p2p-sippeertopeerinternettelephonyusingsip内容摘要:

uplicates  Security: How to avoid spies?  How to recover if all responsible nodes leave? 28 Conferencing (further study)  One member bees mixer  Centralized conferencing  What if mixer leaves?  Fully distributed  Many to many signaling and media  Application level multicast  Small number of senders 29 Evaluation scalability  messages depends on  Keepalive and finger table refresh rate  Call arrival distribution  User registration refresh interval  Node join, leave, failure rates M={rs+ rf(log(N))2} + (N) + (k/t)log(N) + (log(N))2/N  nodes = f(capacity,rates)  CPU, memory, bandwidth  Verify by measurement and profiling 30 Evaluation reliability and call setup latency  User availability depends on  Supernode failure distribution  Node keepalive and finger refresh rate  User registration refresh rate  Replicate user registration  Measure effect of each  Call setup latency  Same as DHT lookup latency: O(log(N))  Calls to known locations (“buddies”) is direct  DHT optimization can further reduce latency  User availability and retransmission timers  Measure effect of each 31 Explosive growth (further study)  Cache replacement at supernodes  Last seen many days ago  Cap on local disk usage (automatic)  Forcing a node to bee super node  Graceful denial of service if overloaded  Switching between flooding, CAN, Chord, …  . . . 32 More open issues (further study)  Security  Anonymity, encryption,  Attack/DOSresistant, SPAMresistant  Malicious node  Protecting voics from storage nodes  Optimization  Locality, proximity, media routing  Deployment  SIPP2P vs P2PSIP, Intra, ISP servers  Motivation  Why should I run as supernode? 33 Conclusions  P2P useful for VoIP  Scalable, reliable  No configuration  Not as fast as client/server  P2PSIP  Basic operations easy  Implementation  sippeer: C++, Linux  Interoperates  Some potential issues  Security  Performance C C C C C S P P P P P 427 763 135 365 123 324 564 364 65a1fc d13da3 d4213f d462ba d467c4 d471f1 d46a1c Route(d46a1c) Backup slides 35 Napster  Centralized index  File names = active holder machines  Sophisticated search  Easy to implement  Ensure correct search  Centralized index  Lawsuits  Denial of service  Can use server farms P1 P2 P3 P5 P4 S Where is “quit playing games” ? P2 FTP 36 Gnutella  Flooding  Overlay work  Decentralized  Robust  Not scalable.  Use TTL. Query can fail  Can not ensure correctness P P P P P P P P P 37 KaZaA (FastTrack)  Supernodes  Election:  capacity  bandwidth, storage, CPU  and availability  connection time  public address  Use heterogeneity of peers  Inherently nonscalable  If flooding is used P P P P P P P P P P P P 38 FreeNet  File is cached on reverse search path  Anonymity  Replication, cache  Similar keys on same node  Empirical log(N) lookup  TTL limits search  Only probabilistic guarantee  Transaction state  No remove( )  Use cache replacement P P P P P P P 1 12 2 3 4 5 6 7 8 9 10 11 39 Distributed Hash Tables  Types of search  Central index (Napster)  Distributed index with flooding (Gnutella)  Distributed index with hashing (Chord)  Basic operations find(key), insert(key, value), delete(key), no search(*) Properties/types Every peer has plete table Every peer has one key/value Search time or messages O(1) O(n) Join/leave messages O(n) O(1) 40 CAN Content Addressable Network  Each key maps to one point in the ddimensional space  Each node responsib。
阅读剩余 0%
本站所有文章资讯、展示的图片素材等内容均为注册用户上传(部分报媒/平媒内容转载自网络合作媒体),仅供学习参考。 用户通过本站上传、发布的任何内容的知识产权归属用户或原始著作权人所有。如有侵犯您的版权,请联系我们反馈本站将在三个工作日内改正。