DocumentCode :
1972993
Title :
Cyclic routing: Generalizing look-ahead in peer-to-peer networks
Author :
Korzun, Dmitry ; Nechaev, Boris ; Gurtov, Andrei
Author_Institution :
Dept. of Comput. Sci., Petrozavodsk State Univ. (PetrSU), Petrozavodsk
fYear :
2009
fDate :
10-13 May 2009
Firstpage :
697
Lastpage :
704
Abstract :
Distributed Hash Tables (DHT) provide a lookup service in peer-to-peer overlay networks. Many valuable applications have been recently built on top of several available DHTs. However, they function poorly when no direct IP connectivity is available to some nodes (e.g., located behind a NAT or firewall) or in the presence of overloaded or malicious nodes. In this paper, we propose a new method for DHT-based routing called cyclic routing. It generalizes existing single-hop look-ahead approach (also known as ldquoKnow thy neighbor´s neighborrdquo) and supports multipath routing. The method provides a systematic way for collecting stable and efficient overlay paths. Cyclic routing has the same theoretical dependability and efficiency upper bounds as basic DHT routing but it is more resilient when IP connectivity is limited or when the overlay suffers from overloaded nodes.
Keywords :
peer-to-peer computing; telecommunication network routing; Cyclic Routing:; cyclic routingmultipath routing; cyclic routingsingle-hop look-ahead approach; distributed hash tables; peer-to-peer networks; Chromium; Computer science; Information technology; Intrusion detection; Mobile communication; Network address translation; Peer to peer computing; Proposals; Routing; Upper bound; Distributed hash tables; Lookup availability; Peer-to-Peer routing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS International Conference on
Conference_Location :
Rabat
Print_ISBN :
978-1-4244-3807-5
Electronic_ISBN :
978-1-4244-3806-8
Type :
conf
DOI :
10.1109/AICCSA.2009.5069403
Filename :
5069403
Link To Document :
بازگشت