scispace - formally typeset
Search or ask a question
Topic

Overlay network

About: Overlay network is a research topic. Over the lifetime, 9531 publications have been published within this topic receiving 214893 citations. The topic is also known as: Overlay network.


Papers
More filters
01 Jan 2012
TL;DR: The effects of topologically aware overlay construction techniques on efficient P2P keyword search algorithms are considered and the Peer Fusion architecture is presented that aims to efficiently integrate heterogeneous information that is geographically scattered on peers of different networks.
Abstract: The emerging Peer-to-Peer model has become a very powerful and attractive paradigm for developing Internet-scale systems for sharing resources, including files and documents. The distributed nature of these systems, where nodes are typically located across different networks and domains, inherently hinders the efficient retrieval of information. In this paper, we consider the effects of topologically aware overlay construction techniques on efficient P2P keyword search algorithms. We present the Peer Fusion architecture that aims to efficiently integrate heterogeneous information that is geographically scattered on peers of different networks. The aim of PFusion Architecture is to integrate the heterogeneous information i.e. text, graph, sound, files, mails, Message etc. by means of an efficient scarch mechanism. It is powerful and attractive paradigm of Internet Systems for Searching and Passing of Message on different domains. There is an overall construction technique to get the good results for obtaining the shortest path of routing for the required Search and Retrieval of information. There is an improvement of latency time i.e. the time taken for the Retrieval of information from the Server. The basic idea is that an overlay Networks of nodes is constructed on top of heterogeneous Operating System and Network overlays which are flexible and deployable approaches that allow users to perform distributed operation without modifying the underlying the Physical Networks.
Proceedings ArticleDOI
01 Jul 2018
TL;DR: It is shown that the overlay network allows fair coexistence of PM2M and H2H traffic, and that high priority M2M traffic is distinctly prioritized over low priority one, even though the latter still enjoys satisfactory performance.
Abstract: We describe a priority-based CSMA/CA overlay network over LTE which is suitable for many application areas that require Machine-to-Machine (M2M) communications. The proposed overlay network uses LTE physical random access channel (PRACH) as the physical layer and a carrier sense multiple access with collision avoidance (CSMA/CA) mechanism similar to the one used in IEEE 802.15.6 Wireless Body Area Network (WBAN). We analyze the performance of H2H traffic in the presence of the overlay as well as the performance of the overlay itself, taking into consideration noise and sensing errors coming from the concurrent human to human (H2H) traffic in that same cell as well as in neighboring cells. We show that the overlay network allows fair coexistence of PM2M and H2H traffic, and that high priority M2M traffic is distinctly prioritized over low priority one, even though the latter still enjoys satisfactory performance.
Patent
28 Aug 2009
TL;DR: In this paper, the authors proposed a scheme to secure the transmission of data in an automation system comprising a plurality of network nodes, where network nodes interconnected by an unsecured network are detected.
Abstract: The aim of the invention is to secure the transmission of data in an automation system comprising a plurality of network nodes. To this end, network nodes interconnected by an unsecured network are detected. On the basis of the detected network nodes, a selection of network nodes is determined, for which the communication thereof to a network protocol plane above a transport layer is to be secured. On the basis of the selection, digital signature keys specific to each network node are transmitted to network nodes comprised in the selection. Communication between network nodes comprised in the selection is secured on the basis of the transmitted signature key.
Proceedings Article
01 Jan 2004
TL;DR: A dependable genuinely distributed (’peer-to-peer’) system is proposed, that uses XML description files to construct overlay networks that exhibit small world properties and in which similar resources are grouped together.
Abstract: Resource discovery systems are gaining in importance as the diversity and variability of shared resources in distributed networked systems increases. A dependable genuinely distributed (’peer-to-peer’) system is proposed, that uses XML description files to construct overlay networks that exhibit small world properties (i.e., a small diameter and a regular structure) and in which similar resources are grouped together. The overlay network’s structure, failure detection and recovery mechanisms, allow the system to converge to a degraded functionality in the advent of failures and to recover swiftly after the failed nodes are repaired or communication is restored.
Book ChapterDOI
22 Oct 2008
TL;DR: This paper considers the case of an arbitrary set of mixed-technology nodes which are to be joined in a topology based on end-to-end delay measurements among nodes and proposes an algorithm that allows for efficient detection of a logical topology of a network with no initial topology.
Abstract: Traditional research in on-demand topological solutions is gathered around the two main clusters, - wireless ad-hoc networks and fixed overlay networks. Both are very different in nature, but they both deal with the same problem which is to create a topology out of an arbitrary set of nodes. This paper considers the case of an arbitrary set of mixed-technology nodes which are to be joined in a topology based on end-to-end delay measurements among nodes. The core of the proposal is topology inference based on triangular inequality of end-to-end delay which is finalized in form of an algorithm that allows for efficient detection of a logical topology of a network with no initial topology. The algorithm is scalable and could be a practical solution for many scenarios involving community services created on-demand and intended for a short lifespan.

Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
94% related
Server
79.5K papers, 1.4M citations
94% related
Wireless ad hoc network
49K papers, 1.1M citations
93% related
Wireless network
122.5K papers, 2.1M citations
93% related
Mobile computing
51.3K papers, 1M citations
92% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202319
202267
2021100
2020149
2019150
2018195