Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2019

22.02.2019

A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks

verfasst von: Alberto Aguilar, Camilo Lozoya, Luis M. Orona

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rise in cloud storage and services in enterprise networks requires agile methods of content distribution, such as general-purpose files, software patches, image files, and other information. The work in this paper proposes a peer selection algorithm in BitTorrent to distribute content in enterprise networks. Peers execute this algorithm with a new special role called Internal Swarm Coordinator, ISC for short. Additions to the protocol allow peers from an Internal Swarm to cooperate in a coordinated manner, with an ISC acting as an orchestra director for a given broadcast domain. The proposed scheme uses two approaches: a Hamming distance to select the best peers enforcing productive connections between hosts, and fuzzy logic to handle peer load. This work includes a UDP-based protocol to select ISCs, and a procedure to define the behavior of this unique host. Also, to ensure backward compatibility, a description of how other peers can interact with this special role is given.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Carvalho M, Ford R (2014) Moving-target defenses for computer networks, vol 12. Institute Of Electrical And Electronics Engineers (IEEE) Carvalho M, Ford R (2014) Moving-target defenses for computer networks, vol 12. Institute Of Electrical And Electronics Engineers (IEEE)
3.
Zurück zum Zitat Chen G, Wu C, Jiang M (2010) Region tracker: An effective way to localize Bittorrent traffic. WiCOM, Chengdu Chen G, Wu C, Jiang M (2010) Region tracker: An effective way to localize Bittorrent traffic. WiCOM, Chengdu
4.
Zurück zum Zitat Perez-Botero D, Szefer J (2013) Characterizing hypervisor vulnerabilities in cloud computing servers. Proceedings of the international workshop on security in cloud computing Perez-Botero D, Szefer J (2013) Characterizing hypervisor vulnerabilities in cloud computing servers. Proceedings of the international workshop on security in cloud computing
5.
Zurück zum Zitat Nygren E (2010) The Akamai network: a platform for high-performance internet applications. ACM SIGOPS Operating Systems Review Nygren E (2010) The Akamai network: a platform for high-performance internet applications. ACM SIGOPS Operating Systems Review
6.
Zurück zum Zitat Liao W, Papadopoulos F, Psounis K, Psomas C, Psomas C (2013) Modeling BitTorrent- like systems with many classes of users. TOMACS 23(2):24-?35MathSciNetCrossRef Liao W, Papadopoulos F, Psounis K, Psomas C, Psomas C (2013) Modeling BitTorrent- like systems with many classes of users. TOMACS 23(2):24-?35MathSciNetCrossRef
7.
Zurück zum Zitat (2017) BitTorrent Protocol Specification (2017) BitTorrent Protocol Specification
8.
Zurück zum Zitat Aguilar A, Nolazco J, Vargas-Rosales C (2015) Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks, Peer-to-Peer Networking and Applications Aguilar A, Nolazco J, Vargas-Rosales C (2015) Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks, Peer-to-Peer Networking and Applications
9.
Zurück zum Zitat Vimal S, Srivatsa SK (2017) A survey on various file sharing methods in P2P networks, 2017 3rd international conference on science technology engineering management (ICONSTEM), Chennai, pp 305-310. Vimal S, Srivatsa SK (2017) A survey on various file sharing methods in P2P networks, 2017 3rd international conference on science technology engineering management (ICONSTEM), Chennai, pp 305-310.
10.
Zurück zum Zitat Saroiu S, Khrisna P, Khrisna P (2006) A measurement study of peer-to-peer file sharing systems. Dept. of Computer Science and Engineering. University of Washington USA Saroiu S, Khrisna P, Khrisna P (2006) A measurement study of peer-to-peer file sharing systems. Dept. of Computer Science and Engineering. University of Washington USA
11.
Zurück zum Zitat Cox JH Jr, Clark RJ, Owen HL III (2016) Leveraging SDN to improve the security of DHCP. In: Proceedings of the 2016 ACM international workshop on security in software defined networks network function virtualization (SDN-NFV Security ’16). ACM, New York Cox JH Jr, Clark RJ, Owen HL III (2016) Leveraging SDN to improve the security of DHCP. In: Proceedings of the 2016 ACM international workshop on security in software defined networks network function virtualization (SDN-NFV Security ’16). ACM, New York
12.
Zurück zum Zitat Pang R, Allman M, Bennett M, Lee J, Paxson V, Tierney B (2005) A first look at modern enterprise traffic. Internet measurement conference Pang R, Allman M, Bennett M, Lee J, Paxson V, Tierney B (2005) A first look at modern enterprise traffic. Internet measurement conference
13.
Zurück zum Zitat Qin Y, Tian X, Wu W, Wang X, Wu W, Wang X (2016) Mobility weakens the distinction between multicast and unicast. IEEE/ACM Trans Netw Qin Y, Tian X, Wu W, Wang X, Wu W, Wang X (2016) Mobility weakens the distinction between multicast and unicast. IEEE/ACM Trans Netw
14.
Zurück zum Zitat Ngo C-W, Zhao W-L, Jiang Y-G (2006) Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Proceedings of the 14th annual ACM international conference on Multimedia Ngo C-W, Zhao W-L, Jiang Y-G (2006) Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Proceedings of the 14th annual ACM international conference on Multimedia
15.
Zurück zum Zitat Benchi A, Launay P, Guidec F (2015) Solving Consensus in Opportunistic Networks. In: Proceedings of the 2015 International Conference on Distributed Computing and Networking, New York, NY, USA Benchi A, Launay P, Guidec F (2015) Solving Consensus in Opportunistic Networks. In: Proceedings of the 2015 International Conference on Distributed Computing and Networking, New York, NY, USA
16.
Zurück zum Zitat Zhang X, Qin J, Wang W, Sun Y, Lu J (2013) HmSearch: an efficient hamming distance query processing algorithm. In: Proceedings of the 25th international conference on scientific and statistical database management Zhang X, Qin J, Wang W, Sun Y, Lu J (2013) HmSearch: an efficient hamming distance query processing algorithm. In: Proceedings of the 25th international conference on scientific and statistical database management
17.
Zurück zum Zitat Matl L, Cerny T, Donahoo MJ (2015) Effective manycast messaging for Kademlia network. In: Proceedings of the 30th annual ACM symposium on applied computing, New York, NY USA Matl L, Cerny T, Donahoo MJ (2015) Effective manycast messaging for Kademlia network. In: Proceedings of the 30th annual ACM symposium on applied computing, New York, NY USA
18.
Zurück zum Zitat Yang XY, Hernandez P, Souza L, Ripoll A, Suppi R, Luque E, Cores F (2006) Multi- collaboration domain multicast P2P delivery architecture for VoD system. IEEE international conference on communications Yang XY, Hernandez P, Souza L, Ripoll A, Suppi R, Luque E, Cores F (2006) Multi- collaboration domain multicast P2P delivery architecture for VoD system. IEEE international conference on communications
19.
Zurück zum Zitat Vellore P, Gillard P, Venkatesan R, Gillard P, Venkatesan R (2009) Performance analysis of BitTorrent enabled ad hoc network routing. In: Proceedings of the 2009 international conference on wireless communications and mobile computing Vellore P, Gillard P, Venkatesan R, Gillard P, Venkatesan R (2009) Performance analysis of BitTorrent enabled ad hoc network routing. In: Proceedings of the 2009 international conference on wireless communications and mobile computing
20.
Zurück zum Zitat Ari I, Hong B, Miller EL, Brandt SA (2013) Managing flash crowds on the internet. International symposium on modeling, analysis and simulation of computer telecommunications systems Ari I, Hong B, Miller EL, Brandt SA (2013) Managing flash crowds on the internet. International symposium on modeling, analysis and simulation of computer telecommunications systems
21.
Zurück zum Zitat Faqs.org: Network Address Translation, [Online] Faqs.org: Network Address Translation, [Online]
22.
Zurück zum Zitat Yu-Wei E, Xin S, Sanjay G, Maltz GG (2011) Towards systematic design of enterprise networks. IEEE/ACM Transactions on Networking. Vol. 19. Issue 3 USA Yu-Wei E, Xin S, Sanjay G, Maltz GG (2011) Towards systematic design of enterprise networks. IEEE/ACM Transactions on Networking. Vol. 19. Issue 3 USA
23.
Zurück zum Zitat Qiu D., Srikant R. (2004) Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: Proceedings of ACM Sigcomm, Portland, OR Qiu D., Srikant R. (2004) Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: Proceedings of ACM Sigcomm, Portland, OR
24.
Zurück zum Zitat Beecks C, Uysal MS, Seidl T (2010) Similarity matrix compression for efficient signature quadratic form distance computation. In: SISAP ’10: Proceedings of the 3rd international conference on similarity search and applications Beecks C, Uysal MS, Seidl T (2010) Similarity matrix compression for efficient signature quadratic form distance computation. In: SISAP ’10: Proceedings of the 3rd international conference on similarity search and applications
25.
Zurück zum Zitat Gomaa WH, Fahmy AA (2013) A survey of text similarity approaches. Int J Comput Appl 68(13):13–18 Gomaa WH, Fahmy AA (2013) A survey of text similarity approaches. Int J Comput Appl 68(13):13–18
26.
Zurück zum Zitat Qin F, Lui J, Zheng L (2009) An effective network-aware peer selection algorithm in BitTorrent. 5th international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September Qin F, Lui J, Zheng L (2009) An effective network-aware peer selection algorithm in BitTorrent. 5th international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September
27.
Zurück zum Zitat Wu T, Li M, Ponraj M (2009) A genetic algorithm based peer selection strategy for BitTorrent networks, Nature biologically inspired computing Wu T, Li M, Ponraj M (2009) A genetic algorithm based peer selection strategy for BitTorrent networks, Nature biologically inspired computing
28.
Zurück zum Zitat Rong O (2014) A novel peer selection algorithm to reduce BitTorrent-like P2P traffic between networks. Information technology and computer science Rong O (2014) A novel peer selection algorithm to reduce BitTorrent-like P2P traffic between networks. Information technology and computer science
30.
Zurück zum Zitat Lawey AQ, El-Gorashi T, Elmirghani JMH (2012) Energy-efficient peer selection mechanism for BitTorrent content distribution, IEEE Global Communications Conference (GLOBECOM), Anaheim, CA Lawey AQ, El-Gorashi T, Elmirghani JMH (2012) Energy-efficient peer selection mechanism for BitTorrent content distribution, IEEE Global Communications Conference (GLOBECOM), Anaheim, CA
31.
Zurück zum Zitat Qureshi A (2004) Exploring proximity based peer selection in a BitTorrent-like protocol, MIT 6.824 student project Qureshi A (2004) Exploring proximity based peer selection in a BitTorrent-like protocol, MIT 6.824 student project
32.
Zurück zum Zitat Liu P, Chiang T, Chien Y (2009) Improving mobile peer-to-peer streaming service with BitTorrent-like redundant tracker, Mobile Data Management: Systems, services and middleware Liu P, Chiang T, Chien Y (2009) Improving mobile peer-to-peer streaming service with BitTorrent-like redundant tracker, Mobile Data Management: Systems, services and middleware
33.
Zurück zum Zitat Bindal R, Cao P, Chan W (2006) Improving traffic locality in BitTorrent via biased neighbor selection. IEEE international conferences on distributed computing Bindal R, Cao P, Chan W (2006) Improving traffic locality in BitTorrent via biased neighbor selection. IEEE international conferences on distributed computing
34.
Zurück zum Zitat Sugavanesh B, Hari Prasath R, Selvakumar S (2013) SHS-HTTPS enforcer: Enforcing HTTPS and preventing MITM attacks. ACM SIGSOFT Soft Engineer 38(6):1–4 Sugavanesh B, Hari Prasath R, Selvakumar S (2013) SHS-HTTPS enforcer: Enforcing HTTPS and preventing MITM attacks. ACM SIGSOFT Soft Engineer 38(6):1–4
35.
Zurück zum Zitat Aguilar A, Lozoya C, Ventura-Molina C (2017) BiT-SiEm: A packet-level simulation and emulation platform for BitTorrent, Journal of Applied Research and Technology Aguilar A, Lozoya C, Ventura-Molina C (2017) BiT-SiEm: A packet-level simulation and emulation platform for BitTorrent, Journal of Applied Research and Technology
36.
Zurück zum Zitat Richter P, Wohlfart F, Vallina-Rodriguez N, Allman M, Bush R, Feldmann A, Kreibich C, Weaver N, Paxson V (2016) A multi-perspective analysis of carrier-grade NAT deployment. In: Proceedings of the 2016 internet measurement conference (IMC ’16), New York, NY, USA Richter P, Wohlfart F, Vallina-Rodriguez N, Allman M, Bush R, Feldmann A, Kreibich C, Weaver N, Paxson V (2016) A multi-perspective analysis of carrier-grade NAT deployment. In: Proceedings of the 2016 internet measurement conference (IMC ’16), New York, NY, USA
37.
Zurück zum Zitat El Afia A, Lalaoui M, Chiheb R (2017) Fuzzy logic controller for an adaptive Huang cooling of simulated annealing. In: Proceedings of the 2nd international conference on big data, cloud and applications (BDCA’17), New York, NY, USA El Afia A, Lalaoui M, Chiheb R (2017) Fuzzy logic controller for an adaptive Huang cooling of simulated annealing. In: Proceedings of the 2nd international conference on big data, cloud and applications (BDCA’17), New York, NY, USA
Metadaten
Titel
A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks
verfasst von
Alberto Aguilar
Camilo Lozoya
Luis M. Orona
Publikationsdatum
22.02.2019
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2019
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-018-0711-8

Weitere Artikel der Ausgabe 5/2019

Peer-to-Peer Networking and Applications 5/2019 Zur Ausgabe