Efficient Query Dissemination on a Wide Area Network using Peer To Peer network
|
|
- Marvin Barber
- 7 years ago
- Views:
Transcription
1 Efficient Query Dissemination on a Wide Area Network using Peer To Peer network Kyungyong Lee Electrical and Computer Engineering University of Florida klee@acis.ufl.edu 1. Problem Area Desktop grids using commodity computers connected over a local or wide-area network have been proven to be excellent platforms for high-throughput computing while providing sharing CPU power, storage capacity, and applications. These systems should be scalable, faulttolerant, and secure in the presence of abnormal or malicious behavior of a user or churn. These systems must be able to distribute jobs evenly amongst nodes to achieve maximum utilization and alleviate hot stops. To efficiently distribute loads, supporting efficient resource discovering method is vital component for the management system. To support resource discovery, centralized discovery system (Condor, Boinc, and Archer) and decentralized discovery systems (Sword, CAN-based query system) are proposed and widely used. 2. Problem Statement Middleware solutions for managing distributed resources, such as Condor and Boinc, often rely on a centralized master server that maintains global view of available resources for optimal scheduling decisions. Worker nodes, in turn, publish their resource information to the central master node, so that submitted jobs requirements can be matched against available resources to determine the most suitable nodes for executing the submitted jobs. The master server approach often imposes significant administrative, uptime, and scalability issues, and the failure of the master can render all its managed resources unusable. As a decentralized discovery system, SWORD supports DHT-based resource discovery method. SWORD requires nodes to periodically publish their resource information, which can impose significant network overheads even when no jobs are being submitted to the system. Furthermore, the retrieved resource information might be stale due to characteristics of DHTs entry update period. 3. Paper Approach Moara is a decentralized resource discovery system runs on top of a Pastry Peer To Peer (P2P) network. In Pastry, each node has own 128 bits P2P id, which is generated by a hash function. Each node keeps a routing table consisted of P2P for routing a message to the destination P2P id. For resource discovery query dissemination, it uses Scribe multicast channel. Scribe runs on top of Pastry while providing multicasting a message. I will discuss the Sword in detail in the
2 next section. Because Scribe supports propagating message on a Pastry, it is an appropriate selection for a query dissemination method. Moara builds a Scribe multicast tree for each resource attribute. At a given multicast tree, every child node sends no-prune, if the node satisfies a tree requirement. Otherwise, prune message is sent to its parent node. Parent nodes keep child nodes tree requirement satisfaction status locally. When a query is received at the node, it checks the local table to determine whether to disseminate the query to a given child node or not. Figure 1 shows an example of Moara query tree. The tree can be assumed as one attribute requirement.(e.g. nodes which has Matlab installed). In the figure, only node F is Matlab installed. Because node D and E do not satisfy the requirement, it sends prune message to node B. Node B also does not satisfy the requirement, so node B finally sends prune message to Node A. Node F satisfies the requirement, so it sends no-prune message to its parent node, C. Then, node C sends no-prune message to the parent node A, though node C does not satisfy the requirement. Using prune and no-prune message, each node can minimize the number of queries produced in the network. Other than basic query dissemination, Moara supports Dynamic Adaptation Policy (DAP) to minimize the network traffic. In the DAP, each node counts the cost for update and query. If the query cost is higher than the update cost, the Moara works in the basic prune and no-prune method by sending update messages. Otherwise, Moara simply sends queries to the entire tree without sending update to its parent node. To minimize the number of hops to deliver a message, Moara supports Separate Query Plane (SQP). In SQP, system wide threshold is defined. When the number of requirement satisfying nodes is below the threshold value and the parent node does not satisfy the requirement, the parent nodes is not involved in the query delivery. Otherwise, the parent node is still involved in the query dissemination. For efficient query dissemination, composite query is supported. In composite query multiple attributes are converged to minimal attributes according to their relationships. 4. Critique Figure 1 Moara Architecture supported by a node. Moara authors did various kinds of experiments to show the applicability of their solution. However, they do not mention about the cost for maintaining a tree for each attribute. Because each attribute has to create a tree for efficient query dissemination, it will incur non-negligible overhead to each participating nodes. Thus it may not be scalable for the number of resource attributes Next, Moara tree is created statically. It means that every node has a predefined resource requirement. It will be all right if the attribute is boolean type (e.g., Operating system == linux ).
3 When it comes to range search, Moara is not available any more. If a tree is defined as memory > 2GB, a user cannot find nodes whose memory size is between 1GB and 1.5GB. Due to static tree configuration, it has a critical drawback for scalable query support. As the next problem for the paper, it does not support handling lagging node in the tree. The problem of tree-based communication is that waiting for result from lagging node sometimes make the entire tree stuck. In this case, it will be a better choice pruning the lagging node from the tree. However, it is not an easy choice when to prune the lagging node. Pruning a lagging node implies that the query results from the lagging node s child nodes will be discarded. Under this situation, Moara does not support a method to handle lagging nodes, which results in a very poor performance metric for PlanetLab experiments. I will propose a handling lagging node method in a tree-based query dissemination system in section 6. The last critique for this paper is about the correctness of the experiment result. The authors compared Moara s PlanetLab experiment result with that of naïve entire network query method. From their performance metrics, it looks that querying entire network is useless when the number of node is over 100. They seem to propagate a query to the entire network using Scribe algorithm. However, the performance can be differentiated a lot by choosing other query dissemination method. To prove the incorrectness of their experiment result, I will propose another query dissemination method on a P2P network. 5. Evaluation/analysis of the approach The authors implement Moara on top of Scribe, which supports multicasting a message to a subset of nodes in a P2P network. In this section, I am going to describe how Scribe works. The Scribe explanation will help to understand the reason of poor performance of Moara due to the underlying multicast method. The Scribe will be comparable to Boundedboradcast, which will be discussed at the next section. Scribe is developed at Microsoft research center and Rice University in Scribe creates a static tree for each multicast group. The static tree is formed as follows: The root node is selected by hashing the multicast group description. After hashing the multicast group description, the nearest id node performs as a root node. From the root node, the tree is formed by differentiating only one digit at each tree level. For example, if the root node id is 0xFFFF, the child nodes address can be 0xFFF0, 0xFFF1, 0xFFF2,, 0xFFFD, 0xFFFE. The multicast group joining message is always routed to the root node. In the course of routing to the root node, if a node which is already a member of the multicast group receives the join message, the member node terminates the join message, and keeps the join message initiating node s address in its local table. This join message termination lessens the overhead of the root node. When a node wants to disseminate a message to the multicast group, the message initiating node has to send the message to the root node first, then the root node propagates the message to the multicasting group. Because the tree is created statically, it cannot react to the non-graceful node departure. Thus, every node has to send periodic live message to its parent node. Because of routing characteristics of Pastry, nodes which are not interested in the message group might be involved in the message dissemination as a forwarder, which imposes additional overhead for maintaining a group and message dissemination.
4 6. Possible Improvements Query Dissemination on the P2P network In order to show the practicality of query the entire network, I explain Boundedbroadcast method developed at the University of Flordia, ACIS lab. Boundedbroadcast spreads a message over a sub-region of a P2P network by leveraging a structured P2P system to self-organize a multicast tree. Boundedbroadcast is currently implemented on top of Brunet, which implements Symphony, a 1-d Kleinberg s small-world network. Each node maintains two types of connections: (1) a constant number of near connections to its nearest left and right neighbors on the P2P ring, and (2) approximately log(n), where N is the number of nodes, far connections to random nodes on the P2P ring; such that a routing cost is O(log(n)). During a broadcast a node is allocated a sub-region of the P2P ring over which to disseminate a message. The node then redistributes the message to its neighboring nodes inside its allocated sub-region while allocating new sub-regions to the neighboring nodes. This process continues until the message is disseminated over the entire sub-region. Figure 2 Bounded-broadcast architecture For example, to broadcast a message over the sub-region [A,L] in Figure 2, a message initiator issues a broadcast command to node A with sub-region information, [A,L]. Node A recognizes node B, P, E, K, L, and M as neighbors. The node A then broadcast messages to its neighbors, by specifying broadcast range as [B E), [E K), [K L), [L] to node B, E, K, and L, respectively. After receiving the message, node B, E, K, and L broadcast the message only to their neighboring nodes inside the specified sub-region recursively. After disseminating the broadcast message until the leaf node, a graph like Figure 1 right figure is formed. If a message initiating node does not lie within the boundedbroadcast domain (sub-region of the P2P ring), the
5 message is first routed to a center node inside the bounded-broadcast region by using greedy routing. Figure 3 (a)moara PlanetLab experiment (b)bounded-broadcast Planetlab experiment Different from Scribe, boundedbroadcast does not use a static tree for query dissemination. It uses current connection table for self-organizing a tree. It lessens additional overhead for heartbeat event between parent and child node. In bounded broadcast every message is a one hop away in a P2P address. In case of Scribe, one message can take multiple hops to get to the destination. These differences make performance difference on a PlanetLab experiment shown in Figure 3. Handling Lagging Node in a Tree-Based Communication Method As we have seen in the Figure 3 (a) and (b), tree-based query method sometimes shows bad performance due to extremely lagging nodes. Because Scribe and bounded-broadcast method wait until all child nodes return results. Thus a small amount of nodes late response can make the entire system have high response time. To prevent it, we can run a timeout handler at each parent nodes. If child nodes do not return response within the time, the parent node can immediately return currently aggregated result. However, defining an appropriate timeout value in the tree communication is not a trivial issue, because each node in a different layer in the tree cannot have same timeout value. Obviously nodes near the root node should have higher timeout value than nodes near leaf nodes. Based on the characteristics of tree-based communication method, I propose two timeout defining methods: 1) Gradually decreasing timeout value. When a parent node distributes a query to its child node, the parent node notifies its timeout value to its child nodes. Then, the child nodes decrease the timeout value by x%, and set the new timeout value as its timeout value for its child nodes. This step continues until the query reaches leaf nodes. Assuming the timeout value decreasing rate is a, where 0<a<1, and the root node s timeout value is b seconds, i th level nodes timeout value is b*a i 2) Complete score-based timeout value: Gradually decreasing timeout value has its drawback in the static timeout value in each level; It does not differentiate the timeout value according to the completeness of the query. For example, the timeout value when 10% of child nodes returns result should be longer than that of 90% child nodes returning result case. In addition, each
6 Latency (seconds) node has to maintain different timeout value according to its current network load. One of the metrics to measure the network load is the query latency for child nodes which already return results for the same query session. The user can also define a multiplier (Wait Factor) to determine the length of a timeout value. Assuming user-defined timeout multiplier is m, the query latency is a seconds, and query complete score is b, where 0<b<1, the timeout value of each node will be m* a seconds. Based on this timeout determination method, I did a query b latency measurement test on PlanetLab with 569 nodes. Resource discovery query is sent to the entire network at this experiment. The test result is shown in Figure 4. WF=1 WF=2 WF=4 WF=8 WF=0 (No Timeout) Latency Percentage Figure 4 (a) Query latency according to the Wait Factor (b) Number returned node As we can see from figure 4, query latency is not much different when the overall query latency is small (e.g., latency percentage from the shortest to 60%). When it comes to over 90%, there seems to be a large latency differences according to the wait factor. From Figure 4(a), we can see that By setting using the timeout value (i.e., Waif Factor is 1, 2, 4, and 8), the longest query latency is much less than no timeout case (i.e., Wait Factor is 0). I counted the number of returned result, and showed the result in Figure 4 (b). As the Wait Factor gets smaller, the number of returned nodes also gets smaller. Instead the query latency is short. According to a user s requirement for a query (quick response VS. more accurate query result), the Wait Factor can be set up. 7. Conclusion In this project, I analyzed Moara, a decentralized resource discovery system. Based on the critiques, I described bounded-broadcast, a multicast method on a P2P network which is developed at the University of Florda ACIS Lab, to compare the message dissemination performance. From the PlanetLab experiment, we can see that bounded-broadcast outperforms Moara s Scribe message dissemination. In addition, I propose two message handling methods in a tree based message communication.
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationUsing Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
More informationUsing Content-Addressable Networks for Load Balancing in Desktop Grids (Extended Version)
Using Content-Addressable Networks for Load Balancing in Desktop Grids (Extended Version) Jik-Soo Kim, Peter Keleher, Michael Marsh, Bobby Bhattacharjee and Alan Sussman UMIACS and Department of Computer
More informationChapter 4. Distance Vector Routing Protocols
Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
More informationAn Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
More informationPeer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
More informationPEER-TO-PEER (P2P) systems have emerged as an appealing
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 4, APRIL 2009 595 Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems Quang Hieu Vu, Member, IEEE, Beng Chin Ooi,
More information8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
More informationPlaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3
Uni Innsbruck Informatik Uni Innsbruck Informatik Peerto topeer Systems DHT examples, part (Pastry, Tapestry and Kademlia) Michael Welzl michael.welzl@uibk.ac.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg
More informationChord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
More informationStorage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
More informationInternational journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
More informationThe p2pweb model: a glue for the Web
The p2pweb model: a glue for the Web Pedro García López, Marc Sánchez Artigas, Jordi Pujol Ahulló Universitat Rovira i Virgili Tarragona, Spain { pedro.garcia, marc.sanchez, jordi.pujol}@urv.cat Abstract
More informationHybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt. John Buford, Avaya Labs Research
Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt John Buford, Avaya Labs Research Topics SAM Charter Recap and Problem Statement AMT(Automatic Multicast Tunneling) Overview
More informationA Survey and Comparison of Peer-to-Peer Overlay Network Schemes
% " #$! IEEE COMMUNICATIONS SURVEY AND TUTORIAL, MARCH 2004 1 A Survey and Comparison of Peer-to-Peer Overlay Network Schemes Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma and Steven Lim Abstract
More informationD1.1 Service Discovery system: Load balancing mechanisms
D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction
More informationA Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture
A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture Hyeon seok O, Namgi Kim1, Byoung-Dai Lee dept. of Computer Science. Kyonggi University, Suwon,
More informationRVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN)
RVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN) Luca Bettosini Universität Bern Outline > Goals / Motivation ( CAN ) > Content Addressable Network > CAN Multicast
More informationTracker vs. DHT Performance Comparison for P2P Streaming
Tracker vs. DHT Performance Comparison for P2P Streaming draft-hu-ppsp-tracker-dht-performance-comparison Yan Hu, NEC Labs China Yong Xia, NEC Labs China Jan Seedorf, NEC Labs Europe Outline Introduction
More informationInfiniBand Clustering
White Paper InfiniBand Clustering Delivering Better Price/Performance than Ethernet 1.0 Introduction High performance computing clusters typically utilize Clos networks, more commonly known as Fat Tree
More informationVaralakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
More informationA P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
More informationA Peer-to-peer Extension of Network-Enabled Server Systems
A Peer-to-peer Extension of Network-Enabled Server Systems Eddy Caron 1, Frédéric Desprez 1, Cédric Tedeschi 1 Franck Petit 2 1 - GRAAL Project / LIP laboratory 2 - LaRIA laboratory E-Science 2005 - December
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationPlug-and-play Virtual Appliance Clusters Running Hadoop. Dr. Renato Figueiredo ACIS Lab - University of Florida
Plug-and-play Virtual Appliance Clusters Running Hadoop Dr. Renato Figueiredo ACIS Lab - University of Florida Advanced Computing and Information Systems laboratory Introduction You have so far learned
More informationParallel Processing over Mobile Ad Hoc Networks of Handheld Machines
Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines Michael J Jipping Department of Computer Science Hope College Holland, MI 49423 jipping@cs.hope.edu Gary Lewandowski Department of Mathematics
More informationSwanLink: Mobile P2P Environment for Graphical Content Management System
SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes
More informationHow To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
More informationNaming vs. Locating Entities
Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address
More informationAdapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
More informationTornado: A Capability-Aware Peer-to-Peer Storage Network
Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao hsiao@pads1.cs.nthu.edu.tw Chung-Ta King* king@cs.nthu.edu.tw Department of Computer Science National Tsing Hua University Hsinchu,
More informationPlaxton Routing. - From a peer - to - peer network point of view. Lars P. Wederhake
Plaxton Routing - From a peer - to - peer network point of view Lars P. Wederhake Ferienakademie im Sarntal 2008 FAU Erlangen-Nürnberg, TU München, Uni Stuttgart September 2008 Overview 1 Introduction
More informationChapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
More informationA Comparative Study of the DNS Design with DHT-Based Alternatives
A Comparative Study of the DNS Design with DHT-Based Alternatives Vasileios Pappas Computer Science Department UCLA Email: vpappas@cs.ucla.edu Dan Massey Computer Science Department Colorado State University
More informationDynamic Load Balancing for Cluster-based Publish/Subscribe System
Dynamic Load Balancing for Cluster-based Publish/Subscribe System Hojjat Jafarpour, Sharad Mehrotra and Nalini Venkatasubramanian Department of Computer Science University of California, Irvine {hjafarpo,
More informationLecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage
Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing
More informationDistributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
More information5. Peer-to-peer (P2P) networks
5. Peer-to-peer (P2P) networks PA191: Advanced Computer Networking I. Eva Hladká Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Autumn 2015 Eva Hladká (FI MU) 5. P2P networks Autumn 2015
More informationCS5412: TIER 2 OVERLAYS
1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data
More informationScalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio.
Scalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio.no Outline! Membership Management! Gossip Based Membership Protocol
More informationP2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
More informationSan Fermín: Aggregating Large Data Sets using a Binomial Swap Forest
San Fermín: Aggregating Large Data Sets using a Binomial Swap Forest Justin Cappos and John H. Hartman Department of Computer Science, University of Arizona Abstract San Fermín is a system for aggregating
More informationT he Electronic Magazine of O riginal Peer-Reviewed Survey Articles ABSTRACT
SECOND QUARTER 2005, VOLUME 7, NO. 2 IEEE C OMMUNICATIONS SURVEYS T he Electronic Magazine of O riginal -Reviewed Survey Articles www.comsoc.org/pubs/surveys A SURVEY AND COMPARISON OF PEER-TO-PEER OVERLAY
More informationSemCast: Semantic Multicast for Content-based Data Dissemination
SemCast: Semantic Multicast for Content-based Data Dissemination Olga Papaemmanouil Brown University Uğur Çetintemel Brown University Wide Area Stream Dissemination Clients Data Sources Applications Network
More informationChristoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW
Bitcoin s Peer-to-Peer network Christoph Sorge February 12th, 2014 Bitcoin minisymposium at KNAW Clipart source: http://openclipart.org, users Machovka and Keistutis Department of Computer Science What
More informationVMDC 3.0 Design Overview
CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated
More informationMIDAS: Multi-Attribute Indexing for Distributed Architecture Systems
MIDAS: Multi-Attribute Indexing for Distributed Architecture Systems George Tsatsanifos (NTUA) Dimitris Sacharidis (R.C. Athena ) Timos Sellis (NTUA, R.C. Athena ) 12 th International Symposium on Spatial
More informationIPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha
IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand
More informationHow To Make A Network Overlay More Efficient
Corporate Technology Service Layer Components for Resource Management in Distributed Applications Fabian Stäber Siemens Corporate Technology, Information and Communications Copyright Siemens AG 2007. Alle
More informationDefinition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
More informationA P2PSIP event notification architecture
A P2PSIP event notification architecture Georgios Panagiotou Appear Networks AB, Kista Science Tower, 164 51 Kista, Sweden Email: georgios.panagiotou@appearnetworks.com Alisa Devlic Appear Networks AB,
More informationPERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
More informationDSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
More informationA Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications. Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu
A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu July 5, 2013 2 ABSTRACT Distributed Hash Table (DHT) plays an important
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationContent Delivery Network (CDN) and P2P Model
A multi-agent algorithm to improve content management in CDN networks Agostino Forestiero, forestiero@icar.cnr.it Carlo Mastroianni, mastroianni@icar.cnr.it ICAR-CNR Institute for High Performance Computing
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationScaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
More informationConsecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
More informationInformation Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
More informationContent Delivery Networks. Shaxun Chen April 21, 2009
Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry
More informationOn the Placement of Management and Control Functionality in Software Defined Networks
On the Placement of Management and Control Functionality in Software Defined Networks D.Tuncer et al. Department of Electronic & Electrical Engineering University College London, UK ManSDN/NfV 13 November
More informationA Review of Load Balancing Algorithms for Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu
More informationSimple Solution for a Location Service. Naming vs. Locating Entities. Forwarding Pointers (2) Forwarding Pointers (1)
Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address
More informationDistance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh
Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing
More informationBorder Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationPSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries
PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries Jyoti Ahuja, Jun-Hong Cui, Shigang Chen, Li Lao jyoti@engr.uconn.edu, jcui@cse.uconn.edu, sgchen@cise.ufl.edu, llao@cs.ucla.edu
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationA Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
More informationCHAPTER 10 IP MULTICAST
CHAPTER 10 IP MULTICAST This chapter is about IP multicast, the network layer mechanisms in the Internet to support applications where data is sent from a sender to multiple receivers. The first section
More informationPublic Cloud Partition Balancing and the Game Theory
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA v.sridivya91@gmail.com thaniga10.m@gmail.com
More informationEvolution of Peer-to-Peer Systems
EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor
More informationExploiting peer group concept for adaptive and highly available services
Exploiting peer group concept for adaptive and highly available services Muhammad Asif Jan Centre for European Nuclear Research (CERN) Switzerland Fahd Ali Zahid, Mohammad Moazam Fraz Foundation University,
More information- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
More informationAdvanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP
Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP Renato Lo Cigno Routing Algorithms: One or Many? Is there a single routing protocol in the Internet? How can different protocols and algorithms
More informationHyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network
Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network 1 Gliederung Einführung Vergleich und Problemstellung Algorithmen Evaluation 2 Aspects Backbone Last mile access stationary commodity equipment
More informationOn demand synchronization and load distribution for database grid-based Web applications
Data & Knowledge Engineering 51 (24) 295 323 www.elsevier.com/locate/datak On demand synchronization and load distribution for database grid-based Web applications Wen-Syan Li *,1, Kemal Altintas, Murat
More informationRELOAD Usages for P2P Data Storage and Discovery
RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf Alexander.Knauf@Haw-Hamburg.de Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationIMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationquery enabled P2P networks 2009. 08. 27 Park, Byunggyu
Load balancing mechanism in range query enabled P2P networks 2009. 08. 27 Park, Byunggyu Background Contents DHT(Distributed Hash Table) Motivation Proposed scheme Compression based Hashing Load balancing
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationBloom Filter based Inter-domain Name Resolution: A Feasibility Study
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN
More informationDESIGN, IMPLEMENTATION, AND APPLICATIONS OF PEER-TO-PEER VIRTUAL PRIVATE NETWORKS FROM GRIDS TO SOCIAL NETWORKS
DESIGN, IMPLEMENTATION, AND APPLICATIONS OF PEER-TO-PEER VIRTUAL PRIVATE NETWORKS FROM GRIDS TO SOCIAL NETWORKS By DAVID ISAAC WOLINSKY A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY
More informationFiber Channel Over Ethernet (FCoE)
Fiber Channel Over Ethernet (FCoE) Using Intel Ethernet Switch Family White Paper November, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
More informationSystems for Fun and Profit
Department of Computing Building Internet-Scale Distributed Systems for Fun and Profit Peter Pietzuch prp@doc.ic.ac.uk Large-Scale Distributed Systems Group http://platypus.doc.ic.ac.uk Peter R. Pietzuch
More informationDistributed Hash Tables in P2P Systems - A literary survey
Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology tstanner@cc.hut.fi Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer
More informationStatistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud 1 V.DIVYASRI, M.Tech (CSE) GKCE, SULLURPETA, v.sridivya91@gmail.com 2 T.SUJILATHA, M.Tech CSE, ASSOCIATE PROFESSOR
More informationLOOKING UP DATA IN P2P SYSTEMS
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed
More informationOutline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms
Outline Internet Routing Venkat Padmanabhan Microsoft Research 9 pril 2001 Routing algorithms distance-vector (DV) link-state (LS) Internet Routing border gateway protocol (BGP) BGP convergence paper Venkat
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationTRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview
More informationFirewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
More informationRESOURCE DISCOVERY IN AD HOC NETWORKS
RESOURCE DISCOVERY IN AD HOC NETWORKS Diane Tang Chih-Yuan Chang Kei Tanaka Mary Baker Technical Report No.: CSL-TR-98-769 August 1998 This project is in part supported by FX Palo Alto Laboratories and
More information全 新 企 業 網 路 儲 存 應 用 THE STORAGE NETWORK MATTERS FOR EMC IP STORAGE PLATFORMS
全 新 企 業 網 路 儲 存 應 用 THE STORAGE NETWORK MATTERS FOR EMC IP STORAGE PLATFORMS Enterprise External Storage Array Capacity Growth IDC s Storage Capacity Forecast = ~40% CAGR (2014/2017) Keep Driving Growth!
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationIP Multicasting. Applications with multiple receivers
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More information