A Survey on Content-Oriented Networking for Efficient Content Delivery

Slides:



Advertisements
Similar presentations
Efficient Event-based Resource Discovery Wei Yan*, Songlin Hu*, Vinod Muthusamy +, Hans-Arno Jacobsen +, Li Zha* * Chinese Academy of Sciences, Beijing.
Advertisements

Scalable Content-Addressable Network Lintao Liu
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Jang, Donghyun 2011/4/4 1/21.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Peer-to-peer Multimedia Streaming and Caching Service by Won J. Jeon and Klara Nahrstedt University of Illinois at Urbana-Champaign, Urbana, USA.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
P2P File Sharing Systems
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Introduction to DFS. Distributed File Systems A file system whose clients, servers and storage devices are dispersed among the machines of a distributed.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Content Delivery Networks: Status and Trends Speaker: Shao-Fen Chou Advisor: Dr. Ho-Ting Wu 5/8/
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Malugo – a scalable peer-to-peer storage system..
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Fall, 2001CS 6401 Switching and Routing Outline Routing overview Store-and-Forward switches Virtual circuits vs. Datagram switching.
Authors: Jiang Xie, Ian F. Akyildiz
Data Center Network Architectures
Nuno Salta Supervisor: Manuel Ricardo Supervisor: Ricardo Morla
Content Distribution Networks
Ad-hoc Networks.
Revisiting Ethernet: Plug-and-play made scalable and efficient
Peer-to-Peer Data Management
Principles of Network Applications
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
CHAPTER 3 Architectures for Distributed Systems
Introduction to Networking
Net 323 D: Networks Protocols
Plethora: Infrastructure and System Design
nTorrent: Peer-to-Peer File Sharing in Named Data Networking
by Saltanat Mashirova & Afshin Mahini
Content Dissemination Systems Including Streaming Systems
A Scalable content-addressable network
5.2 FLAT NAMING.
Distributed P2P File System
Prof. Leonardo Mostarda University of Camerino
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Privacy in Content-Oriented Networking: Threats and Countermeasures
Distributed Publish/Subscribe Network
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
A Survey on Content-Oriented Networking for Efficient Content Delivery
EE 122: Lecture 22 (Overlay Networks)
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Consistent Hashing and Distributed Hash Table
Presentation transcript:

A Survey on Content-Oriented Networking for Efficient Content Delivery Authors: Jaeyoung Choi, Jinyoung Han, Eunsang Cho, Ted “Taekyoung” Kwon, and Yanghee Choi, Seoul National University Presenters: Prithvi Monangi , 16858394 Amrutha Alaparthy : 66905246

Existing Issue As multimedia contents become increasingly dominant and voluminous, the current Internet architecture will reveal its inefficiency in delivering time-sensitive multimedia traffic. To address this issue, there have been studies on content oriented networking (CON) by decoupling contents from hosts at the networking level.

Contents discussed Content Naming Name based routing Comparison of CON routing proposals Evaluation of the impact of publish/subscribe paradigm and in- network caching

Introduction As the bit rate of multimedia traffic increases , TCP/IP may fail to deliver time sensitive data. Two problems with host based Internet architecture: CPs like youtube, Hulu etc deliver HDTV streaming services multicasting/broadcasting over IP networks (IPTV) TCP/IP architecture fails to efficiently handle the above tasks

Existing Solutions At present, multimedia is delivered to numerous users using P2P systems like BitTorrent BitTorrent : Inefficient in networking perspective: peer can download chunks only from a small subset of peers who may be distantly located Content-oriented applications/services, doesn’t care about hosts, but focusses on contents.

Existing Solutions Host oriented architecture - content delivery This mismatch leads to application/service-specific solutions, which may be costly and/or inefficient. Two representative examples are: Web caches and content delivery networks (CDNs) transparently redirect web clients to a nearby copy of the content file. P2P systems enable users to search and retrieve the content file.

CON vs IP CON node performs routing by content names, not by (host) locators. This means two radical changes: • Identifying hosts is replaced by identifying contents. • The location of a content file is independent of its name. This makes CON location independent.

CON vs IP 2) publish/subscribe paradigm is the main communication model in CON, which helps us to decouple content generation and consumption in time and space….In IP, user should know which source holds the file. 3) Authenticity of contents can easily be verified by leveraging public key cryptography. In IP networking, a host address seen by a user is irrelevant to its content name, which results in phishing attacks

CON Architecture A CON architecture can be characterized by four main building blocks: • How to name the contents • How to locate the contents (routing) • How to deliver/disseminate the contents • How to cache the contents “in” the network

Content Naming Hierarchical Naming Content file is often named by an identifier like web URL. Hierarchical nature can help us mitigate the routing scalability issue since routing entries for contents might be aggregated. components in a hierarchical name (e.g., www.acme.com and logo.jpg) have semantics, which prohibits persistent naming. I.e; if the ownership is changed its name becomes misleading

Content Naming Flat Naming To eliminate shortcomings like persistence naming of hierarchical naming Flat and self-certifying names are employed by defining a content identifier as a cryptographic hash of a public key. Persistence and uniqueness are achieved. Routing scalability decreases as there is no aggregation. An additional resolution is needed b/w application level and human readable names.

Content Naming Attribute Based Naming Identifies content with set of attribute value pairs which facilitates in network searching Drawbacks : An AVP may not be unique or well defined. The semantics of AVPs may be ambiguous. The number of possible AVPs can be huge

Name Based Routing Locating the content based on the name Two types of classification: Unstructured routing : No structure to maintain routing tables Routing advertisement is performed by flooding Network prefixes in IP routing are replaced with content Identifiers As the replication of content file increases, the level of aggregation decreases

Name Based Routing Structured routing : Two structures : Implemented using either DHT or Tree In tree arch, each router contains the routing information of all the contents published in its descendant routers As the level of routing increases, routing burden increases - not scalable In DHT, flatness imposes equal routing burden on routers n(Contents) = C, each router should have log C entries DHT might exhibit longer paths than tree sometimes

Multi Source Dissemination Further issues in CON Multi Source Dissemination Existing internet architecture is designed with point to point connectivity New applications require different connectivities like 1:N (one to many) and M:N (many to many) 1: N - IPTV, online streaming - uses IP multi casting framework CON accommodates 1:N connectivity naturally with its publish- subscribe mechanism in terms of Content naming and group management

Multi Source Dissemination Further issues in CON Multi Source Dissemination M:N Many to Many Multiple sources disseminate different parts of the content to n recipients - Bittorrent and multi-user online gaming Existing Internet requires application specific overlays for M:N Example: P2P networks - Bittorrent P2P systems are application level solutions, cannot exploit network topology information.

Multi Source Dissemination Further issues in CON Multi Source Dissemination

Multi Source Dissemination Further issues in CON Multi Source Dissemination M:N Many to Many CON can efficiently disseminate a content file among subscribers since CON nodes (R2 and R4) will help them download the content file also from the other overlay. CON keeps track of individual sources of the same content allowing us to retrieve different parts of requested content in parallel CON node dynamically decides which part to be received from which source based on traffic dynamics

Multi Source Dissemination Further issues in CON Multi Source Dissemination M:N Many to Many Issue: What routing info needs to be stored at each CON node for multiple sources of same content The more sources of the same content the CON node learns of, the more selectively it may have to propagate the routing information of the sources

Further issues in CON In Network Caching Generally used caching techniques: LRU - Least Recently used and LFU - Least frequently used content file replacement Performance can be further improved by coordinating multiple CON nodes in distributed fashion Study of distributed caching in IP networking is limited to single source dissemination and limited network topologies. we need to reformulate the distributed caching problem in CON environments like multi source dissemination

In Network Caching - continued Further issues in CON In Network Caching - continued Design Issue: How to design a signalling protocol among CON nodes. If a routing protocol is used to facilitate coordinated caching among CON nodes, then here will be no significant signaling traffic overhead The more frequently the content information is updated, the more routing info may have to be advertised - This needs to be controlled

Performance Evaluation We evaluate two things: The effect of routing structures on resolution time to locate a content file How much traffic load can be reduced by in network caching

Two-Tier architecture Hybrid approach: Tree can be formulated with network topology information (e.g., hop count between nodes), tree routing achieves higher throughput than DHT routing. DHT routing is more scalable in terms of routing burden and more resilient to node/link failures due to multiple paths than tree routing. A hybrid approach whose routing structure consists of two tiers: a DHT is the high tier, and a tree is the low tier is introduced.

Two-Tier architecture Hybrid approach: A query for a content file published in the same tree will be serviced within the tree. If a query is for a content file outside the tree structure, the DHT structure is exploited to forward the query

Comparisons Resolution delays: Tree structure outperforms DHT because, the content request goes back and forth among CON nodes of DHT as the topology is constructed without any information on physical topology Performance of two-tier architecture falls between these two Successful resolution ratio as node failure rate increases : Performance gain of DHT over tree because, there are multiple paths among nodes in DHT where as in tree structure, higher level node failure results in node failures

Network traffic load The performance metric is the product of hop count and link bandwidth This diminishes in CON proposals due to cache effect Two-tier exhibits poorer performance than tree due to DHT overlay inefficiency

Conclusion CON vs IP Characteristics of CON - naming, routing etc Research topics in CON environments: M:N dissemination In network caching

THANK YOU