Robustness analysis of an unstructured overlay for media communication

Access Full Text

Robustness analysis of an unstructured overlay for media communication

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The wide diffusion of network address translators (NATs) (and, in some respect, firewalls) may prevent some applications that require direct end-to-end connectivity (e.g. real-time media) from being able to connect to the remote party. Although the solutions currently adopted rely on centralised nodes as third party relays, the distributed connectivity service (DISCOS) architecture has been recently proposed and aims at distributing such functionalities across a peer-to-peer (P2P) overlay. The original study presented some performance characteristics of the overlay, but the ability to resist to both failures and attacks was not taken into consideration. This study illustrates the robustness feature of the DISCOS overlay and suggests some minor modifications to the original mechanisms, in order to improve the overall robustness. The key component of DISCOS is its dynamic scale-free topology. Hence, the study also extends the existing literature concerning the robustness of scale-free networks, which considers only static graphs.

Inspec keywords: multimedia communication; graph theory; peer-to-peer computing; authorisation

Other keywords: peer-to-peer overlay; firewalls; dynamic scale-free topology; network address translators; centralised nodes; media communication; scale-free networks; distributed connectivity service architecture; third party relays; static graphs; direct end-to-end connectivity; unstructured overlay; robustness analysis

Subjects: Computer networks and techniques; Combinatorial mathematics; Computer communications; Data security; Multimedia communications; Multimedia; Combinatorial mathematics

References

    1. 1)
      • Fu, S., Xu, C.-Z., Shen, H.: `Random choices for churn resilient load balancing in peer-to-peer networks', Parallel Distrib. Process., 2008. IEEE Int. Symp. on IPDPS 2008, April 2008, p. 1–12.
    2. 2)
    3. 3)
    4. 4)
      • Liang, J., Naoumov, N., Ross, K.W.: `The index poisoning attack in p2p file sharing systems', Proc. 25th IEEE Int. Conf. on Computer Communications, INFOCOM 2006, April 2006, p. 1–12.
    5. 5)
    6. 6)
      • Rhea, S., Geels, D., Roscoe, T., Kubiatowicz, J.: `Handling churn in a dht', Proc. USENIX Annual Technical Conf., 2003.
    7. 7)
    8. 8)
    9. 9)
    10. 10)
      • Douceur, J.R.: `The sybil attack', Revised Papers from First Int. Workshop on Peer-to-Peer Systems, 2002, p. 251–260, Springer-Verlag.
    11. 11)
      • Sanchez-Artigas, M., Garcia-Lopez, P.: `On routing in distributed hash tables: is reputation a shelter from malicious behaviour and churn?', IEEE International Conference on Peer-to-Peer Computing, 2009 (P2P '09), September 2009, p. 31–40.
    12. 12)
    13. 13)
      • Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: `Making gnutella-like p2p systems scalable', Proc. ACM SIGCOMM’03, 2003, p. 407–418.
    14. 14)
    15. 15)
    16. 16)
      • Jennings, C., Lowekamp, B., Rescorla, E., Baset, S., Schulzrinne, H.: `Resource location and discovery (reload) base protocol', Internet Draft draft-ietf-p2psip-base-06, Internet Engineering Task Force, October 2010.
    17. 17)
      • Hoang, G.N., Chan, H.N., Van, K.N.: `Performance improvement of chord distributed hash table under high churn rate', Int. Conf. on Advanced Technologies for Communications, 2009, ATC’09, October 2009, p. 191–196.
    18. 18)
    19. 19)
      • Casado, M.: `Peering through the shroud: the effect of edge opacity on IP-based client identification', Proc. Int. Symp. on Networked Systems Design and Implementation, 2007.
    20. 20)
      • IETF working group: ‘Peer-to-peer session initiation protocol (p2psip)’, http://ietf.org/html.charters/p2psip-charter.html.
    21. 21)
    22. 22)
      • Camarillo, G., Rosenberg, J., Schulzrinne, H.: `SIP session initiation protocol', IETF Request for Comment 3261, 2002.
    23. 23)
    24. 24)
      • Herrera, O., Znati, T.: `Modeling churn in p2p networks', 40thAnnual Simulation Symp., 2007, ANSS’07, March 2007, p. 33–40.
    25. 25)
    26. 26)
      • Dinger, J., Hartenstein, H.: `Defending the sybil attack in p2p networks: taxonomy, challenges, and a proposal for self-registration', First Int. Conf. on Availability, Reliability and Security, 2006, ARES 2006, April 2006, p. 8.
    27. 27)
    28. 28)
      • Li, Z., Xu, X., Shi, L., Liu, J., Liang, C.: `Authentication in peer-to-peer network: Survey and research directions', Int. Conf. on Network and System Security, 2009, p. 115–122.
    29. 29)
      • Ford, B., Srisuresh, P., Kegel, D.: `Peer-to-peer communication across network address translators', Proc. Annual Conf. on USENIX Annual Technical Conf., 2005, Anaheim, CA, USENIX Association.
    30. 30)
      • Xie, J., Li, Z., Chen, G., Wu, J.: `On maximum stability with enhanced scalability in high-churn dht deployment', Int. Conf. on Parallel Processing, 2009, ICPP’09, September 2009, p. 502–509.
    31. 31)
      • Baldoni, R., Bonomi, S., Rippa, A., Querzoni, L., Piergiovanni, S.T., Virgillito, A.: `Evaluation of unstructured overlay maintenance protocols under churn', 26thIEEE Int. Conf. on Distributed Computing Systems Workshops, 2006, ICDCS Workshops 2006, July 2006, p. 13.
    32. 32)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2010.0624
Loading

Related content

content/journals/10.1049/iet-com.2010.0624
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading