mp2p –ip multicast and p2p technology huo yusong

Post on 27-Mar-2015

218 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

MP2P –IP Multicast and P2P Technology

Huo Yusong

Outline

Background1

Our Solution : MP2P2

Analysis & testing results3

Futrue work 4

Conclusion5

Background

• Peer-to-peer (P2P) Technology

• Recent surveys show that P2P applications generate a high percentage of traffic on the Internet

• The explosion of P2P traffic creates new challenges to the network loads

Background (Cont.)

• Multicast Technology

Algorithm: RPM CBT

Routing protocols: DVMRP 、 MOSPF 、PIM-DM/SM ; AMRoute 、 AMRIS

Background (Cont.)

• Characteristic in wireless environment :

Limited-bandwidth: CDMA GSM/GPRS WLAN

Limited-abilities at terminal equipments

Routing informations and network topology change fast

• A good condition for multicast

MP2P

• MP2P implements: – IP multicast– P2P unicast– saves bandwidth by :

• transmitting file pieces from one peer to another through multicast in the same multicast area

• unicast P2P in different area, rather than everyone getting from one central server.

Transport Model

ProxyReveiver

Reveiver

File Source

ReveiverReveiver

Reveiver

Source Area

Receive Area

Multicast

Multicast

P2P Unicast

P2P Unicast

MP2P Principle

source/agent

receiver A

receiver B

1 2 3 4 5

12

34

5

MP2P Principle (Cont.)

source A

receiver A

receiver B

1

2

3

4

5

4 53

1 3 5

MP2P Principle (Cont.)

source

receiver A

receiver B

1 2 3 4 5

P2P request 1,2

1 3 5

3 5

P2P request 2,4

4

MP2P Principle (Cont.)

source

receiver A

receiver B

1 2 3 4 5

1 3 5

3 54

1

4

MP2P Principle (Cont.)

source

receiver A

receiver B

1 2 3 4 5

1 3 4 5

1 3 4 5

P2P request 2

2

MP2P Principle (Cont.)

source

receiver A

receiver B

1 23 4 5

1 3 4 5

1 3 4 5

2

2

P2P request 2

2

Architecture of MP2P

Multicast

Authentication Service

Peer/Group Discovery

User Interface

Management Message

Resource Search

Files Management

UnicastP2P Multicast P2P Unicast

Data Transimission

FilesSegment

Information

Resource Transimision

Peer Control

P2P

Transport Model

ProxyReveiver

Reveiver

File Source

ReveiverReveiver

Reveiver

Source Area

Receive Area

Multicast

Multicast

P2P Unicast

P2P Unicast

Election of Proxy

• The proxy is the peer who has the plenteous CPU and bandwidth resource and can provide service to other peers in the steady, long-term status ;– Designated Proxy – Backup Proxy – Capability

• CPU resource• bandwidth available• the number of the file resource• on-line time statistically

Analysis

• MP2P – Pure P2P mode

– Mixed mode

– The bandwidth consumption in Formula (2) is not linear increasing as it increases in Formula (1).

* (1)B C N

* * (2)i m lost i average iB C C N C W

Testing results

0. 00%

20. 00%

40. 00%

60. 00%

80. 00%

100. 00%

1 6 11 16 21 26 31Number of Peers

CPU

Load

s

0

10

20

30

40

50

60

70

80

Band

widt

h Co

nsum

ptio

n

CPU LoadsBandwi dth Consumpti on

0. 00%

20. 00%

40. 00%

60. 00%

80. 00%

100. 00%

1 31 61 91Number of Peers

CPU

Load

s0

20

40

60

Band

widt

h Co

nsum

ptio

n

CPU LoadsBandwi dth Consumpti on

Performance in Pure P2P mode Performance of in mixed mode

Results in ethernet

User list

Results in ethernet (Cont.)

Task list

Results in ethernet (Cont.)

Monitor

Results in ethernet (Cont.)

Unicast record

Futrue work

• Optimizing the MP2P system

• More application including audio/video real-time stream, etc.

• Adaptive network switching technique

Conclusion

• MP2P System– which makes use of IP Multicast and peer-to-p

eer technology. – Several contributions had achieved :

• saves the bandwidth and lowers the system loads by employing IP multicast;

• Provide reliable multicast by employing P2P;• Provide cross-area multicast by employing P2P.

http://ipv6.bupt.edu.cn

  返回返回

top related