H-Pastry: An Adaptive Multi-level Overlay Inter-Network

نویسندگان

  • Nikos Fotiou
  • Konstantinos Katsaros
  • Xenofon Vasilakos
  • Christos Tsilopoulos
  • Christopher N. Ververidis
  • George Xylomenos
  • George C. Polyzos
چکیده

Overlay networks are widely used for locating and disseminating information, by means of custom routing and forwarding on top of the underlying network. Distributed Hash Table (DHT) based overlays provide flexibility coupled with good scalability and load balancing properties. However, this comes at the cost of inefficient routing, caused by the lack of adaptation to the underlying network: current DHT designs often overlook physical network proximity, administrative boundaries and inter-domain routing policies, or a combination thereof. In this paper we show how to construct a DHT-based overlay network that takes all these aspects into account. Based on the Pastry distributed object location and routing substrate and the Canon paradigm, we developed HPastry, an overlay DHT scheme that harvests the scalability and load balancing features of flat DHT designs, while also adapting to the underlying network topology, administrative structure and routing policies. We evaluate the performance characteristics of the proposed scheme through an extensive set of detailed simulations over realistic inter-network topologies. Our results show that H-Pastry substantially improves routing by reducing both overlay path stretch (by up to 50%) and routing policy violations (by up to 67%), compared to the canonical Chord DHT. In addition, the canonical design of HPastry keeps traffic within administrative boundaries as far as possible, while also creating excellent opportunities for the support of caching and multicast. Keywords-overlay; hierarchical; DHT; Pastry;

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

H-Pastry: An inter-domain topology aware overlay for the support of name-resolution services in the future Internet

Overlay networks are widely used for locating and disseminating information by means of custom routing and forwarding on top of an underlying network. Distributed Hash Table (DHT) based overlays in particular, provide good scalability and load balancing properties. However, these come at the cost of inefficient routing, caused by the lack of adaptation to the underlying network, as DHTs often o...

متن کامل

An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlay Networks

Peer-to-peer overlay networks such as CAN, Chord, Pastry, and Tapestry can be used to implement Internet-scale application-level multicast. There are two general approaches to accomplishing this: tree building (used by Bayeux and Scribe); and flooding (used by CAN Multicast). This paper presents of an evaluation of these two approaches using CAN and Pastry as the underlying overlay networks. We...

متن کامل

An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays

Structured peer-to-peer overlay networks such as CAN, Chord, Pastry, and Tapestry can be used to implement Internet-scale application-level multicast. There are two general approaches to accomplishing this: tree building and flooding. This paper evaluates these two approaches using two different types of structured overlay: 1) overlays which use a form of generalized hypercube routing, e.g., Ch...

متن کامل

Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems

This paper presents the design and evaluation of Pastry, a scalable, distributed object location and routing scheme for wide-area peer-to-peer applications. Pastry performs application-level routing and object location in a potentially very large overlay network of nodes connected via the Internet. It can be used to support a wide range of peer-to-peer applications like global data storage, glo...

متن کامل

Taxonomy of Structured P2P Overlay Networks Security Attacks

The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this paper, we attempt to provide a taxonomy of structured P2P overlay networks security attacks. We have specially focused on the way these attacks can arise at each level of the network. Moreove...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011