1 / 7

Topics for iWORK 2005(st)

Topics for iWORK 2005(st). 17.01.2005 sandro.grech@hut.fi. Topic #1. Title: ”The rise of peer-to-peer networking: implications to carriers and associated strategies”

iolana
Télécharger la présentation

Topics for iWORK 2005(st)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Topics for iWORK 2005(st) 17.01.2005 sandro.grech@hut.fi

  2. Topic #1 • Title: ”The rise of peer-to-peer networking: implications to carriers and associated strategies” • Background: P2P applications have been responsible for a significant shift in Internet traffic profiles, possibly also contributing to the popularity of broadband connections among consumers. If not managed properly, however, this traffic can choke the connections associated with other applications (including traffic from other subscribers). • Goal: Find out what public information is available regarding the impact of P2P applications on Internet traffic. What conclusions can be drawn from these results? What methods can be used to monitor P2P traffic? How can P2P traffic be identified? Find out and evaluate the different ISP strategies for handling P2P traffic. What products are available in the market? What are their features?

  3. References for topic #1 [1] A. Anttila, “Peer-to-peer and ISPs’ survival strategies“. In Proceedings of the Licentiate Seminar on Networking Technology, HUT Fall 2003. [2] J. Mellin, “Peer-to-Peer Networking - Phenomenon and impacts to carriers”. Presentation at Telecom Forum, Autumn 2004. [3] S. Saroiu et al., “An Analysis of Internet Content Delivery Systems”. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation(OSDI) [4] N. Leibowitz, M. Ripeanu, A. Wierzbicki: “Deconstructing the Kazaa Network”, In Proceedings of the 3rd IEEE Workshop on Internet Applications (WIAPP'03) [5] K. Gummadi et al., “ Measurement, Modeling and Analysis of a Peer-to-Peer File-Sharing Workload”. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP-19)

  4. Topic #2 • Title: ”Evolution of Peer-to-peer algorithms: Baseline, state of the art, and future directions” • Background: P2P computing can be traced back to the early days of the ARPAnet (1960s). It took until the late 1990s until the first mainstream P2P application emerged. Several more followed, and still more are expected to emerge… • Goal: identify and give an overview of the key technological innovations have sustained the success of P2P applications. How have the protocols underlying P2P applications evolved? What are the main variants of P2P protocols in use today? What features (e.g. efficiency, reliability, anonymity, etc…) is the research community still working on? How will these features enable new/improved P2P applications?

  5. References for topic #2 [1] I. Stoica et al., "Chord: A scalable peer-to-peer lookup service for Internet applications", In Proc. ACM SIGCOMM, Aug. 2001. [2] B. Y. Zhao et al., "Tapestry: A resilient global-scale overlay for service deployment", IEEE JSAC, 22(1):41?53, Jan. 2004. [3] B. Yang and H. Garcia-Molina, “Comparing Hybrid Peer-to-Peer Systems”, Stanford University, Technocal Report, 2000. [4] Course material from 582449: Peer-to-Peer Computing (3 cr) from Helsinki University. Available at: http://www.cs.helsinki.fi/u/hhelin/opetus/p2p04/ [5] Sylvia Ratnasamy, Scott Shenker, and Ion Stoica, “Routing algorithms for DHTs: some open questions,”. In proceedings of the IEEE International Workshop on Peer-to-Peer Systems (IPTPS), Cambridge, MA, USA, Mar. 2002.

  6. Topic #3 • Title: ”IP telephony: client-server vs. peer-to-peer approaches” • Background: One interesting application of P2P technology is in the area of IP telephony. P2P telephony does not exhibit the copywrite issues which are associated with earlier P2P applications such as content distribution. • Goal: Compare the client-server (SIP), and peer-to-peer (e.g. Skype) approach for IP telephony. Can IP telephony be pure peer-to-peer? What features need to be centralized? Include an overview of [2] in your analysis. You can also cover aspects related to the open (SIP) vs. proprietary approach (Skype).

  7. References for topic #3 [1] S. A. Baset and H. Schulzrinne, "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol", Columbia University Technical Report CUCS-039-04 [2] K. Singh and H. Schulzrinne, “Peer-to-Peer Internet Telephony using SIP”, Columbia University Technical Report

More Related