Informed Content Delivery Across Adaptive Overlay Networks John Byers Dept. of Computer Science, Boston University www.cs.bu.edu/~byers Joint work with.

Slides:



Advertisements
Similar presentations
A Digital Fountain Approach to Reliable Distribution of Bulk Data
Advertisements

Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Digital Fountains: Applications and Related Issues Michael Mitzenmacher.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Jump to first page A. Patwardhan, CSE Digital Fountains Main Ideas : n Distribution of bulk data n Reliable multicast, broadcast n Ideal digital.
Cooperative Overlay Networking for Streaming Media Content Feng Wang 1, Jiangchuan Liu 1, Kui Wu 2 1 School of Computing Science, Simon Fraser University.
SplitStream: High- Bandwidth Multicast in Cooperative Environments Monica Tudora.
Network Coding in Peer-to-Peer Networks Presented by Chu Chun Ngai
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Resilient Peer-to-Peer Streaming Paper by: Venkata N. Padmanabhan Helen J. Wang Philip A. Chou Discussion Leader: Manfred Georg Presented by: Christoph.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Computer Science 1 ShapeShifter: Scalable, Adaptive End-System Multicast John Byers, Jeffrey Considine, Nicholas Eskelinen, Stanislav Rost, Dmitriy Zavin.
Efficient and Flexible Parallel Retrieval using Priority Encoded Transmission(2004) CMPT 886 Represented By: Lilong Shi.
Computer Science ROMA: Reliable Overlay Multicast with Loosely Coupled TCP Connections Gu-In Kwon and John Byers Computer Science Dept. Boston University.
Opportunities and Challenges of Peer-to-Peer Internet Video Broadcast J. Liu, S. G. Rao, B. Li and H. Zhang Proc. of The IEEE, 2008 Presented by: Yan Ding.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Informed Content Delivery Across Adaptive Overlay Networks J. Byers, J. Considine, M. Mitzenmacher and S. Rost Presented by Ananth Rajagopala-Rao.
Threshold Phenomena and Fountain Codes
Erasure Correcting Codes
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 PERTEMUAN 5.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Secure Multimedia Multicast: Interface and Multimedia Transmission GROUP 2: Melissa Barker Norman Lo Michael Mullinix server router client router client.
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Cyclone Server Architecture Streamlining Delivery of Popular Content Stanislav Rost John Byers Azer Bestavros.
High Performance Cooperative Data Distribution [J. Rick Ramstetter, Stephen Jenks] [A scalable, parallel file distribution model conceptually based on.
Digital Fountain with Tornado Codes and LT Codes K. C. Yang.
Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads John Byers, Boston University Michael Luby, Digital Fountain, Inc.
Digital Fountains, and Their Application to Informed Content Delivery over Adaptive Overlay Networks Michael Mitzenmacher Harvard University.
P2P File Sharing Systems
Network Design Essentials
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
Exploring VoD in P2P Swarming Systems By Siddhartha Annapureddy, Saikat Guha, Christos Gkantsidis, Dinan Gunawardena, Pablo Rodriguez Presented by Svetlana.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
1 Codes, Bloom Filters, and Overlay Networks Michael Mitzenmacher.
Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Computer Science Informed Content Delivery Across Adaptive Overlay Networks Overlay networks have emerged as a powerful and highly flexible method for.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
On the use of Reliable Multicast for Content Distribution Vassilis Chatzigiannakis
Outline Introduction Overview of the Akamai platform Akamai HD network
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Intro to Network Design
Stochastic Multicast with Network Coding Ajay Gopinathan, Zongpeng Li Department of Computer Science University of Calgary ICDCS 2009, June , Montreal.
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Plethora: A Wide-Area Read-Write Storage Repository Design Goals, Objectives, and Applications Suresh Jagannathan, Christoph Hoffmann, Ananth Grama Computer.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Presented by Kelly Whitacre Written by John W. Byers, Jeffrey Considine, Michael Mitzenmacher, Member, IEEE, and Stanislav Rost.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Cooperative Mobile Live Streaming Considering Neighbor Reception SPEAKER: BO-YU HUANG ADVISOR: DR. HO-TING WU 2015/10/15 1.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
March 2001 CBCB The Holy Grail: Media on Demand over Multicast Doron Rajwan CTO Bandwiz.
Peer-to-Peer Result Dissemination in High-Volume Data Filtering Shariq Rizvi and Paul Burstein CS 294-4: Peer-to-Peer Systems.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
CHAPTER -II NETWORKING COMPONENTS CPIS 371 Computer Network 1 (Updated on 3/11/2013)
Accelerating Peer-to-Peer Networks for Video Streaming
Optimising Streaming Systems with SDN/P4/NetFPGA
Zueyong Zhu† and J. William Atwood‡
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Dynamic Replica Placement for Scalable Content Delivery
Presentation transcript:

Informed Content Delivery Across Adaptive Overlay Networks John Byers Dept. of Computer Science, Boston University Joint work with Jeffrey Considine, Michael Mitzenmacher and Stanislav Rost

Overlays for Content Delivery Build distribution topology out of unicast connections (tunnels). Requires active participation of end-systems. Native IP multicast unnecessary. Saves considerable bandwidth over N * unicast solution. Basic paradigm easy to build and deploy. adapt Bonus: Overlay topology can adapt to network conditions by self-reconfiguration. SOURCE

Killer apps:  Millions of users want to download a new movie watch the SIGCOMM technical sessions.  CDNs want to populate thousands of servers with new movies for those users. Research directions to date:  Considerable effort on optimizing overlay layout (Narada, Overcast, RON, etc.).  Scalable solutions for indexing/locating content using overlays (CAN, Chord, etc.). Our focus:  Maximize throughput of large transfers across overlays. Use of Overlays

Limitations of Existing Schemes Tree-like topologies  Rooted in history (IP Multicast)  Limitations: bandwidth decreases monotonically from the source losses increase monotonically along a path Does this matter in practice? yes  Anecdotal and experimental evidence says yes: Downloads from multiple mirror sites in parallel [BLM ’99, RKB ’00] Availability of better routes [SCHSA ’99, ABKM ’01]. Peer-to-peer: Morpheus, Kazaa and Grokster.

An Illustrative Example 1. A basic tree topology Harnessing the power of parallel downloads Incorporating collaborative transfers. 3

Our Philosophy Go beyond trees.  Use additional links and bandwidth by: in paralleldownloading from multiple peers in parallel perpendiculartaking advantage of “perpendicular” bandwidth  Has potential to significantly speed up downloads… But only effective if: carefully orchestrated  collaboration is carefully orchestrated frequent adaptation  methods are amenable to frequent adaptation of the overlay topology

Suitable Applications Prerequisite conditions:  Available bandwidth between peers.  Differences in content received by peers.  Rich overlay topology. Applications  Downloads of large, popular files.  Video-on-demand or nearly real-time streams.  Shared virtual environments.

Erasure Codes I need packets 1-1,000.We typically think of data as an ordered stream. I need packets 1-1,000. Using erasure codes, data is like water:  Can generate a pool of redundant data from full original content.  You don’t care what droplets you get.  You don’t care if some spills. I need any 1,000 packets.  You just want enough to get through the pipe. I need any 1,000 packets. The digital fountain model [BLMR ’98] is ideal for use in a fluid overlay environment.

Erasure Codes Offer Freedom Intrinsic resilience to packet loss, reordering. Better support for transient connections via stateless migration, suspension. Peers with full content can always generate useful symbols. Peers with partial content are more likely to have content to share. ButBut using erasure codes comes at a price:  Content is no longer an ordered stream.  Therefore, collaboration is more difficult.

Informed Content Delivery: Definitions and Problem Statement working sets S A S B UPeers A and B have working sets of symbols S A, S B drawn from a large universe U and want to collaborate effectively. Key components: 1) Summarize 1) Summarize: Furnish a concise and useful sample of a working set to a peer. 2) Approximately Reconcile S A - S B 2) Approximately Reconcile: Compute as many elements in S A - S B as possible and transmit them. Do so with minimal control messaging overhead.

Min-Wise Summaries Problem: Neighboring peers may have similar content. Solution: Give peers a “calling card” (fits in 1 packet) to summarize the content they have, check similarity.

Recoding Problem: What to transmit when peers have similar content? Solution: Allow peers to probabilistically “hedge their bets,” minimizing chance of transmission of useless content. Example: S A S B A B Suppose the resemblance between S A and S B is 0.9. If A sends a symbol at random the probability of it being useful to B is 0.1. A better strategy is to XOR 10 random symbols together. B B can extract one useful symbol with probability: 10 x ( 1 / 10 ) x ( 9 / 10 ) 9 > 1/e  0.37

Approximate Reconciliation Trees Problem: Collaborating peers have overlapping content. Solution: Efficient data structures for reconciliation.

Experimental Scenarios Three methods for collaboration Uninformed  Uninformed: A transmits symbols at random to B. Speculative  Speculative: B transmits a minwise summary to A; A then sends recoded symbols to B. Reconciled  Reconciled: B transmits a digest of its set to A; A then sends packets from the set difference. Overhead:  Decoding overhead: with erasure codes, fixed 2.5%.  Reception overhead: useless duplicate packets.  Recoding overhead: useless recoding packets. symbols received - symbols needed symbols needed

Pairwise Reconciliation Containment of B in A: |S A  S B | |S B | 128MB file 96K input symbols 115K distinct symbols in system initially

Four peers in parallel 128MB file 96K input symbols 105K distinct symbols in system initially Containment of B in A: |S A  S B | |S B |

Four peers, periodic updates 128MB file 96K input symbols 105K distinct symbols in system initially Digests updated at every 10%. Containment of B in A: |S A  S B | |S B |

Conclusions whatEven with ultimate routing topology optimization, the choice of what to send is paramount to content delivery. Digital fountain model ideal for fluid and ephemeral network environments. Richly connected topologies are key to harnessing perpendicular bandwidth. Wanted: more algorithms for intelligent collaboration.