P.1Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Part2: An Approach of Passive Peer based Caching to Mitigate P2P Inter-domain.

Slides:



Advertisements
Similar presentations
Network Resource Broker for IPTV in Cloud Computing Lei Liang, Dan He University of Surrey, UK OGF 27, G2C Workshop 15 Oct 2009 Banff,
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Impact Analysis of Cheating in Application Level Multicast s 1090176 Masayuki Higuchi.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Will P2P Users Cooperate with ISPs? A Word-of-Mouth Communication Approach Piotr Wydrych (AGH University of Science and Technology, Poland); Piotr Cholda.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
Small-world Overlay P2P Network
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
Can ISPs and P2P Users Cooperate for Improved Performance? Vinay Aggarwal, Anja Feldmann (German Telecom Laboratories) Christian Scheideler (TU, Munchen)
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
1 CAPS: A Peer Data Sharing System for Load Mitigation in Cellular Data Networks Young-Bae Ko, Kang-Won Lee, Thyaga Nandagopal Presentation by Tony Sung,
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Understanding Mesh-based Peer-to-Peer Streaming Nazanin Magharei Reza Rejaie.
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Application Presented by Tony Sung On Loy, MC Lab, CUHK IE 1 A Distributed Search.
Performance Evaluation of Peer-to-Peer Video Streaming Systems Wilson, W.F. Poon The Chinese University of Hong Kong.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Wide Web Load Balancing Algorithm Design Yingfang Zhang.
1 The Mystery of Cooperative Web Caching 2 b b Web caching : is a process implemented by a caching proxy to improve the efficiency of the web. It reduces.
Peer-to-peer Multimedia Streaming and Caching Service by Won J. Jeon and Klara Nahrstedt University of Illinois at Urbana-Champaign, Urbana, USA.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Boyu Chen Yulin Xia Haoyu Xu Viterbi School of Engineering University of Southern California P2P file sharing system with a central server.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Analyzing the Vulnerability of Superpeer Networks Against Churn and Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
Network Components: Assignment Three
Distributed Asynchronous Bellman-Ford Algorithm
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Chapter 3 How to build a network?. 2 Objectives What is a Network? IP Addresses Key Components of a Network (NIC) Factors in Designing a Network.
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
EICP—extended Internet Cache Protocol (draft-zhang-ppsp-eicp-00.txt ) Presenter: Christian Schmidt IETF-81, Quebec, July 2011.
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
Sharing Information across Congestion Windows CSE222A Project Presentation March 15, 2005 Apurva Sharma.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
CSE 6590 Fall 2009 Routing Metrics for Wireless Mesh Networks 1 12 November, 2015.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
A Bandwidth Estimation Method for IP Version 6 Networks Marshall Crocker Department of Electrical and Computer Engineering Mississippi State University.
Star Topology Star Networks are one of the most common network topologies. consists of one central switch, hub or computer, which acts as a conduit to.
Mobility Models for Wireless Ad Hoc Network Research EECS 600 Advanced Network Research, Spring 2005 Instructor: Shudong Jin March 28, 2005.
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
#16 Application Measurement Presentation by Bobin John.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Does Internet media traffic really follow the Zipf-like distribution? Lei Guo 1, Enhua Tan 1, Songqing Chen 2, Zhen Xiao 3, and Xiaodong Zhang 1 1 Ohio.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
Web Servers load balancing with adjusted health-check time slot.
Routing Metrics for Wireless Mesh Networks
Early Measurements of a Cluster-based Architecture for P2P Systems
Peer-to-Peer Information Systems Week 6: Performance
Firewalls Jiang Long Spring 2002.
Presentation transcript:

p.1Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Part2: An Approach of Passive Peer based Caching to Mitigate P2P Inter-domain Traffic

p.2Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Motivation Widespread of P2P file sharing applications –Traffic Increase: more serious in inter-domain links P2P Traffic –Undesirable characteristics compared with Web traffic Transmission data size is huge No traffic centralized point, e.g. servers in a data center, because communications will occur among peers at any locations –Most of such huge data transmissions become inter- domain traffic P2P traffic volume is a critical issue for ISPs –Analyze P2P traffic impact on inter-domain traffic –Control P2P traffic on inter-domain links

p.3Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Related Works P2P Traffic control –Filtering / limiting P2P traffic How do we identify P2P connections? –Deep packet inspection is very powerful but … –How deep is an ISP allowed to inspect the packets? –Introducing asymmetry along physical network topology Network-aware clustering / Cache servers Some application’s protocol is closed  More general control methods should be considered P2P Traffic model –Mainly focusing on the scalability of overlay network Number of hops and search messages on overlay networks  We need a model with physical network viewpoint

p.4Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Our Research Analysis of inter-domain traffic –Considering pure P2P file sharing applications –Modeling inter-domain traffic amount Influence of additional passive peer P2P traffic control using passive peer –Resource cache equivalent function on P2P network with closed protocol

p.5Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Traffic Flow Model : Terminology My Domain / Other Domains –Set(s) of peers in the same administrative scope (e.g., ISP) –My Domain : A domain of interest –Other Domains : Others Passive peer –A native peer for corresponding P2P applications without any change no active operations (resource creation / resource request) –Added to My domain We analyzed the influence of a passive peer addition

p.6Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Traffic Flow Model : Traffic Traffic Flow Model –Modeling traffic incoming to / outgoing from passive peer –Four kinds of traffic ‘out’ / ‘in’ : outgoing / incoming ‘m’ / ‘o’ : My Domain / Other Domains Inter-domain Traffic :

p.7Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Traffic Flow Model : Selection Probability (1/2) Selection Probability –Probability that a peer selects destination peers in My Domain –We assume :

p.8Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Traffic Flow Model : Selection Probability (2/2) What does this equation mean ? –Destination selection is regarded as random selection on a domain level scale

p.9Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Traffic Flow Model : Without Passive Peer If the passive peer were not added – : disappeared – : transferred to alternative peers –Alternative peers are selected according to the selection probability p,,

p.10Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Traffic Flow Model : Traffic Amount Change Inter-domain Traffic : Ratio: r = –Traffic amount change caused by the passive peer with passive peer without passive peer

p.11Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Traffic Flow Model : Analyze Area of decreasing inter-domain traffic by passive peer –If p < 1/2, –additional peer rather increases inter-domain traffic r < 1 (decrease) r > 1 (increase)

p.12Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Proposal To decrease inter-domain traffic without change p,q –To decrease r less than 1.0 –r = Method : Filtering

p.13Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Proposal Method : Analyze Effective areas for several filter ratio:δ –The smaller δ is, the less the inter-domain traffic becomes –The smaller δ enlarges the effective area

p.14Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Discussion Validity of traffic flow model –Is destination selection really random even on a domain level scale? Effectiveness of proposed method –Can this method decreases inter-domain traffic ? Measurement of real P2P network traffic –In order to discuss the above two topics

p.15Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Discussion : Simulation Analysis Selection Probability : p –Simulation with 200,000 peers’ behavior Selection Probability gradually converges –Common p value can be applied to both incoming and outgoing communications

p.16Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Discussion : Experimental Analysis Selection Probability : p –Calculated from incoming and outgoing traffic Selection Probability gradually converges

p.17Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Discussion : Cache Effectiveness Ratio of inter-domain traffic change by passive peer –become less than 1 after 12th day Successfully decreases inter-domain traffic

p.18Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Conclusion We discuss a novel traffic model of P2P file sharing Application –To grasp inter-domain P2P traffic trend –Passive peer concepts –Selection Probability Analyze an impact of P2P traffic on inter- domain traffic –Passive peer rather increases inter-domain traffic in the case of p<1 Propose P2P traffic control method –decrease inter-domain traffic even in the case of p<1