Lecture Notes in Computer Science 3279

Size: px
Start display at page:

Download "Lecture Notes in Computer Science 3279"

Transcription

1 Lecture Notes in Computer Science 3279 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos New York University, NY, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

2 Geoffrey M. Voelker Scott Shenker (Eds.) Peer-to-Peer Systems III Third International Workshop, IPTPS 2004 La Jolla, CA, USA, February 26-27, 2004 Revised Selected Papers 13

3 Volume Editors Geoffrey M. Voelker University of California, San Diego Department of Computer Science and Engineering 9500 Gilman Dr., MC 0114, La Jolla, CA , USA Scott Shenker University of California, Berkeley Computer Science Division, EECS Department 683 Soda Hall, 1776, Berkeley, CA 94720, USA Library of Congress Control Number: Applied for CR Subject Classification (1998): C.2.4, C.2, H.3, H.4, D.4, F.2.2, E.1, D.2 ISSN ISBN X Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com Springer-Verlag Berlin Heidelberg 2004 Printed in Germany Typesetting: Camera-ready by author, data conversion by Olgun Computergrafik Printed on acid-free paper SPIN: /

4 Preface On February 26 27, 2004, the 3rd International Workshop on Peer-to-Peer Systems (IPTPS 2004) brought researchers and practitioners together to discuss the latest developments in peer-to-peer technologies, applications, and systems. As the third workshop in the series, IPTPS 2004 continued the success of the previous workshops in pioneering the state of the art in peer-to-peer systems and identifying key research challenges in the area. The workshop received 145 submissions in the form of five-page position papers. As with previous workshops, submissions went through two rounds of reviews by an international program committee of 14 experts from industry and academia. In the first round each submission received two reviews. In the second round we focused our attention on submissions with either positive reviews, or with reviews that expressed substantially different opinions. In addition to the technical merit, the reviewing process emphasized originality and the potential of the submission to lead to interesting discussions during the workshop. In the end, the program committee selected a workshop program of 27 papers covering a wide range of topics including new peer-to-peer applications, advances in routing, load balancing, searching, as well as transport, mobility, and other networking topics. Authors revised accepted position papers to six pages for the workshop program, and made a final round of revision for this volume. The workshop was composed of eight sessions that spanned two days. To focus discussions, attendance was limited to 67 participants and included substantial time for interaction and discussion between sessions and at social events. A hallmark of the IPTPS workshops is that they serve as a crossroads for researchers to gather from many disciplines and communities, including systems, networking, databases, theory, and scientific computing. The workshop this year continued the trend with lively discussions and insight provided by researchers from these many fields. The workshop would not have been a success without substantial help from a variety of people. First, we thank the program committee for their dedication and effort during an intense reviewing period spanning the winter holidays. The high quality and diversity of the program is due to their insight, experience, and commitment. We would also like to thank Jennifer Anderson for the outstanding local arrangements at the Sea Lodge in La Jolla, Marvin McNett for system administrative support for the IPTPS 2004 Web server, and Michelle Panik for assistance with formatting this volume. And we graciously thank our sponsors, Microsoft Research and Intel, for their continued generous support of the IPTPS workshops. This volume includes a report on the discussions during the technical sessions. This report conveys the interactions during the workshop beyond the material included in position papers and presented in talks. We thank Sumeet Singh,

5 VI Preface Sriram Ramabhadran, and Kiran Tati for diligently taking notes during the workshop and collecting them into this report. Finally, we thank all authors who submitted papers to the workshop for continuing to make peer-to-peer computing a vibrant research community, the authors of accepted papers for their ideas and contributions to the area, the speakers for spirited and engaging talks, and all participants for making the workshop a success. March 2004 Geoffrey M. Voelker and Scott Shenker

6 Workshop Co-chairs Scott Shenker Geoffrey M. Voelker ICSI and UC Berkeley, USA UC San Diego, USA Program Committee Steve Gribble John Kubiatowicz Michael Mitzenmacher Sylvia Ratnasamy Srini Seshan Alex Snoeren Robbert van Renesse Dan Wallach Roger Wattenhofer Alec Wolman Zhichen Xu Zheng Zhang University of Washington, USA UC Berkeley, USA Harvard University, USA Intel Research, USA CMU, USA UC San Diego, USA Cornell, USA Rice University, USA ETH Zurich, Switzerland Microsoft Research, USA HP Labs, USA Microsoft Research, China Steering Committee Peter Druschel Frans Kaashoek Antony Rowstron Scott Shenker Ion Stoica Rice University, USA MIT, USA Microsoft Research, UK ICSI and UC Berkeley, USA UC Berkeley, USA Administrative Assistant Jennifer Anderson UC San Diego, USA Sponsoring Institutions

7 Table of Contents Workshop Report for the 3rd International Workshop on Peer-to-Peer Systems... 1 Sriram Ramabhadran, Sumeet Singh, and Kiran Tati I Miscellaneous A Practical Distributed Mutual Exclusion Protocol in Dynamic Peer-to-Peer Systems Shi-Ding Lin, Qiao Lian, Ming Chen, and Zheng Zhang On the Cost of Participating in a Peer-to-Peer Network Nicolas Christin and John Chuang 2 P2P or Not 2 P2P? Mema Roussopoulos, Mary Baker, David S.H. Rosenthal, Thomas J. Giuli, Petros Maniatis, and Jeff Mogul II Networking On Transport Layer Support for Peer-to-Peer Networks Hung-Yun Hsieh and Raghupathy Sivakumar Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming Venkata N. Padmanabhan, Helen J. Wang, and Philip A. Chou Rapid Mobility via Type Indirection Ben Y. Zhao, Ling Huang, Anthony D. Joseph, and John Kubiatowicz P6P: A Peer-to-Peer Approach to Internet Infrastructure Lidong Zhou and Robbert van Renesse III Routing Comparing the Performance of Distributed Hash Tables Under Churn Jinyang Li, Jeremy Stribling, Thomer M. Gil, Robert Morris, and M. Frans Kaashoek DHT Routing Using Social Links Sergio Marti, Prasanna Ganesan, and Hector Garcia-Molina

8 X Table of Contents When Multi-hop Peer-to-Peer Lookup Matters Rodrigo Rodrigues and Charles Blake IV Load Balancing and Searching Uncoordinated Load Balancing and Congestion Games in P2P Systems Subhash Suri, Csaba D. Tóth, and Yunhong Zhou Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems David R. Karger and Matthias Ruhl The Case for a Hybrid P2P Search Infrastructure Boon Thau Loo, Ryan Huebsch, Ion Stoica, and Joseph M. Hellerstein Making Peer-to-Peer Keyword Searching Feasible Using Multi-level Partitioning Shuming Shi, Guangwen Yang, Dingxing Wang, Jin Yu, Shaogang Qu, and Ming Chen V Miscellaneous Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Alan Mislove and Peter Druschel Willow: DHT, Aggregation, and Publish/Subscribe in One Protocol Robbert van Renesse and Adrian Bozdog Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, and Yi-Min Wang Spurring Adoption of DHTs with OpenHash, a Public DHT Service Brad Karp, Sylvia Ratnasamy, Sean Rhea, and Scott Shenker VI Applications UsenetDHT: A Low Overhead Usenet Server Emil Sit, Frank Dabek, and James Robertson Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec, and L. Massoulié

9 Table of Contents XI Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet Virginia Lo, Daniel Zappala, Dayi Zhou, Yuhong Liu, and Shanyu Zhao VII Security Robust Distributed Name Service Baruch Awerbuch and Christian Scheideler Peer-to-Peer Authentication with a Distributed Single Sign-On Service William K. Josephson, Emin Gün Sirer, and Fred B. Schneider Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks Antonio Nicolosi and David Mazières VIII Routing Know Thy Neighbor s Neighbor: Better Routing for Skip-Graphs and Small Worlds Moni Naor and Udi Wieder SmartBoa: Constructing p2p Overlay Network in the Heterogeneous Internet Using Irregular Routing Tables Jingfeng Hu, Ming Li, Weimin Zheng, Dongsheng Wang, Ning Ning, and Haitao Dong Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks David R. Karger and Matthias Ruhl Author Index...299

Lecture Notes in Computer Science 7323

Lecture Notes in Computer Science 7323 Lecture Notes in Computer Science 7323 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 5454

Lecture Notes in Computer Science 5454 Lecture Notes in Computer Science 5454 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 3130

Lecture Notes in Computer Science 3130 Lecture Notes in Computer Science 3130 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 3293

Lecture Notes in Computer Science 3293 Lecture Notes in Computer Science 3293 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 5742

Lecture Notes in Computer Science 5742 Lecture Notes in Computer Science 5742 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Advances in Artificial Reality and Tele-Existence

Advances in Artificial Reality and Tele-Existence Zhigeng Pan Adrian Cheok Michael Haller Rynson W.H. Lau Hideo Saito Ronghua Liang (Eds.) Advances in Artificial Reality and Tele-Existence 16th International Conference on Artificial Reality and Telexistence,

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Lecture Notes in Computer Science 3933

Lecture Notes in Computer Science 3933 Lecture Notes in Computer Science 3933 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Real-Time Graphics Rendering Engine

Real-Time Graphics Rendering Engine Hujun Bao Wei Hua Real-Time Graphics Rendering Engine With 66 figures, 11 of them in color ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA Zhejiang

More information

Comparing the performance of distributed hash tables under churn

Comparing the performance of distributed hash tables under churn Comparing the performance of distributed hash tables under churn Jinyang Li, Jeremy Stribling, Thomer M. Gil, Robert Morris, M. Frans Kaashoek MIT Computer Science and Artificial Intelligence Laboratory

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Lecture Notes in Computer Science 8945

Lecture Notes in Computer Science 8945 Lecture Notes in Computer Science 8945 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Julien Masanès. Web Archiving. With 28 Figures and 6 Tables ABC

Julien Masanès. Web Archiving. With 28 Figures and 6 Tables ABC Web Archiving Julien Masanès Web Archiving With 28 Figures and 6 Tables ABC Author Julien Masanès European Web Archive 25 rue des envierges 75020 Paris, France julien.masanes@bnf.fr ACM Computing Classification

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

Survey of DHT Evaluation Methods

Survey of DHT Evaluation Methods Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the

More information

Enabling Technologies for Wireless E-Business

Enabling Technologies for Wireless E-Business Enabling Technologies for Wireless E-Business Weidong Kou Yelena Yesha (Eds.) Enabling Technologies for Wireless E-Business With 141 Figures and 15 Tables ABC Editors Weidong Kou Chinese State Key Laboratory

More information

Lecture Notes in Computer Science 5884

Lecture Notes in Computer Science 5884 Lecture Notes in Computer Science 5884 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 6227

Lecture Notes in Computer Science 6227 Lecture Notes in Computer Science 6227 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Lecture Notes in Computer Science 3427

Lecture Notes in Computer Science 3427 Lecture Notes in Computer Science 3427 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

Lecture Notes in Computer Science 6585

Lecture Notes in Computer Science 6585 Lecture Notes in Computer Science 6585 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Lecture Notes in Computer Science 2001 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science 2001 Edited by G. Goos, J. Hartmanis and J. van Leeuwen Lecture Notes in Computer Science 2001 Edited by G. Goos, J. Hartmanis and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Gul A. Agha Fiorella De Cindio

More information

Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks

Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks David R. Karger 1 and Matthias Ruhl 2 1 MIT Computer Science and Artificial Intelligence Laboratory Cambridge,

More information

High Availability and Disaster Recovery

High Availability and Disaster Recovery High Availability and Disaster Recovery Klaus Schmidt High Availability and Disaster Recovery Concepts, Design, Implementation With 83 Figures and 26 Tables 123 Klaus Schmidt Stockheimer Str. 20 60385

More information

Overlay Networks for Multimedia Contents Distribution

Overlay Networks for Multimedia Contents Distribution Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)

More information

Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays

Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Alan Mislove Peter Druschel Rice University, Houston, TX, USA Abstract Structured peer-to-peer (p2p) overlay networks provide

More information

Exploiting Semantic Clustering in the edonkey P2P Network

Exploiting Semantic Clustering in the edonkey P2P Network Exploiting Semantic Clustering in the edonkey P2P Network S. Handurukande, A.-M. Kermarrec, F. Le Fessant & L. Massoulié Distributed Programming Laboratory, EPFL, Switzerland INRIA, Rennes, France INRIA-Futurs

More information

Lecture Notes in Computer Science

Lecture Notes in Computer Science Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 371 I D. Hammer (Ed.) Compiler Compilers and High Speed Compilation 2rid CCHSC Workshop Berlin, GDR, October 10-14, 1988 Proceedings

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

DRing: A Layered Scheme for Range Queries over DHTs

DRing: A Layered Scheme for Range Queries over DHTs DRing: A Layered Scheme for Range Queries over DHTs Nicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens and Xavier Bonnaire Université Pierre et Marie Curie, CNRS INRIA - REGAL, Paris,

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

Implementing IPv6 as a Peer-to-Peer Overlay Network Λ

Implementing IPv6 as a Peer-to-Peer Overlay Network Λ Implementing IPv6 as a Peer-to-Peer Overlay Network Λ Lidong Zhou Robbert van Renesse Michael Marsh Dept. of Computer Science, Cornell University, Ithaca, NY 14853 E-mail: fldzhou,rvr,mmarshg@cs.cornell.edu

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Overview. Passive Load. Measurement. Classification. Setup. Future Work

Overview. Passive Load. Measurement. Classification. Setup. Future Work Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, and Mayank Varia Overview Passive Load Cloud providers often

More information

Advanced Data Mining Techniques

Advanced Data Mining Techniques Advanced Data Mining Techniques David L. Olson Dursun Delen Advanced Data Mining Techniques Dr. David L. Olson Department of Management Science University of Nebraska Lincoln, NE 68588-0491 USA dolson3@unl.edu

More information

Collaborative Multi-Source Scheme for Multimedia Content Distribution

Collaborative Multi-Source Scheme for Multimedia Content Distribution Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx

More information

Sybil-resistant DHT routing

Sybil-resistant DHT routing Sybil-resistant DHT routing George Danezis 1, Chris Lesniewski-Laas 2, M. Frans Kaashoek 2, and Ross Anderson 1 1 University of Cambridge, Computer Laboratory, 15 J J Thomson Avenue, Cambridge CB3 0FD,

More information

Jinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation

Jinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis

More information

Automated and Algorithmic Debugging

Automated and Algorithmic Debugging Peter A. Fritzson (Ed.) Automated and Algorithmic Debugging First International Workshop, AADEBUG '93 LinkiSping, Sweden, May 3-5, 1993 Proceedings Springer-Verlag Berlin Heidelberg NewYork London Paris

More information

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT 1 Avinash Chaudhari, 2 Pradeep Gamit 1 L.D. College of Engineering, Information Technology, Ahmedabad India 1 Chaudhari.avi4u@gmail.com,

More information

On the Feasibility of Peer-to-Peer Web Indexing and Search

On the Feasibility of Peer-to-Peer Web Indexing and Search On the Feasibility of Peer-to-Peer Web Indexing and Search Jinyang Li Boon Thau Loo Joseph M. Hellerstein M. Frans Kaashoek David Karger Robert Morris MIT Lab for Computer Science UC Berkeley jinyang@lcs.mit.edu,

More information

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4

More information

A Recovery Approach for SQLite History Recorders from YAFFS2

A Recovery Approach for SQLite History Recorders from YAFFS2 A Recovery Approach for SQLite History Recorders from YAFFS2 Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng To cite this : Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, et al..

More information

Dorina Luminiţa COPACI, Constantin Alin COPACI

Dorina Luminiţa COPACI, Constantin Alin COPACI THE DESIGN OF RESILIENCE P2P NETWORKS WITH DISTRIBUTED HASH TABLES Dorina Luminiţa COPACI, Constantin Alin COPACI lcopaci@yahoo.com, acopaci@yahoo.com Abstract The term resilience in computer systems and

More information

Heterogeneity-Aware Peer-to-Peer Multicast

Heterogeneity-Aware Peer-to-Peer Multicast Heterogeneity-Aware Peer-to-Peer Multicast Robbert van Renesse 1 Ken Birman 1 Adrian Bozdog 1 Dan Dumitriu 2 Manpreet Singh 1 Werner Vogels 1 1 Dept. of Computer Science, Cornell University {rvr,ken,adrianb,manpreet,vogels}@cs.cornell.edu

More information

Brushwood: Distributed Trees in Peer-to-Peer Systems

Brushwood: Distributed Trees in Peer-to-Peer Systems Brushwood: Distributed Trees in Peer-to-Peer Systems hi Zhang Arvind Krishnamurthy Randolph Y. Wang Abstract There is an increasing demand for locality-preserving distribution of complex data structures

More information

Geometric Modeling and Algebraic Geometry

Geometric Modeling and Algebraic Geometry Geometric Modeling and Algebraic Geometry Bert Jüttler Ragni Piene Editors Geometric Modeling and Algebraic Geometry 123 Bert Jüttler Institute of Applied Geometry Johannes Kepler University Altenberger

More information

Hybrid Overlay Structure Based on Random Walks

Hybrid Overlay Structure Based on Random Walks Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

Lecture Notes in Computer Science 3604

Lecture Notes in Computer Science 3604 Lecture Notes in Computer Science 3604 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Interfacing with C++

Interfacing with C++ Interfacing with C++ Jayantha Katupitiya Kim Bentley Interfacing with C++ Programming Real-World Applications ABC Dr. Jayantha Katupitiya Senior Lecturer School of Mechanical and Manufacturing Engineering

More information

An Agenda for Robust Peer-to-Peer Storage

An Agenda for Robust Peer-to-Peer Storage An Agenda for Robust Peer-to-Peer Storage Rodrigo Rodrigues Massachusetts Institute of Technology rodrigo@lcs.mit.edu Abstract Robust, large-scale storage is one of the main applications of DHTs and a

More information

Implementing Aggregation/Broadcast over Distributed Hash Tables

Implementing Aggregation/Broadcast over Distributed Hash Tables 1 Implementing Aggregation/Broadcast over Distributed Hash Tables Ji Li jli@mit.edu Ben Leong benleong@mit.edu Karen Sollins sollins@mit.edu Abstract We present an algorithm for implementing aggregation/broadcast

More information

Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems

Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems David R. Karger MIT karger@lcs.mit.edu Matthias Ruhl IBM Almaden ruhl@almaden.ibm.com Abstract Load balancing is a critical issue for

More information

Research on Industrial Security Theory

Research on Industrial Security Theory Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3

More information

Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave

Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer Swiss Federal Institute of Technology Department of Computer

More information

Software Development for SAP R/3

Software Development for SAP R/3 Software Development for SAP R/3 Springer-Verlag Berlin Heidelberg GmbH Ulrich Mende Software Development for SAP R/3 Data Dictionary, ABAP/4, Interfaces With Diskette With 124 Figures and Many Example

More information

AW2 Report. Christian Vogt. DHT Design Comparison and Applicability for WebRTC-based Systems

AW2 Report. Christian Vogt. DHT Design Comparison and Applicability for WebRTC-based Systems AW2 Report Christian Vogt DHT Design Comparison and Applicability for WebRTC-based Systems Fakultät Technik und Informatik Studiendepartment Informatik Faculty of Engineering and Computer Science Department

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 8, August 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Structured Peer-to-Peer

More information

Lecture Notes in Computer Science. Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science. Edited by G. Goos, J. Hartmanis and J. van Leeuwen Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen 1605 Springer Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Jonathan Billington

More information

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK 116 MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK Herry Imanta Sitepu, Carmadi Machbub, Armein Z. R. Langi, Suhono Harso Supangkat School of Electrical Engineering and Informatics, Institut Teknologi

More information

Distributed Balanced Tables: Not Making a Hash of it All

Distributed Balanced Tables: Not Making a Hash of it All Distributed Balanced Tables: Not Making a Hash of it All Prasanna Ganesan Mayank Bawa Stanford University fprasanna, bawag@db.stanford.edu Abstract DHTs implement a distributed dictionary, supporting key

More information

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Zhiyu Liu, Ruifeng Yuan, Zhenhua Li, Hongxing Li, and Guihai Chen State Key Laboratory of Novel Software Technology, Nanjing

More information

Lecture Notes in Computer Science 2929 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 2929 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen Lecture Notes in Computer Science 2929 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen 3 Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Harrie de Swart Ewa Orłowska Gunther Schmidt Marc

More information

An Algorithm to Reduce the Communication Traffic for Multi-Word Searches in a Distributed Hash Table

An Algorithm to Reduce the Communication Traffic for Multi-Word Searches in a Distributed Hash Table An Algorithm to Reduce the Communication Traffic for Multi-Word Searches in a Distributed Hash Table Yuichi Sei 1, Kazutaka Matsuzaki 2, and Shinichi Honiden 3 1 The University of Tokyo Information Science

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

The Bootstrapping Service

The Bootstrapping Service The Bootstrapping Service Márk Jelasity University of Bologna, Italy jelasity@cs.unibo.it Alberto Montresor University of Trento, Italy montreso@dit.unitn.it Ozalp Babaoglu University of Bologna, Italy

More information

Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables

Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables Nuno Lopes and Carlos Baquero CCTC-Department of Informatics University of Minho Braga, Portugal Abstract. Range

More information

Gengsheng Lawrence Zeng. Medical Image Reconstruction. A Conceptual Tutorial

Gengsheng Lawrence Zeng. Medical Image Reconstruction. A Conceptual Tutorial Gengsheng Lawrence Zeng Medical Image Reconstruction A Conceptual Tutorial Gengsheng Lawrence Zeng Medical Image Reconstruction A Conceptual Tutorial With 163 Figures Author Prof. Dr. Gengsheng Lawrence

More information

Object Location Query

Object Location Query Technical Report: Low Stretch between Nearby Peers Λ Kirsten Hildrum, John D. Kubiatowicz, Jeremy Stribling fhildrum, kubitrong@cs.berkeley.edu, strib@csail.mit.edu Report No. UCB/CSD-04-138 June 004 Computer

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

Towards Scalable and Robust Overlay Networks

Towards Scalable and Robust Overlay Networks Towards Scalable and Robust Overlay Networks Baruch Awerbuch Department of Computer Science Johns Hopkins University Baltimore, MD 21218, USA baruch@cs.jhu.edu Christian Scheideler Institute for Computer

More information

Contributions to Economics

Contributions to Economics Contributions to Economics Kesra Nermend Vector Calculus in Regional Development Analysis Comparative Regional Analysis Using the Example of Poland Physica Verlag A Springer Company Dr. inž. Kesra Nermend

More information

Query Processing Over Peer-To-Peer Data Sharing Systems

Query Processing Over Peer-To-Peer Data Sharing Systems Query Processing Over Peer-To-Peer Data Sharing Systems O. D. Şahin A. Gupta D. Agrawal A. El Abbadi Department of Computer Science University of California at Santa Barbara odsahin, abhishek, agrawal,

More information

Flash Crowd Handling in P2P Live Video Streaming Systems

Flash Crowd Handling in P2P Live Video Streaming Systems Flash Crowd Handling in P2P Live Video Streaming Systems Anurag Dwivedi, Sateesh Awasthi, Ashutosh Singh, Y. N. Singh Electrical Engineering, IIT Kanpur Abstract An interesting and challenging phenomenon

More information

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Relaxing Routing Table to Alleviate Dynamism in P2P Systems Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,

More information

Object-Based Concurrent Computing

Object-Based Concurrent Computing M. Tokoro O. Nierstrasz E Wegner (Eds.) Object-Based Concurrent Computing ECOOP '91 Workshop Geneva, Switzerland, July 15-16, 1991 Proceedings Springer-Verlag Berlin Heidelberg NewYork London Paris Tokyo

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

Availability for DHT-based Overlay Networks with Unidirectional Routing

Availability for DHT-based Overlay Networks with Unidirectional Routing Availability for DHT-based Overlay Networks with Unidirectional Routing Jan Seedorf 1 and Christian Muus 2 1 NEC Laboratories Europe Kurfuerstenanlage 36, 69115 Heidelberg, Germany jan.seedorf@nw.neclab.eu

More information

The Lonely NATed Node

The Lonely NATed Node The Lonely NATed Node Chad Yoshikawa University of Cincinnati yoshikco@ececs.uc.edu Brent Chun Intel Research Berkeley bnc@intel-research.net Amin Vahdat U.C. San Diego vahdat@cs.ucsd.edu Abstract In this

More information

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

Lecture Notes in Computer Science 7037

Lecture Notes in Computer Science 7037 Lecture Notes in Computer Science 7037 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test

Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test Fabius Klemm and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design A Peer-to-Peer Architecture to Enable Versatile Lookup System Design Vivek Sawant Jasleen Kaur University of North Carolina at Chapel Hill, Chapel Hill, NC, USA vivek, jasleen @cs.unc.edu Abstract The

More information

PIC: Practical Internet Coordinates for Distance Estimation

PIC: Practical Internet Coordinates for Distance Estimation PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa, Miguel Castro, Antony Rowstron, and Peter Key Microsoft Research, Cambridge, CB2 3NH, UK September 23 Technical Report MSR-TR-23-53

More information

Brian F. Cooper. Distributed systems, digital libraries, and database systems

Brian F. Cooper. Distributed systems, digital libraries, and database systems Brian F. Cooper Home Office Internet 2240 Homestead Ct. #206 Stanford University cooperb@stanford.edu Los Altos, CA 94024 Gates 424 http://www.stanford.edu/~cooperb/app/ (408) 730-5543 Stanford, CA 94305

More information

MATLAB Programming for Numerical Analysis. César Pérez López

MATLAB Programming for Numerical Analysis. César Pérez López MATLAB Programming for Numerical Analysis César Pérez López MATLAB Programming for Numerical Analysis Copyright 2014 by César Pérez López This work is subject to copyright. All rights are reserved by the

More information

Proactive Caching for Better than Single-Hop Lookup Performance

Proactive Caching for Better than Single-Hop Lookup Performance Proactive Caching for Better than Single-Hop Lookup Performance Venugopalan Ramasubramanian and Emin Gün Sirer Cornell University, Ithaca NY 4853 ramasv, egs @cs.cornell.edu Abstract High lookup latencies

More information

A Simple Fault Tolerant Distributed Hash Table

A Simple Fault Tolerant Distributed Hash Table A Simple ault Tolerant Distributed Hash Table Moni Naor Udi Wieder Abstract We introduce a distributed hash table (DHT) with logarithmic degree and logarithmic dilation We show two lookup algorithms The

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

Towards a Distributed Test-Lab for Planetary-Scale Services. David Culler UC Berkeley Intel Berkeley

Towards a Distributed Test-Lab for Planetary-Scale Services. David Culler UC Berkeley Intel Berkeley Towards a Distributed Test-Lab for Planetary-Scale Services David Culler UC Berkeley Intel Research @ Berkeley Motivation A new class of services & applications is emerging that spread over a sizable fraction

More information

Guide to OSI and TCP/IP Models

Guide to OSI and TCP/IP Models SPRINGER BRIEFS IN COMPUTER SCIENCE Mohammed M. Alani Guide to OSI and TCP/IP Models SpringerBriefs in Computer Science Series editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi

More information

Overlay Multicast. Application Layer Multicast. Structured Overlays Unstructured Overlays. CAN Flooding Centralised. Scribe/SplitStream Distributed

Overlay Multicast. Application Layer Multicast. Structured Overlays Unstructured Overlays. CAN Flooding Centralised. Scribe/SplitStream Distributed Overlay Multicast Application Layer Multicast Structured Overlays Unstructured Overlays CAN Flooding Centralised Scribe/SplitStream Distributed PeerCast 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt

More information

SELF-HEALING NETWORK FOR SCALABLE FAULT TOLERANT RUNTIME ENVIRONMENTS

SELF-HEALING NETWORK FOR SCALABLE FAULT TOLERANT RUNTIME ENVIRONMENTS SELF-HEALING NETWORK FOR SCALABLE FAULT TOLERANT RUNTIME ENVIRONMENTS Thara Angskun, Graham Fagg, George Bosilca, Jelena Pješivac Grbović, and Jack Dongarra,2,3 University of Tennessee, 2 Oak Ridge National

More information

Lecture 18: Peer-to-Peer applications

Lecture 18: Peer-to-Peer applications Lecture 18: Peer-to-Peer applications Anirudh Sivaraman 2017/12/10 In this lecture, we ll talk about peer-to-peer (P2P) applications. These are applications in which all end hosts are treated equally:

More information

ReCord: A Distributed Hash Table with Recursive Structure

ReCord: A Distributed Hash Table with Recursive Structure ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-

More information