Flood search under the California Split rule

نویسندگان

  • Yuliy M. Baryshnikov
  • Edward G. Coffman
  • Predrag R. Jelenkovic
  • Petar Momcilovic
  • Dan Rubenstein
چکیده

Since a major portion of traffic in the Internet is attributed to file swapping, overlay peer-to-peer (P2P) networks are one of the most popular applications on the Web. Since such networks are fully distributed, the efficiency of their operation highly depends on one’s ability to locate information in them. Two types of P2P networks have received considerable attention: structured and unstructured. Structured networks form an overlay and configure information in a specific way that allows clients to search efficiently (see e.g., [3, 11, 12]). For example, file xyz is always stored in a part of the overlay having files with similar characteristics like the values of a distributed hash function. Thus, when a client searches for xyz it only needs to examine a small number of specific ”places”. Such an approach seems very reasonable when most of the clients belong to the same entity and are willing to cooperate, such as would be the case when a client is required to store xyz even if it has no interest in it. However, most of the operational P2P networks (e.g., Gnutella, KaZaA) are formed by clients that have little or no incentive to perform social functions at their own expense. Hence, unstructured P2P networks, the focus of this paper, are likely to remain popular. Efficient search in unstructured P2P networks is a challenging problem. With no specific knowledge as to where the object might be located, or even whether it exists, the only option that a client has is to query other clients for the object until it is found. Usually, when designing a search algorithm, two parameters need to be balanced: (i) the time it takes to locate an object, assuming it exists, and (ii) the overhead associated with the search, e.g., the total number of query messages. Two methods developed in the literature are the expanding ring algorithm (used in Gnutella) and the random-walkers approach [10]. Flood search, i.e., the expanding ring algorithm, is a natural solution when one would like to complete the search in a short period of time. Briefly, this algorithm can be described as follows. In the first round, the client queries its neighbors, i.e., nodes that are one hop away in the overlay. This is achieved by setting the time-to-live (TTL) field in the query to one. If the object is not located, the client sets a

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Voltage Sag Compensation with DVR in Power Distribution System Based on Improved Cuckoo Search Tree-Fuzzy Rule Based Classifier Algorithm

A new technique presents to improve the performance of dynamic voltage restorer (DVR) for voltage sag mitigation. This control scheme is based on cuckoo search algorithm with tree fuzzy rule based classifier (CSA-TFRC). CSA is used for optimizing the output of TFRC so the classification output of the network is enhanced. While, the combination of cuckoo search algorithm, fuzzy and decision tree...

متن کامل

The early bird catches the news: Nine things you should know about micro-blogging

At 2:26 p.m. on June 25, 2009, the world stood still for a split second when word spread that Michael Jackson, the King of Pop, might have died at the UCLA Medical Center from cardiac arrest. Naturally, millions of people rushed to Google News to verify whether this rumor was true, only to read: ‘‘We’re sorry, but your query looks similar to automated requests from a computer virus or spyware a...

متن کامل

Comparing Simple Flood Reservoir Operation Rules

The effectiveness of three simple flood operating rules in reducing the peak flow is compared for four simplified hydrograph shapes. The Minimize Flood Peak rule uses available flood storage capacity to store peak flows from an accurate hydrograph forecast. The less demanding Minimize Flooding Frequency operating rule releases water at or below channel capacity until the flood storage pool is f...

متن کامل

Precipitaton References

Das, T., et al. (2011). "Potential increase in floods in California's Sierra Nevada under future climate projections." Climatic Change 109: 71-94. California's mountainous topography, exposure to occasional heavily moisture-laden storm systems, and varied communities and infrastructures in low lying areas make it highly vulnerable to floods. An important question facing the state-in terms of pr...

متن کامل

تخمین عدم قطعیت مدل شبیه سازی سیلاب HEC-HMS با استفاده از الگوریتم مونت کارلو زنجیره مارکوف

There are some parameters in hydrologic models that cannot be measured directly. Estimation of hydrologic model parameters by various approaches and different optimization algorithms are generally error-prone, and therefore, uncertainty analysis is necessary. In this study we used DREAM-ZS, Differential Evolution Adaptive Metropolis, to investigate uncertainties of hydrologic model (HEC-HMS) pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Oper. Res. Lett.

دوره 32  شماره 

صفحات  -

تاریخ انتشار 2004