Skip to main content
Log in

A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The rise in cloud storage and services in enterprise networks requires agile methods of content distribution, such as general-purpose files, software patches, image files, and other information. The work in this paper proposes a peer selection algorithm in BitTorrent to distribute content in enterprise networks. Peers execute this algorithm with a new special role called Internal Swarm Coordinator, ISC for short. Additions to the protocol allow peers from an Internal Swarm to cooperate in a coordinated manner, with an ISC acting as an orchestra director for a given broadcast domain. The proposed scheme uses two approaches: a Hamming distance to select the best peers enforcing productive connections between hosts, and fuzzy logic to handle peer load. This work includes a UDP-based protocol to select ISCs, and a procedure to define the behavior of this unique host. Also, to ensure backward compatibility, a description of how other peers can interact with this special role is given.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Carvalho M, Ford R (2014) Moving-target defenses for computer networks, vol 12. Institute Of Electrical And Electronics Engineers (IEEE)

  2. Kalimuthu A, Karthikeyan M (2017) Efficient design of error recovery and improve the performance using mesh of ring topology based Noc. Int J Adv Engineer Res Sci 4(3):46–50. AI Publications, https://doi.org/10.22161/ijaers.4.3.7

    Article  Google Scholar 

  3. Chen G, Wu C, Jiang M (2010) Region tracker: An effective way to localize Bittorrent traffic. WiCOM, Chengdu

    Google Scholar 

  4. Perez-Botero D, Szefer J (2013) Characterizing hypervisor vulnerabilities in cloud computing servers. Proceedings of the international workshop on security in cloud computing

  5. Nygren E (2010) The Akamai network: a platform for high-performance internet applications. ACM SIGOPS Operating Systems Review

  6. Liao W, Papadopoulos F, Psounis K, Psomas C, Psomas C (2013) Modeling BitTorrent- like systems with many classes of users. TOMACS 23(2):24-?35

    Article  MathSciNet  Google Scholar 

  7. (2017) BitTorrent Protocol Specification

  8. Aguilar A, Nolazco J, Vargas-Rosales C (2015) Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks, Peer-to-Peer Networking and Applications

  9. Vimal S, Srivatsa SK (2017) A survey on various file sharing methods in P2P networks, 2017 3rd international conference on science technology engineering management (ICONSTEM), Chennai, pp 305-310.

  10. Saroiu S, Khrisna P, Khrisna P (2006) A measurement study of peer-to-peer file sharing systems. Dept. of Computer Science and Engineering. University of Washington USA

  11. Cox JH Jr, Clark RJ, Owen HL III (2016) Leveraging SDN to improve the security of DHCP. In: Proceedings of the 2016 ACM international workshop on security in software defined networks network function virtualization (SDN-NFV Security ’16). ACM, New York

  12. Pang R, Allman M, Bennett M, Lee J, Paxson V, Tierney B (2005) A first look at modern enterprise traffic. Internet measurement conference

  13. Qin Y, Tian X, Wu W, Wang X, Wu W, Wang X (2016) Mobility weakens the distinction between multicast and unicast. IEEE/ACM Trans Netw

  14. Ngo C-W, Zhao W-L, Jiang Y-G (2006) Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Proceedings of the 14th annual ACM international conference on Multimedia

  15. Benchi A, Launay P, Guidec F (2015) Solving Consensus in Opportunistic Networks. In: Proceedings of the 2015 International Conference on Distributed Computing and Networking, New York, NY, USA

  16. Zhang X, Qin J, Wang W, Sun Y, Lu J (2013) HmSearch: an efficient hamming distance query processing algorithm. In: Proceedings of the 25th international conference on scientific and statistical database management

  17. Matl L, Cerny T, Donahoo MJ (2015) Effective manycast messaging for Kademlia network. In: Proceedings of the 30th annual ACM symposium on applied computing, New York, NY USA

  18. Yang XY, Hernandez P, Souza L, Ripoll A, Suppi R, Luque E, Cores F (2006) Multi- collaboration domain multicast P2P delivery architecture for VoD system. IEEE international conference on communications

  19. Vellore P, Gillard P, Venkatesan R, Gillard P, Venkatesan R (2009) Performance analysis of BitTorrent enabled ad hoc network routing. In: Proceedings of the 2009 international conference on wireless communications and mobile computing

  20. Ari I, Hong B, Miller EL, Brandt SA (2013) Managing flash crowds on the internet. International symposium on modeling, analysis and simulation of computer telecommunications systems

  21. Faqs.org: Network Address Translation, [Online]

  22. Yu-Wei E, Xin S, Sanjay G, Maltz GG (2011) Towards systematic design of enterprise networks. IEEE/ACM Transactions on Networking. Vol. 19. Issue 3 USA

  23. Qiu D., Srikant R. (2004) Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: Proceedings of ACM Sigcomm, Portland, OR

  24. Beecks C, Uysal MS, Seidl T (2010) Similarity matrix compression for efficient signature quadratic form distance computation. In: SISAP ’10: Proceedings of the 3rd international conference on similarity search and applications

  25. Gomaa WH, Fahmy AA (2013) A survey of text similarity approaches. Int J Comput Appl 68(13):13–18

    Google Scholar 

  26. Qin F, Lui J, Zheng L (2009) An effective network-aware peer selection algorithm in BitTorrent. 5th international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September

  27. Wu T, Li M, Ponraj M (2009) A genetic algorithm based peer selection strategy for BitTorrent networks, Nature biologically inspired computing

  28. Rong O (2014) A novel peer selection algorithm to reduce BitTorrent-like P2P traffic between networks. Information technology and computer science

  29. DHCP RFC, https://www.ietf.org/rfc/rfc2131.txt

  30. Lawey AQ, El-Gorashi T, Elmirghani JMH (2012) Energy-efficient peer selection mechanism for BitTorrent content distribution, IEEE Global Communications Conference (GLOBECOM), Anaheim, CA

  31. Qureshi A (2004) Exploring proximity based peer selection in a BitTorrent-like protocol, MIT 6.824 student project

  32. Liu P, Chiang T, Chien Y (2009) Improving mobile peer-to-peer streaming service with BitTorrent-like redundant tracker, Mobile Data Management: Systems, services and middleware

  33. Bindal R, Cao P, Chan W (2006) Improving traffic locality in BitTorrent via biased neighbor selection. IEEE international conferences on distributed computing

  34. Sugavanesh B, Hari Prasath R, Selvakumar S (2013) SHS-HTTPS enforcer: Enforcing HTTPS and preventing MITM attacks. ACM SIGSOFT Soft Engineer 38(6):1–4

    Google Scholar 

  35. Aguilar A, Lozoya C, Ventura-Molina C (2017) BiT-SiEm: A packet-level simulation and emulation platform for BitTorrent, Journal of Applied Research and Technology

  36. Richter P, Wohlfart F, Vallina-Rodriguez N, Allman M, Bush R, Feldmann A, Kreibich C, Weaver N, Paxson V (2016) A multi-perspective analysis of carrier-grade NAT deployment. In: Proceedings of the 2016 internet measurement conference (IMC ’16), New York, NY, USA

  37. El Afia A, Lalaoui M, Chiheb R (2017) Fuzzy logic controller for an adaptive Huang cooling of simulated annealing. In: Proceedings of the 2nd international conference on big data, cloud and applications (BDCA’17), New York, NY, USA

  38. (2018) jFuzzyLogic, http://jfuzzylogic.sourceforge.net

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alberto Aguilar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Big Data and Smart Computing in Network Systems

Guest Editors: Jiming Chen, Kaoru Ota, Lu Wang, and Jianping He

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aguilar, A., Lozoya, C. & Orona, L.M. A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks. Peer-to-Peer Netw. Appl. 12, 1323–1335 (2019). https://doi.org/10.1007/s12083-018-0711-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-018-0711-8

Keywords

Navigation