Results 1  10
of
52
Viceroy: A Scalable and Dynamic Emulation of the Butterfly
, 2002
"... We propose a family of constantdegree routing networks of logarithmic diameter, with the additional property that the addition or removal of a node to the network requires no global coordination, only a constant number of linkage changes in expectation, and a logarithmic number with high probabilit ..."
Abstract

Cited by 291 (16 self)
 Add to MetaCart
We propose a family of constantdegree routing networks of logarithmic diameter, with the additional property that the addition or removal of a node to the network requires no global coordination, only a constant number of linkage changes in expectation, and a logarithmic number with high probability. Our randomized construction improves upon existing solutions, such as balanced search trees, by ensuring that the congestion of the network is always within a logarithmic factor of the optimum with high probability. Our construction derives from recent advances in the study of peertopeer lookup networks, where rapid changes require e#cient and distributed maintenance, and where the lookup e#ciency is impacted both by the lengths of paths to requested data and the presence or elimination of bottlenecks in the network.
Symphony: Distributed Hashing in a Small World
 IN PROCEEDINGS OF THE 4TH USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS
, 2003
"... We present Symphony, a novel protocol for maintaining distributed hash tables in a wide area network. The key idea is to arrange all participants along a ring and equip them with long distance contacts drawn from a family of harmonic distributions. Through simulation, we demonstrate that our constr ..."
Abstract

Cited by 168 (13 self)
 Add to MetaCart
We present Symphony, a novel protocol for maintaining distributed hash tables in a wide area network. The key idea is to arrange all participants along a ring and equip them with long distance contacts drawn from a family of harmonic distributions. Through simulation, we demonstrate that our construction is scalable, flexible, stable in the presence of frequent updates and offers small average latency with only a handful of long distance links per node. The cost of updates when hosts join and leave is small.
A Survey and Comparison of PeertoPeer Overlay Network Schemes
 IEEE Communications Surveys and Tutorials
, 2005
"... Abstract — Over the Internet today, computing and communications environments are significantly more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. There has been much interest in emerging PeertoPeer (P2P) network overlays beca ..."
Abstract

Cited by 147 (0 self)
 Add to MetaCart
Abstract — Over the Internet today, computing and communications environments are significantly more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. There has been much interest in emerging PeertoPeer (P2P) network overlays because they provide a good substrate for creating largescale data sharing, content distribution and applicationlevel multicast applications. These P2P networks try to provide a long list of features such as: selection of nearby peers, redundant storage, efficient search/location of data items, data permanence or guarantees, hierarchical naming, trust and authentication, and, anonymity. P2P networks potentially offer an efficient routing architecture that is selforganizing, massively scalable, and robust in the widearea, combining fault tolerance, load balancing and explicit notion of locality. In this paper, we present a survey and comparison of various Structured and Unstructured P2P networks. We categorize the various schemes into these two groups in the design spectrum and discuss the applicationlevel network performance of each group.
Know thy Neighbor's Neighbor: the Power of Lookahead in Randomized P2P Networks
 In Proceedings of the 36th ACM Symposium on Theory of Computing (STOC
, 2004
"... Several peertopeer networks are based upon randomized graph topologies that permit e#cient greedy routing, e.g., randomized hypercubes, randomized Chord, skipgraphs and constructions based upon smallworld percolation networks. In each of these networks, a node has outdegree #(log n), where n de ..."
Abstract

Cited by 89 (5 self)
 Add to MetaCart
Several peertopeer networks are based upon randomized graph topologies that permit e#cient greedy routing, e.g., randomized hypercubes, randomized Chord, skipgraphs and constructions based upon smallworld percolation networks. In each of these networks, a node has outdegree #(log n), where n denotes the total number of nodes, and greedy routing is known to take O(log n) hops on average. We establish lowerbounds for greedy routing for these networks, and analyze NeighborofNeighbor (NoN)greedy routing. The idea behind NoN, as the name suggests, is to take a neighbor's neighbors into account for making better routing decisions.
Complex Networks and Decentralized Search Algorithms
 In Proceedings of the International Congress of Mathematicians (ICM
, 2006
"... The study of complex networks has emerged over the past several years as a theme spanning many disciplines, ranging from mathematics and computer science to the social and biological sciences. A significant amount of recent work in this area has focused on the development of random graph models that ..."
Abstract

Cited by 73 (1 self)
 Add to MetaCart
The study of complex networks has emerged over the past several years as a theme spanning many disciplines, ranging from mathematics and computer science to the social and biological sciences. A significant amount of recent work in this area has focused on the development of random graph models that capture some of the qualitative properties observed in largescale network data; such models have the potential to help us reason, at a general level, about the ways in which realworld networks are organized. We survey one particular line of network research, concerned with smallworld phenomena and decentralized search algorithms, that illustrates this style of analysis. We begin by describing a wellknown experiment that provided the first empirical basis for the "six degrees of separation" phenomenon in social networks; we then discuss some probabilistic network models motivated by this work, illustrating how these models lead to novel algorithmic and graphtheoretic questions, and how they are supported by recent empirical studies of large social networks.
Analyzing Kleinberg’s (and other) smallworld models
 in Proc. of ACM Symp. on Princ. of Dist. Comp. (PODC
, 2004
"... We analyze the properties of SmallWorld networks, where links are much more likely to connect “neighbor nodes ” than distant nodes. In particular, our analysis provides new results for Kleinberg’s SmallWorld model and its extensions. Kleinberg adds a number of directed longrange random links to a ..."
Abstract

Cited by 57 (6 self)
 Add to MetaCart
We analyze the properties of SmallWorld networks, where links are much more likely to connect “neighbor nodes ” than distant nodes. In particular, our analysis provides new results for Kleinberg’s SmallWorld model and its extensions. Kleinberg adds a number of directed longrange random links to an n × n lattice network (vertices as nodes of a grid, undirected edges between any two adjacent nodes). Links have a nonuniform distribution that favors arcs to close nodes over more distant ones. He shows that the following phenomenon occurs: between any two nodes a path with expected length O(log 2 n) can be found using a simple greedy algorithm which has no global knowledge of longrange links. We show that Kleinberg’s analysis is tight: his algorithm achieves θ(log 2 n) delivery time. Moreover, we show that the expected diameter of the graph is θ(log n), a log n factor
The ContentAddressable Network D2B
, 2003
"... A contentaddressable network (CAN) is a distributed lookup table that can be used to implement peertopeer (P2P) systems. A CAN allows the discovery and location of data and/or resources, identi ed by keys, in a distributed network (e.g., Internet), in absence of centralized server or any hier ..."
Abstract

Cited by 49 (2 self)
 Add to MetaCart
A contentaddressable network (CAN) is a distributed lookup table that can be used to implement peertopeer (P2P) systems. A CAN allows the discovery and location of data and/or resources, identi ed by keys, in a distributed network (e.g., Internet), in absence of centralized server or any hierarchical organization. Several networks have been recently described in the literature, and some of them have led to the development of experimental systems. We present a new CAN, called d2b. Its main characteristics are: simplicity, provability, and scalability. d2b allows the number of nodes n to vary between 1 and jKj where K is the set of keys managed by the network. In term of performances, any join or leave of a user implies a constant expected number of link modi cations, and, with high probability (w.h.p.), at most O(log n) link modi cations.
Routing Networks for Distributed Hash Tables
, 2003
"... Routing topologies for distributed hashing in peertopeer networks are classified into two categories: deterministic and randomized. A general technique for constructing deterministic routing topologies is presented. Using this technique, classical parallel interconnection networks can be adapted ..."
Abstract

Cited by 45 (7 self)
 Add to MetaCart
Routing topologies for distributed hashing in peertopeer networks are classified into two categories: deterministic and randomized. A general technique for constructing deterministic routing topologies is presented. Using this technique, classical parallel interconnection networks can be adapted to handle the dynamic nature of participants in peertopeer networks. A unified picture of randomized routing topologies is also presented. Two new protocols are described which improve average latency as a function of outdegree. One of the protocols can be shown to be optimal with high probability. Finally, routing networks for distributed hashing are revisited from a systems perspective and several open design problems are listed.
Estimating Network Size from Local Information
 Information Processing Letters
, 2003
"... this paper, we provide a localized estimation scheme that has good worst case accuracy. The scheme requires each joining node to communicate only with two nodes, its initial contact and one additional node. The expected accuracy of our estimator is within the range n=2::n , provided that the join ..."
Abstract

Cited by 42 (1 self)
 Add to MetaCart
this paper, we provide a localized estimation scheme that has good worst case accuracy. The scheme requires each joining node to communicate only with two nodes, its initial contact and one additional node. The expected accuracy of our estimator is within the range n=2::n , provided that the joiners' contact points are assigned at random
VoroNet: A scalable object network based on voronoi tessellations
 In Proceedings of the 21st International Parallel and Distributed Processing Symposium (IPDPS 2007
, 2007
"... In this paper, we propose the design of VoroNet, an objectbased peer to peer overlay network relying on Voronoi tessellations, along with its theoretical analysis and experimental evaluation. VoroNet differs from previous overlay networks in that peers are application objects themselves and get iden ..."
Abstract

Cited by 20 (3 self)
 Add to MetaCart
In this paper, we propose the design of VoroNet, an objectbased peer to peer overlay network relying on Voronoi tessellations, along with its theoretical analysis and experimental evaluation. VoroNet differs from previous overlay networks in that peers are application objects themselves and get identifiers reflecting the semantics of the application instead of relying on hashing functions. This enables a scalable support for efficient search in large collections of data. In VoroNet, objects are organized in an attribute space according to a Voronoi diagram. VoroNet is inspired from the Kleinberg’s smallworld model where each peer gets connected to close neighbours and maintains an additional pointer to a longrange neighbour. VoroNet improves upon the original proposal as it deals with general object topologies and therefore copes with skewed data distributions. We show that VoroNet can be built and maintained in a fully decentralized way. The theoretical analysis of the system proves that routing in VoroNet can be achieved in a polylogarithmic number of hops in the size of the system. The analysis is fully confirmed by our experimental evaluation by simulation. 1