BF-based chunk availability compression for PPSP-02 Lingli Deng: Jin Peng:

Slides:



Advertisements
Similar presentations
T.Sharon-A.Frank 1 Multimedia Compression Basics.
Advertisements

A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
Parallel Sorting Sathish Vadhiyar. Sorting  Sorting n keys over p processors  Sort and move the keys to the appropriate processor so that every key.
The BitTorrent Protocol
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
No Class on Friday There will be NO class on: FRIDAY 1/30/15.
Recursive End-to-end Distortion Estimation with Model-based Cross-correlation Approximation Hua Yang, Kenneth Rose Signal Compression Lab University of.
1 A Framework for Lazy Replication in P2P VoD Bin Cheng 1, Lex Stein 2, Hai Jin 1, Zheng Zhang 2 1 Huazhong University of Science & Technology (HUST) 2.
A Data Compression Algorithm: Huffman Compression
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
1 Outline File Systems Implementation How disks work How to organize data (files) on disks Data structures Placement of files on disk.
1 Incentives Build Robustness in BitTorrent? Analysis on Bit Torrent Client performance By Jimmy Wong.
BITMAP INDEXES Parin Shah (Id :- 207). Introduction A bitmap index is a special kind of index that stores the bulk of its data as bit arrays (commonly.
Organizing files for performance Chapter Data compression Advantages of reduced file size Redundancy reduction: state code example Repeating sequences:
1Bloom Filters Lookup questions: Does item “ x ” exist in a set or multiset? Data set may be very big or expensive to access. Filter lookup questions with.
1 The Mystery of Cooperative Web Caching 2 b b Web caching : is a process implemented by a caching proxy to improve the efficiency of the web. It reduces.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Inexpensive Scalable Information Access Many Internet applications need to access data for millions of concurrent users Relational DBMS technology cannot.
6LoWPAN-SNMP: Simple Network Management Protocol for 6LoWPAN
Sarang Dharmapurikar With contributions from : Praveen Krishnamurthy,
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 Tracker Protocol Proposal.
PPSP Tracker Protocol draft-gu-ppsp-tracker-protocol PPSP WG IETF 82 Taipei Rui Cruz (presenter) Mário Nunes, Yingjie Gu, Jinwei Xia, David Bryan, João.
July, 2001 High-dimensional indexing techniques Kesheng John Wu Ekow Otoo Arie Shoshani.
Securing Data Authentication with Cryptographic Signatures in BitTorrent Du Wei cc.hut.fi / Supervisor : Professor Jukka Manner Instructor.
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Web Prefetching Between Low-Bandwidth Clients and Proxies : Potential and Performance Li Fan, Pei Cao and Wei Lin Quinn Jacobson (University of Wisconsin-Madsion)
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 PPSP Protocol Considerations.
EICP—extended Internet Cache Protocol (draft-zhang-ppsp-eicp-00.txt ) Presenter: Christian Schmidt IETF-81, Quebec, July 2011.
BF-based chunk availability compression for PPSP Lingli Deng: Jin Peng:
HPDC 2014 Supporting Correlation Analysis on Scientific Datasets in Parallel and Distributed Settings Yu Su*, Gagan Agrawal*, Jonathan Woodring # Ayan.
HUAWEI TECHNOLOGIES CO., LTD. Page 1 Survey of P2P Streaming HUAWEI TECHNOLOGIES CO., LTD. Ning Zong, Johnson Jiang.
Author: Abhishek Das Google Inc., USA Ankit Jain Google Inc., USA Presented By: Anamika Mukherji 13/26/2013Indexing The World Wide Web.
Dr. Yingwu Zhu Summary Cache : A Scalable Wide- Area Web Cache Sharing Protocol.
1 Address Translation Memory Allocation –Linked lists –Bit maps Options for managing memory –Base and Bound –Segmentation –Paging Paged page tables Inverted.
Problem Statement of Peer to Peer Streaming Protocol (PPSP) Yunfei Zhang Ning Zong Gonzalo Camarillo David Byran Hirold Liu Yingjie Gu.
September, 2002 Efficient Bitmap Indexes for Very Large Datasets John Wu Ekow Otoo Arie Shoshani Lawrence Berkeley National Laboratory.
HPDC 2013 Taming Massive Distributed Datasets: Data Sampling Using Bitmap Indices Yu Su*, Gagan Agrawal*, Jonathan Woodring # Kary Myers #, Joanne Wendelberger.
P2P Streaming Protocol (PPSP) Requirements draft-zong-ppsp-reqs-03.
Spatial Issues in DBGlobe Dieter Pfoser. Location Parameter in Services Entering the harbor (x,y position)… …triggers information request.
P2P Streaming Protocol (PPSP) Requirements Ning Zong Yunfei Zhang Victor Pascual Carl Williams Lin Xiao draft-ietf-ppsp-reqs-02.
BITMAP INDEXES Sai Priya Rama Gopal SJSU ID : Class ID: 125.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
CS654: Digital Image Analysis Lecture 34: Different Coding Techniques.
PPSP BAR BOF meeting 74th IETF – San Francisco, CA, USA March, 2009 P2P Streaming Protocol (PPSP) Requirements Ning Zong,Huawei Technologies Yunfei Zhang,China.
March, 2002 Efficient Bitmap Indexing Techniques for Very Large Datasets Kesheng John Wu Ekow Otoo Arie Shoshani.
Efficient Processing of Updates in Dynamic XML Data Changqing Li, Tok Wang Ling, Min Hu.
PEAR TO PEAR PROTOCOL. Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change.
PPSP Tracker Protocol – Extended Protocol draft-huang-ppsp-extended-tracker-protocol- 06 PPSP WG IETF 90 Toronto Rachel Huang, Rui Cruz, Mário Nunes, João.
Introduction of PPSP Yunfei 88 Nov 3, 2013.
P2P Streaming Protocol (PPSP) Requirements draft-zong-ppsp-reqs-02 Ning Zong Yunfei Zhang Victor Pascual Carl Williams.
Copyright © 2010 The HDF Group. All Rights Reserved1 Data Storage and I/O in HDF5.
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PPSP Tracker Protocol – Extended Protocol draft-huang-ppsp-extended-tracker-protocol- 07 PPSP WG IETF 91 Hawaii Rachel Huang, Rui Cruz, Mário Nunes, João.
Ahoy: A Proximity-Based Discovery Protocol Robbert Haarman.
BITMAP INDEXES Barot Rushin (Id :- 108).
Linear Time Suffix Array Construction Using D-Critical Substrings
Module 11: File Structure
Kevin Piper, David Perry, Tom Hoffman, Emely Pagan
Header Compression Date: Authors: May 2012 Month Year
Degree-aware Hybrid Graph Traversal on FPGA-HMC Platform
Problem Statement of PPSP
Small Is Not Always Beautiful
Packet Classification Using Coarse-Grained Tuple Spaces
Prof. Paolo Ferragina, Algoritmi per "Information Retrieval"
Hash Functions for Network Applications (II)
Lecture 1: Bloom Filters
Lin Xiao David A. Bryan Yingjie Gu Xuan Tai
Presentation transcript:

BF-based chunk availability compression for PPSP-02 Lingli Deng: Jin Peng: Yunfei Zhang: IETF

Outline Motivation Background Analysis Proposal Discussion Example

Motivation There are frequent bitmap exchanges in PPSP. – Uncompressed bitmap is relatively big (of several KBs). – They are exchanged frequently (less than several seconds). – It sets a limit to the system's efficiency and scalability There are efficiency requirements in PPSP PS – PPSP.TP.REQ-3: The tracker protocol MUST take the frequency of messages and efficient use of bandwidth into consideration, when communicating chunk availability information. – PPSP.PP.REQ-7: The peer protocol MUST take the frequency of messages and efficient use of bandwidth into consideration, when communicating chunk information.

Background Original bitmap Scheme uses a bit-array to represent the chunk set, and mark those bits corresponding to the locally available chunks. Con: Its length grows as the number of chunks (n) increases. Chunk range scheme uses a array of starting+ending chunk index pairs to represent continuous intervals. Byte range scheme uses an array of starting+ending byte index pairs to represent continuous intervals. Bin number scheme uses a universally assigned bin number (integer) for any given continuous interval. Scheme typeOrig-bitmapChunk rangeByte-rangeBin number Bit lengthn2klogn2kmlognklogn Variables: n - # of chunks; k - # of intervals; m - # of bytes per chunk.

A Further Look into Processing/Storage ??? Scheme type Orig-bitmapChunk rangeByte-rangeBin number Bit lengthn2klogn2kmlognklogn Formationnnnnlogn Single Inquiry 12klogn2kmlognlogn Group Inquiry(g) g2klogn2kmlognglogn Partial Update(p) p2klogn2kmlognTlogn Delta bit len(d) n2d dlogn Variables: n - # of chunks; k - # of intervals; m - # of bytes per chunk. g - # of chunks in a compacted inquiry; p/d - # of chunks in a partial chunk bitmap update.

Proposal: BF compression Scheme Figure 2 Bloom Filters: an example. Figure 1 Basic algorithms for BF-bitmaps. Example: a 2GB movie file, divided into 2MB chunks, whose a 1024-bit original chunk bitmap, can be represented by a 128-bit BF-bitmap (using 4 hashes), with only 3% mis-hits rate. High Efficiency Storage/transmission: Bit length: constant. Processing: Formation/Inquiry/Update: constant. Endurable Lose of accuracy Be controlled by the system configuration of the bit array’s length, choice and # of hash functions.

Suggestions for Discussion RECOMMENDED for PPSP-TP-base/extended – Strictly controllable cost for a central entity constant bit-length irrelevant of the chunk-set only replacement or simple bitwise operations needed – Certain mis-hits rate COULD be tolerable Tracker serves as an initial broker for neighboring peers OPTIONAL for PPSPP – Peers willing to trade accuracy with cost-efficiency Peers with limited computation/memory resources Peers with huge number of concurrent links, e.g. SNs – Certain mis-hits rate MAY be tolerable REQUEST and DATA SHOULD use the original chunk id.

Example: PPSP with BF-bitmaps

THANK YOU!