KEYWORDS: Data transmission, Internet, Computer simulations, Performance modeling, Receivers, Communication engineering, Information science, Information technology, Neodymium
Many services have recently been offered based on a peer-to-peer (P2P)
communication model. Peers connect to each other and build an overlaid logical network and available services are communicated over this network. The robustness of the P2P network against frequent peer failure must be considered. This includes when the peers leave the network and this directly affects the stability of the entire logical network. Replication of the content is one of the most useful techniques to increase robustness. However, the overall effectiveness of replication is heavily dependent on the topology of the logical network.
As topology of networks, including the Internet and P2P, follows a
Power-Law distribution pattern, we first investigate the effect of the logical network topology (especially of the Power-Law characteristics) on replication methods. We use a search method called "n-walkers random walk" in which multiple queries move randomly across the P2P logical network. We use a "path replication method," to create replicas at all the intermediate nodes on the path between the requesting and responding nodes. Through simulations experiments, we observed that peers with a large number of degrees (e.g., degree > 10) make four times as many replicas as peers with a small number of degrees. In addition, replicas on large degree's peers are used ten times as frequently as those on peers with small degrees.
Based on these observations, we propose a query forwarding method that
considers the Power-Law property of the network topology in order to
improve the performance of the P2P service. In our method the queries
are transmitted with different probabilities, dependending on the degree of each adjacent node. Our simulation results show that our proposed method can greatly improve the query performance by considering the characteristics of Power-Law. Our method reduces the average hop count in finding replicas by up to 60% compared with the random forwarding method.
A rapid growth of the Internet and proliferation of new multimedia applications lead to demands of high speed and broadband network technologies. Routers are also necessary to follow up the growth of link bandwidths. From this reason, there have been many researches on high speed routers having switching capabilities. To have an expected effect, however, a control parameters set based on traffic characteristics are necessary. In this paper, we analyze the network traffic using the network traffic monitor and investigate the Internet traffic characteristics through a statistical analysis. We next show the application of our analytical results to parameter settings of high speed switching routers. Simulation results show that our approach makes highly utilized VC space and high performance in packet processing delay. We also show the effect of flow aggregation on MPLS. From our results, the flow aggregation has a great impact on the performance of MPLS.
KEYWORDS: Switches, Control systems, Asynchronous transfer mode, Data communications, Error control coding, Internet, Performance modeling, Video, Information technology, Network architectures
ABT is promising for effectively transferring a highly bursty data traffic in ATM networks. Most of past studies focused on the data transfer capability of ABT within the ATM layer. In actual, however, we need to consider the upper layer transport protocol since the transport layer protocol also supports a network congestion control mechanism. One such example is TCP, which is now widely used in the Internet. In this paper, we evaluate the performance of TCP over ABT protocols. Simulation results show that the retransmission mechanism of ABT can effectively overlay the TCP congestion control mechanism so that TCP operates in a stable fashion and works well only as an error recovery mechanism.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.