The document summarizes a presentation on live streaming over P2PSIP (Peer-to-Peer Session Initiation Protocol). It discusses motivations for peer-to-peer video broadcasting, approaches like tree-based and data-driven architectures, challenges around heterogeneity, and requirements. It then introduces a contribution of a layered P2PSIP architecture with flexible placement of application logic at either the consumer or overlay. An evaluation shows the architecture scales well with signaling load. In conclusions, it is summarized that live video broadcast over P2P is a reality but many challenges remain in protocols, architectures and algorithms to handle issues like churn in real-time systems.
Class lecture by Prof. Raj Jain on Introduction to OpenFlow. The talk covers Planes of Networking, Data vs. Control Logic, OpenFlow: Key Ideas, History of OpenFlow, Separation of Control and Data Plane, OpenFlow V1.0, Matching, Counters, Actions, Hardware OpenFlow Switches, Software OpenFlow Switches, Open vSwitch, Open vSwitch Features, OVSDB, OpenFlow V1.1, OpenFlow Hardware Implementation, OpenFlow V1.2, OpenFlow 1.3, OpenFlow V1.4, Implementation Issues, Current Limitations of OpenFlow, OpenFlow Current Activities, Introduction to OpenFlow, Planes of Networking, Data vs. Control Logic, OpenFlow: Key Ideas, History of OpenFlow, Separation of Control and Data Plane, OpenFlow V1.0, Matching, Counters, Actions, Hardware OpenFlow Switches, Software OpenFlow Switches, Open vSwitch, Open vSwitch Features, OVSDB, OpenFlow V1.1, OpenFlow Hardware Implementation, OpenFlow V1.2, OpenFlow 1.3, OpenFlow V1.4, Implementation Issues, Current Limitations of OpenFlow, OpenFlow Current Activities. Video recording available in YouTube.
Class lecture by Prof. Raj Jain on Introduction to OpenFlow. The talk covers Planes of Networking, Data vs. Control Logic, OpenFlow: Key Ideas, History of OpenFlow, Separation of Control and Data Plane, OpenFlow V1.0, Matching, Counters, Actions, Hardware OpenFlow Switches, Software OpenFlow Switches, Open vSwitch, Open vSwitch Features, OVSDB, OpenFlow V1.1, OpenFlow Hardware Implementation, OpenFlow V1.2, OpenFlow 1.3, OpenFlow V1.4, Implementation Issues, Current Limitations of OpenFlow, OpenFlow Current Activities, Introduction to OpenFlow, Planes of Networking, Data vs. Control Logic, OpenFlow: Key Ideas, History of OpenFlow, Separation of Control and Data Plane, OpenFlow V1.0, Matching, Counters, Actions, Hardware OpenFlow Switches, Software OpenFlow Switches, Open vSwitch, Open vSwitch Features, OVSDB, OpenFlow V1.1, OpenFlow Hardware Implementation, OpenFlow V1.2, OpenFlow 1.3, OpenFlow V1.4, Implementation Issues, Current Limitations of OpenFlow, OpenFlow Current Activities. Video recording available in YouTube.
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasBruno Teixeira
Â
Jason Davis, Distinguished Services Engineer , Cisco Software-Defined Networking (SDN) is an exciting new approach to network IT Service Management. If you are trying to understand what SDN is and want to understand more about Controllers, APIs, Overlays, OpenFlow and ACI, then this introductory session is for you! We will cover the genesis of SDN, what it is, what it is not, and Cisco's involvement in this space. You may also be wondering what products and services are SDN-enabled and how you can solve your unique business challenges by enhancing and differentiating your services by leveraging network programmability. Cisco's SDN-enabled Products and Services will be explained enabling you to consider your own implementations. Since SDN extends network flexibility and functionality which impacts Network Engineering and Operations teams, we'll also cover the IT Service Management impact. Finally, we'll explore what skills and capabilities are needed to take advantage of SDN and Network Programmability. Network engineers, network operation staff, IT Service Managers, IT personnel managers, and application/compute SMEs will benefit from this session.
Software-Defined Networking (SDN): Unleashing the Power of the NetworkRobert Keahey
Â
It goes without saying that cloud computing has dramatically reshaped the information technology services landscape. Virtualization is unleashing the power of commodity-based technology and open source communities are building new applications and services at an astonishing rate, but networking has lagged behind compute and storage in virtualization and automation. Weâve become accustomed to specialized networking silicon, complex operating systems and highly distributed control planes. For the most part, weâve accepted the model along with its high costs.
All that is changing! New protocols such as OpenFlow are freeing the network control plane from proprietary operating systems and hardware platforms. We are entering a new era where customers control the features â and release schedules â of new, open networking applications that address the needs of the mega-scale world.
A lot of work is required to realize the potential of Software-Defined Networking (SDN), where we can enjoy the benefits derived from âsoftware automating software.â This talk will examine some of the history that led us to the point where current networking architectures are no longer viable for cloud computing at mega-scale. Weâll take a look at the basics of SDN and some of its key elements â OpenFlow, network virtualization, and orchestration â along with some of the initiatives and companies that are setting the stage for the next generation of networking.
Presentation at Networkshop46.
Over the past 12 months, Jisc has been through an extensive design and procurement exercise aimed at overhauling the way in which access connectivity solutions are delivered to customers, with the objectives of achieving greater reliability, greater flexibility, and greater value for money.
Hear from the Jisc team involved in the design and procurement of the new access arrangements, and the suppliers Jisc is partnering with to deliver the solutions. They talk about the technology involved, the benefits to Janet connected organisations, and the 5 year deployment and âtransformationâ plan.
Speakers:
Rob Evans, chief network architect, Jisc
James Blessing, deputy director of network architecture, Jisc
Tech 2 tech low latency networking on Janet presentationJisc
Â
This event took place on 27 October 2021.
In this Tech 2 Tech session, we considered questions such as:
- Which types of applications need low latency, and what are their specific requirements for both latency and jitter?
- What levels of latency might you expect across Janet?
- What can you do to optimise latency for your networked applications?
- How can we measure latency and jitter?
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
Â
Sameh Zaghloul
Technology Manager @ IBM
+2 0100 6066012
zaghloul@eg.ibm.com
SDN: Technology that enables data center team to use software to efficiently control network resources
SDN Overview
SDN Standards
NFV â Network Function Virtualization
SDN Scenarios and Use Cases
SDN Sample Research Projects
SDN Technology Survey
SDN Case Study
SDN Online Courses
SDN Lab SW Tools
- OpenStack Framework
- OpenDayLighyt â SDN Controller
- FloodLight â SDN Controller
- Open vSwitch â Virtual Switch
- MiniNet â Virtual Network: OpenFlow Switches, SDN Controllers, and Servers/Hosts
- OMNet++ Network Simulator
- Avior â Sample FloodLight Java Application
- netem - Network Emulation
- NOX/POX - C++/ Python OpenFlow API for building network control applications
- Pyretic = Python + Frenetic - Enables network programmers and operators to write modular network applications by providing powerful abstractions
- Resonance - Event-Driven Control for Software-Defined Networks (written in  Pyretic)
SDN Project
Software Defined Networking (SDN) Technology BriefZivaro Inc
Â
An overview of Software-Defined Networking (SDN) and the key benefits of moving to a virtualized network, including:
- Improved time to market through automation
- Optimal trafficking with a global view of the network
- Quicker enablement of new services
- Reduced operating costs
- Improved management and visibility
- Simplified operation of network devices
From "Introduction to Software Defined Networking" webinar presented by GTRI CTO Scott Hogg on March 10, 2016. Webinar recording: https://youtu.be/gRXnctYDBjE
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasBruno Teixeira
Â
Jason Davis, Distinguished Services Engineer , Cisco Software-Defined Networking (SDN) is an exciting new approach to network IT Service Management. If you are trying to understand what SDN is and want to understand more about Controllers, APIs, Overlays, OpenFlow and ACI, then this introductory session is for you! We will cover the genesis of SDN, what it is, what it is not, and Cisco's involvement in this space. You may also be wondering what products and services are SDN-enabled and how you can solve your unique business challenges by enhancing and differentiating your services by leveraging network programmability. Cisco's SDN-enabled Products and Services will be explained enabling you to consider your own implementations. Since SDN extends network flexibility and functionality which impacts Network Engineering and Operations teams, we'll also cover the IT Service Management impact. Finally, we'll explore what skills and capabilities are needed to take advantage of SDN and Network Programmability. Network engineers, network operation staff, IT Service Managers, IT personnel managers, and application/compute SMEs will benefit from this session.
Software-Defined Networking (SDN): Unleashing the Power of the NetworkRobert Keahey
Â
It goes without saying that cloud computing has dramatically reshaped the information technology services landscape. Virtualization is unleashing the power of commodity-based technology and open source communities are building new applications and services at an astonishing rate, but networking has lagged behind compute and storage in virtualization and automation. Weâve become accustomed to specialized networking silicon, complex operating systems and highly distributed control planes. For the most part, weâve accepted the model along with its high costs.
All that is changing! New protocols such as OpenFlow are freeing the network control plane from proprietary operating systems and hardware platforms. We are entering a new era where customers control the features â and release schedules â of new, open networking applications that address the needs of the mega-scale world.
A lot of work is required to realize the potential of Software-Defined Networking (SDN), where we can enjoy the benefits derived from âsoftware automating software.â This talk will examine some of the history that led us to the point where current networking architectures are no longer viable for cloud computing at mega-scale. Weâll take a look at the basics of SDN and some of its key elements â OpenFlow, network virtualization, and orchestration â along with some of the initiatives and companies that are setting the stage for the next generation of networking.
Presentation at Networkshop46.
Over the past 12 months, Jisc has been through an extensive design and procurement exercise aimed at overhauling the way in which access connectivity solutions are delivered to customers, with the objectives of achieving greater reliability, greater flexibility, and greater value for money.
Hear from the Jisc team involved in the design and procurement of the new access arrangements, and the suppliers Jisc is partnering with to deliver the solutions. They talk about the technology involved, the benefits to Janet connected organisations, and the 5 year deployment and âtransformationâ plan.
Speakers:
Rob Evans, chief network architect, Jisc
James Blessing, deputy director of network architecture, Jisc
Tech 2 tech low latency networking on Janet presentationJisc
Â
This event took place on 27 October 2021.
In this Tech 2 Tech session, we considered questions such as:
- Which types of applications need low latency, and what are their specific requirements for both latency and jitter?
- What levels of latency might you expect across Janet?
- What can you do to optimise latency for your networked applications?
- How can we measure latency and jitter?
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
Â
Sameh Zaghloul
Technology Manager @ IBM
+2 0100 6066012
zaghloul@eg.ibm.com
SDN: Technology that enables data center team to use software to efficiently control network resources
SDN Overview
SDN Standards
NFV â Network Function Virtualization
SDN Scenarios and Use Cases
SDN Sample Research Projects
SDN Technology Survey
SDN Case Study
SDN Online Courses
SDN Lab SW Tools
- OpenStack Framework
- OpenDayLighyt â SDN Controller
- FloodLight â SDN Controller
- Open vSwitch â Virtual Switch
- MiniNet â Virtual Network: OpenFlow Switches, SDN Controllers, and Servers/Hosts
- OMNet++ Network Simulator
- Avior â Sample FloodLight Java Application
- netem - Network Emulation
- NOX/POX - C++/ Python OpenFlow API for building network control applications
- Pyretic = Python + Frenetic - Enables network programmers and operators to write modular network applications by providing powerful abstractions
- Resonance - Event-Driven Control for Software-Defined Networks (written in  Pyretic)
SDN Project
Software Defined Networking (SDN) Technology BriefZivaro Inc
Â
An overview of Software-Defined Networking (SDN) and the key benefits of moving to a virtualized network, including:
- Improved time to market through automation
- Optimal trafficking with a global view of the network
- Quicker enablement of new services
- Reduced operating costs
- Improved management and visibility
- Simplified operation of network devices
From "Introduction to Software Defined Networking" webinar presented by GTRI CTO Scott Hogg on March 10, 2016. Webinar recording: https://youtu.be/gRXnctYDBjE
Green Guerrillas are young people at-risk for criminalization and incarceration who recognize the role mainstream media plays in supporting stereotypes which promote sweat shops over sustainable style, genetically modified crops over locally-grown organic foods, and pollution and prisons over sustainability and social change. Green Guerrillas study documentary and narrative filmmaking, make their own media from posters to movies, do outreach at community events, travel regionally to interact with similarly situated peers, get their âhands dirtyâ learning about renewable energy, and analyze important social, political, economic and environmental issues which affect their lives. As low-income youth of color, Green Guerrillas redefine sustainability in terms that make sense to them. By connecting the dots between the same ideological approaches which criminalize immigrant communities and pollute the air, water, and soil we all collectively need for survival, these young people are non-traditional leaders who are setting a powerful example for an entire community.
This presentation was given at the doctoral days at ENSIAS Morocco. The goal was to show how the innovation process goes and a particular example through what Cisco is doing for the media networks.
Presented by Eran Bello at the "NFV & SDN Summit" held March 2014 in Paris, France
Ideal for Cloud DataCenter, Data Processing Platforms and Network Functions Virtualization
Leading SerDes Technology: High Bandwidth â Advanced Process
10/40/56Gb VPI with PCIe 3.0 Interface
10/40/56Gb High Bandwidth Switch: 36 ports of 10/40/56Gb or 64 ports of 10Gb
RDMA/RoCE technology: Ultra Low Latency Data Transfer
Software Defined Networking: SDN Switch and Control End to End Solution
Cloud Management: OpenStack integration
Paving the way to 100Gb/s Interconnect
End to End Network Interconnect for Compute/Processing and Switching
Software Defined Networking
High Bandwidth, Low Latency and Lower TCO: $/Port/Gb
(Slides) P2P video broadcast based on per-peer transcoding and its evaluatio...Naoki Shibata
Â
Shibata, N., Yasumoto, K., and Mori, M.: P2P Video Broadcast based on Per-Peer Transcoding and its Evaluation on PlanetLab, Proc. of 19th IASTED Int'l. Conf. on Parallel and Distributed Computing and Systems (PDCS2007), (November 2007).
http://ito-lab.naist.jp/themes/pdffiles/071121.shibata.pdcs2007.pdf
Slides for protocol layering and network applicationsjajinekkanti
Â
why and how Protocol layering is done in TCP/IP protocol suite, how multiplexing and demultiplexing can be done in different protocol layers in TCP\IP.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Â
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Â
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
đ Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Â
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
Â
In this second installment of our Essentials of Automations webinar series, weâll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
Weâll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether youâre tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Letâs turn complexity into clarity and make your workspaces work wonders!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Â
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatâs changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Â
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
Â
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Â
International SIP conference 2009
1. January 22, 2009 (Paris, France)
Live Streaming over P2PSIP
International SIP 2009 Conference - 10th edition
Victor Pascual
System Architect
Tekelec
This document is for informational purposes only, and Tekelec reserves the right to change any aspect of the products, features or
functionality described in this document without notice. Please contact Tekelec for additional information and updates. Tekelec. For What's Next.
2. Agenda
âș Motivation
Video broadcast in the Internet?
P2P beyond File Sharing
P2P-based architectural approaches
âą Tree-based
âą Data-driven
How to cope with heterogeneity?
Requirements of P2P live video streaming in the Internet
âș Contribution
Live Streaming over P2PSIP
Layered Architecture
Functional Distributions
âą Consumer does most
âą Overlay does most
Evaluation
âș Conclusions
Summary
Work-in-progress
2 | Tekelec. For What's Next. Tekelec Confidential
4. Video Broadcast in the Internet? (1/2)
4 | Tekelec. For What's Next. Tekelec Confidential
5. Video Broadcast in the Internet? (2/2)
âș Movies and sport are the basis of Pay TV
But you can get it for free in the Internet
âș Video is basic for on-line news and a number of other kinds of
adult entertainment businesses
âș Video as a new channel of expression in Web 2.0
âș Video is the most bandwidth-hungry application
and the basis for today's architectural headaches
âș Life expectancy for non-IP video broadcast?
Who is brave enough to speak up and make a prediction?
5 | Tekelec. For What's Next. Tekelec Confidential
6. P2P Beyond File Sharing
âș To make systems in which the capacity of the system scales up at the same
rate that new users join the system
âș P2P Live and VoD streaming applications are becoming dominant traffic in
some networks
Surpassed that of file sharing in China
Accounting for ~50% P2P traffic
(according to âProblem Statement of Peer to Peer Streaming Protocolâ, PPSP BOF- IETF 73)
âș Most current P2P streaming applications make use of proprietary protocols
But they share the similar architecture (tracker based and with CDN support)
âș Use of standards can benefit to each party in the P2P value chain
P2P streaming service providers
End users and terminal companies
ISP and other network service providers
Network equipment vendors
6 |
7. P2P-based architectural approaches
âș Key idea: Transform users into media relays
Overall capacity increases with the number of users!
âș Two main approaches:
Tree-based
Data-driven
Source: Opportunities and Challenges of Peer-to-Peer Internet Video Broadcast
7 | Tekelec. For What's Next. Tekelec Confidential
8. Tree-based Solutions
âș Push-based
Data automatically forwarded to children
Almost negligible delay in relaying
âș Need a lot of management in the face of churn
Reassign parents
âș Bandwidth is underutilized
Leaves do not contribute to the system
âș Evolution: Multi-trees
Every user is both leaf and node in different trees
8 | Tekelec. For What's Next. Tekelec Confidential
9. Data-driven Solutions
âș No definite structure is maintained
âș Use gossip protocols to distribute data (push-based)
Data spreads like a virus
Resilient against churn
Decentralized
Highly inefficient and redundant use of bandwidth
âș Alternative: Pull-based solutions
Exchange chunk availability with (random) partners
Choose from whom to download (pull-based)
Redundancy is avoided while resilient to churn
High additional delay
9 | Tekelec. For What's Next. Tekelec Confidential
10. Data-Driven: higher algorithmic complexity
âș How to choose from whom to download?
Also in the presence of churn
âș How to choose what to download from each?
Scheduling problem is NP-hard
Avoid holes and meet playback deadlines
âș How to choose to whom to upload/relay?
Uplink capacity is scarce in ADSL
âș How to discover other peers that have the information you
want?
General problem in P2P systems
âș How to (efficiently) interchange data availability?
Delay vs overhead trade-off
10 | Tekelec. For What's Next. Tekelec Confidential
11. How to cope with heterogeneity? (1/2)
âș Overall bandwidth is dynamic and heterogeneous
Due to churn
Due to changing uplink/downlink usage conditions
Due to heterogeneous access technologies
âș For a P2P broadcast system to be sustainable, every node
must upload more than it downloads!
Impossible in ADSL networks
11 | Tekelec. For What's Next. Tekelec Confidential
12. How to cope with heterogeneity? (2/2)
âș Source coding
Divide video in layers, and layers in chunks
Scalable Video Coding (SVC): Each layer adds quality to the basic one
Multiple Descriptive Coding (MDC): Each layer is independent, yet combined
provide higher quality
Drawbacks
âą High information redundancy on every layer
âą Computationally very intensive
âą High management overhead
âą Not widely used yet
âș Network coding
Coding at the peers (Coming from Information Theory)
Not clear how it could help to improve P2P network performance
âș Clever architectures
Use of media reflectors/mirrors
Nodes that provide upload capacity only
With or without operator support
Incentives to users to provide more uploading capacity
Combine trees and meshes to achieve optimum bandwidth usage
12 | Tekelec. For What's Next. Tekelec Confidential
13. Requirements of P2P live video streaming in the Internet
âș Decentralized
Less workload on streaming servers
Better scalability & robustness
âș Large scale
Hundreds of thousands of users
âș Application layer scheme
Flexible and easy to deploy
âș Performance demanding
1,5 Mbps for TV quality
300 kbps â 450 kbps achievable today (asymmetrical upload and download bandwidth)
âș Real-time
Uninterrupted video with limited buffering: timely and continuously streaming delivery
Limited start-up delay and limited latency between the broadcasting time and the audience
view time
âș Gracefully degradable quality to accommodate bandwidth
heterogeneity and dynamics
Different access speeds and churn (also channel zapping)
âș Interoperability
Standards based
âș Others
Firewall and NAT traversal, AAA, Security, Group membership management
13 | Tekelec. For What's Next. Tekelec Confidential
15. Live Streaming over P2PSIP
âș Discover and consume distributed real-time content in a peer-to-peer
live streaming scenario
âș Multicast of content, such as TV shows and telepresence
âș Signaling protocols (Control plane)
âș Report status such as data availability (which peer has which content)
âș Create, modify and terminate video sessions
âș Transmission protocol (User Plane)
âș Exchange data contents (end-to-end video chunks)
SIP
P2PSIP
P2P Live
Streaming
15 | Tekelec. For What's Next. Tekelec Confidential
16. Layered Architecture
âș Overlay (Core) Network formed by Peers
âș End nodes are viewers, sources or relays of the video channel
âș Different functional distributions can be arranged
Consumer does most: endpoint-centric approach
Overlay does most: network-centric approach
Hybrid approach (under study)
16 | Tekelec. For What's Next. Tekelec Confidential
17. Consumer does most
âș The application logic resides at the end nodes themselves
Overlay only keeps information about relaying nodes and channels being emitted
17 | Tekelec. For What's Next. Tekelec Confidential
18. Overlay does most
âș The application logic resides at the overlay
Centralized control of the whole signalling and data interchange
18 | Tekelec. For What's Next. Tekelec Confidential
19. Control Plane (Signaling)
Scheduling Algorithm
SIP SIP
Peer Protocol
Consumer Peer Protocol
does most
Scheduling Algorithm
Peer Protocol Peer Protocol
SIP SIP
Overlay
does most
19 | Tekelec. For What's Next. Tekelec Confidential
21. Evaluation âMessages per Node Per Secondâ under churn
âș Analytical evaluation of the complexity (w.r.t. signaling load)
V.Pascual and C.MaciĂĄn: A layered P2PSIP-based architecture
for live video streaming with flexible application logic placement
(2008- in review process)
Numerical examples for small/large, static/dynamic scenarios
Chord is taken as DHT example for the architecture
âș Good scalability in terms of signalling load involved
21 | Tekelec. For What's Next. Tekelec Confidential
22. Comparison
Consumer does most Overlay does most
âș Main logic of the application âș Overlay directly provides the
resides at the consumer service
âș Consumers must have an âș Centralized control of the
important processing/battery whole signalling and data
capacity interchange
âș Lightly loaded overlay âș Respects the tight battery
âș Overlay only keeps and bandwidth constraints of
information about relaying todayâs mobile devices
nodes and channels being âș Lower Scalability
emitted
22 | Tekelec. For What's Next. Tekelec Confidential
24. Summary
âș Live video broadcast in the Internet is a reality
âș Peer-to-Peer architectures enable
reduced cost on infrastructure
better scalability on large number of users
âș But most current P2P streaming applications make use of proprietary
protocols
âș Highly relevant topic for the future but many challenges remain unsolved
Protocol, architecture and algorithmic issues
Churn together with real-time constraints is the biggest challenge
âș We presented a layered architecture for P2P live video streaming with
flexible application logic placement
Based on industry standards
First estimation of the complexity and signaling load involved in the architecture
shows very promising results, which support our belief that it can grow to very
large sizes without severe penalty
Still a lot of open issues!
24 |
25. Work-in-Progress
âș Simulation
Comparison with results obtained from the analytical analysis
Start-up delay and latency evaluation
âș Prototyping
Local environment and PlanetLab
Measurements
âș Business Model Analysis
Relationship between industry actors: âwhere is the money?â
âș Participation in Standardization efforts
PPSP BOF https://www.ietf.org/mailman/listinfo/ppsp
ALTO WG http://www.ietf.org/html.charters/alto-charter.html
LEDBAT WG http://www.ietf.org/html.charters/ledbat-charter.html
P2PSIP WG http://www.ietf.org/html.charters/p2psip-charter.html
25 | Tekelec. For What's Next. Tekelec Confidential
27. References
âș J.Liu, S.Rao, B.Li and H.Zhang: Opportunities and Challenges
of Peer-to-Peer Internet Video Broadcast (2008)
âș V.Pascual and C.MaciĂĄn: A layered P2PSIP-based
architecture for live video streaming with flexible application
logic placement (2008)
âș V.Pascual et al.: A SIP-based P2P control plane for a P2P
transport plane (2008).
âș V.Pascual et al.: Architecture for a Peer-to-peer Live streaming
Service for High Quality Media (2008)
âș N.Zong and J.Jiang: Survey of P2P Streaming (2008)
âș Y.Zhang, C.Williams, H.Zhang, N.Zong and S.Dawkins:
Problem Statement of Peer to Peer Streaming Protocol (2008)
27 | Tekelec. For What's Next. Tekelec Confidential
28. About Tekelec
âș Tekelec is a high-performance network applications company
that is accelerating the transition to IP Multimedia Subsystem
(IMS) networks for service providers around the globe. With its
experience at the intersection of network applications and
session control, Tekelec creates highly efficient platforms for
managing media and delivering network solutions. Corporate
headquarters are located near Research Triangle Park in
Morrisville, N.C., U.S.A., with research and development
facilities and sales offices throughout the world.
For more information, please visit www.tekelec.com
28 |
29. About the Author
âș V. Pascual Ăvila holds a Bachelor's Degree in Telematics
Engineering, a Master's Degree in Telecommunications Engineering
and a Masterâs Degree in Information, Communication and
Audiovisual Media Technologies from the Universitat Pompeu Fabra
(Barcelona), where he graduated with honors and was awarded by
the Association of Telecommunication Engineers of Catalonia
(COETC).
Victorâs previous experience includes working for Voztelecom as a
Voice over IP (VoIP) engineer and at Universitat Pompeu Fabra as a
research engineer and assistant professor (Telecommunications
Engineering School). He is currently working as a System Architect
with Tekelec (Germany), leader in signaling products for
telecommunications. His professional interests include Internet
Telephony, IP Multimedia Subsystem (IMS) networks, Next
Generation Networks (NGN) and Peer-to-Peer (P2P) Multimedia
Distribution platforms. Victor is active in several IETF working groups
and has co-authored a number of Internet-Drafts.
29 |
30. Contact Information
Victor Pascual
System Architect
Tekelec Germany GmbH
Am Borsigturm 11
D-13507 Berlin
Office: +49 30 32 51 32 12
victor.pascual@tekelec.com
30 | Tekelec. For What's Next. Tekelec Confidential
32. Operation mode (1/2)
âș Overlay setup
âș Nodes registration (and authentication)
âș Channel Publication
âș Retrieve List of Channels
Overlay returns a list of Channels to the consumer
âș Retrieve List of Sources
Overlay returns an initial list of peers that are currently watching the channel to the
consumer (or peer)
âș Source selection
The consumer (or peer) selects some sources to connect and exchange buffer map
information to know where to get which data
âș Buffer Map Exchange
Indicate which chunks a relay currently has buffered and can share. A node can
request a buffer map from any relay in its current list of sources. After a node
receives a buffer map from a relay, the node can request one or more chunks that
the relay has advertised in the buffer map
32 | Tekelec. For What's Next.
33. Operation mode (2/2)
âș Session Scheduling
The node decides which data are requested in which order / priority using scheduling
algorithm and the information obtained in Buffer Map Exchange
âș Session Initiation
The node requests the data from some connected relays (some others are used as a
backup)
Get the video from only a few peers at the same time and switch periodically from
one peer to another
âą Chunk transmission among peers
âą Re-assembling
âą Peer Reporting to Tracker chunks availability
âș Update List of Sources
The node introduces itself into the List of Sources relaying that channel
33 | Tekelec. For What's Next.
34. The Who is Who in Live Streaming over P2PSIP
Consumer does Overlay does most
most Overlay as a B2BUA Overlay as a REFER
issuer
Channel and Source âșSIP Specific Event Notification
Publication/Retrieval
âșP2PSIP Peer Protocol (DHT based)
Channel and Source lists âșP2PSIP Peer Protocol (DHT based)
maintenance
Buffer Map Exchange âșSIP Specific Event Notification
Channel Selection âșUser Input
Source Selection âș(Pseudo) random algorithm
Session Scheduling âș(tuned) OTSp2p algorithm
Session creation, âșSIP âșSIP
modification and
termination
âșSIP REFER method
âșReferring to Multiple
Resources in SIP
Session Description âșSDP Offer/Answer Mechanism to Enable File Transfer
Media Exchange âșRTP
34 |
35. Consumer does most
Consumer Seed Media Relay
Publish âChannel Aâ
âChannel Listâ (A) and âSource Listâ maintenance (A:Seed)
Publish âIâm Relaying Channel Aâ
Startup âSource Listâ maintenance (A:Seed, Media Relay)
Subscribe âChannel Listâ
âChannel Listâ
Channel Selection
Subscribe âSource List for Channel Aâ
âSource List for Channel Aâ
Publish âIâm Relaying Channel Aâ
Source Selection âSource Listâ maintenance (A: Seed, Media Relay, Consumer)
Subscribe âBufferMap Status for Channel Aâ
Subscribe âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
Session Scheduling
Session Initiation
Session Initiation
Data Transfer
Data Transfer
âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
Session Scheduling
Session Update
Session Update
Data Transfer
Data Transfer
35 | ...
36. Overlay does most - Overlay as a REFER issuer
Consumer Seed Media Relay
Publish âChannel Aâ
âChannel Listâ (A) and âSource Listâ maintenance (A:Seed)
Publish âIâm Relaying Channel Aâ
Startup âSource Listâ maintenance (A:Seed, Media Relay)
Subscribe âBufferMap Status for Channel Aâ
Subscribe âChannel Listâ
âChannel Listâ Subscribe âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
Channel Selection âBuffer Map Imageâ maintenance (Seed:A:x-y, Media Relay:A:z-w)
HTTP/SOAP Request
Session Scheduling
REFER (Seed:A:x-y, Media Relay:A:z-w)
Publish âIâm Relaying Channel Aâ
âSource Listâ maintenance (A:Seed, Media Relay, Consumer)
Subscribe âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
âBuffer Map Imageâ maintenance (Seed:A:x-y, Media Relay:A:z-w, Consumer:A:0)
Session Initiation
Session Initiation
Data Transfer
Data Transfer
âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
36 | ...
37. Overlay does most - Overlay as a B2BUA
Consumer Seed Media Relay
Publish âChannel Aâ
âChannel Listâ (A) and âSource Listâ maintenance (A:Seed)
Publish âIâm Relaying Channel Aâ
Startup âSource Listâ maintenance (A:Seed, Media Relay)
Subscribe âBufferMap Status for Channel Aâ
Subscribe âChannel Listâ
âChannel Listâ Subscribe âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
Channel Selection âBuffer Map Imageâ maintenance (Seed:A:x-y, Media Relay:A:z-w)
HTTP/SOAP Request
Session Scheduling
Publish âIâm Relaying Channel Aâ
âSource Listâ maintenance (A:Seed, Media Relay, Consumer)
Subscribe âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
âBuffer Map Imageâ maintenance (Seed:A:x-y, Media Relay:A:z-w, Consumer:A:0)
Session Initiation
Session Initiation
Session Initiation
Data Transfer
Data Transfer
âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
âBufferMap Status for Channel Aâ
37 | ...