Internet-Scale Simulations of a Peer Selection Algorithm
|
|
- Thomas Sanders
- 5 years ago
- Views:
Transcription
1 Internet-Scale Simulations of a Peer Selection Algorithm Ali Boudani, Yiping Chen, Gilles Straub Thomson R&D France 1, av. de Belle-Fontaine CS Cesson-Sévigné, France firstname.lastname@thomson.net Gwendal Simon GET/ENST-Bretagne laboratory of Computer Science CS Brest Cedex 3 - France gwendal.simon@enst-bretagne.fr Abstract The match between a peer-to-peer overlay and the physical Internet infrastructure is a constant issue. Time-constrained peer-to-peer applications such as live streaming systems are even more challenging because participating peers have to discover their closest neighbors as quickly as possible. We propose in this paper an approach based on landmarks and a management server. Despite its centralized architecture, this method can scale to a large population of peers. We focus in this paper on challenging this basic idea through intensive simulations, using a large-scale map of the Internet Router (IR) layer in a simulator dedicated to peer-topeer systems. We compare the results obtained by the new method with a random selection and an optimal selection and we show that this proposal makes sense. 1 Introduction Designers of peer-to-peer systems are usually concerned by the match between logical overlay and physical infrastructure: peers should preferentially be connected with the peers that are the closest in Internet [4, 12]. However determining these closest neighbors in a wide population spread on a large-scale network as Internet is still a challenge. Among the most promising ideas, coordinate-based schemes aim to fix the location of any host on Internet in a Euclidean space, to allow two peers to estimate their latency by a basic distance computation [9, 15, 2]. Previous works show that these virtual coordinates can be obtained by active probing, i.e. by collecting round-trip-time (RTT) measurements between peers and a small set of landmarks [7]. Some studies have also investigated the placements of these landmarks [14, 13]. Unfortunately, network coordinate systems require a substantial amount of time before to deliver accurate information and do not take physical network topology into consideration. We definitely need a system to estimate quickly and accurately the closest peers of a newcomer from simple probes. We envision a basic mechanism based on traceroute tool. We make the following assumption: if a central server can store the exact route between each peer and itself, it would be able to estimate accurately and quickly the closest peers of any newcomer. The reasoning behind such assumption indeed refers to the statistical regularities observed in the large-scale structure of Internet [10]. The apparent heavy-tailed degree distribution in the graph of routers makes all routes toward a same point converge through a unique sub-path. It allows us to infer that the proximity of two peers can be estimated by taking note of their first router in common within the paths toward a same landmark. In this paper, we challenge this idea with simulations. We face a usual challenge of peer-to-peer simulations: as peers are expected to be spread all over the world, the simulator should conform to a model of Internet, although this mapping is known to be a real issue [3]. Moreover, we are interested here in topology discovery that can hardly be done on a Autonomous System (AS) layer, but rather on a Internet Router (IR) layer, known to be vaster and difficult to model [10]. So we rely on a IR map [8] and the wellknown PeerSim simulator [6]. 2 Proposal Overview In this section, we give details about the tool we envision. We would like the central manager of a peerto-peer system for live streaming diffusion to be able to accurately estimate the closest peers to a newcomer. In peer-to-peer live streaming applications, the source can act as a central server because peers usually connect to the peer-to-peer network through a light communication with the source.
2 2.1 Notations A peer-to-peer system is expected to involve a large population of peers. Let V be the set of n peers in the system. The set of peers known by a peer p V is noted K(p). As in the popular bit-torrent system [11], a peer p forwards the incoming data to few peers among this set of neighbors. For simplicity, we fix to a global constant κ the number of neighbors a peer is aware of. The Internet is seen here as a set of linked routers. We note R the set of routers and G R the graph formed by the routers and their links. As shown in many previous studies [3, 10], the graph G R exhibits statistical regularities related with the so-called complex networks, i.e. small-world and scale-free properties. One of the most interesting features is related with the degree distribution: very few routers are very well connected while the vast majority of routers have less than three connections. We note τ(r) the degree of a router r in G R. Each host participating to the peer-to-peer applications is attached to a router r with τ(r) = 1. It somehow simulates a end-user connected to a Digital Subscriber Line Access Multiplexer (DSLAM). We also note L the set of landmarks. A landmark is a reference node with a well-known network address. It also responds to any request from participants to a peer-to-peer system. Finally, these landmarks are expected to be homogeneously distributed in the network and ideally located on routers having a higher degree. We assume our ability to find any shortest path in G R. We do not consider any routing policy, so G R is a unweighted graph. Moreover, the traceroute is here simplified such that the path returned by this tool is assumed to be the shortest path in G R between the originator of the traceroute and the destination host. 2.2 Implementation The approach we briefly describe in this article contains two steps: (i) a newcomer infers the path between itself and its closest landmark and (ii) the management server estimates the closest peers to this newcomer from the analysis of this path. The first step begins once the newcomer p wants to join the peer-to-peer system. This step aims to collect useful information about the infrastructure, i.e. about G R in the surroundings of p. We assume that p knows the set of landmarks L. If L contains more than one landmark, the peer p is invited to choose one landmark among L. The Round-Trip Time (RTT) metric is used to determine this landmark we note l(p) L. We propose to choose the landmark whose connection exhibits the shortest RTT. Note that RTT values can vary over p 1 r a lmk r b r 7 r 6 r r 8 c p p 4 3 r 1 d tree(p 1, p 2 ) r 2 r 3 r 5 r 4 d(p 1, p 2 ) Figure 1. Two peers p 1 and p 2 having the same closest landmark lmk time, so this choice can be due to network fluctuation rather than a real proximity. However we do not consider network fluctuations in our simulator, so results are obtained with l(p) being the actual closest landmark of p in G R. Once p and l(p) are fixed, more refined measures are done in order to estimate the network topology nearby p. We use here a traceroute-like tool: the peer p discovers the set of routers in the path between itself and l(p). This path, noted δ(p), is then transmitted to the management server. The management server is responsible of the second step. It knows all peers in V and we assume moreover that it also knows δ(p) for all p V. A central algorithm is implemented to build a list of κ closest peers for K(p). This list is the peer set of peer p. 2.3 Principles We describe a typical situation in Figure 1. The routers r a, r b and r c are within the network core and have a large number of connections with other routers (not represented in the figure). On the contrary, the routers r i with i {1... 9} are small routers with τ(r i ) < 4. The shortest path between many peers passes through the network core as well as the path to the landmark. We note d tree (p 1, p 2 ) the hop-distance of the path deduced by the landmark from the two paths δ(p 1 ) and δ(p 2 ). In this example, this path is p 1 r 3 r 1 r c r 2 r 4 p 2 so δ tree (p 1, p 2 ) = 5. Unfortunately the shortest path between these two peers does actually not goes through r c but is rather p 1 r 3 r 5 r 4 p 2. We note d(p 1, p 2 ) the hop-distance of the shortest path between two peers p 1 and p 2. As explained, we expect that most cases verify d(p 1, p 2 ) = d tree (p 1, p 2 ). In Figure 1, all paths containing p 4 verify it, so the p2
3 management server should be able to determine the closest peers of p 4 without error. 3 Evaluation 3.1 Internet Graph Simulating an algorithm committed to runs into Internet requires usually to rely on a model of the network. Many existing works have focused on modeling one Internet layer: Autonomous System (AS) level with peering relationships, or Internet Routers (IR) level which provides a fine-grained topology of connections among routers [10]. Modeling an Internet layer relates with extracting the most significant network properties from a set of measurements done on the real network. These properties are then used to generate large-scale random graphs. One of the most commonly observed properties is the heavy-tailed distribution of node degrees [10]. We are interested with IR level network because traceroute is at the router level. Many topology generators have been implemented for AS level model, but we have not heard of such generator for the IR level. An alternative to network modeling consists in re-building a snapshot of the Internet topology. Most previous works in this way base on active probing. Thus Mercador [5] software probes randomly selected destinations and gives a partial view of Internet. Another recent tool, namely Nec (Network Cartographer) [1], claims to discover a larger part of the IR graph. We use the result of one massive crawl achieved in April 2003 by this tool. This Internet IPv4 map contains 47k routers and 119k links. This graph is representative enough to produce realistic results, because the degree distribution of the IR map used shares the heavy-tailed characteristics of Internet model. 3.2 Initialization and Metrics We now describe the metrics we observe in the simulator running on the graph G R. First we initialize the overlay network by selecting some peers. We pick a randomly chosen set of routers having a degree equals to one. For each peer p in V, we pick a router r p in G R such that τ(r p ) = 1. In the same manner, the routers acting as landmarks are chosen among a set of routers with the same in-degree noted τ lmk. The default value is τ lmk = 30. The other default parameters are: number of peers (n = 1000), number of neighbors (κ = 10) and number of landmarks ( L = 5). Every peer in V runs iteratively the peer selection algorithm to select its κ neighbors. Recall that we note K(p) the set of neighbors of a peer p. Simultaneously we associate with a peer p two alternative sets of neighbors. The first one, noted C(p), is the set of the actual closest peers of p. We use a brute-force algorithm: we measure the actual distance between p and all peers in V and we select the κ shortest distances. This set is the optimal one. The second one, noted R(p), is a randomly chosen set of neighbors. This simulates the behavior of a basic implementation of Bit Torrent. This set should be outperformed by the algorithm we described in this paper. Metrics Representation D q K(p) D tree q K(p) d tree(p, q) D closest q? C(p) D random q R(p) Table 1. metrics in the simulation We measure the sum of hop-distances between a peer p and all its neighbors in these distinct sets of neighbors. The notation is summed up in Table 1. The difference between D and D tree is the way to choose the path, as shown in Fig 1. The way we initialize the peer-to-peer system is largely based on random processes: peers and landmarks are randomly chosen. To ensure the accuracy of the results, we produce around 10 runs for plotting one point. 3.3 Landmarks Placement Every peer determines its closest landmark before launching traceroute to this one. The role of landmarks is to perform a coarse-grained peer selection by separating all peers into many small landmarkscentered clusters. With this preliminary clustering of peers, further peer selection is not only faster but also more efficient because the length of the path is shorter and we expect that a closer landmark has a more accurate view of the network. The results in Fig 2 reflects somehow the radius of the cluster with the intuition that a small cluster may provide more detailed data to the management server. The average path length decreases through two ways: (i) increasing the number of landmarks and (ii) selecting higher degree routers. The first one is obvious: the ratio landmarks per peer increases, so the probability that a peer discovers a landmark in its surroundings increases. The second one is due to the structure or G R. Routers with high connectivity are in the network core. Most of the traffic should travel through this backbone, so the paths naturally tends to decrease in average.
4 3.4 Direct Path vs. Landmark-based Path Figure 2. Average path length between peer and its closest landmark when varying the number and the degree of landmarks Figure 3. Ratio of direct path and tree path We notice that different curves in Fig 2 seems to have a lower bound near to 5 hops. The impact of the degree is less and less significant when the number of landmarks increases. This result is due to network properties: high degree nodes concentrate in the network core while peers are in the edge. Increasing the degree of landmarks tends to put landmarks very close to each other, so inefficient. This lower bound seems to be actually the distance between the edges and the core. We may expect smaller distances with increasing the number of moderately smaller routers, but we observe that the higher degree routers always outperform. This result confirms that there are few shortcuts from one edge to any other node, even the middle-connected ones. Finally, the optimal trade-off seems to be few landmarks ( L = 7) with high degree (τ > 60). After probing with traceroute, the topology of every cluster is considered as a landmark-rooted tree. Our distance estimation is based on the distance in the tree instead of distance in the real topology. The difference of two distances is explained in Fig.1. In this paragraph, we compare direct path (D) and landmarkbased path (D tree ). In Fig 3, we remark that the ratio D/D tree is higher than 1. That means the estimated distance based on landmarks is imprecise compared to the distance in the real topology. As shown in Fig 1 of Section 2.3, this imprecision is because of multiple possible paths from peer to landmark and other shorter paths among peers. The topology discovering method used in our proposal has some limitations: Traceroute-like tool returns a set of paths only to the landmark, and misses some routers between peers. This estimation error decreases when we have more peers in the network. Because for fixed κ, the density of peers in the network increases with n. So the relative distances between peers decreases as n increases. As a result, we note that the landmark-based distance estimation works better for small distance values than big ones. In spite of this error on distance estimation, we notice that the difference between real and estimated distances remains small. Only an error of 10% is observed in the case n = 1000, κ = 10. That is because, the method we propose performs a preliminary clustering before a fine-grained topology discovery. Thus, a simple traceroute can provide results similar to the real topology, with an acceptable tolerance. 3.5 Performance Analysis As shown in Table 1 three metrics are used in this evaluation: D, result of our method; D closest, perfect result with absolutely closest peers, which reflects the optimal peer selection; and D random, worst case with randomly chosen peers. In Fig 4, as we expect, the ratio D/D closest is always smaller than D random /D closest. This upper bound decreases as κ increases (in Fig 4-b). The reason is, for n fixed, D random is linearly proportional to κ. But D closest is a concave function of κ, as closest neighbors will have longer distance when κ increases. In Fig 4- a, we have similar explanation: Average distance of closest set C is a convex function of n. So the ratio D random /D closest increases when n increases. We also observe that D/D closest remains steady for different κ and n values. It means that our peer selection method is stable: the selection result is guaranteed
5 acceptable and affects slightly the accuracy of peer selection. Secondly, simulation results show that our neighbor-discovering method works well: The nearby peers can be actually identified to constitute a peer set. Using this set, the involvement of routers in peerto-peer communication is reduced by 30% compared to a random peer selection. This result is close to the optimal result, with an average difference of 20%. These results of intensive simulations allow us to conclude that our proposal is simple as well as efficient. References Figure 4. Ratio of D to D closest and D random to D closest for the κ and n values we choose. We remark in both sub figures that D/D closest is approximately 1.2. Our algorithm achieves good results: to reach its neighbors, only 20% more routers are involved compared to the closest case. With our method which introduces few overhead and requires small computation capacity, we are finally not so far to the optimal result. This error of 20% in our peer selection is due to the imprecision of topology discovery. Some nearby peers are considered as far because the shortest paths to them are unknown. Although we do not have exact selection result for closest neighbors, the distance between peer and its neighbors is significantly reduced compared to the BitTorrent scenario. Thus, we can conclude that our peer selection method gives good performance. 4 Conclusion In this paper, we have challenged a peer selection algorithm that discovers nearby neighbors with Internetscale simulations. We have evaluated its performance using PeerSim simulator and a large-scale IR level map. Our study focuses our evaluation on router-level metrics such as the amount of intermediate routers between peer and its neighbors. A first interesting results of this paper is that, we can efficiently discover network topology with a small set of high degree landmarks. A difference of real and inferred topology is observed, but this difference remains [1] Network Cartographer. magoni/nec/. [2] F. Dabek, R. Cox, M. F. Kaashoek, and R. Morris. Vivaldi: a decentralized network coordinate system. In SIGCOMM, [3] L. Dall Asta, J. I. Alvarez-Hamelin, A. Barrat, A. Vázquez, and A. Vespignani. Exploring networks with traceroute-like probes: Theory and simulations. Theor. Comput. Sci., 355(1):6 24, [4] L. Garcés-Erice, E. W. Biersack, P. Felber, K. W. Ross, and G. Urvoy-Keller. Hierarchical peer-to-peer systems. In 9th Int. Euro-Par Conference, [5] R. Govindan and H. Tangmunarunkit. Heuristics for internet map discovery. In INFOCOM, [6] M. Jelasity, G. P. Jesi, A. Montresor, and S. Voulgaris. PeerSim: A Peer-to-Peer Simulator. URL: [7] J. M. Kleinberg, A. Slivkins, and T. Wexler. Triangulation and embedding using small sets of beacons. In FOCS, [8] D. Magoni and M. Hoerdt. Internet core topology mapping and analysis. Computer Communications, 28(5): , [9] T. S. E. Ng and H. Zhang. Predicting internet network distance with coordinates-based approaches. In INFOCOM, [10] R. Pastor-Satorras and A. Vespignani. Evolution and Structure of the Internet. Cambridge University Press, [11] J. Pouwelse, P. Garbacki, D. Epema, and H. Sips. The bittorrent p2p file-sharing system: Measurements and analysis. In 4th Int. Workshop on Peer-to-Peer Systems (IPTPS), [12] S. Ratnasamy, M. Handley, R. M. Karp, and S. Shenker. Topologically-aware overlay construction and server selection. In INFOCOM, [13] K. P. Shanahan and M. J. Freedman. Locality prediction for oblivious clients. In IPTPS, [14] L. Tang and M. Crovella. Geometric exploration of the landmark selection problem. In Proc. of Passive and Active Measurement Workshop (PAM), [15] B. Wong, A. Slivkins, and E. G. Sirer. Meridian: a lightweight network location service without virtual coordinates. In SIGCOMM, 2005.
Building a low-latency, proximity-aware DHT-based P2P network
Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan
More informationPharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction
: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing Deng,XingLi Department of Electronic Engineering, Tsinghua
More informationVivaldi Practical, Distributed Internet Coordinates
Vivaldi Practical, Distributed Internet Coordinates Frank Dabek Russ Cox Robert Morris Frans Kaashoek Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology ACM SIGCOMM
More informationExperimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System
Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li Tsinghua National Laboratory for Information Science and
More informationA Hierarchical Approach to Internet Distance Prediction
A Hierarchical Approach to Internet Distance Prediction Rongmei Zhang,Y.CharlieHu, Xiaojun Lin, and Sonia Fahmy 2 School of Electrical and Computer Engineering 2 Department of Computer Science Purdue University,
More informationA Scalable Content- Addressable Network
A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics
More informationHierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks
Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Damien Magoni Université Louis Pasteur LSIIT magoni@dpt-info.u-strasbg.fr Abstract. Although distributed
More informationLandmark-based routing
Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer Science, 2004. Using
More informationTopologically-Aware Overlay Construction and Server Selection
Topologically-Aware Overlay Construction and Server Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker Abstract A number of large-scale distributed Internet applications could potentially
More informationEfficiency of Data Distribution in BitTorrent-Like Systems
Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department
More informationVivaldi: : A Decentralized Network Coordinate System
Vivaldi: : A Decentralized Network Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT CSAIL Presenter: Yi-Chao Chen 1 Introduction Design Issues Idea Algorithm Evaluation Model
More informationTuning Vivaldi: Achieving Increased Accuracy and Stability
Tuning Vivaldi: Achieving Increased Accuracy and Stability Benedikt Elser, Andreas Förschler, and Thomas Fuhrmann Computer Science Department, Technical University of Munich, Germany {elser,fuhrmann}@so.in.tum.de
More informationFractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University
Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,
More informationEarly Measurements of a Cluster-based Architecture for P2P Systems
Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella
More informationVivaldi Practical, Distributed Internet Coordinates
Vivaldi Practical, Distributed Internet Coordinates Russ Cox, Frank Dabek, Frans Kaashoek, Robert Morris, and many others rsc@mit.edu Computer Science and Artificial Intelligence Lab Massachusetts Institute
More informationA Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem
A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem draft-rimac-p2prg-alto-survey-00 Marco Tomsu, Ivica Rimac, Volker Hilt, Vijay Gurbani, Enrico Marocco 75 th IETF Meeting,
More informationIN recent years, the amount of traffic has rapidly increased
, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed
More informationVirtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing
Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,
More informationExploiting Semantic Clustering in the edonkey P2P Network
Exploiting Semantic Clustering in the edonkey P2P Network S. Handurukande, A.-M. Kermarrec, F. Le Fessant & L. Massoulié Distributed Programming Laboratory, EPFL, Switzerland INRIA, Rennes, France INRIA-Futurs
More informationNetForecast: A Delay Prediction Scheme for Provider Controlled Networks
NetForecast: A Delay Prediction Scheme for Provider Controlled Networks Ahmed Elmokashfi Simula Research Laboratory Oslo, Norway Email: ahmed@simula.no Michael Kleis Fraunhofer Institut FOKUS Competence
More informationVivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04
Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published at SIGCOMM 04 Presented by: Emmanouel Kyriakakis Key tool: Synthetic Coordinates
More informationB. Krishna Sagar et al. / International Journal of Research in Modern Engineering and Emerging Technology
A Novel System to Map Reasonably Connected Internet Regions B KRISHNA SAGAR Department of Computer Science and Engineering Siddartha educational academy group of institutions, Tirupati (India) N. ANAND
More informationVivaldi: A Decentralized Network Coordinate System
Vivaldi: A Decentralized Network Coordinate System Xintong Wang, Han Zhang EECS 589 Paper Review 1 Full Reference Authors: Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris. Title: Vivaldi: A Decentralized
More informationOverlay multicasting of real-time streams in virtual environments
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Overlay multicasting of real-time streams in virtual environments
More information[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations
Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer
More informationA Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems
2013 Third International Conference on Intelligent System Design and Engineering Applications A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems Liu Guanxiu, Ye Suqi, Huang Xinli Department
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationAOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems
AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems Yunhao Liu, Zhenyun Zhuang, Li Xiao Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
More informationEARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.
: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department
More informationCTracker: a Distributed BitTorrent Tracker Based on Chimera
CTracker: a Distributed BitTorrent Tracker Based on Chimera Raúl JIMÉNEZ, Björn KNUTSSON Kungliga Tekniska högskolan, Isafjordsgatan 39, Stockholm, 164 40, Sweden Tel: +46 8 790 42 85, Fax: +46 8 751 17
More informationCharm: A charming network coordinate system
Charm: A charming network coordinate system Çağatay Demiralp December 5, 27 Abstract We present a new network coordinate system, Charm, embedding round-trip time latencies into the Euclidean space. Charm
More informationImproving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems
Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems Yang Chen,PengSun 2, Xiaoming Fu, Tianyin Xu,3 Institute of Computer Science, University of Goettingen, Germany 2
More informationShould we build Gnutella on a structured overlay? We believe
Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured
More informationVivaldi: A Decentralized Coordinate System
Vivaldi: A Decentralized Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris ACM SIGCOMM Computer Communication Review. Vol.. No.. ACM, 00. Presenter: Andrew and Yibo Peer-to-Peer
More informationMarch 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE
for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized
More informationTowards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations
Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations Mohamed Ali Kaafar,BambaGueye,, Francois Cantin,, Guy Leduc, and Laurent Mathy 2 University of Liege,
More informationData Indexing and Querying in DHT Peer-to-Peer Networks
Institut EURECOM Research Report N o 73 RR-03-073 Data Indexing and Querying in DHT Peer-to-Peer Networks P.A. Felber, E.W. Biersack, L. Garcés-Erice, K.W. Ross, G. Urvoy-Keller January 15, 2003 2 Data
More informationHybrid Overlay Structure Based on Random Walks
Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft
More informationSDC: A Distributed Clustering Protocol for Peer-to-Peer Networks
SDC: A Distributed Clustering Protocol for Peer-to-Peer Networks Yan Li 1, Li Lao 2, and Jun-Hong Cui 1 1 Computer Science & Engineering Dept., University of Connecticut, CT 06029 2 Computer Science Dept.,
More informationRouting Basics. What is Routing? Routing Components. Path Determination CHAPTER
CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role
More informationTurning Heterogeneity into an Advantage in Overlay Routing
Turning Heterogeneity into an Advantage in Overlay Routing Zhichen Xu Hewlett-Packard Laboratories 50 Page Mill Rd Palo Alto, CA 9404 Email: zhichen@hpl.hp.com Mallik Mahalingam VMware Inc. 45 Porter Drive
More informationDistriubted Hash Tables and Scalable Content Adressable Network (CAN)
Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................
More informationDraft Notes 1 : Scaling in Ad hoc Routing Protocols
Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, 2008 2 Introduction What is the best network wireless network routing protocol? This question is a function
More informationPIC: Practical Internet Coordinates for Distance Estimation
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa, Miguel Castro, Antony Rowstron, and Peter Key Microsoft Research, Cambridge, CB3 FB, UK Abstract This paper introduces PIC, a practical
More informationTowards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations
Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations Mohamed Ali Kaafar, Bamba Gueye, Francois Cantin Guy Leduc, Laurent Mathy 2 University of Liege, Belgium
More informationOn the Utility of Inference Mechanisms
On the Utility of Inference Mechanisms Ethan Blanton Sonia Fahmy Greg N. Frederickson June 23, 2009 On the Utility of Inference Mechanisms We present an algorithm for determining when and if an inference
More informationA Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks
A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks Ali Mohammad Saghiri *, Mohammad Reza Meybodi Soft Computing Laboratory, Computer Engineering
More informationA Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery
A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca
More informationUTAPS: An Underlying Topology-aware Peer Selection Algorithm in BitTorrent *
22nd International Conference on Advanced Information Networking and Applications UTAPS: An Underlying Topology-aware Peer Selection Algorithm in BitTorrent * Wei LI 1, Shanzhi CHEN 1, 2, Tao YU 1 ( 1
More informationBridge-Node Selection and Loss Recovery in Island Multicast
Bridge-Node Selection and Loss Recovery in Island Multicast W.-P. Ken Yiu K.-F. Simon Wong S.-H. Gary Chan Department of Computer Science The Hong Kong University of Science and Technology Clear Water
More informationCS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul
1 CS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul Introduction Our problem is crawling a static social graph (snapshot). Given
More informationConnectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks
Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University
More informationDebunking some myths about structured and unstructured overlays
Debunking some myths about structured and unstructured overlays Miguel Castro Manuel Costa Antony Rowstron Microsoft Research, 7 J J Thomson Avenue, Cambridge, UK Abstract We present a comparison of structured
More informationImproved dynamic multimedia resource adaptation-based Peer-to-Peer system through locality-based clustering and service
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 Improved dynamic multimedia resource adaptation-based Peer-to-Peer
More informationSurvey of DHT Evaluation Methods
Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the
More informationTime-related replication for p2p storage system
Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,
More informationSurveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web
Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306
More informationBOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS
BOOTSTRAPPING LOCALITY-AWARE PP NETWORKS Curt Cramer, Kendy Kutzner, and Thomas Fuhrmann Institut für Telematik, Universität Karlsruhe (TH), Germany {curt.cramer kendy.kutzner thomas.fuhrmann}@ira.uka.de
More informationAS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies
AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 62 Table of Contents 1 Introduction
More informationFault Resilience of Structured P2P Systems
Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2
More informationVeracity: Practical Secure Network Coordinates via Vote-Based Agreements
Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania USENIX Technical June 18th, 2009 1 Network Coordinate Systems
More informationC3PO: Computation Congestion Control (PrOactive)
C3PO: Computation Congestion Control (PrOactive) an algorithm for dynamic diffusion of ephemeral in-network services Liang Wang, Mario Almeida*, Jeremy Blackburn*, Jon Crowcroft University of Cambridge,
More informationClassification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering
Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering GET/ENST Bretagne - Département Réseaux et Services Multimédia 2 rue de la Châtaigneraie - CS 1767-35576
More informationThwarting Traceback Attack on Freenet
Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract
More informationSplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks
SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks Pericles Lopes Ronaldo A. Ferreira pericles@facom.ufms.br raf@facom.ufms.br College of Computing, Federal University of Mato Grosso
More informationScience foundation under Grant No , DARPA award N , TCS Inc., and DIMI matching fund DIM
A Simple Conceptual Model for the Internet Topology Sudhir L. Tauro Christopher Palmer Georgos Siganos Michalis Faloutsos U.C. Riverside C.M.U. U.C.Riverside U.C.Riverside Dept. of Comp. Science Dept.
More informationImpact of Inner Parameters and Overlay Structure on the Performance of BitTorrent
Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Guillaume Urvoy-Keller Institut Eurecom, France Email: urvoy@eurecom.fr Pietro Michiardi Institut Eurecom, France Email:
More informationPAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables
IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 1651 PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables Kwangwook SHIN a), Student Member, Seunghak LEE,
More informationDistributed Hash Table
Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ
More informationNetwork Maps beyond Connectivity
Network Maps beyond Connectivity Cheng Jin Zhiheng Wang Sugih Jamin {chengjin, zhihengw, jamin}@eecs.umich.edu December 1, 24 Abstract Knowing network topology is becoming increasingly important for a
More informationNTS6: IPv6 based Network Topology Service System of CERNET2
NTS6: IPv6 based Network Topology Service System of CERNET2 Lin Cong, Bo Yang, Yang Chen, Guohan Lu, Beixing Deng, Xing Li, Ye Wang (Department of Electronic Engineering, Tsinghua University, Beijing 100084,
More informationSupporting Network Coordinates on PlanetLab
Supporting Network Coordinates on PlanetLab Peter Pietzuch, Jonathan Ledlie, Margo Seltzer Harvard University, Cambridge, MA hourglass@eecs.harvard.edu Abstract Large-scale distributed applications need
More informationA Super-Peer Selection Strategy for Peer-to-Peer Systems
, pp.25-29 http://dx.doi.org/10.14257/astl.2016.125.05 A Super-Peer Selection Strategy for Peer-to-Peer Systems Won-Ho Chung 1 1 Department of Digital Media, Duksung Womens University whchung@duksung.ac.kr
More informationTELCOM2125: Network Science and Analysis
School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2
More informationDegree Hunter: on the Impact of Balancing Node Degrees in de Bruijn- Based Overlay Networks
Degree Hunter: on the Impact of Balancing Node Degrees in de Bruijn- Based Overlay Networks 23 April 2010 Pierre FRAIGNIAUD * - Hoang Anh PHAN** (*) (**) CNRS/LIAFA and University Paris Diderot Loading
More informationCharacterizing Traffic Demand Aware Overlay Routing Network Topologies
Characterizing Traffic Demand Aware Overlay Routing Network Topologies Benjamin D. McBride Kansas State University Rathbone Hall Manhattan, KS Email: bdm@ksu.edu Caterina Scoglio Kansas State University
More informationTowards Network Triangle Inequality Violation Aware Distributed Systems
Towards Network Triangle Inequality Violation Aware Distributed Systems Guohui Wang Bo Zhang T. S. Eugene Ng Dept. of Computer Science, Rice University Houston, TX 775, USA ABSTRACT Many distributed systems
More informationAnalysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols
Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols Baruch Awerbuch, David Holmer and Herbert Rubens Johns Hopkins University Department of Computer Science Baltimore, MD, USA
More informationZero-Day Reconciliation of BitTorrent Users with Their ISPs
Zero-Day Reconciliation of BitTorrent Users with Their ISPs Marco Slot 1, Paolo Costa 1,2, Guillaume Pierre 1,andVivekRai 1 1 VU University Amsterdam 2 Microsoft Research Cambridge Abstract. BitTorrent
More informationPath Optimization in Stream-Based Overlay Networks
Path Optimization in Stream-Based Overlay Networks Peter Pietzuch, prp@eecs.harvard.edu Jeff Shneidman, Jonathan Ledlie, Mema Roussopoulos, Margo Seltzer, Matt Welsh Systems Research Group Harvard University
More informationOn the Role of Topology in Autonomously Coping with Failures in Content Dissemination Systems
On the Role of Topology in Autonomously Coping with Failures in Content Dissemination Systems Ryan Stern Department of Computer Science Colorado State University stern@cs.colostate.edu Shrideep Pallickara
More informationPinPoint: A Ground-Truth Based Approach for IP Geolocation
PinPoint: A Ground-Truth Based Approach for IP Geolocation Brian Eriksson Network Mapping and Measurement Conference 2010 Paul Barford Robert Nowak Bruce Maggs Introduction Consider some resource in the
More informationA Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,
More informationTSP-Chord: An Improved Chord Model with Physical Topology Awareness
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore TSP-Chord: An Improved Chord Model with Physical Topology Awareness
More informationCollaborative Multi-Source Scheme for Multimedia Content Distribution
Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx
More informationThe Importance of History in a Media Delivery System
The Importance of History in a Media Delivery System Richard J. Dunn, Steven D. Gribble, Henry M. Levy, John Zahorjan University of Washington E-mail: {rdunn,gribble,levy,zahorjan}@cs.washington.edu Abstract
More informationApplication Layer Multicast For Efficient Peer-to-Peer Applications
Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology
More informationMULTI+: Building Topology-Aware Overlay Multicast Trees
MULTI+: Building Topology-Aware Overlay Multicast Trees Luis Garcés-Erice, Ernst W. Biersack and Pascal A. Felber Institut EURECOM 694 Sophia Antipolis, France {garces erbi felber}@eurecom.fr Abstract.
More informationOn Veracious Search In Unsystematic Networks
On Veracious Search In Unsystematic Networks K.Thushara #1, P.Venkata Narayana#2 #1 Student Of M.Tech(S.E) And Department Of Computer Science And Engineering, # 2 Department Of Computer Science And Engineering,
More informationExploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation
Exploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation Abstract Recent progress in active measurement techniques has made it possible to estimate end-to-end path available bandwidth.
More informationInternet Coordinate Systems Tutorial
Internet Coordinate Systems Tutorial Marcelo Pias marcelo.pias@cl.cam.ac.uk Outline Motivation Problem statement General Approach Techniques Global Network Positioning (GNP) Practical Internet Coordinates
More informationDefending against Eclipse attacks on overlay networks
Defending against Eclipse attacks on overlay networks Atul Singh 1 Miguel Castro 2 Peter Druschel 1 Antony Rowstron 2 1 Rice University, Houston, TX, USA. 2 Microsoft Research, Cambridge, UK. Abstract
More informationQuasi-Chord: physical topology aware structured P2P network
Quasi-Chord: physical topology aware structured PP network UN Mingsong ZHANG Zhongqiu Network Information Center, Harbin University of cience and Technology, China College of Computer ci&tech, Harbin University
More informationReview of the Robust K-means Algorithm and Comparison with Other Clustering Methods
Review of the Robust K-means Algorithm and Comparison with Other Clustering Methods Ben Karsin University of Hawaii at Manoa Information and Computer Science ICS 63 Machine Learning Fall 8 Introduction
More informationWork in Progress: Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning
Work in Progress: Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning Yongjun Liao, Mohamed Ali Kaafar 2, Bamba Gueye, François Cantin, Pierre Geurts 3, Guy Leduc
More informationPChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity
546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and
More informationModification of an energy-efficient virtual network mapping method for a load-dependent power consumption model
Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model HIROMICHI SUGIYAMA YUKINOBU FUKUSHIMA TOKUMI YOKOHIRA The Graduate School of Natural Science
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationDS-Means: Distributed Data Stream Clustering
DS-Means: Distributed Data Stream Clustering Alessio Guerrieri and Alberto Montresor University of Trento, Italy Abstract. This paper proposes DS-means, a novel algorithm for clustering distributed data
More informationTopology Affects the Efficiency of Network Coding in Peer-to-Peer Networks
Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks Tara Small, Baochun Li, and Ben Liang Department of Electrical and Computer Engineering University of Toronto {tsmall, bli}@eecg.toronto.edu,
More information