Content distribution and “protocol”: from hierarchical trees to distributed graphs Jason Gaedtke November 7, 2007.

Slides:



Advertisements
Similar presentations
Peer-to-Peer Infrastructure and Applications Andrew Herbert Microsoft Research, Cambridge
Advertisements

The Evolution of P2P Technology Robert Levitan, CEO Pando Networks P2P MEDIA SUMMIT, CES 2008.
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Peer-to-Peer is Not Always Decentralized …when Centralization is Good Nelson Minar
On the Economics of P2P Systems Speaker Coby Fernandess.
Network Resource Management Jason Gaedtke Chief Scientist W3C Video on the Web Workshop December 2007.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman:
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Towards a mobile content delivery network with a P2P architecture Carlos Quiroz.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Application Layer Overlays IS250 Spring 2010 John Chuang.
Peer-to-Peer Content Sharing. P2P File Sharing Benefits Why use a P2P model for a file sharing application?
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Based on last years lecture notes, used by Juha Takkinen.
CSE331: Introduction to Networks and Security Lecture 14 Fall 2002.
Overlay Networks EECS 122: Lecture 18 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Beyond Napster: An Overview of Peer-to-Peer Systems and Applications Sami Rollins.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Introduction to Peer-to-Peer Networking Applications and Malicious Peers Song Ye Dartmouth Experimental Visualization Laboratory Department of Computer.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
# Idowu Samuel O. # Kashif Shahzad # Arif Kamal M7001E - Multimedia systems [ltu.se] ©2011.
Jay Sheth P2P Basics Jay Sheth CE, UMBC. Jay Sheth P2P Agenda What is P2P Why P2P Components and algorithms Characteristics Different P2P systems Future.
P2P Application Classes and the IETF What do we have? : What are we missing? David Bryan P2PSIP WG co-chair Polycom July 28, 2011.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Applied Architectures Eunyoung Hwang. Objectives How principles have been used to solve challenging problems How architecture can be used to explain and.
© 2009 AT&T Intellectual Property. All rights reserved. Multimedia content growth: From IP networks to Medianets Cisco-IEEE ComSoc Webinar. Sept. 23, 2009.
Storage management and caching in PAST PRESENTED BY BASKAR RETHINASABAPATHI 1.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
1 P2P Computing. 2 What is P2P? Server-Client model.
1 New Peer to Peer Systems University of California, Irvine Presented By : Ala Khalifeh Estimated Time:15 Minutes (Note: Presented)
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
SCAN: a Scalable, Adaptive, Secure and Network-aware Content Distribution Network Yan Chen CS Department Northwestern University.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
1 School of Computing Science Simon Fraser University CMPT 880: Internet Architectures and Protocols Introduction to Peer-to-Peer Systems Instructor: Dr.
INFORMATION AND COMMUNICATION SYSTEMS MERIT 2008 Research Symposium Melbourne Engineering Graduates Look to the Future System Architecture An internetworking.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Uni Innsbruck Informatik - 1 Network Support for Grid Computing... a new research direction! Michael Welzl DPS NSG Team
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Carnegie Mellon University © Robert T. Monroe Management Information Systems Cloud Computing I Cloud Models and Technologies Management.
Bruce Hammer, Steve Wallis, Raymond Ho
Topics for iWORK 2005(st)
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Topologies and behavioral properties of the network Yvon Kermarrec Based on tml.
Multicast in Information-Centric Networking March 2012.
Grid Services for Digital Archive Tao-Sheng Chen Academia Sinica Computing Centre
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLOUD COMPUTING
Peer to peer Internet telephony challenges, status and trend
PROGRAM STUDI TEKNIK INFORMATIKA FAKULTAS ILMU KOMPUTER
EE 122: Peer-to-Peer (P2P) Networks
COSC 4213: Computer Networks II
Presentation transcript:

content distribution and “protocol”: from hierarchical trees to distributed graphs Jason Gaedtke November 7, 2007

abstract codec efficiency advances, recording device and storage commoditization, and broadband access network maturity have enabled an explosion in the consumption of professional and user-generated IP video traditional media distributors and emerging Internet providers are challenged to drive cost from their IP video business models the P2P architectural paradigm and the philosophical and cultural concept of “Protocol” offer a compelling alternative to traditional, hierarchical CDNs

definition (Galloway, MIT Press 2004) “protocol” – a system of distributed management/control strategies – facilitates P2P relationships between autonomous entities – anti-hierarchical and anti-authority – engenders localized decision-making, versus centralized – accommodates massive contingency/change – represents the outcome (not the antecedent) of distributed behavior analysis occurs at the intersection of philosophy, culture and technology control moves from authorities to protocol standards

philosophical and political considerations mesh vs. hierarchy – favors horizontal, distributed organization and control – e.g. TCP/IP vs. DNS (hindered by points of control/failure) – end-to-end principal: state/intelligence at the edges historical movement – centralized (server) -> decentralized (cluster) -> distributed (net) – low barrier-to-entry empowers participation, breeds innovation – a similar decentralized/distributed control model underlies proven and successful open source collaboration this concept, Protocol, is native to the logical design/architecture of the Internet (TCP/IP) – infrastructure and associated corporate capital investment notwithstanding (i.e., root of present Net Neutrality debate)

business and economic considerations primary appeal: storage, processing, and bandwidth cost avoidance; >90% savings – application infrastructure is self-organizing/healing; minimal admin/ops overhead must consider/provide user value-proposition (beyond “free content”) motivating participation and resource contribution Internet public policy and intellectual property law/enforcement still evolving growing need for security and data integrity assurances

technical considerations P2P substrates: form a decentralized, self-organizing and fault-tolerant overlay network provide efficient request routing, deterministic object location, and load-balancing in an application-independent manner facilitate application-specific object replication, caching, and fault recovery enable robust and efficient data and service availability, reliability and geographical/route diversity and redundancy offer compelling scaling features and performance typically O(log(N)) participatory design, development and control model engenders innovation

applications substantial academic and corporate research over the past five+ years horizontal, mesh networks and P2P applications evolving beyond file-sharing – music/movies/tv “sharing”: Napster, Gnutella, KaZaA, eDonkey, FreeNet, BitTorrent – voice: Skype, IETF’s P2P SIP – video: Azureus, Joost – storage: OceanStore, Ivy – commercial content distribution: Move, Grid, Pando, Red Swoosh (Akamai), Kontiki (VeriSign) – gaming and virtual worlds: Quazal, FT’s Solipsis – virtual economies: Scrivener (Rice), Tribler (Harvard)

appendix

research and references “Protocol: How Control Exists after Decentralization” – Alex Galloway (NYU) – MIT Press, 2004 – Philosophical foundations in Marx, Foucault, Deleuze, Jameson, Hardt academic research – Berkeley (OceanStore persistence) – Columbia (P2P SIP audio/video communications) – MIT (Chord DHT, Ivy file-system) – Purdue (Pastry, Dynamic P2P Source Routing) – Rice (FreePastry, Squirrel web cache) – Washington (Pastry, BitTyrant) corporate R&D – France Telecom (Solipsis virtual world, Maay search engine, – Microsoft (Herald pub/sub, SimPastry, PAST archive, SplitStream CDN) Distributed Computing Industry Association (DCIA) P4P Working Group – Explicit Communications for Cooperative Control Between P2P and Network Providers IETF P2P SIP looking to add CableLabs to this list

enabling technologies reliable and efficient storage, search and discovery algorithms – DHTs: Chord, CAN, Pastry, Tapestry identity reputation security virtual economy quality of service multicast