While unstructured P2P systems have been embraced widely in mobile ad-hoc networks (MANETs), the applicability of structured approaches like distributed hash tables (DHTs) to such settings remains controversial. Exist...
详细信息
While unstructured P2P systems have been embraced widely in mobile ad-hoc networks (MANETs), the applicability of structured approaches like distributed hash tables (DHTs) to such settings remains controversial. Existing research delivers promising empirical results addressing the concerns about performance, complexity, and reliability, but does not analyze the principles of combining DHTs and MANETs. This paper identifies and discusses the fundamental implications of non-infrastructural networks for DHTs and analyzes solutions to these challenges
Configuration and management of radio access nodes in beyond 3G (B3G) networks such as nodeBs, wireless LAN or WIMAX access points is a complex task that consumes a high amount of resources. Most configuration changes...
详细信息
Configuration and management of radio access nodes in beyond 3G (B3G) networks such as nodeBs, wireless LAN or WIMAX access points is a complex task that consumes a high amount of resources. Most configuration changes have to be done by an operator, especially when it comes to the adaption of a node to its environment, i.e., the cells surrounding its own. This is an expensive and inflexible method. Moreover, the required manual interference hampers the adaptivity of B3G networks towards topology changes. In this work, we present an architecture that allows for the detection of neighboring cells, thereby enabling an easy or even autonomic configuration of the access nodes. In addition to this, the presented Kademlia-based overlay network enables the storage of information needed for network management, such as configuration data or performance measures
Along with the increasing diversity of educational markup languages there is a strong need for flexible integration of such content into learning platforms. Therefore, we have identified four basic mechanisms: plain l...
详细信息
Along with the increasing diversity of educational markup languages there is a strong need for flexible integration of such content into learning platforms. Therefore, we have identified four basic mechanisms: plain linking from the platform to external content, conversion of content into the platforms native format, and service-based invocation of external content as well as specific functionality related to it. Architectural principles, benefits, and drawbacks of these concepts are compared, and exemplary realizations are described.
Some of the key issues in building services for large scale distributedsystems, realizing Vishwa, a peer-to-peer (P2P) middleware architecture for developing grid applications are discussed. Researchers are producing...
详细信息
Some of the key issues in building services for large scale distributedsystems, realizing Vishwa, a peer-to-peer (P2P) middleware architecture for developing grid applications are discussed. Researchers are producing large amounts of scientific data and believe that distributed computations on the data must be scheduled and available to a large number of scientists. It is suggested that the platform must scale up to a large number of nodes and data units in the system and must also be scalable geographically. A scalable, reconfigurable shared-object space over the two-layer architecture can be developed that incorporates mechanisms to maintain replicated data and must also provide a shared-object abstraction over a wide-area distributed system.
The Java messaging service (JMS) is a means to organize communication among distributed applications according to the publish/subscribe principle. If the subscribers install filter rules on the JMS server, JMS can be ...
详细信息
The Java messaging service (JMS) is a means to organize communication among distributed applications according to the publish/subscribe principle. If the subscribers install filter rules on the JMS server, JMS can be used as a message routing platform, but it is not clear whether its message throughput is sufficiently high to support large-scale systems. In this paper, we investigate the capacity of the high performance JMS server implementation by Fiorano. In contrast to other studies, we focus on the message throughput in the presence of filters and show that filtering reduces the performance significantly. We also present a model that describes the service time for a single message depending on the number of installed filters and validate it by measurements. This model helps to forecast the system throughput for specific application scenarios.
MPLS fast reroute (MPLS-FRR) mechanisms deviate the traffic in case of network failures at the router closest to the outage location to achieve an extremely fast reaction time. We review and compare the one-to-one bac...
详细信息
ISBN:
(纸本)9783800729593;3800729598
MPLS fast reroute (MPLS-FRR) mechanisms deviate the traffic in case of network failures at the router closest to the outage location to achieve an extremely fast reaction time. We review and compare the one-to-one backup and the facility backup concept that are options for MPLS-FRR to deviate the traffic via a detour or a bypass, respectively. Basically, the backup paths can take the shortest path that avoids the outage location from the point of local repair to the tail-end router or to the merge point. We then evaluate the backup capacity requirements and the configuration overhead in terms of the number of backup paths per primary path in a parametric study depending on the network characteristics. While the facility backup concept imposes clearly less configuration overhead than the one-to-one backup, its standard path layout requires more capacity. This can be reduced by a simple modification.
Structured peer-to-peer systems are designed for a highly scalable, self organizing, and efficient lookup for data. The key space of the so-called distributed hash tables (DHTs) is partitioned and each partition with ...
详细信息
Structured peer-to-peer systems are designed for a highly scalable, self organizing, and efficient lookup for data. The key space of the so-called distributed hash tables (DHTs) is partitioned and each partition with its keys and values is assigned to a node in the DHT. For data retrieval however, the very nature of hash tables allows only exact pattern matches. We propose Cerco, a simple solution for the problem of range queries by employing a hierarchically structured P2P approach based on the principles of distributed hash tables. We show that a dynamic hierarchy of DHTs with on-demand classification of items can positively influence the response time of queries while maintaining lookup correctness
When transacting and interacting through open computer networks, traditional methods used in the physical world for establishing trust can no longer be used. Creating virtual network substitutes with which people, org...
详细信息
Connectors are used to realize component interactions in component systems. Apart from their primary function, which is mediating the communication, their implementation can also support additional features that, whil...
详细信息
This paper presents two novel generic adaptive batching schemes for replicated servers. Both schemes are oblivious to the underlying communication protocols. Our novel schemes adapt their batching levels automatically...
详细信息
This paper presents two novel generic adaptive batching schemes for replicated servers. Both schemes are oblivious to the underlying communication protocols. Our novel schemes adapt their batching levels automatically and immediately according to the current communication load. This is done without any explicit monitoring or calibration of the system. Additionally, the paper includes a detailed performance evaluation
暂无评论