A Scalable and Robust QoS Architecture for WiFi P2P Networks

Size: px
Start display at page:

Download "A Scalable and Robust QoS Architecture for WiFi P2P Networks"

Transcription

1 A Scalable and Robust QoS Architecture for WiFi P2P Networks Sathish Rajasekhar, Ibrahim Khalil, and Zahir Tari School of Computer Science and Information Technology, RMIT University, Melbourne (sathish, ibrahimk, zahirt)@cs.rmit.edu.au Abstract. Peer-to-Peer (P2P) resource sharing between mobile devices in Wireless Fidelity (WiFi) hot-spots environment is a challenging problem. This would require an infrastructure with automated process for registering new mobile devices, as well as authentication and authorisation of existing devices. Further, issues such as maintenance, and updating the state information, as devices join and leave the P2P network; optimising route selection and protection of the existing mobile devices from malicious devices are crucial. To address these issues, we propose a generalised architecture and a dynamic protocol for effective and optimal file transfer between devices. We use quality of service (QoS) capacity-tohop count ratio, routing algorithm, to find an optimal mobile device for a service request. The goal and contribution of this paper is to provide a scalable, robust and reliable architecture incorporating QoS; effective and optimal communication for P2P networks in a cooperative manner. 1 Introduction Internet is exponentially exploding and as changes to the electronic technology evolve, P2P will play a pivotal role in enduring information sharing, resource management enabling interoperability and QoS. 80% of data collected on an edge router at France Telecom IP backbone network was P2P traffic [2]. Also on the Sprint IP backbone P2P and unknown traffic type was about 80% [6]. As the processing power and memory of mobile devices such as personal digital assistant (PDA) is increasing, resource sharing between these devices becomes more rampant in the near future and users will start demanding QoS. Unfortunately, current P2P technology does not provide a stable, scalable, reliable and robust architecture addressing QoS issues. We propose a super-peer based architecture for P2P resource sharing in the core network addressing signalling, reliability, scalability and QoS issues. A super-peer is a static and powerful device, which intelligently and collectively manages the entire operation of file transfer and assists peers in finding optimal QoS path. Most peer devices exhibits different characteristics with respect to their capabilities such as bandwidth, storage, and processing power. These capabilities are exploited by super-peers. Peer devices update their location and state information to super-peers. Each device has the same range to send and receive information. These devices form a connected multi-hop wireless network. R.K. Ghosh and H. Mohanty (Eds.): ICDCIT 200, LNCS 337, pp. 65 7, 200. c Springer-Verlag Berlin Heidelberg 200

2 66 S. Rajasekhar, I. Khalil, and Z. Tari Cluster 1 Cluster 2 SP SP WAP Access Point Routers SP 3 Core Network SP Cluster 3 Cluster Fig. 1. Mobile Devices in WiFi Hot-spots For example, let us consider an airport where passengers with hand held devices wants to share resources. Super-peers SP1, SP2, SP3 and SP as shown in Figure 1 are connected to the core network through the wireless access point (WAP). If a passenger within SP1 wants to download a file, the passenger s device is sensed by the WAP router. SP1 initiates a file search in the network. If the file is found in devices that belong to SP2 and SP3, an optimal QoS path based on capacity-to-hop count [12] is selected. Most of the existing work done in P2P systems are to effectively look for data [3][15]. Napster [1], Gnutella [1] and Freenet [1] are P2P technologies developed and have problems such as single point of failure, signalling and scalability issues. A. Klemm et al in [11] propose a protocol called Optimised Routing Independent Overlay Network (ORION). This protocol works on a centralised approach leading to a central point of failure. In [] the authors define XREP protocol, but repositories on peers cause load burden. None of these existing approaches address scalability, reliability, load sharing and QoS path selection criterion. Our goal is to provide a generalised scalable, reliable and robust architecture for resource sharing incorporating QoS path selection for P2P systems. We propose a Mobile Authentication and Resource exchange (MARX) protocol for this purpose. Resource sharing is done using the state information obtained by IDMaps [5]. IDMaps provides the network distances in terms of available bandwidth between two hosts. The available bandwidth information obtained by IDMaps is used by capacity-to-hop count ratio routing [12] algorithm to help super-peers find optimal QoS paths. We also incorporate caching schemes for efficient information retrieval and replicate super-peer database, to encounter single point failure. Our objective is to propose a QoS architecture and

3 A Scalable and Robust QoS Architecture for WiFi P2P Networks 67 investigate such issues. We also show that use of super-peer based QoS architecture helps in authentication and authorisation of devices. This paper is organised as follows. Section 2 is related work and puts our work in context. The architecture is detailed in section 3. In section, the protocol and routing issues are discussed with an example to illustrate capacity-to-hop count routing algorithm. We conclude in section 5 with directions for future work. 2 Related Work A huge body of work has been done in efficient information retrieval systems such as CAN [13], Chord [15], Pastry [1], and Tapestry [9]. These information retrieval approaches implement distributed hash tables (DHT). A query is associated with a key and the query is routed to a peer holding the key value in DHT to locate information. Napster [1], Gnutella [1], Freenet [1] etc are some of the early P2P approaches. Napster, a centralised scenario, leads to single point failure. In Gnutella, a decentralised model, peers generate redundant signals all over the network. Freenet tries to overcomes these issues to some extent, but do not address QoS issues. A protocol for dynamic file sharing was proposed by Klemm et al [11], called ORION. This protocol has redundant data at nodes and is prone to single point failure. A cluster based architecture was proposed in [10], where peers are clustered based on content awareness. This defeats the purpose of a mobile environment as peers should be allowed to move freely from one WiFi hot-spot to another. Also, the authors indicate that the quality of the clusters formed is not guaranteed. Damiani et al in [] propose a secure and robust reputation mechanism for choosing reliable resources using XREP protocol. They emphasise on two repositories, a resource repository and a servant repository on every peer device. In a WiFi environment, holding two repositories by a mobile device is a daunting task and is not achievable. Our approach attempts to eliminate the above pitfalls by providing a a scalable, robust, reliable architecture and protocol ensuring QoS path selection amongst peer devices in WiFi hot spots. 3 WiFi P2P File Sharing Architecture: An Overview Mobile devices are capable of exchanging information using Wireless Fidelity. WiFi defines the wireless technology in the IEEE specification including the wireless protocols a, b, and g in a WiFi hot-spot. A WiFi hot-spot is a location in which wireless technology exists and is available for use to consumers [8]. We propose to build a generalised architecture with existing technologies. The main components of our proposed architecture are detailed in Figure 2 and discussed below. Super-Peer: A new wave in P2P systems, providing advancements of having a centralised database in a decentralised environment. They are responsible for

4 68 S. Rajasekhar, I. Khalil, and Z. Tari Applications Interface Query Info Module Valid Query Update Info Module Stats. Super Cache F Cache L Cache QoS Broker IDMaps Peer CAN Pastry Lookup Module CHORD Tapestry Act. Devices Rgd. Devices LISSP SLA Profile Fig. 2. Internal Architecture Overview servicing a request from a peer. Super-peers are powerful static devices that helps in selecting optimal QoS paths. Also, super-peers help in registration, authorisation, authentication and accounting of a device. Query Information Module: The functions are two fold. Module Valid checks for peer authorisation. This is done by checking the super-peer database. The module Query initiates search to find suitable resources that satisfies the QoS requirements of the generated query. Update Information Module: The availability of the optimal peer device for file transfer based on the QoS requirements is updated. The module Stats updates the cache with the most popular files accessed based on the frequency of down-load. Caching: A popular file may be accessed more frequently. Instead of searching the same file every time, these files are cached. We classify cache as file cache (F-Cache) and location cache (L-Cache). F-Cache stores the most frequently accessed files. L-Cache stores the most frequently accessed location. Caching reduces signalling and overhead traffic. QoS Module: This module consists of QoS interface and IDMaps Interface. QoS Broker ensures that the QoS requirements between the service requester and the device that is offering service is met. It establishing a reliable connection in an optimal manner using capacity to hop count ratio routing algorithm [12]. QoS broker thus updates the information regarding the file and its statistics to update info module. Internet Distance Map Service (IDMaps) a global architecture for Internet host distance estimation and distribution [5], provides quickly and efficiently the network distances in terms of metrics such as latency or band-

5 A Scalable and Robust QoS Architecture for WiFi P2P Networks 69 width between Internet hosts. Higher level services collect distance information and bandwidth to build a virtual distance map of the Internet and estimate the distance between any pair of IP addresses. For example in Figure 1, a device in SP1 requests for a resource that is found in SP2 and SP3. IDMaps provides the available bandwidth information between SP1 and SP2, and SP1 and SP3 respectively. Based on the information provided, a routing decision is made by the QoS broker using capacity to hop count routing algorithm. Thus IDMaps provides network distance in terms of latency or bandwidth and it is scalable. Lookup Module: A search for requested resource is carried on using any one of the existing lookup modules such as CAN, Pastry, Chord, Tapestry algorithms. LISSP: The Local Information Source Super Peer, is a centralised information database. This aids in authentication of a mobile device. The services for any peer device is processed though LISSP. It contains a list of active devices Act devices and registered devices Rgd devices. Act. devices are devices currently present in the super-peer cluster. Rgd. devices are devices registered in the super-peer but currently not available. SLA is the service level agreement between WiFi customers and WiFi service providers. The SLA profile is maintained in the LISSP module. A device requesting service is called service receiver, and that offering the service is called as service provider. The LISSP checks the device s profile for authorisation. If the device is registered in the WAP database or the LISSP, then file request query is generated and serviced. The F-Cache and L-Cache is checked for the resource. The update info module informs the service receiver regarding the requested file or its location. Else, the lookup module initiates search for the requested resource. IDMaps gathers available bandwidth of service providers and informs the QoS broker. The broker selects an optimal device based on capacity to hop count ratio algorithm, which is discussed in the routing sub-section. In the next section, we discuss the properties and working of the proposed protocol. Mobile Authentication and Resource exchange (MARX) Protocol The proposed dynamic MARX protocol aids in le discovery, connection setup and maintenance, le transfer and termination of connection. The protocol takes into consideration the search initiated by the lookup module through IDMaps and selects the optimal peer based on capacity-to-hop count routing algorithm..1 MARX Overview and Assumptions For example, from Figure 1 a mobile device in super-peer SP1 wants to download a file. The steps involved are summarised as follows: 1. The device is registered and authenticated with a unique address under SP1 or some other super-peer.

6 70 S. Rajasekhar, I. Khalil, and Z. Tari 2. MAC address of a new device is made known to the local super-peer. 3. The device requests its super-peer (SP1) for a file.. The device gets a response from SP1 regarding the file availability; after initiating a search, QoS broker identifies the service provider, which may be within SP1 or a different super-peer. 5. QoS Broker selects the optimal peer based on capacity-to-hop count ratio. 6. The device requests for connection from the identified service provider. 7. The device receives data from the service provider peer. 8. The device disconnects from service provider after file transfer. Some basic assumptions are made to define our protocol. The communicating peer devices may be in the same or different cluster of the same super-peer or in a different super-peer altogether. The clusters are independent and may be under one super-peer. Sharable information from peer devices are periodically updated to their super-peer LISSP database. A cluster of peer devices connected to the super-peer through a WAP is depicted in Figure 3. The peer devices are sensed through the WAP and its database for authentication as they enter the cluster. SP WAP WAP WAP 1 WAP Database 2 LISSP Database 3 OTHER SUPERPEERS Cluster Cluster Cluster 6 5 Fig. 3. Logical Overview of Clusters and Super-Peer Connectivity Fig.. Global Device Authentication During the process of authentication, one of the three possibilities rise. The device information can be found in the clusters WAP or LISSP database of the super-peer; if not found, a search is initiated amongst other super-peers as shown in Figure. Steps 1 and 2 of Figure fail to authenticate the peer device and hence the other super-peers are queried for authentication as shown in step 3. The steps, 5 and 6 informs the device regarding its authenticity; thirdly, the device may be a new device accessing the WAP. The new device has to register first with a super-peer. Once a query is generated by a device, a search is initiated in the super-peer cache, within the super-peer or a device in different super-peers. Resource in Cache: Figure 5 illustrates how communication between the device and cache takes place. Once a query is initiated (step 1), the cache is checked for the requested resource (step 2). Steps 3 and confirm that the resource is

7 A Scalable and Robust QoS Architecture for WiFi P2P Networks 71 present in cache. The device (service requester) requests for the file (step 5) and establishes a connection. Step 6 represents file transfer between the cache and the service receiver. Step 7 indicates disconnection. LISSP database 1 Query Cache 1 LISSP SPn Fig. 5. Cache Access Fig. 6. Cluster Access Resource Within Cluster: If the cache does not contain the requested file, query is passed on to the lookup module. The lookup module initiates a search within its LISSP database (step 1) and the super-peer (step 2) as shown in Figure 6. If one or more devices within the cluster has the file (step 3), then the QoS broker identifies the optimal peer, based on certain policies, such as distance, load, how long the device was in the cluster and informs the service receiver. Load is defined as the number of devices that are using the services of the device identified. Based on the QoS broker information, update info module informs the service receiver, regarding service provider (step ). Steps 5, 6 and 7 of Figure 6 represents file transfer request, the file transfer and termination of connection amongst peer devices within a cluster. Resource in different Super Peer: The service provider at times cannot be found in the same vicinity or in the same super-peer. Also, peers may not respond due to other activities. Hence, a request is issued to other super-peers and networks as shown in Figure 7. The QoS broker gets an updated list of super-peers that are willing to share information through IDMaps. The QoS broker decides the optimal super-peer based on certain parameters such as delay, available bandwidth, and hops in terms of capacity to hop count ratio [12]. The information is then passed on to update info module and data transfer takes place. Step 1 in Figure 7 initiates a query. Step 2 issues a search. Step 3i return multiple hits. The QoS broker selects optimal service provider device and informs the service requester through update info module as in step of Figure 7. Steps 5, 6 and 7 indicate file transfer and its completion.

8 72 S. Rajasekhar, I. Khalil, and Z. Tari Device Visit P/N Fshare UId Super Peer Database MAD 1 MAD 2 SP 3 SP 2 N P 1 n1 1 n SP 1 SP 1 1 LISSP 2 Provider F Cache L Cache MAD 1 MAD 2.. SLA MAD N SP P 1 n3 FF SP 3 MAD N 6 3i 5 Mac Id Dyn IP Other WiFi Cloud 7 Fig. 7. Access to Different Networks Fig. 8. LISSP Database and Connectivity LISSP Replication: LISSP database prohibits unauthorised users from gaining access to the network resources. Figure 8 depicts a LISSP database, SLAs between different clusters and the mobile access devices (MAD). Each MAD holds information in the LISSP database regarding its identity (MAC address), super-peers visited, and list of sharable information. Devices update the LISSP as and when they have new information to share. Also the devices inform LISSP where they were first registered. Any centralised system is prone to single point of failure. Hence we propose replication of the LISSP database in super-peers. Each super-peer node will have its nearest two neighbouring super-peer LISSP databases as backups thus eliminating single point failure..2 Routing QoS path selection is the process of selecting a path based on QoS requirements such as bandwidth or delay [7]. Our QoS routing algorithm maximises the available path capacity to hop count as described in [12]. The objective of QoS routing is to eliminate the inaccurate state information, the proposed QoS routing can achieve higher efficiency and better optimisation. As we increase the number of hops, the ratio path capacity to hop count is applied. Mathematically, C avl (P ) h(p ) The available capacity is denoted as C avl, P a path and h(p ) the hop count of a path P. The available capacity to hop count ratio is computed as follows: (1) C avl (P )=min l P (b avl (l)) (2) The routing algorithm uses the available capacity to hop count ratio as the criterion for optimality, and its correctness is proved in [12]. This algorithm obtains paths with maximal ratio of available capacity to hop count from the source super-peer node to all the other super-peer nodes. We illustrate QoS

9 A Scalable and Robust QoS Architecture for WiFi P2P Networks SP1 10 SP0 60 SP3 SP2 30 Fig. 9. Routing Illustration using Capacity-to-Hop Ratio Algorithm path selection using an example as shown in Figure 9. If super-peer SP0 wants to route to super-peer SP3, the optimal route has to be determined. Initially bandwidth (B) at the super-peer SP0 is set to and all the other super-peers, SP1, SP2 and SP3 to zero. Predecessor of all super-peers are set to NIL. After the first hop from SP0, we have B[SP1]=50, B[SP2]= and B[SP3]=0. We also have the hop count h[sp1] = h[sp2] = h[sp3]=1. After the second hop from SP0, there is no change for SP1, while B[SP2]=25 and h[sp2]=2. The details for SP3 are successively updated to B[SP3]=5 and h[sp3]=2, followed by B[SP3]=10 and h[sp3]=3. The complexity of the algorithm is similar to that of Bellman-Ford algorithm. 5 Conclusion In this paper, we have described a scalable, robust, reliable, generalised QoS architecture for P2P systems. We provide an optimal QoS path selection based on capacity-to-hop count ratio routing algorithm for efficient file transfer between devices in a P2P network. We propose a dynamic protocol MARX, to effectively carry out file transfer using customer-provider SLAs. Our super-peer based architecture do not allow unauthorised devices to access the network and protects existing devices from malicious devices. A new device is registered and the whole process is automated without any human intervention. While we have not carried out simulation on P2P networks to show the effectiveness of our proposed architecture, the QoS path selection algorithm applied in our current approach was validated in IP networks [12]. In our future work, we would like to further simulate/emulate our QoS architecture and QoS path selection algorithms for P2P networks. We envisage a prototype model for validation and verification purposes. Also, we would like to investigate and propose new techniques for load balancing among peer devices in a P2P network.

10 7 S. Rajasekhar, I. Khalil, and Z. Tari Acknowledgement This work is proudly supported by the Australian Research Council (ARC), under discovery Scheme, DP References 1. K. Abeer and M. Hauswirth. Peer-to-Peer information systems: concepts and models, state-of-the-art, and future systems, Proceedings of ACM SIGSOFT Software Engineering Notes, Vol. 26, Issue 5, pp , N. B. Azzouna and F. Guillemin, Experimental analysis of the impact of peerto-peer applications on traffic in commercial IP networks, [Online]. Available: 3. H. Balakrishnan, M. F. Kaashoek, D. Karger, R. Morris and I. Stoica, Looking Up Data in P2P Systems Proceedings of Communications of the ACM, Vol. 6, No. 2, pp. 3-8, E. Damiani, S. De. C. Vimercati, S. Paraboschi, P. Samarati and F. Violante, A Reputation-Based Approach for choosing Reliable Resources in Peer-to-Peer Networks, Proceedings of ACM Conference on Computer and Communications Security, pp , P. Francis, S. Jamin, C. Jin, D. Raz, Y. Shavitt, L. Zhang, IDMAPS: A Global Internet Host Distance Estimation Service, IEEE/ACM Transactions on Networking, C. Fraleigh et al, Packet-Level Traffic Measurements from the Sprint IP Backbone, IEEE Network, 17(6), pp. 6-16, R. Guerin and A. Orda, Computing Shortest Paths for Any number of Hops, IEEE/ACM Transactions on Networking, 10(5), pp , C. Hesselmen, H. Eertink, I. Widya and E. Huizer, A Mobility-aware Broadcasting Infrastructure for a Wireless Internet with Hot-spots, Proceedings of WMASH, pp , K. Hildrum, J. Kubiatowicz, S. Rao and B. Zhao, Distributed Object Location in a Dynamic Network, In Proceedings of 1th ACM Symp. on Parallel Algorithms and architectures, I. A. Klampanos and J. M. Jose, An Architecture for Information Retrieval over Semi-Collaborating Peer-to-Peer Networks, Proceedings of ACM Symposium on Applied Computing, pp , A. Klemm, C. Lindemann, and O. P. Waldhorst, A Special-Purpose Peer-to-Peer File Sharing system for Mobile Ad Hoc Networks. [Online] 12. S. Rajasekhar, B. Lloyd-Smith, and Z. Tari, QoS Path Routing based on Capacity to Link Ratio in Networks, Proceedings of International Conference on Networks, Parallel and Distributed Processing, and Applications, Japan, pp , S. Ratnaswamy, P. Francis, M. Handley, R. Karp and S. Shenker, A Scalable content-addressable network, In Proceedings of ACM SIGCOMM, A. Rowstron and P. Druschel, Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems, In Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms, I. Stoica, R. Morris, D. Karger, M. F. Kaashoek and H. Balakrishnan, Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications, Proceedings of SIGCOMM, pp , 2001.

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Load Sharing in Peer-to-Peer Networks using Dynamic Replication Load Sharing in Peer-to-Peer Networks using Dynamic Replication S Rajasekhar, B Rong, K Y Lai, I Khalil and Z Tari School of Computer Science and Information Technology RMIT University, Melbourne 3, Australia

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Peer Clustering and Firework Query Model

Peer Clustering and Firework Query Model Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk

More information

Reliable Mobile Ad Hoc P2P Data Sharing

Reliable Mobile Ad Hoc P2P Data Sharing Reliable Mobile Ad Hoc P2P Data Sharing Mee Young Sung 1, Jong Hyuk Lee 1, Jong-Seung Park 1, Seung Sik Choi 1, and Sungtek Kahng 2 1 Department of Computer Science & Engineering, University of Incheon

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Hong-Jong Jeong, Dongkyun Kim, Jeomki Song, Byung-yeub Kim, and Jeong-Su Park Department of Computer Engineering, Kyungpook

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

Load Balancing in Structured P2P Systems

Load Balancing in Structured P2P Systems 1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica fananthar, karthik, sonesh, karp, istoicag@cs.berkeley.edu Abstract Most P2P systems

More information

Location Efficient Proximity and Interest Clustered P2p File Sharing System

Location Efficient Proximity and Interest Clustered P2p File Sharing System Location Efficient Proximity and Interest Clustered P2p File Sharing System B.Ajay Kumar M.Tech, Dept of Computer Science & Engineering, Usharama College of Engineering & Technology, A.P, India. Abstract:

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS BOOTSTRAPPING LOCALITY-AWARE PP NETWORKS Curt Cramer, Kendy Kutzner, and Thomas Fuhrmann Institut für Telematik, Universität Karlsruhe (TH), Germany {curt.cramer kendy.kutzner thomas.fuhrmann}@ira.uka.de

More information

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture 1 S. Das 2 A. Thakur 3 T. Bose and 4 N.Chaki 1 Department of Computer Sc. & Engg, University of Calcutta, India, soumava@acm.org

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

A P2P File Sharing Technique by Indexed-Priority Metric

A P2P File Sharing Technique by Indexed-Priority Metric A P2P File Sharing Technique by Indexed-Priority Metric Toshinori Takabatake and Yoshikazu Komano Abstract Recently, the improvements in processing performance of a computer and in high speed communication

More information

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

Motivation for peer-to-peer

Motivation for peer-to-peer Peer-to-peer systems INF 5040 autumn 2015 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Ø Inherent restrictions of the standard client/ server model

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 1651 PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables Kwangwook SHIN a), Student Member, Seunghak LEE,

More information

Athens University of Economics and Business. Dept. of Informatics

Athens University of Economics and Business. Dept. of Informatics Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Survey of DHT Evaluation Methods

Survey of DHT Evaluation Methods Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

Effect of Joining Decisions on Peer Clusters

Effect of Joining Decisions on Peer Clusters Effect of Joining Decisions on Peer Clusters Stéphane Airiau Mathematical & Computer Sciences Department 6 South College avenue Tulsa, OK 744, USA stephane@utulsa.edu Sandip Sen Mathematical & Computer

More information

Evolution of Peer-to-peer algorithms: Past, present and future.

Evolution of Peer-to-peer algorithms: Past, present and future. Evolution of Peer-to-peer algorithms: Past, present and future. Alexei Semenov Helsinki University of Technology alexei.semenov@hut.fi Abstract Today peer-to-peer applications are widely used for different

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

A Server-mediated Peer-to-peer System

A Server-mediated Peer-to-peer System A Server-mediated Peer-to-peer System Kwok, S. H. California State University, Long Beach Chan, K. Y. and Cheung, Y. M. Hong Kong University of Science and Technology A peer-to-peer (P2P) system is a popular

More information

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity 546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and

More information

Improved Dominating Set Indices for Mobile Peer-to-Peer Networks

Improved Dominating Set Indices for Mobile Peer-to-Peer Networks Improved Dominating Set Indices for Mobile Peer-to-Peer Networks Shanping Li, Wei Shi, Xin Lin, and Channa Nizamuddin College of Computer Science Zhejiang University Hangzhou, P.R.China 310027 shan@cs.zju.edu.cn,

More information

DRing: A Layered Scheme for Range Queries over DHTs

DRing: A Layered Scheme for Range Queries over DHTs DRing: A Layered Scheme for Range Queries over DHTs Nicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens and Xavier Bonnaire Université Pierre et Marie Curie, CNRS INRIA - REGAL, Paris,

More information

Discovery of Stable Peers in a Self-Organising Peer-to-Peer Gradient Topology

Discovery of Stable Peers in a Self-Organising Peer-to-Peer Gradient Topology Discovery of Stable Peers in a Self-Organising Peer-to-Peer Gradient Topology Jan Sacha, Jim Dowling, Raymond Cunningham, and René Meier Distributed Systems Group, Trinity College, Dublin {jsacha,jdowling,rcnnnghm,rmeier}@cs.tcd.ie

More information

Scalable and Self-configurable Eduroam by using Distributed Hash Table

Scalable and Self-configurable Eduroam by using Distributed Hash Table Scalable and Self-configurable Eduroam by using Distributed Hash Table Hiep T. Nguyen Tri, Rajashree S. Sokasane, Kyungbaek Kim Dept. Electronics and Computer Engineering Chonnam National University Gwangju,

More information

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Kunwoo Park 1, Sangheon Pack 2, and Taekyoung Kwon 1 1 School of Computer Engineering, Seoul National University, Seoul, Korea

More information

Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology

Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology Jan Sacha, Jim Dowling, Raymond Cunningham, and René Meier Distributed Systems Group, Trinity College, Dublin {jsacha, jdowling,

More information

Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment

Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed, Shervin Shirmohammadi Distributed & Collaborative Virtual Environments Research Laboratory School of Information

More information

Peer-to-Peer Internet Applications: A Review

Peer-to-Peer Internet Applications: A Review Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Mill: Scalable Area Management for P2P Network based on Geographical Location

Mill: Scalable Area Management for P2P Network based on Geographical Location Mill: Scalable Area Management for PP Network based on Geographical Location MATSUURA Satoshi sato-mat@is.naist.jp FUJIKAWA Kazutoshi fujikawa@itc.naist.jp SUNAHARA Hideki suna@wide.ad.jp Graduate School

More information

Exploiting Semantic Clustering in the edonkey P2P Network

Exploiting Semantic Clustering in the edonkey P2P Network Exploiting Semantic Clustering in the edonkey P2P Network S. Handurukande, A.-M. Kermarrec, F. Le Fessant & L. Massoulié Distributed Programming Laboratory, EPFL, Switzerland INRIA, Rennes, France INRIA-Futurs

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Shaking Service Requests in Peer-to-Peer Video Systems

Shaking Service Requests in Peer-to-Peer Video Systems Service in Peer-to-Peer Video Systems Ying Cai Ashwin Natarajan Johnny Wong Department of Computer Science Iowa State University Ames, IA 500, U. S. A. E-mail: {yingcai, ashwin, wong@cs.iastate.edu Abstract

More information

A Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad Hoc Networks

A Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad Hoc Networks A Special-Purpose Peer-to-Peer Sharing System for Mobile Ad Hoc Networks Alexander Klemm, Christoph Lindemann, and Oliver P. Waldhorst University of Dortmund Department of Computer Science August-Schmidt-Str.

More information

An Agenda for Robust Peer-to-Peer Storage

An Agenda for Robust Peer-to-Peer Storage An Agenda for Robust Peer-to-Peer Storage Rodrigo Rodrigues Massachusetts Institute of Technology rodrigo@lcs.mit.edu Abstract Robust, large-scale storage is one of the main applications of DHTs and a

More information

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable

More information

Peer-to-peer brokering of planning meta-data

Peer-to-peer brokering of planning meta-data Peer-to-peer brokering of planning meta-data Johannes Oudenstad Norwegian Defence esearch Establishment, P.O. Box 25, N-2027 Kjeller, Norway johannes.oudenstad@ffi.no Frank Eliassen University of Oslo,

More information

ReCord: A Distributed Hash Table with Recursive Structure

ReCord: A Distributed Hash Table with Recursive Structure ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-

More information

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.5, September 27 PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS Farida Chowdhury

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Chapter 10: Peer-to-Peer Systems

Chapter 10: Peer-to-Peer Systems Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Introduction To enable the sharing of data and resources

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

Understanding Chord Performance

Understanding Chord Performance CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system

More information

INF5071 Performance in distributed systems: Distribution Part III

INF5071 Performance in distributed systems: Distribution Part III INF5071 Performance in distributed systems: Distribution Part III 5 November 2010 Client-Server Traditional distributed computing Successful architecture, and will continue to be so (adding proxy servers)

More information

Adaptive Replication and Replacement in P2P Caching

Adaptive Replication and Replacement in P2P Caching Adaptive Replication and Replacement in P2P Caching Jussi Kangasharju Keith W. Ross Abstract Caching large audio and video files in a community of peers is a compelling application for P2P. Assuming an

More information

Small World Overlay P2P Networks

Small World Overlay P2P Networks Small World Overlay P2P Networks Ken Y. K. Hui and John C. S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, Hong Kong ykhui,cslui @cse.cuhk.edu.hk David K.

More information

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems Global Journal of Computer Science and Technology Volume 11 Issue 16 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Y. Charlie Hu, Saumitra M. Das, and Himabindu Pucha Purdue University West Lafayette, IN 47907 {ychu, smdas, hpucha}@purdue.edu Abstract

More information

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Computer Communications and Networking (SC 546) Professor D. Starobinksi Brian Mitchell U09-62-9095 James Nunan U38-03-0277

More information

Malugo: A peer-to-peer storage system

Malugo: A peer-to-peer storage system Int. J. Ad Hoc and Ubiquitous Computing, Vol. 5, No. 4, 2010 209 Malugo: A peer-to-peer storage system Yu-Wei Chan, Tsung-Hsuan Ho, Po-Chi Shih and Yeh-Ching Chung* Department of Computer Science, National

More information

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)

More information

Adaptive Load Balancing for DHT Lookups

Adaptive Load Balancing for DHT Lookups Adaptive Load Balancing for DHT Lookups Silvia Bianchi, Sabina Serbu, Pascal Felber and Peter Kropf University of Neuchâtel, CH-, Neuchâtel, Switzerland {silvia.bianchi, sabina.serbu, pascal.felber, peter.kropf}@unine.ch

More information

A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays

A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku, Tokyo, JAPAN Email:

More information

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS Dr.N.Kumareshan 1, Mr.N.Prakash 2 2 Assistant Professor (SG), 2 Assistant Professor 1,2 Department of ECE, 1 Sri Shakthi Institute

More information

Peer-to-Peer (P2P) Systems

Peer-to-Peer (P2P) Systems Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed

More information

Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries

Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries Jens Mache, David Ely, Melanie Gilbert, Jason Gimba, Thierry Lopez and Matthew Wilkinson Lewis & Clark

More information

Distributed Meta-data Servers: Architecture and Design. Sarah Sharafkandi David H.C. Du DISC

Distributed Meta-data Servers: Architecture and Design. Sarah Sharafkandi David H.C. Du DISC Distributed Meta-data Servers: Architecture and Design Sarah Sharafkandi David H.C. Du DISC 5/22/07 1 Outline Meta-Data Server (MDS) functions Why a distributed and global Architecture? Problem description

More information

Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks*

Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks* Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks* Eunyoung Kang 1, Yongsoon Im 2, and Ungmo Kim 1 1 School of Computer Engineering, Sungkyunkwan University, 440-776, Suwon, Gyeonggi-do,

More information

Subway : Peer-To-Peer Clustering of Clients for Web Proxy

Subway : Peer-To-Peer Clustering of Clients for Web Proxy Subway : Peer-To-Peer Clustering of Clients for Web Proxy Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute

More information

Semantic-laden Peer-to-Peer Service Directory

Semantic-laden Peer-to-Peer Service Directory Semantic-laden Peer-to-Peer Service Directory Tim Hsin-ting Hu, Sebastien Ardon, Aruna Sereviratne University of New South Wales, Sydney, Australia timhu@mobqos.ee.unsw.edu.au, ardon@unsw.edu.au, a.sereviratne@unsw.edu.au

More information

HyCube: A distributed hash table based on a hierarchical hypercube geometry

HyCube: A distributed hash table based on a hierarchical hypercube geometry HyCube: A distributed hash table based on a hierarchical hypercube geometry Artur Olszak Institute of Computer Science, Warsaw University of Technology A.Olszak@ii.pw.edu.pl Abstract. This paper presents

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

Reducing Outgoing Traffic of Proxy Cache by Using Client-Cluster

Reducing Outgoing Traffic of Proxy Cache by Using Client-Cluster Reducing Outgoing Traffic of Proxy Cache by Using Client-Cluster Kyungbaek Kim and Daeyeon Park Abstract: Many web cache systems and policies concerning them have been proposed. These studies, however,

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Alper Mizrak (Presenter) Yuchung Cheng Vineet Kumar Stefan Savage Department of Computer Science & Engineering University

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

Performance Modelling of Peer-to-Peer Routing

Performance Modelling of Peer-to-Peer Routing Performance Modelling of Peer-to-Peer Routing Idris A. Rai, Andrew Brampton, Andrew MacQuire and Laurent Mathy Computing Department, Lancaster University {rai,brampton,macquire,laurent}@comp.lancs.ac.uk

More information

APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing

APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing ABSTRACT Warren Kenny Distributed Systems Group Department of Computer Science Trinity College, Dublin, Ireland kennyw@cs.tcd.ie Current

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Outline A Hierarchical P2P Architecture and an Efficient Flooding Algorithm

Outline A Hierarchical P2P Architecture and an Efficient Flooding Algorithm University of British Columbia Cpsc 527 Advanced Computer Communications Lecture 9b Hierarchical P2P Architecture and Efficient Multicasting (Juan Li s MSc Thesis) Instructor: Dr. Son Vuong The World Connected

More information

Evaluation Study of a Distributed Caching Based on Query Similarity in a P2P Network

Evaluation Study of a Distributed Caching Based on Query Similarity in a P2P Network Evaluation Study of a Distributed Caching Based on Query Similarity in a P2P Network Mouna Kacimi Max-Planck Institut fur Informatik 66123 Saarbrucken, Germany mkacimi@mpi-inf.mpg.de ABSTRACT Several caching

More information

EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems

EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville,

More information

Hybrid Overlay Networks Management for Real-Time Multimedia Streaming over P2P Networks

Hybrid Overlay Networks Management for Real-Time Multimedia Streaming over P2P Networks Hybrid Overlay Networks Management for Real-Time Multimedia Streaming over P2P Networks Mubashar Mushtaq and Toufik Ahmed CNRS LaBRI Lab. University of Bordeaux 1 351 Cours de la Libération, Talence Cedex

More information

Flexible Information Discovery in Decentralized Distributed Systems

Flexible Information Discovery in Decentralized Distributed Systems Flexible Information Discovery in Decentralized Distributed Systems Cristina Schmidt and Manish Parashar The Applied Software Systems Laboratory Department of Electrical and Computer Engineering, Rutgers

More information

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Relaxing Routing Table to Alleviate Dynamism in P2P Systems Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design A Peer-to-Peer Architecture to Enable Versatile Lookup System Design Vivek Sawant Jasleen Kaur University of North Carolina at Chapel Hill, Chapel Hill, NC, USA vivek, jasleen @cs.unc.edu Abstract The

More information

Defending against Eclipse attacks on overlay networks

Defending against Eclipse attacks on overlay networks Defending against Eclipse attacks on overlay networks Atul Singh 1 Miguel Castro 2 Peter Druschel 1 Antony Rowstron 2 1 Rice University, Houston, TX, USA. 2 Microsoft Research, Cambridge, UK. Abstract

More information