Internet-Scale Simulations of a Peer Selection Algorithm

Size: px
Start display at page:

Download "Internet-Scale Simulations of a Peer Selection Algorithm"

Transcription

1 Internet-Scale Simulations of a Peer Selection Algorithm Ali Boudani, Yiping Chen, Gilles Straub Thomson R&D France 1, av. de Belle-Fontaine CS Cesson-Sévigné, France firstname.lastname@thomson.net Gwendal Simon GET/ENST-Bretagne laboratory of Computer Science CS Brest Cedex 3 - France gwendal.simon@enst-bretagne.fr Abstract The match between a peer-to-peer overlay and the physical Internet infrastructure is a constant issue. Time-constrained peer-to-peer applications such as live streaming systems are even more challenging because participating peers have to discover their closest neighbors as quickly as possible. We propose in this paper an approach based on landmarks and a management server. Despite its centralized architecture, this method can scale to a large population of peers. We focus in this paper on challenging this basic idea through intensive simulations, using a large-scale map of the Internet Router (IR) layer in a simulator dedicated to peer-topeer systems. We compare the results obtained by the new method with a random selection and an optimal selection and we show that this proposal makes sense. 1 Introduction Designers of peer-to-peer systems are usually concerned by the match between logical overlay and physical infrastructure: peers should preferentially be connected with the peers that are the closest in Internet [4, 12]. However determining these closest neighbors in a wide population spread on a large-scale network as Internet is still a challenge. Among the most promising ideas, coordinate-based schemes aim to fix the location of any host on Internet in a Euclidean space, to allow two peers to estimate their latency by a basic distance computation [9, 15, 2]. Previous works show that these virtual coordinates can be obtained by active probing, i.e. by collecting round-trip-time (RTT) measurements between peers and a small set of landmarks [7]. Some studies have also investigated the placements of these landmarks [14, 13]. Unfortunately, network coordinate systems require a substantial amount of time before to deliver accurate information and do not take physical network topology into consideration. We definitely need a system to estimate quickly and accurately the closest peers of a newcomer from simple probes. We envision a basic mechanism based on traceroute tool. We make the following assumption: if a central server can store the exact route between each peer and itself, it would be able to estimate accurately and quickly the closest peers of any newcomer. The reasoning behind such assumption indeed refers to the statistical regularities observed in the large-scale structure of Internet [10]. The apparent heavy-tailed degree distribution in the graph of routers makes all routes toward a same point converge through a unique sub-path. It allows us to infer that the proximity of two peers can be estimated by taking note of their first router in common within the paths toward a same landmark. In this paper, we challenge this idea with simulations. We face a usual challenge of peer-to-peer simulations: as peers are expected to be spread all over the world, the simulator should conform to a model of Internet, although this mapping is known to be a real issue [3]. Moreover, we are interested here in topology discovery that can hardly be done on a Autonomous System (AS) layer, but rather on a Internet Router (IR) layer, known to be vaster and difficult to model [10]. So we rely on a IR map [8] and the wellknown PeerSim simulator [6]. 2 Proposal Overview In this section, we give details about the tool we envision. We would like the central manager of a peerto-peer system for live streaming diffusion to be able to accurately estimate the closest peers to a newcomer. In peer-to-peer live streaming applications, the source can act as a central server because peers usually connect to the peer-to-peer network through a light communication with the source.

2 2.1 Notations A peer-to-peer system is expected to involve a large population of peers. Let V be the set of n peers in the system. The set of peers known by a peer p V is noted K(p). As in the popular bit-torrent system [11], a peer p forwards the incoming data to few peers among this set of neighbors. For simplicity, we fix to a global constant κ the number of neighbors a peer is aware of. The Internet is seen here as a set of linked routers. We note R the set of routers and G R the graph formed by the routers and their links. As shown in many previous studies [3, 10], the graph G R exhibits statistical regularities related with the so-called complex networks, i.e. small-world and scale-free properties. One of the most interesting features is related with the degree distribution: very few routers are very well connected while the vast majority of routers have less than three connections. We note τ(r) the degree of a router r in G R. Each host participating to the peer-to-peer applications is attached to a router r with τ(r) = 1. It somehow simulates a end-user connected to a Digital Subscriber Line Access Multiplexer (DSLAM). We also note L the set of landmarks. A landmark is a reference node with a well-known network address. It also responds to any request from participants to a peer-to-peer system. Finally, these landmarks are expected to be homogeneously distributed in the network and ideally located on routers having a higher degree. We assume our ability to find any shortest path in G R. We do not consider any routing policy, so G R is a unweighted graph. Moreover, the traceroute is here simplified such that the path returned by this tool is assumed to be the shortest path in G R between the originator of the traceroute and the destination host. 2.2 Implementation The approach we briefly describe in this article contains two steps: (i) a newcomer infers the path between itself and its closest landmark and (ii) the management server estimates the closest peers to this newcomer from the analysis of this path. The first step begins once the newcomer p wants to join the peer-to-peer system. This step aims to collect useful information about the infrastructure, i.e. about G R in the surroundings of p. We assume that p knows the set of landmarks L. If L contains more than one landmark, the peer p is invited to choose one landmark among L. The Round-Trip Time (RTT) metric is used to determine this landmark we note l(p) L. We propose to choose the landmark whose connection exhibits the shortest RTT. Note that RTT values can vary over p 1 r a lmk r b r 7 r 6 r r 8 c p p 4 3 r 1 d tree(p 1, p 2 ) r 2 r 3 r 5 r 4 d(p 1, p 2 ) Figure 1. Two peers p 1 and p 2 having the same closest landmark lmk time, so this choice can be due to network fluctuation rather than a real proximity. However we do not consider network fluctuations in our simulator, so results are obtained with l(p) being the actual closest landmark of p in G R. Once p and l(p) are fixed, more refined measures are done in order to estimate the network topology nearby p. We use here a traceroute-like tool: the peer p discovers the set of routers in the path between itself and l(p). This path, noted δ(p), is then transmitted to the management server. The management server is responsible of the second step. It knows all peers in V and we assume moreover that it also knows δ(p) for all p V. A central algorithm is implemented to build a list of κ closest peers for K(p). This list is the peer set of peer p. 2.3 Principles We describe a typical situation in Figure 1. The routers r a, r b and r c are within the network core and have a large number of connections with other routers (not represented in the figure). On the contrary, the routers r i with i {1... 9} are small routers with τ(r i ) < 4. The shortest path between many peers passes through the network core as well as the path to the landmark. We note d tree (p 1, p 2 ) the hop-distance of the path deduced by the landmark from the two paths δ(p 1 ) and δ(p 2 ). In this example, this path is p 1 r 3 r 1 r c r 2 r 4 p 2 so δ tree (p 1, p 2 ) = 5. Unfortunately the shortest path between these two peers does actually not goes through r c but is rather p 1 r 3 r 5 r 4 p 2. We note d(p 1, p 2 ) the hop-distance of the shortest path between two peers p 1 and p 2. As explained, we expect that most cases verify d(p 1, p 2 ) = d tree (p 1, p 2 ). In Figure 1, all paths containing p 4 verify it, so the p2

3 management server should be able to determine the closest peers of p 4 without error. 3 Evaluation 3.1 Internet Graph Simulating an algorithm committed to runs into Internet requires usually to rely on a model of the network. Many existing works have focused on modeling one Internet layer: Autonomous System (AS) level with peering relationships, or Internet Routers (IR) level which provides a fine-grained topology of connections among routers [10]. Modeling an Internet layer relates with extracting the most significant network properties from a set of measurements done on the real network. These properties are then used to generate large-scale random graphs. One of the most commonly observed properties is the heavy-tailed distribution of node degrees [10]. We are interested with IR level network because traceroute is at the router level. Many topology generators have been implemented for AS level model, but we have not heard of such generator for the IR level. An alternative to network modeling consists in re-building a snapshot of the Internet topology. Most previous works in this way base on active probing. Thus Mercador [5] software probes randomly selected destinations and gives a partial view of Internet. Another recent tool, namely Nec (Network Cartographer) [1], claims to discover a larger part of the IR graph. We use the result of one massive crawl achieved in April 2003 by this tool. This Internet IPv4 map contains 47k routers and 119k links. This graph is representative enough to produce realistic results, because the degree distribution of the IR map used shares the heavy-tailed characteristics of Internet model. 3.2 Initialization and Metrics We now describe the metrics we observe in the simulator running on the graph G R. First we initialize the overlay network by selecting some peers. We pick a randomly chosen set of routers having a degree equals to one. For each peer p in V, we pick a router r p in G R such that τ(r p ) = 1. In the same manner, the routers acting as landmarks are chosen among a set of routers with the same in-degree noted τ lmk. The default value is τ lmk = 30. The other default parameters are: number of peers (n = 1000), number of neighbors (κ = 10) and number of landmarks ( L = 5). Every peer in V runs iteratively the peer selection algorithm to select its κ neighbors. Recall that we note K(p) the set of neighbors of a peer p. Simultaneously we associate with a peer p two alternative sets of neighbors. The first one, noted C(p), is the set of the actual closest peers of p. We use a brute-force algorithm: we measure the actual distance between p and all peers in V and we select the κ shortest distances. This set is the optimal one. The second one, noted R(p), is a randomly chosen set of neighbors. This simulates the behavior of a basic implementation of Bit Torrent. This set should be outperformed by the algorithm we described in this paper. Metrics Representation D q K(p) D tree q K(p) d tree(p, q) D closest q? C(p) D random q R(p) Table 1. metrics in the simulation We measure the sum of hop-distances between a peer p and all its neighbors in these distinct sets of neighbors. The notation is summed up in Table 1. The difference between D and D tree is the way to choose the path, as shown in Fig 1. The way we initialize the peer-to-peer system is largely based on random processes: peers and landmarks are randomly chosen. To ensure the accuracy of the results, we produce around 10 runs for plotting one point. 3.3 Landmarks Placement Every peer determines its closest landmark before launching traceroute to this one. The role of landmarks is to perform a coarse-grained peer selection by separating all peers into many small landmarkscentered clusters. With this preliminary clustering of peers, further peer selection is not only faster but also more efficient because the length of the path is shorter and we expect that a closer landmark has a more accurate view of the network. The results in Fig 2 reflects somehow the radius of the cluster with the intuition that a small cluster may provide more detailed data to the management server. The average path length decreases through two ways: (i) increasing the number of landmarks and (ii) selecting higher degree routers. The first one is obvious: the ratio landmarks per peer increases, so the probability that a peer discovers a landmark in its surroundings increases. The second one is due to the structure or G R. Routers with high connectivity are in the network core. Most of the traffic should travel through this backbone, so the paths naturally tends to decrease in average.

4 3.4 Direct Path vs. Landmark-based Path Figure 2. Average path length between peer and its closest landmark when varying the number and the degree of landmarks Figure 3. Ratio of direct path and tree path We notice that different curves in Fig 2 seems to have a lower bound near to 5 hops. The impact of the degree is less and less significant when the number of landmarks increases. This result is due to network properties: high degree nodes concentrate in the network core while peers are in the edge. Increasing the degree of landmarks tends to put landmarks very close to each other, so inefficient. This lower bound seems to be actually the distance between the edges and the core. We may expect smaller distances with increasing the number of moderately smaller routers, but we observe that the higher degree routers always outperform. This result confirms that there are few shortcuts from one edge to any other node, even the middle-connected ones. Finally, the optimal trade-off seems to be few landmarks ( L = 7) with high degree (τ > 60). After probing with traceroute, the topology of every cluster is considered as a landmark-rooted tree. Our distance estimation is based on the distance in the tree instead of distance in the real topology. The difference of two distances is explained in Fig.1. In this paragraph, we compare direct path (D) and landmarkbased path (D tree ). In Fig 3, we remark that the ratio D/D tree is higher than 1. That means the estimated distance based on landmarks is imprecise compared to the distance in the real topology. As shown in Fig 1 of Section 2.3, this imprecision is because of multiple possible paths from peer to landmark and other shorter paths among peers. The topology discovering method used in our proposal has some limitations: Traceroute-like tool returns a set of paths only to the landmark, and misses some routers between peers. This estimation error decreases when we have more peers in the network. Because for fixed κ, the density of peers in the network increases with n. So the relative distances between peers decreases as n increases. As a result, we note that the landmark-based distance estimation works better for small distance values than big ones. In spite of this error on distance estimation, we notice that the difference between real and estimated distances remains small. Only an error of 10% is observed in the case n = 1000, κ = 10. That is because, the method we propose performs a preliminary clustering before a fine-grained topology discovery. Thus, a simple traceroute can provide results similar to the real topology, with an acceptable tolerance. 3.5 Performance Analysis As shown in Table 1 three metrics are used in this evaluation: D, result of our method; D closest, perfect result with absolutely closest peers, which reflects the optimal peer selection; and D random, worst case with randomly chosen peers. In Fig 4, as we expect, the ratio D/D closest is always smaller than D random /D closest. This upper bound decreases as κ increases (in Fig 4-b). The reason is, for n fixed, D random is linearly proportional to κ. But D closest is a concave function of κ, as closest neighbors will have longer distance when κ increases. In Fig 4- a, we have similar explanation: Average distance of closest set C is a convex function of n. So the ratio D random /D closest increases when n increases. We also observe that D/D closest remains steady for different κ and n values. It means that our peer selection method is stable: the selection result is guaranteed

5 acceptable and affects slightly the accuracy of peer selection. Secondly, simulation results show that our neighbor-discovering method works well: The nearby peers can be actually identified to constitute a peer set. Using this set, the involvement of routers in peerto-peer communication is reduced by 30% compared to a random peer selection. This result is close to the optimal result, with an average difference of 20%. These results of intensive simulations allow us to conclude that our proposal is simple as well as efficient. References Figure 4. Ratio of D to D closest and D random to D closest for the κ and n values we choose. We remark in both sub figures that D/D closest is approximately 1.2. Our algorithm achieves good results: to reach its neighbors, only 20% more routers are involved compared to the closest case. With our method which introduces few overhead and requires small computation capacity, we are finally not so far to the optimal result. This error of 20% in our peer selection is due to the imprecision of topology discovery. Some nearby peers are considered as far because the shortest paths to them are unknown. Although we do not have exact selection result for closest neighbors, the distance between peer and its neighbors is significantly reduced compared to the BitTorrent scenario. Thus, we can conclude that our peer selection method gives good performance. 4 Conclusion In this paper, we have challenged a peer selection algorithm that discovers nearby neighbors with Internetscale simulations. We have evaluated its performance using PeerSim simulator and a large-scale IR level map. Our study focuses our evaluation on router-level metrics such as the amount of intermediate routers between peer and its neighbors. A first interesting results of this paper is that, we can efficiently discover network topology with a small set of high degree landmarks. A difference of real and inferred topology is observed, but this difference remains [1] Network Cartographer. magoni/nec/. [2] F. Dabek, R. Cox, M. F. Kaashoek, and R. Morris. Vivaldi: a decentralized network coordinate system. In SIGCOMM, [3] L. Dall Asta, J. I. Alvarez-Hamelin, A. Barrat, A. Vázquez, and A. Vespignani. Exploring networks with traceroute-like probes: Theory and simulations. Theor. Comput. Sci., 355(1):6 24, [4] L. Garcés-Erice, E. W. Biersack, P. Felber, K. W. Ross, and G. Urvoy-Keller. Hierarchical peer-to-peer systems. In 9th Int. Euro-Par Conference, [5] R. Govindan and H. Tangmunarunkit. Heuristics for internet map discovery. In INFOCOM, [6] M. Jelasity, G. P. Jesi, A. Montresor, and S. Voulgaris. PeerSim: A Peer-to-Peer Simulator. URL: [7] J. M. Kleinberg, A. Slivkins, and T. Wexler. Triangulation and embedding using small sets of beacons. In FOCS, [8] D. Magoni and M. Hoerdt. Internet core topology mapping and analysis. Computer Communications, 28(5): , [9] T. S. E. Ng and H. Zhang. Predicting internet network distance with coordinates-based approaches. In INFOCOM, [10] R. Pastor-Satorras and A. Vespignani. Evolution and Structure of the Internet. Cambridge University Press, [11] J. Pouwelse, P. Garbacki, D. Epema, and H. Sips. The bittorrent p2p file-sharing system: Measurements and analysis. In 4th Int. Workshop on Peer-to-Peer Systems (IPTPS), [12] S. Ratnasamy, M. Handley, R. M. Karp, and S. Shenker. Topologically-aware overlay construction and server selection. In INFOCOM, [13] K. P. Shanahan and M. J. Freedman. Locality prediction for oblivious clients. In IPTPS, [14] L. Tang and M. Crovella. Geometric exploration of the landmark selection problem. In Proc. of Passive and Active Measurement Workshop (PAM), [15] B. Wong, A. Slivkins, and E. G. Sirer. Meridian: a lightweight network location service without virtual coordinates. In SIGCOMM, 2005.

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction

Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction : A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing Deng,XingLi Department of Electronic Engineering, Tsinghua

More information

Vivaldi Practical, Distributed Internet Coordinates

Vivaldi Practical, Distributed Internet Coordinates Vivaldi Practical, Distributed Internet Coordinates Frank Dabek Russ Cox Robert Morris Frans Kaashoek Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology ACM SIGCOMM

More information

Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System

Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li Tsinghua National Laboratory for Information Science and

More information

A Hierarchical Approach to Internet Distance Prediction

A Hierarchical Approach to Internet Distance Prediction A Hierarchical Approach to Internet Distance Prediction Rongmei Zhang,Y.CharlieHu, Xiaojun Lin, and Sonia Fahmy 2 School of Electrical and Computer Engineering 2 Department of Computer Science Purdue University,

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks

Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Damien Magoni Université Louis Pasteur LSIIT magoni@dpt-info.u-strasbg.fr Abstract. Although distributed

More information

Landmark-based routing

Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer Science, 2004. Using

More information

Topologically-Aware Overlay Construction and Server Selection

Topologically-Aware Overlay Construction and Server Selection Topologically-Aware Overlay Construction and Server Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker Abstract A number of large-scale distributed Internet applications could potentially

More information

Efficiency of Data Distribution in BitTorrent-Like Systems

Efficiency of Data Distribution in BitTorrent-Like Systems Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department

More information

Vivaldi: : A Decentralized Network Coordinate System

Vivaldi: : A Decentralized Network Coordinate System Vivaldi: : A Decentralized Network Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT CSAIL Presenter: Yi-Chao Chen 1 Introduction Design Issues Idea Algorithm Evaluation Model

More information

Tuning Vivaldi: Achieving Increased Accuracy and Stability

Tuning Vivaldi: Achieving Increased Accuracy and Stability Tuning Vivaldi: Achieving Increased Accuracy and Stability Benedikt Elser, Andreas Förschler, and Thomas Fuhrmann Computer Science Department, Technical University of Munich, Germany {elser,fuhrmann}@so.in.tum.de

More information

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Vivaldi Practical, Distributed Internet Coordinates

Vivaldi Practical, Distributed Internet Coordinates Vivaldi Practical, Distributed Internet Coordinates Russ Cox, Frank Dabek, Frans Kaashoek, Robert Morris, and many others rsc@mit.edu Computer Science and Artificial Intelligence Lab Massachusetts Institute

More information

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem draft-rimac-p2prg-alto-survey-00 Marco Tomsu, Ivica Rimac, Volker Hilt, Vijay Gurbani, Enrico Marocco 75 th IETF Meeting,

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Exploiting Semantic Clustering in the edonkey P2P Network

Exploiting Semantic Clustering in the edonkey P2P Network Exploiting Semantic Clustering in the edonkey P2P Network S. Handurukande, A.-M. Kermarrec, F. Le Fessant & L. Massoulié Distributed Programming Laboratory, EPFL, Switzerland INRIA, Rennes, France INRIA-Futurs

More information

NetForecast: A Delay Prediction Scheme for Provider Controlled Networks

NetForecast: A Delay Prediction Scheme for Provider Controlled Networks NetForecast: A Delay Prediction Scheme for Provider Controlled Networks Ahmed Elmokashfi Simula Research Laboratory Oslo, Norway Email: ahmed@simula.no Michael Kleis Fraunhofer Institut FOKUS Competence

More information

Vivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04

Vivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published at SIGCOMM 04 Presented by: Emmanouel Kyriakakis Key tool: Synthetic Coordinates

More information

B. Krishna Sagar et al. / International Journal of Research in Modern Engineering and Emerging Technology

B. Krishna Sagar et al. / International Journal of Research in Modern Engineering and Emerging Technology A Novel System to Map Reasonably Connected Internet Regions B KRISHNA SAGAR Department of Computer Science and Engineering Siddartha educational academy group of institutions, Tirupati (India) N. ANAND

More information

Vivaldi: A Decentralized Network Coordinate System

Vivaldi: A Decentralized Network Coordinate System Vivaldi: A Decentralized Network Coordinate System Xintong Wang, Han Zhang EECS 589 Paper Review 1 Full Reference Authors: Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris. Title: Vivaldi: A Decentralized

More information

Overlay multicasting of real-time streams in virtual environments

Overlay multicasting of real-time streams in virtual environments University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Overlay multicasting of real-time streams in virtual environments

More information

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer

More information

A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems

A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems 2013 Third International Conference on Intelligent System Design and Engineering Applications A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems Liu Guanxiu, Ye Suqi, Huang Xinli Department

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems Yunhao Liu, Zhenyun Zhuang, Li Xiao Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

CTracker: a Distributed BitTorrent Tracker Based on Chimera

CTracker: a Distributed BitTorrent Tracker Based on Chimera CTracker: a Distributed BitTorrent Tracker Based on Chimera Raúl JIMÉNEZ, Björn KNUTSSON Kungliga Tekniska högskolan, Isafjordsgatan 39, Stockholm, 164 40, Sweden Tel: +46 8 790 42 85, Fax: +46 8 751 17

More information

Charm: A charming network coordinate system

Charm: A charming network coordinate system Charm: A charming network coordinate system Çağatay Demiralp December 5, 27 Abstract We present a new network coordinate system, Charm, embedding round-trip time latencies into the Euclidean space. Charm

More information

Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems

Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems Yang Chen,PengSun 2, Xiaoming Fu, Tianyin Xu,3 Institute of Computer Science, University of Goettingen, Germany 2

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

Vivaldi: A Decentralized Coordinate System

Vivaldi: A Decentralized Coordinate System Vivaldi: A Decentralized Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris ACM SIGCOMM Computer Communication Review. Vol.. No.. ACM, 00. Presenter: Andrew and Yibo Peer-to-Peer

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations

Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations Mohamed Ali Kaafar,BambaGueye,, Francois Cantin,, Guy Leduc, and Laurent Mathy 2 University of Liege,

More information

Data Indexing and Querying in DHT Peer-to-Peer Networks

Data Indexing and Querying in DHT Peer-to-Peer Networks Institut EURECOM Research Report N o 73 RR-03-073 Data Indexing and Querying in DHT Peer-to-Peer Networks P.A. Felber, E.W. Biersack, L. Garcés-Erice, K.W. Ross, G. Urvoy-Keller January 15, 2003 2 Data

More information

Hybrid Overlay Structure Based on Random Walks

Hybrid Overlay Structure Based on Random Walks Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft

More information

SDC: A Distributed Clustering Protocol for Peer-to-Peer Networks

SDC: A Distributed Clustering Protocol for Peer-to-Peer Networks SDC: A Distributed Clustering Protocol for Peer-to-Peer Networks Yan Li 1, Li Lao 2, and Jun-Hong Cui 1 1 Computer Science & Engineering Dept., University of Connecticut, CT 06029 2 Computer Science Dept.,

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Turning Heterogeneity into an Advantage in Overlay Routing

Turning Heterogeneity into an Advantage in Overlay Routing Turning Heterogeneity into an Advantage in Overlay Routing Zhichen Xu Hewlett-Packard Laboratories 50 Page Mill Rd Palo Alto, CA 9404 Email: zhichen@hpl.hp.com Mallik Mahalingam VMware Inc. 45 Porter Drive

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

Draft Notes 1 : Scaling in Ad hoc Routing Protocols Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, 2008 2 Introduction What is the best network wireless network routing protocol? This question is a function

More information

PIC: Practical Internet Coordinates for Distance Estimation

PIC: Practical Internet Coordinates for Distance Estimation PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa, Miguel Castro, Antony Rowstron, and Peter Key Microsoft Research, Cambridge, CB3 FB, UK Abstract This paper introduces PIC, a practical

More information

Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations

Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations Mohamed Ali Kaafar, Bamba Gueye, Francois Cantin Guy Leduc, Laurent Mathy 2 University of Liege, Belgium

More information

On the Utility of Inference Mechanisms

On the Utility of Inference Mechanisms On the Utility of Inference Mechanisms Ethan Blanton Sonia Fahmy Greg N. Frederickson June 23, 2009 On the Utility of Inference Mechanisms We present an algorithm for determining when and if an inference

More information

A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks

A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks Ali Mohammad Saghiri *, Mohammad Reza Meybodi Soft Computing Laboratory, Computer Engineering

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

UTAPS: An Underlying Topology-aware Peer Selection Algorithm in BitTorrent *

UTAPS: An Underlying Topology-aware Peer Selection Algorithm in BitTorrent * 22nd International Conference on Advanced Information Networking and Applications UTAPS: An Underlying Topology-aware Peer Selection Algorithm in BitTorrent * Wei LI 1, Shanzhi CHEN 1, 2, Tao YU 1 ( 1

More information

Bridge-Node Selection and Loss Recovery in Island Multicast

Bridge-Node Selection and Loss Recovery in Island Multicast Bridge-Node Selection and Loss Recovery in Island Multicast W.-P. Ken Yiu K.-F. Simon Wong S.-H. Gary Chan Department of Computer Science The Hong Kong University of Science and Technology Clear Water

More information

CS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul

CS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul 1 CS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul Introduction Our problem is crawling a static social graph (snapshot). Given

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

Debunking some myths about structured and unstructured overlays

Debunking some myths about structured and unstructured overlays Debunking some myths about structured and unstructured overlays Miguel Castro Manuel Costa Antony Rowstron Microsoft Research, 7 J J Thomson Avenue, Cambridge, UK Abstract We present a comparison of structured

More information

Improved dynamic multimedia resource adaptation-based Peer-to-Peer system through locality-based clustering and service

Improved dynamic multimedia resource adaptation-based Peer-to-Peer system through locality-based clustering and service University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 Improved dynamic multimedia resource adaptation-based Peer-to-Peer

More information

Survey of DHT Evaluation Methods

Survey of DHT Evaluation Methods Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS BOOTSTRAPPING LOCALITY-AWARE PP NETWORKS Curt Cramer, Kendy Kutzner, and Thomas Fuhrmann Institut für Telematik, Universität Karlsruhe (TH), Germany {curt.cramer kendy.kutzner thomas.fuhrmann}@ira.uka.de

More information

AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies

AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 62 Table of Contents 1 Introduction

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

Veracity: Practical Secure Network Coordinates via Vote-Based Agreements

Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania USENIX Technical June 18th, 2009 1 Network Coordinate Systems

More information

C3PO: Computation Congestion Control (PrOactive)

C3PO: Computation Congestion Control (PrOactive) C3PO: Computation Congestion Control (PrOactive) an algorithm for dynamic diffusion of ephemeral in-network services Liang Wang, Mario Almeida*, Jeremy Blackburn*, Jon Crowcroft University of Cambridge,

More information

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering GET/ENST Bretagne - Département Réseaux et Services Multimédia 2 rue de la Châtaigneraie - CS 1767-35576

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks Pericles Lopes Ronaldo A. Ferreira pericles@facom.ufms.br raf@facom.ufms.br College of Computing, Federal University of Mato Grosso

More information

Science foundation under Grant No , DARPA award N , TCS Inc., and DIMI matching fund DIM

Science foundation under Grant No , DARPA award N , TCS Inc., and DIMI matching fund DIM A Simple Conceptual Model for the Internet Topology Sudhir L. Tauro Christopher Palmer Georgos Siganos Michalis Faloutsos U.C. Riverside C.M.U. U.C.Riverside U.C.Riverside Dept. of Comp. Science Dept.

More information

Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent

Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Guillaume Urvoy-Keller Institut Eurecom, France Email: urvoy@eurecom.fr Pietro Michiardi Institut Eurecom, France Email:

More information

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 1651 PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables Kwangwook SHIN a), Student Member, Seunghak LEE,

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Network Maps beyond Connectivity

Network Maps beyond Connectivity Network Maps beyond Connectivity Cheng Jin Zhiheng Wang Sugih Jamin {chengjin, zhihengw, jamin}@eecs.umich.edu December 1, 24 Abstract Knowing network topology is becoming increasingly important for a

More information

NTS6: IPv6 based Network Topology Service System of CERNET2

NTS6: IPv6 based Network Topology Service System of CERNET2 NTS6: IPv6 based Network Topology Service System of CERNET2 Lin Cong, Bo Yang, Yang Chen, Guohan Lu, Beixing Deng, Xing Li, Ye Wang (Department of Electronic Engineering, Tsinghua University, Beijing 100084,

More information

Supporting Network Coordinates on PlanetLab

Supporting Network Coordinates on PlanetLab Supporting Network Coordinates on PlanetLab Peter Pietzuch, Jonathan Ledlie, Margo Seltzer Harvard University, Cambridge, MA hourglass@eecs.harvard.edu Abstract Large-scale distributed applications need

More information

A Super-Peer Selection Strategy for Peer-to-Peer Systems

A Super-Peer Selection Strategy for Peer-to-Peer Systems , pp.25-29 http://dx.doi.org/10.14257/astl.2016.125.05 A Super-Peer Selection Strategy for Peer-to-Peer Systems Won-Ho Chung 1 1 Department of Digital Media, Duksung Womens University whchung@duksung.ac.kr

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2

More information

Degree Hunter: on the Impact of Balancing Node Degrees in de Bruijn- Based Overlay Networks

Degree Hunter: on the Impact of Balancing Node Degrees in de Bruijn- Based Overlay Networks Degree Hunter: on the Impact of Balancing Node Degrees in de Bruijn- Based Overlay Networks 23 April 2010 Pierre FRAIGNIAUD * - Hoang Anh PHAN** (*) (**) CNRS/LIAFA and University Paris Diderot Loading

More information

Characterizing Traffic Demand Aware Overlay Routing Network Topologies

Characterizing Traffic Demand Aware Overlay Routing Network Topologies Characterizing Traffic Demand Aware Overlay Routing Network Topologies Benjamin D. McBride Kansas State University Rathbone Hall Manhattan, KS Email: bdm@ksu.edu Caterina Scoglio Kansas State University

More information

Towards Network Triangle Inequality Violation Aware Distributed Systems

Towards Network Triangle Inequality Violation Aware Distributed Systems Towards Network Triangle Inequality Violation Aware Distributed Systems Guohui Wang Bo Zhang T. S. Eugene Ng Dept. of Computer Science, Rice University Houston, TX 775, USA ABSTRACT Many distributed systems

More information

Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols

Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols Baruch Awerbuch, David Holmer and Herbert Rubens Johns Hopkins University Department of Computer Science Baltimore, MD, USA

More information

Zero-Day Reconciliation of BitTorrent Users with Their ISPs

Zero-Day Reconciliation of BitTorrent Users with Their ISPs Zero-Day Reconciliation of BitTorrent Users with Their ISPs Marco Slot 1, Paolo Costa 1,2, Guillaume Pierre 1,andVivekRai 1 1 VU University Amsterdam 2 Microsoft Research Cambridge Abstract. BitTorrent

More information

Path Optimization in Stream-Based Overlay Networks

Path Optimization in Stream-Based Overlay Networks Path Optimization in Stream-Based Overlay Networks Peter Pietzuch, prp@eecs.harvard.edu Jeff Shneidman, Jonathan Ledlie, Mema Roussopoulos, Margo Seltzer, Matt Welsh Systems Research Group Harvard University

More information

On the Role of Topology in Autonomously Coping with Failures in Content Dissemination Systems

On the Role of Topology in Autonomously Coping with Failures in Content Dissemination Systems On the Role of Topology in Autonomously Coping with Failures in Content Dissemination Systems Ryan Stern Department of Computer Science Colorado State University stern@cs.colostate.edu Shrideep Pallickara

More information

PinPoint: A Ground-Truth Based Approach for IP Geolocation

PinPoint: A Ground-Truth Based Approach for IP Geolocation PinPoint: A Ground-Truth Based Approach for IP Geolocation Brian Eriksson Network Mapping and Measurement Conference 2010 Paul Barford Robert Nowak Bruce Maggs Introduction Consider some resource in the

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

TSP-Chord: An Improved Chord Model with Physical Topology Awareness

TSP-Chord: An Improved Chord Model with Physical Topology Awareness 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore TSP-Chord: An Improved Chord Model with Physical Topology Awareness

More information

Collaborative Multi-Source Scheme for Multimedia Content Distribution

Collaborative Multi-Source Scheme for Multimedia Content Distribution Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx

More information

The Importance of History in a Media Delivery System

The Importance of History in a Media Delivery System The Importance of History in a Media Delivery System Richard J. Dunn, Steven D. Gribble, Henry M. Levy, John Zahorjan University of Washington E-mail: {rdunn,gribble,levy,zahorjan}@cs.washington.edu Abstract

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

MULTI+: Building Topology-Aware Overlay Multicast Trees

MULTI+: Building Topology-Aware Overlay Multicast Trees MULTI+: Building Topology-Aware Overlay Multicast Trees Luis Garcés-Erice, Ernst W. Biersack and Pascal A. Felber Institut EURECOM 694 Sophia Antipolis, France {garces erbi felber}@eurecom.fr Abstract.

More information

On Veracious Search In Unsystematic Networks

On Veracious Search In Unsystematic Networks On Veracious Search In Unsystematic Networks K.Thushara #1, P.Venkata Narayana#2 #1 Student Of M.Tech(S.E) And Department Of Computer Science And Engineering, # 2 Department Of Computer Science And Engineering,

More information

Exploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation

Exploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation Exploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation Abstract Recent progress in active measurement techniques has made it possible to estimate end-to-end path available bandwidth.

More information

Internet Coordinate Systems Tutorial

Internet Coordinate Systems Tutorial Internet Coordinate Systems Tutorial Marcelo Pias marcelo.pias@cl.cam.ac.uk Outline Motivation Problem statement General Approach Techniques Global Network Positioning (GNP) Practical Internet Coordinates

More information

Defending against Eclipse attacks on overlay networks

Defending against Eclipse attacks on overlay networks Defending against Eclipse attacks on overlay networks Atul Singh 1 Miguel Castro 2 Peter Druschel 1 Antony Rowstron 2 1 Rice University, Houston, TX, USA. 2 Microsoft Research, Cambridge, UK. Abstract

More information

Quasi-Chord: physical topology aware structured P2P network

Quasi-Chord: physical topology aware structured P2P network Quasi-Chord: physical topology aware structured PP network UN Mingsong ZHANG Zhongqiu Network Information Center, Harbin University of cience and Technology, China College of Computer ci&tech, Harbin University

More information

Review of the Robust K-means Algorithm and Comparison with Other Clustering Methods

Review of the Robust K-means Algorithm and Comparison with Other Clustering Methods Review of the Robust K-means Algorithm and Comparison with Other Clustering Methods Ben Karsin University of Hawaii at Manoa Information and Computer Science ICS 63 Machine Learning Fall 8 Introduction

More information

Work in Progress: Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning

Work in Progress: Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning Work in Progress: Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning Yongjun Liao, Mohamed Ali Kaafar 2, Bamba Gueye, François Cantin, Pierre Geurts 3, Guy Leduc

More information

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity 546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and

More information

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model HIROMICHI SUGIYAMA YUKINOBU FUKUSHIMA TOKUMI YOKOHIRA The Graduate School of Natural Science

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

DS-Means: Distributed Data Stream Clustering

DS-Means: Distributed Data Stream Clustering DS-Means: Distributed Data Stream Clustering Alessio Guerrieri and Alberto Montresor University of Trento, Italy Abstract. This paper proposes DS-means, a novel algorithm for clustering distributed data

More information

Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks

Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks Tara Small, Baochun Li, and Ben Liang Department of Electrical and Computer Engineering University of Toronto {tsmall, bli}@eecg.toronto.edu,

More information