Omnix: an Open Peer-To-Peer Middleware Framework

Total Page:16

File Type:pdf, Size:1020Kb

Omnix: an Open Peer-To-Peer Middleware Framework Omnix: An Open Peer-to-Peer Middleware Framework Engineering Topology- and Device-Independent Peer-to-Peer Systems Ph.D. Thesis Roman Kurmanowytsch DISSERTATION Omnix: An Open Peer-to-Peer Middleware Framework Engineering Topology- and Device-Independent Peer-to-Peer Systems ausgefuhrt¨ zum Zwecke der Erlangung des akademischen Grades eines Doktors der technischen Wissenschaften unter der Leitung von o.Univ.-Prof. Dipl.-Ing. Dr.techn. Mehdi Jazayeri Institut fur¨ Informationssysteme Abteilung fur¨ Verteilte Systeme (E184-1) eingereicht an der Technischen Universitat¨ Wien Fakultat¨ fur¨ Informatik von Univ.-Ass. Dipl.-Ing. Roman Kurmanowytsch [email protected] Matrikelnummer: 9327324 Brunnerstr. 28/12 A-1230 Wien, Osterreich¨ Wien, im Februar 2004 Omnix: An Open Peer-to-Peer Middleware Framework Engineering Topology- and Device-Independent Peer-to-Peer Systems Ph.D. Thesis at Vienna University of Technology submitted by Dipl.-Ing. Roman Kurmanowytsch Distributed Systems Group, Information Systems Institute, Technical University of Vienna Argentinierstr. 8/184-1 A-1040 Vienna, Austria 1st February 2004 c Copyright 2004 by Roman Kurmanowytsch Advisor: o. Univ.-Prof. Dr. Mehdi Jazayeri Second Advisor: a.o. Univ.-Prof. Dr. Gabriele Kotsis Abstract In this thesis, we present Omnix, a Peer-to-Peer (P2P) middleware framework. P2P mid- dleware provides an abstraction between the application and the underlying network by pro- viding higher-level functionality such as distributed P2P searches and direct communication among peers. P2P networks build an overlay network, a network on the network. The central idea of this dissertation is to apply the well-established ISO OSI layered model on P2P middleware systems. A layered P2P architecture helps to identify separate parts of a complex system, allows changes to the system without affecting other layers and makes maintenance easier due to modularization. The main advantages of having such a layered P2P middleware are: independence from the underlying network and the P2P topology. This dissertation proposes a P2P middleware architecture consisting of three layers: the Transport Layer, the Processing Layer and the P2P Network Layer. The Transport Layer (which can be compared to the Physical Layer of the OSI model) is responsible for providing an abstraction to the network primitives provided by operating systems or libraries. This makes Omnix independent from the underlying network protocols and the devices and allows Omnix to run on heterogeneous devices. The Processing Layer (an analogy to the Data Link layer) provides an error free connection to remote peers and allows additional services to be plugged in. The P2P Network Layer comprises the routing algorithm, thus describes the topology (or structure) of the P2P network. Omnix has a pluggable architecture that allows different components to be plugged in based on the requirements of an application, the capabilities of the device the application is running on, the number of peers involved, etc. Custom-tailored P2P middleware systems can be constructed, thus, increasing the flexibility of communication architectures that are built upon it. Applications that use Omnix are provided an API that is not affected whenever the underlying topology has to be changed or adapted. Since testing P2P networks is hard to accomplish due to the large amount of peers re- quired to get significant results, Omnix provides a way of testing P2P applications using this middleware framework. By replacing the communication layer by a virtual network, it is possible to simulate a network of virtual peers on a single computer without the necessity of changing the application on top of it. Along with Omnix, several plugins are provided to demonstrate the versatility of the framework. They provide the functionality to run Omnix on normal PCs, on handheld com- puters (e.g., Compaq iPAQ) and on Java-enabled mobile phones. Kurzfassung Diese Dissertation stellt Omnix vor, eine Peer-to-Peer (P2P) Middleware. P2P Middle- ware Systeme bieten eine Schnittstelle zwischen der P2P Kommunikation-Infrastruktur und der daruber¨ liegenden Applikation an. Dienste wie zum Beispiel das Suchen in einem P2P Netzwerk oder die direkte Kommunikation zwischen Peers werden dabei angeboten. P2P Netzwerke bilden ein virtuelles Netzwerk auf einem existierenden Netzwerk. In dieser Dissertation wird das anerkannte OSI (Open Systems Interconnection) Netzwerk- Schichtenmodell der Internationalen Organisation fur¨ Standards (ISO) auf P2P Netzwerke angewendet. Das Schichtenmodell hat den Vorteil, dass komplexe Systeme in kleinere Teile aufgeteilt werden konnen,¨ dass Schichten verandert¨ werden konnen,¨ ohne einen Einfluß auf die Schichten darunter zu haben und dass die Wartbarkeit und Erweiterbarkeit solcher Sy- stem erhoht¨ wird. In einem P2P Netzwerk bedeutet das hauptsachlich¨ eine Unabhangigk¨ eit von der zugrundeliegenden Netzwerk–Technologie und der Struktur des P2P Netzwerkes selbst. In dieser Dissertation werden drei Schichte vorgeschlagen: die Transport-Schicht, die Processing-Schicht und die P2P Netzwerk-Schicht. Die Transport-Schicht kann mit der phy- sikalischen Schicht des ISO Modells verglichen werden. Sie ist dafur¨ zustandig,¨ den Zugang zum Netzwerk transparent, und daher auch unabhangig¨ vom eingesetzten Netzwerkproto- koll, zu machen. Die Processing-Schicht (welche an die OSI Sicherungsschicht angelehnt ist) erzeugt einen fehlerfreien Verbindungskanal und bietet daruberhinaus¨ noch weitere, wichtige Dienste an. Die P2P-Netzwerk-Schicht beinhaltet die Routing-Algorithmen und beschreibt daher die Struktur des P2P Netzwerkes. Omnix verwendet eine komponenten-orientierte Architektur die es erlaubt, das System den Erfordernissen anzupassen. Die dadurch gewonnene Flexibilitat¨ erlaubt es, Omnix fur¨ viele verschiedene Zwecke auf unterschiedlichsten Geraten¨ einzusetzen, ohne jedoch dabei die Schnittstelle zur Applikation zu verandern.¨ Fur¨ das Testen von Applikation, die auf Omnix aufbauen, kann die Netzwerkkommuni- kation durch ein virtuelles Netzwerk ersetzt werden, dass es erlaubt, mehrere Tausend Peers auf einem einzelnen Computer zu simulieren. Dabei ist es nicht notwenig, die Applikation selbst zu andern.¨ Um die breite Einsetzbarkeit von Omnix zu demonstrieren, werden verschiedene Module angeboten, die es erlauben, Omnix auf einem PC, einem Handheld (z.B. Compaq iPAQ) oder einem Mobiltelefon mit Java. Acknowledgments Many people directly or indirectly contributed to this dissertation. I am greatly indebted to my wife Hemma for her patience and mental support during the stressful time of writing this dissertation. She was always willing to let me work until late in the evening while she was taking care of our one year old daughter. Her enduring support and understanding made this dissertation possible. I am also grateful to my parents for their continuous support over the long years of my education. I would also like to thank my advisor Prof. Dr. Mehdi Jazayeri who introduced me to research and provided an environment where I was able to look into many research areas and work with interesting people. His feedback has been invaluable in structuring and writing this dissertation. I further offer my sincerest gratitude to Prof. Dr. Gabriele Kotsis, who displayed a great deal of flexibility and kindness. Doing research at the Distributed Systems Group of the Information Systems Institute at the Vienna University of Technology was an incredible experience. I would like to acknowl- edge the work and dedication of the people working there. Special thanks go to my colleague and friend Clemens Kerer, who was always willing to listen to my ideas and point me to new directions. I would like to express my appreciation for all the efforts he made in numerous joint projects which has provided me with a great deal of enjoyment over many years. Thanks must also be given to Engin Kirda, who made working at the Distributed Systems Group at any time a lot of fun. He always provided encouraging words when they were most needed. I thank Michael Loibl, Johannes Schmidt and Reinhard Steiner for their input into this thesis by working on various sub-projects in the course of their master theses. This dissertation is dedicated to my children Lea and Noah. Roman Kurmanowytsch Vienna, Austria, February 2004 i Contents 1 Introduction 1 1.1 Problem description in a nutshell . 2 1.2 Omnix . 3 1.3 The Program Committee Scenario . 3 1.3.1 The Setting . 3 1.3.2 Computer Support for the Review Process . 4 1.3.3 Using Omnix in the Meeting . 4 1.3.4 A Second Meeting . 5 1.3.5 Alternatives . 6 1.4 Contributions . 6 1.5 Stakeholders . 7 1.6 Structure of this Thesis . 7 2 Concepts & Technologies 9 2.1 Various definitions of “Peer-to-Peer” . 9 2.2 Peer-to-Peer: An old new idea . 10 2.2.1 Evolution of computing . 10 2.2.2 Some application domains of P2P applications . 11 2.2.3 Historical P2P systems . 13 2.2.4 The context has changed . 14 2.3 Topologies . 15 2.3.1 Pure P2P . 15 2.3.2 Server-based P2P . 17 2.3.3 Hybrid P2P . 18 2.4 Myths about P2P . 18 3 Peer-to-Peer Topologies 21 3.1 Evaluation . 22 3.2 Summary . 36 ii 4 Design of Omnix 38 4.1 Requirements . 38 4.2 Architecture . 40 4.2.1 Overview . 40 4.2.2 The “Physical Layer” . 43 4.2.2.1 Transport . 43 4.2.2.2 Core . 46 4.2.3 Common Services . 46 4.2.3.1 Pipelines . 47 4.2.3.2 Processing modules . 48 4.2.4 The P2P Network Layer . 50 4.2.4.1 Context Switcher . 50 4.2.4.2 Topology modules / Omnix API . 51 4.3 Streaming . 54 5 Omnix Protocol 61 5.1 Requirements for a P2P protocol . 61 5.2 Overview . 63 5.3 Message types and structure . 64 5.3.1 Request / Response . 65 5.3.2 Header fields . 66 5.3.3 Body . 67 5.4 Security . 68 5.5 Protocol Alternatives . 69 6 Programming Aspects of Omnix 72 6.1 Changing the lower layers of Omnix: Transport and Processing . 72 6.1.1 Transport . 73 6.1.2 Message processing .
Recommended publications
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • Telephone Switching
    NATIONAL UNIVERSITY OF ENGINEERING COLLEGE OF ELECTRICAL AND ELECTRONICS ENGINEERING TELECOMMUNICATIONS ENGINEERING PROGRAM IT535 – TELEPHONE SWITCHING I. GENERAL INFORMATION CODE : IT535 – Telephone Switching SEMESTER : 9 CREDITS : 03 HOURS PER WEEK : 04 (Theory – Practice) PREREQUISITES : IT515 – Telecommunications III CONDITION : Mandatory II. COURSE DESCRIPTION The purpose of this course is to provide the student with the knowledge about the evolution and development of the telephony for the analog and digital switching systems, including the hardware and software of different telephone systems, integration of technologies such as ATM and IP including Voice over IP (VoIP) and photonic switching technologies. III. COURSE OUTCOMES At the end of the course the student will: Know the criteria for the design of analog and digital telephone switching systems. Know the operation and use of software and hardware used in different telephone systems. Know how to integrate technologies such as ATM and IP over classic telephone systems. IV. LEARNING UNITS 1. INTRODUCTION Communication channels. Switching channels. Networks of POTS (Plain Old Telephone Service). The Telecommunications Industry. Evolution of technology, Evolution of architecture. Evolution of telephone systems. 2. LINES AND TRUNKS Lines. The telephone. Subscriber signaling. Telephone exchange. Subscriber extension Functions per line. Trunks: Network hierarchy between telephone switching centers. Trunks Trunk circuits. Signaling between telephone switching centers. 3. TRAFFIC ENGINEERING Traffic measurements. Network management. Quality of telephone service. Telephone demand projections. Routing plan. Interconnection of telephone switching centers. 4. PUBLIC AND PRIVATE ANALOG SWITCHING Analog switching Architecture. Line Finders. Selectors. Crossbar. Block of lines Trunk blocks. Call progression, call routing. 1 5. PUBLIC AND PRIVATE DIGITAL SWITCHING SYSTEMS Concepts of pulse code modulation (PCM).
    [Show full text]
  • Title: P2P Networks for Content Sharing
    Title: P2P Networks for Content Sharing Authors: Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering, The University of Melbourne, Australia (chd, sarana, raj)@cs.mu.oz.au ABSTRACT Peer-to-peer (P2P) technologies have been widely used for content sharing, popularly called “file-swapping” networks. This chapter gives a broad overview of content sharing P2P technologies. It starts with the fundamental concept of P2P computing followed by the analysis of network topologies used in peer-to-peer systems. Next, three milestone peer-to-peer technologies: Napster, Gnutella, and Fasttrack are explored in details, and they are finally concluded with the comparison table in the last section. 1. INTRODUCTION Peer-to-peer (P2P) content sharing has been an astonishingly successful P2P application on the Internet. P2P has gained tremendous public attention from Napster, the system supporting music sharing on the Web. It is a new emerging, interesting research technology and a promising product base. Intel P2P working group gave the definition of P2P as "The sharing of computer resources and services by direct exchange between systems". This thus gives P2P systems two main key characteristics: • Scalability: there is no algorithmic, or technical limitation of the size of the system, e.g. the complexity of the system should be somewhat constant regardless of number of nodes in the system. • Reliability: The malfunction on any given node will not effect the whole system (or maybe even any other nodes). File sharing network like Gnutella is a good example of scalability and reliability.
    [Show full text]
  • Data Communications Via Powerlines I I (B) (3)-P.L
    UNCLASSIFIED Cryptologic Quarterly Data Communications Via Powerlines I I (b) (3)-P.L. 86-36 The author is a member ofNSA Cohort 11 at bine, such as in nuclear- or coal-powered electric the Joint Military Intelligence College. Many of power plants, or a low-speed turbine, such as is the ideas presented in this paper were developed used in hydroelectric power plants). The power is as a class research paper at the Joint Military transferred to the transmission system via a volt­ Intelligence College. age step-up transformer.3 Typical voltages in this The views expressed in this paper are those of stage range from 138 kV to 500 kV or more. Bulk the author and do not reflect the official policy power is delivered from the generating plants via or position of the Department of Defense or the this intercity transmission system (which can U.S. government. span several states) to the transmission substa­ tions where the power is transferred to a sub­ The hunger for increased bandwidth is driv­ transmission system whose voltages range from ing individuals, corporations, and organizations 38 kV to 138 kV; power transference is made via to seek new methods for delivering Internet serv­ a step-down transformer. The subtransmission ice to customers. Many of these methods are well system delivers the high voltage throughout a city known: radio-frequency (or wireless) communi­ or large region. Power is delivered to the con­ cations (such as the IEEE 802.11 Wireless LAN, sumers via the distribution system. Transference Bluetooth, and the HomeRF and SWAP from the subtransmission system to the distribu­ Protocols), infrared communications (IrDA), tion system is made within regions called distri­ fiber-optic channels, high-speed telephone con­ bution substations, likewise using step-down nections (such as DSL and ISDN or the more transformers.
    [Show full text]
  • Mediatrix G7 Series Datasheet
    ediatrix G7 Series The Mediatrix G7 Series is a reliable and secure VoIP Analog Adaptor and Media Gateway platform for SMBs. Featuring PRI, FXS, and FXO interfaces; the Mediatrix G7 Series provides the best solution to connect legacy equipmentedia to cloud telephonytrix services and IP PBX systems to PSTN landlines. Widely interoperable with SIP softswitch and IMS vendors, the Mediatrix G7 Series provides transparent integration of legacy PBX systems for SIP Trunking and PSTN replacement applications. Interconnects any device to SIP Highly reliable Fax and Modem Transmissions over IP The Mediatrix G7 Series links any analog or digital With T.38 and clear channel fax and modem pass-through connection to an IP network and delivers a rich capabilities, the Mediatrix G7 Series ensures seamless feature set for a comprehensive VoIP solution. transport of voice and data services over IP networks. PSTN access and legacy PBX system gateway Advanced Mass Management With FXS, FXO, configurable NT/TE PRI ports, local Our advanced provisioning capabilities deliver call switching, and user-defined call properties remarkable benefits to Mediatrix customers. (including caller/calling ID), Mediatrix G7 Series Mediatrix enables centralised CPE management, a gateways smoothly integrate into legacy PBXs and definite advantage to monitor the network, ensure incumbent PSTN networks. service, and reduce operational costs. ediatrix G7 Series Applicationsediatrix Operators ✓ Connect legacy equipment in PSTN replacement/TDM replacement projects ✓ Provide SIP termination
    [Show full text]
  • Investigating the User Behavior of Peer-To-Peer File Sharing Software
    www.ccsenet.org/ijbm International Journal of Business and Management Vol. 6, No. 9; September 2011 Investigating the User Behavior of Peer-to-Peer File Sharing Software Shun-Po Chiu (Corresponding author) PhD candidate, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan & Lecture, Department of Information Management Vanung University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Huey-Wen Chou Professor, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Received: March 26, 2011 Accepted: May 10, 2011 doi:10.5539/ijbm.v6n9p68 Abstract In recent years, peer-to-peer file sharing has been a hotly debated topic in the fields of computer science, the music industry, and the movie industry. The purpose of this research was to examine the user behavior of peer-to-peer file-sharing software. A methodology of naturalistic inquiry that involved qualitative interviews was used to collect data from 21 university students in Taiwan. The results of the study revealed that a substantial amount of P2P file-sharing software is available to users. The main reasons for using P2P file-sharing software are to save money, save time, and to access files that are no longer available in stores. A majority of respondents use P2P file-sharing software to download music, movies, and software, and the respondents generally perceive the use of such software as neither illegal nor unethical. Furthermore, most users are free-riders, which means that they do not contribute files to the sharing process. Keywords: Peer to peer, File sharing, Naturalistic inquiry 1. Introduction In recent years, Peer-to-Peer (P2P) network transmission technology has matured.
    [Show full text]
  • The Next-Generation Internet Standard
    IPv6 Network Administration By David Malone, Niall Murphy Publisher: O'Reilly Pub Date: March 2005 ISBN: 0-596-00934-8 Pages: 306 Table of • Contents • Index • Reviews • Examples This essential guide explains what works, what doesn't, and most of all, Reader what's practical about IPv6--the next-generation Internet standard. A • Reviews must-have for network administrators everywhere looking to fix their • Errata network's scalability and management problems. Also covers other IPv6 • Academic benefits, such as routing, integrated auto-configuration, quality-of-services (QoS), enhanced mobility, and end-to-end security. IPv6 Network Administration By David Malone, Niall Murphy Publisher: O'Reilly Pub Date: March 2005 ISBN: 0-596-00934-8 Pages: 306 Table of • Contents • Index • Reviews • Examples Reader • Reviews • Errata • Academic Copyright Foreword Preface What This Book Is ... and Is Not Conventions Used in This Book Using Code Examples Comments and Questions Safari Enabled Contacting the Authors A Note on RFCs and Internet Drafts Acknowledgments Part I: The Character of IPv6 Chapter 1. The Unforeseen Limitations of IPv4 Section 1.1. Addressing Model Section 1.2. NAT Section 1.3. Security Section 1.4. MAC Layer Address Resolution Section 1.5. Broadcast Versus Multicast Section 1.6. Quality of Service Section 1.7. Routing Section 1.8. Summary Chapter 2. The (Un)foreseen Successes of IPv4 Section 2.1. Simplicity Section 2.2. Resiliency Section 2.3. Scalability Section 2.4. Flexibility Section 2.5. Autoconfiguration Section 2.6. Extensibility Section 2.7. In Short... Chapter 3. Describing IPv6 Section 3.1. Designed for Today and Tomorrow Section 3.2.
    [Show full text]
  • Public Peer-To-Peer Filesharing Networks’ Evaluation
    PUBLIC PEER-TO-PEER FILESHARING NETWORKS’ EVALUATION J. Lloret Mauri1, B. Molina Moreno2, C. Palau Salvador3, M. Esteve Domingo4 Department of Communications, Polytechnic University of Valencia Camino Vera s/n, Valencia, Spain [email protected], [email protected], [email protected], [email protected] ABSTRACT • Download speed: some internal P2P network, due to Since the recent appearance of P2P file-sharing networks, its internal behaviour, are optimal for downloading many Internet users have chosen this technology to search files of reduced size. Others, however, use for programs, films, songs, etc. Their number of users is multisplitting mechanisms and permit the download growing every day due to the attractive and interesting from multiple sources, making them suitable for content type that can be found and downloaded over these obtaining larger files. networks. In this article six public architectures are analyzed, Gnutella, FastTrack, Opennap, Edonkey, MP2P These parameters are responsible for an architecture and Soulseek, tracking their evolution during a week in becoming very popular or, on the other hand, terms of connected users, number of files and size of disappearing. The above factors can make a P2P network shared files per hour. The results will be compared and more attractive to users of a specific nation due to the discussed with previous measurements taken a year ago. utilization of a specific language or even social trends [7]. These data can be used to design new network models, to It is also interesting to distinguish between a P2P network calculate their performance or to optimize new network and P2P client, the development of which must not be parameters.
    [Show full text]
  • Global Call E1/T1 CAS/R2 Technology Guide
    Global Call E1/T1 CAS/R2 Technology Guide July 2005 05-2445-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. This Global Call E1/T1 CAS/R2 Technology Guide as well as the software described in it is furnished under license and may only be used or copied in accordance with the terms of the license. The information in this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Intel Corporation. Intel Corporation assumes no responsibility or liability for any errors or inaccuracies that may appear in this document or any software that may be provided in association with this document. Except as permitted by such license, no part of this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without express written consent of Intel Corporation.
    [Show full text]
  • On Common Channel Signaling Number 7 and Its Comparison with Multi-Frequency Coded Signaling and Internet Protocol
    International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 2 (2012), pp. 125-132 © International Research Publication House http://www.irphouse.com On Common Channel Signaling Number 7 and its Comparison with Multi-Frequency Coded Signaling and Internet Protocol Md. Shah Alam1 and Md. Rezaul Huque Khan2 Dept. of Applied Physics, Electronics and Communication Engineering, University of Chittagong, Bangladesh 1 2 E-mail: [email protected], [email protected] Abstract A message based comparative study between signaling system #7(SS7) and R2 Signaling is done. The reasons for the transition from Multi-frequency Coded (MFC) Signaling to SS7 and SS7 to Internet Protocol are also discussed. Keywords: Common Channel Signaling No.7 (CCS7), R2 signaling or Multi- frequency Coded (MFC) signaling, Internet Protocol (IP), Advance Intelligent Network (AIN). Introduction The over increasing demand of telecommunication in the world wide significantly involves telecommunication signaling systems. The Common Channel Signaling no.7 is usually termed as Signaling System No.7 (SS7). The purpose of this paper is to study the signaling systems R2 or MFC, SS7 [1] and IP, to find the limitations of the above signaling system, analysis of the signaling systems (R2 and SS7) on the basis of their message format. An overall comparison between the two systems has been studied. This paper also focuses on the transition of MFC to SS7. A distinction is made between SS7 and IP and finally reasons are shown why SS7 is moving towards IP. Common Channel Signaling No. 7 Common Channel Signaling System No. 7 (i.e., SS7 or C7) is a global standard for telecommunications defined by the International Telecommunication Union (ITU) Telecommunication Standardization Sector (ITU-T).
    [Show full text]