scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Enabling Global Multimedia Distributed Services Based on Hierarchical DHT Overlay Networks

TL;DR: A simple way to interconnect different domains using on peer-to-peer technology to provide connectivity between users of different domains and allow decentralised multimedia services to be placed where they can be provided most effectively is defined.
Abstract: The provision of innovating multimedia services is a high priority for service providers. Due to the the high traffic volume characteristics of multimedia content, decentralised services are a desired solution for multimedia scenarios. Based on the ongoing work of the IETF P2PSIP WG this paper defines a simple way to interconnect different domains using on peer-to-peer technology. The objective is to provide connectivity between users of different domains and allow decentralised multimedia services to be placed where they can be provided most effectively. Furthermore, the routing performance and routing state is analysed for the proposed hierarchical DHT overlay architecture.

Content maybe subject to copyright    Report

Citations
More filters
01 Jan 2003
TL;DR: A super-peer is a node in a peer-to-peer network that operates both as a server to a set of clients, and as an equal in a network of super-peers.
Abstract: A super-peer is a node in a peer-to-peer network that operates both as a server to a set of clients, and as an equal in a network of super-peers. Super-peer networks strike a balance between the efficiency of centralized search, and the autonomy, load balancing and robustness to attacks provided by distributed search. Furthermore, they take advantage of the heterogeneity of capabilities (e.g., bandwidth, processing power) across peers, which recent studies have shown to be enormous. Hence, new and old P2P systems like KaZaA and Gnutella are adopting super-peers in their design. Despite their growing popularity, the behavior of super-peer networks is not well understood. For example, what are the potential drawbacks of super-peer networks? How can super-peers be made more reliable? How many clients should a super-peer take on to maximize efficiency? we examine super-peer networks in detail, gaming an understanding of their fundamental characteristics and performance tradeoffs. We also present practical guidelines and a general procedure for the design of an efficient super-peer network.

916 citations

Journal ArticleDOI
TL;DR: A performance evaluation of a structured communication-oriented P2P system in the presence of churn is presented and it is drawn that in general the UMTS access mode consumes slightly more power than the WLAN access mode.

52 citations


Cites background from "Enabling Global Multimedia Distribu..."

  • ...Accordingly, the churn effect is one of the primary problems that need to be studied....

    [...]

Proceedings ArticleDOI
02 Sep 2009
TL;DR: The feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments draws the conclusion that the UMTS access mode consumes slightly more power than the WLAN access mode in general.
Abstract: We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of churn are modeled by the exponential distribution with varied value of mean online time. Our system utilizes Kademlia with some modifications as the underlying Distributed Hash Table (DHT) algorithm, and Peer-to-Peer Protocol (P2PP), one of the former candidates of Peer-to-Peer Session Initiation Protocol (P2PSIP) working group, as the signaling protocol. A prototype is implemented to evaluate the feasibility of mobile nodes acting as fully fledged peers. The prototype measurements show it is feasible for the mobile nodes to take part in the overlay from the viewpoints of CPU load and network traffic load. Through battery measurements, we draw the conclusion that the UMTS access mode consumes slightly more power than the WLAN access mode in general. Protocol packets with sizes of 200 bytes or less are observed to be the most energy efficient in the UMTS access mode.

14 citations

Proceedings ArticleDOI
19 Apr 2010
TL;DR: An algorithm for mapping a logical network topology to the physicalTopology to achieve robustness against dynamically changing databases that also considers the characteristic of TCAMs is proposed.
Abstract: Sophisticated routing protocols, such as content-based routing, have been studied and proposed to replace Internet Protocol (IP) in the future Internet. Routing based on content will make finding, querying, and retrieving the desired information possible within the routers rather than having the routers forward the packets to data servers or domain name servers. However, one of the main reasons that has prevented achieving content-based routing within the routers in the past has been their storage constraints. In our previous work, we showed that name-based routing, which is a good example of content-based routing, is feasible in practice utilizing Ternary Content Addressable Memory (TCAM). Using our proposed algorithms based on longest alphabet match and Distributed Hash Table (DHT), the Fully Qualified Domain Name (FQDN) database was distributed among less than the number of routers that are currently existing in the Internet. In this paper, we evaluate the feasibility of robustly updating the routing information database entries and show that there are no drastic changes in the routers' forwarding tables. We propose an algorithm for mapping a logical network topology to the physical topology to achieve robustness against dynamically changing databases that also considers the characteristic of TCAMs.

6 citations

16 Sep 2009
TL;DR: A Hierarchical P2PSIP architecture where different overlays are used for different peer mobility behaviours and they are interconnected between them through an interconnection overlay so that peers that share the same behaviour to choose a certain protocol or to optimize some functionality that suits best with their mobility situation, while maintaining connectivity with all peers.
Abstract: The use of peer-to-peer technologies is increasing everyday and the improvement of mobility technologies is a reality. Now, it is expected that peer-to-peer applications run on mobile devices, but the conjunction of these two technologies is an open research issue. The user mobility impacts on the churn suffered by peer-to-peer networks and consequently it impacts on their performance. Therefore, some mechanisms are necessary to minimize this undesirable effect. Our proposal tries to solve this problem by using a Hierarchical P2PSIP architecture where different overlays are used for different peer mobility behaviours and they are interconnected between them through an interconnection overlay. In this way it is possible for peers that share the same behaviour to choose a certain protocol or to optimize some functionality that suits best with their mobility situation, while maintaining connectivity with all peers.

3 citations


Cites background or methods or result from "Enabling Global Multimedia Distribu..."

  • ...txt [21] I....

    [...]

  • ...tag that defines the mobility profile is defined to create the Hierarchical ID in a very simple way and with minor changes in comparison with our previous proposals [21], [22]....

    [...]

  • ...In our previous work [21] and [22], users and services are identified by URI’s, like in a VoIP scenario based on SIP....

    [...]

  • ...Considering our previous work [21] and [22], where users and services are identified by URI’s, we have to incorporate the information of the peer mobility profiles in the URI format....

    [...]

  • ...This problem can be solved with H-P2PSIP [21] and [22] if we do an intelligent mapping of the different overlays in this architecture....

    [...]

References
More filters
Book ChapterDOI
01 Jun 2002
TL;DR: Session Initiation Protocol (SIP) as discussed by the authors is an application layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants, such as Internet telephone calls, multimedia distribution, and multimedia conferences.
Abstract: This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.

5,482 citations

Journal ArticleDOI
TL;DR: Results from theoretical analysis and simulations show that Chord is scalable: Communication cost and the state maintained by each node scale logarithmically with the number of Chord nodes.
Abstract: A fundamental problem that confronts peer-to-peer applications is the efficient location of the node that stores a desired data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto a node. Data location can be easily implemented on top of Chord by associating a key with each data item, and storing the key/data pair at the node to which the key maps. Chord adapts efficiently as nodes join and leave the system, and can answer queries even if the system is continuously changing. Results from theoretical analysis and simulations show that Chord is scalable: Communication cost and the state maintained by each node scale logarithmically with the number of Chord nodes.

3,518 citations


"Enabling Global Multimedia Distribu..." refers methods in this paper

  • ...The idea is to provide a protocol that allows the implementation of any DHT overlay network such as Kademlia [11] or Chord [16]....

    [...]

Proceedings ArticleDOI
23 Apr 2006
TL;DR: In this paper, the authors analyze Skype functions such as login, NAT and firewall traversal, call establishment, media transfer, codecs, and conferencing under three different network setups.
Abstract: Skype is a peer-to-peer VoIP client developed in 2003 by the organization that created Kazaa. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than other VoIP clients. It encrypts calls end-to-end, and stores user information in a decentralized fashion. Skype also supports instant messaging and conferencing. This paper analyzes key Skype functions such as login, NAT and firewall traversal, call establishment, media transfer, codecs, and conferencing under three different network setups. Analysis is performed by careful study of the Skype network traffic and by intercepting the shared library and system calls of Skype. We draw a map of super nodes to which Skype establishes a TCP connection at login.

1,067 citations

01 Jan 2003
TL;DR: A super-peer is a node in a peer-to-peer network that operates both as a server to a set of clients, and as an equal in a network of super-peers.
Abstract: A super-peer is a node in a peer-to-peer network that operates both as a server to a set of clients, and as an equal in a network of super-peers. Super-peer networks strike a balance between the efficiency of centralized search, and the autonomy, load balancing and robustness to attacks provided by distributed search. Furthermore, they take advantage of the heterogeneity of capabilities (e.g., bandwidth, processing power) across peers, which recent studies have shown to be enormous. Hence, new and old P2P systems like KaZaA and Gnutella are adopting super-peers in their design. Despite their growing popularity, the behavior of super-peer networks is not well understood. For example, what are the potential drawbacks of super-peer networks? How can super-peers be made more reliable? How many clients should a super-peer take on to maximize efficiency? we examine super-peer networks in detail, gaming an understanding of their fundamental characteristics and performance tradeoffs. We also present practical guidelines and a general procedure for the design of an efficient super-peer network.

916 citations

Proceedings ArticleDOI
05 Mar 2003
TL;DR: This work examines super-peer networks in detail, gaming an understanding of their fundamental characteristics and performance tradeoffs, and presents practical guidelines and a general procedure for the design of an efficient super- Peer-to-peer network.
Abstract: A super-peer is a node in a peer-to-peer network that operates both as a server to a set of clients, and as an equal in a network of super-peers. Super-peer networks strike a balance between the efficiency of centralized search, and the autonomy, load balancing and robustness to attacks provided by distributed search. Furthermore, they take advantage of the heterogeneity of capabilities (e.g., bandwidth, processing power) across peers, which recent studies have shown to be enormous. Hence, new and old P2P systems like KaZaA and Gnutella are adopting super-peers in their design. Despite their growing popularity, the behavior of super-peer networks is not well understood. For example, what are the potential drawbacks of super-peer networks? How can super-peers be made more reliable? How many clients should a super-peer take on to maximize efficiency? we examine super-peer networks in detail, gaming an understanding of their fundamental characteristics and performance tradeoffs. We also present practical guidelines and a general procedure for the design of an efficient super-peer network.

905 citations


"Enabling Global Multimedia Distribu..." refers background in this paper

  • ...However, issues such as a potential super-peer overload [ 2 ] have to be considered....

    [...]

  • ...The drawback of this approach is the higher load needed to be supported by the super-peers [ 2 ] although this load is smaller than in other hierarchical DHT proposals [5], [6], [17], [18]....

    [...]