Skip to main content

Diophantine Routing

  • Chapter
  • First Online:
  • 1368 Accesses

Abstract

An important problem in any structured P2P overlay network is what routes are available between nodes. Understanding the structure of routes helps to solve problems related to routing performance, security, and scalability. In this chapter, we propose a theoretical approach for describing routes and their structures. It is based on recent results in the linear Diophantine analysis. A route aggregates several P2P paths that packets follow. A commutative context-free grammar describes the forwarding behavior of P2P nodes. Derivations in the grammar correspond to P2P routes. Initial and final strings of a derivation define packet sources and destinations, respectively. Based on that we construct a linear Diophantine equation system, where any solution counts forwarding actions in a route representing certain integral properties. Therefore, P2P paths and their composition into routes are described by a linear Diophantine system—a Diophantine model of P2P routes. Its finite basis of the solution set defines the structure of available routes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    For brevity we ignore the case when \(\alpha {\Rightarrow }^{{_\ast}}\varkappa \beta \) is not simple. It also satisfies (9.4) but requires extracting all simple cycles and moving them to \({x}^{\epsilon }\), so leading to \({x}^{\epsilon }\neq 0\).

  2. 2.

    The sign “ + ” in \({b}_{i}^{+}\) means that packets arrive to d i .

  3. 3.

    The sign “ − ” in \({b}_{i}^{-}\) means that packets leave s i .

  4. 4.

    For instance, \({b}_{{\sigma }_{\mathrm{par}}}\) is the total number of parallel forwarding applications, see (9.7); \({b}_{{\sigma }_{\mathrm{cost}}}\) is the integral cost of a route, see (9.8).

  5. 5.

    This problem is of deciding, given a CCF-grammar and strings α, β, if \(\alpha {\Rightarrow }^{{_\ast}}\beta \).

  6. 6.

    Theory says that there is a polynomial algorithm for finding a non-zero solution of an arbitrary homNLDE system, not necessarily a homANLDE system. Unfortunately, to the best of our knowledge, we know no implementation appropriate for practical large-scale applications.

References

  1. Aardal, K., Weismantel, R., Wolsey, L.A.: Non-standard approaches to integer programming. Discrete Appl. Math. 123(1–3), 5–74 (2002). doi: http://dx.doi.org/10.1016/S0166-218X(01)00337-7

  2. Artigas, M.S., Lopez, P.G., Skarmeta, A.F.G.: A novel methodology for constructing secure multipath overlays. IEEE Internet Comput. 9(6), 50–57 (2005). doi: http://dx.doi.org/10.1109/MIC.2005.117

  3. Bertsekas, D.P.: Network Optimization: Continuous and Discrete Models. Athena Scientific, USA (1998)

    MATH  Google Scholar 

  4. Bogoyavlenskiy, Y.A., Korzun, D.G.: On solutions of a system of linear Diophantine equations associated with a context-free grammar. Trans. Petrozavodsk State University Appl. Math. Comp. Sci. 6, 79–94 (1998) (in Russian)

    Google Scholar 

  5. Castro, M., Costa, M., Rowstron, A.: Performance and dependability of structured peer-to-peer overlays. Technical Report MSR-TR-2003-94, Microsoft Research (2003)

    Google Scholar 

  6. Esparza, J.: Petri nets, commutative context-free grammars, and basic parallel processes. Fundam. Inform. 30, 23–41 (1997)

    MathSciNet  Google Scholar 

  7. Gummadi, K., Gummadi, R., Gribble, S., Ratnasamy, S., Shenker, S., Stoica, I.: The impact of DHT routing geometry on resilience and proximity. In: Proceedings of ACM SIGCOMM’03, pp. 381–394. ACM, New York (2003). doi: http://doi.acm.org/10.1145/863955.863998

  8. Hu, T.C.: Integer Programming and Network Flows. Addison-Wesley, Reading (1969)

    MATH  Google Scholar 

  9. Kleinberg, J.M.: The small-world phenomenon: an algorithm perspective. In: Proceedings 32nd Annual ACM Symposium Theory of Computing (STOC ’00), pp. 163–170. ACM, New York (2000). doi: http://doi.acm.org/10.1145/335305.335325

  10. Korzun, D., Gurtov, A.: A Diophantine model of routes in structured P2P overlays. ACM SIGMETRICS Perform. Eval. Rev. 35(4), 52–61 (2008)

    Article  Google Scholar 

  11. Korzun, D.G.: On an interrelation of formal grammars and systems of linear Diophantine equations. Bull. Young Sci. 3, 50–56 (2000) (in Russian)

    Google Scholar 

  12. Korzun, D.G.: Grammar-based algorithms for solving certain classes of nonnegative linear Diophantine systems. In: Proceedings of the Annual Finnish Data Processing Week at Petrozavodsk State University (FDPW 2000) on Advances in Methods of Modern Information Technology, vol. 3, pp. 52–67. Petrozavodsk State University, Petrozavodsk (2001)

    Google Scholar 

  13. Korzun, D.G.: Syntactic methods in solving linear Diophantine equations. In: Proceedings of the Annual Finnish Data Processing Week at Petrozavodsk State University (FDPW 2004) on Advances in Methods of Modern Information Technology, vol. 6, pp. 151–156. Petrozavodsk State University, Petrozavodsk (2005)

    Google Scholar 

  14. Lam, S.F., Chan, K.H.: Computer Capacity Planning. Academic, San Diego (1987)

    MATH  Google Scholar 

  15. Li, X., Misra, J., Greg Plaxton, C.: Maintaining the Ranch topology. J. Parallel Distrib. Comput. 70(11), 1142–1158 (2010). doi: http://dx.doi.org/10.1016/j.jpdc.2010.06.004

  16. Loguinov, D., Kumar, A., Rai, V., Ganesh, S.: Graph-theoretic analysis of structured peer-to-peer systems: Routing distances and fault resilience. IEEE/ACM Trans. Netw. 13(5), 1107–1120 (2005)

    Article  Google Scholar 

  17. Pottier, L.: Minimal solutions of linear Diophantine systems: Bounds and algorithms. In: Proceedings 4th International Conference Rewriting Techniques and Applications (RTA ’91), pp. 162–173. Springer, Berlin (1991)

    Google Scholar 

  18. Risson, J., Robinson, K., Moors, T.: Fault tolerant active rings for structured peer-to-peer overlays. In: Proceedings IEEE Conference Local Computer Networks (LCN ’05), pp. 18–25. IEEE Computer Society, USA (2005). doi: http://dx.doi.org/10.1109/LCN.2005.69

  19. Sánchez-Artigas, M., García López, P.: Echo: A peer-to-peer clustering framework for improving communication in DHTs. J. Parallel Distrib. Comput. 70, 126–143 (2010). doi: http://dx.doi.org/10.1016/j.jpdc.2009.06.002

  20. Schrijver, A.: Theory of Linear and Integer Programming. Wiley, New York (1986)

    MATH  Google Scholar 

  21. Sebö, A.: Hilbert Bases, Caratheodory’s Theorem and Combinatorial Optimization. In: Proceedings of 1st Integer Programming and Combinatorial Optimization Conference, pp. 431–455. University of Waterloo Press, Canada (1990)

    Google Scholar 

  22. Xu, J., Kumar, A., Yu, X.: On the fundamental tradeoffs between routing table size and network diameter in peer-to-peer networks. IEEE J. Sel. Areas Commun. 22(1), 151–163 (2004)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Korzun, D., Gurtov, A. (2013). Diophantine Routing. In: Structured Peer-to-Peer Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5483-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5483-0_9

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5482-3

  • Online ISBN: 978-1-4614-5483-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics