SIMULATING A MOBILE PEER-TO-PEER NETWORK Simo Sibakov Department of Communications and Networking (Comnet) Helsinki University of Technology Supervisor:

Slides:



Advertisements
Similar presentations
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Advertisements

CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
Evaluation of a Scalable P2P Lookup Protocol for Internet Applications
1 Mobile IPv6-Based Ad Hoc Networks: Its Development and Application Advisor: Dr. Kai-Wei Ke Speaker: Wei-Ying Huang.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric Petar Mayamounkov David Mazières A few slides are taken from the authors’ original.
P2P Systems and Distributed Hash Tables Section COS 461: Computer Networks Spring 2011 Mike Freedman
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
Technische Universität Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei Liao.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Speaker: Cathrin Weiß 11/23/2004 Proseminar Peer-to-Peer Information Systems.
Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M
1 1 Chord: A scalable Peer-to-peer Lookup Service for Internet Applications Dariotaki Roula
Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 22: Overlay Networks Xiaowei Yang
Design and Implementation of the OLSR Protocol in an Ad Hoc Framework Juan Gutiérrez Plaza Supervisor: Raimo Kantola Instructor: José Costa Requena Networking.
P2psip WG, IETF841 Jin Peng Qing Yu Yuan Li One Hop Lookups Algorithm Plugin for RELOAD draft-peng-p2psip-one-hop-plugin-02.
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small-world Overlay P2P Network
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
“Umbrella”: A novel fixed-size DHT protocol A.D. Sotiriou.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Effizientes Routing in P2P Netzwerken Chord: A Scalable Peer-to- peer Lookup Protocol for Internet Applications Dennis Schade.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
An Improved Kademlia Protocol In a VoIP System Xiao Wu , Cuiyun Fu and Huiyou Chang Department of Computer Science, Zhongshan University, Guangzhou, China.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Akbar Rahman Juan Carlos Zúñiga Guang Lu IETF 78, July P2P Streaming for Mobile Nodes: Scenarios.
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Kademlia: A Peer-to-peer Information System Based on the XOR Metric.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Click to edit Master title style Multi-Destination Routing and the Design of Peer-to-Peer Overlays Authors John Buford Panasonic Princeton Lab, USA. Alan.
Node Lookup in P2P Networks. Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
SIP-Based or DHT-Based? November 12, 2005 Eunsoo Shim Panasonic Digital Networking Laboratory P2P SIP Ad-hoc Meeting IETF64, Vancouver.
Malugo – a scalable peer-to-peer storage system..
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
NGMAST Mobile DHT Energy1 Optimizing Energy Consumption of Mobile Nodes in Heterogeneous Kademlia-based Distributed Hash Tables Imre Kelényi Budapest.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
CHAPTER 3 Architectures for Distributed Systems
Peer-to-Peer Protocol (P2PP)
Kademlia: A Peer-to-peer Information System Based on the XOR Metric
Presentation transcript:

SIMULATING A MOBILE PEER-TO-PEER NETWORK Simo Sibakov Department of Communications and Networking (Comnet) Helsinki University of Technology Supervisor: Prof. Raimo Kantola

Contents ► Background ► Protocol introductions  SIP, P2PSIP, RELOAD ► Overlay Concept ► DHT  concept  DHT algorithms Chord and Kademlia ► Routing modes ► OverSim simulator ► Input parameters ► Output parameters ► Results ► Conclusions

Background of the study ► The task was to:  simulate a P2PSIP network using RELOAD as its peer protocol  evaluate P2PSIP’s applicability for mobile telephone networks ► The study included:  Writing a C++ class for the simulation program to model the RELOAD messages  Making other necessary additions to the simulation program code.  Collecting and analyzing the results

SIP (Session Initiation Protocol) ► SIP is a signaling protocol used for setting up multimedia sessions ► SIP supports user mobility and localization ► SIP is a traditional client/server protocol dependent on server elements

Location Service 1 REGISTER 5 Response 2 Store 3 INVITE 4 Query ProxyRegistrar 6 INVITE UA domain.com sip.domain.com (public URI) (SIP URI) SIP MESSAGE OTHER PROTOCOL

P2PSIP (Peer-to-Peer SIP) ► An alternative solution to the session establishment ► Provides the same localization service as SIP but without server elements ► Every node (peer) has equal functions and responsibilities for data storage and message routing RELOAD (Resource LOcation And Delivery) ► The peer protocol of P2PSIP ► RELOAD is used for inter-peer communications in the P2PSIP overlay

DHT (Distributed Hash Table) ► Distributes the data and query load evenly to all nodes in the overlay ► Divides the keyspace between the participating nodes ► Each node has an identifier (node ID) ► Stored data elements also have identifiers (resource ID) ► Two DHT algorithms, Chord and Kademlia, are used in this study ► DHT algorithms define the logical location of the nodes in the overlay

Physical links Logical links UNDERLAYING NETWORK OVERLAY NETWORK Overlay concept

Chord ► Nodes are logically arranged in the identifier circle ► Keys are assigned to the node whose ID succeeds the ID of the key ► Chord has two independent routing tables: successor list and finger table

Kademlia ► Nodes are treated as leaves of a binary tree where nodes are located according to the shortest unique prefix of the node ID. ► Every node sees the network as a group of subtrees ► For every subtree a node has a k-bucket in which there is information about k nodes. SUBTREE MODELK-BUCKETS (k=2)

Routing modes SYMMETRIC RECURSIVEITERATIVE

OverSim - Overlay Network Simulator ► Based on OMNeT++ discrete event network simulator ► Consists of modules that are implemented in C++ ► In this study RELOAD was modeled in the DHT TestApp module.

Input parameters ► In the simulations 4 input parameters were observed ► Other parameters were kept fixed ► Altogether 57 simulation scenarios were run ► Simulation time for each simulation run was 14 days

Output parameters ► Overall bandwidth usage ► Message overhead for maintenance  Only when using Chord. Kademlia does not use separate maintenance messages ► Number of lookup hops  Length of the lookup path ► Lookup message overhead  Amount of data transferred in the lookup processes in bytes ► Lookup delay  Delay between sending a lookup and receiving an answer ► Key distribution  Mean number of keys stored per node ► Lookup success rate

► Input paremeters affecting the mean total traffic are number of nodes and key update interval ► Kademlia uses more than twice as much bandwidth than Chord ► Iterative routing uses more bandwidth than recursive routing when Chord is used ► Mean total traffic is generally low (maximum bw for GPRS is ~14kB) Results

Results ► Kademlia needs less time to complete lookups than Chord does ► Kademlia uses more bandwidth for lookup traffic than Chord does

► Kademlia gives higher lookup success rates than chord ► Recursive routing gives higher lookup success rates than iterative routing when Chord is used ► The shorter the key update interval the higher the lookup success rate ► The longer the mean node lifetime the higher the lookup success rate Results

Conclusions ► 2G mobile telephone networks can handle the bandwidht usage of a P2PSIP network using RELOAD peer protocol ► With the input parameters used in this study, lookup success rates are in general too low for session establishment to work satisfyingly. ► Kademlia outperforms Chord when lookup delay and success rates are compared ► Kademlia uses more than twice the bandwidth that chord does. FUTURE RESEARCH: This study could be developed by using more exact input parameters The reasons for the low lookup success rate could be investigated

Questions?