Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2019

22-02-2019

A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks

Authors: Alberto Aguilar, Camilo Lozoya, Luis M. Orona

Published in: Peer-to-Peer Networking and Applications | Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The rise in cloud storage and services in enterprise networks requires agile methods of content distribution, such as general-purpose files, software patches, image files, and other information. The work in this paper proposes a peer selection algorithm in BitTorrent to distribute content in enterprise networks. Peers execute this algorithm with a new special role called Internal Swarm Coordinator, ISC for short. Additions to the protocol allow peers from an Internal Swarm to cooperate in a coordinated manner, with an ISC acting as an orchestra director for a given broadcast domain. The proposed scheme uses two approaches: a Hamming distance to select the best peers enforcing productive connections between hosts, and fuzzy logic to handle peer load. This work includes a UDP-based protocol to select ISCs, and a procedure to define the behavior of this unique host. Also, to ensure backward compatibility, a description of how other peers can interact with this special role is given.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Carvalho M, Ford R (2014) Moving-target defenses for computer networks, vol 12. Institute Of Electrical And Electronics Engineers (IEEE) Carvalho M, Ford R (2014) Moving-target defenses for computer networks, vol 12. Institute Of Electrical And Electronics Engineers (IEEE)
3.
go back to reference Chen G, Wu C, Jiang M (2010) Region tracker: An effective way to localize Bittorrent traffic. WiCOM, Chengdu Chen G, Wu C, Jiang M (2010) Region tracker: An effective way to localize Bittorrent traffic. WiCOM, Chengdu
4.
go back to reference Perez-Botero D, Szefer J (2013) Characterizing hypervisor vulnerabilities in cloud computing servers. Proceedings of the international workshop on security in cloud computing Perez-Botero D, Szefer J (2013) Characterizing hypervisor vulnerabilities in cloud computing servers. Proceedings of the international workshop on security in cloud computing
5.
go back to reference Nygren E (2010) The Akamai network: a platform for high-performance internet applications. ACM SIGOPS Operating Systems Review Nygren E (2010) The Akamai network: a platform for high-performance internet applications. ACM SIGOPS Operating Systems Review
6.
go back to reference Liao W, Papadopoulos F, Psounis K, Psomas C, Psomas C (2013) Modeling BitTorrent- like systems with many classes of users. TOMACS 23(2):24-?35MathSciNetCrossRef Liao W, Papadopoulos F, Psounis K, Psomas C, Psomas C (2013) Modeling BitTorrent- like systems with many classes of users. TOMACS 23(2):24-?35MathSciNetCrossRef
7.
8.
go back to reference Aguilar A, Nolazco J, Vargas-Rosales C (2015) Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks, Peer-to-Peer Networking and Applications Aguilar A, Nolazco J, Vargas-Rosales C (2015) Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks, Peer-to-Peer Networking and Applications
9.
go back to reference Vimal S, Srivatsa SK (2017) A survey on various file sharing methods in P2P networks, 2017 3rd international conference on science technology engineering management (ICONSTEM), Chennai, pp 305-310. Vimal S, Srivatsa SK (2017) A survey on various file sharing methods in P2P networks, 2017 3rd international conference on science technology engineering management (ICONSTEM), Chennai, pp 305-310.
10.
go back to reference Saroiu S, Khrisna P, Khrisna P (2006) A measurement study of peer-to-peer file sharing systems. Dept. of Computer Science and Engineering. University of Washington USA Saroiu S, Khrisna P, Khrisna P (2006) A measurement study of peer-to-peer file sharing systems. Dept. of Computer Science and Engineering. University of Washington USA
11.
go back to reference Cox JH Jr, Clark RJ, Owen HL III (2016) Leveraging SDN to improve the security of DHCP. In: Proceedings of the 2016 ACM international workshop on security in software defined networks network function virtualization (SDN-NFV Security ’16). ACM, New York Cox JH Jr, Clark RJ, Owen HL III (2016) Leveraging SDN to improve the security of DHCP. In: Proceedings of the 2016 ACM international workshop on security in software defined networks network function virtualization (SDN-NFV Security ’16). ACM, New York
12.
go back to reference Pang R, Allman M, Bennett M, Lee J, Paxson V, Tierney B (2005) A first look at modern enterprise traffic. Internet measurement conference Pang R, Allman M, Bennett M, Lee J, Paxson V, Tierney B (2005) A first look at modern enterprise traffic. Internet measurement conference
13.
go back to reference Qin Y, Tian X, Wu W, Wang X, Wu W, Wang X (2016) Mobility weakens the distinction between multicast and unicast. IEEE/ACM Trans Netw Qin Y, Tian X, Wu W, Wang X, Wu W, Wang X (2016) Mobility weakens the distinction between multicast and unicast. IEEE/ACM Trans Netw
14.
go back to reference Ngo C-W, Zhao W-L, Jiang Y-G (2006) Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Proceedings of the 14th annual ACM international conference on Multimedia Ngo C-W, Zhao W-L, Jiang Y-G (2006) Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Proceedings of the 14th annual ACM international conference on Multimedia
15.
go back to reference Benchi A, Launay P, Guidec F (2015) Solving Consensus in Opportunistic Networks. In: Proceedings of the 2015 International Conference on Distributed Computing and Networking, New York, NY, USA Benchi A, Launay P, Guidec F (2015) Solving Consensus in Opportunistic Networks. In: Proceedings of the 2015 International Conference on Distributed Computing and Networking, New York, NY, USA
16.
go back to reference Zhang X, Qin J, Wang W, Sun Y, Lu J (2013) HmSearch: an efficient hamming distance query processing algorithm. In: Proceedings of the 25th international conference on scientific and statistical database management Zhang X, Qin J, Wang W, Sun Y, Lu J (2013) HmSearch: an efficient hamming distance query processing algorithm. In: Proceedings of the 25th international conference on scientific and statistical database management
17.
go back to reference Matl L, Cerny T, Donahoo MJ (2015) Effective manycast messaging for Kademlia network. In: Proceedings of the 30th annual ACM symposium on applied computing, New York, NY USA Matl L, Cerny T, Donahoo MJ (2015) Effective manycast messaging for Kademlia network. In: Proceedings of the 30th annual ACM symposium on applied computing, New York, NY USA
18.
go back to reference Yang XY, Hernandez P, Souza L, Ripoll A, Suppi R, Luque E, Cores F (2006) Multi- collaboration domain multicast P2P delivery architecture for VoD system. IEEE international conference on communications Yang XY, Hernandez P, Souza L, Ripoll A, Suppi R, Luque E, Cores F (2006) Multi- collaboration domain multicast P2P delivery architecture for VoD system. IEEE international conference on communications
19.
go back to reference Vellore P, Gillard P, Venkatesan R, Gillard P, Venkatesan R (2009) Performance analysis of BitTorrent enabled ad hoc network routing. In: Proceedings of the 2009 international conference on wireless communications and mobile computing Vellore P, Gillard P, Venkatesan R, Gillard P, Venkatesan R (2009) Performance analysis of BitTorrent enabled ad hoc network routing. In: Proceedings of the 2009 international conference on wireless communications and mobile computing
20.
go back to reference Ari I, Hong B, Miller EL, Brandt SA (2013) Managing flash crowds on the internet. International symposium on modeling, analysis and simulation of computer telecommunications systems Ari I, Hong B, Miller EL, Brandt SA (2013) Managing flash crowds on the internet. International symposium on modeling, analysis and simulation of computer telecommunications systems
21.
go back to reference Faqs.org: Network Address Translation, [Online] Faqs.org: Network Address Translation, [Online]
22.
go back to reference Yu-Wei E, Xin S, Sanjay G, Maltz GG (2011) Towards systematic design of enterprise networks. IEEE/ACM Transactions on Networking. Vol. 19. Issue 3 USA Yu-Wei E, Xin S, Sanjay G, Maltz GG (2011) Towards systematic design of enterprise networks. IEEE/ACM Transactions on Networking. Vol. 19. Issue 3 USA
23.
go back to reference Qiu D., Srikant R. (2004) Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: Proceedings of ACM Sigcomm, Portland, OR Qiu D., Srikant R. (2004) Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: Proceedings of ACM Sigcomm, Portland, OR
24.
go back to reference Beecks C, Uysal MS, Seidl T (2010) Similarity matrix compression for efficient signature quadratic form distance computation. In: SISAP ’10: Proceedings of the 3rd international conference on similarity search and applications Beecks C, Uysal MS, Seidl T (2010) Similarity matrix compression for efficient signature quadratic form distance computation. In: SISAP ’10: Proceedings of the 3rd international conference on similarity search and applications
25.
go back to reference Gomaa WH, Fahmy AA (2013) A survey of text similarity approaches. Int J Comput Appl 68(13):13–18 Gomaa WH, Fahmy AA (2013) A survey of text similarity approaches. Int J Comput Appl 68(13):13–18
26.
go back to reference Qin F, Lui J, Zheng L (2009) An effective network-aware peer selection algorithm in BitTorrent. 5th international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September Qin F, Lui J, Zheng L (2009) An effective network-aware peer selection algorithm in BitTorrent. 5th international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September
27.
go back to reference Wu T, Li M, Ponraj M (2009) A genetic algorithm based peer selection strategy for BitTorrent networks, Nature biologically inspired computing Wu T, Li M, Ponraj M (2009) A genetic algorithm based peer selection strategy for BitTorrent networks, Nature biologically inspired computing
28.
go back to reference Rong O (2014) A novel peer selection algorithm to reduce BitTorrent-like P2P traffic between networks. Information technology and computer science Rong O (2014) A novel peer selection algorithm to reduce BitTorrent-like P2P traffic between networks. Information technology and computer science
30.
go back to reference Lawey AQ, El-Gorashi T, Elmirghani JMH (2012) Energy-efficient peer selection mechanism for BitTorrent content distribution, IEEE Global Communications Conference (GLOBECOM), Anaheim, CA Lawey AQ, El-Gorashi T, Elmirghani JMH (2012) Energy-efficient peer selection mechanism for BitTorrent content distribution, IEEE Global Communications Conference (GLOBECOM), Anaheim, CA
31.
go back to reference Qureshi A (2004) Exploring proximity based peer selection in a BitTorrent-like protocol, MIT 6.824 student project Qureshi A (2004) Exploring proximity based peer selection in a BitTorrent-like protocol, MIT 6.824 student project
32.
go back to reference Liu P, Chiang T, Chien Y (2009) Improving mobile peer-to-peer streaming service with BitTorrent-like redundant tracker, Mobile Data Management: Systems, services and middleware Liu P, Chiang T, Chien Y (2009) Improving mobile peer-to-peer streaming service with BitTorrent-like redundant tracker, Mobile Data Management: Systems, services and middleware
33.
go back to reference Bindal R, Cao P, Chan W (2006) Improving traffic locality in BitTorrent via biased neighbor selection. IEEE international conferences on distributed computing Bindal R, Cao P, Chan W (2006) Improving traffic locality in BitTorrent via biased neighbor selection. IEEE international conferences on distributed computing
34.
go back to reference Sugavanesh B, Hari Prasath R, Selvakumar S (2013) SHS-HTTPS enforcer: Enforcing HTTPS and preventing MITM attacks. ACM SIGSOFT Soft Engineer 38(6):1–4 Sugavanesh B, Hari Prasath R, Selvakumar S (2013) SHS-HTTPS enforcer: Enforcing HTTPS and preventing MITM attacks. ACM SIGSOFT Soft Engineer 38(6):1–4
35.
go back to reference Aguilar A, Lozoya C, Ventura-Molina C (2017) BiT-SiEm: A packet-level simulation and emulation platform for BitTorrent, Journal of Applied Research and Technology Aguilar A, Lozoya C, Ventura-Molina C (2017) BiT-SiEm: A packet-level simulation and emulation platform for BitTorrent, Journal of Applied Research and Technology
36.
go back to reference Richter P, Wohlfart F, Vallina-Rodriguez N, Allman M, Bush R, Feldmann A, Kreibich C, Weaver N, Paxson V (2016) A multi-perspective analysis of carrier-grade NAT deployment. In: Proceedings of the 2016 internet measurement conference (IMC ’16), New York, NY, USA Richter P, Wohlfart F, Vallina-Rodriguez N, Allman M, Bush R, Feldmann A, Kreibich C, Weaver N, Paxson V (2016) A multi-perspective analysis of carrier-grade NAT deployment. In: Proceedings of the 2016 internet measurement conference (IMC ’16), New York, NY, USA
37.
go back to reference El Afia A, Lalaoui M, Chiheb R (2017) Fuzzy logic controller for an adaptive Huang cooling of simulated annealing. In: Proceedings of the 2nd international conference on big data, cloud and applications (BDCA’17), New York, NY, USA El Afia A, Lalaoui M, Chiheb R (2017) Fuzzy logic controller for an adaptive Huang cooling of simulated annealing. In: Proceedings of the 2nd international conference on big data, cloud and applications (BDCA’17), New York, NY, USA
Metadata
Title
A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks
Authors
Alberto Aguilar
Camilo Lozoya
Luis M. Orona
Publication date
22-02-2019
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2019
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-018-0711-8

Other articles of this Issue 5/2019

Peer-to-Peer Networking and Applications 5/2019 Go to the issue

Premium Partner