Abstract
The rise in cloud storage and services in enterprise networks requires agile methods of content distribution, such as general-purpose files, software patches, image files, and other information. The work in this paper proposes a peer selection algorithm in BitTorrent to distribute content in enterprise networks. Peers execute this algorithm with a new special role called Internal Swarm Coordinator, ISC for short. Additions to the protocol allow peers from an Internal Swarm to cooperate in a coordinated manner, with an ISC acting as an orchestra director for a given broadcast domain. The proposed scheme uses two approaches: a Hamming distance to select the best peers enforcing productive connections between hosts, and fuzzy logic to handle peer load. This work includes a UDP-based protocol to select ISCs, and a procedure to define the behavior of this unique host. Also, to ensure backward compatibility, a description of how other peers can interact with this special role is given.
Similar content being viewed by others
References
Carvalho M, Ford R (2014) Moving-target defenses for computer networks, vol 12. Institute Of Electrical And Electronics Engineers (IEEE)
Kalimuthu A, Karthikeyan M (2017) Efficient design of error recovery and improve the performance using mesh of ring topology based Noc. Int J Adv Engineer Res Sci 4(3):46–50. AI Publications, https://doi.org/10.22161/ijaers.4.3.7
Chen G, Wu C, Jiang M (2010) Region tracker: An effective way to localize Bittorrent traffic. WiCOM, Chengdu
Perez-Botero D, Szefer J (2013) Characterizing hypervisor vulnerabilities in cloud computing servers. Proceedings of the international workshop on security in cloud computing
Nygren E (2010) The Akamai network: a platform for high-performance internet applications. ACM SIGOPS Operating Systems Review
Liao W, Papadopoulos F, Psounis K, Psomas C, Psomas C (2013) Modeling BitTorrent- like systems with many classes of users. TOMACS 23(2):24-?35
(2017) BitTorrent Protocol Specification
Aguilar A, Nolazco J, Vargas-Rosales C (2015) Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks, Peer-to-Peer Networking and Applications
Vimal S, Srivatsa SK (2017) A survey on various file sharing methods in P2P networks, 2017 3rd international conference on science technology engineering management (ICONSTEM), Chennai, pp 305-310.
Saroiu S, Khrisna P, Khrisna P (2006) A measurement study of peer-to-peer file sharing systems. Dept. of Computer Science and Engineering. University of Washington USA
Cox JH Jr, Clark RJ, Owen HL III (2016) Leveraging SDN to improve the security of DHCP. In: Proceedings of the 2016 ACM international workshop on security in software defined networks network function virtualization (SDN-NFV Security ’16). ACM, New York
Pang R, Allman M, Bennett M, Lee J, Paxson V, Tierney B (2005) A first look at modern enterprise traffic. Internet measurement conference
Qin Y, Tian X, Wu W, Wang X, Wu W, Wang X (2016) Mobility weakens the distinction between multicast and unicast. IEEE/ACM Trans Netw
Ngo C-W, Zhao W-L, Jiang Y-G (2006) Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Proceedings of the 14th annual ACM international conference on Multimedia
Benchi A, Launay P, Guidec F (2015) Solving Consensus in Opportunistic Networks. In: Proceedings of the 2015 International Conference on Distributed Computing and Networking, New York, NY, USA
Zhang X, Qin J, Wang W, Sun Y, Lu J (2013) HmSearch: an efficient hamming distance query processing algorithm. In: Proceedings of the 25th international conference on scientific and statistical database management
Matl L, Cerny T, Donahoo MJ (2015) Effective manycast messaging for Kademlia network. In: Proceedings of the 30th annual ACM symposium on applied computing, New York, NY USA
Yang XY, Hernandez P, Souza L, Ripoll A, Suppi R, Luque E, Cores F (2006) Multi- collaboration domain multicast P2P delivery architecture for VoD system. IEEE international conference on communications
Vellore P, Gillard P, Venkatesan R, Gillard P, Venkatesan R (2009) Performance analysis of BitTorrent enabled ad hoc network routing. In: Proceedings of the 2009 international conference on wireless communications and mobile computing
Ari I, Hong B, Miller EL, Brandt SA (2013) Managing flash crowds on the internet. International symposium on modeling, analysis and simulation of computer telecommunications systems
Faqs.org: Network Address Translation, [Online]
Yu-Wei E, Xin S, Sanjay G, Maltz GG (2011) Towards systematic design of enterprise networks. IEEE/ACM Transactions on Networking. Vol. 19. Issue 3 USA
Qiu D., Srikant R. (2004) Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: Proceedings of ACM Sigcomm, Portland, OR
Beecks C, Uysal MS, Seidl T (2010) Similarity matrix compression for efficient signature quadratic form distance computation. In: SISAP ’10: Proceedings of the 3rd international conference on similarity search and applications
Gomaa WH, Fahmy AA (2013) A survey of text similarity approaches. Int J Comput Appl 68(13):13–18
Qin F, Lui J, Zheng L (2009) An effective network-aware peer selection algorithm in BitTorrent. 5th international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September
Wu T, Li M, Ponraj M (2009) A genetic algorithm based peer selection strategy for BitTorrent networks, Nature biologically inspired computing
Rong O (2014) A novel peer selection algorithm to reduce BitTorrent-like P2P traffic between networks. Information technology and computer science
DHCP RFC, https://www.ietf.org/rfc/rfc2131.txt
Lawey AQ, El-Gorashi T, Elmirghani JMH (2012) Energy-efficient peer selection mechanism for BitTorrent content distribution, IEEE Global Communications Conference (GLOBECOM), Anaheim, CA
Qureshi A (2004) Exploring proximity based peer selection in a BitTorrent-like protocol, MIT 6.824 student project
Liu P, Chiang T, Chien Y (2009) Improving mobile peer-to-peer streaming service with BitTorrent-like redundant tracker, Mobile Data Management: Systems, services and middleware
Bindal R, Cao P, Chan W (2006) Improving traffic locality in BitTorrent via biased neighbor selection. IEEE international conferences on distributed computing
Sugavanesh B, Hari Prasath R, Selvakumar S (2013) SHS-HTTPS enforcer: Enforcing HTTPS and preventing MITM attacks. ACM SIGSOFT Soft Engineer 38(6):1–4
Aguilar A, Lozoya C, Ventura-Molina C (2017) BiT-SiEm: A packet-level simulation and emulation platform for BitTorrent, Journal of Applied Research and Technology
Richter P, Wohlfart F, Vallina-Rodriguez N, Allman M, Bush R, Feldmann A, Kreibich C, Weaver N, Paxson V (2016) A multi-perspective analysis of carrier-grade NAT deployment. In: Proceedings of the 2016 internet measurement conference (IMC ’16), New York, NY, USA
El Afia A, Lalaoui M, Chiheb R (2017) Fuzzy logic controller for an adaptive Huang cooling of simulated annealing. In: Proceedings of the 2nd international conference on big data, cloud and applications (BDCA’17), New York, NY, USA
(2018) jFuzzyLogic, http://jfuzzylogic.sourceforge.net
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on Big Data and Smart Computing in Network Systems
Guest Editors: Jiming Chen, Kaoru Ota, Lu Wang, and Jianping He
Rights and permissions
About this article
Cite this article
Aguilar, A., Lozoya, C. & Orona, L.M. A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks. Peer-to-Peer Netw. Appl. 12, 1323–1335 (2019). https://doi.org/10.1007/s12083-018-0711-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-018-0711-8