Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Overlay Networks: Toward Information Networking.February 2010
Publisher:
  • Auerbach Publications
  • Imprint of Warren, Gorham and Lamont 31 St. James Avenue Boston, MA
  • United States
ISBN:978-1-4398-1371-3
Published:09 February 2010
Pages:
260
Skip Bibliometrics Section
Reflects downloads up to 10 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

A recent Cisco traffic forecast indicates that annual global IP traffic will reach two-thirds of a zettabyte by 2013. With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the authors articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of the art in applications, decentralized overlays, security, information routing, and information forwarding. The book provides readers with an overview of networking technologies, the TCP/IP protocol suite, and networking basics. It also examines: The foundations of structured overlays Unstructured P2P overlay networks Graph-based algorithms for information dissemination and probabilistic algorithms Content-centric routing and a number of protocols and algorithms Security challenges of P2P and overlay technologiesproviding solutions for these mitigating risks Written by a scientist who is a university professor and a senior member of the Nokia research staff, this forward-looking reference covers advanced issues concerning performance and scalability. It highlights recent developments and discusses specific algorithms, including BitTorrent, Coolstream, BitOs, Chord, Content Addressable Network, Content Delivery Networks, Overlay multicast, and Peer-to-Peer SIP. Complete with a number of frequently-used probabilistic techniques and projections for future trends, this authoritative resource provides the tools and understanding needed to create deployable solutions for processing and distributing the vast amounts of data that modern networksdemand.

Cited By

  1. Evropeytsev G, Lpez Domnguez E, Pomares Hernandez S, Lpez Trinidad M and Perez Cruz J (2017). An efficient causal group communication protocol for P2P hierarchical overlay networks, Journal of Parallel and Distributed Computing, 102:C, (149-162), Online publication date: 1-Apr-2017.
  2. Saurabh N, Kimovski D, Gaetano F and Prodan R A Two-Stage Multi-Objective Optimization of Erasure Coding in Overlay Networks Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, (150-159)
  3. Steen M and Tanenbaum A (2016). A brief introduction to distributed systems, Computing, 98:10, (967-1009), Online publication date: 1-Oct-2016.
  4. Ghaeini H, Akbari B, Barekatain B and Trivino-Cabrera A (2016). Adaptive video protection in large scale peer-to-peer video streaming over mobile wireless mesh networks, International Journal of Communication Systems, 29:18, (2580-2603), Online publication date: 1-Dec-2016.
  5. ACM
    Ludwig S MapReduce-based optimization of overlay networks using particle swarm optimization Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1031-1038)
  6. Walkowiak K, Kasprzak A, Kosowski M and Miziołek M Scheduling and capacity design in overlay computing systems Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV, (514-529)
  7. Wiśniewski M and Walkowiak K Evolutionary algorithm for P2P multicasting network design problem Proceedings of the 6th international conference on Hybrid artificial intelligent systems - Volume Part I, (182-189)
Contributors
  • University of Helsinki

Reviews

Piotr A Cholda

Readers who are looking for a fast yet competent introduction to peer-to-peer (P2P) and, more generally, overlay networking will benefit from this book. Tarkoma uses his own lecturing experiences to present this hot topic in an interesting and original way. Chapter 1 quickly jumps into overlay and P2P problems. Apart from definitions of basic terms, such as distributed hash tables, this chapter also provides some useful and original classifications and explanations. A good understanding of overlay operations requires a deeper background in general networking, which is provided in chapter 2. The following issues are briefly characterized: firewalls and network address translation, naming, inter-domain routing, multicasting, and network coordinates. The next chapter deals with some general conditions related to networks that form the global Internet, such as the types and volume of data sent, a description of topologies (by scale-free networks and small worlds), and the resilience of the structures. Chapter 4 presents unstructured overlays, while chapters 5 and 6 cover structured overlays. Although similar chapters can be found in virtually all books on P2P, Tarkoma presents some concepts that are not often found in the literature, such as a thorough description of BitTorrent and a sketch on limiting inter-domain traffic generated by overlays. The next two chapters present issues not frequently described in books on overlays, including probabilistic algorithms (based on Bloom filtering, for instance) and content-based routing. The chapters apparently mirror the author's interests, and they should be quite useful to readers who are looking for research suggestions. Chapter 9 focuses on security, and chapter 10 presents some selected applications of overlay-related concepts. A short chapter 11 summarizes the work. The book is well written and carefully thought out. Many segments answer questions that are not frequently addressed in this kind of book, and I suspect that they are responses to problems raised by Tarkoma's students. Thus, I recommend this book to readers who want to know what P2P is, readers who are interested in practical problems related to current Internet applications, and readers who seek inspiration for creating new designs of this kind. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations