SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
DOI : 10.5121/ijcnc.2016.8103 35
PERFORMANCE IMPROVEMENT OF
AN AS-FRIENDLY PEER SELECTION ALGORITHM
FOR P2P LIVE STREAMING
Yukinobu Fukushima, Kazuki Kobayashi and Tokumi Yokohira
Graduate School of Natural Science and Technology,
Okayama University, Tsushima-naka 3-1-1, Kita-ku, Okayama-city, Okayama, Japan
ABSTRACT
Minimum Physical Hop (MPH) has been proposed as a peer selection algorithm for decreasing inter-AS
(Autonomous System) traffic volume in P2P live streaming. In MPH, a newly joining peer selects a peer
whose physical hop count (i.e., the number of ASes traversed on the content delivery path) from it is the
minimum as its providing peer. However, MPH shows high inter-AS traffic volume when the number of
joining peers is large. In this paper, we propose IMPH that tries to further decrease the inter-AS traffic
volume by distributing peers with one logical hop count (i.e., the number of peers or origin streaming
servers (OSSes) traversed on the content delivery path from an OSS to the peer) to many ASes and
encouraging the following peers to find their providing peers within the same AS. Numerical examples
show that IMPH achieves at the maximum of 64% lower inter-AS traffic volume than MPH.
KEYWORDS
P2P Live Streaming, Peer Selection Algorithm, AS-friendliness
1. INTRODUCTION
There has been a big demand for live streaming services over the Internet. As one of the service
models, a peer-to-peer (P2P) live streaming system based on a P2P model has been attracting
attention [1-5, 19, 20]. The system can mitigate the load of Origin Streaming Servers (OSSes),
which provide an original content data, by making user terminals (peers) that have already joined
the system provide the content data for other peers in a multihop manner.
In P2P live streaming systems, it is important to 1) reduce inter-AS (Autonomous System) traffic
volume for restricting transit costs for ASes [6] and 2) keep the real-time property of content for
realizing live streaming [7, 8]. Inter-AS traffic volume and the real-time property depend on the
topology of the overlay network, which represents logical interconnections among peers.
Therefore, to attain better performance in terms of the two measures, we should construct a
proper topology of the overlay network. The topology is determined by a peer selecting
algorithm, which is performed by a newly joining peer when it selects peers (providing peers)
that provides the content data for it.
As conventional peer selection algorithms, Minimum-Hop (MH) [9] and Minimum-Depth (MD)
[10-12] have already been proposed. MH aims at reducing inter-AS traffic volume. In MH, a
newly joining peer selects a peer whose physical hop count from it is as small as possible as its
providing peer. The physical hop count between two peers is defined as the number of ASes
traversed on the content delivery path between them. On the other hand, MD aims at reducing
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
36
content delivery delay. In MD, a newly joining peer selects a peer whose logical hop count is as
small as possible as its providing peer. The logical hop count of a peer is defined as the number of
peers or OSSes traversed on the content delivery path from an OSS to the peer. However, MH
and MD do not take account of either inter-AS traffic volume or the real-time property of content.
A CDN-based peer selection algorithm [13] tries to reduce inter-AS traffic volume by exploiting
information available in content distribution networks (CDNs). In the algorithm, a newly joining
peer estimates physical proximity to other peers with the help of CDN services, and selects a peer
that has the closest proximity as its providing peer. However, this algorithm does not take account
of the real-time property of content.
In order to reduce inter-AS traffic volume while keeping the real-time property of content, we
have already proposed Minimum Physical Hop (MPH) [14, 15] as a peer selection algorithm.
MPH aims at reducing both inter-AS traffic volume and content delivery delay by inheriting the
peer selection policies from both MH and MD. The peer selection procedures of MPH are as
follows. Firstly, to reduce inter-AS traffic volume, a newly joining peer selects a peer with the
minimum physical hop count from it as its providing peer. Secondly, if there are several such
candidates, to reduce content delivery delay, it selects a peer with the minimum logical hop count
among the candidates as its providing peer. In addition, to strictly keep the real-time property of
content, MPH sets an upper bound on logical hop count of candidates for providing peers, and a
newly joining peer cannot select peers whose logical hop counts reach the upper bound as its
providing peer.
In previous studies [14, 15], it was reported that, although MPH achieves low inter-AS traffic
volume when the number of joining peers is small, it shows high inter-AS traffic volume when
the number of joining peers is large. This reason is as follows. When we use MPH, candidates for
providing peers with large logical hop counts tend to swarm in ASes without an OSS while those
with small logical hop counts do in ASes with an OSS because of the peer selection policy of
MPH. As the number of joining peers becomes large, the logical hop counts of the candidates for
providing peers in every AS increase. As a result, in the former ASes, the logical hop counts of
all the candidates for providing peers reach the upper bound frequently, and the newly joining
peer cannot often find its providing peers in the AS, and consequently it has to select its providing
peers in different ASes, which results in increased inter-AS traffic volume.
In this paper, to solve the problem of MPH, we propose Improved Minimum Physical Hop
(IMPH) as a novel peer selection algorithm. One way to solve the problem is to distribute top
level peers, which are peers with one logical hop count, to as many ASes as possible. In IMPH,
when there are no candidates for providing peers in an AS, a newly joining peer in the AS gives
high priority to selecting an OSS instead of the peer with the minimum physical hop count as its
providing peer. As a result, it becomes a top level peer, and consequently we expect that the
following peers in the AS successfully find its providing peer within the same ASes. In addition,
because providing capacity of an OSS is limited, to prevent peers in ASes with an OSS from
occupying the capacity, a newly joining peer in the ASes gives high priority to selecting a peer
except an OSS within the same AS.
The rest of this paper is organized as follows. In Section 2, we describe the P2P live streaming
system that we assume. In Section 3, we explain MPH and its problem. In Section 4, we propose
IMPH. In Section 5, we show the evaluation results. In Section 6, we conclude our paper.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
37
2. P2P LIVE STREAMING SYSTEM
Figure 1 depicts the P2P live streaming system assumed in this paper. The system consists of
Origin Streaming Servers (OSSes), a peer control server, and peers. The OSSes produce original
content data and provide the content data for peers. The peer control server maintains a list of
peers that have already joined the system and provides the list for peers. The peers are the user
terminals that have already joined the system, and relay the content data to other peers. Hereafter
we call a peer that provides the content data for other peers a providing peer and a peer that
receives the content data from other peers a receiving peer.
!""
#$$%
#$$%&'()*%(+&,$%-$%
Figure 1. P2P live streaming system
A procedure for a peer to join the system is as follows. When a peer (newly joining peer) joins the
system, it requires a list of candidates for providing peers of the peer control server (step 1). After
getting the list, the newly joining peer selects providing peers from the list with a peer selection
algorithm (step 2). Then, the newly joining peer sends out a delivery request to the selected
providing peers (step 3). After receiving the content data from the providing peers, the newly
joining peer can begin to view the content (step 4).
After joining the system, the newly joining peer needs to receive the streaming rate (A Mbps) of
the content data from the providing peers including OSSes in order to continue viewing the
content. We assume that the streaming rate can be divided into N minimum units and the rate of a
minimum unit is a Mbps. Accordingly, newly joining peers have to satisfy the following equation
in order to continue viewing the content.
! " #$% " &#' ( #) ( * #+,$% (1)
where Ni is the number of minimum units provided by providing peer i and D is the number of
providing peers.
While newly joining peers continue receiving the streaming rate of A Mbps, they can become
providing peers. The number (M) of minimum units that each providing peer can provide for
other peers changes depending on its upload bandwidth. We call the number of minimum units
the providing capacity. Providing peers have to satisfy the following equation.
!"# $ %!& ' !( ' ) !* ' +,"# (2)
where Mj is the number of minimum units provided for receiving peer j, U is the number of
receiving peers, and S is the remaining providing capacity.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
38
Figure 2 depicts the network model of our P2P live streaming system. An overlay network
represents interconnections among peers. An arrow in the overlay network shows delivery of the
content data between the two peers. For example, in Fig. 2, peer 1 receives the content data from
the OSS and provides it for peer 4. A physical network represents physical interconnections
among ASes.
!"#$%&'()"$*+,%-
.$$%)/011
.$$%)2
.$$%)3
4,5*)3
.$$%)6
07$%&'()"$*+,%-
.$$%)3
011
.$$%)2
.$$%)8
.$$%)9
.$$%)6
:1); :1)/ :1)2
.$$%);
.$$%);
.$$%)/
.$$%)8
.$$%)9
Figure 2. Overlay and underlay networks
3. CONVENTIONAL PEER SELECTION ALGORITHM
We have already proposed Minimum Physical Hop (MPH) [14, 15] as a conventional peer
selection algorithm. MPH aims at reducing inter-AS traffic volume and content delivery delay by
inheriting peer selection policy from both Minimum-Hop (MH) [9] and Minimum-Depth (MD)
[10-12].
In MPH, a newly joining peer determines its providing peers based on physical hop counts and
logical hop counts of candidates for providing peers. A physical hop count between two peers is
defined as the number of ASes traversed on the content delivery path between them. For example,
in Fig. 2, the physical hop count between peer 1 and peer 4 is two. A logical hop count of a peer
is defined as the number of peers or OSSes traversed on the content delivery path from an OSS to
the peer. For example, in Fig. 2, the logical hop count of peer 1 is one and that of peer 4 is two.
In order to keep the real time property of the content, MPH introduces an upper bound (H) on
logical hop counts of candidates for providing peers, namely, only the peers whose logical hop
counts are smaller than H can become candidates for providing peers. For example, in Fig. 2, if H
is set to three, peer 7 cannot become a candidate for a providing peer while the other peers and
the OSS can become providing peers.
In MPH, in order to reduce inter-AS traffic volume, a newly joining peer selects a peer whose
physical hop count from it is as small as possible as its providing peer. If there are multiple such
candidates, in order to reduce content delivery delay, it selects the peer whose logical hop is as
small as possible as its providing peer. This algorithm is described as follows in detail.
1.! A newly joining peer (Pnew) obtains the list of candidates for its providing peers (i.e.,
peers with remaining providing bit-rate greater than or equal to a and logical hop counts
smaller than H) from the peer control server.
2.! Pnew sorts the list in ascending order of physical hop counts from it. If there are multiple
candidates with the same physical hop counts from Pnew, it sorts them in ascending order
of logical hop counts.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
39
3.! Pnew selects the candidate one by one from the head of the list until the sum of the
remaining providing bit-rate of the selected candidates reaches the streaming rate (A) of
the content data. If enough candidates are found, Pnew successfully finishes the algorithm.
Otherwise, Pnew fails to join the system and the algorithm is finished.
Figure 3 shows an example of peer selection by MPH. Suppose that 1) an OSS and all peers have
non-zero providing bit-rate, 2) the upper bound (H) on the number of providing peers is two, and
3) peers 1 and 2 have already joined the system while peers 3, 4, 5, 6 and 7 newly join the system
in this order.
We first focus on peer selection in AS 4, which does not have the OSS. When peer 3 newly joins
the system in AS 4, peer 3 obtains the list of candidates: {OSS, 1, 2}. Then, it sorts the list into {2,
OSS, 1} based on the physical hop counts from it and the logical hop counts of the candidates.
Finally, peer 3 selects peer 2 as its providing peer. Similarly, peers 4 and 5 in AS 4 select peer 2
as their providing peers. Note that peers 4 and 5 do not select peer 3 as their providing peers
because the hop count of peer 3 reaches two (=H) and peer 3 cannot become a providing peer to
keep the real time property of content.
We next focus on peer selection in AS 1, which has the OSS. When peer 6 newly joins the system
in AS 1, peer 6 obtains the list of candidates and sorts it into {OSS, 1, 2}. Finally, peer 6 selects
the OSS as its providing peer. In the same way, peer 7 in AS 1 selects the OSS as its providing
peer.
As shown in the above example, providing peers with small logical hop counts tend to swarm in
ASes with an OSS while providing peers with large logical hop counts tend to swarm in ASes
without an OSS in MPH. In the latter ASes, in order to keep the real time property of content,
newly joining peers (peers 3, 4 and 5 in Fig. 3) often have to select providing peers (peer 2 in Fig.
3) in different ASes, which leads to increased inter-AS traffic volume.
!"#$%&'()"$*+,%-
.$$%)/
.$$%)0 .$$%)1
.$$%)2
.$$%)3
45$%&'()"$*+,%-
.$$%)/
466
.$$%)0
.$$%)1
.$$%)2
.$$%)3
76)0
76)1
76)3
.$$%)8
.$$%)8
466
76)2
.$$%)9
.$$%)9
Figure 3. Peer selection by MPH
4. PROPOSED PEER SELECTION ALGORITHM
In order to solve the problem of MPH, we propose Improved Minimum Physical Hop (IMPH) as
a novel peer selection algorithm. In IMPH, we try to decrease the inter-AS traffic volume by
distributing top level peers, which are peers with one logical hop count, to as many ASes as
possible. We expect that the distributed top level peer encourages the following peers within the
same AS to select the peers within the same AS as their providing peers. This is because top level
peers and their descendant peers tend to have small logical hop counts and newly joining peers
within the same AS tend to select such the peers as their providing peers in the peer selection
policy of MPH. In addition, in order to encourage top level peers to distribute to many ASes, we
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
40
prevent the top level peers from swarming in ASes with an OSS by forcing a newly joining peer
in ASes with an OSS to select a peer except the OSS as its providing peer.
In IMPH, firstly, in order to prevent peers in ASes with an OSS from occupying the providing
capacity of OSS, a newly joining peer selects the peer with the minimum logical hop count except
the OSS within the same AS. Secondly, if the AS does not have enough providing peers to satisfy
the newly joining peer's request, in order to distribute top level peers to as many ASes as possible,
the newly joining peer selects the OSS with the minimum physical hop count from it as its
providing peer. Thirdly, if the newly joining peer still cannot obtain the enough content data, the
newly joining peer selects its providing peers in the same way as MPH.
The algorithm of IMPH is obtained by replacing step (2) of MPH in Section 3 with the following
steps.
(2-1)! Pnew divides the list into the following three lists; 1) L1: the list of candidates for providing
peers except OSSes in the AS having Pnew, 2) L2: the list of all OSSes, and 3) L3: the list of
all the remaining candidates for providing peers (i.e., the peers that are not in the AS
having Pnew and are not OSSes).
(2-2)! Pnew sorts L1 in ascending order of logical hop counts.
(2-3)! Pnew sorts L2 in ascending order of physical hop counts from it.
(2-4)! Pnew sorts L3 in ascending order of physical hop counts from it. If there are multiple
candidates with the same physical hop counts from it, Pnew sorts them in ascending order of
logical hop counts.
(2-5)! Pnew concatenates L1, L2 and L3 into the single list in this order.
The time complexity of IMPH is analyzed as follows. We denote the number of candidates for
providing peers in the list by n. The time complexity of step (2-1) is O(n) because we classify all
the candidates into one of the three lists one by one. The time complexity of each of steps (2-2) to
(2-4) is O(nlogn) because we sort at most n candidates in each step. Therefore, the run time
complexity for IMPH is O(nlogn).
We explain an example of peer selections by IMPH in Fig. 4. The preconditions in Fig. 4 are the
same as those in Fig. 3.
We first focus on peer selection in AS 4, which does not have the OSS. Peer 3, which is a newly
joining peer, obtains the list of candidates {OSS, 1, 2}. Then peer 3 divides the list into three
lists: L1 = {null}, L2 = {OSS}, and L3 = {1, 2}. Peer 3 next sorts each of the lists as follows: L1 =
{null}, L2 = {OSS}, L3 = {2, 1}. Then, peer 3 concatenates the three lists into the single list:
{OSS, 2, 1}. Finally, peer 3 selects the OSS as its providing peer. Note that peer 3 becomes a top
level peer, consequently a top level peer is successfully distributed to AS 4. Next, peer 4 obtains
the list of candidates {OSS, 1, 2, 3}. Then, peer 4 divides the list into three lists: L1 = {3}, L2 =
{OSS}, and L3 = {1, 2}. Peer 4 sorts each of the lists and concatenates them into the single list: {3,
OSS, 2, 1}. Finally, peer 4 selects peer 3 as its providing peer. Similarly, peer 5 selects peer 3 as
its providing peer. Note that peers 4 and 5 succeed in finding their providing peers within the
same AS and the inter-AS traffic volume is decreased thanks to distributing a top level peer (peer
3 in Fig. 4) to AS 4.
We next focus on peer selection in AS 1, which has the OSS. Peer 6 obtains the list of candidates
and divides the list into three lists: L1 = {1}, L2 = {OSS}, and L3 = {2, 3, 4, 5}. Peer 6 sorts each
of the lists and concatenates them into the single list: {1, OSS, 2, 3, 4, 5}. Finally, peer 6 selects
peer 1 as its providing peer. Similarly, peer 7 selects peer 1 as its providing peer. Note that, in AS
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
41
1, only peer 1 selects the OSS as its providing peer and the providing capacity of the OSS is
saved for distributing top level peers to other ASes.
!"#$%&'()"$*+,%-
.$$%)/
.$$%)0 .$$%)1
.$$%)2
.$$%)3
45$%&'()"$*+,%-
.$$%)/
466
.$$%)0
.$$%)1
.$$%)2
.$$%)3
76)0
76)1
76)3
.$$%)8
.$$%)8
466
76)2
.$$%)9
.$$%)9
Figure 4. Peer selection by IMPH
5. PERFORMANCE EVALUATION
5.1. SIMULATION MODEL
We evaluate the performances of IMPH and MPH with simulations. Tables 1 shows the
parameter settings in the simulations. Note that only the providing rate of peer i changes on a per-
peer basis in one simulation run while other parameter values are fixed throughout one simulation
run. Table 2 shows the AS topology parameters. The topology is made with BRITE [16] and
based on a BA model [17]. The model has a scale-free character, where most of ASes have a few
degrees and a few ASes have many degrees [18].
We evaluate the performance of algorithms by using congestion degree, which means the relative
volume of inter-AS traffic. Congestion degree is defined by the following equation.
C =
!ijhij0!j!k
"0!i!k
"
!ij0!j!k
"0!i!k
"
(3)
where i and j are indexes of peers or OSSes, !ij is the bit-rate of content data from i to j, k is the
number of joining peers and OSSes and hij is the physical hop count from i to j. The denominator
is the total traffic volume and the numerator is the total traffic volume weighted by physical hop
count. Thus, the minimum ideal congestion degree is one.
Table 1. Simulation parameters.
Parameter Value
Streaming rate (A) 1 [Mbps]
Minimum unit (a) of streaming rate 256 [kbps]
Number of OSSs 10
Providing rate of OSS 100 [Mbps]
Deployment of OSSs Random
Upper bound (H) on logical hop counts of providing peers 3, 4, 5
Providing rate of peer i Uniform distribution on
the interval [a, Mmax * a]
Upper bound (Mmax) on the number of the minimum units
that each peer can provide
20, 40
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
42
Table 2. AS topology parameters.
Parameter Value
Number of ASes 500
Diameter of the topology 7 [hops]
Average distances to other ASes 3.73 [hops]
Maximum degree 59
Minimum degree 2
Average degree 3.91
5.2. RESULTS
Figures 5 through 10 depict congestion degrees of IMPH and MPH when the nth peer joins the
system (value n of x-axis corresponds to the generation of the nth peer).
Congestion degrees of both IMPH and MPH sharply decrease when the number of joining peers
is smaller than around 2,000. This is because candidates for providing peers spreads throughout
all the ASes as the number of joining peers increases, consequently the following peers in all the
ASes can find their providing peers within the same ASes.
The congestion degrees of MPH gradually increase when the number of joining peers becomes
larger than a certain value. For example, the congestion degree of MPH begins to increase when
the number of joining peers reaches around 2,000 and 3,000 in Figs. 5 and 7, respectively. This is
because newly joining peers often fail to find their providing peers within the same AS and have
to select the peers in other ASes as their providing peers in ASes without an OSS.
On the other hand, the congestion degrees of IMPH continue decreasing until when more peers
join the system compared to MPH due to succeeding in distributing top level peers to many ASes.
For example, the congestion degree of IMPH keeps decreasing until when the number of joining
peers is around 5,500 and 15,000 in Figs, 5 and 7, respectively.
The congestion degree of IMPH can be higher than that of MPH when the number of joining
peers is smaller than a certain value (e.g., 1,300 in Fig. 5). This is because, at the initial stage of
the system, IMPH causes the inter-AS traffic volume in order to distribute top level peers to all
the ASes while MPH avoid such inter-AS traffic volume by forcing a newly joining peer to
simply select the peer whose physical hop count from it is the minimum as its providing peer.
Except for the aforementioned situation (i.e., the number of joining peers is higher than a certain
value), the congestion degree of IMPH is lower than that of MPH. The congestion degree of
IMPH is at a maximum of 50%, 63%, 56%, 64%, 50% and 63% lower than that of MPH in Figs.
5, 6, 7, 8, 9 and 10, respectively.
It is reported that the number of joining peers is tens of thousands of peers in an actual system [2].
In addition, because inter-AS traffic volume becomes larger as the number of joining peers
increases, it is important to suppress the volume when the number is large. Therefore, we
conclude that IMPH is more suitable than MPH in an actual P2P live streaming environment.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
43
6. CONCLUSION
In this paper, we have proposed IMPH as a novel peer selection algorithm for decreasing inter-AS
traffic volume in P2P live streaming. IMPH tries to reduce the inter-AS traffic volume by
distributing top level peers to as many ASes as possible. We have evaluated the performance of
IMPH with that of MPH by simulation. Numerical examples have shown that 1) IMPH achieves
at a maximum of 64% lower inter-AS traffic volume than MPH when the number of joining peers
is large and 2) IMPH shows higher inter-AS traffic volume than MPH when the number is small.
One of our future work is to propose an overlay reconstruction algorithm in order to cope with the
situation where peers frequently join and leave the system.
1
1.5
2
2.5
3
3.5
0 1000 2000 3000 4000 5000 6000 7000 8000 9000
Congestiondegree
The number of joining peers
IMPH
MPH
Figure 5. Congestion degree (H=3, Mmax = 20)
1
1.5
2
2.5
3
3.5
0 5000 10000 15000 20000 25000 30000
Congestiondegree
The number of joining peers
IMPH
MPH
Figure 6. Congestion degree (H= 3, Mmax = 40)
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
44
1
1.5
2
2.5
3
3.5
0 5000 10000 15000 20000 25000
Congestiondegree
The number of joining peers
IMPH
MPH
Figure 7. Congestion degree (H= 4, Mmax = 20)
1
1.5
2
2.5
3
3.5
0 20000 40000 60000 80000 100000 120000 140000
Congestiondegree
The number of joining peers
IMPH
MPH
Figure 8. Congestion degree (H= 4, Mmax = 40)
1
1.5
2
2.5
3
3.5
0 10000 20000 30000 40000 50000 60000
Congestiondegree
The number of joining peers
IMPH
MPH
Figure 9. Congestion degree (H= 5, Mmax = 20)
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
45
1
1.5
2
2.5
3
3.5
0 100000 200000 300000 400000 500000 600000 700000
Congestiondegree
The number of joining peers
IMPH
MPH
Figure 10. Congestion degree (H= 5, Mmax = 40)
REFERENCES
[1] “PPLive.” http://www.pptv.com/.
[2] “BBbroadcast.” http://bbbroadcast.tv-bank.com/.
[3] “UUSee.” http://www.uusee.com/.
[4] X. Hei, Y. Liu and K. Ross, (2008) “IPTV over P2P streaming networks: the mesh-pull approach”,
IEEE Communications Magazine, Vol. 46, No. 2, pp86-92.
[5] X. Zhang, J. Liu, B. Li and T. P. Yum, (2005) “CoolStreaming/DONet: a data-driven overlay network
for peer-to-peer live media streaming”, 24th Annual Joint Conference of the IEEE Computer and
Communications Societies, Vol. 3, pp2102-2111.
[6] T. Karagiannis, P. Rodriguez and K. Papagiannaki, (2005) “Should internet service providers fear
peer-assisted content distribution?”, The 5th ACM SIGCOMM conference on Internet Measurement.
[7] X. Hei, C. Liang, J. Liang, Y. Liu and K. W. Ross, (2006) “Insights into PPLive: A Measurement
Study of a Large-Scale P2P IPTV System”, IPTV Workshop, International World Wide Web
Conference.
[8] X. Hei, Y. Liu and K. W. Ross, (2007) “Inferring Network-Wide Quality in P2P Live Streaming
Systems”, IEEE Journal on Selected Areas in Communications, Vol. 25, pp1640-1654.
[9] H. Xie, Y. R. Yang, A. Krishnamurthy, Y. G. Liu and A. Silberschatz, (2008) “P4P: Provider Portal
for Applications”, The ACM SIGCOMM 2008 conference on Data communication, Vol. 38.
[10] V. N. Padmanabhan, H. J. Wang, P. A. Chou and K. Sripanidkulchai, (2002) “Distributing Streaming
Media Content Using Cooperative Networking”, The 12th international workshop on Network and
operating systems support for digital audio and video.
[11] K. Sripanidkulchai, A. Ganjam, B. Maggs and H. Zhang, (2004) “The Feasibility of Supporting
Large-Scale Live Streaming Applications with Dynamic Application End-Points”, The 2004
conference on Applications, technologies, architectures, and protocols for computer communications,
Vol. 34.
[12] M. Guo and M. H. Ammar, (2004) “Scalable Live Video Streaming to Cooperative Clients Using
Time Shifting and Video Patching”, The Twenty-third AnnualJoint Conference of the IEEE
Computer and Communications Societies, Vol. 3, pp1501-1511.
[13] D. R. Choffnes and F. E. Bustamante, (2008) “Taming the torrent: a practical approach to reducing
cross-isp traffic in peer-to-peer systems”, The ACM SIGCOMM 2008 conference on Data
communication SIGCOMM, pp363-374.
[14] Y. Fukushima, K. Inada, Y. Tao, Y. Fujiwara and T. Yokohira, (2009) “Performance Evaluation of
AS-friendly Peer Selection Algorithms for P2P Live Streaming”, The 15th Asia-Pacific Conference
on Communications, pp866-870.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016
46
[15] Y. Fukushima and T. Yokohira, (2014) “AS-friendly Peer Selection Algorithms for P2P Live
Streaming”, International Journal of Multimedia Technology, Vol. 4, Iss. 2, pp18-25.
[16] A. Medina, A. Lakhina, I. Matta and J. Byers, (2001) “BRITE: Universal topology generation from a
user's perspective”, Technical Report, Boston University.
[17] A. Barabasi and R. Albert, (2001) “Emergence of Scaling in Random Networks”, Science, Vol. 286,
pp509-512.
[18] B. Zhang, R. Liu, D. Massey and L. Zhang, (2005) “Collecting the Internet AS-level topology”,
Science, Vol. 35, pp53-61.
[19] P. Dhungel, X. Hei, K. W. Ross and N. Saxena, (2009) “Pollution in P2P Live Video Streaming”,
International Journal of Computer Networks & Communications, Vol. 1, No. 2, pp99-110.
[20] M. Z. M. Masoud,(2013) “Analytical Modelling of Localized P2P Streaming Systems under NAT
Consideration”, International Journal of Computer Networks & Communications, Vol. 5, No. 3,
pp73-89.
AUTHORS
Yukinobu Fukushima received his B.E., M.E. and Ph.D. degrees from Osaka University, Japan, in 2001,
2003 and 2006. He is currently an assistant professor of the Graduate School of Natural Science and
Technology, Okayama University. His research interest includes optical networking, P2P live streaming
and cloud computing. He is a member of IEEE, ACM, OSA, and IEICE.
Kazuki Kobayashi received his B.E. and M.E. degrees from Okayama University, Japan, in 2010 and
2012.
Tokumi Yokohira received the B.E., M.E. and Ph.D. degrees in information and computer sciences from
Osaka University, Osaka, Japan, in 1984, 1986 and 1989, respectively. From April 1989 to May 1990, he
was an assistant professor in the Department of Information Technology, Faculty of Engineering, Okayama
University, Okayama, Japan. From May 1990 to December 1994 and from December 1994 to March 2000,
he was a lecturer and an associate professor, respectively, in the same department. From April 2000 to June
2003, he was an associate professor in the Department of Communication Network Engineering of the
same faculty. Since July 2003, he has been a professor in the same department. His present research
interests include performance evaluation and improvement of computer networks and communication
protocols, design algorithm of optical networks and network securities. He is a member of the IEEE
Communication Society, the Institute of Electronics, Information and Communication Engineers and
Information Processing Society of Japan.

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET Journal
 
The Effect of Seeking Operation on QoE of HTTP Adaptive Streaming Services
The Effect of Seeking Operation on QoE of HTTP Adaptive Streaming ServicesThe Effect of Seeking Operation on QoE of HTTP Adaptive Streaming Services
The Effect of Seeking Operation on QoE of HTTP Adaptive Streaming ServicesIJCNCJournal
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysisguest23ccda3
 
Web Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet EnvironmentsWeb Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet Environmentsjins0618
 
Web services and mobile architecture
Web services and mobile architectureWeb services and mobile architecture
Web services and mobile architectureDimple Chandra
 
Basic concept of internet
Basic concept of internetBasic concept of internet
Basic concept of internetSnehal Shahane
 
Measurement and diagnosis of address
Measurement and diagnosis of addressMeasurement and diagnosis of address
Measurement and diagnosis of addressingenioustech
 
DPI-BASED CONGESTION CONTROL METHOD FOR SERVERS AND NETWORK LINES
DPI-BASED CONGESTION CONTROL METHOD FOR SERVERS AND NETWORK LINESDPI-BASED CONGESTION CONTROL METHOD FOR SERVERS AND NETWORK LINES
DPI-BASED CONGESTION CONTROL METHOD FOR SERVERS AND NETWORK LINESIJCNCJournal
 
Efficient Filtering Algorithms for Location- Aware Publish/subscribe
Efficient Filtering Algorithms for Location- Aware Publish/subscribeEfficient Filtering Algorithms for Location- Aware Publish/subscribe
Efficient Filtering Algorithms for Location- Aware Publish/subscribeIJSRD
 
Exploring Peer-To-Peer Data Mining
Exploring Peer-To-Peer Data MiningExploring Peer-To-Peer Data Mining
Exploring Peer-To-Peer Data Miningcsandit
 
HON_NetSci_2016
HON_NetSci_2016HON_NetSci_2016
HON_NetSci_2016Jian Xu
 

Was ist angesagt? (14)

IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
 
Congestion control mechanism using network border protocol
Congestion control mechanism using network border protocolCongestion control mechanism using network border protocol
Congestion control mechanism using network border protocol
 
The Effect of Seeking Operation on QoE of HTTP Adaptive Streaming Services
The Effect of Seeking Operation on QoE of HTTP Adaptive Streaming ServicesThe Effect of Seeking Operation on QoE of HTTP Adaptive Streaming Services
The Effect of Seeking Operation on QoE of HTTP Adaptive Streaming Services
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysis
 
Web Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet EnvironmentsWeb Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet Environments
 
Web services and mobile architecture
Web services and mobile architectureWeb services and mobile architecture
Web services and mobile architecture
 
Basic concept of internet
Basic concept of internetBasic concept of internet
Basic concept of internet
 
Attack tor
Attack torAttack tor
Attack tor
 
Sub1532
Sub1532Sub1532
Sub1532
 
Measurement and diagnosis of address
Measurement and diagnosis of addressMeasurement and diagnosis of address
Measurement and diagnosis of address
 
DPI-BASED CONGESTION CONTROL METHOD FOR SERVERS AND NETWORK LINES
DPI-BASED CONGESTION CONTROL METHOD FOR SERVERS AND NETWORK LINESDPI-BASED CONGESTION CONTROL METHOD FOR SERVERS AND NETWORK LINES
DPI-BASED CONGESTION CONTROL METHOD FOR SERVERS AND NETWORK LINES
 
Efficient Filtering Algorithms for Location- Aware Publish/subscribe
Efficient Filtering Algorithms for Location- Aware Publish/subscribeEfficient Filtering Algorithms for Location- Aware Publish/subscribe
Efficient Filtering Algorithms for Location- Aware Publish/subscribe
 
Exploring Peer-To-Peer Data Mining
Exploring Peer-To-Peer Data MiningExploring Peer-To-Peer Data Mining
Exploring Peer-To-Peer Data Mining
 
HON_NetSci_2016
HON_NetSci_2016HON_NetSci_2016
HON_NetSci_2016
 

Andere mochten auch

GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMGEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMIJCNCJournal
 
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEMLIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEMIJCNCJournal
 
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSOMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSIJCNCJournal
 
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...IJCNCJournal
 
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientIJCNCJournal
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
 
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...IJCNCJournal
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
 
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...IJCNCJournal
 
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...IJCNCJournal
 
A proposal to enhance cellular and wifi
A proposal to enhance cellular and wifiA proposal to enhance cellular and wifi
A proposal to enhance cellular and wifiIJCNCJournal
 
Mobile paymentmethodbased on public key
Mobile paymentmethodbased on public keyMobile paymentmethodbased on public key
Mobile paymentmethodbased on public keyIJCNCJournal
 
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISMSIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISMIJCNCJournal
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach toIJCNCJournal
 
Optimal bandwidth allocation with
Optimal bandwidth allocation withOptimal bandwidth allocation with
Optimal bandwidth allocation withIJCNCJournal
 
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...IJCNCJournal
 

Andere mochten auch (18)

GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMGEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
 
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEMLIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
 
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSOMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
 
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
 
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficient
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
 
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
 
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
 
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
 
A proposal to enhance cellular and wifi
A proposal to enhance cellular and wifiA proposal to enhance cellular and wifi
A proposal to enhance cellular and wifi
 
Mobile paymentmethodbased on public key
Mobile paymentmethodbased on public keyMobile paymentmethodbased on public key
Mobile paymentmethodbased on public key
 
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISMSIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
Optimal bandwidth allocation with
Optimal bandwidth allocation withOptimal bandwidth allocation with
Optimal bandwidth allocation with
 
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
 

Ähnlich wie Performance improvement of

EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS ijp2p
 
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...ijp2p
 
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...ijp2p
 
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERYIMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERYIJCNCJournal
 
A scheme for maximal resource
A scheme for maximal resourceA scheme for maximal resource
A scheme for maximal resourceIJCNCJournal
 
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...ijp2p
 
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...ijp2p
 
A Distributed Approach to Solving Overlay Mismatching Problem
A Distributed Approach to Solving Overlay Mismatching ProblemA Distributed Approach to Solving Overlay Mismatching Problem
A Distributed Approach to Solving Overlay Mismatching ProblemZhenyun Zhuang
 
Itcm a real time internet traffic classifier monitor
Itcm a real time internet traffic classifier monitorItcm a real time internet traffic classifier monitor
Itcm a real time internet traffic classifier monitorijcsit
 
Traffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemTraffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemIOSR Journals
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
 
Traffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuTraffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuMyNOG
 
cost effective resource allocation of overlay routing relay nodes
cost effective resource allocation of overlay routing relay nodescost effective resource allocation of overlay routing relay nodes
cost effective resource allocation of overlay routing relay nodesswathi78
 
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...Danny Alex Lachos Perez
 
An Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing AlgorithmAn Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing Algorithminventionjournals
 
Hybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Hybrid Periodical Flooding in Unstructured Peer-to-Peer NetworksHybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Hybrid Periodical Flooding in Unstructured Peer-to-Peer NetworksZhenyun Zhuang
 
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe SystemOntology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe Systemtheijes
 
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHY
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHYSERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHY
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHYijwscjournal
 
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHY
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHYSERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHY
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHYijwscjournal
 

Ähnlich wie Performance improvement of (20)

EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
 
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
 
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERYIMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
 
A scheme for maximal resource
A scheme for maximal resourceA scheme for maximal resource
A scheme for maximal resource
 
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
 
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
 
A Distributed Approach to Solving Overlay Mismatching Problem
A Distributed Approach to Solving Overlay Mismatching ProblemA Distributed Approach to Solving Overlay Mismatching Problem
A Distributed Approach to Solving Overlay Mismatching Problem
 
Itcm a real time internet traffic classifier monitor
Itcm a real time internet traffic classifier monitorItcm a real time internet traffic classifier monitor
Itcm a real time internet traffic classifier monitor
 
Traffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemTraffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology System
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
Traffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuTraffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie Liu
 
cost effective resource allocation of overlay routing relay nodes
cost effective resource allocation of overlay routing relay nodescost effective resource allocation of overlay routing relay nodes
cost effective resource allocation of overlay routing relay nodes
 
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
 
An Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing AlgorithmAn Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing Algorithm
 
Hybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Hybrid Periodical Flooding in Unstructured Peer-to-Peer NetworksHybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Hybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
 
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe SystemOntology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
 
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHY
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHYSERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHY
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHY
 
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHY
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHYSERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHY
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHY
 

Mehr von IJCNCJournal

High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksIJCNCJournal
 

Mehr von IJCNCJournal (20)

High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
 

Kürzlich hochgeladen

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 

Kürzlich hochgeladen (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 

Performance improvement of

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 DOI : 10.5121/ijcnc.2016.8103 35 PERFORMANCE IMPROVEMENT OF AN AS-FRIENDLY PEER SELECTION ALGORITHM FOR P2P LIVE STREAMING Yukinobu Fukushima, Kazuki Kobayashi and Tokumi Yokohira Graduate School of Natural Science and Technology, Okayama University, Tsushima-naka 3-1-1, Kita-ku, Okayama-city, Okayama, Japan ABSTRACT Minimum Physical Hop (MPH) has been proposed as a peer selection algorithm for decreasing inter-AS (Autonomous System) traffic volume in P2P live streaming. In MPH, a newly joining peer selects a peer whose physical hop count (i.e., the number of ASes traversed on the content delivery path) from it is the minimum as its providing peer. However, MPH shows high inter-AS traffic volume when the number of joining peers is large. In this paper, we propose IMPH that tries to further decrease the inter-AS traffic volume by distributing peers with one logical hop count (i.e., the number of peers or origin streaming servers (OSSes) traversed on the content delivery path from an OSS to the peer) to many ASes and encouraging the following peers to find their providing peers within the same AS. Numerical examples show that IMPH achieves at the maximum of 64% lower inter-AS traffic volume than MPH. KEYWORDS P2P Live Streaming, Peer Selection Algorithm, AS-friendliness 1. INTRODUCTION There has been a big demand for live streaming services over the Internet. As one of the service models, a peer-to-peer (P2P) live streaming system based on a P2P model has been attracting attention [1-5, 19, 20]. The system can mitigate the load of Origin Streaming Servers (OSSes), which provide an original content data, by making user terminals (peers) that have already joined the system provide the content data for other peers in a multihop manner. In P2P live streaming systems, it is important to 1) reduce inter-AS (Autonomous System) traffic volume for restricting transit costs for ASes [6] and 2) keep the real-time property of content for realizing live streaming [7, 8]. Inter-AS traffic volume and the real-time property depend on the topology of the overlay network, which represents logical interconnections among peers. Therefore, to attain better performance in terms of the two measures, we should construct a proper topology of the overlay network. The topology is determined by a peer selecting algorithm, which is performed by a newly joining peer when it selects peers (providing peers) that provides the content data for it. As conventional peer selection algorithms, Minimum-Hop (MH) [9] and Minimum-Depth (MD) [10-12] have already been proposed. MH aims at reducing inter-AS traffic volume. In MH, a newly joining peer selects a peer whose physical hop count from it is as small as possible as its providing peer. The physical hop count between two peers is defined as the number of ASes traversed on the content delivery path between them. On the other hand, MD aims at reducing
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 36 content delivery delay. In MD, a newly joining peer selects a peer whose logical hop count is as small as possible as its providing peer. The logical hop count of a peer is defined as the number of peers or OSSes traversed on the content delivery path from an OSS to the peer. However, MH and MD do not take account of either inter-AS traffic volume or the real-time property of content. A CDN-based peer selection algorithm [13] tries to reduce inter-AS traffic volume by exploiting information available in content distribution networks (CDNs). In the algorithm, a newly joining peer estimates physical proximity to other peers with the help of CDN services, and selects a peer that has the closest proximity as its providing peer. However, this algorithm does not take account of the real-time property of content. In order to reduce inter-AS traffic volume while keeping the real-time property of content, we have already proposed Minimum Physical Hop (MPH) [14, 15] as a peer selection algorithm. MPH aims at reducing both inter-AS traffic volume and content delivery delay by inheriting the peer selection policies from both MH and MD. The peer selection procedures of MPH are as follows. Firstly, to reduce inter-AS traffic volume, a newly joining peer selects a peer with the minimum physical hop count from it as its providing peer. Secondly, if there are several such candidates, to reduce content delivery delay, it selects a peer with the minimum logical hop count among the candidates as its providing peer. In addition, to strictly keep the real-time property of content, MPH sets an upper bound on logical hop count of candidates for providing peers, and a newly joining peer cannot select peers whose logical hop counts reach the upper bound as its providing peer. In previous studies [14, 15], it was reported that, although MPH achieves low inter-AS traffic volume when the number of joining peers is small, it shows high inter-AS traffic volume when the number of joining peers is large. This reason is as follows. When we use MPH, candidates for providing peers with large logical hop counts tend to swarm in ASes without an OSS while those with small logical hop counts do in ASes with an OSS because of the peer selection policy of MPH. As the number of joining peers becomes large, the logical hop counts of the candidates for providing peers in every AS increase. As a result, in the former ASes, the logical hop counts of all the candidates for providing peers reach the upper bound frequently, and the newly joining peer cannot often find its providing peers in the AS, and consequently it has to select its providing peers in different ASes, which results in increased inter-AS traffic volume. In this paper, to solve the problem of MPH, we propose Improved Minimum Physical Hop (IMPH) as a novel peer selection algorithm. One way to solve the problem is to distribute top level peers, which are peers with one logical hop count, to as many ASes as possible. In IMPH, when there are no candidates for providing peers in an AS, a newly joining peer in the AS gives high priority to selecting an OSS instead of the peer with the minimum physical hop count as its providing peer. As a result, it becomes a top level peer, and consequently we expect that the following peers in the AS successfully find its providing peer within the same ASes. In addition, because providing capacity of an OSS is limited, to prevent peers in ASes with an OSS from occupying the capacity, a newly joining peer in the ASes gives high priority to selecting a peer except an OSS within the same AS. The rest of this paper is organized as follows. In Section 2, we describe the P2P live streaming system that we assume. In Section 3, we explain MPH and its problem. In Section 4, we propose IMPH. In Section 5, we show the evaluation results. In Section 6, we conclude our paper.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 37 2. P2P LIVE STREAMING SYSTEM Figure 1 depicts the P2P live streaming system assumed in this paper. The system consists of Origin Streaming Servers (OSSes), a peer control server, and peers. The OSSes produce original content data and provide the content data for peers. The peer control server maintains a list of peers that have already joined the system and provides the list for peers. The peers are the user terminals that have already joined the system, and relay the content data to other peers. Hereafter we call a peer that provides the content data for other peers a providing peer and a peer that receives the content data from other peers a receiving peer. !"" #$$% #$$%&'()*%(+&,$%-$% Figure 1. P2P live streaming system A procedure for a peer to join the system is as follows. When a peer (newly joining peer) joins the system, it requires a list of candidates for providing peers of the peer control server (step 1). After getting the list, the newly joining peer selects providing peers from the list with a peer selection algorithm (step 2). Then, the newly joining peer sends out a delivery request to the selected providing peers (step 3). After receiving the content data from the providing peers, the newly joining peer can begin to view the content (step 4). After joining the system, the newly joining peer needs to receive the streaming rate (A Mbps) of the content data from the providing peers including OSSes in order to continue viewing the content. We assume that the streaming rate can be divided into N minimum units and the rate of a minimum unit is a Mbps. Accordingly, newly joining peers have to satisfy the following equation in order to continue viewing the content. ! " #$% " &#' ( #) ( * #+,$% (1) where Ni is the number of minimum units provided by providing peer i and D is the number of providing peers. While newly joining peers continue receiving the streaming rate of A Mbps, they can become providing peers. The number (M) of minimum units that each providing peer can provide for other peers changes depending on its upload bandwidth. We call the number of minimum units the providing capacity. Providing peers have to satisfy the following equation. !"# $ %!& ' !( ' ) !* ' +,"# (2) where Mj is the number of minimum units provided for receiving peer j, U is the number of receiving peers, and S is the remaining providing capacity.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 38 Figure 2 depicts the network model of our P2P live streaming system. An overlay network represents interconnections among peers. An arrow in the overlay network shows delivery of the content data between the two peers. For example, in Fig. 2, peer 1 receives the content data from the OSS and provides it for peer 4. A physical network represents physical interconnections among ASes. !"#$%&'()"$*+,%- .$$%)/011 .$$%)2 .$$%)3 4,5*)3 .$$%)6 07$%&'()"$*+,%- .$$%)3 011 .$$%)2 .$$%)8 .$$%)9 .$$%)6 :1); :1)/ :1)2 .$$%); .$$%); .$$%)/ .$$%)8 .$$%)9 Figure 2. Overlay and underlay networks 3. CONVENTIONAL PEER SELECTION ALGORITHM We have already proposed Minimum Physical Hop (MPH) [14, 15] as a conventional peer selection algorithm. MPH aims at reducing inter-AS traffic volume and content delivery delay by inheriting peer selection policy from both Minimum-Hop (MH) [9] and Minimum-Depth (MD) [10-12]. In MPH, a newly joining peer determines its providing peers based on physical hop counts and logical hop counts of candidates for providing peers. A physical hop count between two peers is defined as the number of ASes traversed on the content delivery path between them. For example, in Fig. 2, the physical hop count between peer 1 and peer 4 is two. A logical hop count of a peer is defined as the number of peers or OSSes traversed on the content delivery path from an OSS to the peer. For example, in Fig. 2, the logical hop count of peer 1 is one and that of peer 4 is two. In order to keep the real time property of the content, MPH introduces an upper bound (H) on logical hop counts of candidates for providing peers, namely, only the peers whose logical hop counts are smaller than H can become candidates for providing peers. For example, in Fig. 2, if H is set to three, peer 7 cannot become a candidate for a providing peer while the other peers and the OSS can become providing peers. In MPH, in order to reduce inter-AS traffic volume, a newly joining peer selects a peer whose physical hop count from it is as small as possible as its providing peer. If there are multiple such candidates, in order to reduce content delivery delay, it selects the peer whose logical hop is as small as possible as its providing peer. This algorithm is described as follows in detail. 1.! A newly joining peer (Pnew) obtains the list of candidates for its providing peers (i.e., peers with remaining providing bit-rate greater than or equal to a and logical hop counts smaller than H) from the peer control server. 2.! Pnew sorts the list in ascending order of physical hop counts from it. If there are multiple candidates with the same physical hop counts from Pnew, it sorts them in ascending order of logical hop counts.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 39 3.! Pnew selects the candidate one by one from the head of the list until the sum of the remaining providing bit-rate of the selected candidates reaches the streaming rate (A) of the content data. If enough candidates are found, Pnew successfully finishes the algorithm. Otherwise, Pnew fails to join the system and the algorithm is finished. Figure 3 shows an example of peer selection by MPH. Suppose that 1) an OSS and all peers have non-zero providing bit-rate, 2) the upper bound (H) on the number of providing peers is two, and 3) peers 1 and 2 have already joined the system while peers 3, 4, 5, 6 and 7 newly join the system in this order. We first focus on peer selection in AS 4, which does not have the OSS. When peer 3 newly joins the system in AS 4, peer 3 obtains the list of candidates: {OSS, 1, 2}. Then, it sorts the list into {2, OSS, 1} based on the physical hop counts from it and the logical hop counts of the candidates. Finally, peer 3 selects peer 2 as its providing peer. Similarly, peers 4 and 5 in AS 4 select peer 2 as their providing peers. Note that peers 4 and 5 do not select peer 3 as their providing peers because the hop count of peer 3 reaches two (=H) and peer 3 cannot become a providing peer to keep the real time property of content. We next focus on peer selection in AS 1, which has the OSS. When peer 6 newly joins the system in AS 1, peer 6 obtains the list of candidates and sorts it into {OSS, 1, 2}. Finally, peer 6 selects the OSS as its providing peer. In the same way, peer 7 in AS 1 selects the OSS as its providing peer. As shown in the above example, providing peers with small logical hop counts tend to swarm in ASes with an OSS while providing peers with large logical hop counts tend to swarm in ASes without an OSS in MPH. In the latter ASes, in order to keep the real time property of content, newly joining peers (peers 3, 4 and 5 in Fig. 3) often have to select providing peers (peer 2 in Fig. 3) in different ASes, which leads to increased inter-AS traffic volume. !"#$%&'()"$*+,%- .$$%)/ .$$%)0 .$$%)1 .$$%)2 .$$%)3 45$%&'()"$*+,%- .$$%)/ 466 .$$%)0 .$$%)1 .$$%)2 .$$%)3 76)0 76)1 76)3 .$$%)8 .$$%)8 466 76)2 .$$%)9 .$$%)9 Figure 3. Peer selection by MPH 4. PROPOSED PEER SELECTION ALGORITHM In order to solve the problem of MPH, we propose Improved Minimum Physical Hop (IMPH) as a novel peer selection algorithm. In IMPH, we try to decrease the inter-AS traffic volume by distributing top level peers, which are peers with one logical hop count, to as many ASes as possible. We expect that the distributed top level peer encourages the following peers within the same AS to select the peers within the same AS as their providing peers. This is because top level peers and their descendant peers tend to have small logical hop counts and newly joining peers within the same AS tend to select such the peers as their providing peers in the peer selection policy of MPH. In addition, in order to encourage top level peers to distribute to many ASes, we
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 40 prevent the top level peers from swarming in ASes with an OSS by forcing a newly joining peer in ASes with an OSS to select a peer except the OSS as its providing peer. In IMPH, firstly, in order to prevent peers in ASes with an OSS from occupying the providing capacity of OSS, a newly joining peer selects the peer with the minimum logical hop count except the OSS within the same AS. Secondly, if the AS does not have enough providing peers to satisfy the newly joining peer's request, in order to distribute top level peers to as many ASes as possible, the newly joining peer selects the OSS with the minimum physical hop count from it as its providing peer. Thirdly, if the newly joining peer still cannot obtain the enough content data, the newly joining peer selects its providing peers in the same way as MPH. The algorithm of IMPH is obtained by replacing step (2) of MPH in Section 3 with the following steps. (2-1)! Pnew divides the list into the following three lists; 1) L1: the list of candidates for providing peers except OSSes in the AS having Pnew, 2) L2: the list of all OSSes, and 3) L3: the list of all the remaining candidates for providing peers (i.e., the peers that are not in the AS having Pnew and are not OSSes). (2-2)! Pnew sorts L1 in ascending order of logical hop counts. (2-3)! Pnew sorts L2 in ascending order of physical hop counts from it. (2-4)! Pnew sorts L3 in ascending order of physical hop counts from it. If there are multiple candidates with the same physical hop counts from it, Pnew sorts them in ascending order of logical hop counts. (2-5)! Pnew concatenates L1, L2 and L3 into the single list in this order. The time complexity of IMPH is analyzed as follows. We denote the number of candidates for providing peers in the list by n. The time complexity of step (2-1) is O(n) because we classify all the candidates into one of the three lists one by one. The time complexity of each of steps (2-2) to (2-4) is O(nlogn) because we sort at most n candidates in each step. Therefore, the run time complexity for IMPH is O(nlogn). We explain an example of peer selections by IMPH in Fig. 4. The preconditions in Fig. 4 are the same as those in Fig. 3. We first focus on peer selection in AS 4, which does not have the OSS. Peer 3, which is a newly joining peer, obtains the list of candidates {OSS, 1, 2}. Then peer 3 divides the list into three lists: L1 = {null}, L2 = {OSS}, and L3 = {1, 2}. Peer 3 next sorts each of the lists as follows: L1 = {null}, L2 = {OSS}, L3 = {2, 1}. Then, peer 3 concatenates the three lists into the single list: {OSS, 2, 1}. Finally, peer 3 selects the OSS as its providing peer. Note that peer 3 becomes a top level peer, consequently a top level peer is successfully distributed to AS 4. Next, peer 4 obtains the list of candidates {OSS, 1, 2, 3}. Then, peer 4 divides the list into three lists: L1 = {3}, L2 = {OSS}, and L3 = {1, 2}. Peer 4 sorts each of the lists and concatenates them into the single list: {3, OSS, 2, 1}. Finally, peer 4 selects peer 3 as its providing peer. Similarly, peer 5 selects peer 3 as its providing peer. Note that peers 4 and 5 succeed in finding their providing peers within the same AS and the inter-AS traffic volume is decreased thanks to distributing a top level peer (peer 3 in Fig. 4) to AS 4. We next focus on peer selection in AS 1, which has the OSS. Peer 6 obtains the list of candidates and divides the list into three lists: L1 = {1}, L2 = {OSS}, and L3 = {2, 3, 4, 5}. Peer 6 sorts each of the lists and concatenates them into the single list: {1, OSS, 2, 3, 4, 5}. Finally, peer 6 selects peer 1 as its providing peer. Similarly, peer 7 selects peer 1 as its providing peer. Note that, in AS
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 41 1, only peer 1 selects the OSS as its providing peer and the providing capacity of the OSS is saved for distributing top level peers to other ASes. !"#$%&'()"$*+,%- .$$%)/ .$$%)0 .$$%)1 .$$%)2 .$$%)3 45$%&'()"$*+,%- .$$%)/ 466 .$$%)0 .$$%)1 .$$%)2 .$$%)3 76)0 76)1 76)3 .$$%)8 .$$%)8 466 76)2 .$$%)9 .$$%)9 Figure 4. Peer selection by IMPH 5. PERFORMANCE EVALUATION 5.1. SIMULATION MODEL We evaluate the performances of IMPH and MPH with simulations. Tables 1 shows the parameter settings in the simulations. Note that only the providing rate of peer i changes on a per- peer basis in one simulation run while other parameter values are fixed throughout one simulation run. Table 2 shows the AS topology parameters. The topology is made with BRITE [16] and based on a BA model [17]. The model has a scale-free character, where most of ASes have a few degrees and a few ASes have many degrees [18]. We evaluate the performance of algorithms by using congestion degree, which means the relative volume of inter-AS traffic. Congestion degree is defined by the following equation. C = !ijhij0!j!k "0!i!k " !ij0!j!k "0!i!k " (3) where i and j are indexes of peers or OSSes, !ij is the bit-rate of content data from i to j, k is the number of joining peers and OSSes and hij is the physical hop count from i to j. The denominator is the total traffic volume and the numerator is the total traffic volume weighted by physical hop count. Thus, the minimum ideal congestion degree is one. Table 1. Simulation parameters. Parameter Value Streaming rate (A) 1 [Mbps] Minimum unit (a) of streaming rate 256 [kbps] Number of OSSs 10 Providing rate of OSS 100 [Mbps] Deployment of OSSs Random Upper bound (H) on logical hop counts of providing peers 3, 4, 5 Providing rate of peer i Uniform distribution on the interval [a, Mmax * a] Upper bound (Mmax) on the number of the minimum units that each peer can provide 20, 40
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 42 Table 2. AS topology parameters. Parameter Value Number of ASes 500 Diameter of the topology 7 [hops] Average distances to other ASes 3.73 [hops] Maximum degree 59 Minimum degree 2 Average degree 3.91 5.2. RESULTS Figures 5 through 10 depict congestion degrees of IMPH and MPH when the nth peer joins the system (value n of x-axis corresponds to the generation of the nth peer). Congestion degrees of both IMPH and MPH sharply decrease when the number of joining peers is smaller than around 2,000. This is because candidates for providing peers spreads throughout all the ASes as the number of joining peers increases, consequently the following peers in all the ASes can find their providing peers within the same ASes. The congestion degrees of MPH gradually increase when the number of joining peers becomes larger than a certain value. For example, the congestion degree of MPH begins to increase when the number of joining peers reaches around 2,000 and 3,000 in Figs. 5 and 7, respectively. This is because newly joining peers often fail to find their providing peers within the same AS and have to select the peers in other ASes as their providing peers in ASes without an OSS. On the other hand, the congestion degrees of IMPH continue decreasing until when more peers join the system compared to MPH due to succeeding in distributing top level peers to many ASes. For example, the congestion degree of IMPH keeps decreasing until when the number of joining peers is around 5,500 and 15,000 in Figs, 5 and 7, respectively. The congestion degree of IMPH can be higher than that of MPH when the number of joining peers is smaller than a certain value (e.g., 1,300 in Fig. 5). This is because, at the initial stage of the system, IMPH causes the inter-AS traffic volume in order to distribute top level peers to all the ASes while MPH avoid such inter-AS traffic volume by forcing a newly joining peer to simply select the peer whose physical hop count from it is the minimum as its providing peer. Except for the aforementioned situation (i.e., the number of joining peers is higher than a certain value), the congestion degree of IMPH is lower than that of MPH. The congestion degree of IMPH is at a maximum of 50%, 63%, 56%, 64%, 50% and 63% lower than that of MPH in Figs. 5, 6, 7, 8, 9 and 10, respectively. It is reported that the number of joining peers is tens of thousands of peers in an actual system [2]. In addition, because inter-AS traffic volume becomes larger as the number of joining peers increases, it is important to suppress the volume when the number is large. Therefore, we conclude that IMPH is more suitable than MPH in an actual P2P live streaming environment.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 43 6. CONCLUSION In this paper, we have proposed IMPH as a novel peer selection algorithm for decreasing inter-AS traffic volume in P2P live streaming. IMPH tries to reduce the inter-AS traffic volume by distributing top level peers to as many ASes as possible. We have evaluated the performance of IMPH with that of MPH by simulation. Numerical examples have shown that 1) IMPH achieves at a maximum of 64% lower inter-AS traffic volume than MPH when the number of joining peers is large and 2) IMPH shows higher inter-AS traffic volume than MPH when the number is small. One of our future work is to propose an overlay reconstruction algorithm in order to cope with the situation where peers frequently join and leave the system. 1 1.5 2 2.5 3 3.5 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 Congestiondegree The number of joining peers IMPH MPH Figure 5. Congestion degree (H=3, Mmax = 20) 1 1.5 2 2.5 3 3.5 0 5000 10000 15000 20000 25000 30000 Congestiondegree The number of joining peers IMPH MPH Figure 6. Congestion degree (H= 3, Mmax = 40)
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 44 1 1.5 2 2.5 3 3.5 0 5000 10000 15000 20000 25000 Congestiondegree The number of joining peers IMPH MPH Figure 7. Congestion degree (H= 4, Mmax = 20) 1 1.5 2 2.5 3 3.5 0 20000 40000 60000 80000 100000 120000 140000 Congestiondegree The number of joining peers IMPH MPH Figure 8. Congestion degree (H= 4, Mmax = 40) 1 1.5 2 2.5 3 3.5 0 10000 20000 30000 40000 50000 60000 Congestiondegree The number of joining peers IMPH MPH Figure 9. Congestion degree (H= 5, Mmax = 20)
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 45 1 1.5 2 2.5 3 3.5 0 100000 200000 300000 400000 500000 600000 700000 Congestiondegree The number of joining peers IMPH MPH Figure 10. Congestion degree (H= 5, Mmax = 40) REFERENCES [1] “PPLive.” http://www.pptv.com/. [2] “BBbroadcast.” http://bbbroadcast.tv-bank.com/. [3] “UUSee.” http://www.uusee.com/. [4] X. Hei, Y. Liu and K. Ross, (2008) “IPTV over P2P streaming networks: the mesh-pull approach”, IEEE Communications Magazine, Vol. 46, No. 2, pp86-92. [5] X. Zhang, J. Liu, B. Li and T. P. Yum, (2005) “CoolStreaming/DONet: a data-driven overlay network for peer-to-peer live media streaming”, 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 3, pp2102-2111. [6] T. Karagiannis, P. Rodriguez and K. Papagiannaki, (2005) “Should internet service providers fear peer-assisted content distribution?”, The 5th ACM SIGCOMM conference on Internet Measurement. [7] X. Hei, C. Liang, J. Liang, Y. Liu and K. W. Ross, (2006) “Insights into PPLive: A Measurement Study of a Large-Scale P2P IPTV System”, IPTV Workshop, International World Wide Web Conference. [8] X. Hei, Y. Liu and K. W. Ross, (2007) “Inferring Network-Wide Quality in P2P Live Streaming Systems”, IEEE Journal on Selected Areas in Communications, Vol. 25, pp1640-1654. [9] H. Xie, Y. R. Yang, A. Krishnamurthy, Y. G. Liu and A. Silberschatz, (2008) “P4P: Provider Portal for Applications”, The ACM SIGCOMM 2008 conference on Data communication, Vol. 38. [10] V. N. Padmanabhan, H. J. Wang, P. A. Chou and K. Sripanidkulchai, (2002) “Distributing Streaming Media Content Using Cooperative Networking”, The 12th international workshop on Network and operating systems support for digital audio and video. [11] K. Sripanidkulchai, A. Ganjam, B. Maggs and H. Zhang, (2004) “The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points”, The 2004 conference on Applications, technologies, architectures, and protocols for computer communications, Vol. 34. [12] M. Guo and M. H. Ammar, (2004) “Scalable Live Video Streaming to Cooperative Clients Using Time Shifting and Video Patching”, The Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, Vol. 3, pp1501-1511. [13] D. R. Choffnes and F. E. Bustamante, (2008) “Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems”, The ACM SIGCOMM 2008 conference on Data communication SIGCOMM, pp363-374. [14] Y. Fukushima, K. Inada, Y. Tao, Y. Fujiwara and T. Yokohira, (2009) “Performance Evaluation of AS-friendly Peer Selection Algorithms for P2P Live Streaming”, The 15th Asia-Pacific Conference on Communications, pp866-870.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.1, January 2016 46 [15] Y. Fukushima and T. Yokohira, (2014) “AS-friendly Peer Selection Algorithms for P2P Live Streaming”, International Journal of Multimedia Technology, Vol. 4, Iss. 2, pp18-25. [16] A. Medina, A. Lakhina, I. Matta and J. Byers, (2001) “BRITE: Universal topology generation from a user's perspective”, Technical Report, Boston University. [17] A. Barabasi and R. Albert, (2001) “Emergence of Scaling in Random Networks”, Science, Vol. 286, pp509-512. [18] B. Zhang, R. Liu, D. Massey and L. Zhang, (2005) “Collecting the Internet AS-level topology”, Science, Vol. 35, pp53-61. [19] P. Dhungel, X. Hei, K. W. Ross and N. Saxena, (2009) “Pollution in P2P Live Video Streaming”, International Journal of Computer Networks & Communications, Vol. 1, No. 2, pp99-110. [20] M. Z. M. Masoud,(2013) “Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration”, International Journal of Computer Networks & Communications, Vol. 5, No. 3, pp73-89. AUTHORS Yukinobu Fukushima received his B.E., M.E. and Ph.D. degrees from Osaka University, Japan, in 2001, 2003 and 2006. He is currently an assistant professor of the Graduate School of Natural Science and Technology, Okayama University. His research interest includes optical networking, P2P live streaming and cloud computing. He is a member of IEEE, ACM, OSA, and IEICE. Kazuki Kobayashi received his B.E. and M.E. degrees from Okayama University, Japan, in 2010 and 2012. Tokumi Yokohira received the B.E., M.E. and Ph.D. degrees in information and computer sciences from Osaka University, Osaka, Japan, in 1984, 1986 and 1989, respectively. From April 1989 to May 1990, he was an assistant professor in the Department of Information Technology, Faculty of Engineering, Okayama University, Okayama, Japan. From May 1990 to December 1994 and from December 1994 to March 2000, he was a lecturer and an associate professor, respectively, in the same department. From April 2000 to June 2003, he was an associate professor in the Department of Communication Network Engineering of the same faculty. Since July 2003, he has been a professor in the same department. His present research interests include performance evaluation and improvement of computer networks and communication protocols, design algorithm of optical networks and network securities. He is a member of the IEEE Communication Society, the Institute of Electronics, Information and Communication Engineers and Information Processing Society of Japan.