SlideShare a Scribd company logo
1 of 15
Overlay Bandwidth Management: Scheduling and Active Queue Management of Overlay Flows Kalman Graffi , Konstantin Pussep, Sebastian Kaune,  Aleksandra Kovacevic, Nicolas Liebau, and Ralf Steinmetz
Example: Bandwidth Usage in Unst. P2P Overlay Queries I cannot hear you Help! Emergency! Unimportant Bandwidth usage : ,[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Motivation for Bandwidth Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Which Flows are in Focus?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Scheduling and Active Queue Management  Message Sched.+AQM 1. Message Scheduling Before: After: 2. Queue Management Before: After: Queue Limit
Overlay Bandwidth Management ,[object Object],[object Object],[object Object],[object Object],[object Object],Buffer management In-from overlay Insert msg in buffer Apply AQM mech. Timeout Pick next msg (SCHED) Out to underlay Bandwidth available? Receive message yes no
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Analyzing Overlay Flows in Kademlia ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Results:
Requirements and Related Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Our Solution: Sched. and AQM of Overlay Flows In-from overlay Insert msg in buffer Apply AQM mech. Timeout Pick next msg (SCHED) Out to underlay Bandwidth available? Receive message yes no
Evaluation Setup ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Evaluation Results of HiPNOS.KOM ,[object Object],[object Object],[object Object],[object Object],[object Object]
Future Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? Kalman Graffi Peer-to-Peer Research Group Dept. of Electrical Engineering and Information Technology Multimedia Communications Lab  ·   KOM Merckstr. 25  ·  64283 Darmstadt  ·   Germany Phone (+49) 6151 – 16 49 59 Fax (+49) 6151 – 16 61 52 [email_address] Further information:  http://www.KOM.tu-darmstadt.de/ Publications:  http://www.KOM.tu-darmstadt.de/Research/Publications/publications.html

More Related Content

What's hot

Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data NetworksWaqas !!!!
 
TCT Final Project Presentation
TCT Final Project  PresentationTCT Final Project  Presentation
TCT Final Project PresentationAsif Ali Channa
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networkslily888
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsVijay Karan
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsVijay Karan
 
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMRED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMEditor IJCATR
 
Kalman Graffi - Efficiency and Information Management in Peer-to-Peer Systems
Kalman Graffi - Efficiency and Information Management in Peer-to-Peer SystemsKalman Graffi - Efficiency and Information Management in Peer-to-Peer Systems
Kalman Graffi - Efficiency and Information Management in Peer-to-Peer SystemsKalman Graffi
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET Journal
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsVijay Karan
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkIRJET Journal
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsVijay Karan
 
Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...IJERA Editor
 
avoiding retransmissions using random coding scheme or fountain code scheme
avoiding retransmissions using random coding scheme or fountain code schemeavoiding retransmissions using random coding scheme or fountain code scheme
avoiding retransmissions using random coding scheme or fountain code schemeIJAEMSJORNAL
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksIJMER
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syedijaprr_editor
 
Difference between Quality of Service and Grade of Service (General description)
Difference between Quality of Service and Grade of Service (General description)Difference between Quality of Service and Grade of Service (General description)
Difference between Quality of Service and Grade of Service (General description)Donaire Carapichoso
 
Packet Loss Distributions of TCP using Web100
Packet Loss Distributions of TCP using Web100Packet Loss Distributions of TCP using Web100
Packet Loss Distributions of TCP using Web100Zoriel Salado
 

What's hot (19)

Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
 
TCT Final Project Presentation
TCT Final Project  PresentationTCT Final Project  Presentation
TCT Final Project Presentation
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
 
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMRED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
 
Kalman Graffi - Efficiency and Information Management in Peer-to-Peer Systems
Kalman Graffi - Efficiency and Information Management in Peer-to-Peer SystemsKalman Graffi - Efficiency and Information Management in Peer-to-Peer Systems
Kalman Graffi - Efficiency and Information Management in Peer-to-Peer Systems
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
SPROJReport (1)
SPROJReport (1)SPROJReport (1)
SPROJReport (1)
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
 
Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...
 
avoiding retransmissions using random coding scheme or fountain code scheme
avoiding retransmissions using random coding scheme or fountain code schemeavoiding retransmissions using random coding scheme or fountain code scheme
avoiding retransmissions using random coding scheme or fountain code scheme
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for Networks
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed
 
Difference between Quality of Service and Grade of Service (General description)
Difference between Quality of Service and Grade of Service (General description)Difference between Quality of Service and Grade of Service (General description)
Difference between Quality of Service and Grade of Service (General description)
 
Packet Loss Distributions of TCP using Web100
Packet Loss Distributions of TCP using Web100Packet Loss Distributions of TCP using Web100
Packet Loss Distributions of TCP using Web100
 

Similar to IEEE LCN 2007: Kalman Graffi - Overlay Bandwidth Management: Scheduling and Active Queue Management of Overlay Flows

Efficiency Management in P2P Systems - 2007
Efficiency Management in P2P Systems - 2007Efficiency Management in P2P Systems - 2007
Efficiency Management in P2P Systems - 2007Kalman Graffi
 
Thesis Presentation P2 P Vo D On Internet Rodrigo Godoi
Thesis Presentation   P2 P Vo D On Internet   Rodrigo GodoiThesis Presentation   P2 P Vo D On Internet   Rodrigo Godoi
Thesis Presentation P2 P Vo D On Internet Rodrigo GodoiRodrigo Godoi, PMP
 
IEEE ICPADS / P2PNVE 2007: Kalman Graffi - ECHoP2P - Emergency Call Handling ...
IEEE ICPADS / P2PNVE 2007: Kalman Graffi - ECHoP2P - Emergency Call Handling ...IEEE ICPADS / P2PNVE 2007: Kalman Graffi - ECHoP2P - Emergency Call Handling ...
IEEE ICPADS / P2PNVE 2007: Kalman Graffi - ECHoP2P - Emergency Call Handling ...Kalman Graffi
 
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"Valentin Thirion
 
Carrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoSCarrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoSVishal Sharma, Ph.D.
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overviewSripati Mahapatra
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Aswini Badatya
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Saumendra Pradhan
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
Early-stage topological and technological choices for TSN-based communication...
Early-stage topological and technological choices for TSN-based communication...Early-stage topological and technological choices for TSN-based communication...
Early-stage topological and technological choices for TSN-based communication...RealTime-at-Work (RTaW)
 
AI&BigData Lab 2016. Сарапин Виктор: Размер имеет значение: анализ по требова...
AI&BigData Lab 2016. Сарапин Виктор: Размер имеет значение: анализ по требова...AI&BigData Lab 2016. Сарапин Виктор: Размер имеет значение: анализ по требова...
AI&BigData Lab 2016. Сарапин Виктор: Размер имеет значение: анализ по требова...GeeksLab Odessa
 
Designing High Availability Networks, Systems, and Software for the Universit...
Designing High Availability Networks, Systems, and Softwarefor the Universit...Designing High Availability Networks, Systems, and Softwarefor the Universit...
Designing High Availability Networks, Systems, and Software for the Universit...Shumon Huque
 
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...Georgios Giannakopoulos
 

Similar to IEEE LCN 2007: Kalman Graffi - Overlay Bandwidth Management: Scheduling and Active Queue Management of Overlay Flows (20)

Efficiency Management in P2P Systems - 2007
Efficiency Management in P2P Systems - 2007Efficiency Management in P2P Systems - 2007
Efficiency Management in P2P Systems - 2007
 
Thesis Presentation P2 P Vo D On Internet Rodrigo Godoi
Thesis Presentation   P2 P Vo D On Internet   Rodrigo GodoiThesis Presentation   P2 P Vo D On Internet   Rodrigo Godoi
Thesis Presentation P2 P Vo D On Internet Rodrigo Godoi
 
IEEE ICPADS / P2PNVE 2007: Kalman Graffi - ECHoP2P - Emergency Call Handling ...
IEEE ICPADS / P2PNVE 2007: Kalman Graffi - ECHoP2P - Emergency Call Handling ...IEEE ICPADS / P2PNVE 2007: Kalman Graffi - ECHoP2P - Emergency Call Handling ...
IEEE ICPADS / P2PNVE 2007: Kalman Graffi - ECHoP2P - Emergency Call Handling ...
 
Cisco: QoS
Cisco: QoSCisco: QoS
Cisco: QoS
 
Presentacion QoS.pptx
Presentacion QoS.pptxPresentacion QoS.pptx
Presentacion QoS.pptx
 
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
 
Carrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoSCarrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoS
 
ADAPTIVE
ADAPTIVEADAPTIVE
ADAPTIVE
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
A dhoc networks
A dhoc networksA dhoc networks
A dhoc networks
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
Early-stage topological and technological choices for TSN-based communication...
Early-stage topological and technological choices for TSN-based communication...Early-stage topological and technological choices for TSN-based communication...
Early-stage topological and technological choices for TSN-based communication...
 
ASTAP03/WS-NGN/08
ASTAP03/WS-NGN/08ASTAP03/WS-NGN/08
ASTAP03/WS-NGN/08
 
AI&BigData Lab 2016. Сарапин Виктор: Размер имеет значение: анализ по требова...
AI&BigData Lab 2016. Сарапин Виктор: Размер имеет значение: анализ по требова...AI&BigData Lab 2016. Сарапин Виктор: Размер имеет значение: анализ по требова...
AI&BigData Lab 2016. Сарапин Виктор: Размер имеет значение: анализ по требова...
 
Designing High Availability Networks, Systems, and Software for the Universit...
Designing High Availability Networks, Systems, and Softwarefor the Universit...Designing High Availability Networks, Systems, and Softwarefor the Universit...
Designing High Availability Networks, Systems, and Software for the Universit...
 
Chap24
Chap24Chap24
Chap24
 
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
 

More from Kalman Graffi

IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...
IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...
IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...Kalman Graffi
 
LibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - OverviewLibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - OverviewKalman Graffi
 
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...Kalman Graffi
 
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...Kalman Graffi
 
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia CaseIEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia CaseKalman Graffi
 
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...Kalman Graffi
 
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...Kalman Graffi
 
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...Kalman Graffi
 
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...Kalman Graffi
 
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...Kalman Graffi
 
Kalman Graffi - Monitoring and Management of P2P Systems - 2010
Kalman Graffi - Monitoring and Management of P2P Systems - 2010Kalman Graffi - Monitoring and Management of P2P Systems - 2010
Kalman Graffi - Monitoring and Management of P2P Systems - 2010Kalman Graffi
 
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...Kalman Graffi
 
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010Kalman Graffi
 
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocialQuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocialKalman Graffi
 
LifeSocial - A P2P-Platform for Secure Online Social Networks
LifeSocial - A P2P-Platform for Secure Online Social NetworksLifeSocial - A P2P-Platform for Secure Online Social Networks
LifeSocial - A P2P-Platform for Secure Online Social NetworksKalman Graffi
 
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...Kalman Graffi
 
Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010Kalman Graffi
 
Kalman Graffi - 1 Slide - 2010
Kalman Graffi - 1 Slide - 2010Kalman Graffi - 1 Slide - 2010
Kalman Graffi - 1 Slide - 2010Kalman Graffi
 
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...Kalman Graffi
 
Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010Kalman Graffi
 

More from Kalman Graffi (20)

IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...
IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...
IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...
 
LibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - OverviewLibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - Overview
 
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
 
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
 
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia CaseIEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
 
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
 
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
 
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
 
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
 
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
 
Kalman Graffi - Monitoring and Management of P2P Systems - 2010
Kalman Graffi - Monitoring and Management of P2P Systems - 2010Kalman Graffi - Monitoring and Management of P2P Systems - 2010
Kalman Graffi - Monitoring and Management of P2P Systems - 2010
 
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
 
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
 
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocialQuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
 
LifeSocial - A P2P-Platform for Secure Online Social Networks
LifeSocial - A P2P-Platform for Secure Online Social NetworksLifeSocial - A P2P-Platform for Secure Online Social Networks
LifeSocial - A P2P-Platform for Secure Online Social Networks
 
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
 
Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010
 
Kalman Graffi - 1 Slide - 2010
Kalman Graffi - 1 Slide - 2010Kalman Graffi - 1 Slide - 2010
Kalman Graffi - 1 Slide - 2010
 
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
 
Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010
 

IEEE LCN 2007: Kalman Graffi - Overlay Bandwidth Management: Scheduling and Active Queue Management of Overlay Flows

  • 1. Overlay Bandwidth Management: Scheduling and Active Queue Management of Overlay Flows Kalman Graffi , Konstantin Pussep, Sebastian Kaune, Aleksandra Kovacevic, Nicolas Liebau, and Ralf Steinmetz
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Questions? Kalman Graffi Peer-to-Peer Research Group Dept. of Electrical Engineering and Information Technology Multimedia Communications Lab · KOM Merckstr. 25 · 64283 Darmstadt · Germany Phone (+49) 6151 – 16 49 59 Fax (+49) 6151 – 16 61 52 [email_address] Further information: http://www.KOM.tu-darmstadt.de/ Publications: http://www.KOM.tu-darmstadt.de/Research/Publications/publications.html

Editor's Notes

  1. 25 Minuten für alles, d.h. 20 Minuten Vortrag
  2. Wir haben ein unstrukturiertes P2P Netz gegeben. Ein Rechner tätigt für sein Subnetz, das an ihm angeschlossen ist, mehrere Anfragen über eine Verbindung mit relative wenig Bandbreite. Kommt nun ein weiterer Nutzer hinzu, der diese Verbindung ebenfalls nutzen möchte, aber dessen Anfrage an das Netzwerk weitaus wichtiger ist, da es z.B. ein Notruf ist. So werden seine Messages zwar bis zum Engpass gut weitergeleitet, doch ohne gesonderte Strategie für den Umgang mit Engpässen werden die Messages nach ihrer Eingangsreihenfolge abgearbeitet. Dabei verzögern die vielen unwichtigen Anfragen des blauen Servers, die wichtige Anfrage von dem Nutzer. Bis die Nachricht vom Nutzer an der Reihe ist, ist wertvolle Zeit vergangen. Geschieht das in jedem Schritt, so ist die Qualität mit der die Anfrage bearbeitet wird, für viele Anwendungen nicht mehr ausreichend. Als Lösung bietet sich an, Scheduling Mechanismen einzusetzen, um wichtigere Nachrichten höher priorisiert zu bearbeiten. Dadurch erreicht man, dass zeitkritische Anwendungen ebenso zufriedenstellend bearbeitet werden wie Durchsatzfokusierte. In diesem Fall haben wir bei gleichem Aufwand, das heißt bei gleicher Anzahl an Nachrichten die pro Zeiteinheit bearbeitet werden, eine höherwertige Leistung erbracht. Durch Forschung über die Effizienz von Peer-to-Peer Systemen können wir zum einen die Leistung erhöhen und dadurch mehr Nutzer für P2P begeistern aber auch die Kosten senken und damit mehr Geräten die Teilnahme an P2P Netzen ermöglichen. Ich danke fürs zuhören und hoffe das spannende Thema der Effizienz etwas zugänglicher gemacht zu haben.
  3. Betrachten wir also Scheduling und Active Queue Management Verfahren. Was Active Queue Management ist, werde ich gleich beschreiben. Allgemein geht es darum, dass das System Anfragen an eine Ressource erhält und entscheiden muss, welchem Anfrager wann die Ressource zur Verfügung gestellt wird. Dieses Prinzip ist auf verschiedene Ressourcen anwendbar, wie z.B. Rechenkraft, Bandbreite oder Speicherzugriffe. Wir gehen davon aus, dass die Anfragen in einer Queue zwischengespeichert werden, währen die Ressource in Benutzung ist. Scheduling nennt man nun das Verfahren, dass bestimmt, welches der Anfrager aus der Queue als nächstes Zugriff auf die Ressource erhält, sie bestimmt also die Reihenfolge der Anfrager in der Queue. Die Referenzlösung dafür ist First-In-First-Out. Nun kann es vorkommen, dass die Queue des Systems an ihre Grenzen stößt, da auch sie nur endliche Länge hat. Für diesen Fall gibt es Verfahren, die man unter dem Sammelbegriff Active Queue Management zusammenfasst. Sie entscheiden welche Anfragen aus der Queue entfernt werden, wenn eine Überlast vorliegt. Typisches Beispiel für ein Active Queue Management Verfahren ist Drop Tail, dass alle neu ankommenden Verfahren bei Überlast verwirft. Wir sehen, dass die Scheduling und Active Queue Management Verfahren allgemein für die Ressourcennutzung anwendbar sind. Um nun aber tiefer in die Materie einzusteigen und zu erfahren welche Verfahren es gibt und wo ihre Vor- und Nachteile liegen, habe ich mich mit verschiedenen Lösungen auseinander gesetzt.
  4. Aiming to handle the highest priority of SOS messages, we considered to implement HiPNOS.KOM [GKP+07], In order to evaluate the buffer management and the handling of priorities, the efficiency metrics of he simulator were extended. For instance, the number of messages per contacts per peer to verify whether the amount of messages per source/destination combination in a traffic generated by a P2P overlay is low. Up and download bandwidth utilization Number of received messages with differing loss and latency priorities With this metric, the amount of prioritized messages a peer receives can be determined. Number of dropped messages with differing loss priority Depending on the queue managing mechanism, messages are dropped when the buffer is full. With this metric, the amount of discarded messages with several priority levels is determined. For example, the figure shows how HiPNOS handles correctly the message priorities in contrast to FIFO.
  5. Fair Queuing: Jeder Stream verschickt 1 Bit, nacheinander sind alle Streams dran Weighted Fair Queuing WFQ / Packet-by-Packet General Processor Sharing: Packet basiertes FQ: Stream mit niedrigstem Service wird bedient + Paketgröße auf empfangenen Service addiert Round Robin: Jeder Stream kommt mal dran => Große Paket => Vorteil Nachteil dieser Verfahren: Streams müssen identifizierbar sein, in unserem Fall nicht gegeben CSFQ: Äußerer Rand der Insel: bewertet Stream Prios: interne Submenge folgt den QoS Anforderungen. Doch wo ist der Rand im P2P Netzwerk? Kein Subnetz klar einkreisbar. Random Early Detection: Bis Bufferfüllung Thres_min: nichts verwerfen, von Thres_min bis Thres_max Drop-Rate proportional heben mit (Bufferfüllung-Thres_min), ab thres_max: alles verwerfen -> Problem: No priorities considered, Overlay dont have (message-type-based) congestion windows ->
  6. Dazu haben wir eine einfache Lösung entwickelt, die Nachrichten Prioritäten verwendet. Die Nachrichten haben individuelle Delay und Loss Prioritäten. HiPNOS.KOM beschreibt einen einfachen Scheduler und Active Queue Management, Nachrichten mit der höchsten Delay Priorität in der Queue werden zuerst durchgestellt, und Nachrichten mit der niedrigsten Loss Priorität werden zuerst verworfen bei Überlast. Das ganzen haben wir dann wieder in Kademlia mit 10.000 Peers und mit FIFO und Drop Tail als Referenzverfahren getestet. Hier sind die Ergebnisse. Wir sehen in der linken Grafik, das Delay der Nachrichten im Verhältnis zu ihrer Delay Priorität und rechts die Anzahl verworfener Nachrichten in Relation zu ihrer Loss Priorität. Ein hoher Prioritätswert bedeutet dabei hohe Priorität. Wir sehen, dass die Ergebnisse den Erwartungen entsprechen. Delay sinkt mit steigender Priorität, ebenso die Anzahl der verworfenen Pakete. Es stellt sich die Frage: Alles wunderbar? Was gibt es noch zu verbessern, bzw. viel wichtiger: was lernen wir daraus.