Post on 27-Mar-2015
transcript
MP2P –IP Multicast and P2P Technology
Huo Yusong
Outline
Background1
Our Solution : MP2P2
Analysis & testing results3
Futrue work 4
Conclusion5
Background
• Peer-to-peer (P2P) Technology
• Recent surveys show that P2P applications generate a high percentage of traffic on the Internet
• The explosion of P2P traffic creates new challenges to the network loads
Background (Cont.)
• Multicast Technology
Algorithm: RPM CBT
Routing protocols: DVMRP 、 MOSPF 、PIM-DM/SM ; AMRoute 、 AMRIS
Background (Cont.)
• Characteristic in wireless environment :
Limited-bandwidth: CDMA GSM/GPRS WLAN
Limited-abilities at terminal equipments
Routing informations and network topology change fast
• A good condition for multicast
MP2P
• MP2P implements: – IP multicast– P2P unicast– saves bandwidth by :
• transmitting file pieces from one peer to another through multicast in the same multicast area
• unicast P2P in different area, rather than everyone getting from one central server.
Transport Model
ProxyReveiver
Reveiver
File Source
ReveiverReveiver
Reveiver
Source Area
Receive Area
Multicast
Multicast
P2P Unicast
P2P Unicast
MP2P Principle
source/agent
receiver A
receiver B
1 2 3 4 5
12
34
5
MP2P Principle (Cont.)
source A
receiver A
receiver B
1
2
3
4
5
4 53
1 3 5
MP2P Principle (Cont.)
source
receiver A
receiver B
1 2 3 4 5
P2P request 1,2
1 3 5
3 5
P2P request 2,4
4
MP2P Principle (Cont.)
source
receiver A
receiver B
1 2 3 4 5
1 3 5
3 54
1
4
MP2P Principle (Cont.)
source
receiver A
receiver B
1 2 3 4 5
1 3 4 5
1 3 4 5
P2P request 2
2
MP2P Principle (Cont.)
source
receiver A
receiver B
1 23 4 5
1 3 4 5
1 3 4 5
2
2
P2P request 2
2
Architecture of MP2P
Multicast
Authentication Service
Peer/Group Discovery
User Interface
Management Message
Resource Search
Files Management
UnicastP2P Multicast P2P Unicast
Data Transimission
FilesSegment
Information
Resource Transimision
Peer Control
P2P
Transport Model
ProxyReveiver
Reveiver
File Source
ReveiverReveiver
Reveiver
Source Area
Receive Area
Multicast
Multicast
P2P Unicast
P2P Unicast
Election of Proxy
• The proxy is the peer who has the plenteous CPU and bandwidth resource and can provide service to other peers in the steady, long-term status ;– Designated Proxy – Backup Proxy – Capability
• CPU resource• bandwidth available• the number of the file resource• on-line time statistically
Analysis
• MP2P – Pure P2P mode
– Mixed mode
– The bandwidth consumption in Formula (2) is not linear increasing as it increases in Formula (1).
* (1)B C N
* * (2)i m lost i average iB C C N C W
Testing results
0. 00%
20. 00%
40. 00%
60. 00%
80. 00%
100. 00%
1 6 11 16 21 26 31Number of Peers
CPU
Load
s
0
10
20
30
40
50
60
70
80
Band
widt
h Co
nsum
ptio
n
CPU LoadsBandwi dth Consumpti on
0. 00%
20. 00%
40. 00%
60. 00%
80. 00%
100. 00%
1 31 61 91Number of Peers
CPU
Load
s0
20
40
60
Band
widt
h Co
nsum
ptio
n
CPU LoadsBandwi dth Consumpti on
Performance in Pure P2P mode Performance of in mixed mode
Results in ethernet
User list
Results in ethernet (Cont.)
Task list
Results in ethernet (Cont.)
Monitor
Results in ethernet (Cont.)
Unicast record
Futrue work
• Optimizing the MP2P system
• More application including audio/video real-time stream, etc.
• Adaptive network switching technique
Conclusion
• MP2P System– which makes use of IP Multicast and peer-to-p
eer technology. – Several contributions had achieved :
• saves the bandwidth and lowers the system loads by employing IP multicast;
• Provide reliable multicast by employing P2P;• Provide cross-area multicast by employing P2P.
http://ipv6.bupt.edu.cn
返回返回