INF570 Introduction

Total Page:16

File Type:pdf, Size:1020Kb

INF570 Introduction INF570 Introduction dario.rossi INF570 Dario Rossi v08/2013 http://www.enst.fr/~drossi Agenda • Internet • At a glance • Internet history • Internet architecture • Applications • Terminology • Architectural models • P2P applications • A primer • Outlook on the course • References INF570 Internet dario.rossi Internet • Internet definition ? – Internet en 2001, http://www.caida.org/ Internet http://www.livinginternet.com/i/ia_myths_toast.htm Internet = components • Billions hots – PCs servers, phones, toasters – Equiped wtih communication capabilities • Communication links – Optical fiber, copper, air ,… carying bits and frames • IP routers – Interconnecting host, and routing data • TCP segments – Controlling data exchange and reception for all applications • Application messages – Exchanged among hosts to implement end-user services Internet http://www.livinginternet.com/i/ia_myths_toast.htm Internet = applications + users • Application list always growing – Remote access, file-transfer, e- mail, instant messaging, Web, video and audio streaming, gaming , cloud, social networking IP/TCP • User-base always growing – > 2 billion users (12/2011) ht tp://www.internetworldstats.com/stats.htm Internet Internet = standards • Internet Engineering Task Force (IETF) http://www.ietf.org • IETF Request For Comments (RFC ) – Technical reference documents on the TCP/IP world (HTTP, TCP, IP…) – Initially informal documents, today de facto standards – > 6000 RFCs (09/2012) http://www.ietf.org/download/rfc- index.txt http://javvin.com/map.html • Other application-specific fora – W3C pour WWW, BEP pour BitTorrent … • No documentation: – Proprietary protocols: KaZaa, Skype, etc. Internet Internet = architecture V. Cerf and R. Kahn, “A protocol for • Offering reliable application- packet network intercommunication“ independent end-to-end services IEEE Transactions on Communications , May 1974 • Over point-to-point unrealiable individual channels • Principles : – Minimalism, best-effort, stateless core, decentralized edge control • End-to-end – IP Routing, TCP transport, user application • Point-to-point – IP Forwading, MAC & PHY communication Internet Internet = complex ecosystem ISPs (telcos) content providers services (free/paying) users This viewpoint out of the scope of this course (but see readings) Internet History • 1960s : L. Kleinrock, (Internet size) P. Baran packet-switching • 1969: 1 node • 1970s : ALOHAnet , Ethernet • 1972: 15 nodes ARPAnet • 1983 : TCP/IP • 1979: 200 nodes • 1988 : Congestion control • 1980: 100K nodes • 1990s : Web • 1990: 1M nodes • 2000s : P2P • 2000: 1B nodes • 2010s : cloud, video (YouTube 2 nd search engine), social net (Facebook 4th country) Internet architecture Internet layers Data unit Layer Nb – Example protocol – HTTP, DNS, RIP, Message Application L7 BitTorrent, Skype,etc. Segment Transport L4 – TCP, UDP, SCTP, RTP, etc. Datagram Internet L3 – IP, ICMP, IGMP, OSPF, BGP, etc. Frame HostHost--toto--networknetworkL2 – PPP, HDLC , Ethernet, WiFi, etc. Internet operation mode Network taxonomy Internet Circuit switching Packet switching FDM TDM Virtual circuit Datagram Network IP Transport TCP UDP Circuit switching – Signaling: resource (frequences, temporal slots, etc.) allocated during connection set-up and released at tear-down by all intermediate devices – Switching : based on circuit ID, known to all intermediate equipment, fixed during all transmission – Transmission : data follow same path (i.e., the circuit), no delay – Example : Global System for Mobile (GSM), Public Switched Telephone Network (PSTN), ISDN, SONET/SDH application 6. Receive data application transport 5. Data flow begins transport network 4. Call connected 3. Accept call network data link 1. Initiate call 2. incoming call data link physical physical Packet switching – Datagram mode • Signaling: unnecessary, each packet carries control information • Switching : istantaneous for each packet; intermediate devices unaware of ongoing transmissions (scalability) • Transmission : no performance guarantee – Virtual circuit mode • Per-flow end-to-end signaling to emulate circuit-switching (TCP); just guarantee in-order delivery, no performance guarantees application application transport transport network network 1. Send data 2. Receive data data link data link physical physical Circuit vs packet switching • Circuit switching • Packet switching – Resources allocated to users – No allocation, ever – Signaling necessary for connection – Flexible use of all resources on set-up and teard down a first come, first serve basis – In network-state for all ongoing – Packets may be buffered to conversations wait for their service – No performance guarantees – Guaranteed performance (not even for virtual circuit) – No buffering – Variable delay – Easy planning for simple services – More efficient for varying traffic – Potential resource waste demand (statistical multiplexing) – Scalability problems – Simple, scalable core Internet delay Delay source at each IP hop: – Processing (< µs) - Transmission = P/C ( µs – ms) – Buffering ( µs – s) - Propagation = D/V (1 ms – 0.5s) Variable components Fixed components (for different packets of the same flow) (for all packets of the same flow) Processing Transmission P=packet size C=link capacity D=distance V=transmission speed Buffering Propagation (“Bufferbloat” if very large; see later on) Internet in this course application application application transport transport transport network network network data link data link data link physical physical physical Application : taxonomy today (P2P apps later on) Transport: quick recap on TCP (similar problems later on) Network: quick recap on IP routing (routing at overlay later on) Internet in this course applicationapplication application transport transport transport application network network network transport data link data link data link network physical physical physical data link physical Application: data producer and consumer Transport: when and how much data to send Network: where to send data (short + long timescales) Transport: TCP & UDP • UDP TCP TCP – Datagram, unrealiable, connectionless service SYN – Bitrate and message-size Round flexibility (≤ MTU) Trip -way Time SYN+ACK • TCP (RTT) Three Three handshake handshake – Virtual circuit, connection-oriented ACK + GET with inorder and reliable delivery – Imposed tx speed (next slide) and RTT segment size (preferably =MTU) Data + FIN data User – Initial delay due to connection setup FINACK time Connection tear-down Transport: TCP & UDP TCP • TCP data transfer TCPTCP – A t any tme, the tx speed is w = min(cwnd,rwnd) RTT – Rwnd = receiver window, flow control (avoid tx more than rx can handle) RTT – Cwnd = congestion window, congestion control (avoid tx more than the network RTT can sustain) transfer transfer Data Data • Cwnd dynamic Time – Algorithms: slow-start, congestion avoidance, fast-recovery, fast-retransmit, timeout,etc. cwnd Congestion Packet – Flavors: NewReno, Cubic, Compound avoidance losses – Slow-start (cwnd<sstrhesh): exponential growth, start at 1 segment par RTT, then cwnd++ at each ACK reception Fast-recovery – Congestion avoidance (cwnd>sstrhesh): Slow start linear growth , cwnd+=1/cwnd at each ACK Timeout 1 2 3 … Time (RTT) Network: IP forwarding • At each data packet – Decide the next hop, based on the destination address • Short timescale: istantaneous switching function – At low level implemented as a Forwarding Information Base (FIB) lookup • Longest prefix matching • Ternary Content Addressable Memory (TCAM) Network: IP routing • Periodically – Exchange topological information between IP routers, to build FIB used in fowarding – Taxonomy: • Link state: local information to all nodes (OSPF) • Distance vector: global information to neighbors (RIP, BGP) – Internet: inter-AS + intra-AS routing Link state Distance vector Internet structure • Three-tiered architecure – Tier-3 (local ISPs) Tier-3 – Tier-2 (regional/national Tier-2 ISPs) – Tier -1 ( international ISPs ) Tier -1 • Full mesh between Tier-1 • Interco business model – Network access point – Customer-provider – Peering Internet structure On their end-to-end trip, IP packets traverse (i) multiple AS, and (ii) multiple routers per AS Virtual Tier 3 local ISP local local ISP ISP ISP ISP Tier-2 ISP Tier-2 ISP Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISP local Tier-2 ISP Tier-2 ISP ISP local local local ISP ISP ISP Internet references • Organisations – http://www.isoc.org • Internet Society – http://www.ietf.org • IETF (Internet Engineering Task Force) – http://www.w3c.org • World Wide Web Consortium – http://www.ieee.org • IEEE (Institute of Electrical and Electronics Engineers) – http://www.acm.org • ACM (Association for Computing Machinery) • Optional reading – « A brief history of the Internet », by those who made the history http://www.isoc.org/internet/history/brief.shtml « The Internet Ecosystem », http://www.isoc.org/pubpolpillar/docs/internetmodel.pdf INF570 Internet dario.rossi Applications Agenda • Terminology • Applications & Protocols • Application-centric vs network-centric architectures • Application: Client-server, Content distribution networks, Peer-to-peer • Network: IP Multicast, Content centric networking • Application vs transport layer • Interactions • Interface (socket) • Applications performance • Data vs multimedia (voice, video) • Quality of Service (QoS) vs Quality of Experience (QoE) • Implication on lower-layer choices • References Internet applications User • Ultimate reason why Internet exists application
Recommended publications
  • Congratulations Susan & Joost Ueffing!
    CONGRATULATIONS SUSAN & JOOST UEFFING! The Staff of the CQ would like to congratulate Jaguar CO Susan and STARFLEET Chief of Operations Joost Ueffi ng on their September wedding! 1 2 5 The beautiful ceremony was performed OCT/NOV in Kingsport, Tennessee on September 2004 18th, with many of the couple’s “extended Fleet family” in attendance! Left: The smiling faces of all the STARFLEET members celebrating the Fugate-Ueffi ng wedding. Photo submitted by Wade Olsen. Additional photos on back cover. R4 SUMMIT LIVES IT UP IN LAS VEGAS! Right: Saturday evening banquet highlight — commissioning the USS Gallant NCC 4890. (l-r): Jerry Tien (Chief, STARFLEET Shuttle Ops), Ed Nowlin (R4 RC), Chrissy Killian (Vice Chief, Fleet Ops), Larry Barnes (Gallant CO) and Joe Martin (Gallant XO). Photo submitted by Wendy Fillmore. - Story on p. 3 WHAT IS THE “RODDENBERRY EFFECT”? “Gene Roddenberry’s dream affects different people in different ways, and inspires different thoughts... that’s the Roddenberry Effect, and Eugene Roddenberry, Jr., Gene’s son and co-founder of Roddenberry Productions, wants to capture his father’s spirit — and how it has touched fans around the world — in a book of photographs.” - For more info, read Mark H. Anbinder’s VCS report on p. 7 USPS 017-671 125 125 Table Of Contents............................2 STARFLEET Communiqué After Action Report: R4 Conference..3 Volume I, No. 125 Spies By Night: a SF Novel.............4 A Letter to the Fleet........................4 Published by: Borg Assimilator Media Day..............5 STARFLEET, The International Mystic Realms Fantasy Festival.......6 Star Trek Fan Association, Inc.
    [Show full text]
  • Weekly Wireless Report WEEK ENDING September 4, 2015
    Weekly Wireless Report WEEK ENDING September 4, 2015 INSIDE THIS ISSUE: THIS WEEK’S STORIES This Week’s Stories Ad Blocking In Apple’s iOS 9 Highlights Rift Over Ads With Ad Blocking In Apple’s iOS 9 Highlights Rift Over Ads With App Publishers App Publishers September 4, 2015 More Than 225,000 Apple Apple has warned developers that, in the name of privacy and user preference, it is adding ad-blocking iPhone Accounts Hacked capability in its upcoming release of iOS 9 software, which is expected to arrive with new iPhones as early as Sept. 9. And that’s creating some tension with Google, mobile marketing companies, and PRODUCTS & SERVICES publishers alike. A New App That Lets Users’ If iOS 9 and the ad blockers are widely adopted, it could mean significant disruption to the $70 billion Friends ‘Virtually Walk Them mobile marketing business. More ad blocking means that many users simply won’t see as many ads in Home At Night’ Is Exploding In their games or apps. Publishers, ad networks, and marketing tech companies will get less revenue. Popularity Mobile game companies don’t need to panic now, but they’d better pay attention. Sprint Revises Free Service The battle over the legality of ad-blocking software is still playing out on the Web, where online ads are Deal For DirecTV Customers, a $141 billion business. In May, a German court ruled that ad blocking is not illegal. In mobile, Apple Adds Data Options has added the ability to block ads via a change in its platform that allows third-party companies to create ad-blocking apps.
    [Show full text]
  • Internet Peer-To-Peer File Sharing Policy Effective Date 8T20t2010
    Title: Internet Peer-to-Peer File Sharing Policy Policy Number 2010-002 TopicalArea: Security Document Type Program Policy Pages: 3 Effective Date 8t20t2010 POC for Changes Director, Office of Computing and Information Services (OCIS) Synopsis Establishes a Dalton State College-wide policy regarding copyright infringement. Overview The popularity of Internet peer-to-peer file sharing is often the source of network resource allocation problems and copyright infringement. Purpose This policy will define Internet peer-to-peer file sharing and state the policy of Dalton State College (DSC) on this issue. Scope The scope of this policy includes all DSC computing resources. Policy Internet peer-to-peer file sharing applications are frequently used to distribute copyrighted materials such as music, motion pictures, and computer software. Such exchanges are illegal and are not permifted on Dalton State Gollege computers or network. See the standards outlined in the Appropriate Use Policy. DSG Procedures and Sanctions Failure to comply with the appropriate use of these resources threatens the atmosphere for the sharing of information, the free exchange of ideas, and the secure environment for creating and maintaining information property, and subjects one to discipline. Any user of any DSC system found using lT resources for unethical and/or inappropriate practices has violated this policy and is subject to disciplinary proceedings including suspension of DSC privileges, expulsion from school, termination of employment and/or legal action as may be appropriate. Although all users of DSC's lT resources have an expectation of privacy, their right to privacy may be superseded by DSC's requirement to protect the integrity of its lT resources, the rights of all users and the property of DSC and the State.
    [Show full text]
  • Content Distribution in P2P Systems Manal El Dick, Esther Pacitti
    Content Distribution in P2P Systems Manal El Dick, Esther Pacitti To cite this version: Manal El Dick, Esther Pacitti. Content Distribution in P2P Systems. [Research Report] RR-7138, INRIA. 2009. inria-00439171 HAL Id: inria-00439171 https://hal.inria.fr/inria-00439171 Submitted on 6 Dec 2009 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Content Distribution in P2P Systems Manal El Dick — Esther Pacitti N° 7138 Décembre 2009 Thème COM apport de recherche ISSN 0249-6399 ISRN INRIA/RR--7138--FR+ENG Content Distribution in P2P Systems∗ Manal El Dick y, Esther Pacittiz Th`emeCOM | Syst`emescommunicants Equipe-Projet´ Atlas Rapport de recherche n° 7138 | D´ecembre 2009 | 63 pages Abstract: The report provides a literature review of the state-of-the-art for content distribution. The report's contributions are of threefold. First, it gives more insight into traditional Content Distribution Networks (CDN), their re- quirements and open issues. Second, it discusses Peer-to-Peer (P2P) systems as a cheap and scalable alternative for CDN and extracts their design challenges. Finally, it evaluates the existing P2P systems dedicated for content distribution according to the identified requirements and challenges.
    [Show full text]
  • Downloading of Movies, Television Shows and Other Video Programming, Some of Which Charge a Nominal Or No Fee for Access
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE FISCAL YEAR ENDED DECEMBER 31, 2011 OR ☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE TRANSITION PERIOD FROM TO Commission file number 001-32871 COMCAST CORPORATION (Exact name of registrant as specified in its charter) PENNSYLVANIA 27-0000798 (State or other jurisdiction of (I.R.S. Employer Identification No.) incorporation or organization) One Comcast Center, Philadelphia, PA 19103-2838 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code: (215) 286-1700 SECURITIES REGISTERED PURSUANT TO SECTION 12(b) OF THE ACT: Title of Each Class Name of Each Exchange on which Registered Class A Common Stock, $0.01 par value NASDAQ Global Select Market Class A Special Common Stock, $0.01 par value NASDAQ Global Select Market 2.0% Exchangeable Subordinated Debentures due 2029 New York Stock Exchange 5.50% Notes due 2029 New York Stock Exchange 6.625% Notes due 2056 New York Stock Exchange 7.00% Notes due 2055 New York Stock Exchange 8.375% Guaranteed Notes due 2013 New York Stock Exchange 9.455% Guaranteed Notes due 2022 New York Stock Exchange SECURITIES REGISTERED PURSUANT TO SECTION 12(g) OF THE ACT: NONE Indicate by check mark if the Registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes ☒ No ☐ Indicate by check mark if the Registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act.
    [Show full text]
  • SCENE Tune in to Digital Convergence
    Edition No.22 June 2007 DVB-SCENE Tune in to Digital Convergence Tune 22 The Standard for the Digital World This issue’s highlights > DVB-H & teletext Ahead of > Winning the heart of broadband > DVB-H in Vietnam > HDTV in Asia-Pacific > Analysis: PVRs > DVB-SSU > Market Watch the Game Unique Broadband Systems Ltd. is the world’s leading designer and manufacturer of complete DVB-T/H system solutions for Mobile Media Operators and Broadcasters DVB-H IP Encapsulator DVB-T/H Gateway DVE 6000 DVE 7000 / DVE-R 7000 What makes DVE 6000 the best product on the market today? The DVE 7000 DVB-H Satellite Gateway is the core of highly optimized, efficient and cost effective mobile Dynamic Time SlicingTM Technique delivering DVB-H architecture. A single DVE 7000 device unprecedented bandwidth utilization and processes, distributes and manages global and local network efficiency (Statistical Multiplexing) content grouped in packages to multiple remote SFN & MFN networks through a satellite link and drasti- DVB-SCENE : 02 Internal SI/PSI table editor, parser, compiler and generator (UBS SI/PSI TDL) cally improves satellite link efficiency. The DVE-R 7000 Internal SFN Adapter satellite receiver demultiplexes the content specific to it’s location. Internal stream recorder and player IP DVB-S2 ASI Single compact unit DVE-R 7000 SFN1 DVE 6000 NetManager Application MODULATOR 1 SFN3 SFN2 MODULATOR 3 DVB-T/H Modulator MODULATOR 2 DVM 5000 Fully DVB-H Compliant 30 MHz to 1 GHz RF Output (L-band version available) Web Browser & SNMP Remote Control Available
    [Show full text]
  • Computer Vision with SAS®: Special Collection
    The correct bibliographic citation for this manual is as follows: Kahler, Susan. Computer Vision with SAS®: Special Collection. Cary, NC: SAS Institute Inc. Computer Vision with SAS®: Special Collection Copyright © 2020, SAS Institute Inc., Cary, NC, USA ISBN 978-1-952365-04-1 (Paperback) ISBN 978-1-952365-01-0 (Web PDF) All Rights Reserved. Produced in the United States of America. For a hard-copy book: No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of the publisher, SAS Institute Inc. For a web download or e-book: Your use of this publication shall be governed by the terms established by the vendor at the time you acquire this publication. The scanning, uploading, and distribution of this book via the Internet or any other means without the permission of the publisher is illegal and punishable by law. Please purchase only authorized electronic editions and do not participate in or encourage electronic piracy of copyrighted materials. Your support of others’ rights is appreciated. U.S. Government License Rights; Restricted Rights: The Software and its documentation is commercial computer software developed at private expense and is provided with RESTRICTED RIGHTS to the United States Government. Use, duplication, or disclosure of the Software by the United States Government is subject to the license terms of this Agreement pursuant to, as applicable, FAR 12.212, DFAR 227.7202-1(a), DFAR 227.7202-3(a), and DFAR 227.7202-4, and, to the extent required under U.S.
    [Show full text]
  • Fiafbib2010 Cover
    Affiliates’s publications 2010 Publications des affilés BIBLIOGRAPHY : FIAF AFFILIATES’ PUBLICATIONS 2010 BIBLIOGRAPHIE : PUBLICATIONS DES AFFILIÉS DE LA FIAF 2010 edited by / préparée par Stephanie Boris (Pacific Film Archive, Berkeley) and / et Nancy Goldman (Pacific Film Archive, Berkeley) Fédération internationale des archives du film / International Federation of Film Archives Commission de catalogage et de documentation / Cataloguing and Documentation Commission 2011 INTRODUCTION This bibliography describes the publications produced in 2010 by affiliates of the International Federation of Film Archives (FIAF). Entries for each publication appear under the name of the originating archive, listed alphabetically by the city in which the archive is located. Under each archive, publications are arranged alphabetically by author. Only publications for which the originating archives sent information or copies are cited. A short synopsis in English is given for works where the title is not self-descriptive. Please notify us of any works not included which should have been; we will include them in the next year's edition. The bibliography is indexed by author, title, and subject. Subject headings are taken from the International Index to Film Periodicals Subject Headings compiled by Michael Moulds and Rutger Penne. Each publication is given a citation number, and the numbers cited in the indices correspond to these citation numbers. Names and addresses of archives that collaborated on the bibliography are listed. They should be contacted for copies of their publications. We wish to thank these archives for their assistance in producing this edition and for their help with future editions. ************************** Cette bibliographie décrit les publications produites en 2010 par les affiliés de la Fédération internationale des archives du film (FIAF).
    [Show full text]
  • Miro— Open and Decentralized Internet TV
    INTERNET TV Miro— open and decentralized Internet TV Dean Jansen Participatory Culture Foundation Miro is a free, open-source platform for Internet TV. Ideal for high-definition video, it features an open content guide with over 5,000 channels that can be freely subscribed to. The application boasts nearly 500,000 users and has been downloaded more than three million times in the last year. Miro has been compared to Tivo, Firefox and iTunes; it functions as both a video library and a very intuitive system for subscribing to and watching internet video channels. Additionally, Miro can search and save videos from video-sharing sites, such as YouTube and Daily Motion. For public broadcasters, Miro (http://getmiro.com) offers a distribution platform that is perfect for moving high-quality, long-form video to a large, non-technical audience. The user-friendly integra- tion of BitTorrent in Miro lets publishers leverage the scalability and low cost of P2P distribution without confusing non-technical users. Public broadcasters can create custom versions of Miro that feature their own content and their own brand. Furthermore, Miro is open source and cross-plat- form, leaving broadcasters and their audience independent of any proprietary software (Adobe Flash, Apple iTunes) or operating system (Miro can run on Mac, Windows and Linux). Miro’s user base and content guide are both expanding rapidly. The application itself is on a tight development curve, releasing major updates and improvements five to seven times per year. Miro is being developed by the Participatory Culture Foundation (PCF), a US.based 501c3 non-profit organ- ization.
    [Show full text]
  • What's Behind the Buzzword?
    Peer-to-Peer Systems What’s behind the buzzword? Uwe Schmidt Un-Distinguished Lecture Series 16/02/2007 What is it? • What does Peer-to-Peer (P2P) mean to you? • What does “peer” mean? • Merriam-Webster: one that is of equal standing with another : EQUAL; especially : one belonging to the same societal group especially based on age, grade, or status P2P Principle • Organizational principle, core concepts: • Self-organizing, no central management • Resource sharing, exploits resources at the edge of the network • Peers in P2P are all equal (more or less) • Large number of peers in the network Properties of P2P • Unreliable, uncoordinated, unmanaged • Resilient to attacks, heterogeneous • Large collection of resources When to use it? • Budget • Resource relevance • Trust • Rate of system change • Criticality P2P Vision No More Dedicated Servers, Everything in Internet Served by Peers P2P File-sharing • The most popular application of the P2P principle • Made P2P popular • We will look at the “evolution” of P2P file- sharing in the following... Napster • First P2P file-sharing application (June 1999) • Only MP3 sharing possible • Made the term “P2P” known • Created by Shawn Fanning (nickname “Napster”) How Napster worked • Based on central index server (farm) • User register and give list of files to share • Searching based on keywords • Results: List of files with additional information, e.g. peer’s bandwidth, encoding rate, file size Napster Diagram Server • Peers log in • Send list of files to share • Peer queries server • Server responds •
    [Show full text]
  • One up Teachers Manual 090220
    LECTURE APPROACH Suggestions & notes for educators interested in teaching One Up: Creativity, Competition, and the Global Business of Video Games Prepared by Joost van Dreunen September 2020 © 2020 Joost van Dreunen, [email protected] Page 1 of 13 LECTURE APPROACH Introduction I wrote One Up based on my own teaching experience with the material: each chapter roughly captures a 75-minute lecture. Here I’ve provided an outline on how I generally teach each of the chapters to students, including key concepts and companies case studies. Generally, I organize my time with students as follows: A key component is starting each class with a discussion of 2-3 developments from the prior week. These can vary from major product releases to industry conventions and M&A-related news. This helps students to lean into the discussion right away and often provides great examples to illustrate some of the topics and concepts discussed throughout this course. Following the review of the news, I generally spend 20 minutes setting the stage of a specific part of the industry during a specific period. For instance, in “Games Industry Basics”, we’ll discuss the rise of gaming during the Atari-era and its collapse. This allows to highlight the industry’s underlying economics and set the stage to discuss how Nintendo’s strategy played out during the second part of class. Lastly, the topics have been organized in such a way as to provide a cohesive narrative that starts at the early days of the games industry, gradually leads to contemporary strategy questions, and ultimately presents several forward-looking questions.
    [Show full text]
  • An Analysis and Comparison of CDN-P2P- Hybrid Content Delivery System and Model
    中国科技论文在线 http://www.paper.edu.cn An Analysis and Comparison of CDN-P2P- hybrid Content Delivery System and Model Zhihui Lu School of Computer Science, Fudan Universiy, Shanghai, 200433, China Email: [email protected] Ye Wang and Yang Richard Yang Department of Computer Science, Yale University, New Haven, CT 06511, USA Email: {ye.wang, yang.r.yang}@yale.edu Abstract- In order to fully utilize the stable edge metropolitan area network (WMAN), wireless LAN, transmission capability of CDN and the scalable last-mile wireless personal area network, and so on. At the same transmission capability of P2P, while at the same time time, a variety of wired / wireless terminals are avoiding ISP-unfriendly policies and unlimited usage of emerging, including mobile PC, TV set-top box, 3G P2P delivery, some researches have begun focusing on mobile phone, netbook, iPad and so on. All these CDN-P2P-hybrid architecture and ISP-friendly P2P content delivery technology in recent years. In this paper, different terminals will obtain streaming content and we first survey CDN-P2P-hybrid architecture technology, service through a variety of heterogeneous access including current industry efforts and academic efforts in networks, such as ADSL, the cable network, Wi-Fi, 3G, this field. Second, we make comparisons between CDN and Wimax, et al. and P2P. And then we explore and analyze main issues, Therefore, the question of how to build a number of including overlay route hybrid issues, and playing buffer low-cost expandable, controllable and manageable, fast hybrid issues. After that we focus on CDN-P2P-hybrid and efficient, safe and reliable content service networks model analysis and design, we compare the tightly- on top of the Internet IP layer, is a key issue.
    [Show full text]