Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment

Size: px
Start display at page:

Download "Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment"

Transcription

1 Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed, Shervin Shirmohammadi Distributed & Collaborative Virtual Environments Research Laboratory School of Information Technology and Engineering University of Ottawa, Ottawa, Ontario, Canada {dahmed, Abstract Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction. But, the resource constraints such as bandwidth, computing power, energy, etc. and node s mobility give hard challenges to the researchers. Smart content distribution and efficient content discovery are the heart of the p2p protocol that controls the performance of the system. Routing is associated with every task that is expensive in ad hoc environment. In this paper, we address these issues and propose a peer-to-peer system for wireless ad-hoc networks using multi-level hashing to reduce routing overhead. The necessity of multilevel hashing is justified through extensive simulation. Keywords Peer-to-Peer system, Ad hoc network, Performance. I. INTRODUCTION Peer-to-Peer is a distributed network architecture where nodes collaborate with others by sharing their recourses such as processing power, bandwidth, storage capacity, etc. Usually nodes in peer-to-peer system are loosely coupled with each other and play an equal role (client/server) in the system. Due to the autonomous nature of the nodes, it is difficult to construct a consistent peer-to-peer system. In a pure peer-to-peer network, there is no notion of clients or servers, but only equal peers that simultaneously function as both "clients" and "servers" to the other peers on the network [1]. This architecture differs from the client-server architecture where communication is usually to and from a server. FTP is an example of non peer-to-peer file transfer system where the client and server programs are quite distinct, and the clients initiate the download/upload and the servers react to and satisfy these requests. In a peer-to-peer system the removal of any node from the network does significantly affect the offered service from the system while in client/server system it does not make in any sense without a server. Peer-to-Peer system has many significant applications ranging from file sharing to grid computing. Mobile peer-to-peer (MP2P) system faces more constraints as compared to wired peer-to-peer system. Some problems in this network are the scarcity of bandwidth, short lifetime of the nodes due to power constraint, dynamic topology caused by the mobility of nodes. These constraints give hard challenges to the researchers in the various aspects of the peer-to-peer system in ad hoc environments such as routing, content discovering, data retrieval and caching etc. Here we apply chord [2] directly on top of wireless ad hoc peer-to-peer system. The short comings of this deployment are figured out and a distributed mobile peer-to-peer architecture is proposed to handle those problems. Smart content discovery is the heart of peer-to-peer system. In ad hoc network routing is expensive, so it requires more effective content discovery process. In this paper, we use two-level distributed hashing scheme. First level hash maps a content request to a region that greatly reduces routing overhead. Second level hash discovers content location after redirecting the request to that region. The effectiveness of two-level hashing in wireless ad hoc peer-to-peer system is tested through simulation. The rest of the paper is organized as follows. Mobile peer-to-peer architecture and related work are discussed in Section II. We present multi-level hashbased wireless ad hoc peer-to-peer architecture in Section III. Section IV covers simulation results. Finally in Section V, we draw the conclusion. In this paper, mobile p2p and p2p in wireless ad hoc networks are used interchangeably. II. RELATED WORK Peer-to-Peer can be benefited from some inherent features such as scalability, dynamic adaptation, permanency, fault tolerance, anonymity and self configuration, etc. But the effectiveness of these features depends on how well system assigns peer names and locates the peers and data items. The organization of peer-to-peer topology and efficient data placement on peers require some strategy. Hashing is the most popular and effective method [3][4][5]. It assigns unique key to the peers and data items in the same address space to control the topology and data retrieval. This technique protects obscurity of nodes and data items. These architectures are called hash-based structured peer-to-peer (HS-P2P) system. The general strategy is to store a data item with a hash value k at a node whose hash value is the closest to k. So when there is a request, it is forwarded to the intermediate peers whose hash values are closer and closer to k. In this architecture each node maintains necessary state information for routing to locate the targeted node in the system. A state-pair has a form like <hash key, network address>. A scalable and robust peer-to-peer system depends upon sophisticated state management that must be distributed. Bristle [6] recognizes participating nodes either as mobile nodes or stationary nodes that follows Tornado peer-to-peer architecture [3]. Stationary node provides location information of mobile nodes to an interested node. Bristle 2 requires O(log N) hops to send a message from the source

2 to the destination, where N is the number of nodes in the system. It is a HS-P2P system that allows nodes to change their attachment without re-assigning new states. With the help of mobile IP, old state can be retained. Limited power, low bandwidth and limited computing capability (Handheld devices) are the major concerns for wireless ad hoc peer-topeer system. Thus bad design may initiate performance penalty. Moreover, the characteristics of mobile devices are not in favor of client-server architecture. M-CAN [8], a lookup protocol, is an extension of content addressable network [7]. Instead of file transferring and caching, M-CAN applies registering and grouping policy to avoid bandwidth reserving. Centralized Directory Protocol (CDP) maintains a central server. The peer who wants to share a file publishes it to the central server. If a peer would like to use a shared content, it sends a request to the central server. Upon receiving the request, server checks it directory and returns the best result back to the peer. After that, file accessing can be handled between the two peers directly. The central server would be the point of bottleneck with an increased number of peers that is hard to scale. In flooded request protocol, every peer has the information of its neighbors. Publication of information is absent here. Thus peer s request is flooded in the system until it is reached to it maximum hop value or it is answered. It consumes too much bandwidth and energy, and thus not suitable in ad hoc environment. In document routing, protocol assigns unique ID to each peer chosen from a random pool. It assumes that peer has the knowledge of neighbor s contents. Here IDs are given to the shared files based on the document itself. It is then stored to a peer that has an ID closest to the document ID. The node that follows the path to the targeted node also keeps a copy. This algorithm is not suitable for wireless ad hoc peer-to-peer system due to its storage and bandwidth limitations. Moreover it is impractical to store multiple copies of a file when memory is a prime concern. caching scheme in mobile peer-to-peer environment. It caches data among a set of peers based on some criteria such as popularity of the content, size of the content and distance to the owner of the item [12]. PReCinCt uses a composite caching policy. But it does not tell anything about the mobility of the nodes. III. MULTI-LEVEL HASHING IN WIRELESS AD HOC PEER-TO-PEER SYSTEMS The effectiveness of multi-level hashing in wireless ad hoc environment is elucidated with the help of two-level hashing. The entire system consists of a set of home regions where peers in close proximity form home region. Each home region has a representative that plays a supporting to make the system operational. These representatives are not fixed and altered over the time considering the ad hoc issues of the system. Figure 1 depicts a logical scenario of such a system. Home region is identified by the Home-Region-ID. The representative functions as a rendezvous point for incoming requests and also provides useful information to its local peers. In the following subsections, we describe the working principles of wireless ad hoc peer-to-peer system in detail. A. Wireless Ad Hoc Peer-to-Peer System Node Join In the system, a peer is identified by unique identification number. In ad hoc networks, nodes are mobile and can roam from one region to another region. So, in order to reduce routing overhead, we use a pair, <Home-Region-ID, Node-ID>, to identify a node. Hash function generates Node- ID; mathematically Node-ID = H l (Node-Address) and Home- Region-ID depends on its location that may change over time. Logical layout of nodes in a home region Peer Local Region Figure 1. Logical architecture of mobile peer-to-peer system Caching improves data retrieval performance in mobile peer-to-peer system [9] at the expense of memory. This policy saves computing power and bandwidth. In cooperative caching, peers can access data from their neighbors. So, to accelerate the overall performance researchers are now focusing on designing new caching schemes suitable for ad hoc environment. Cooperative caching schemes have been studied for wired environment to improve the performance of web caching or web proxies [1][11]. PReCinCt (Proximity Region for Caching in Cooperative Mobile P2P Network) is a Figure 2. The entire logical mobile peer-to-peer architecture There are two ways to learn about home region representative. In one approach, the home region representative periodically broadcasts its own identity (address) and Home-Region-ID. In other approach, joining node explicitly floods Home-Region-Search-Request. This is a controlled flood not flooded to the entire system. A node does not forward the request when it already has the answer of the request. A joining node may get multiple responses based on its location. It marks the response that is the minimum hops away. The joining node confirms the representative for its inclusion to the system. It gets the identity of its successor and predecessor from this representative. The joining node can unambiguously

3 determine its Node-ID using the hash function H l. Hence the joining node is only concern about its Home-Region-ID, its successor and its predecessor. In this way a new node adjust itself to the system. A layout of the wireless ad hoc peer-topeer system resembles to Figure 2. Due to the space limitations, we discarded the sequence diagram that shows every steps of a signup process. B. Wireless Ad Hoc P2P System Content Publishing Contents and nodes are mapped to the same address space. The name of the content is hashed to generate an n-bit number, called the key. But, we need two hash functions providing two keys. One key is used to map the content name to a home region and other key to determine the successor in a particular region, i.e. the actual node where content information has to be stored. Mathematically, key r = H r (Content-Name ) and key s =H l (Content-Name). First key, key r, is used to determine the home region where content has to be published. discover a content, he first hashes to get key r using H r (Content-Name). This key represents the home region where the content information is stored. Node gets the address of foreign representative with the help of local representative as the protocol allows local representative to broadcast home regions addresses in its periodic keep-alive messages. If the content is not in local region, the request is delegated to the foreign representative. Second key, key s, plays a significant role when the content discovering process has been shifted to the appropriate region. We applied chord like content searching process with modified finger table in local region. Lookup can proceed as follows. Based on key r, either the initiating node or the foreign representative sends a packet to its successor containing requester s physical address and the key, key s. The packet is circulated around the logical circle until it locates the successor or it fails , Index distribution In local region Node Identifier 21 Active node Index distribution in foreign region Figure 3. Tuple distribution process (The representative is also a member of logical structure) The content publisher first builds a tuple consisting of <Content-Name, Own-Address> and then asks local representative to store the tuple. Local representative transport the tuple to the foreign region. But it may happen that content has to be stored in the local region based on the key r. We define the function successor(key s ) as the node identifier of the first actual node following key s around the circle clockwise. At a particular region, the successor of the content is determined using key s and the representative initiates tuple storing process. In this way, the index is distributed over the nodes at random. One of the shortcomings in this environment is node s ad hoc nature. To recover from such unwanted events protocol deploys multiple hash functions to store tuple in multiple nodes. Figure 3 is an example of simple tuple storing process. C. Wireless Ad Hoc P2P System Content Discovering Now it is easy to discover contents as nodes and contents are mapped to the same address space. If a user wishes to Start Node 1 s finger table (Step size 8) Physical address of successor Figure 4. Modified finger table for mobile peer-to-peer system In order to speed up the searching process, some techniques have already been proposed. In one optimization, each node holds the physical addresses of both its successor and its predecessor. Even with two choices of direction, linearly searching all the nodes is very inefficient in a large peer-to-peer system since the mean number of nodes required per search is n/2 which is still a big number. Chord uses finger table to speed up searching process. If the hash address space is too large as compared to the number of peers in the system, the most of the entries in finger table point to the same actual node, and that actually searches the key in a

4 linear way. Let hash key is 128-bit long. Thus its address space is 3.4e38. If we allow 1 2 peers in the system, on an average there is a gap of 3.4e18 between two active nodes. As a result, most entries of the finger table point to the same successor. This is really a big issue in ad hoc networks where routing is expensive. We propose two approaches to construct finger table for wireless ad hoc environments. In the first design, the finger table is slightly different than it is in chord. The finger table has m entries, indexed by through m-1. It is divided into two halves: to m/2 and m/2 to (m-1). Each entry has two fields, namely start and the physical address of successor(start). The values of the fields for entry i at node k for the first half of the table are: start = k + 2 i mod 2 m, where i < m/2 Physical address of successor(start[i]) So, first half table covers k to k+2 m-1 address space. We define step-size as a big number to jump more rapidly. The entries of the second half of the table are incremented by the step size starting from k+2 m-1 +step-size. Similarly we have corresponding physical addresses of the successors. Figure 4 depicts a finger table considering above approach. In second approach, we use the following formula to determine the start and the physical address of the successor; mathematically, start = (k + a i ) mod 2 n,where i< m/2 Physical address of successor(start[i]) Here, a is a constant and we have n-bit hash value. One possible choice for the value of a is the index of finger table, i.e. it increase at a rate of i i [1 1, 2 2, 3 3 ]. These two approaches perform well when the number of peers is too small as compared to the address space; otherwise we prefer the usual one. D. Wireless Ad Hoc P2P System Important Issues Different issues such as routing policy, caching scheme, node s mobility, transient behavior of nodes, and representative selection criteria should be considered for wireless ad hoc peer-to-peer system to work. There are many routing algorithms for mobile ad hoc networks. For interregion and intra-region routing purposes, we use geographical routing protocol like GPSR [13] and greedy routing algorithm respectively. In greedy forwarding, there may be a situation where a packet arrives at a node that does not have neighbors offering progress to the destination. This situation can be handled by applying a modification of the right hand rule, e.g. Face routing. The key idea is to traverse the boundaries of the gap until greedy can be resumed. Greedy-Face-Greedy routing is a good solution for intra-region routing [14]. Caching improves the data retrieval overhead. It saves computing power and reduces bandwidth requirement at the expense of memory. Cooperative caching schemes have been studied to improve the performance of web caching or web proxies. In our current multi-level hashing scheme, we ignored the caching policy. As long as a peer is inside a region, there is no overhead associated with the movement. But, when a peer moves across a region, it has to do some house keeping jobs. The departing node must hands over the keys to its successor. This departing node then re-initiates joining process in the new region. Due to the shortage of energy or some other reasons, a node might quit from a peerto-peer system. In that case, that node must also hand over all its keys to its successor. Otherwise, keys will be lost. In that case, publishers have to publish their contents periodically with an increased overhead. There are some choices to deal with the representatives. In one approach, we considered that there is a representative available in each region provided by a company. If this is the case, representatives are fixed and hence reduce the communication overhead. Otherwise, representative has to be selected from a set of nodes for each region in round-robin fashion with an increased control overhead and this change of representative has to be announced to make a consistent p2p system. IV. EXPERIMENTAL RESULTS The objective of multi-level hashing architecture for wireless ad hoc peer-to-peer system is to reduce routing overhead. Routing in ad hoc network is expensive as compared to the routing in wired environment. We first applied chord directly on top of wireless ad hoc network. This experiment was carried out in an environment of 1*1 square units. Some parameters related to this experiment are given in the Table 1 (Setup 1). Table 1. Simulation setup for chord in wireless ad hoc p2p system Parameter Setup - 1 Setup - 2 Deployment area 1 1 square units 1 1 square units Node s velocity 4 unit per second 1 4 unit per second Node s transmission radius 8 unit 8 unit Content per node 3 3 Greedy Routing Greedy Routing Routing algorithm Algorithm 2 Algorithm Modulo Hash function Message Digest 5 (32-bit Number) 1 Probability of movement is.2 and node can move in any direction. 2 Greedy routing algorithm may stop at local maximum which implies unsuccessful routing. Those cases are discarded in simulation result. Hop Distance Routing Cost Search Cost Figure 5. Performance of chord in ad hoc network

5 We assume that all nodes in an ad hoc network are not involved in a peer-to-peer system. We estimated search cost and routing cost of chord for peer-to-peer system in wireless ad hoc network. Search cost means how many peers are involved in a particular content discovering process while routing cost considers all ad hoc nodes that are involved in content discovering process including the forwarding nodes. Chord in wireless ad hoc network is not suitable as a peer-topeer system because of its high routing cost (Figure 5). Moreover, if the number of peers is too small as compared to the hash address space, finger table has little contribution in content discovering process. That eventually increases search cost as well as routing cost. Two-level hashing presented in this paper is tested and compared with chord for wireless ad hoc p2p system. Table 1 (Setup 2) shows the simulation environment for this particular experiment. For the sake of fair experiment, we ignored finger table in both approaches. This is because we can deploy any variant of finger table in both approaches. One an average, chord requires 1 to 12 times more searching cost than our two-level hashing approach (Figure 6). Content searching cost is reduced as we divide the entire topology into multiple small regions and first level hash makes it possible to explore the content into that small region. Ratio of search cost Figure 6. Search cost Two-level hashing vs. chord in wireless ad hoc p2p system Ratio of routing cost Figure 7. Routing cost Two-level hashing vs. chord in wireless ad hoc p2p system We also compared the routing cost for both approaches with the same experimental setup. It shows that chord requires 5 times more routing cost than two-level hashing scheme on an average (Figure 7). Chord is a logical topology. It has no knowledge of the physical structure. Request is redirected to a node that is logically close but physically far away. This is also true in two-level hashing approach when it enters in a local region. But its logical ring is composed of close proximity nodes as compared to one level hashing in chord. Hence it reduces routing cost to a large extent. Hence proves the requirement of multi-level hashing. V. CONCLUSION With the advancement in mobile computing and the popularity of mobile devices, peer-to-peer communication in ad hoc networks is likely to boom soon. But, designing a peer-to-peer system suitable for wireless ad hoc networks is really difficult considering the resource constraints and the lack of infrastructure in this field. In this paper, we present a two-level hashing scheme for wireless ad hoc peer-to-peer system. It shows that the performance of the system will be increased once we have multi-level hashing in terms of searching cost and routing overhead. Modified finger tables works well when the number of peers is too small as compared to the hash address space. REFERENCES [1] [2] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications, In ACM SIGCOMM, pages , August 21. [3] H.-C. Hsiao and C.-T. King. Capability-Aware Peer-to-Peer Storage Networks, In Int l Parallel and Distributed Processing Symposium, April 23. [4] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A Scalable Content-Addressable Network, In ACM SIGCOMM, pages , August 21. [5] A. Rowstron and P. Druschel. Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems, In Proc. of the IFIP/ACM Int l Conf. on Distributed Systems Platforms (Middleware 21), Nov. 21. [6] Hung-Chang Hsiao, Chung-Ta King. "Bristle: A Mobile Structured Peer-to-Peer Architecture," In International Parallel and Distributed Processing Symposium (IPDPS'3), 23. [7] Sylvia Ratnasamy et al, A Scalable Content-Addressable Network, In Proceedings of the ACM SIGCOMM, 21. [8] Gang Peng, Shanping Li, Hairong Jin, Tianchi Ma. "M-CAN: a Lookup Protocol for Mobile Peer-to-Peer Environment," In the International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN'4), 24. [9] H. Shen, M. Kumar, S.K. Das, and Z. Wang, Energy-Efficient Caching and Prefetching with Data Consistency in Mobile Distributed Systems, In Proc. of IEEE International Parallel and Distributed Processing symposium (IPDPS), Santa Fe, NM, April 24. [1] L. Fan, Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol, In Proceedings of ACM SIGCOMM Conf., ACM Press, [11] P. Sarkar, and J. H. Hartman, Hint-based cooperative caching, ACM Transactions on Computer Systems, volume 18, number 4, pages , 2. [12] Huaping Shen, Mary Suchitha Joseph, Mohan Kumar, Sajal K. Das. "PReCinCt: A Scheme for Cooperative Caching in Mobile Peer-to-Peer Systems," In the 19th IEEE IPDPS, 25. [13] B. Karp, and H. T. Kung, GPSR: Greedy Perimeter Stateless Routing for Wireless Networks, In Proc. of the ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom 2), August 2. [14] S. Datta, I. Stojmenovic, and J. Wu., Internal Node and Shortcut Based Routing with Guaranteed Delivery in Wireless Networks, In Cluster Computing 5, pages Kluwer Academic Publishers, 22.

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Y. Charlie Hu, Saumitra M. Das, and Himabindu Pucha Purdue University West Lafayette, IN 47907 {ychu, smdas, hpucha}@purdue.edu Abstract

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

Distributed Lookup in Structured Peer-to-Peer Ad-Hoc Networks

Distributed Lookup in Structured Peer-to-Peer Ad-Hoc Networks Distributed Lookup in Structured Peer-to-Peer Ad-Hoc Networks Raphaël Kummer, Peter Kropf, and Pascal Felber Computer Science Department, University of Neuchâtel, Emile-Argand 11, CP 158,CH-2009 Neuchâtel,

More information

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

Athens University of Economics and Business. Dept. of Informatics

Athens University of Economics and Business. Dept. of Informatics Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service

More information

Peer Clustering and Firework Query Model

Peer Clustering and Firework Query Model Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

A Distributed Codec Placement Algorithm for Network-Embedded FEC

A Distributed Codec Placement Algorithm for Network-Embedded FEC A Distributed Codec Placement Algorithm for Network-Embedded FEC Mingquan Wu and Hayder Radha Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48823 {wumingqu,

More information

Efficient Peer-to-Peer Information Sharing over Mobile Ad Hoc Networks

Efficient Peer-to-Peer Information Sharing over Mobile Ad Hoc Networks Efficient Peer-to-Peer Information Sharing over Mobile Ad Hoc Networks Mei Li Wang-Chien Lee Anand Sivasubramaniam Department of Computer Science and Engineering Pennsylvania State University University

More information

Mill: Scalable Area Management for P2P Network based on Geographical Location

Mill: Scalable Area Management for P2P Network based on Geographical Location Mill: Scalable Area Management for PP Network based on Geographical Location MATSUURA Satoshi sato-mat@is.naist.jp FUJIKAWA Kazutoshi fujikawa@itc.naist.jp SUNAHARA Hideki suna@wide.ad.jp Graduate School

More information

Subway : Peer-To-Peer Clustering of Clients for Web Proxy

Subway : Peer-To-Peer Clustering of Clients for Web Proxy Subway : Peer-To-Peer Clustering of Clients for Web Proxy Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute

More information

Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Location-aware In-Network Monitoring in Wireless Sensor Networks

Location-aware In-Network Monitoring in Wireless Sensor Networks Location-aware In-Network Monitoring in Wireless Sensor Networks Volker Turau and Christoph Weyer Department of Telematics, Technische Universität Hamburg-Harburg Schwarzenbergstraße 95, 21073 Hamburg,

More information

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)

More information

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

: Scalable Lookup

: Scalable Lookup 6.824 2006: Scalable Lookup Prior focus has been on traditional distributed systems e.g. NFS, DSM/Hypervisor, Harp Machine room: well maintained, centrally located. Relatively stable population: can be

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks

An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks 2015 Fifth International Conference on Advanced Computing & Communication Technologies An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

CIS 700/005 Networking Meets Databases

CIS 700/005 Networking Meets Databases Announcements CIS / Networking Meets Databases Boon Thau Loo Spring Lecture Paper summaries due at noon today. Office hours: Wed - pm ( Levine) Project proposal: due Feb. Student presenter: rd Jan: A Scalable

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks

Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks David R. Karger 1 and Matthias Ruhl 2 1 MIT Computer Science and Artificial Intelligence Laboratory Cambridge,

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

Improved Dominating Set Indices for Mobile Peer-to-Peer Networks

Improved Dominating Set Indices for Mobile Peer-to-Peer Networks Improved Dominating Set Indices for Mobile Peer-to-Peer Networks Shanping Li, Wei Shi, Xin Lin, and Channa Nizamuddin College of Computer Science Zhejiang University Hangzhou, P.R.China 310027 shan@cs.zju.edu.cn,

More information

Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks*

Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks* Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks* Eunyoung Kang 1, Yongsoon Im 2, and Ungmo Kim 1 1 School of Computer Engineering, Sungkyunkwan University, 440-776, Suwon, Gyeonggi-do,

More information

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Graph Algorithms. Many problems in networks can be modeled as graph problems. Graph Algorithms Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm

More information

A Survey of Peer-to-Peer Content Distribution Technologies

A Survey of Peer-to-Peer Content Distribution Technologies A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems

Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems George Fletcher Project 3, B649, Dr. Plale July 16, 2003 1 Introduction One of the key requirements for global level scalability

More information

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS Dr.N.Kumareshan 1, Mr.N.Prakash 2 2 Assistant Professor (SG), 2 Assistant Professor 1,2 Department of ECE, 1 Sri Shakthi Institute

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Graph Algorithms. Many problems in networks can be modeled as graph problems. Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm - Efficient

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

L3S Research Center, University of Hannover

L3S Research Center, University of Hannover , University of Hannover Structured Peer-to to-peer Networks Wolf-Tilo Balke and Wolf Siberski 3..6 *Original slides provided by K. Wehrle, S. Götz, S. Rieche (University of Tübingen) Peer-to-Peer Systems

More information

Scalable and Self-configurable Eduroam by using Distributed Hash Table

Scalable and Self-configurable Eduroam by using Distributed Hash Table Scalable and Self-configurable Eduroam by using Distributed Hash Table Hiep T. Nguyen Tri, Rajashree S. Sokasane, Kyungbaek Kim Dept. Electronics and Computer Engineering Chonnam National University Gwangju,

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

Streaming Live Media over a Peer-to-Peer Network

Streaming Live Media over a Peer-to-Peer Network Streaming Live Media over a Peer-to-Peer Network Technical Report Stanford University Deshpande, Hrishikesh Bawa, Mayank Garcia-Molina, Hector Presenter: Kang, Feng Outline Problem in media streaming and

More information

A DHT-Based Grid Resource Indexing and Discovery Scheme

A DHT-Based Grid Resource Indexing and Discovery Scheme SINGAPORE-MIT ALLIANCE SYMPOSIUM 2005 1 A DHT-Based Grid Resource Indexing and Discovery Scheme Yong Meng TEO 1,2, Verdi March 2 and Xianbing Wang 1 1 Singapore-MIT Alliance, 2 Department of Computer Science,

More information

L3S Research Center, University of Hannover

L3S Research Center, University of Hannover , University of Hannover Dynamics of Wolf-Tilo Balke and Wolf Siberski 21.11.2007 *Original slides provided by S. Rieche, H. Niedermayer, S. Götz, K. Wehrle (University of Tübingen) and A. Datta, K. Aberer

More information

Query Processing Over Peer-To-Peer Data Sharing Systems

Query Processing Over Peer-To-Peer Data Sharing Systems Query Processing Over Peer-To-Peer Data Sharing Systems O. D. Şahin A. Gupta D. Agrawal A. El Abbadi Department of Computer Science University of California at Santa Barbara odsahin, abhishek, agrawal,

More information

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility Rubén Cuevas, Carmen Guerrero, Ángel Cuevas, María Calderón, Carlos J. Bernardos Departamento de Ingeniería Telemática, Universidad

More information

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 6, 2013 ISSN (online): 2321-0613 Integrated Demand (IRA-ODGR) for MANET M J.Kalaiselvi 1 K.Sathishkumar 2 1 M.E. Student,

More information

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Relaxing Routing Table to Alleviate Dynamism in P2P Systems Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,

More information

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Computer Communications and Networking (SC 546) Professor D. Starobinksi Brian Mitchell U09-62-9095 James Nunan U38-03-0277

More information

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks Pericles Lopes Ronaldo A. Ferreira pericles@facom.ufms.br raf@facom.ufms.br College of Computing, Federal University of Mato Grosso

More information

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Haiying Shen and Cheng-Zhong Xu, Wayne State University, Detroit, MI 48202 Guihai Chen, Nanjing University, Nanjing, China {shy,czxu,gchen}@ece.eng.wayne.edu

More information

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing 309 Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing Sinchan Roychowdhury Instrumentation Control Engineering Calcutta Institute of Engineering & Management Kolkata, India

More information

Evolution of Peer-to-peer algorithms: Past, present and future.

Evolution of Peer-to-peer algorithms: Past, present and future. Evolution of Peer-to-peer algorithms: Past, present and future. Alexei Semenov Helsinki University of Technology alexei.semenov@hut.fi Abstract Today peer-to-peer applications are widely used for different

More information

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Kunwoo Park 1, Sangheon Pack 2, and Taekyoung Kwon 1 1 School of Computer Engineering, Seoul National University, Seoul, Korea

More information

A New Packet Forwarding Algorithm in Geographical Location Based Mobile Ad Hoc Routing Protocol

A New Packet Forwarding Algorithm in Geographical Location Based Mobile Ad Hoc Routing Protocol roceedings of the 5th WSEAS International Conference on Applied Computer Science, Hangzhou, China, April 16-18, 2006 (pp165-170) 1,2 A New acket Forwarding Algorithm in Geographical Location Based Mobile

More information

Replacing Failed Sensor Nodes by Mobile Robots

Replacing Failed Sensor Nodes by Mobile Robots Replacing Failed Sensor Nodes by Mobile Robots Yongguo Mei, Changjiu Xian, Saumitra Das, Y. Charlie Hu and Yung-Hsiang Lu Purdue University, West Lafayette {ymei, cjx, smdas, ychu, yunglu}@purdue.edu Abstract

More information

Chord-based Key Establishment Schemes for Sensor Networks

Chord-based Key Establishment Schemes for Sensor Networks Chord-based Key Establishment Schemes for Sensor Networks Fan Zhang, Zhijie Jerry Shi, Bing Wang Department of Computer Science and Engineering, University of Connecticut, Storrs, CT 06269 Abstract Because

More information

Structured Peer-to-Peer Networks

Structured Peer-to-Peer Networks Structured Peer-to-Peer Networks The P2P Scaling Problem Unstructured P2P Revisited Distributed Indexing Fundamentals of Distributed Hash Tables DHT Algorithms Chord Pastry Can Programming a DHT Graphics

More information

Evaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays

Evaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays Journal of Computer Science (): xx-xx, ISS 49-66 Science Publications Evaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays Surya Bahadur Kathayat,

More information

Load Balancing in Structured P2P Systems

Load Balancing in Structured P2P Systems 1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica fananthar, karthik, sonesh, karp, istoicag@cs.berkeley.edu Abstract Most P2P systems

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

Security Considerations for Peer-to-Peer Distributed Hash Tables

Security Considerations for Peer-to-Peer Distributed Hash Tables Security Considerations for Peer-to-Peer Distributed Hash Tables Emil Sit and Robert Morris Laboratory for Computer Science, MIT 200 Technology Square, Cambridge, MA 02139, USA {sit,rtm}@lcs.mit.edu Abstract.

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

INFORMATION MANAGEMENT IN MOBILE AD HOC NETWORKS

INFORMATION MANAGEMENT IN MOBILE AD HOC NETWORKS INFORMATION MANAGEMENT IN MOBILE AD HOC NETWORKS Mansoor Mohsin Ravi Prakash Department of Computer Science The University of Texas at Dallas Richardson, TX 75083-0688 {mmohsin,ravip}@utdallas.edu Abstract

More information

Understanding Chord Performance

Understanding Chord Performance CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations. Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley

More information

A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications

A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications Oliver Haase, Alfred Toth, and Jürgen Wäsch HTWG Konstanz - University of Applied Sciences, Constance, Germany Abstract. We propose

More information

APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing

APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing ABSTRACT Warren Kenny Distributed Systems Group Department of Computer Science Trinity College, Dublin, Ireland kennyw@cs.tcd.ie Current

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

CS 347 Parallel and Distributed Data Processing

CS 347 Parallel and Distributed Data Processing CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 9: Peer-to-Peer Systems Previous Topics Data Database design Queries Query processing Localization Operators Optimization Transactions

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

PEER-TO-PEER (P2P) systems are now one of the most

PEER-TO-PEER (P2P) systems are now one of the most IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 1, JANUARY 2007 15 Enhancing Peer-to-Peer Systems Through Redundancy Paola Flocchini, Amiya Nayak, Senior Member, IEEE, and Ming Xie Abstract

More information

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Hong-Jong Jeong, Dongkyun Kim, Jeomki Song, Byung-yeub Kim, and Jeong-Su Park Department of Computer Engineering, Kyungpook

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Priority Based Routing for Mobile Peer-To-Peer Communications

Priority Based Routing for Mobile Peer-To-Peer Communications San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research 2009 Priority Based Routing for Mobile Peer-To-Peer Communications Swathi Venugopal San Jose State University

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Debunking some myths about structured and unstructured overlays

Debunking some myths about structured and unstructured overlays Debunking some myths about structured and unstructured overlays Miguel Castro Manuel Costa Antony Rowstron Microsoft Research, 7 J J Thomson Avenue, Cambridge, UK Abstract We present a comparison of structured

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Haiying Shen and Cheng-Zhong Xu Department of Electrical & Computer Engg. Wayne State University, Detroit, MI 48202 {shy,czxu}@ece.eng.wayne.edu

More information

Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd

Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd Ken Y.K. Hui John C. S. Lui David K.Y. Yau Dept. of Computer Science & Engineering Computer Science Department The Chinese

More information