Performance Analysis of Peer-to-Peer File Transfer Network Sayantan Mitra Vibhor Goyal 1.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

EE:450 – Computer Networks
Chapter 6 I/O Systems.
Bellwork If you roll a die, what is the probability that you roll a 2 or an odd number? P(2 or odd) 2. Is this an example of mutually exclusive, overlapping,
Slide 1 Insert your own content. Slide 2 Insert your own content.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Reconsidering Reliable Transport Protocol in Heterogeneous Wireless Networks Wang Yang Tsinghua University 1.
REQ Drop from Demand Response Programs Process Flow Retail Customer Demand Response Service Provider (DRSP) Distribution Company 1 Drop Request.
Combining Like Terms. Only combine terms that are exactly the same!! Whats the same mean? –If numbers have a variable, then you can combine only ones.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
0 - 0.
ALGEBRAIC EXPRESSIONS
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
MULTIPLICATION EQUATIONS 1. SOLVE FOR X 3. WHAT EVER YOU DO TO ONE SIDE YOU HAVE TO DO TO THE OTHER 2. DIVIDE BY THE NUMBER IN FRONT OF THE VARIABLE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Teacher Name Class / Subject Date A:B: Write an answer here #1 Write your question Here C:D: Write an answer here.
Addition Facts
CS4026 Formal Models of Computation Running Haskell Programs – power.
BALANCING 2 AIM: To solve equations with variables on both sides.
BALANCING EQUATIONS AIM: Solve equations with variables on both sides.
1 Data Link Protocols By Erik Reeber. 2 Goals Use SPIN to model-check successively more complex protocols Using the protocols in Tannenbaums 3 rd Edition.
1 Reverse a Journal Find an existing journal and reverse it in either: A original period B a different period.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 14 Introduction to Computer Networks.
Photo Composition Study Guide Label each photo with the category that applies to that image.
Streaming Video over the Internet
Peer-to-Peer and Social Networks An overview of Gnutella.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
Report Card P Only 4 files are exported in SAMS, but there are at least 7 tables could be exported in WebSAMS. Report Card P contains 4 functions: Extract,
TCP-FCW – transport protocol for real-time transmissions on high-loss networks Sergei Kozlov,
ABC Technology Project
1 Sizing the Streaming Media Cluster Solution for a Given Workload Lucy Cherkasova and Wenting Tang HPLabs.
O X Click on Number next to person for a question.
© S Haughton more than 3?
25 July, 2014 Martijn v/d Horst, TU/e Computer Science, System Architecture and Networking 1 Martijn v/d Horst
5.9 + = 10 a)3.6 b)4.1 c)5.3 Question 1: Good Answer!! Well Done!! = 10 Question 1:
1 Directed Depth First Search Adjacency Lists A: F G B: A H C: A D D: C F E: C D G F: E: G: : H: B: I: H: F A B C G D E H I.
Twenty Questions Subject: Twenty Questions
Take from Ten First Subtraction Strategy -9 Click on a number below to go directly to that type of subtraction problems
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
This, that, these, those Number your paper from 1-10.
Network Fundamentals – Chapter 4 Sandra Coleman, CCNA, CCAI
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
11 = This is the fact family. You say: 8+3=11 and 3+8=11
Analysis of engineering system by means of graph representation.
Week 1.
We will resume in: 25 Minutes.
1 Ke – Kitchen Elements Newport Ave. – Lot 13 Bethesda, MD.
Network Operations & administration CS 4592 Lecture 15 Instructor: Ibrahim Tariq.
Bottoms Up Factoring. Start with the X-box 3-9 Product Sum
1 Unit 1 Kinematics Chapter 1 Day
O X Click on Number next to person for a question.
Transferring your PST to your Home-Drive. NAVCOMTELSTA-GUAM N8 / LNSC.
One step equations Add Subtract Multiply Divide Addition X + 5 = -9 X = X = X = X = X = 2.
Traversing symmetric NAT with predictable port allocation function SIN 2014 Dušan Klinec, Vashek Matyáš Faculty of Informatics, Masaryk University.
Evaluating scalability Peer-to-Peer File Sharing Networks of Sayantan Mitra Vibhor Goyal.
A Simple Model for Analyzing P2P Streaming Protocols Zhou Yipeng Chiu DahMing John, C.S. Lui The Chinese University of Hong Kong.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Yipeng Zhou, Dah Ming Chiu, and John C.S. Lui Information Engineering Department The Chinese University.
Development of a QoE Model Himadeepa Karlapudi 03/07/03.
Accelerating Peer-to-Peer Networks for Video Streaming
Performance Evaluation of Computer Networks
Performance Evaluation of Computer Networks
Presentation transcript:

Performance Analysis of Peer-to-Peer File Transfer Network Sayantan Mitra Vibhor Goyal 1

Napster Architecture 2Sayantan Mitra & Vibhor Goyal

Your Computer Directory of Files I want file X Y has it! I want file X Here it is Update 3Sayantan Mitra & Vibhor Goyal

Assumptions No Concurrent upload and download of files. No peer leaves the system before completing the file transfer. No physical transfer of files; instead a stream of bytes is transferred. 4Sayantan Mitra & Vibhor Goyal

Scalability Analysis File transfer time. Dropped Packets. Handling of File Requests with simultaneous access demand (Load Balancing). SHA-1 Mismatch. Bandwidth Usage. Latency. 5Sayantan Mitra & Vibhor Goyal

Scalability Analysis File transfer time. Dropped Packets. Handling of File Requests with simultaneous access demand (Load Balancing). SHA-1 Mismatch. Bandwidth Usage. Latency. 6Sayantan Mitra & Vibhor Goyal

Models used in Experiments 7Sayantan Mitra & Vibhor Goyal

Server Peer 1Peer 2Peer 3 8Sayantan Mitra & Vibhor Goyal

Server Peer 1Peer 3Peer 2 9Sayantan Mitra & Vibhor Goyal

Server Peer 2Peer 1Peer 3 10Sayantan Mitra & Vibhor Goyal

Server Peer 3Peer 2Peer 1 Peer 6Peer 5Peer 4 Peer 9Peer 8Peer 7Peer 12Peer 11Peer 10 11Sayantan Mitra & Vibhor Goyal

File transfer time Analysis 12Sayantan Mitra & Vibhor Goyal

Setup – File divided in specified sized chunks. – Sliding window protocol. Variations – File Size. – Sliding Window size. – Packet size. Observations – The variation in transfer time at the sender and receiver end, with change in above said parameters. Regression – Try to find out an equation of regression between the time of transfer with respect to the above mentioned parameters. 13Sayantan Mitra & Vibhor Goyal

Dropped Packets Analysis 14Sayantan Mitra & Vibhor Goyal

Simulating Network behavior. – Random ACK drop. – Network delay in ACK. Parameters – File Size – Packet Size – Window size Observations – Number of packets resent due to lost ACKs and their variations due to change in above said parameters. Regression – Try to find an equation of regression between the number of packets to be resent with that of the mentioned parameters. 15Sayantan Mitra & Vibhor Goyal

To-Do Handling of File Requests with simultaneous access demand (Load Balancing). SHA-1 Mismatch. Bandwidth Usage. Latency. EMULAB. 16Sayantan Mitra & Vibhor Goyal

Questions ??? 17Sayantan Mitra & Vibhor Goyal