A Swarming Architecture is Good for Internet Data Transfer ? Offensed by Jiazhen Chen & Alexander Kiaie.

Slides:



Advertisements
Similar presentations
Xia Zhou*, Stratis Ioannidis ♯, and Laurent Massoulié + * University of California, Santa Barbara ♯ Technicolor Research Lab, Palo Alto + Technicolor Research.
Advertisements

Information-centric networking: Concepts for a future Internet David D. Clark, Karen Sollins MIT CFP November, 2012.
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Review of a research paper on Skype
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
Cloud Download : Using Cloud Utilities to Achieve High-quality Content Distribution for Unpopular Videos Yan Huang, Tencent Research, Shanghai, China Zhenhua.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
CMPT 401 Summer 2007 Dr. Alexandra Fedorova Lecture XV: Real P2P Systems.
Dynamic Internet Congestion with Bursts Stefan Schmid Roger Wattenhofer Distributed Computing Group, ETH Zurich 13th International Conference On High Performance.
On the Topologies Formed by Selfish Peers Thomas Moscibroda Stefan Schmid Roger Wattenhofer IPTPS 2006 Santa Barbara, California, USA.
Criticisms of I3 Jack Lange. General Issues ► Design ► Performance ► Practicality.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Improving ISP Locality in BitTorrent Traffic via Biased Neighbor Selection Ruchir Bindal, Pei Cao, William Chan Stanford University Jan Medved, George.
Postcards from the Edge – Offense Presented by: Sam McIngvale Rob Kotz.
Performance Evaluation of Peer-to-Peer Video Streaming Systems Wilson, W.F. Poon The Chinese University of Hong Kong.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Portland: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric Offense Kai Chen Shih-Chi Chen.
Using Prices to Allocate Resources at Access Points Jimmy Shih, Randy Katz, Anthony Joseph One Administrative Domain Access Point A Access Point B Network.
Transport Level Protocol Performance Evaluation for Bulk Data Transfers Matei Ripeanu The University of Chicago Abstract:
Winter Retreat Connecting the Dots: Using Runtime Paths for Macro Analysis Mike Chen, Emre Kıcıman, Anthony Accardi, Armando Fox, Eric Brewer
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Wireless MESH network Tami Alghamdi. Mesh Architecture – Mesh access points (MAPs). – Mesh clients. – Mesh points (MPs) – MP uses its Wi-Fi interface.
Leveraging Social Networks for Increased BitTorrent Robustness Wojciech Galuba, Karl Aberer EPFL, Switzerland Zoran Despotovic, Wolfgang Kellerer Docomo.
P2P Taxonomy and Security Concerns Ryan Lackey CTO, HavenCo, Ltd. RSA Conference 2002 San Jose
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Gnutella2: A Better Gnutella?
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
1 National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN Architecture and Protocols 2nd MobileMAN.
P.1Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Part2: An Approach of Passive Peer based Caching to Mitigate P2P Inter-domain.
Rob Sherwood CS244 Lecture 8: Sound Strategies For Internet Measurement.
Sharing Information across Congestion Windows CSE222A Project Presentation March 15, 2005 Apurva Sharma.
Arun Venkataramani Donald Towsley Presented by: Shiqi Chen, Ionut Trestian.
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
Efficient P2P backup through buffering at the edge S. Defrance, A.-M. Kermarrec (INRIA), E. Le Merrer, N. Le Scouarnec, G. Straub, A. van Kempen.
Queuing Networks Jean-Yves Le Boudec 1. Contents 1.The Class of Multi-Class Product Form Networks 2.The Elements of a Product-Form Network 3.The Product-Form.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Geneva, Switzerland, 11 June 2012 Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic) Martin Waldburger, University of Zurich,
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
Some questions about multipath Damon Wischik, UCL Trilogy UCL.
Ad Hoc Network.
An Evaluation of Routing Reliability in Non-Collaborative Opportunistic Networks Ling-Jyh Chen, Che-Liang Chiou, and Yi-Chao Chen Institute of Information.
Daniel A. G. Manzato and Nelson L. S. da Fonseca Institute of Computing, State University of Campinas Campinas, Brazil speaker: 吳麟佑.
Internet Protocol Storage Area Networks (IP SAN)
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
Content Delivery Networks: Status and Trends Speaker: Shao-Fen Chou Advisor: Dr. Ho-Ting Wu 5/8/
Malugo – a scalable peer-to-peer storage system..
Improving System Availability in Distributed Environments Sam Malek with Marija Mikic-Rakic Nels.
Game Theoretic Analysis of P2P Systems Daniel Chen December 4, 2003 GE 493RS.
Ayoub Kafyulilo DUCE Challenges and Opportunities of Integrating ICT in Education.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Multicast in Information-Centric Networking March 2012.
Lecture XV: Real P2P Systems
The Internet has a great future behind it.
NET 536 Network Security Firewalls and VPN
CASCADE: AN ATTACK-RESISTANT DHT WITH MINIMAL HARD STATE
CS244 Lecture 8: Sound Strategies For Internet Measurement
nTorrent: Peer-to-Peer File Sharing in Named Data Networking
European Conference on Mobility Management 2017
Simplified Explanation of “Do incentives build robustness in BitTorrent?” By James Hoover.
The BitTorrent Protocol
Resource Pooling A system exhibits complete resource pooling if it behaves as if there was a single pooled resource. I propose ‘extent of resource pooling’
Developing Vehicular Data Cloud Services in the IoT Environment
Communication Networks
Transport Layer Identification of P2P Traffic
P2P: Unique Design Challenges in Accountability and Security
Presentation transcript:

A Swarming Architecture is Good for Internet Data Transfer ? Offensed by Jiazhen Chen & Alexander Kiaie

Question1 Why we need this? The Goal of your proposal is: –Use Swarm for Universal Data Transfer –It is Better Because? Robust Multipoint-to-point transport layer Can solve the P2P problem –A “Headache” for Network Administrator –However, what about the other aspects? Potential Traffic Congestion Cost of numerous connections among peers Therefore, your “swarm” does not look like a proper pill for curing the headache.

Let’s continue Despite your ambitious goals What is your motivation for this novel design? In other words: –Why we need lots of swarm to replace the current architecture? –Possible Key Benefits: Post-Popularity: –What about using Google Search + SourceForge (OR) –SkyDrive + MSN Search –If it’s legal, there is no barrier for storage and sharing online. Block availability: –Why, Why, Why we need to exchange blocks that might never trigger our interest ever???

Here we go The Comparison over Uswarm and isolated swarms: –You claimed: Uswarm has potential benefit over the other But you admit that here not account for the selfish behaviour. Maybe they both perform equally bad : ) –You also admit: It’s over-estimate the improvement in reliability since we did not precisely model the tracking process. So.. The tracking process is arbitrarily defined and simulated? –The impact of DHT, Replicated Trackers on tracker availability It might be true - experiment BUT, in this proposal, –No explanation on how you measure the result Thus, the conclusion is doubtable to us.

It’s not over yet The incentive Strategies –You said the cost is proportional to the number of open connections –What if when two peers are willing to upload blocks but do not have blocks of interest to the other? –The TCP inefficiencies, traffic shaping might be the cause of the low utilization of bandwidth in practice, not mainly caused by your focus problem. –Without a long-term wide-covered test, it is hard to estimate whether your proposal can really work better than the current architecture.

Deployment Massive Replication Knowledge of routing topology –Difficulty –Peer knowledge Limit free-riding?

Other Work DHT –Beehive, CoDoNS –They work and have great properties

Plan of Work 1 Year for analyzing single-swarm behavior? Security and Privacy testing