Proposal and evaluation of an effective method for underlay-aware overlay networks using LDAP

Jumpei Togashi, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Overlay networks are increasingly practical on the Internet. Its main applications are Peer-to-Peer (P2P) file sharing and P2P file streaming applications. They may generate undesirable traffic for Internet Service Providers (ISPs) and charge network load to specific physical links because of a mismatch between overlay networks and the underlay network. Overlay networks try to infer the properties of the underlay network from end nodes to enhance their performance. However, it is difficult to know the underlay network from end nodes. In this paper, we propose an effective method for underlay-aware overlay networks using Lightweight Directory Access Protocol (LDAP). ISPs maintain directory servers to provide their network topology information to overlay networks. By such an approach, overlay networks can know the underlay network effectively instead of sending probe packets. Furthermore we executed an experimentation to find that LDAP server can withstand frequent accesses like flash crowd and to measure behavior of a P2P application.

Original languageEnglish
Title of host publicationProceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009
Pages70-76
Number of pages7
Publication statusPublished - 2009
EventIASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009 - Innsbruck, Austria
Duration: 2009 Feb 162009 Feb 18

Other

OtherIASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009
CountryAustria
CityInnsbruck
Period09/2/1609/2/18

Fingerprint

Overlay networks
Network protocols
Internet service providers
Servers
Computer networks
Topology
Internet

Keywords

  • Computer networks
  • Directory service
  • ISP
  • P2P
  • Underlay network

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Software

Cite this

Togashi, J., Inomata, A., Fujikawa, K., & Sunahara, H. (2009). Proposal and evaluation of an effective method for underlay-aware overlay networks using LDAP. In Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009 (pp. 70-76)

Proposal and evaluation of an effective method for underlay-aware overlay networks using LDAP. / Togashi, Jumpei; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki.

Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009. 2009. p. 70-76.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Togashi, J, Inomata, A, Fujikawa, K & Sunahara, H 2009, Proposal and evaluation of an effective method for underlay-aware overlay networks using LDAP. in Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009. pp. 70-76, IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009, Innsbruck, Austria, 09/2/16.
Togashi J, Inomata A, Fujikawa K, Sunahara H. Proposal and evaluation of an effective method for underlay-aware overlay networks using LDAP. In Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009. 2009. p. 70-76
Togashi, Jumpei ; Inomata, Atsuo ; Fujikawa, Kazutoshi ; Sunahara, Hideki. / Proposal and evaluation of an effective method for underlay-aware overlay networks using LDAP. Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009. 2009. pp. 70-76
@inproceedings{87a27379ddea477888d3d6a11bff30cd,
title = "Proposal and evaluation of an effective method for underlay-aware overlay networks using LDAP",
abstract = "Overlay networks are increasingly practical on the Internet. Its main applications are Peer-to-Peer (P2P) file sharing and P2P file streaming applications. They may generate undesirable traffic for Internet Service Providers (ISPs) and charge network load to specific physical links because of a mismatch between overlay networks and the underlay network. Overlay networks try to infer the properties of the underlay network from end nodes to enhance their performance. However, it is difficult to know the underlay network from end nodes. In this paper, we propose an effective method for underlay-aware overlay networks using Lightweight Directory Access Protocol (LDAP). ISPs maintain directory servers to provide their network topology information to overlay networks. By such an approach, overlay networks can know the underlay network effectively instead of sending probe packets. Furthermore we executed an experimentation to find that LDAP server can withstand frequent accesses like flash crowd and to measure behavior of a P2P application.",
keywords = "Computer networks, Directory service, ISP, P2P, Underlay network",
author = "Jumpei Togashi and Atsuo Inomata and Kazutoshi Fujikawa and Hideki Sunahara",
year = "2009",
language = "English",
isbn = "9780889867840",
pages = "70--76",
booktitle = "Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009",

}

TY - GEN

T1 - Proposal and evaluation of an effective method for underlay-aware overlay networks using LDAP

AU - Togashi, Jumpei

AU - Inomata, Atsuo

AU - Fujikawa, Kazutoshi

AU - Sunahara, Hideki

PY - 2009

Y1 - 2009

N2 - Overlay networks are increasingly practical on the Internet. Its main applications are Peer-to-Peer (P2P) file sharing and P2P file streaming applications. They may generate undesirable traffic for Internet Service Providers (ISPs) and charge network load to specific physical links because of a mismatch between overlay networks and the underlay network. Overlay networks try to infer the properties of the underlay network from end nodes to enhance their performance. However, it is difficult to know the underlay network from end nodes. In this paper, we propose an effective method for underlay-aware overlay networks using Lightweight Directory Access Protocol (LDAP). ISPs maintain directory servers to provide their network topology information to overlay networks. By such an approach, overlay networks can know the underlay network effectively instead of sending probe packets. Furthermore we executed an experimentation to find that LDAP server can withstand frequent accesses like flash crowd and to measure behavior of a P2P application.

AB - Overlay networks are increasingly practical on the Internet. Its main applications are Peer-to-Peer (P2P) file sharing and P2P file streaming applications. They may generate undesirable traffic for Internet Service Providers (ISPs) and charge network load to specific physical links because of a mismatch between overlay networks and the underlay network. Overlay networks try to infer the properties of the underlay network from end nodes to enhance their performance. However, it is difficult to know the underlay network from end nodes. In this paper, we propose an effective method for underlay-aware overlay networks using Lightweight Directory Access Protocol (LDAP). ISPs maintain directory servers to provide their network topology information to overlay networks. By such an approach, overlay networks can know the underlay network effectively instead of sending probe packets. Furthermore we executed an experimentation to find that LDAP server can withstand frequent accesses like flash crowd and to measure behavior of a P2P application.

KW - Computer networks

KW - Directory service

KW - ISP

KW - P2P

KW - Underlay network

UR - http://www.scopus.com/inward/record.url?scp=74549182598&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=74549182598&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:74549182598

SN - 9780889867840

SP - 70

EP - 76

BT - Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009

ER -