Adaptive Heuristic-Based P2P Network Connectivity and Configuration for Resource Availability

  • Andreas Andreou
  • Constandinos X. Mavromoustakis
  • George Mastorakis
  • Athina Bourdena
  • Evangelos Pallis
Part of the Modeling and Optimization in Science and Technologies book series (MOST, volume 3)

Abstract

Many schemes have been examined in the recent past in order to define a methodology for efficient resource sharing in combination with the temporal characteristics of dynamically varying topologies whereas others create a ground for a combination of temporal and spatial techniques. This chapter provides a brief introduction to, and motivation for, topology formation for P2P network connectivity and configuration from a network resource availability viewpoint. Efficient topology formation is probably the crucial parameter for enabling end-to-end reliability and data integrity between peers. The research background is presented using different approaches in the field of topology formation with respect to the parameters that affect the reliability issues of each node. Self-awareness is presented as well as the choice of mechanisms for efficient and reliable communication in a dynamically changing peer-to-peer system. Thereafter the recent adaptive heuristic-based P2P network connectivity approach for topology configuration for resource availability is presented along with some conducted results extracted from the research bibliography. Finally the chapter ends with the conclusion based on the general discussion of the covered issues in the chapter and the open ended research issues that come along with the discussed ones.

Keywords

Cloud resources Scheduling management APIs Virtual Data Centres (VDC) Resource allocation Cloud management Virtual Engine Migration (VEM) Virtual-to-Virtual (V2V) resource migration High Resource Availability Integration and composition 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Xiao, L., Yunhao, L., Ni, L.M.: Improving unstructured peer-to-peer systems by adaptive connection establishment. IEEE Transactions on Computers 54(9), 1091–1103 (2005)CrossRefGoogle Scholar
  2. 2.
    Sharman Networks, Worldwide distribution of licensed works using peer-to-peer technology, http://www.kazaa.com (retrieved October 2012)
  3. 3.
    Ganesan, D., Krishnamachari, B., Woo, A., Culler, D., Estrin, D., Wicker, S.: Complex behavior at scale: An experimental study of low-power wireless sensor networks. Technical Report UCLA/CSD-TR 02-0013, UCLA (2002)Google Scholar
  4. 4.
    Mavromoustakis, C.X., Karatza, H.D.: Under storage constraints of epidemic backup node selection using HyMIS architecture for data replication in mobile peer to peer networks. Journal of Systems and Software, Elsevier 81(1), 100–112 (2008)CrossRefGoogle Scholar
  5. 5.
    Demers, A., Greene, D., Hauser, C., Irish, W., Larson, J.: Epidemic algorithms for repli-cated database maintenance. In: Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing, pp. 1–12. ACM Press (1987)Google Scholar
  6. 6.
    Kulik, J., Heinzelman, W., Balakrishnan, H.: Negotiation-based protocols for dis-seminating information in wireless sensor networks. Wireless Networks 8(2-3), 169–185 (2002)CrossRefMATHGoogle Scholar
  7. 7.
    Hong, X., Xu, K., Gerla, M.: Scalable routing protocols for mobile ad hoc networks. IEEE Network Magazine 16(4), 11–21 (2002)CrossRefGoogle Scholar
  8. 8.
    Hara, T.: Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility. In: Proceedings of the IEEE INFOCOM 2001 Conference, pp. 1568–1576 (2001)Google Scholar
  9. 9.
    Jivodar, B., Tchakarov, N., Vaidya, H.: Efficient Content Location in Wireless Ad Hoc Networks. In: IEEE International Conference on Mobile Data Management (MDM 2004), pp. 74–82 (2004)Google Scholar
  10. 10.
    Gavrilovich, C.D., Ware, G., Freindenrich, L.: Broadband Communication of the Highways of Tomorrow. IEEE Communications Magazine 39(4), 146–154 (2001)CrossRefGoogle Scholar
  11. 11.
    Grossglauser, M., Tse, D.: Mobility Increases the Capacity of Ad Hoc Wireless Networks. In: Proceedings of IEEE InfoCom 2001, pp. 312–319 (2001)Google Scholar
  12. 12.
    Chungshen, X., Bo, X., Chien-Chung, S.: A novel layered graph model for topology formation and routing in dynamic spectrum access networks. In: First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005, November 8-11, pp. 308–317 (2005)Google Scholar
  13. 13.
    Younis, O., Fahmy, S.: Distributed clustering in ad-hoc sensor networks: a hybrid, energy efficient approach. In: Proceedings of IEEE INFOCOM, Hong Kong, China, March 7-11, vol. 1, pp. 633–640 (2004)Google Scholar
  14. 14.
    Moore, D., Hebeler, J.: Peer-to-Peer: Building Secure, Scalable, and Manageable Networks. MCGraw Hill Book Company (2002) ISBN: 9780072192841Google Scholar
  15. 15.
    Eugster, P.T., Guerraoui, R., Kermarrec, A.-M.: Epidemic information dissemination in distributed systems. IEEE Computer 37(5), 60–67 (2004)CrossRefGoogle Scholar
  16. 16.
    Chawathe, Y., Ratnasamy, S., Breslau, L.: Making Gnutella-like P2P systems scalable. In: Proceedings of ACM SIGCOMM, Karlsruhe, Germany, August 25-29, pp. 407–418 (2003)Google Scholar
  17. 17.
    Skraba, P., Aghajan, H., Bahai, A.: Distributed passive routing decisions in mobile adhoc networks. In: IEEE 60th Vehicular Technology Conference, VTC 2004, September 26-29, vol. 4, pp. 2814–2818 (2004)Google Scholar
  18. 18.
    Hara, T., Murakami, N., Nishio, S.: Replica allocation for correlated data items in ad hoc sensor networks. ACM SIGMOD 33(1), 38–43 (2004); Special Issue: Special section on sensor network technology & sensor data management (Part II) table of contents, ISSN:0163-5808Google Scholar
  19. 19.
    Cardei, M., Cardei, I., Du, D.-Z., Helmy, A.: Efficient Resource Discovery in Wireless AdHoc Networks: Contacts Do Help. In: Resource Management in Wireless Networking. Network Theory and Applications, vol. 16. Springer, US (2005) ISSN:1568-1696Google Scholar
  20. 20.
    Setton, E., Girod, B. (eds.): Peer-to-Peer Video Streaming, 1st edn. Springer (2007) ISBN-10: 0387741143Google Scholar
  21. 21.
    Wai-Sing, L. (ed.): Peer-to-Peer Computing Building Supercomputers with Web Technologies, 1st edn. Springer (2006) ISBN-10: 1846283817, ISBN-13: 978-1846283819Google Scholar
  22. 22.
    Garetto, M., Giaccone, P., Leonardi, E.: On the Capacity of Ad Hoc Wireless Networks Under General Node Mobility. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, May 6-12, pp. 357–365. IEEE (2007)Google Scholar
  23. 23.
    Iacono, A.L., Rose, C.: Mine, mine, mine: Information theory, Infostation networks, and resource sharing. In: Wireless Communications and Networking Conference, WCNC IEEE, September 23-28, vol. 3, pp. 1541–1546 (2000)Google Scholar
  24. 24.
    Mavromoustakis, C., Karatza, H.: Segmented File Sharing with Recursive Epidemic Placement Policy for Reliability in Mobile Peer-to-Peer Devices. In: Proceedings of the 13th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Georgia Tech, Atlanta, Georgia, September 26-29, pp. 371–380 (2005)Google Scholar
  25. 25.
    Mavromoustakis, C., Karatza, H.: On the Performance Analysis of Recursive Data Replication Scheme for File Sharing in Mobile Peer-to-Peer Devices Using the HyMIS Scheme. In: Proceedings of the 5th International Workshop on Performance Modeling, Evaluation, and Optimization of Parallel and Distributed Systems (PMEO-PDS 2006) in Conjunction with IEEE International Parallel & Distributed Processing Symposium (IPDPS), Rhodes Island, Greece, April 25-29, p. 8 (2006)Google Scholar
  26. 26.
    Mavromoustakis, C., Karatza, H.: Reliable File Sharing Scheme for Mobile Peer-to-Peer Users Using Epidemic Selective Caching. In: Proceedings of IEEE International Conference on Pervasive Services (ICPS), Santorini, Greece, pp. 169–177 (July 2005)Google Scholar
  27. 27.
    Mavromoustakis, C.X., Dimitriou, C.D.: Using Social Interactions for Opportunistic Resource Sharing using Mobility-enabled contact-oriented Replication. In: International Conference on Collaboration Technologies and Systems (CTS 2012), In Cooperation with ACM, IEEE, Internet of Things, Machine to Machine and Smart Services Applications (IoT 2012), The Westin Westminster Hotel, Denver, Colorado, USA, May 21-25 (2012)Google Scholar
  28. 28.
    Mavromoustakis, C., Karatza, H.: Performance evaluation of opportunistic resource sharing scheme using socially-oriented outsourcing in wireless devices. The Computer Journal (2013) (to appear)Google Scholar
  29. 29.
    Mavromoustakis, C., Karatza, H.: Embedded socio-oriented model for end-to-end reliable stream schedules by using collaborative outsourcing in MP2P systems. The Computer Journal 54(4), 19 (2011)Google Scholar
  30. 30.
    Newman, J.: The Movements of North Pacific Blue Whales During the Feeding Season off Southern California and their Southern Fall Migration, Santa Fe Institute 01-12-073, vol. 15(4), pp. 1246–1257 (2006) (published online: August 26, 2006)Google Scholar
  31. 31.
    Mavromoustakis, C.X.: Synchronized Cooperative Schedules for collaborative resource availability using population-based algorithm. Simulation Practice and Theory Journal, Elsevier 19(2), 762–776 (2011)CrossRefGoogle Scholar
  32. 32.
    Mavromoustakis, C., Karatza, H.: Dispersed information diffusion with level and schema-based coordination in mobile peer to peer networks. In: Cluster Computing. Computer Communications & Networks, vol. 10(1), pp. 33–45. Springer, Netherlands (2007)Google Scholar
  33. 33.
    Kawadia, V., Kumar, P.R.: A cautionary perspective on cross-layer design. IEEE Wireless Communications 12(1), 3–11 (2005)CrossRefGoogle Scholar
  34. 34.
    Mavromoustakis, C., Karatza, H.: Community oriented neighbouring feedback for efficient end-to-end delay-sensitive MP2P streaming via temporal relay-based replication. Journal of Algorithms & Computational Technology 5(2), 177–198 (2011)CrossRefGoogle Scholar
  35. 35.
    Dimitriou, C., Mavromoustakis, C.X., Mastorakis, G., Pallis, E.: On the performance response of delay-bounded energy-aware bandwidth allocation scheme in wireless networks. In: Proceedings of the IEEE/ICC 2013 International Workshop on Immersive & Interactive Multimedia Communications over the Future Internet, Organized in Conjunction with IEEE International Communications Conference (ICC 2013), Budapest, Hungary, June 9-13, pp. 641–646 (2013)Google Scholar
  36. 36.
    Bourdena, A., Mastorakis, G., Pallis, E., Mavromoustakis, C., Kormentzas, G., Karditsis, E.: A Radio Resource Management Framework for Opportunistic TVWS Access. In: Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2012), Paphos, Cyprus, October 21-25, pp. 33–38 (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Andreas Andreou
    • 1
  • Constandinos X. Mavromoustakis
    • 1
  • George Mastorakis
    • 2
  • Athina Bourdena
    • 3
  • Evangelos Pallis
    • 3
  1. 1.University of NicosiaNicosiaCyprus
  2. 2.Department of Business AdministrationTechnological Educational Institute of CreteCreteGreece
  3. 3.Department of Informatics EngineeringTechnological Educational Institute of CreteCreteGreece

Personalised recommendations