Topics for iWORK 2005(st) 17.01.2005

Slides:



Advertisements
Similar presentations
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Advertisements

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Alper Mizrak (Presenter) Yuchung Cheng Vineet Kumar Stefan Savage Department.
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Review of a research paper on Skype
Comparison between Skype and SIP- based Peer-to-Peer Voice-Over-IP Overlay Network Johnson Lee EECE 565 Data Communications.
The testbed environment for this research to generate real-world Skype behaviors for analyzation is as follows: A NAT-ed LAN consisting of 7 machines running.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Draft-bryan-sipping-p2p David Bryan IETF 63, Paris August 3, 2005.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Towards Efficient Simulation of Large Scale P2P Networks
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Presented by Elisavet Kozyri. A distributed application architecture that partitions tasks or work loads between peers Main actions: Find the owner of.
Eddie Bortnikov/Aran Bergman, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Recitation.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
The Impact of DHT Routing Geometry on Resilience and Proximity Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Internet Cache Pollution Attacks and Countermeasures Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, and Yan Chen Electrical Engineering and Computer Science.
Structure Overlay Networks and Chord Presentation by Todd Gardner Figures from: Ion Stoica, Robert Morris, David Liben- Nowell, David R. Karger, M. Frans.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Course Outline CS5431 Internet Computing 網際網路計算 Chung-Ta King Department of Computer Science National Tsing Hua University.
Peer-to-peer approaches for SIP Henning Schulzrinne Dept. of Computer Science Columbia University.
Measurements of Peer-to-Peer Systems Pradnya Karbhari Nov 25 th, 2003 CS 8803: Network Measurements Seminar.
CSE 461 University of Washington1 Topic Peer-to-peer content delivery – Runs without dedicated infrastructure – BitTorrent as an example Peer.
The Current Landscape of P2P File Sharing: Challenges and Future Directions Kevin Bauer Ph.D. candidate University of Colorado.
Distributed Hash Table Systems Hui Zhang University of Southern California.
1  2004 Level 3 Communications, Inc. All Rights Reserved. Kevin J. O'Hara, President & COO Level 3 Communications.
Differences between In- and Outbound Internet Backbone Traffic Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 P2P Computing. 2 What is P2P? Server-Client model.
1 New Peer to Peer Systems University of California, Irvine Presented By : Ala Khalifeh Estimated Time:15 Minutes (Note: Presented)
DP&NM Lab. CSE, POSTECH - 1/25 - Peer-to-Peer Algorithms and System CS600 Assignment #5 Nov Byungchul Park DPNM Lab., Dept.
DotSlash An Automated Web Hotspot Rescue System Jonathan Bulava CSC8530 – Distributed Systems Dr. Paul Schragger.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
GRID COMPUTING AND THE GROWTH OF THE INTERNET ROBERT B. COHEN, PH.D. COHEN COMMUNICATIONS GROUP
SPAM DETECTION IN P2P SYSTEMS Team Matrix Abhishek GhagDarshan Kapadia Pratik Singh.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
Peer-to-Peer Supported Cache System for File Transfer Joonbok Lee
Directed SIP Peer-to-Peer Telephony Creating a New Carrier-Class Model Joel Maloff, Ph.D. – EVP and CTO Fusion Telecommunications International
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Voice over IP B 林與絜.
Green Touch™ Initiative: A Five Year Quest to Achieve Sustainable Networking D. Kilper Chair, Techical Committee GreenTouch.
APPLICATION LAYER MULTICASTING
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design Authors: Matei Ripeanu Ian Foster Adriana.
November 2005IETF 641 Interconnect SIP networks using P2P SIP Marc Bailly
Peer-to-Peer Content Delivery for X3D Earth Shun-Yun Hu Adaptive Computing and Network Lab Dept. of CSIE, National Central University 2006/11/14.
Peer-to-peer systems ”Sharing is caring”. Why P2P? Client-server systems limited by management and bandwidth P2P uses network resources at the edges.
ANONYMOUS STORAGE AND RETRIEVAL OF INFORMATION Olufemi Odegbile.
Proxy Caching for Peer-to-Peer Live Streaming The International Journal of Computer Networks, 2010 Ke Xu, Ming Zhang, Mingjiang Ye Dept. of Computer Science,
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Peer-to-Peer File Sharing Systems Group Meeting Speaker: Dr. Xiaowen Chu April 2, 2004 Centre for E-transformation Research Department of Computer Science.
EGEE is a project funded by the European Union under contract IST Distributed Superscheduling Matteo Mordacchini INFN – Padova Università Ca’
Brocade: Landmark Routing on Overlay Networks
Review of new Question descriptions under ITU-T SG11
Internet Interconnection
Internet Indirection Infrastructure
P2P: Distributed Hash Tables
Presentation transcript:

Topics for iWORK 2005(st)

Topic #1 Title: ”The rise of peer-to-peer networking: implications to carriers and associated strategies” Background: P2P applications have been responsible for a significant shift in Internet traffic profiles, possibly also contributing to the popularity of broadband connections among consumers. If not managed properly, however, this traffic can choke the connections associated with other applications (including traffic from other subscribers). Goal: Find out what public information is available regarding the impact of P2P applications on Internet traffic. What conclusions can be drawn from these results? What methods can be used to monitor P2P traffic? How can P2P traffic be identified? Find out and evaluate the different ISP strategies for handling P2P traffic. What products are available in the market? What are their features?

References for topic #1 [1] A. Anttila, “Peer-to-peer and ISPs’ survival strategies“. In Proceedings of the Licentiate Seminar on Networking Technology, HUT Fall [2] J. Mellin, “Peer-to-Peer Networking - Phenomenon and impacts to carriers”. Presentation at Telecom Forum, Autumn [3] S. Saroiu et al., “An Analysis of Internet Content Delivery Systems”. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation(OSDI) [4] N. Leibowitz, M. Ripeanu, A. Wierzbicki: “Deconstructing the Kazaa Network”, In Proceedings of the 3rd IEEE Workshop on Internet Applications (WIAPP'03) [5] K. Gummadi et al., “ Measurement, Modeling and Analysis of a Peer-to-Peer File-Sharing Workload”. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP-19)

Topic #2 Title: ”Evolution of Peer-to-peer algorithms: Baseline, state of the art, and future directions” Background: P2P computing can be traced back to the early days of the ARPAnet (1960s). It took until the late 1990s until the first mainstream P2P application emerged. Several more followed, and still more are expected to emerge… Goal: identify and give an overview of the key technological innovations have sustained the success of P2P applications. How have the protocols underlying P2P applications evolved? What are the main variants of P2P protocols in use today? What features (e.g. efficiency, reliability, anonymity, etc…) is the research community still working on? How will these features enable new/improved P2P applications?

References for topic #2 [1] I. Stoica et al., "Chord: A scalable peer-to-peer lookup service for Internet applications", In Proc. ACM SIGCOMM, Aug [2] B. Y. Zhao et al., "Tapestry: A resilient global-scale overlay for service deployment", IEEE JSAC, 22(1):41?53, Jan [3] B. Yang and H. Garcia-Molina, “Comparing Hybrid Peer-to-Peer Systems”, Stanford University, Technocal Report, [4] Course material from : Peer-to-Peer Computing (3 cr) from Helsinki University. Available at: [5] Sylvia Ratnasamy, Scott Shenker, and Ion Stoica, “Routing algorithms for DHTs: some open questions,”. In proceedings of the IEEE International Workshop on Peer-to-Peer Systems (IPTPS), Cambridge, MA, USA, Mar

Topic #3 Title: ”IP telephony: client-server vs. peer-to-peer approaches” Background: One interesting application of P2P technology is in the area of IP telephony. P2P telephony does not exhibit the copywrite issues which are associated with earlier P2P applications such as content distribution. Goal: Compare the client-server (SIP), and peer-to-peer (e.g. Skype) approach for IP telephony. Can IP telephony be pure peer-to-peer? What features need to be centralized? Include an overview of [2] in your analysis. You can also cover aspects related to the open (SIP) vs. proprietary approach (Skype).

References for topic #3 [1] S. A. Baset and H. Schulzrinne, "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol", Columbia University Technical Report CUCS [2] K. Singh and H. Schulzrinne, “Peer-to-Peer Internet Telephony using SIP”, Columbia University Technical Report