CS5248 Student Presentation1 Scalable Resilient Media Streaming Suman Banerjee, Seungjoon Lee, Ryan Braud, Bobby Bhattacharjee, Aravind Srinivasan NOSSDAV.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

Reliable Multicasting –IP-multicast is unreliable. Need a reliable multicast layer to simplify the software design. –Like in reliable unicast (PAR), we.
Impact Analysis of Cheating in Application Level Multicast s 1090176 Masayuki Higuchi.
SplitStream by Mikkel Hesselager Blanné Erik K. Aarslew-Jensen.
Reliable Group Communication Quanzeng You & Haoliang Wang.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
“Scalable and Topologically-aware Application-layer Multicast” Yusung Kim Korea Advanced Institute of Science and Technology.
6/3/ Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness CS495 – Spring 2005 Northwestern University.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols.
Computer Science ROMA: Reliable Overlay Multicast with Loosely Coupled TCP Connections Gu-In Kwon and John Byers Computer Science Dept. Boston University.
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
Congestion-Distortion Optimized Peer-to-Peer Video Streaming Eric Setton*, Jeonghun Noh and Bernd Girod Information Systems Laboratory Stanford University.
A loss detection Service for Active Reliable Multicast Protocols Moufida MAIMOUR & C. D. PHAM INRIA-RESO RESAM UCB-Lyon – ENS Lyon INC’02, Plymouth Tuesday,
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Resilient Multicast using Overlays Suman Banerjee, Seungjoon Lee, Bobby Bhattacharjee, Aravind Srinivasan Made by: Yao Zhao.
1March -05 Jiangchuan Liu with Xinyan Zhang, Bo Li, and T.S.P.Yum Infocom 2005 CoolStreaming/DONet: A Data-Driven Overlay Network for Peer-to-Peer Live.
CS218 – Final Project A “Small-Scale” Application- Level Multicast Tree Protocol Jason Lee, Lih Chen & Prabash Nanayakkara Tutor: Li Lao.
CS 552 Multicast Richard Martin (slide credits B. Nath, I. Stoica)
CS 268: Overlay Networks: Distributed Hash Tables Kevin Lai May 1, 2001.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
NUS.SOC.CS Roger Zimmermann (based in part on slides by Ooi Wei Tsang) Application-Level Multicast.
Scalable Reliable Multicast Architecture Wenjun Zeng Computer Science Department University of Missouri-Columbia.
CIS 725 Wireless networks. Low bandwidth High error rates.
Ming-Yu Jiang and Wanjiun Liao,IEEE ICC 2002 Family ACK Tree (FAT): A New Reliable Multicast Protocol for Mobile Ad Hoc Networks. Speaker : Wilson Lai.
Communication (II) Chapter 4
An Overlay Architecture for High Quality VoIP Streams IEEE Trans. on Multimedia 2006 R 翁郁婷 R 周克遠.
Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh.
ON DESIGING END-USER MULTICAST FOR MULTIPLE VIDEO SOURCES Y.Nakamura, H.Yamaguchi, A.Hiromori, K.Yasumoto †, T.Higashino and K.Taniguchi Osaka University.
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
Application-Layer Multicast -presented by William Wong.
Ahmed Helmy, USC1 State Analysis and Aggregation for Multicast-based Micro Mobility Ahmed Helmy Electrical Engineering Department University of Southern.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Resilient Peer-to-Peer Streaming Presented by: Yun Teng.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Network Applications and Layered Architectures Protocols OSI Reference Model.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Group Communication Group oriented activities are steadily increasing. There are many types of groups:  Open and Closed groups  Peer-to-peer and hierarchical.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
Hwajung Lee. A group is a collection of users sharing some common interest.Group-based activities are steadily increasing. There are many types of groups:
Page 1 The department of Information & Communications Engineering Dong-uk, kim A Survey of Packet Loss Recovery Techniques for Streaming.
Video Multicast over the Internet Presented by: Liang-Yuh Wu Lung-Yuan Wu Hao-Hsiang Ku 12 / 6 / 2001 Bell Lab. And Georgia Institute of Technologies IEEE.
NUS.SOC.CS5248 Ooi Wei Tsang Course Matters. NUS.SOC.CS5248 Ooi Wei Tsang Deadlines 11 Oct: Survey Paper Due 18 Oct: Paper Reviews Due.
CS603 Fault Tolerance - Communication April 17, 2002.
NUS.SOC.CS5248 Ooi Wei Tsang Application-Level Multicast.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Slingshot: Time-Critical Multicast for Clustered Applications Mahesh Balakrishnan Stefan Pleisch Ken Birman Cornell University.
ECE 544 Project3 Group 9 Brien Range Sidhika Varshney Sanhitha Rao Puskuru.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Security Kim Soo Jin. 2 Contents Background Introduction Secure multicast using clustering Spatial Clustering Simulation Experiment Conclusions.
Communication Chapter 2.
March 2014 doc.: IEEE Submission Jaehwan Kim (ETRI) Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
1 Highlight 1: AER/NCA. 2 Active Multicast Repair Services Receiver Sender Conventional Routers Repair latency is a complete round trip time Link causing.
NUS.SOC.CS Roger Zimmermann (based in part on slides by Ooi Wei Tsang) Application-Level Multicast.
Reliable Adaptive Lightweight Multicast Protocol Ken Tang, Scalable Network Technologies Katia Obraczka, UC Santa Cruz Sung-Ju Lee, Hewlett-Packard Laboratories.
Network Computing Laboratory ZIGZAG: An Efficient Peer-to-Peer Sch eme for Media Streaming Duc A. Tran Kien A. Hua Tai Do University of Central Florida.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
PATH DIVERSITY WITH FORWARD ERROR CORRECTION SYSTEM FOR PACKET SWITCHED NETWORKS Thinh Nguyen and Avideh Zakhor IEEE INFOCOM 2003.
Group Communication A group is a collection of users sharing some common interest.Group-based activities are steadily increasing. There are many types.
Ch 3. Transport Layer Myungchul Kim
Reliable multicast Tolerates process crashes. The additional requirements are: Only correct processes will receive multicasts from all correct processes.
Application-Level Multicast
Video Multicast over the Internet (IEEE Network, March/April 1999)
ATP TCP Reducing the Latency-Tail of Short-Lived Flows: Adding Forward Error Correction in Data Centers Klaus-Tycho Foerster, Demian Jaeger, David Stolz,
Tarun Banka Department of Computer Science Colorado State University
Peer-to-Peer Streaming: An Hierarchical Approach
Presentation transcript:

CS5248 Student Presentation1 Scalable Resilient Media Streaming Suman Banerjee, Seungjoon Lee, Ryan Braud, Bobby Bhattacharjee, Aravind Srinivasan NOSSDAV 2004

CS5248 Student Presentation2 Application Layer Multicast Advantages No change in network infrastructure Applications have full control Disadvantages Stretch and Stress Control data overhead Multicast forwarding at end-hosts Construct an overlay network

CS5248 Student Presentation3 Examples Narada Builds a mesh, then a tree Everybody knows everybody High control overhead NICE Hierarchical clustering of nodes Low control overhead

CS5248 Student Presentation4 NICE

CS5248 Student Presentation5 Problem Overlay network node failures Overlay network link failures Congestion failures

CS5248 Student Presentation6 SRMS Architecture MS AR B Y X Media Stream Join Request Address of Sender Request Data Data Streaming Server SRMS sender SRMS-RP SRMS client

CS5248 Student Presentation7 Probabilistic Resilient Multicast (PRM) Randomized Forwarding Triggered NAKs

CS5248 Student Presentation8 Randomized Forwarding Each node in the overlay network forwards the data to a constant number of other overlay nodes with a low probability (0.01–0.03)

CS5248 Student Presentation9 Randomized Forwarding (cont’d) A B D C FE NML GH QPOKJI X X

CS5248 Student Presentation10 Overhead Analysis n : Total number of nodes r : Number of randomly forwarded nodes β : Probability of random forwarding Per-node overhead of PRM: βr

CS5248 Student Presentation11 Triggered NAKs Data losses due to link errors and network congestion are recovered using NAK- based retransmissions using the missing sequence numbers.

CS5248 Student Presentation12 Triggered NAKs (cont’d) Each node piggybacks a bit mask with every forwarded packet indicating the prior sequence numbers it has correctly received Recipient of the data packet detects missing packets using the gaps in the received sequence and requests appropriate retransmissions

CS5248 Student Presentation13 Triggered NAKs (cont’d) X Y Z SEQ: 18 NAK: 14, 15 NAK:

CS5248 Student Presentation14 Experiments n : 10 – 10,000 r : β : 0.01 – 0.03 Compared PRM with Best-Effort (BE) methods Nomenclature: PRM b (r, β) b – bit mask used in NAK retransmissions

CS5248 Student Presentation15 Evaluations: Delivery Ratio

CS5248 Student Presentation16 Evaluations: Data Loss

CS5248 Student Presentation17 Evaluations: End-to-End Latency

CS5248 Student Presentation18 Conclusions SRMS achieves high data distribution rates even with node and link failures Very low overhead Scales very well

CS5248 Student Presentation19 Q&A