The Swift Multiparty Transport Protocol As PPSP Arno Bakker, Victor Grischenko, Johan Pouwelse P2P-Next / Delft University of Technology Arno Bakker, Delft.

Slides:



Advertisements
Similar presentations
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
NAT Traversal for P2PSIP Philip Matthews Avaya. Peer X Peer Y Peer W 2. P2PSIP Network Establishing new Peer Protocol connection Peer Protocol messages.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Chapter 3: Transport Layer
EE228A Project, Fall 2000 Yunfei Deng, Kenneth Cheung, Daniil Khidekel Professor Jean Walrand 12/5/2000 Modular TCP.
CS335 Principles of Multimedia Systems Multimedia Over IP Networks -- I Hao Jiang Computer Science Department Boston College Nov. 6, 2007.
Lecture 8 Chapter 3 Transport Layer
3-1 Transport services and protocols r provide logical communication between app processes running on different hosts r transport protocols run in end.
Transport Layer TCP and UDP IS250 Spring 2010
8-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer m flow.
IETF P2P Mechanisms Wes Eddy / TSV AD MTI Systems TSVAREA IETF 81 – Quebec City, July 2011.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Gursharan Singh Tatla Transport Layer 16-May
The Bittorrent Protocol
Publish/Subscribe Internetworking Transport Abstractions & Congestion Control Somaya Arianfar & Pasi Sarolahti
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 Tracker Protocol Proposal.
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
The PPSP Peer Protocol (PPSPP) Johan Pouwelse, Arno Bakker, Riccardo Petrocco Delft University of Technology Delft University of Technology, IETF 84 PPSP.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
1 Chapter 1 OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection.
Data Communications and Computer Networks Chapter 3 CS 3830 Lecture 12 Omar Meqdadi Department of Computer Science and Software Engineering University.
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
TCP/IP Transport and Application (Topic 6)
Transport Layer: UDP, TCP
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
PPSP Problem Statement Y.Zhang, N.Zong, G.Camarillo,J.Seng,R.Yang Maastricht July 27,2010.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
HUAWEI TECHNOLOGIES CO., LTD. Page 1 Survey of P2P Streaming HUAWEI TECHNOLOGIES CO., LTD. Ning Zong, Johnson Jiang.
Draft-gu-ppsp-peer-protocol-02 Presenter : Gu Yingjie IETF-81, Quebec, July, 2011.
Problem Statement of Peer to Peer Streaming Protocol (PPSP) Yunfei Zhang Ning Zong Gonzalo Camarillo David Byran Hirold Liu Yingjie Gu.
P2P Streaming Protocol (PPSP) Requirements draft-zong-ppsp-reqs-03.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Transport Layer 3-1 Chapter 3 Outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
PPSP BAR BOF meeting 74th IETF – San Francisco, CA, USA March, 2009 P2P Streaming Protocol (PPSP) Requirements Ning Zong,Huawei Technologies Yunfei Zhang,China.
Requirements for Peer protocol draft-jiang-p2psip-peer-protocol-requirement-00.txt Jiang XingFeng (Johnson) P2PSIP WG, IETF #68.
MULTIPLEXING/DEMULTIPLEXING, CONNECTIONLESS TRANSPORT.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Introduction of PPSP Yunfei 88 Nov 3, 2013.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Introduction 1-1 source application transport network link physical HtHt HnHn M segment HtHt datagram destination application transport network link physical.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
Cryptography CSS 329 Lecture 13:SSL.
Multicast in Information-Centric Networking March 2012.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Chapter 3 outline 3.1 Transport-layer services
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Turning the net into a single data cloud
IPSec IPSec is communication security provided at the network layer.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Chapter 14 User Datagram Protocol (UDP)
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Process-to-Process Delivery:
Angelo Sapello University of Delaware
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Problem Statement of PPSP
Jiang XingFeng (Johnson) P2PSIP WG, IETF #68
Process-to-Process Delivery: UDP, TCP
Chapter 3 Transport Layer
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Layer 9/22/2019.
Presentation transcript:

The Swift Multiparty Transport Protocol As PPSP Arno Bakker, Victor Grischenko, Johan Pouwelse P2P-Next / Delft University of Technology Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

Status Implemented in C++  Video-on-demand over UDP Running in Firefox:  <video src=“swift://…  Via 100 KB plugin  Hooks on en.wikipedia.org Running on:  iPad  Android  set-top box Works with P2P caches Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

Swift design goals 1.Kernel-ready, low footprint 2.Generic protocol that covers 3 use cases (dl, vod, live) 3.Have short prebuffering times 4.Traverse NATs transparently 5.Be extensible:  Different congestion control algorithms (LEDBAT)  Different reciprocity algorithms (tit4tat, Give-to-Get)  Different peer-discovery schemes Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

Swift metadata Content identified by single root hash Root hash is top hash in a Merkle hash tree Information-centric addressing: small enough for URLs root hash content chunk hashfiller hash Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

Swift integrity checking Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City Atomic datagram principle:  Transmit chunk with uncle hashes  Allows independent verification of each datagram  Protection against malicious peers received

Swift chunk IDs and live trees Nodes in tree denote chunk ranges: bins  Used for scalable acknowledgements + low footprint Dynamically growing & pruned trees for live bin number Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City 3 11

Swift wire format Datagram consists of channel ID + multiple messages Message is fixed length, first byte message ID E.g. Data after 1 roundtrip -> short prebuffering times AB CHAN 0 HASH HANDSHAKE 11 CHAN 11 HANDSHAKE 22 HAVE HINT CHAN 22 HASH DATA Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

√ = Done √ = Some work needed PPSP Basic Requirements REQ-1-1√PEX message as basis for tracker proto REQ-2√Extra protection may be needed for RT P2P REQ-3√Peer ID is open, self-certification proposed REQ-4√Swarm ID is root hash or public key REQ-5√Chunk is 1K, or variable REQ-6√Chunk ID is bin number REQ-7√Carrier can be UDP or TCP, RTP or HTTP REQ-8√Protocol is extensible for QoS info Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City See draft and PPSP materials

PPSP Peer Protocol Requirements PP.REQ-1-1√HAVE message+GET_HAVE if push insufficient PP.REQ-2√HAVE message are bidirectional PP.REQ-3√PEX message + GET_PEX if push insufficient PP.REQ-4√HAVE message for updates PP.REQ-5√Protocol is extensible for status info PP.REQ-6√Transmission and chunk requests integrated Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City See draft and PPSP materials

PPSP Security Requirements SEC.REQ-1-1√P2P-Next Closed Swarms design suitable SEC.REQ-2√Inherit from carrier proto, think of caching SEC.REQ-3√Compatible with existing solutions SEC.REQ-4√Merkle tree limits propagation bad content SEC.REQ-5√Peer ignores bad senders SEC.REQ-6√Secure tracking against injector Eclipse SEC.REQ-7√Enabled by PEX or DHT with self-certification SEC.REQ-8√Merkle tree is founded on BitTorrent hashing SEC.REQ-9√Detection easy, reporting hard Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City See draft and PPSP materials

Relationship to other IETF work LEDBAT  Implemented ALTO  Integration possible DECADE  Swift designed for in-network caches draft-dannewitz-ppsp-secure-naming-02  Orthogonal, sign root hashes NAT traversal  Orthogonal Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

Summary More info, sources, binaries:   LGPL license Acknowledgements  European Community’s Seventh Framework Programme in the P2P-Next project under grant agreement no Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

Questions? Arno Bakker Johan Pouwelse Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

RTP packet Problem: Header fields not protected Swift over RTP V P X CC M PTSequence Number Timestamp SSRC Identifier Extension IDExtension header length HINT+HAVE+HASHES DATA Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

RTP over Swift Carry RTP packet as chunk over Swift Header protected Merkle tree can handle variable-sized chunks Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

Swift over HTTP GET /7c462ad1d980ba44ab4b819e29004eb0bf6e6d5f HTTP/1.1 Host: peer481.example.com Range: bins 11 Accept-Ranges: bins 3 … HTTP/ Partial Content Content-Range: bins 8 Content-Merkle: (10,hash10),(13,hash13) ;h=SHA1;b=1K Accept-Ranges: bins 7 … Chunk 8 Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City <- “I want bin 11” <- “I have bin 3” <- hashes <- “seeder”

The Internet today Dominant traffic is content dissemination:  One-to-many −Download (ftp) −Video-on-demand (YouTube) −Live (Akamai, Octoshape, PPLive) Dominant protocol was designed for one-to-one:  TCP Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

What’s wrong with TCP? TCP’s functionality not crucial for content dissemination:  Don’t need Reliable delivery  Don’t need In-order delivery High per-connection memory footprint  Aim for many connections to find quick peers Complex NAT traversal Fixed congestion control algorithms I.e. not designed for “The Cloud” Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City

Swift Peak Hashes Used to securely calculate content size peak hash Arno Bakker, Delft University of Technology, IETF 81 PPSP WG , Quebec City 3 11