1,673 research outputs found

    A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems

    Full text link
    Discovery of nodes and content in large-scale distributed systems is generally based on Kademlia, today. Understanding Kademlia-type systems to improve their performance is essential for maintaining a high service quality for an increased number of participants, particularly when those systems are adopted by latency-sensitive applications. This paper contributes to the understanding of Kademlia by studying the impact of \emph{diversifying} neighbours' identifiers within each routing table bucket on the lookup performance. We propose a new, yet backward-compatible, neighbour selection scheme that attempts to maximize the aforementioned diversity. The scheme does not cause additional overhead except negligible computations for comparing the diversity of identifiers. We present a theoretical model for the actual impact of the new scheme on the lookup's hop count and validate it against simulations of three exemplary Kademlia-type systems. We also measure the performance gain enabled by a partial deployment for the scheme in the real KAD system. The results confirm the superiority of the systems that incorporate our scheme.Comment: 13 pages, 8 figures, conference version 'Diversity Entails Improvement: A new Neighbour Selection Scheme for Kademlia-type Systems' at IEEE P2P 201

    Comprehending Kademlia Routing - A Theoretical Framework for the Hop Count Distribution

    Full text link
    The family of Kademlia-type systems represents the most efficient and most widely deployed class of internet-scale distributed systems. Its success has caused plenty of large scale measurements and simulation studies, and several improvements have been introduced. Its character of parallel and non-deterministic lookups, however, so far has prevented any concise formal analysis. This paper introduces the first comprehensive formal model of the routing of the entire family of systems that is validated against previous measurements. It sheds light on the overall hop distribution and lookup delays of the different variations of the original protocol. It additionally shows that several of the recent improvements to the protocol in fact have been counter-productive and identifies preferable designs with regard to routing overhead and resilience.Comment: 12 pages, 6 figure

    CLOSER: A Collaborative Locality-aware Overlay SERvice

    Get PDF
    Current Peer-to-Peer (P2P) file sharing systems make use of a considerable percentage of Internet Service Providers (ISPs) bandwidth. This paper presents the Collaborative Locality-aware Overlay SERvice (CLOSER), an architecture that aims at lessening the usage of expensive international links by exploiting traffic locality (i.e., a resource is downloaded from the inside of the ISP whenever possible). The paper proves the effectiveness of CLOSER by analysis and simulation, also comparing this architecture with existing solutions for traffic locality in P2P systems. While savings on international links can be attractive for ISPs, it is necessary to offer some features that can be of interest for users to favor a wide adoption of the application. For this reason, CLOSER also introduces a privacy module that may arouse the users' interest and encourage them to switch to the new architectur

    Governance tools for board members : adapting strategy maps and balanced scorecards for directorial action

    Get PDF
    The accountability of members of the board of directors of publicly traded companies has increased over years. Corresponding to these developments, there has been an inadequate advancement of tools and frameworks to help directorial functioning. This paper provides an argument for design of the Balanced Scorecard and Strategy Maps made available to the directors as a means of influencing, monitoring, controlling and assisting managerial action. This paper examines how the Balanced Scorecard and Strategy Maps could be modified and used for this purpose. The paper suggests incorporating Balanced Scorecards in the Internal Process perspective, ‘internal’ implying here not just ‘internal to the firm’, but also ‘internal to the inter-organizational system’. We recommend that other such factors be introduced separately under a new ‘perspective’ depending upon what the board wants to emphasize without creating any unwieldy proliferation of measures. Tracking the Strategy Map over time by the board of directors is a way for the board to take responsibility for the firm’s performance. The paper makes a distinction between action variables and monitoring variables. Monitoring variables are further divided on the basis of two considerations: a) whether results have been met or not and b) whether causative factors have met the expected levels of performance or not. Based on directorial responsibilities and accountability, we take another look at how the variables could be specified more completely and accurately with directorial recommendations for executives

    Storytelling Security: User-Intention Based Traffic Sanitization

    Get PDF
    Malicious software (malware) with decentralized communication infrastructure, such as peer-to-peer botnets, is difficult to detect. In this paper, we describe a traffic-sanitization method for identifying malware-triggered outbound connections from a personal computer. Our solution correlates user activities with the content of outbound traffic. Our key observation is that user-initiated outbound traffic typically has corresponding human inputs, i.e., keystroke or mouse clicks. Our analysis on the causal relations between user inputs and packet payload enables the efficient enforcement of the inter-packet dependency at the application level. We formalize our approach within the framework of protocol-state machine. We define new application-level traffic-sanitization policies that enforce the inter-packet dependencies. The dependency is derived from the transitions among protocol states that involve both user actions and network events. We refer to our methodology as storytelling security. We demonstrate a concrete realization of our methodology in the context of peer-to-peer file-sharing application, describe its use in blocking traffic of P2P bots on a host. We implement and evaluate our prototype in Windows operating system in both online and offline deployment settings. Our experimental evaluation along with case studies of real-world P2P applications demonstrates the feasibility of verifying the inter-packet dependencies. Our deep packet inspection incurs overhead on the outbound network flow. Our solution can also be used as an offline collect-and-analyze tool

    Peer to Peer Information Retrieval: An Overview

    Get PDF
    Peer-to-peer technology is widely used for file sharing. In the past decade a number of prototype peer-to-peer information retrieval systems have been developed. Unfortunately, none of these have seen widespread real- world adoption and thus, in contrast with file sharing, information retrieval is still dominated by centralised solutions. In this paper we provide an overview of the key challenges for peer-to-peer information retrieval and the work done so far. We want to stimulate and inspire further research to overcome these challenges. This will open the door to the development and large-scale deployment of real-world peer-to-peer information retrieval systems that rival existing centralised client-server solutions in terms of scalability, performance, user satisfaction and freedom

    An Evaluation of Health Care Service Provider Websites in Latvia – a Medical Tourism Perspective

    Get PDF
    The prospective health care consumers are increasingly using the Internet websites for communication with potential health care service providers and decision-making regarding choice of the travel destination for receiving particular health care services. Therefore, it is important for health care providers to present themselves and their services efficiently online in order to attract foreign patients and thus facilitate medical tourism. The objective of this study is to evaluate the website content of Latvian health care providers who offer services to medical tourists in order to evaluate their status-quo and identify opportunities to improve website design. Authors used the framework by Huerta et al. (2016) as a basis to develop a modified framework suited for medical tourism-related website evaluation. 21 active websites associated with a medical tourism and provision of health care services to foreign patients were identified and selected for analysis. Each website was evaluated using a 10-factor assessment on 4 dimensions that include website accessibility, content, marketing, technology on a scale ranging from 0 to 10. Results: Scores of 21 website evaluation ranged from 54 to 91 point across all 4 dimensions with 80 and above points being considered as excellent result. Conclusions: Study findings indicated that the main improvements should be related to accessibility dimension and enabling text resizing function for improving experience for patients with poor sight, information dimension in terms of developing a separate main level section with information exclusively for foreign patients, and marketing dimension to improve effectiveness of search engine optimization (SEO) for medical tourism related keywords.publishersversionPeer reviewe
    corecore