ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting.

Slides:



Advertisements
Similar presentations
1 ISP-Aided Neighbor Selection for P2P Systems Vinay Aggarwal Anja Feldmann, Obi Akonjang,
Advertisements

P4P: ISPs and P2P Laird Popkin, Pando Networks Doug Pasko, Verizon.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada ISP-Friendly Peer Matching without ISP Collaboration Mohamed Hefeeda (Joint.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Can ISPs and P2P Users Cooperate for Improved Performance? Vinay Aggarwal, Anja Feldmann (German Telecom Laboratories) Christian Scheideler (TU, Munchen)
CSc 461/561 CSc 461/561 Peer-to-Peer Streaming. CSc 461/561 Summary (1) Service Models (2) P2P challenges (3) Service Discovery (4) P2P Streaming (5)
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Introduction to client/server architecture
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
IETF P2P Mechanisms Wes Eddy / TSV AD MTI Systems TSVAREA IETF 81 – Quebec City, July 2011.
Diameter Agent Overload IETF 88 - Vancouver 1. Goal Get consensus from the working group that Agent overload needs to be addressed If so, get guidance.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
Content Distribution March 8, : Application Layer1.
{ Content Distribution Networks ECE544 Dhananjay Makwana Principal Software Engineer, Semandex Networks 5/2/14ECE544.
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 ISP-aided Biased Query Search in P2P Systems Vinay Aggarwal and Anja Feldmann Deutsche Telekom Laboratories / TU Berlin Berlin,
ICN Considerations for ISP’s Existing Networks Lichun Li, Xin Xu, Jun Wang, Zhenwu Hao {xu.xin18, wang.jun17,
| NOME AUTORE TELECOM ITALIA GROUP Vacation Planning RIMINI PORTOFINO SORRENTO TAORMINA Randomly picking from a list of nice locations does not sound like.
ALTO Problem Statement draft-marocco-alto-problem-statement-03 Enrico Marocco Vijay Gurbani 73 rd IETF Meeting.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
P4P: Provider Portal for Applications Haiyong Xie, Y. Richard Yang Arvind Krishnamurthy, Yanbin Liu, Avi Silberschatz SIGCOMM ’08 Hoon-gyu Choi
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
An Efficient Approach for Content Delivery in Overlay Networks Mohammad Malli Chadi Barakat, Walid Dabbous Planete Project To appear in proceedings of.
TELECOM ITALIA GROUP P2P-TV Workshop Torino, Jan 2011 Application-Layer Traffic Optimization How did we get here? Where are we going? Enrico Marocco
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Exercises for Chapter 10: Peer-to-Peer Systems Peer-to-Peer Systems
The PROXIDOR Service draft-akonjang-alto-proxidor-00.txt S. Previdi O. Akonjang A. Feldmann
HUAWEI TECHNOLOGIES CO., LTD. Page 1 Survey of P2P Streaming HUAWEI TECHNOLOGIES CO., LTD. Ning Zong, Johnson Jiang.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
ALTO BOF Charter Discussion. Charter Iterated (twice) on the list  Several comments on the first version Terminology, caching  No complains on current.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Flashback: A Peer-to-Peer Web Server for Flash Crowds Presented by Tom Batkiewicz CS 587x Fall ‘07.
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
ALTO: A Multi Dimensional Peer Selection Problem IETF 73 Saumitra Das
John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante Northwestern, EECS.
Skype.
An example of peer-to-peer application
P4P : Provider Portal for (P2P) Applications Haiyong Xie, Y
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
Plethora: Infrastructure and System Design
An Introduction to Computer Networking
P4P: ISPs and P2P Laird Popkin, Pando Networks Doug Pasko, Verizon.
Presentation transcript:

ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting

Outline History The problem Main issues Use cases The cache location “sub-problem”

Internet Applications x 198xFile transfer Usenet 199xWeb browsing 200xPeer-to-peer Source: mostly Wikipedia

Internet Applications x 198xFile transfer Usenet 199xWeb browsing 200xPeer-to-peer Napster 2000Gnutella ed2k 2001BitTorrent Source: mostly Wikipedia 2003Skype 2005CoolStreaming 2007Joost BitTorrent DNA...

Peer-to-peer Traffic 50% - 85% of total traffic Upstream as well as downstream Bandwidth-greedy Interferes with real-time traffic Unpredictable...

P2P Traffic in the News “Comcast Throttles BitTorrent Traffic. Seeding Impossible” 1 “ISPs Fear iPlayer Overload” 2 “Comcast and BitTorrent Agree to Collaborate” 3 “Verizon Reports P4P Can Slash P2P's Impact on ISPs” 4 “New Software Allows ISPs & P2P to Get Along Without Getting too Cozy” 5 References 1. August 2007, 2. August 2007, 3. March 2008, 4. March 2008, 5. May 2008, without.getting.too.cozy.

IETF P2P Infrastructure Workshop Boston, May 29, 2008 Organized by RAI ADs Discuss problems related to P2P traffic Identify a reasonable solution space Three different (complementary) approaches:  Localization and caches  New approaches to congestion  Quality of service

IETF P2P Infrastructures Workshop Boston, May 29, 2008 Organized by RAI ADs Discuss problems related to P2P traffic Identify a reasonable solution space Three different (complementary) approaches:  Localization and caches (RAI/APP)‏  New approaches to congestion (TSV)‏  Quality of service (TSV)‏

What's New in Network Applications Client/Server  Target is a host (one or few IPs)‏  Traffic optimization consists of finding the best network path  GeoDNS, DiffServ, MPLS... Peer-to-peer  Target is a resource (usually shared by many peers)‏  Traffic optimization consists of selecting the “best” peer(s)‏  Vivaldi, iPlane, Ono, P4P, IDIPS...

The ALTO Problem Peers have no knowledge of the network topology  Common case in file-sharing: a peer in Dublin downloads a chunk from a peer in Tokyo when the same chunk is available in London No optimization causes congestion (bad for ISPs and bad for P2P)‏ Endpoints are in the worst position for selecting the “best” peer(s)‏  Typically hundreds/thousands of possible peers  Measurements either too poor or too expensive

Addressing the ALTO Problem Defining an interface for a peer selection optimization service  Request: I am peer P and have to exchange n Mb of real-time/bulk data with anyone among X, Y, Z  Response: Choose X! You are in AS 1, X is in AS 1, Y is in AS 2 and Z is in AS 3 Bit-cost from P is: j to X, k to Y and Z X is located at (39.3° N 76.6° W), Y at Any reasonable combination of the above

Architecture ALTO Service Source of topological information Peer Super-peer (Tracker, Proxy...)‏ Provisioning or other means (out-of-scope)‏ App Protocol (out-of-scope)‏ ALTO Protocol

ALTO Service Providers Network operators  Know the network topology and the peering policies Communities  Running distributed algorithms (Internet coordinate systems, distributed path evaluation algorithms...)‏ Third-parties aware of the network topology  E.g. exploiting redirections from distributed services (e.g. Ono & Akamai)‏  On behalf of ISPs

“The (desired) ALTO Effect” V. Aggarwal, A. Feldmann, C. Scheideler. Can ISPs and P2P systems co-operate for improved performance? V. Aggarwal, O. Akonjang, A. Feldmann. Improving User and ISP Experience through ISP-aided P2P Locality (Gnutella simulations)‏

“The (desired) ALTO Effect” H. Xie, Y. R. Yang, A. Krishnamurthy, Y. Liu, and A. Silberschatz. P4P: Provider Portal for Applications (BitTorrent experiments)‏

Issues: Topology Hiding As a matter of fact, ISPs consider their networks' internals as reserved information Goal: to be able to provide network topology information without revealing network topology  Provide arbitrary priority values (e.g. IDIPS)‏  Use opaque identifiers and return perturbed distance values (e.g. P4P)‏

Issues: Locating the Oracle Unlikely to have a centralized service An oracle could be virtually everywhere, but...  Most relevant information concerns the querying peer's network (i.e. the best oracle may be the closest)‏  It may be useful to get topology information about the networks of the peers under evaluation

Issues: Trust What prevents an ALTO service to mis-behave and:  Redirect querying peers to corrupted mediators  Collect information to track P2P connections  Apply sub-optimal policies (i.e. to second economic factors other than network efficiency)‏ Hint: ALTO is optional

Core Blocks of an ALTO Solution Discovery mechanism for locating the oracle  “What ALTO server should I query from my location?” Query/Response protocol for querying the oracle  “I can connect to X, Y, Z; who should I choose?”

Use Cases: File-sharing Shared files/chunks are often available from multiple sources 1) First selection is usually random (from ~10 3 to ~10)‏ 2) Then selection based on goodput, tit-for-tat... ALTO may be useful for (1) above  In P2P clients  In trackers, where available

Use Cases: RT Communications Selection of the closest media relay for NAT traversal Especially useful in highly distributed services (e.g. Skype, P2PSIP)‏  Any client is potentially a media relay

Use Cases: P2P Streaming Selection of the “best” peer(s) to send/receive a stream to/from

Use Cases: Mirror Selection Providers of popular content (e.g. media and software repositories) resort to geographically distributed mirrors  Manual selection  Automatic selection through Geographical DNS Load Balancing ALTO may be adopted both client-side and server-side

Use Cases: DHTs Some DHTs use proximity information for populating peers' routing tables  E.g. Pastry, Bamboo, CAN  Usually based on RTT estimation ALTO could provide additional information

Peer Selection and Cache Location In theory, caches could be transparently handled as if they were peers  Caches are nothing but powerful and selfless peers  If an ALTO server recognizes caches' addresses in the request, it can simply put them on the top of the list But, for example...  A cache may not be involved in a swarm  Chances that caches involved in a swarm are not passed to the client may be very high E.g. if the tracker limits the number of peers passed to the client

Peer Selection and Cache Location Peers may be interested in locating caches  Offline – through an application specific cache discovery mechanism  Within the ALTO transaction Useful if the ALTO service is aware of caches Requires the querying peer to pass additional information (application-id, content-id...)‏ Cache location is a good fit for ALTO, but MUST be optional  Many (most of?) potential adopters will not want to disclose sensible information