ELISA: Extensible Layer for Internet Services and Applications

  • Lubos Matl
  • Vladimir Kloucek
  • Viktor B. Bohdal
  • Jan Kubr
  • Tomas Cerny
Conference paper

Abstract

Contemporary P2P services and applications often design and implement the entire system from the base ground or builds on low-level frameworks. This leads to significant development and maintenance efforts and often reinvention of the wheel. In this chapter we propose extensible layer that does not expose low-level implementation details to client application developers, while providing them with well-known services and communication mechanisms built on efficient and scalable substrates. Analysis and design of architecture for this extensible layer are described. Special attention is given to security concerns and manycast communication approach. Our preliminary implementation is emulated and evaluated to establish functional and performance possibilities of the prototype.

References

  1. 1.
    Castro M, Druschel P, Kermarrec A, Rowstron A (2002a) SCRIBE: a large-scale and decentralized application-level multicast infrastructure. IEEE J Sel Areas Commun 20(8):1489–1499CrossRefGoogle Scholar
  2. 2.
    Castro M, Druschel P, Ganesh A, Rowstron A, Wallach DS (2002b) Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper Syst Rev 36(SI):299–314. Available: http://doi.acm.org/10.1145/844128.844156 [online]
  3. 3.
    Castro M, Druschel P, Kermarrec A-M, Rowstron A (2003a) Scalable application-level anycast for highly dynamic groups. Springer, Berlin, pp 47–57Google Scholar
  4. 4.
    Castro M, Druschel P, Kermarrec A-M, Nandi A, Rowstron A, Singh A (2003b) Splitstream: high-bandwidth multicast in cooperative environments. SIGOPS Oper Syst Rev 37(5):298–313. Available: http://doi.acm.org/10.1145/1165389.945474 [online]
  5. 5.
    Cerny T, Jaromerska S, Praus P, Matl L, Donahoo J (2011) Cooperative web cache. In: 18th international conference on systems, signals and image processingGoogle Scholar
  6. 6.
    Cerny T, Praus P, Jaromeska S, Matl L, Donahoo M (2012) Towards a smart, self-scaling cooperative web cache. In: Bielikova M, Friedrich G, Gottlob G, Katzenbeisser S, Turen G (eds) SOFSEM 2012: theory and practice of computer science. Lecture notes in computer science, vol 7147. Springer, Berlin, pp 443–455. 10.1007/978-3-642-27660-6_36. Available: http://dx.doi.org/10.1007/978-3-642-27660-6_36 [online]
  7. 7.
    Ciaccio G (2005) NEBLO: Anonymity in a Structured Overlay. DISI, Università di Genova, Technical Report DISI-TR-05-05, May 2005Google Scholar
  8. 8.
    Ciaccio G (2007) A pretty flexible api for generic peer-to-peer programming. In: IEEE international parallel and distributed processing symposium, 2007 (IPDPS 2007), pp 1–8Google Scholar
  9. 9.
    Clarke I, Sandberg O, Wiley B, Hong T (2001) Freenet: a distributed anonymous information storage and retrieval system. In: Designing privacy enhancing technologies. Springer, Berlin, pp 46–66Google Scholar
  10. 10.
    Cohen B (2003, June). Incentives build robustness in BitTorrent. In Workshop on Economics of Peer-to-Peer systems, vol. 6, pp. 68–72Google Scholar
  11. 11.
    Dabek F, Zhao B, Druschel P, Kubiatowicz J, Stoica I (2003a) Towards a common api for structured peer-to-peer overlays. In: Internationals workshop on peer-to-peer systemsGoogle Scholar
  12. 12.
    Dabek F, Zhao B, Druschel P, Kubiatowicz J, Stoica I (2003b) Towards a common api for structured peer-to-peer overlays. In: Kaashoek M, Stoica I (eds) Peer-to-Peer systems II. Lecture notes in computer science, vol 2735. Springer, Berlin, pp 33–44. doi:10.1007/978-3-540-45172-3_3 Available: http://dx.doi.org/10.1007/978-3-540-45172-3_3 [online]
  13. 13.
    Douceur JR (2002) The sybil attack. In: Druschel P, Kaashoek MF, Rowstron AIT (eds) IPTPS. Lecture notes in computer science, vol 2429. Springer, Berlin, pp 251–260. Available: http://dblp.uni-trier.de/db/conf/iptps/iptps2002.html#Douceur02 [online]
  14. 14.
    Doval D, O’Mahony D (2003) Overlay networks: a scalable alternative for p2p. IEEE Internet Comput 7:79–82CrossRefGoogle Scholar
  15. 15.
    Ganesh L, Zhao BY (2005, November). Identity theft protection in structured overlays. In Secure Network Protocols, 2005 (NPSec). 1st IEEE ICNP Workshop on (pp. 49–54). IEEEGoogle Scholar
  16. 16.
    Li D, Lu X, Wu J (2005) Fissione: a scalable constant degree and low congestion dht scheme based on kautz graphs. In: Proceedings of the IEEE 24th annual joint conference of the IEEE computer and communications societies (INFOCOM’05)., vol 3, pp 1677–1688Google Scholar
  17. 17.
    Nandi A, Ganjam A, Druschel P, Ng TSE, Stoica I, Zhang H, Bhattacharjee B (2007) Saar: a shared control plane for overlay multicast. In: Proceedings of the 4th USENIX conference on networked systems design & implementation, NSDI’07. USENIX Association, Berkeley, pp 5–5. Available: http://dl.acm.org/citation.cfm?id=1973430.1973435 [online]
  18. 18.
    Rowstron AIT, Druschel P (2001) Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Proceedings of the IFIP/ACM international conference on distributed systems platforms Heidelberg, Middleware ’01. Springer, London, pp 329–350Google Scholar
  19. 19.
    Schollmeier R (2001) [16] a definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: Proceedings of the first international conference on peer-to-peer computing, P2P ’01. IEEE Computer Society, Washington, DC, p 101–102. Available: http://dl.acm.org/citation.cfm?id=882470.883282 [online]
  20. 20.
    Shen R, Wang J, Zhang S, Shen S, Fan P (2009) A framework for constructing peer-to-peer overlay networks in java. In: Proceedings of the 7th international conference on principles and practice of programming in Java, PPPJ ’09. ACM, New York, pp 40–48. Available: http://doi.acm.org/10.1145/1596655.1596662 [online]
  21. 21.
    Stoica I, Morris R, Liben-Nowell D, Karger D, Kaashoek M, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans Netw 11(1):17–32CrossRefGoogle Scholar
  22. 22.
    Venkataraman V, Yoshida K, Francis P (2006) Chunkyspread: heterogeneous unstructured end system multicast. In: Proceedings of the ICNPGoogle Scholar
  23. 23.
    Webb K, Hibler M, Ricci R, Clements A, Lepreau J (2004) Implementing the Emulab-PlanetLab portal: experience and lessons learned. Available: http://www.usenix.org/publications/library/proceedings/worlds04/tech/webb.html [online]
  24. 24.
    Zhang X, Liu J, Li B, Yum TSP (2005) Coolstreaming/donet: a data-driven overlay network for peer-to-peer live media streaming. In: IEEE infocomGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2013

Authors and Affiliations

  • Lubos Matl
    • 1
  • Vladimir Kloucek
    • 1
  • Viktor B. Bohdal
    • 1
  • Jan Kubr
    • 1
  • Tomas Cerny
    • 1
  1. 1.Computer Science & EngineeringCzech Technical UniversityPragueCzech Republic

Personalised recommendations