scispace - formally typeset
Search or ask a question
Topic

Overlay network

About: Overlay network is a research topic. Over the lifetime, 9531 publications have been published within this topic receiving 214893 citations. The topic is also known as: Overlay network.


Papers
More filters
01 Jan 2012
TL;DR: This paper proposes EQUATOR (Equivalent Servant Locator), an unstructured overlay implementing the above mentioned operating principles, based on an overlay construction algorithm that well approximates an ideal scale-free construction model.
Abstract: while peer-to-peer networks are mainly used to locate unique resources across the Internet, new interesting deployment scenarios are emerging. Particularly, some applications (e.g., VoIP) are proposing the creation of overlays for the localization of services based on equivalent servants (e.g., voice relays). This paper explores the possible overlay architectures that can be adopted to provide such services, showing how an unstructured solution based on a scale-free overlay topology is an effective option to deploy in this context. Consequently, we propose EQUATOR (Equivalent Servant Locator), an unstructured overlay implementing the above mentioned operating principles, based on an overlay construction algorithm that well approximates an ideal scale-free construction model. We present both analytical and simulation results which support our overlay topology selection and validate the proposed architecture.

1,030 citations

Proceedings ArticleDOI
12 Dec 2005
TL;DR: This paper introduces a distributed filter that allows the nodes of a sensor network to track the average of n sensor measurements using an average consensus based distributed filter called consensus filter.
Abstract: Consensus algorithms for networked dynamic systems provide scalable algorithms for sensor fusion in sensor networks. This paper introduces a distributed filter that allows the nodes of a sensor network to track the average of n sensor measurements using an average consensus based distributed filter called consensus filter. This consensus filter plays a crucial role in solving a data fusion problem that allows implementation of a scheme for distributed Kalman filtering in sensor networks. The analysis of the convergence, noise propagation reduction, and ability to track fast signals are provided for consensus filters. As a byproduct, a novel critical phenomenon is found that relates the size of a sensor network to its tracking and sensor fusion capabilities. We characterize this performance limitation as a tracking uncertainty principle. This answers a fundamental question regarding how large a sensor network must be for effective sensor fusion. Moreover, regular networks emerge as efficient topologies for distributed fusion of noisy information. Though, arbitrary overlay networks can be used. Simulation results are provided that demonstrate the effectiveness of consensus filters for distributed sensor fusion.

1,010 citations

Journal ArticleDOI
09 Dec 2002
TL;DR: This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks, and describes and evaluates techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes.
Abstract: Structured peer-to-peer overlay networks provide a substrate for the construction of large-scale, decentralized applications, including distributed storage, group communication, and content distribution. These overlays are highly resilient; they can route messages correctly even when a large fraction of the nodes crash or the network partitions. But current overlays are not secure; even a small fraction of malicious nodes can prevent correct message delivery throughout the overlay. This problem is particularly serious in open peer-to-peer systems, where many diverse, autonomous parties without preexisting trust relationships wish to pool their resources. This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks. We describe and evaluate techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes.

881 citations

Proceedings ArticleDOI
07 Nov 2002
TL;DR: In this paper, the authors present a binning scheme whereby nodes partition themselves into bins such that nodes that fall within a given bin are relatively close to one another in terms of network latency.
Abstract: A number of large-scale distributed Internet applications could potentially benefit from some level of knowledge about the relative proximity between its participating host nodes. For example, the performance of large overlay networks could be improved if the application-level connectivity between the nodes in these networks is congruent with the underlying IP-level topology. Similarly, in the case of replicated Web content, client nodes could use topological information in selecting one of multiple available servers. For such applications, one need not find the optimal solution in order to achieve significant practical benefits. Thus, these applications, and presumably others like them, do not require exact topological information and can instead use sufficiently informative hints about the relative positions of Internet hosts. In this paper, we present a binning scheme whereby nodes partition themselves into bins such that nodes that fall within a given bin are relatively close to one another in terms of network latency. Our binning strategy is simple (requiring minimal support from any measurement infrastructure), scalable (requiring no form of global knowledge, each node only needs knowledge of a small number of well-known landmark nodes) and completely distributed (requiring no communication or cooperation between the nodes being binned). We apply this binning strategy to the two applications mentioned above: overlay network construction and server selection. We test our binning strategy and its application using simulation and Internet measurement traces. Our results indicate that the performance of these applications can be significantly improved by even the rather coarse-grained knowledge of topology offered by our binning scheme.

876 citations

Journal ArticleDOI
TL;DR: A review of the recent bandwidth estimation literature focusing on underlying techniques and methodologies as well as open source bandwidth measurement tools is reviewed.
Abstract: In a packet network, the terms bandwidth and throughput often characterize the amount of data that the network can transfer per unit of time. Bandwidth estimation is of interest to users wishing to optimize end-to-end transport performance, overlay network routing, and peer-to-peer file distribution. Techniques for accurate bandwidth estimation are also important for traffic engineering and capacity planning support. Existing bandwidth estimation tools measure one or more of three related metrics: capacity, available bandwidth, and bulk transfer capacity. Currently available bandwidth estimation tools employ a variety of strategies to measure these metrics. In this survey we review the recent bandwidth estimation literature focusing on underlying techniques and methodologies as well as open source bandwidth measurement tools.

845 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
94% related
Server
79.5K papers, 1.4M citations
94% related
Wireless ad hoc network
49K papers, 1.1M citations
93% related
Wireless network
122.5K papers, 2.1M citations
93% related
Mobile computing
51.3K papers, 1M citations
92% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202319
202267
2021100
2020149
2019150
2018195