Topology Evolution in P2P Distributed Networks

Size: px
Start display at page:

Download "Topology Evolution in P2P Distributed Networks"

Transcription

1 Topology Evolution in P2P Distributed Networks German Sakaryan Computer Science Dept. University of Rostock 1851 Rostock, Germany Herwig Unger Computer Science Dept. University of Rostock 1851 Rostock, Germany ABSTRACT P2P-networks become more and more interesting not only because of the emergence of file sharing systems like Gnutella. Such decentralized systems have a lot of advantages compared to centralized client-server systems. However, information search is still a central problem in such P2P web communities, since the used complete search with message chains may cause high search response times. In this paper we emphasize that these search times can be significantly influenced by the message forward algorithm and by the topology of the community, which can be easily changed by respective, local executed algorithms. For doing so, content and traffic oriented methods were proposed. Their efficiency has been proved through a simulation and the respective results. KEY WORDS P2P, Information Search, WEB Communities the algorithms of Content Oriented Information Search as well as algorithms to change the topology of the community based on Content and Traffic Oriented Restructuring were presented. We demonstrate the impact of the proposed algorithms on the information search and proof that it becomes more effective. Finally, it was shown that traffic problems caused by overloaded nodes may be avoided. For this goal, in this paper static communities are considered, i.e. the number of nodes in the community is a constant one. Therefore, the paper is structured as following. The below section 2 gives a general definition of the community system, describes our model of the information used, and presents model of the community s node. Section 3 introduces algorithm of the information search, and approaches to topology changes based on content and traffic restructuring. In the Section 4 we present used simulation tool and discuss the achieved empirical results. 1 Introduction Significant research efforts have recently been invested in the development of peer-to-peer (P2P) computing systems, not only due to the high popularity of file sharing systems like Gnutella [1], Napster [2], Freenet [3]. Due to its flexibility, reliability and adaptivity P2P solutions can overcome a lot of disadvantages known from client-server systems, and can fit to dynamically changing Internet environment [4]. Also, P2P communities open new opportunities for Internet marketing and business oriented approaches [5], [6]. However, the efficient management of distributed P2P networks and especially the organization of an efficient search result in a lot of new problems and tasks to be solved. The big share of Internet users still using dial-up modems, which makes a lot of connections slow and unreliable. They can hardly efficiently handle incoming information requests, analyze them and proceed. In addition to dynamically changeable structure of such Web communities (nodes can join and leave community), all this leads to killed requests and increasing of search time. We intend to show that the topology of the community plays an important role for community operations, since it significantly influences on the time needed for information search and on traffic in the community. In the given paper a conceptual approach for managing the topology of a P2P community, 2 P2P Web Community 2.1 Structure of the Community P2P Communities are groups of objects (e.g. computers) sharing a common interest. In such a manner, at least a communication between the community members is possible. Communities are created as logical structure over the Internet and includes different members - nodes. Mostly the community topology is defined by the neighborhood relations kept in every node s local warehouse. The topology can be modeled as a directed graph [7], which can be characterized by diameter, node s degree, and connectivity. Different models can be used to build and to analyze community topology: random graphs, Erdos and Renyi [8] model, edge-reassigning Small-World Network by Watts and Strogatz [9] and others. For computation purposes each node in the community has a modular structure, additionally (see. Fig 1) containing the following components: Node s profile (PR). Contains basic data about the node: informational profile (see Sec.(2.2)), address of the node (IP), and bandwidth. Queue Module (QM). Includes buffer to store incoming messages.

2 7 Processing module (PM). Includes functions and procedures for community operations like: information search, communication with user, restructuring, traffic handling and others. Warehouse module (WM). Contains list of neighbors, their informational profiles and bandwidth. Informational Module (IM). Contains information which is stored locally on the given node and shared between other community members. User Profile. Is used to simulate activity of the node s user during community simulation. W M C I M C U s e r P r o f i l e Q M I M U S ER N O D E P R P M WM Figure 1. Community Node Model. W M C I M C Normally, message chain mechanisms are used for communication in distributed P2P networks. A message chain circulates between community nodes and can be modified. It is born on starting node to fulfill particular task. Message has a limited size plan including the addresses of the visited nodes, some parts of their informational profiles, bandwidth, and time spent there. In addition to plan, message may keep extra data like starting time, hop counter, priority etc. Important to note that anonymity of the nodes can be maintained by reducing size of the message chain s plan. Messages can be distinguished by the task they are generated for. Information messages (IMC) are used for search, warning messages (WMC) used to inform others about critical situations, clustering messages (CMC) for participating in clustering, and propagation message chains (PMC) to propagate new information. 2.2 Information in the Community All information kept in the community is limited to the community interests and can be categorized for limited number of categories and represented as informational hierarchy. Here only a short summary of what is really needed for this paper is given. Each category of the information can be structured and described using the extensible Markup Language (XML) tags [1]. The tags are organized in hierarchical manner(tree). At the top of the tree there is a general category of information. Subcategories are represented on the lower levels of the tree. All information in the community can be presented as set: (1) where, j =1..n -set of information pieces which belong to the same category, and n- total number of tags. Information is represented by following triplet:! #"$" (2) where T- is sequences of tags (XML) in the information hierarchy, V- is the real informational content and P(T,V) - is the probability corresponding to how often this information is requested by an user. Probability is used to create an adequate simulation model. Empirical results obtained from the analysis of the request structure in a Gnutella network [11], show the strong correspondence between information and its popularity. In real communities these probabilities can be only estimated by analyzing information requests within representative subgroup of users/nodes. Any information is described by profile, which includes position in the hierarchy and probability: '&() *" +),!)"$" Informational profile.- of profiles of the informations kept on the given node. /- 1&() (3) / of the node / is defined as a set / "$" &(9:;"= >@?,8 /ACBEDCF GIH For the creation of the informational profile an information with J 9K"ML1NO PRQ S is considered. 3 Main Algorithms 3.1 Content Oriented Information Search To locate information in accordance with user s request a message chain travels over the community to find at least one node with the required data. The hop counter is used to limit the life time of the message and prevent extra meaningless network load. At the moment of the message generation the counter is initialized by value bigger than zero and is decremented every hop. As soon as a target information is found the message is sent back to its starting node informing it about the IP address of the found node. The path of the message is stored in the plan. Two main concepts for forwarding message over the community are applicable: Random forwarding. The message is forwarded randomly. For big communities the probability of locating the required information by one message is very low. The only solution to be done is to broadcast many message chains like in Napster or Gnutella. (4)

3 Content oriented forwarding. The basic idea behind content oriented forwarding is that the profile of the requested information and the informational profiles of the neighbor nodes #- are considered. The algorithm forwards the message to the neighbor with the most similar informational profile compared to requested info. The neighbor is chosen as the best node if: - " - As it will be shown later the community topology is evolving and nodes with similar profiles organize closer connected subcommunities. The system uses not only the local warehouse to choose the best node, but also analyzes the plans of the messages pending in the incoming queue. These messages organize a kind of virtual warehouse. 3.2 Principals of Topology Evolution The topology (link structure) of the community can be modeled as a directed graph, which has a number of specific features to be considered: Changing with time (evolution). This trend is caused by mainly two reasons. First, because of the uncoordinated and unpredictable addition and removal of nodes. These processes can be modeled by Poisson distribution and an exponential distribution accordingly [12]. Second, algorithms may run and self-organize a community so that topology can be changed (cluster building, content oriented structure creation etc.). 9IP (5) Due to lack of global knowledge, only local knowledge about community graph can be used for any structuring algorithms. Structuring algorithms should consider the distribution of the information between community nodes. The effectiveness and time taken for information search highly depends on the topology of the community and the actual traffic situations. In real networks messages on overloaded nodes are lost, that requires extra time to locate information. In order to target these two issues two restructuring approaches are proposed: Content oriented restructuring. Links between nodes shall be changed in order to organize local, stronger connected subcommunities of nodes with similar interests. Content restructuring deals with two issues: internal and external restructuring. First organizes groups of machines with the very similar information interests. External restructuring targets to organize links between different groups/ subcommunities. Traffic oriented restructuring. This kind of restructuring is caused by local traffic problems and leads to the creation of alternative paths around the overloaded nodes. Both approaches change the topology of the community dynamically, thus the changeable part of the P2P communities is ideally organized. Content restructuring uses knowledge about nodes visited by traveling messages, in such a way extra traffic for only restructuring purposes is avoided. These changes are faster than global topology changes caused by the dynamics of the P2P Web communities. The creation of the content oriented topology may lead to a traffic concentration around nodes with the most requested information. In this case, the traffic restructuring is required. And vice versa only traffic restructuring partially breaks content oriented topology and may lead to increasing search time. That is why combination of the two approaches is mostly indicated Content Oriented Restructuring The important task of this algorithm is to organize subgroups of nodes with similar informational interests and create intergroup connections. Accordingly, the warehouse of a node is divided in two parts: internal (neighbors with similar info) and external (neighbors from different groups). The executed locally algorithm should have following features: Information about other nodes in the community is taken from the plans of the traveling search messages generated by given node. The algorithm starts if either searching time is bigger than it was expected or the number of hops made bigger then it should be. Algorithm analyses the plan of the message chain, extracts candidates for neighbors and updates the content of the internal and external part of the node s warehouse. The distance between candidate and given node is calculated using formula: / /- - " /- /- (6) - where /- - info profile of the given node, and #- is a neighbors informational profile. The internal part of the node s warehouse is updated by links to new nodes with similar informational profile to the considered one. The external part by nodes with lowest similarity Traffic Oriented Restructuring Restructuring based on traffic leads to dynamical but local changes around the overloaded node. Every node in the community runs the same algorithm, which allows to detect critical situations and informs pre-neighbors about it. The following steps are executed: 1. Check, if the number of messages in the incoming queue is bigger than a critical value.

4 2. If yes, generate a warning messages (WMC) and send them out to pre- neighbors. The data carried by the WMC include the expected handling time of the pending message, which was sent by preneighbor to overloaded node. The data also include list of outgoing neighbors of the overloaded node. The list is used for the creation of roundabout ways. Outgoing neighbors are chosen randomly from the node s internal warehouse, so the pre-neighbor may reinstall its link to the new node with the similar information (as overloaded). In that way, content oriented structure of the community is left almost unchanged. When a node receives a WMC it deletes the link to the overloaded node with some probability and add a new link to the internal and external warehouses. In both cases the best nodes from information point of view are chosen. New neighbors are picked up from received list of neighbors. The probability of the link deletion can be either dependable on an expected handling time or to be a fixed parameter (empirically obtained). The probability of deletion prevents overloaded node from being isolated. Traffic restructuring helps to spread local traffic more equally. 4 Simulating Community 4.1 Concept and Principals of Simulation The main task of the simulation is to investigate how the proposed algorithms of content search, content and traffic restructuring influence on the information search in P2P communities. The developed simulation tool includes the following components Fig (2): Virtual Network Generator and Statistic Collector (VNGSC). (see Fig (2))VNGSC generates a community consisting of the nodes with assigned informational profiles and initial topology and collects statistic about the community operations. Simulation Model of the node. The model simulates the behavior of community nodes and generates information requests (through User Profile module). Message Chain Delivery Mechanism (MCDM). The MCDM is used for message chain delivery and routing (analog to physical infrastructure). N O D E i S e n d R e s e a r c h e r s V i r t u a l N e t w o r k G e n e r a t o r a n d S t a t i s t i c C ol l e c t o r ( V N G S C ) P 2 P ( v i r t u a l ) R e c e i v e R e c e i v e Me s s a g e C h a i n D e l i v e r y Me c h a n i s m ( MC D M) ( r o u t i n g ) Figure 2. Simulation Tool. NO DE k S e n d IMC and WMC types messages were used. The number of messages generated within one simulation run was limited to the number of nodes in the community. However, these limitations are close to the reality because a user mostly places another information request when it has processed the reply from the previous one. 4.2 Experimental Results To get reliable results the size of the community should be large enough to create several reasonably big subgroups (about 1 to 15 groups with 1 participants). On the other hand, simulating large communities becomes a problem, since simulation times will rapidly increase. Considering both arguments, a community size of 248 nodes was chosen. In such a manner, 2 warehouse entries equally divided between internal and external parts generate a graph close to real conditions. The incoming queue size is equal to 2 with a critical level (more messages than critical level node is overloaded) of 15. All messages may make 2 hops. The plan size was set to 2. These values were chosen to prevent messages to come back to the starting node too often and to decrease the time of the restructuring. During the experiments all combinations of different approaches (table 1) were investigated for the same initial community topology. All information in the simulated community is divided on to 4 subgroups A...D [11]. Information of the group A is requested 4 times, B-3, C-2 and D-1. Two level information hierarchy was considered. The information requests are generated randomly with given probability. The initial topology of the community was created as a random graph, which may not be strongly connected. We assume that, all nodes have an identical characteristics (warehouse size, incoming queue size, and identical software). All messages in the system have the same plan length and initial value of the hop counter. For simulation Algorithm Random Forward Content Forward No Restructuring Content Restructuring Traffic Restructuring Both Restructurings Table 1 Abbreviation RF CF NR CR TR CR+TR

5 SUM OF HOPS RF,NR RF,CR RF,TR RF,CR+TR Figure 3. Average hops per positive result. RF,NR RF,CR RF,TR RF,CR+TR Figure 6. Killed vs. generated requests. 31 NUMBER OF MESSAGES RF, TR CF, TR S IMC WMC SUM OF HOPS Figure 4. Overload in the Community. Figure 7. Content Oriented Forwarding Hops/Result RF,NR RF,CR RF,TR RF,CR+TR Figure 5. Positive results vs. generated requests. Figure 8. Content Oriented Forwarding Killed/Requests.

6 Each simulation run consists of the 248 control cycles, so that messages have at least theoretical possibility to visit all nodes. When node receives the control it performs actions according to the simulated combination. At the end of one run statistics is collected. The next run starts with topology achieved during the last run. Each combination was tested sequentially 4 runs and average statistic data was calculated. Different methods were compared using following parameters: 1. Ratio of total number of hops vs. number of positive results (messages which found requested info). 2. Ratio of positive results vs. number of generated requests. Value of 1 means all requests are satisfied. 3. Ratio of killed messages vs. number of generated requests. The conducted experiments demonstrate advantages of the content forwarding over random one. The average number of hops is at least 1 times less (see Fig(3)). The ratio of successful results is hereby 9 compared to 4 of the random oriented search (see Fig. (5)). The number of killed messages is extremely low vs. those in random search systems (see Fig. (6)). Experiments have shown that the use of traffic restructuring considerably decreases number of killed messages (lost users requests) (see Fig. (6, 8)) in both combinations with random and content forwarding. The additional traffic (see Fig.(4)) created by warning messages is estimated for combination RF+TR -is about 14, for RF+CR+TR- 47, for CR+TR- 9, and for CF+CR+TR - is only 3 more messages. The application of content restructuring makes no sense for systems which do not use content structure of the community (like random forwarding search). In the content search systems it will create content oriented topology, therefore information is located faster, number of hops and number of killed messages are decreased (see Fig. (7, 8)). Experiments proved our expectations that due to mutual influences the use of content forward, content and traffic restructuring gives the best results. 5 Conclusion and Outlook. In given paper several approaches to improve the search efficiency in P2P communities were presented. The main principals of a content oriented search as well as the principals of a topology evolution were described. Two new algorithms which care about content oriented structure of the community and traffic were introduced. With the presented community simulation concept and the respective simulation tool some empirical experiments were done. The results proved our expectations and demonstrated effectiveness of the proposed methods. Experiments showed that the combination of all three approaches would considerably improve average system performance. In our future work it is intended to investigate the dynamics of the community structure more detailed, especially with respect to the steady changing number of participating nodes. In addition, formation and management of subcommunities must be discussed, since the needed quality of service cannot be guaranteed in too large communities. References [1] Gnutella. June 22. [2] Napster [3] Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science, 29:46 59, 2. [4] Herwig Unger and Markus Wulff. Cluster-building in P2P-community networks. In Parallel and Distributed Computing and Systems (PDCS 22), pages , Cambridge, USA, 22. [5] Rudiger Grimm and Jurgen Nutzel. A friendly peerto-peer file sharing system with profit but without copy protection. In Second International Workshop, IICS 22, pages , Kuhlungsborn, Germany, June 22. [6] Ulrike Lechner. Peer-to-peer beyond file sharing. In Second International Workshop, IICS 22, pages , Kuhlungsborn, Germany, June 22. [7] Narsingh Deo and Pankai Gupta. World Wide Web: A graph-theoretic perspective. Technical Report CS- TR-1-1, School of Computer Science, University of Central Florida, Orlando, FL 32816, USA, March 21. [8] P. Erdos and A. Renyi. On the evolution of random graphs. Publications of the Mathematical Institute of the Hungarian Academy of Science, 5:17 61, 196. [9] D. Watts and S. Strogatz. Collective dynamics of small-world networks. Nature, 393:44 442, June [1] A. Ceponkus and F. Hoodbhoy. Applied XML. Wiley Computer Publishing USA, USA, [11] Nesreen Zadah. Searching in P2P-network communities. Technical report, Department of Computer Science, Rostock University, September 22. [12] Gopal Pandurangan, Prabhakar Raghavan, and Eli Upfal. Building low-diameter P2P networks. In 42th IEEE Symp. on Foundations of Computer Science, pages 56 64, Las Vegas, USA, 21.

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

FUtella Analysis and Implementation of a Content- Based Peer-to-Peer Network

FUtella Analysis and Implementation of a Content- Based Peer-to-Peer Network 8th Netties Conference Technische Universität Ilmenau September 30th to October 2nd 2002 T. Zahn / H. Ritter / J. Schiller / H. Schweppe FUtella Analysis and Implementation of a Content- Based Peer-to-Peer

More information

An Optimized Search Mechanism for Large Distributed Systems

An Optimized Search Mechanism for Large Distributed Systems An Optimized Search Mechanism for Large Distributed Systems Herwig Unger 1, Thomas Böhme, Markus Wulff 1, Gilbert Babin 3, and Peter Kropf 1 Fachbereich Informatik Universität Rostock D-1051 Rostock, Germany

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Backup and Recovery Scheme for Distributed e-learning System

Backup and Recovery Scheme for Distributed e-learning System Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

1 Random Graph Models for Networks

1 Random Graph Models for Networks Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture : Jan 6, 0 Scribes: Geoffrey Fairchild and Jason Fries Random Graph Models for Networks. Graph Modeling A random graph is a

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Properties of Biological Networks

Properties of Biological Networks Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási

More information

Ian Clarke Oskar Sandberg

Ian Clarke Oskar Sandberg Ian Clarke is the architect and coordinator of The Freenet Project, and the Chief Executive Officer of Cematics Ltd, a company he founded to realise commercial applications for the Freenet technology.

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

A Generating Function Approach to Analyze Random Graphs

A Generating Function Approach to Analyze Random Graphs A Generating Function Approach to Analyze Random Graphs Presented by - Vilas Veeraraghavan Advisor - Dr. Steven Weber Department of Electrical and Computer Engineering Drexel University April 8, 2005 Presentation

More information

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant

More information

Distributed Network Routing Algorithms Table for Small World Networks

Distributed Network Routing Algorithms Table for Small World Networks Distributed Network Routing Algorithms Table for Small World Networks Mudit Dholakia 1 1 Department of Computer Engineering, VVP Engineering College, Rajkot, 360005, India, Email:muditdholakia@gmail.com

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

Building Low-Diameter Peer-to-Peer Networks

Building Low-Diameter Peer-to-Peer Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL 21, NO 6, AUGUST 2003 995 Building Low-Diameter Peer-to-Peer Networks Gopal Pandurangan, Member, IEEE, Prabhakar Raghavan, Fellow, IEEE, and Eli Upfal,

More information

CS590R - Algorithms for communication networks Lecture 19 Peer-to-Peer Networks (continued)

CS590R - Algorithms for communication networks Lecture 19 Peer-to-Peer Networks (continued) CS590R - Algorithms for communication networks Lecture 19 Peer-to-Peer Networks (continued) Lecturer: Gopal Pandurangan Scribe: Ossama. ounis Department of Computer Sciences Purdue University 1. Introduction

More information

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically

More information

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud 2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries

Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries Jens Mache, David Ely, Melanie Gilbert, Jason Gimba, Thierry Lopez and Matthew Wilkinson Lewis & Clark

More information

Autonomic Multi-Server Distribution in Flash Crowds Alleviation Network

Autonomic Multi-Server Distribution in Flash Crowds Alleviation Network Autonomic Multi-Server Distribution in Flash Crowds Alleviation Network Merdan Atajanov Graduate School of Science and Engineering Saitama University Saitama 338-8570, Japan Toshihiko Shimokawa Faculty

More information

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P? Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems

More information

An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity. Chen Wang, Student Member, IEEE, and Li Xiao, Member, IEEE

An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity. Chen Wang, Student Member, IEEE, and Li Xiao, Member, IEEE IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 2, FEBRUARY 2007 145 An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity Chen Wang, Student Member, IEEE, and Li Xiao,

More information

Parallel Evaluation of Hopfield Neural Networks

Parallel Evaluation of Hopfield Neural Networks Parallel Evaluation of Hopfield Neural Networks Antoine Eiche, Daniel Chillet, Sebastien Pillement and Olivier Sentieys University of Rennes I / IRISA / INRIA 6 rue de Kerampont, BP 818 2232 LANNION,FRANCE

More information

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks 1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms

More information

Building Low-Diameter P2P Networks

Building Low-Diameter P2P Networks Building Low-iameter PP etworks Gopal Pandurangan Λ Prabhakar Raghavan y Eli Upfal Λ Abstract In a peer-to-peer (PP) network, nodes connect into an existing network and participate in providing and availing

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Overlay (and P2P) Networks

Overlay (and P2P) Networks Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu

More information

Table of Contents. Cisco Introduction to EIGRP

Table of Contents. Cisco Introduction to EIGRP Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP

More information

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Kademlia: A peer-to peer information system based on XOR. based on XOR Metric,by P. Maymounkov and D. Mazieres

Kademlia: A peer-to peer information system based on XOR. based on XOR Metric,by P. Maymounkov and D. Mazieres : A peer-to peer information system based on XOR Metric,by P. Maymounkov and D. Mazieres March 10, 2009 : A peer-to peer information system based on XOR Features From past p2p experiences, it has been

More information

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008 Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial

More information

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Computer Communications and Networking (SC 546) Professor D. Starobinksi Brian Mitchell U09-62-9095 James Nunan U38-03-0277

More information

Graph Structure Over Time

Graph Structure Over Time Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

LNET MULTI-RAIL RESILIENCY

LNET MULTI-RAIL RESILIENCY 13th ANNUAL WORKSHOP 2017 LNET MULTI-RAIL RESILIENCY Amir Shehata, Lustre Network Engineer Intel Corp March 29th, 2017 OUTLINE Multi-Rail Recap Base Multi-Rail Dynamic Discovery Multi-Rail performance

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

NCS Calculation Method for Streaming Applications

NCS Calculation Method for Streaming Applications NCS Calculation Method for Streaming Applications M.A. Albu, P. v. d. Stok, J.J. Lukkien Technische Universiteit Eindhoven, Philips Research Laboratories E-mail:m.a.albu@tue.nl, peter.van.der.stok@philips.com,

More information

Designing Peer-to-Peer Systems for Business-to-Business Environments

Designing Peer-to-Peer Systems for Business-to-Business Environments Designing Peer-to-Peer Systems for Business-to-Business Environments Davide Carboni, Massimo Deriu, Cristian Lai and Antonio Pintus CRS4 (Center for Advanced Studies, Research and Development in Sardinia)

More information

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies RADIOENGINEERING, VOL. 20, NO. 1, APRIL 2011 167 Analysis of Broadcast Authentication Mechanism in Selected Network Topologies Tomas VANEK, Matej ROHLIK Dept. of Telecommunication Engineering, Czech Technical

More information

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9 Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most

More information

REALISATION OF AN INTELLIGENT AND CONTINUOUS PROCESS CONNECTION IN SUBSTATIONS

REALISATION OF AN INTELLIGENT AND CONTINUOUS PROCESS CONNECTION IN SUBSTATIONS REALISATION OF AN INTELLIGENT AND CONTINUOUS PROCESS CONNECTION IN SUBSTATIONS Christina SÜFKE Carsten HAVERKAMP Christian WEHLING Westnetz GmbH - Germany Westnetz GmbH - Germany Westnetz GmbH - Germany

More information

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

6. Peer-to-peer (P2P) networks I.

6. Peer-to-peer (P2P) networks I. 6. Peer-to-peer (P2P) networks I. PA159: Net-Centric Computing I. Eva Hladká Faculty of Informatics Masaryk University Autumn 2010 Eva Hladká (FI MU) 6. P2P networks I. Autumn 2010 1 / 46 Lecture Overview

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Locating Equivalent Servants over P2P Networks

Locating Equivalent Servants over P2P Networks Locating Equivalent Servants over P2P Networks KUSUMA. APARNA LAKSHMI 1 Dr.K.V.V.S.NARAYANA MURTHY 2 Prof.M.VAMSI KRISHNA 3 1. MTECH(CSE), Chaitanya Institute of Science & Technology 2. Prof & Head, Department

More information

Octoshape. Commercial hosting not cable to home, founded 2003

Octoshape. Commercial hosting not cable to home, founded 2003 Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server

More information

Communication Fundamentals in Computer Networks

Communication Fundamentals in Computer Networks Lecture 5 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07

More information

Unit background and administrivia. Foundations of Peer-to- Peer Applications & Systems

Unit background and administrivia. Foundations of Peer-to- Peer Applications & Systems A Course on Foundations of Peer-to-Peer Systems & Applications CS 6/75995 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer Science www.cs.kent.edu/~javed/class-p2p08/

More information

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems

More information

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems Global Journal of Computer Science and Technology Volume 11 Issue 16 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

CSCI5070 Advanced Topics in Social Computing

CSCI5070 Advanced Topics in Social Computing CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of

More information

Lecture 2: January 24

Lecture 2: January 24 CMPSCI 677 Operating Systems Spring 2017 Lecture 2: January 24 Lecturer: Prashant Shenoy Scribe: Phuthipong Bovornkeeratiroj 2.1 Lecture 2 Distributed systems fall into one of the architectures teaching

More information

Peer-to-peer systems and overlay networks

Peer-to-peer systems and overlay networks Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

LECTURE 11. Memory Hierarchy

LECTURE 11. Memory Hierarchy LECTURE 11 Memory Hierarchy MEMORY HIERARCHY When it comes to memory, there are two universally desirable properties: Large Size: ideally, we want to never have to worry about running out of memory. Speed

More information

The Complex Network Phenomena. and Their Origin

The Complex Network Phenomena. and Their Origin The Complex Network Phenomena and Their Origin An Annotated Bibliography ESL 33C 003180159 Instructor: Gerriet Janssen Match 18, 2004 Introduction A coupled system can be described as a complex network,

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Associate Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection,

More information

Table of Contents Chapter 1 MSTP Configuration

Table of Contents Chapter 1 MSTP Configuration Table of Contents Table of Contents... 1-1 1.1 MSTP Overview... 1-1 1.1.1 MSTP Protocol Data Unit... 1-1 1.1.2 Basic MSTP Terminologies... 1-2 1.1.3 Implementation of MSTP... 1-6 1.1.4 MSTP Implementation

More information

Dynamic Routing and Resource Allocation in WDM Transport Networks

Dynamic Routing and Resource Allocation in WDM Transport Networks Dynamic Routing and Resource Allocation in WDM Transport Networks Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering (IND), Germany Email: spaeth@ind.uni-stuttgart.de

More information

PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS

PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS Cristina Hava & Liam Murphy 1 Abstract The World Wide Web (WWW, or Web) is one of the most important Internet services, and has been largely responsible

More information

Chapter 3. Design of Grid Scheduler. 3.1 Introduction

Chapter 3. Design of Grid Scheduler. 3.1 Introduction Chapter 3 Design of Grid Scheduler The scheduler component of the grid is responsible to prepare the job ques for grid resources. The research in design of grid schedulers has given various topologies

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture 1 S. Das 2 A. Thakur 3 T. Bose and 4 N.Chaki 1 Department of Computer Sc. & Engg, University of Calcutta, India, soumava@acm.org

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

QoS Provisioning Using IPv6 Flow Label In the Internet

QoS Provisioning Using IPv6 Flow Label In the Internet QoS Provisioning Using IPv6 Flow Label In the Internet Xiaohua Tang, Junhua Tang, Guang-in Huang and Chee-Kheong Siew Contact: Junhua Tang, lock S2, School of EEE Nanyang Technological University, Singapore,

More information

Chapter 5. A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO)

Chapter 5. A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO) A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO) CHAPTER - 5 A BANDWIDTH-SENSITIVE ROUTING FOR NETWORK MOBILITY He profits most who serves best. -Arthur F. Sheldon 5.1 Background It is very

More information

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

A Search Theoretical Approach to P2P Networks: Analysis of Learning

A Search Theoretical Approach to P2P Networks: Analysis of Learning A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.

More information

File Sharing in Less structured P2P Systems

File Sharing in Less structured P2P Systems File Sharing in Less structured P2P Systems. Bhosale S.P. 1, Sarkar A.R. 2 Computer Science And Engg. Dept., SVERI s College of Engineering Pandharpur Solapur, India1 Asst.Prof, Computer Science And Engg.

More information

The Prioritized and Distributed Synchronization in Distributed Groups

The Prioritized and Distributed Synchronization in Distributed Groups The Prioritized and Distributed Synchronization in Distributed Groups Michel Trehel and hmed Housni Université de Franche Comté, 16, route de Gray 25000 Besançon France, {trehel, housni} @lifc.univ-fcomte.fr

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK

PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK Wojciech Burakowski Monika Fudala Halina Tarasiuk Institute of Telecommunications, Warsaw University of Technology ul. Nowowiejska 15/19, 00-665 Warsaw,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

BitTorrent Fairness Analysis

BitTorrent Fairness Analysis BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Basic Switch Organization

Basic Switch Organization NOC Routing 1 Basic Switch Organization 2 Basic Switch Organization Link Controller Used for coordinating the flow of messages across the physical link of two adjacent switches 3 Basic Switch Organization

More information

A local area network that employs either a full mesh topology or partial mesh topology

A local area network that employs either a full mesh topology or partial mesh topology and Ad Hoc Networks Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology each node is connected directly to each of the others Partial mesh

More information