Hi Lichun,

Section 9 "Overlay Optimize Example" is an example of optimizing data flow 
trafic if the overlay is constructed and running by carriers. As carriers 
know the the network infrastructure topology( the backbone networks 
infrastructure), they can construct the overlay by domains, and the data 
flow in one domain will not across over backbone networks, that can limit 
the data flow across over backbone networks. Normally, the domains are 
constructed by region.

For the detail usage of content storing by domain based overlay, there are 
many methods. 
For instance, the content provider can distribute the content to each 
domain of the overlay, the resource ID is generated by domain ID(Can be 
identified by carriers or May hash by domain name) plus generic ID( e.g. 
hashed by resource name). Here, the domain ID is the identity of one 
domain, and all the node IDs and resource IDs in one domain are generated 
by domain ID plus IDs constituted by the specific rule and hash algorithm 
. When one CSC(Content Sharing Client) wants to fetch resource, it 
generates the resource ID by same rule such as domain ID plus ID(e.g. 
hashed by resource name) and gets the resource from the peer in same 
domain. 

Thanks.
Jiong
  





lichun li <[email protected]> 
2009-07-13 10:46

收件人
[email protected]
抄送
[email protected]
主题
Re: [P2PSIP] New draft on content sharing usage for RELOAD






Section 9 "Overlay Optimize Example" is interesting. Can you give more
details about the multi-domain overlay architecture? For example,
which content is stored in which domain?

On Wed, Jul 1, 2009 at 9:16 AM, <[email protected]> wrote:
>
> Hi all,
>
> We have submitted a draft on content sharing usage for RELOAD. It 
provides
> the functionality of distributing and fetching shared content 
efficiently to
> and from a P2P overlay network, which performs as Content Delivery 
Network
> and is service insensitive.
>
> The draft can be found at
> 
http://www.ietf.org/internet-drafts/draft-shen-p2psip-content-sharing-00.txt
.
>  Comments are welcome.
>
>
> Thanks,
> Jiong
>
>
> --------------------------------------------------------
> 
ZTE Information Security Notice: The information contained in this mail is 
solely property of the sender's organization. This mail communication is 
confidential. Recipients named above are obligated to maintain secrecy and are 
not permitted to disclose the contents of this communication to others.
> 
This email and any files transmitted with it are confidential and intended 
solely for the use of the individual or entity to whom they are addressed. If 
you have received this email in error please notify the originator of the 
message. Any views expressed in this message are those of the individual sender.
> 
This message has been scanned for viruses and Spam by ZTE Anti-Spam system.
>
> _______________________________________________
> P2PSIP mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/p2psip
>
>



-- 
Sincerely yours,

Lichun Li
Mobile Life New Media Lab, BUPT





--------------------------------------------------------
ZTE Information Security Notice: The information contained in this mail is 
solely property of the sender's organization. This mail communication is 
confidential. Recipients named above are obligated to maintain secrecy and are 
not permitted to disclose the contents of this communication to others.
This email and any files transmitted with it are confidential and intended 
solely for the use of the individual or entity to whom they are addressed. If 
you have received this email in error please notify the originator of the 
message. Any views expressed in this message are those of the individual sender.
This message has been scanned for viruses and Spam by ZTE Anti-Spam system.
_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to