Exploiting Similarity for Multi-Source Downloads Using File Handprints

Slides:



Advertisements
Similar presentations
Project3 - Congestion Control. Outline Overview Project Specification and Tasks Tools and Time Table.
Advertisements

Peer to Peer and Distributed Hash Tables
End-to-end Publishing Using Bittorrent. Bittorrent Bittorrent is a widely used peer-to- peer network used to distribute files, especially large ones It.
Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Published in 2012 ACM’s Internet Measurement Conference (IMC) Five students from.
Performance Analysis of a Parallel Downloading Scheme from Mirror Sites Throughout the Internet Allen Miu, Eugene Shih Class Project December 3,
Chapter 3 CCNA Discovery Encapsulation - Explanations and Clarifications CCNA Discovery Encapsulation - Explanations and Clarifications.
OVERVIEW LBFS MOTIVATION INTRODUCTION CHALLENGES ADVANTAGES OF LBFS HOW LBFS WORKS? RELATED WORK DESIGN SECURITY ISSUES IMPLEMENTATION SERVER IMPLEMENTATION.
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
Peer-to-peer Multimedia Streaming and Caching Service Jie WEI, Zhen MA May. 29.
Mitigating Bandwidth- Exhaustion Attacks using Congestion Puzzles XiaoFeng Wang Michael K. Reiter.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
1 IEEE based Wireless MAN ( WiMAX )架構下 IPTV Multicasting 系 統之設計與研究 Design and Study of an IPTV multicating system over IEEE based Wireless.
Multimedia Applications r Multimedia requirements r Streaming r Phone over IP r Recovering from Jitter and Loss r RTP r Diff-serv, Int-serv, RSVP.
Peer-to-peer Multimedia Streaming and Caching Service by Won J. Jeon and Klara Nahrstedt University of Illinois at Urbana-Champaign, Urbana, USA.
Department of Electrical and Computer Engineering Kekai Hu, Harikrishnan Chandrikakutty, Deepak Unnikrishnan, Tilman Wolf, and Russell Tessier Department.
Path selection Packet scheduling and multipath Sebastian Siikavirta and Antti aalto.
A Low-Bandwidth Network File System A. Muthitacharoen, MIT B. Chen, MIT D. Mazieres, NYU.
A LOW-BANDWIDTH NETWORK FILE SYSTEM A. Muthitacharoen, MIT B. Chen, MIT D. Mazieres, New York U.
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Michael Sirivianos Xiaowei Yang Stanislaw Jarecki Presented by Vidya Nalan Chakravarthy.
Daniel Johnson. Playing a media file stored on a remote server on a local client.
User side and server side factors that influence the performance of the website P2 Unit 28.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Do incentives build robustness in BitTorrent? Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani.
DATA DEDUPLICATION By: Lily Contreras April 15, 2010.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Case Study.  Client needed to build a tool to crawl through their data set and identify duplicates  The algorithm should identify exact as well as near.
An Efficient Approach for Content Delivery in Overlay Networks Mohammad Malli Chadi Barakat, Walid Dabbous Planete Project To appear in proceedings of.
Introducing CoMI Aligned with RestCONF (draft-ietf-netconf-restconf-04) Common data modeling language (YANG defined in RFC 6020) Protocol (CoAP instead.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
Common file formats  Lesson Objective: Understanding common file formats and their differences.  Learning Outcome:  Describe the type of files which.
Making the Best of the Best-Effort Service (2) Advanced Multimedia University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot.
Othman Othman M.M., Koji Okamura Kyushu University 1.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Multimedia Streaming Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
A Low-bandwidth Network File System Presentation by Joseph Thompson.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
What is the Speed of the Internet? Internet Computing KUT Youn-Hee Han.
What if? or Combining different ideas J. F. Pâris.
Department of Computer Science & Engineering 5. Acknowledgments 4. Conclusions 3. Evaluation2. Contribution 1. Introduction REU 2008-Packet Sniffer Jose.
Networks and the Internet Topic 3. Three Important Networking Technologies Networks, Internet, WWW.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
Introduction to Networking
PEAR TO PEAR PROTOCOL. Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change.
Submitted To: Submitted By: Seminar On Parasitic Computing.
Network Layer. application transport network link physical message segment packet frame signal Network Architecture.
Week-7 (Lecture-1) Internet Protocols: TCP/IP, Client Server: Protocol: Specification in networking and Communications It defines the procedures to be.
Wide-area Network Acceleration for the Developing World
The Transport Layer Implementation Services Functions Protocols
UDP TCP.
Cryptographic hash functions
OCR Computing for GCSE © Hodder Education 2011
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
MemCache Widely used for high-performance Easy to use.
Some bits on how it works
Examples of Title Pages (include your name) (Be Creative)
Downloading from Multiple Server Sources
IClicker Questions CNIT 201E.
Computer Network.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Prof. Leonardo Mostarda University of Camerino
Computer Network.
Small Is Not Always Beautiful
EPICS General Messaging and Error Handling for NLC
Изразеното в настоящата презентация мнение обвързва единствено автора и не представлява официално становище на Комисията за финансов надзор Данил Джоргов.
Content Distribution Networks + P2P File Sharing
OCR GCSE Computing © Hodder Education 2013 Slide 1
Content Distribution Networks + P2P File Sharing
Presentation transcript:

Exploiting Similarity for Multi-Source Downloads Using File Handprints

Internet Many files available on Internet Many people download files from Internet Resource is limited, long time to download files Client bandwidth Server capacity Router congestion

Solutions Many files on Internet are duplicate By use of all the available sources, client use shorter time to download files per-file (Bit Torrent) per-chunk (CFS and Shark) O(N) lookup where N is no of chunks O(1) lookup O(1) insert mappings per file

How to do? Similarity Lookup the similar file in O(1) Low overhead of locating source

Similarity MP3 with different header Movies with different language Damage files (only few bytes of error) Compressed file with different additional files

Parallelism Optimistic metric Download different chunks at the same time Client select different source for different chunks Each source send one chunk at a time

Parallelism Conservative parallelism metric Download one chunk at a time Download chunk at different source

Parallelism

Parallelism

Parallelism

Handprinting Two files A and B Na no of chunks of A Nb no of chunks of B m chunks in common k selected hashes

Handprinting How many chunks (k) we selected Two files A and B Na no of chunks of A Nb no of chunks of B m chunks in common k selected hashes

Implemention

Evaluation

Evaluation

Evaluation

Evaluation

Evaluation

Evaluation

Q & A Thank You