ACM SIGARCH Computer Architecture News
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Topology-aware overlay networks for group communication
NOSSDAV '02 Proceedings of the 12th international workshop on Network and operating systems support for digital audio and video
IEEE/ACM Transactions on Networking (TON)
A hierarchical characterization of a live streaming media workload
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
On realistic network topologies for simulation
MoMeTools '03 Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research
SplitStream: high-bandwidth multicast in cooperative environments
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Vivaldi: a decentralized network coordinate system
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
An analysis of live streaming workloads on the internet
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
mTreebone: A Hybrid Tree/Mesh Overlay for Application-Layer Live Video Multicast
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Towards the Construction of Attack Resistant and Efficient Overlay Streaming Topologies
Electronic Notes in Theoretical Computer Science (ENTCS)
Optimally DoS Resistant P2P Topologies for Live Multimedia Streaming
IEEE Transactions on Parallel and Distributed Systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
mTreebone: A Collaborative Tree-Mesh Overlay Network for Multicast Video Streaming
IEEE Transactions on Parallel and Distributed Systems
Distributed Automatic Configuration of Complex IPsec-Infrastructures
Journal of Network and Systems Management
On the Dependencies between Source Neighbors in Optimally DoS-stable P2P Streaming Topologies
ICDCS '11 Proceedings of the 2011 31st International Conference on Distributed Computing Systems
On the stability of end-point-based multimedia streaming
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
Resilience in live peer-to-peer streaming [Peer-to-Peer Multimedia Streaming]
IEEE Communications Magazine
Scribe: a large-scale and decentralized application-level multicast infrastructure
IEEE Journal on Selected Areas in Communications
Understanding the Power of Pull-Based Streaming Protocol: Can We Do Better?
IEEE Journal on Selected Areas in Communications
Underlay-robust application layer multicast
PCCC '11 Proceedings of the 30th IEEE International Performance Computing and Communications Conference
OSSim: a generic simulation framework for overlay streaming
Proceedings of the 2013 Summer Computer Simulation Conference
Hi-index | 0.00 |
Application Layer Multicast (ALM) represents a cost-efficient way to disseminate content in large scale. However, as it relies on end-systems in content distribution, it can be easily attacked and thus requires specific measures to increase its resilience against attacks. Besides attacks on end-users, few attention has been paid to attacks on the underlying transport network so far. When the overlay is not constructed in an underlay-aware manner, several overlay links may rely on the same link or router in the underlay. Hence, a single underlay failure may result in multiple, simultaneous overlay failures. Moreover, without considering the underlying transport network an inefficient content distribution can be the result. For this reason the ALM induced traffic load in transport networks can become rather large. In this article, we propose a construction algorithm for ALM topologies that incorporates information about the underlying network to improve their resilience against underlay failures, to maintain resilience against overlay attacks, and to increase the efficiency of the content distribution. Our simulation results indicate that the underlay dependence of the established ALM overlays can be nearly halved compared to overlays that do not use information about the transport network in their construction. As a result, the ALM induced traffic load in transport networks decreases considerably. In addition, the results indicate that our topologies are likewise resilient to underlay as well as overlay attacks.