Optimal Content Delivery with Network Coding Derek Leong, Tracey Ho California Institute of Technology Rebecca Cathey BAE Systems CISS 2009 March 19, 2009.

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

Outline LP formulation of minimal cost flow problem
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Optimal redundancy allocation for information technology disaster recovery in the network economy Benjamin B.M. Shao IEEE Transaction on Dependable and.
Chapter 8. Pipelining. Instruction Hazards Overview Whenever the stream of instructions supplied by the instruction fetch unit is interrupted, the pipeline.
PDPTA03, Las Vegas, June S-Chord: Using Symmetry to Improve Lookup Efficiency in Chord Valentin Mesaros 1, Bruno Carton 2, and Peter Van Roy 1 1.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Distributed Storage Allocation Problems Derek Leong, Alexandros G. Dimakis, Tracey Ho California Institute of Technology NetCod
Priority Queuing Achieving Flow ‘Fairness’ in Wireless Networks Thomas Shen Prof. K.C. Wang SURE 2005.
IPSN/SPOTS 2007 Beacon Location Service A Location Service for Point-to-Point Routing in Wireless Sensor Networks EECS Department University of California,
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Carnegie Mellon University Complex queries in distributed publish- subscribe systems Ashwin R. Bharambe, Justin Weisz and Srinivasan Seshan.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Path Protection in MPLS Networks Using Segment Based Approach.
Efficient Sub-stream Encoding and Transmission for P2P Video on Demand 1 Efficient Sub-Stream Encoding and Transmission for P2P Video on Demand Zhengye.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
Wide-area cooperative storage with CFS
Web Caching and CDNs March 3, Content Distribution Motivation –Network path from server to client is slow/congested –Web server is overloaded Web.
Loopback: Exploiting Collaborative Caches for Large-Scale Streaming Ewa Kusmierek, Yingfei Dong, Member, IEEE, and David H. C. Du, Fellow, IEEE.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
EAIT, February 2006 A Pragmatic Approach towards the Improvement of Performance of Ad Hoc Routing ProtocolsOptimizations To Multipath Routing Protocols.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Resilient Peer-to-Peer Streaming Presented by: Yun Teng.
Wireless Sensor Networks COE 499 Energy Aware Routing
Structuring P2P networks for efficient searching Rishi Kant and Abderrahim Laabid Abderrahim Laabid.
ECO-DNS: Expected Consistency Optimization for DNS Chen Stephanos Matsumoto Adrian Perrig © 2013 Stephanos Matsumoto1.
QoS Routing in Networks with Inaccurate Information: Theory and Algorithms Roch A. Guerin and Ariel Orda Presented by: Tiewei Wang Jun Chen July 10, 2000.
Kaleidoscope – Adding Colors to Kademlia Gil Einziger, Roy Friedman, Eyal Kibbar Computer Science, Technion 1.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy Benjamin B.M. Shao IEEE Transaction on Dependable Secure.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
Resource Allocation in Network Virtualization Jie Wu Computer and Information Sciences Temple University.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
1 EL736 Communications Networks II: Design and Algorithms Class4: Network Design Modeling (II) Yong Liu 10/03/2007.
Multicast in Information-Centric Networking March 2012.
Pouya Ostovari and Jie Wu Computer & Information Sciences
Semester 4 - Chapter 3 – WAN Design
Managing the performance of multiple radio Multihop ESS Mesh Networks.
Improving and Generalizing Chord
S-Chord: Using Symmetry to Improve Lookup Efficiency in Chord
Globa Larysa prof, Dr.; Skulysh Mariia, PhD; Sulima Svitlana
CHAPTER 3 Architectures for Distributed Systems
Storage Virtualization
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
DHT Routing Geometries and Chord
Symmetric Allocations for Distributed Storage
Kevin Lee & Adam Piechowicz 10/10/2009
Peer-to-Peer Information Systems Week 6: Performance
Presentation transcript:

Optimal Content Delivery with Network Coding Derek Leong, Tracey Ho California Institute of Technology Rebecca Cathey BAE Systems CISS 2009 March 19, 2009

Motivation

S

S t t t t t t

S t t t t t t

S t t t t t t

S t t t t t t

S t t t t t t How to pick storage nodes? How to route dissemination and fetch flows?

Review: Subgraph Selection

Resultant shared flow must support individual flows Flows must be realizable within capacity Flows through each node must be conserved

Review: Subgraph Selection for CDNs

Storage flow in node memory, occurring over time Network coding allowed Network coding NOT allowed

Review: Subgraph Selection for CDNs

Total dissemination cost Total storage costTotal fetch cost

Review: Subgraph Selection for CDNs Resultant shared flow must support individual flows Flows must be realizable within capacity Flows through each node must be conserved

Review: Subgraph Selection for CDNs

Modified Formulations k-hop Fetch Constraint: Restrict fetch flows to within the k-hop neighborhood of each receiver

Robust Storage Distributed storage can be used to improve robustness of data availability in unreliable networks Intuitively, in a network where nodes or arcs fail probabilistically, the probability of a receiver being able to successfully fetch data increases with the amount of redundant storage and the proximity of storage nodes

Robust Storage Goal: Ensure each receiver can still successfully access content in the event that some nodes or arcs fail during the fetch stage

Robust Storage Exact but prohibitively complex approach: – Consider all possible failure events = { (occurrence prob, set of nodes & arcs that fail)} – Replace each receiver with a set of virtual receivers, one for each failure event affecting it – Allow fetch flows only through the corresponding unaffected nodes & arcs for each virtual receiver – Modify objective function to include fetch cost incurred by each virtual receiver, weighted by their respective probabilities, so that it continues to express the expected total cost

Robust Storage k-hop fetch constraint reduces the number of virtual receivers required – Example: To protect against the failure of up to any m arcs in the network, the number of virtual receivers required per receiver is Without fetch constraint : With 1-hop fetch constraint : – However, the number of virtual receivers still grows exponentially with the number of hops k

Robust Storage To allow flexibility in the number of hops k in the fetch constraint while remaining tractable, we can specify the virtual receivers first, and then compute the resulting minimum fetch success probability This approach enables us to lower-bound the success probability in terms of – number of hops k – probability of node or arc failure p – number of disjoint paths in the k-hop neighborhood of a receiver d for example

Robust Storage Using the following (d+1) virtual receivers for t – v 0 corresponding to the zero-failure event – v i corresponding to the event where only the arcs on paths P j, j ≠ i, are allowed to carry fetch flows for v i We can achieve success probability ≥ Prob[at most one of the d paths fails] =

Other Modified Formulations Potential Storage Nodes: Restrict potential storage nodes to some subset by changing the capacity

Other Modified Formulations Storage Budget Constraint: Impose an aggregate storage budget over all nodes

Other Modified Formulations Fetch Load Constraint: Bound the expected load on nodes and arcs during the fetch stage

Other Modified Formulations Dissemination Stage Receivers: Add node in the dissemination stage to the set of receivers

Other Modified Formulations Delivery of Multiple Content: Introduce separate flows for individual content, allowing network coding during only the dissemination stage and among flows for the same content

Performance Evaluation Compare Network-Coded Formulation (NCF) vs Minimum k-median Formulation (KMF), for the Delivery of Multiple Content (“multiobject placement”) subject to a given storage budget constraint Major difference between NCF and KMF: KMF minimizes only the total fetch cost, but NCF minimizes total fetch + dissemination cost Performance metric: NCF expected total dissemination + fetch cost KMF expected total dissemination + fetch cost =,

Performance Evaluation Compare Network-Coded Formulation (NCF) vs Minimum k-median Formulation (KMF), for the Delivery of Multiple Content (“multiobject placement”) subject to a given storage budget constraint Major difference between NCF and KMF: KMF minimizes only the total fetch cost, but NCF minimizes total fetch + dissemination cost Performance metric: NCF expected total dissemination + fetch cost KMF expected total dissemination + fetch cost =, Unit {dissemination, fetch} cost Expected total number of requests by a receiver over all objects

Performance Evaluation = 0 (“free dissemination”) NCF KMF

Performance Evaluation = 0 (“free dissemination”) Number of objects Storage budget NCF KMF

Performance Evaluation = 0 (“free dissemination”) NCF KMF

Performance Evaluation Number of objects |W| = 1 NCF KMF

Performance Evaluation Number of objects |W| = 1 Storage budget NCF KMF

Performance Evaluation Number of objects |W| = 1 NCF KMF

Performance Evaluation Number of objects |W| = 3 NCF KMF

Performance Evaluation Number of objects |W| = 5 NCF KMF

Performance Evaluation Number of objects |W| = 7 NCF KMF

Implementation Considerations Using a domain name system (DNS) to direct origin servers and end users to the nearest available CDN node Using source routing for the dissemination stage, and a DNS to resolve requests during the fetch stage Opportunistically caching coded data flows during the fetch stage

Augmenting with a P2P Network A hybrid CDN–P2P network achieves better scalability since end users help contribute bandwidth, storage, and computation resources CDN provides a reliable backbone for content delivery, and prevents severe service degradation in the face of high churn rates Specifying dissemination stage receivers when adopting a distributed hash table (DHT) based storage and lookup mechanism

Conclusion & Future Work Presented a unified LP formulation for optimal content delivery in CDNs Simulation results suggest NCF performs significantly better, even under modest circumstances (small network, few objects, low storage budget, low dissemination costs) Look forward to addressing content delivery in dynamic environments (e.g. mobile ad hoc networks)

Optimal Content Delivery with Network Coding Derek Leong, Tracey Ho California Institute of Technology Rebecca Cathey BAE Systems CISS 2009 March 19, 2009