Academia.eduAcademia.edu

Overlay Network

description4,149 papers
group28 followers
lightbulbAbout this topic
An overlay network is a virtual network that is built on top of an existing physical network, enabling the creation of logical connections between nodes that may not be directly connected. It facilitates communication and data exchange by using protocols that operate independently of the underlying infrastructure.
lightbulbAbout this topic
An overlay network is a virtual network that is built on top of an existing physical network, enabling the creation of logical connections between nodes that may not be directly connected. It facilitates communication and data exchange by using protocols that operate independently of the underlying infrastructure.
Although the number of accidents that occur on roads is slowly decreasing in time, as both cars and streets become progressively safer, the Statistics of Road Traffic Accidents study from the United Nations reveals that during the last... more
Continuous monitoring of a network domain poses several challenges. First, routers of a network domain need to be polled periodically to collect statistics about delay, loss, and bandwidth. Second, this huge amount of data has to be mined... more
MotusNet is a content network in which the addressable objects, contents, are decoupled from the physical nodes that carry them. The content names in MotusNet are hierarchical, so that they can be aggregated in the routing tables to... more
Kubernetes is the leading platform for orchestrating containerized applications. In this paper, we extend Kubernetes networking to make use of SRv6, a feature-rich overlay networking mechanism. Integration with SRv6 can be very beneficial... more
Computational grids are believed to be an effective and scalable solution to the problem of resource sharing over large, heterogeneous networks of computing devices. Since grids are highly distributed in nature, one of the most... more
Session Initiation Protocol (SIP) is a control-plane protocol for multiple services such as VoIP, Instant Messaging and Presence, and in addition, is key to IP Multimedia Subsystem (IMS). A SIP message consists of plain-text headers and... more
Distributed knowledge management systems (DKMS) have been suggested to meet the requirements of today's knowledge management. Peer-to-peer systems offer technical foundations for such distributed systems. To estimate the value of... more
Almost all the natural or human made systems can be understood and controlled using complex networks. This is a difficult problem due to the very large number of elements in such networks, on the order of billions and higher, which makes... more
Almost all the natural or human made systems can be understood and controlled using complex networks. This is a difficult problem due to the very large number of elements in such networks, on the order of billions and higher, which makes... more
This paper presents an analysis on performance of logarithmic degree structured P2P (peer-to-peer) overlay networks. P2P network consist of highly transient peers, where peers join and leave the network randomly also known as dynamic... more
Overlay routing is known to cause undesired instability in a network by operating in a selfish manner. The objectives of overlay routing, such as optimizing end-to-end latency, are often in conflict with the objectives of traffic... more
The onion routing (Tor) protects the IP and behavioral anonymity on the Internet by routing the networking packet through multiple randomly selected relay nodes between the source and the destination. It therefore adds transmission... more
The diffusion of wireless technologies is rapidly growing, and they are increasingly employed to provide connectivity on the road. Wireless systems are widely deployed to allow cheap devices to communicate, to provide local networking... more
Recent distributed systems, in a P2P scenario, are characterized by a set of independent peers that dynamically need to cooperate by sharing data and services. For effective collaboration, under highly dynamic conditions and in absence of... more
We present YAAP: a generic active network architecture with the ability to manually and dynamically deploy network services within distributed network nodes and providing a secure execution environment (EE). It also demultiplexes active... more
This paper presents a contribution to the OMNeT++ 4.1 simulator in C++ by integrating our own implementation of the FF -Ford-Fulkerson multipath routing algorithm. In order to validate it, an eight-node testbed works with dynamic... more
This paper addresses the problem of capacity pro- visioning in a QoS enabled IP network, subject to satisfying varying performance requirements for different traffic classes. These performance requirements are viewed in terms of mean... more
Multicasting is the enabling technology for group communication. However, network-layer multicasting (e.g., IP multicast) has not been widely adopted more than 10 years of its invention due to the concerns related to deployment,... more
This paper presents the design, analysis and performance evaluation of VRing, a novel application-layer multicast (ALM) protocol that establishes a virtual ring as an overlay network among the multicast group members in a selforganizing... more
Application-level peer-to-peer (P2P) network overlays are an emerging paradigm that facilitates decentralization and flexibility in the scalable deployment of applications such as group communication, content delivery, and data sharing.... more
Real-world IP applications such as Peer-to-Peer filesharing are now able to benefit from network and location awareness. It is therefore crucial to understand the relation between underlay and overlay networks and to characterize the... more
Real-world IP applications such as Peer-to-Peer filesharing are now able to benefit from network and location awareness. It is therefore crucial to understand the relation between underlay and overlay networks and to characterize the... more
The growth of the Internet and its popular services are forcing telecom operators to provide advanced services to their subscribers, as traditional voice services are no longer enough to attract more customers. To enable more innovative... more
Traditional software and security patch update delivery mechanisms rely on a client/server approach where clients pull updates from servers regularly. This approach, however, suffers a high window of vulnerability (WOV) for clients and... more
Both Mobile Ad Hoc Networks (MANETs) and Peer-to-Peer (P2P) Overlay Networks are decentralized and self-organizing networks with dynamic topology and responsible for routing queries in a distributed environment. Nevertheless, MANETs are... more
We describe a new scalable application-layer multicast protocol, specifically designed for low-bandwidth, data streaming applications with large receiver sets. Our scheme is based upon a hierarchical clustering of the application-layer... more
Researchers are directing enormous efforts to achieve the aim of global mobility by enhancing the standard mobile IP with various routing schemes focusing on best routes and least cost while ignoring the facts of the organizations usual... more
to come to Stanford, and also encouraged me to choose Hector as an advisor. Qi Sun took some of my research in interesting directions that I did not anticipate, and I always enjoyed having philosophical chats with him. Mayank Bawa, Brian
Despite its popularity, relatively little is known about the traffic characteristics of the Skype VoIP system and how they differ from other P2P systems. We describe an experimental study of Skype VoIP traffic conducted over a five month... more
They appeared in our life some years ago with the awakening of the PC and now the are everywhere : computers have become ubiquitous and, almost, irreplaceable. Classical ways of creating, managing and exchanging information have been... more
Adequately supporting applications with Quality-of-service (QoS) requirements is a challenging task, particularly in the Internet. In great part, this is due to the fact that the provisioning of end-toend QoS to traffic that traverses... more
In this work, we have considered a new hierarchical non-DHT based architecture for Peer-to-Peer (P2P) networks in which at each level of the hierarchy existing networks are all structured and each such network has the diameter of 1... more
The present paper proposes an architecture for a pure peer-to-peer communication system that is free from centralized coordination and knowledge. To meet this decentralization requirement the current paper focuses on a novel Overlay... more
This paper presents a fast near linear run-time algorithm for deadline-satisfying packet forwarding and route lookup. This algorithm has been designed after a Constraint Resource Planning (CRP) methodology of approximation algorithm... more
Although Peer-to-Peer live video streaming over wireless mesh networks (WMNs) is considered a promising technology, some important challenges such as interference, mobility and limited available resources in gadgets (e.g. Smartphones and... more
In recent years, Random Network Coding (RNC) has emerged as a promising solution for efficient Peer-to-Peer (P2P) video multicasting over the Internet. This probably refers to this fact that RNC noticeably increases the error resiliency... more
The scarcity of the radio channel is the main bottleneck toward maintaining the quality of service (QoS) in a mobile cellular network. As channel allocation schemes become more complex and computationally demanding, alternative... more
Computation in the mobile grid nodes under the cellular network environment requires an efficient management of wireless channels along with the user mobility. Due to random movement of the mobile devices, the load over the cells in terms... more
The existing peer-to-peer networks have several problems such as fake content distribution, free riding, white-washing and poor search scalability, lack of a robust trust model and absence of user privacy protection mechanism. Although,... more
One major benefit of named-data networking (NDN) is its potential to control network load by leveraging in-network caching and request aggregation. Both the network operator and consumers benefit from these features, as operating costs... more
creates new opportunities to save costs by converging data and telephone services. The primary question of our study is whether emerging metropolitan networks can meet the QoS requirements necessary to connect GSM and UMTS base stations.... more
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of complete probing can be as high as ¢ ¤£ ¦¥ ¨ § © , which is prohibitive in large- scale overlay networks. Recently we proposed a method... more
This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication performance, robustness, and security. The infrastructure combines adaptive... more
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changing situations. Since adaptation at one system layer may be... more
Use of multiple paths between node pairs can enable an overlay network to bypass Internet link failures. Selecting high quality primary and backup paths is challenging, however. To maximize communication reliability, an overlay multipath... more
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as ¢ ¤£ ¦¥ ¨ § © , which is prohibitive in large-scale overlay networks. Several methods have been... more
Download research papers for free!