for the case of 8 virtual networks, a 100%
mechanism, while this rate increases up to 80%
when a 10T repair period is applied. In the latter
case, even with 4 virtual networks an optimum
performance is achieved for up to 60-70% node
failures.
Figure 13: Success rate for different combinations of
virtual networks and repair period as a function of failures.
Finally we will present some conclusive results
for the optimum performance of our protocol. In
Table 2
we can see the success rates for the best
combinations of virtual networks, replication
schemas and repair periods as node failures increase.
For all combinations, the protocol routes
seamlessly when node failures don’t exceed a 40-
50% ratio. If we want our protocol to tolerate even
more node failures then either 4 or 8 virtual
networks should be implemented, regardless of the
check period or the replication schema. Here we
point out that the repair mechanism is a pre-
requirement, in contrast to the repair period, which
can be relaxed to 20T without significant loss in
performance. The same applies for the replication
schema; the LSR schema must be at least applied but
the LSIR is not vital as results are only slightly
better.
6 CONCLUSIONS
Through the course of this paper we presented the
Umbrella protocol; a novel protocol based on a
distributed hash table that supports key publishing
and retrieval on top of an overlay network for
content distribution. We have analysed our protocol
and its algorithms through both theoretical and
simulation means and proved its corrective ness and
efficacy. Its main novelty lies in its fixed-size
routing table sustained by each node, which is able
to provide efficient routing even under contrary
conditions. The protocol has also proved to be
scalable due to its low traffic load demands. The
results obtained by our simulations proved that the
protocol, along with a number of valuable
extensions, is able to route seamlessly successful
lookups in O(log
b
N) steps even when more than
80% of the system’s population suddenly fails.
REFERENCES
Francis, P. (1999). “Yoid : Extending the Multicast
Internet Architecture,” White paper,
http://www.aciri.org/yoid
Ghodsi, A., Alima, L.,O., Haridi, S. (2005). “Symmetric
Replication for Structured Peer-to-Peer Systems”, The
3rd International Workshop on Databases, Information
Systems and Peer-to-Peer Computing, Trondheim,
Norway , August
Joseph, S. (2003). “An Extendible Open Source P2P
Simulator,” P2PJournal
Karger, D., Lehman, E., Leighton, F., Levine, M., Lewin,
D., Panigrahy, R. (1997). “Consistent hashing and
random trees: Distributed caching protocols for
relieving hot spots on the World Wide Web”, in
Proceedings of the 29
th
Annual ACM Symposium on
Theory of Computing, El Paso, TX
Madadhain J., Fisher D., Smyth P., White S., Boey Y.
(2005). “Analysis and Visualization of Network Data
using JUNG”, http://jung.sourceforge.net
Maymounkov, P., Mazieres, D. (2002). “Kademlia: A
peerto -peer informatic system based on the XOR
metric,” in Proceedings of IPTPS'02, (Cambridge,
MA)
Moy J. (1998). “OSPF Version 2”, Network Working
Group, RFC 2328
National Institute of Standards and Technology. (1995).
“FIPS Pub 180-1: Secure Hash Standard (SHA-1),”
Federal Information Processing Standards Publication
Plaxton, G., Rajaraman, R., Richa, A.W. (1997).
“Accessing Nearby Copies of Replicated Objects in a
Distributed Environment,” in 9th Annual ACM
Symposium on Parallel Algorithms and Architectures
(SPAA)
Ratsanamy, S., Francis, P., Handley, M., Karp, R. (2001).
“A scalable content-addressable network,” in ACM
SIGCOMM Conference, ACM Press, San Diego (CA)
Rowstron, A., Druschel, P. (2001). “Pastry: Scalable,
decentralized object location, and routing for large-
scale Peer-to-Peer systems,” in Middleware 2001
Stoica, I., Morris, R., Karger, D., Kaashoek, F.,
Balakrishnan, H. (2001). “Chord: A Peer-to-Peer
Lookup Service for Internet Applications,” in Proc.
SIGCOMM
Zhao, B. Y., Huang, L., Stribling, J., Rhea, S.C.,
Joseph,A.D., Kubiatowicz, J.D. (2004). “Tapestry: A
resilient global-scale overlay for service deployment,”
IEEE Journal on Selected Areas in Communications
ROUTING IN THE “UMBRELLA” ARCHITECTURE
241