Skip to main content

Overlay Networking and Resiliency

  • Chapter
  • First Online:
Book cover Guide to Reliable Internet Services and Applications

Part of the book series: Computer Communications and Networks ((CCN))

  • 833 Accesses

Abstract

Each chapter should be preceded by an abstract (10–15 lines long) that summarizes the content. Use the plain abstractcommand if the abstract is also to appear in the printed version of the book.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The actual API includes additional primitives and parameters, which are beyond the scope of our discussion.

References

  1. Akamai Technologies. Retrieved from http://www.akamai.com/html/technology/index.html

  2. Alzoubi, H. A., Lee, S., Rabinovich, M., Spatscheck, O., & Van der Merwe, J. (2008). Anycast cdns revisited. In Proceedings of WWW ’08(pp. 277–286). New York, NY: ACM. DOI http://doi.acm.org/10.1145/1367497.1367536

  3. Andersen, D. G. (2003). Mayday: Distributed filtering for Internet services. In USITS.

    Google Scholar 

  4. Andersen, D. G., Balakrishnan, H., Kaashoek, M. F., & Morris, R. (2001). Resilient overlay networks. In Proceedings of 18th ACM SOSP, Banff, Canada.

    Google Scholar 

  5. ATT ICDS: Retrieved from http://www.business.att.com/service_fam_overview.j-sp?serv_fam=eb_intelligent_content_distribution

  6. Balakrishnan, H., Lakshminarayanan, K., Ratnasamy, S., Shenker, S., Stoica, I., & Walfish, M. (2004). A layered naming architecture for the Internet. In Proceedings of the ACM SIGCOMM, Portland, OR.

    Google Scholar 

  7. Ballani, H., Francis, P., & Ratnasamy, S. (2006). A measurement-based deployment proposal for IP anycast. In Proceedings of the ACM IMC, Rio de Janeiro, Brazil.

    Google Scholar 

  8. Banerjee, S., Bhattacharjee, B., & Kommareddy, C. (2002). Scalable application layer multicast. In Proceedings of ACM SIGCOMM, Pittsburg, PA.

    Google Scholar 

  9. Banerjee, S., Lee, S., Bhattacharjee, B., & Srinivasan, A. (2003). Resilient multicast using overlays. In Proceedings of the Sigmetrics 2003, Karlsruhe, Germany.

    Google Scholar 

  10. Banerjee, S., Lee, S., Bhattacharjee, B., & Srinivasan, A. (2006). Resilient overlays using multicast. IEEE/ACM Transactions of Networking, 14(2), 237–248.

    Article  Google Scholar 

  11. Bender, A., Sherwood, R., Monner, D., Goergen, N., Spring, N., & Bhattacharjee, B. (2009). Fighting spam with the NeighborhoodWatch DHT. In INFOCOM.

    Google Scholar 

  12. Castro, M., Druschel, P., Ganesh, A. J., Rowstron, A. I. T., & Wallach, D. S. (2002). Secure routing for structured peer-to-peer overlay networks. In OSDI.

    Google Scholar 

  13. Castro, M., Druschel, P., Kermarrec, A., Nandi, A., Rowstron, A., & Singh, A. (2003). Splitstream: High-bandwidth multicast in a cooperative environment. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003), Lake Bolton, NY.

    Google Scholar 

  14. Castro, M., Druschel, P., Kermarrec, A. M., & Rowstron, A. (2002). Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE Journal on Selected Areas in Communication, 20(8), 1489–1499. DOI 10.1109/JSAC.2002.803069

    Article  Google Scholar 

  15. Chu, Y., Ganjam, A., Ng, T., Rao, S., Sripanidkulchai, K., Zhan, J., & Zhang, H. (2004). Early experience with an Internet broadcast system based on overlay multicast. In Proceedings of USENIX Annual Technical Conference, Boston, MA.

    Google Scholar 

  16. Chun, B., Culler, D., Roscoe, T., Bavier, A., Peterson, L., Wawrzoniak, M., & Bowman, M. (2003). Planetlab: An overlay testbed for broad-coverage services. SIGCOMM Computer Communication Review, 33(3), 3–12.

    Article  Google Scholar 

  17. Cohen, B. Avalanche. Retrieved from http://bramcohen.livejournal.com/20140.html

  18. Dabek, F., Kaashoek, M. F., Karger, D. R., Morris, R., & Stoica, I. (2001). Wide-area cooperative storage with cfs. In SOSP(pp. 202–215).

    Google Scholar 

  19. Dahlin, M. (2000). Interpreting stale load information. IEEE Transactions on Parallel and Distributed Systems, 11(10), 1033–1047.

    Article  Google Scholar 

  20. Fiat, A., Saia, J., & Young, M. (2005). Making chord robust to Byzantine attacks. In ESA.

    Google Scholar 

  21. Gkantsidis, C., & Rodriguez, P. (2005). Network coding for large scale content distribution. In INFOCOM(pp. 2235–2245).

    Google Scholar 

  22. Gopalakrishnan, V., Bhattacharjee, B., Ramakrishnan, K. K., Jana, R., & Srivastava, D. (2009). Cpm: Adaptive video-on-demand with cooperative peer assists and multicast. In Proceedings of INFOCOM, Rio De Janeiro, Brazil.

    Google Scholar 

  23. Gupta, I., Birman, K. P., Linga, P., Demers, A. J., & van Renesse, R. (2003). Kelips: Building an efficient and stable p2p dht through increased memory and background overhead. In IPTPS(pp. 160–169).

    Google Scholar 

  24. Hofmann, M., & Beaumont, L. R. (2005). Content networking: Architecture, protocols, and practice. San Francisco, CA: Morgan Kaufmann.

    Google Scholar 

  25. Iyer, S., Rowstron, A. I. T., & Druschel, P. (2002). Squirrel: A decentralized peer-to-peer web cache. In PODC(pp. 213–222).

    Google Scholar 

  26. Jannotti, J., Gifford, D., Johnson, K. L., Kaashoek, M. F., & Jr., J. W. O. (2000). Overcast: reliable multicasting with an overlay network. In Proceedings of the Fourth Symposium on Operating System Design and Implementation (OSDI), San Diego, CA.

    Google Scholar 

  27. Jung, J., Krishnamurthy, B., & Rabinovich, M. (2002). Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites. In WWW(pp. 293–304).

    Google Scholar 

  28. Keromytis, A. D., Misra, V., & Rubenstein, D. (2002). SOS: Secure overlay services. In SIGCOMM.

    Google Scholar 

  29. Kostic, D., Rodriguez, A., Albrecht, J., & Vahdat, A. (2003). Bullet: High bandwidth data dissemination using an overlay mesh. In Proceedings of SOSP(pp. 282-297), Lake George, NY.

    Google Scholar 

  30. Legout, A., Urvoy-Keller, G., & Michiardi, P. (2006). Rarest first and choke algorithms are enough. In IMC.

    Google Scholar 

  31. Lemos, R.: Blue security folds under spammer’s wrath. http://www.securityfocus.com/news/11392

  32. Levin, D., LaCurts, K., Spring, N., & Bhattacharjee, B. (2008). Bittorrent is an auction: Analyzing and improving bittorrent’s incentives. In SIGCOMM(pp. 243–254).

    Google Scholar 

  33. Li, B., Xie, S., Qu, Y., Keung, G., Lin, C., Liu, J., & Zhang, X. (2008). Inside the new coolstreaming: Principles, measurements and performance implications. In Proceedings of the INFOCOM 2008, Phoenix, AZ (pp. 1031–1039).

    Google Scholar 

  34. Li, B., Yik, K., Xie, S., Liu, J., Stoica, I., Zhang, H., & Zhang, X. (2007). Empirical study of the coolstreaming system. Proceedings of the IEEE Journal on Selected Areas in Communication(Special Issues on Advance in Peer-to-Peer Streaming Systems), 25(9), 1627-1639.

    Google Scholar 

  35. http://www.limelightnetworks.com/network.htm

  36. Linga, P., Gupta, I., & Birman, K. (2003). A churn-resistant peer-to-peer web caching system. In 2003 ACM Workshop on Survivable and Self-Regenerative Systems(pp. 1–10).

    Google Scholar 

  37. Locher, T., Meier, R., Schmid, S., & Wattenhofer, R. (2007). Push-to-pull peer-to-peer live streaming. In Proceedings of the International Symposium of Distributed Computing, Lemesos, Cyprus.

    Google Scholar 

  38. Lumezanu, C., Baden, R., Levin, D., Spring, N., & Bhattacharjee, B. (2009). Symbiotic relationships in internet routing overlays. In Proceedings of NSDI, Boston, MA.

    Google Scholar 

  39. Magharei, N., & Rejaie, R. (2007). PRIME: Peer-to-peer receiver-drIven MEsh-based streaming. In Proceedings of the INFOCOM 2007, Anchorage, Alaska (pp. 1424–1432).

    Google Scholar 

  40. Magharei, N., Rejaie, R., & Guo, Y. (2007). Mesh or multiple-tree: A comparative study of live p2p streaming approaches. In Proceedings of the INFOCOM 2007, Anchorage, Alaska.

    Google Scholar 

  41. Malkhi, D., Naor, M., & Ratajczak, D. (2002). Viceroy: A scalable and dynamic emulation of the butterfly. In PODC(pp. 183–192).

    Google Scholar 

  42. Mao, Z. M., Cranor, C. D., Douglis, F., Rabinovich, M., Spatscheck, O., & Wang, J. (2002). A precise and efficient evaluation of the proximity between web clients and their local dns servers. In USENIX Annual Technical Conference(pp. 229–242).

    Google Scholar 

  43. Morselli, R., Bhattacharjee, B., Marsh, M. A., & Srinivasan, A. (2007). Efficient Lookup on Unstructured Topologies. IEEE Journal on Selected Areas in Communications, 25(1), 62–72.

    Article  Google Scholar 

  44. Nakao, A., Peterson, L., & Bavier, A. (2006). Scalable routing overlay networks. SIGOPS Operating Systems Review, 40(1), 49–61.

    Article  Google Scholar 

  45. Padmanabhan, V., Wang, H., Chou, P., & Sripanidkulchai, K. (2002). Distributing streaming media content using cooperative networking. In NOSSDAV, Miami Beach, FL, USA.

    Google Scholar 

  46. Pai, V., Kumar, K., Tamilmani, K., Sambamurthy, V., & Mohr, A. (2005). Chainsaw: Eliminating trees from overlay multicast. In IPTPS 2005, Ithaca, NY, USA.

    Google Scholar 

  47. Painese, F., Perino, D., Keller, J., & Biersack, E. (2007). PULSE: An adaptive, incentive-based, unstructured p2p live streaming system. IEEE Trans. on Multimedia 9(8), 1645–1660.

    Article  Google Scholar 

  48. Piatek, M., Isdal, T., Anderson, T. E., Krishnamurthy, A., & Venkataramani, A. (2007). Do incentives build robustness in bittorrent? (awarded best student paper). In NSDI.

    Google Scholar 

  49. Rabinovich, M., & Spatscheck, O. (2001). Web caching and replication. Reading, MA: Addison-Wesley, Longman Publishing Co., Inc. Boston, MA, USA.

    Google Scholar 

  50. Ramasubramanian, V., & Sirer, E. G. (2004). Beehive: O(1) lookup performance for power-law query distributions in peer-to-peer overlays. In NSDI(pp. 99–112).

    Google Scholar 

  51. Ratnasamy, S., Francis, P., Handley, M., Karp, R., & Shenker, S. (2001). A scalable content-addressable network. In SIGCOMM.

    Google Scholar 

  52. Rhea, S., Geels, D., Roscoe, T., & Kubiatowicz, J. (2004). Handling churn in a dht. In USENIX Annual Technical Conference.

    Google Scholar 

  53. Rhea, S. C., Godfrey, B., Karp, B., Kubiatowicz, J., Ratnasamy, S., Shenker, S., Stoica, I., & Yu, H. (2005). Opendht: A public dht service and its uses. In SIGCOMM(pp. 73–84).

    Google Scholar 

  54. Rowstron, A., & Druschel, P. (2001). Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In IFIP/ACM Middleware 2001, Heidelberg, Germany.

    Google Scholar 

  55. Savage, S., Anderson, T., Aggarwal, A., Becker, D., Cardwell, N., Collins, A., Hoffman, E., Snell, J., Vahdat, A., Voelker, G., & Zahorjan, J. (1999). Detour: A case for informed internet routing and transport IEEE Micro, 19(1), 50–59.

    Article  Google Scholar 

  56. Savage, S., Collins, A., Hoffman, E., Snell, J., & Anderson, T. (1999). The end-to-end effects of Internet path selection. In SIGCOMM.

    Google Scholar 

  57. Shaikh, A., Tewari, R., & Agrawal, M. (2001). On the effectiveness of DNS-based server selection. In Proceedings of IEEE Infocom, Anchorage, Alaska.

    Google Scholar 

  58. Stoica, I., Adkins, D., Zhuang, S., Shenker, S., & Surana, S. (2002). Internet indirection infrastructure. In SIGCOMM(pp. 73–86).

    Google Scholar 

  59. Stoica, I., Morris, R., Karger, D. R., Kaashoek, M. F., & Balakrishnan, H. (2001). Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM(pp. 149–160).

    Google Scholar 

  60. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D. R., Kaashoek, M. F., Dabek, F., & Balakrishnan, H. (2003). Chord: A scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 11(1), 17–32.

    Article  Google Scholar 

  61. Tran, D., Hua, K., & Do, T. (2003). ZIGZAG: An efficient peer-to-peer scheme for media streaming. In Proceedings of the INFOCOM 2003, San Francisco, CA.

    Google Scholar 

  62. Venkataraman, V., Francis, P., & Calandrino, J. (2006). Chunkyspread: Multi-tree unstructured peer-to-peer multicast. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS ’06), Santa Barbara, CA.

    Google Scholar 

  63. Verkaik, P., Pei, D., Scholl, T., Shaikh, A., Snoeren, A., & Van der Merwe, J. (2007). Wresting control from BGP: Scalable fine-grained route control. In 2007 USENIX Annual Technical Conference.

    Google Scholar 

  64. Verma, D. C. (2001). Content distribution networks: An engineering approach. New York: Wiley.

    Google Scholar 

  65. Wang, F., Xiong, Y., & Liu, J. (2007). mTreebone: A hybrid tree/mesh overlay for application-layer live video multicast. In Proceedings of the ICDCS 2007, Toronto, Canada.

    Google Scholar 

  66. Wang, P., Hopper, N., Osipkov, I., & Kim, Y. (2006). Myrmic: Secure and robust DHT routing. Technical Report, University of Minnesota.

    Google Scholar 

  67. Yang, M., & Fei, Z. (2004). A proactive approach to reconstructing overlay multicast trees. In Proceedings of the IEEE Infocom 2004, Hong Kong.

    Google Scholar 

  68. Zhang, M., Luo, J., Zhao, L., & Yang, S. (2005). A peer-to-peer network for live media streaming – Using a push-pull approach. In Proceedings of the ACM Multimedia, Singapore.

    Google Scholar 

  69. Zhang, X., Liu, J., Li, B., & Yum, T. (2005). Donet: A data-driven overlay network for efficient live media streaming. In Proceedings of the INFOCOM 2005. Miami, FL.

    Google Scholar 

Download references

Acknowledgments

The authors thank Katrina LaCurts, Dave Levin, and Adam Bender for their comments on this chapter. The authors are grateful to the editors, Chuck Kalmanek and Richard Yang, for their comments and encouragement.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bobby Bhattacharjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag London

About this chapter

Cite this chapter

Bhattacharjee, B., Rabinovich, M. (2010). Overlay Networking and Resiliency. In: Kalmanek, C., Misra, S., Yang, Y. (eds) Guide to Reliable Internet Services and Applications. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84882-828-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-828-5_7

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-827-8

  • Online ISBN: 978-1-84882-828-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics