Efficient P2P backup through buffering at the edge S. Defrance, A.-M. Kermarrec (INRIA), E. Le Merrer, N. Le Scouarnec, G. Straub, A. van Kempen.

Slides:



Advertisements
Similar presentations
CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
Advertisements

P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Digital Library Service – An overview Introduction System Architecture Components and their functionalities Experimental Results.
Henry C. H. Chen and Patrick P. C. Lee
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
B. Ramamurthy 4/17/ Overview of EC2 Components (fig. 2.1) 10..* /17/20152.
WEB HOSTING. WHAT IS WEB HOSTING? A web host is a company with several computers that are connected to the internet at all times. The computers they have.
Queueing Models for P2P Systems.  Extend classical queuing theory for P2P systems.  Develop taxonomy for different variations of these queuing models.
Cloud Download : Using Cloud Utilities to Achieve High-quality Content Distribution for Unpopular Videos Yan Huang, Tencent Research, Shanghai, China Zhenhua.
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Towards a mobile content delivery network with a P2P architecture Carlos Quiroz.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Performance Analysis of Orb Rabin Karki and Thangam V. Seenivasan 1.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
1 A Framework for Lazy Replication in P2P VoD Bin Cheng 1, Lex Stein 2, Hai Jin 1, Zheng Zhang 2 1 Huazhong University of Science & Technology (HUST) 2.
Introducing: Cooperative Library Presented August 19, 2002.
Gossip-based Search Selection in Hybrid Peer-to-Peer Networks M. Zaharia and S. Keshav D.R.Cheriton School of Computer Science University of Waterloo,
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Object Naming & Content based Object Search 2/3/2003.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
On-Demand Media Streaming Over the Internet Mohamed M. Hefeeda, Bharat K. Bhargava Presented by Sam Distributed Computing Systems, FTDCS Proceedings.
ALICE DATA ACCESS MODEL Outline ALICE data access model - PtP Network Workshop 2  ALICE data model  Some figures.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
ALICE data access WLCG data WG revival 4 October 2013.
1 LYU0502 P2P Digital TV Recorder Supervisor: Professor Michael R. Lyu Prepared by:Ho Tsz Wing, Andy Lau Wai Shun, Jack.
Home Networking as a Distributed File System view Serge Defrance, Rémy Gendrot, Jean Le Roux, Gilles Straub, Thierry Tapie Technicolor R&D, Rennes, France.
DELAYED CHAINING: A PRACTICAL P2P SOLUTION FOR VIDEO-ON-DEMAND Speaker : 童耀民 MA1G Authors: Paris, J.-F.Paris, J.-F. ; Amer, A. Computer.
A Scalable Bandwidth Management Architecture for Supporting VoIP Applications Using Bandwidth Broker Zhenhai Duan, Zhi-Li Zhang University of Minnesota.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Brussels, 18 th March, RURAL WINGS IP Network traffic and reliability evaluation for the Rural Wings project Final Test Runs results - D7.6 - Patricia.
Network Environments. Communications Networks LAN – Local Area Network Collection of Computers and peripherals with a common connection in one building.
Ivan Osipkov Fighting Freeloaders in Decentralized P2P File Sharing Systems.
HUAWEI TECHNOLOGIES CO., LTD. Page 1 Survey of P2P Streaming HUAWEI TECHNOLOGIES CO., LTD. Ning Zong, Johnson Jiang.
What does LAN stand for? Local Area Network. A LAN supplies networking capability to a group of computers close to each other. A LAN is useful for sharing.
Fair Layered Coding Streaming Jaime García-Reinoso  Iván Vidal  Francisco Valera University Carlos III of Madrid Alex Bikfalvi IMDEA Networks.
Web Surfing on the Move: Needs, Opportunities, and Challenges Ling-Jyh Chen Institute of Information Science Academia Sinica,
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
1 Push-to-Peer Video-on-Demand System. 2 Abstract Content is proactively push to peers, and persistently stored before the actual peer-to-peer transfers.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Exact Regenerating Codes on Hierarchical Codes Ernst Biersack Eurecom France Joint work and Zhen Huang.
1P2P4mm workshop, Vico Equense 6. June 2008 Information Society Technologies VICTORY – a multimodal, cross-platform and distributed multimedia repository.
EMI INFSO-RI ARC tools for revision and nightly functional tests Jozef Cernak, Marek Kocan, Eva Cernakova (P. J. Safarik University in Kosice, Kosice,
Introduction TO Network Administration
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
G046 Lecture 04 Task C Briefing Notes Mr C Johnston ICT Teacher
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
Introduction to computer networking Objective: To be acquainted with: The definitions of networking Network topology Network peripherals, hardware and.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Apr. 25, 2002Why DØRAC? DØRAC FTFM, Jae Yu 1 What do we want DØ Regional Analysis Centers (DØRAC) do? Why do we need a DØRAC? What do we want a DØRAC do?
Geethanjali College Of Engineering and Technology Cheeryal( V), Keesara ( M), Ranga Reddy District. I I Internal Guide Mrs.CH.V.Anupama Assistant Professor.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Peer 2 Peer & Client Server
An example of peer-to-peer application
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
Chapter 10: Application Layer
Introduction to ISPs & Broadband Technologies
Home Networking as a Distributed File System view Serge Defrance, Rémy Gendrot, Jean Le Roux, Gilles Straub, Thierry Tapie Technicolor R&D, Rennes,
Comparison of LAN, MAN, WAN
An Introduction to Computer Networking
Determining the Peer Resource Contributions in a P2P Contract
Balancing Throughput, Robustness, and In-Order Delivery in P2P VoD
Presentation transcript:

Efficient P2P backup through buffering at the edge S. Defrance, A.-M. Kermarrec (INRIA), E. Le Merrer, N. Le Scouarnec, G. Straub, A. van Kempen

Peer to Peer backup system 2 10/24/2015 « Pure » P2P backup systems severely limited by: Low availability Asymmetric bandwidth (Low uplink speed) Asynchrony Exploit users’ ressources : each user provides storage space Time To Backup (TTB) and Time to restore (TTR) data may be very high Practical deployment is limited Peer 2 0 h 12 h24 h Peer 1

CDN-assisted architecture 3 10/24/2015 The performances of client-server systems are approached (in terms of Time To Backup and Time To Restore data) However : A centralized part remains Not fully convenient for users Server = Reliable component Architecture proposed in P2P 2010 :

What we propose 4 10/24/2015 Gateways are turned into stable buffering layers To take into account the low-level structure of network (i.e the presence of gateways in home networks) To use gateways to distribute the centralized part of the hybrid scheme Home network (LAN) LAN Mask the asynchrony between peers

Why gateways are good candidates ? 5 10/24/2015 Already present in users 'homes Storage capable (for buffering) Highly available At the frontier between a fast LAN and a slow WAN Home network

Gateways are highly available 6 10/24/2015 We periodically pinged a random set of static IP of a french ISP* 25,000 gateways For 7.5 months *The trace is available at : Average gateway availability : 86 % Large part is very stable A few have power-off habits (daily or holiday basis)

How does it work ? 7 10/24/2015 Prepare (LAN speed) Backup (WAN speed) Offload (LAN speed)

How do we evaluate ? 8 10/24/2015 Trace-based simulation using public traces To model peers behavior : -Skype 28 Days 1269 Peers Availability Mean = 0.5 -Jabber 28 Days 465 Peers Availability Mean = 0.27 Scenario: Size of archive : 1GB Data creation : Poisson process (3 backups/month/user avg) Erasure code 50 simulations/curve To model gateways behavior : our gateway trace To model bandwidth uplink : trace from a study of residential broadband networks Uplink Mean = 66 kB/s We randomly assign one gateway and one uplink speed to one peer of each trace

What do we evaluate ? 9 10/24/2015 CDN-Assisted (CDNA) Pure P2P (P2P) Gateway-Assisted (GWA) We compare : We evaluate : Time To Backup (Hours) Time To Restore (Hours) Mean and Max data buffered (Mbytes) TTB : Time between the backup request and the time when the last block has been completely uploaded TTR : Time between the restore request and the time we downloaded enough data to reconstruct the file

Time To Backup (Stored safely at remote place) TTB & TTR (Skype trace) 90th Percentile of completed backup GWACDNAP2P 30 H60 H140 H 90th Percentile of completed restore GWACDNAP2P 3 H40 H Time To Restore (Retrieve an archive locally) 10/24/

Scaling (Skype trace) 11 10/24/2015 Better scaling with archive size : This enables users to backup larger amounts of data

Low storage needs 1GB archives: 2.5GB needed (99%) Realistic for current gateways Dimensioning (Skype trace) Stopping backups 10/24/ Average storage on gateways (MB) Average usage remains low Less than 1MB here Data is really offloaded to peers Gateway effectively used as buffers

Conclusion 13 10/24/2015 Realistic architecture for P2P backup systems Evaluation using trace-based simulation TTB and TTR are greatly reduced (Network connection can be used more efficiently) More convenient for users : Let to offload backup tasks quickly (LAN speed) from the user’s machine to the gateway Fully decentralized Trace of gateway availability

14 10/24/2015 Thank you !