Skip to main content
Log in

Kooperationsstrategien für Netzwerkmanagement im Internet der Zukunft

  • HAUPTBEITRAG
  • KOOPERATIONSSTRATEGIEN
  • Published:
Informatik-Spektrum Aims and scope

Zusammenfassung

Kooperationsstrategien gewinnen zunehmend an Bedeutung im Internet. Kooperationsmodelle finden ihre Anwendung z. B. in Peer-to-Peer-Netzen oder beim kooperativen Routing in Mesh-Netzen. Im Rahmen der Future-Internet-Forschung werden derzeit Ansätze diskutiert, bei denen Entscheidungszyklen des Netzwerkmanagements in das Netz verlagert werden. Damit ergibt sich ein hoher Informationsbedarf im Netzwerk. In diesem Beitrag beschreiben wir einen Ansatz, in dem Funktionen auf Dienst- und auf Netzwerkebene miteinander kooperieren, um solche Entscheidungsprozesse im Netz zu unterstützen. Anhand eines Beispiels zur Lastkontrolle zeigen wir, wie durch eine Kooperation der beteiligten Komponenten sowohl der Gruppennutzen als auch der Nutzen aller einzelnen beteiligten Dienstleister erhöht werden kann.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Anagnostakis KG, Greenwald MB (2004) Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing. In: Proceedings of the 24th International Conference on Distributed Computing Systems (Icdcs’04), March 24–26, 2004. ICDCS. IEEE Computer Society, Washington, DC, 524–533

  2. Blanc A, Liu Y-K, Vahdat A (2005) Designing incentives for peer-to-peer routing. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proc IEEE

  3. Caronni G (2000) Walking the Web of Trust. In: Proceedings of the 9th IEEE international Workshops on Enabling Technologies: infrastructure For Collaborative Enterprises, June 4–16, 2000. WETICE. IEEE Computer Society, Washington, DC, 153–158

  4. Clark DD, Wroclawski J, Sollins KR, Braden R (2002) Tussle in cyberspace: defining tomorrow’s internet. In: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications, Pittsburgh, Pennsylvania, USA, August 19–23, 2002. SIGCOMM ’02. ACM, New York, NY, 347–356. doi: http://doi.acm.org/10.1145/633025.633059

  5. Dasgupta D (1999) Artificial Immune Systems and Their Applications. Springer, Berlin, ISBN 3-540-64390-7

    MATH  Google Scholar 

  6. Douceur JR (2002) The Sybil Attack. In: Druschel P, Kaashoek MF, Rowstron AI (eds) Revised Papers From the First international Workshop on Peer-To-Peer Systems, March 7–8, 2002. Lecture Notes In Computer Science, vol. 2429. Springer, London, 251–260

    Google Scholar 

  7. Feldman M, Lai K, Stoica I, Chuang J (2004) Robust incentive techniques for peer-to-peer networks. In: Proceedings of the 5th ACM Conference on Electronic Commerce, New York, NY, USA, May 17–20, 2004. EC ’04. ACM, New York, NY, 102–111. doi: http://doi.acm.org/10.1145/988772.988788

  8. Felegyhazi M, Hubaux J-P, Buttyan L (2006) Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Trans Mobile Comput 5(5):463–476

    Article  Google Scholar 

  9. freifunk Picopeering Agreement (2009) http://www.picopeer.net, letzter Zugriff 26.1.2010

  10. Gambetta D (1990) Trust: Making and Breaking Cooperative Relations. Blackwell Publishers

  11. Georgiou C, Shvartsman AA (2008) Do-All Computing in Distributed Systems Cooperation in the Presence of Adversity. Springer

  12. Mataric MJ (1993) Designing emergent behaviors: from local interactions to collective intelligence. In: Meyer J, Roitblat HL, Wilson SW (eds) Proceedings of the Second international Conference on From Animals To Animats 2: Simulation of Adaptive Behavior: Simulation of Adaptive Behavior, Honolulu, Hawai, United States. MIT Press, Cambridge, MA, 432–441

  13. Mirollo RE, Strogatz SH (1990) Synchronization of pulse-coupled biological oscillators. SIAM J Appl Math 50(6):1645–1662

    Article  MATH  MathSciNet  Google Scholar 

  14. Nowak MA (2006) Five Rules for the Evolution of Cooperation. Science 314(5805):1560–1563

    Article  Google Scholar 

  15. Nowak MA, Sigmund K (2005) Evolution of indirect reciprocity. Nature 437:1291–1298

    Article  Google Scholar 

  16. Nunzi G, Dudkowski D (eds) (2009) 4WARD D4.2 In-Network Management Concept. 4WARD Project Delivery, http://www.4ward-project.eu/index.php?s=file_download&id=37, letzter Zugriff Januar 2010

  17. Qiu D, Srikant R (2004) Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications, Portland, Oregon, USA, August 30–September 3, 2004. SIGCOMM ’04. ACM, New York, NY, 367–378. doi: http://doi.acm.org/10.1145/1015467.1015508

  18. Srikant R (2003) The Mathematics of Internet Congestion Control (Systems & Control: Foundations & Applications). Birkhäuser, Boston

    Google Scholar 

  19. Witaszek D, Tiemann J (2008) Context Dissemination System: Requirements, Architecture and Ability to Support Measurement Results. Technical Report TR-2008-0130, Fraunhofer FOKUS, Berlin

  20. 4WARD Projekt (2009) http://www.4ward-project.eu/, letzter Zugriff Januar 2010

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tanja Zseby.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zseby, T., Kleis, M. & Hirsch, T. Kooperationsstrategien für Netzwerkmanagement im Internet der Zukunft. Informatik Spektrum 33, 160–170 (2010). https://doi.org/10.1007/s00287-010-0422-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00287-010-0422-x

Navigation