№1, 2014

EFFICIENT LOOKUP WITHIN SCALABLE UBIQUITOUS COMPUTING NETWORKS
Behnam B. Bazli, David Llewellyn-Jones, Madjid M. Merabti

Traditional client-server arrangements within centralized systems using low-level protocols have now been replaced by mobile hosts and dynamic protocols over ubiquitous decentralized systems. Rising costs of data traffic and the need for efficient communication and improved management of systems has created a pressure to roll-out efficient and effective communication methods and address dynamic change of members and resources within ubiquitous P2P networks.  This work uses novel allocation and smart lookup technique to initiate efficient routing based on the global availability of the destination node state. Considering the high cost of failed queries within scalable networks, this will improve network efficiency and reduce latency. (pp. 10-20)

Keywords:Ubiquitous Computing, Scalability; P2P, Overlay Networks, Security, lookup
References
  • Li Y., Tian C., Diggavi S., Chiang M., Calderbank A. Network resource allocation for competing multiple description transmissions // IEEE Trans. Commun., vol. 58, no. 5, pp. 1493–1504, May 2010.
  • Papers R., Meng J. Paper Communications and Networking, vol. 2, no. 1, 2008.
  • Panda G. K., Tripathy B. K., Jha S. K., Security Aspects in Mobile Cloud Social Network Services, Int. J., vol. 2, no. 1, 2011.
  • Dixon C., Uppal H., Brajkovic V., Brandon D. ETTM : A Scalable Fault Tolerant Network Manager, Network.
  • Greenberg B. A., Hamilton J. R., Kandula S., Kim C., Lahiri P., Maltz A., Patel P., Sengupta S. VL2 : A Scalable and Flexible Data Center Network, Access Yournal vol. 09, pp. 95–104, 2009.
  • Edwards W.K., Grinter R. E. At Home with Ubiquitous Computing : Seven Challenges 2 The Seven Challenges, Seven., year.
  • Wei T., Wang C.-H., Chu Y.-H., Chang R.-I. A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services // Int. J. Digit. Multimed. Broadcast., vol. 2012, no. i, pp. 1–12.
  • Chung Y. Distributed denial of service is a scalability problem // ACM SIGCOMM Comput. Commun. Rev., 2012, vol. 42, no. 1, p. 69, Jan.
  • Nguyen D. T., Nguyen B. L., Vu D. L. Improving Freenet’s Performance by Adaptive Clustering Cache Replacement / 2009 IEEE-RIVF Int. Conf. Comput. Commun. Technol., 2009, pp. 1–7.
  • Rasti A. H., Stutzbach D., Rejaie R. On the Long-term Evolution of the Two-Tier Gnutella Overlay / Proc. 25TH IEEE Int. Conf. Comput. Commun., 2006, pp. 1–6.
  • Ritter J. Why Gnutella Can’t Scale. No, Really, 2001, 13 p., http://www.cs.rice.edu
  • Sen S., Wang J. Analyzing Peer-To-Peer Traffic Yournal, vol. 12, no. 2, pp. 219–232, 2004.
  • Rowstron A., Druschel P. Pastry : Scalable, distributed object location and routing for large-scale peer-to-peer systems / Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, London, Springer-Verlag, 2001, pp. 329-350.
  • Stoica I., Morris R., Liben-Nowell D., Karger D. R., Kaashoek M. F., Dabek F., Balakrishnan H. Chord: a scalable peer-to-peer lookup protocol for internet applications // IEEE/ACM Trans. Netw., Feb. 2003, vol. 11, no. 1, pp. 17–32.
  • Kempf J., Pierre R. St., Pierre P. St. Service Location Protocol for Enterprise Networks: Implementing and Deploying a Dynamic Service Finder. John Wiley & Sons, year.