eer in V other than X l to be the new parent for these members

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 15 Client Join – Split (cont.) (3) Elect a new head Y for cluster V. Y is chosen to be a peer in V with the min imum degree. Y becomes a new member of the cluster at layer-(j+1). For each child cluster (whose non-head members used to be children of Y), we sel ect a peer Z != Y in V having the minimum degree to be the new parent. Remove the current link from X’ to Y and add a link from X’’ to Y

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 16 Client Join – Split (cont.) The worst-case split overhead is O(k 2 )

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 17 Client Departure A peer X who departs If X’s highest layer is layer 0, no further overhead emerges. Suppose that X’s highest layer is j>0 For each layer-(j-1) cluster whose non-head members are children of X, th e head Y of the cluster is responsible for finding a new parent for them. Y selects Z, a layer-j non-head clustermate, that has the minimum degree

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 18 Client Departure (cont.) Furthermore, since X used to be the head of j clusters at layers 0, 1,…,j- 1 Let X’ be a random subordinate of X at layer 0 X’ will replace X as the new head for each of those clusters

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 19 Performance Evaluation Peer Stretch: (the length of the data path from the server to a peer in our multicast tree) / (the length of the shortest path between them i n the underlying network) Link Stress: the number of times the same packet goes through the li nk Use the GT-ITM Generator to create a 3240-node transit-stub graph a s our underlying network topology 2000 clients located randomly K=5

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 20 Scenario 1: No Failure

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 21 Scenario 1: No Failure (cont.)

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 22 Scenario 2: Failure Possible

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 23 Scenario 3: ZIGZAG vs. NICE

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 24 Scenario 3: ZIGZAG vs. NICE (cont.)

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 25 Conclusions ZIGZAG Node degree O(k 2 ) Height of multicast tree O(log k N) Control overhead of a node O(k*log k N) Join overhead O(log k N) Split overhead O(k 2 ) Number of peers that need to reconnect due to a failure O(k 2 ) Merge overhead O(k 2 )

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 26 Conclusions Short end-to-end delay Low control overhead Efficient join and failure recovery Low maintenance overhead

Korea Advanced Institute of Science and Technology Network Computing Laboratory | 27 Critique Strong Points Exemplary Paper Organization Clarify main contribution in introduction Verbally describe protocol operation first Analyze the operation overhead Very thorough analysis Weak Points Stretch concerns ZIGZAG scheme could incur longer stretches (max. 22) Two main contribution ( fast recovery and control overhead) is marginal performance improvement Mostly benefited from their hierarchical architecture( same as NICE) Is ZIGZAG really scalable? O(k 2 ) in node degree could easily overload upper layer nodes Especially, when there are a large number of data sources (might be not considered)