gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r28811 - msh/doc


From: gnunet
Subject: [GNUnet-SVN] r28811 - msh/doc
Date: Fri, 23 Aug 2013 14:25:37 +0200

Author: harsha
Date: 2013-08-23 14:25:37 +0200 (Fri, 23 Aug 2013)
New Revision: 28811

Added:
   msh/doc/related_work.bib
Modified:
   msh/doc/msh.tex
Log:
- added introduction, limitations and bibliography


Modified: msh/doc/msh.tex
===================================================================
--- msh/doc/msh.tex     2013-08-23 12:20:16 UTC (rev 28810)
+++ msh/doc/msh.tex     2013-08-23 12:25:37 UTC (rev 28811)
@@ -1,4 +1,4 @@
-\documentclass[10pt, a4paper, onecolumn]{article}
+\documentclass[10pt, a4paper, onecolumn, twosided]{article}
 
 \usepackage[utf8]{inputenc}
 \usepackage{color}
@@ -20,15 +20,48 @@
   Such hosts are commonly found in High Performance Computing (HPC) systems 
such
   as compute clusters or supercomputers.
 
-  The motivation for this project is that often in such systems \texttt{ssh} is
-  either unavailable or restricted for users due to security reasons.  As a
-  result, hosts in these systems cannot be used for non MPI applications such 
as
-  network emulators or testbeds which rely on \texttt{ssh} to establish
-  connections among the hosts.  \texttt{msh} aims to solve this problem by
+  The motivation for this project is that often in such systems Secure-Shell
+  (SSH) is either unavailable or restricted for users due to security reasons.
+  As a result, hosts in these systems cannot be used for non MPI applications
+  such as network emulators or testbeds which rely on SSH to establish
+  connections among the hosts.  MSH aims to solve this problem by
   providing an alternative remote shell which can be used by these applications
-  instead of \texttt{ssh}.
+  instead of SSH.
 \end{abstract}
 
+
+\section{Introduction}
+Large scale network experimentation of distributed systems is achieved by
+distributing the experiment across multiple physical nodes~\cite{dpeersim, 
wids,
+  netlab, cset2011evans, totakura2013ms}.  These tools coordinate the 
experiment
+among the hosts by establishing SSH connections to run remote commands on the
+available hosts.
+
+A limiting factor in scaling network experiments in the availability of
+computing power and underlying network.  This requirement for resources can be
+addressed by running network experiments on High Performance Computing (HPC)
+systems which are made up of many hosts interconnected with a high speed and
+high bandwidth network.
+
+The usage of HPC systems poses some new challenges: since HPC systems are used
+by multiple users simultaneously, they allocate exclusive resources 
dynamically.
+The user has to determine these dynamically allocated resources before starting
+the experiment on these resources.  The \textit{de-facto} standard for remote
+command execution, SSH, is increasingly made unavailable or restricted on HPC
+systems~\cite{supermuc} to prevent users from accessing resources which are not
+allocated to them.  While such restriction does not effect the intended usage 
of
+HPC systems which is to run parallel programs with Message Passing Interface
+(MPI) for communications, it presents users to use network experimentation 
tools
+which rely on remote command execution.
+
+To overcome these challenges we propose, MSH, a new remote command execution
+system which uses MPI for determining node allocation and addressing.  Our aims
+are: to provide MSH as a substitute for SSH for remote command execution; to
+make MSH behave similar to SSH such that the network experimentation tools do
+not have to be heavily modified; to determine the dynamically allocated
+resources on the HPC system and, finally, to be able to run network experiments
+on HPC systems.
+
 \section{Architecture}
 
 MSH consists of two components: the \texttt{mshd} daemon and the \texttt{msh}
@@ -93,23 +126,23 @@
   from \texttt{msh} and \texttt{mshd} to each other respectively.
 \end{enumerate}
 
-\section{Addressing}
+\section{Resource Discovery and Addressing}
 \label{sec:addressing}
 
-While using \texttt{msh} remote hosts are addressed with their IP addresses.
-However, as the real communication is done through MPI, a mapping between the 
IP
-addresses of all the hosts where the instances run and the instances' MPI ids
-has to be determined.  This mapping is given to the application as a file from
-which the application can refer by IP address the host for executing a remote
-command.
+One of our aims is to determine the resources which are dynamically allocated 
to
+us and provide their details to the experimentation tools.  Since we intend to
+use MSH as a substitute for SSH, we provide the resources' IP addresses so that
+the tools can refer to these resources by IP addresses.
 
-The mapping is determined by having each instance verify the IP addresses of 
all
-instances running on the allocated hosts.  The verification proceeds in rounds
-where each instance verifies IP addresses of several instances.  At the
-beginning of each round, every instance opens a socket bound to a random port
-and all available IP addresses on its host and sends the IP addresses to the
-instances for verification.  The set of instances $n$ to be contacted is
-determined by the current round $r$ and the round width $R$ such that 
+The mapping between the allocated hosts and their IP addresses is determined by
+having each \texttt{mshd} instance verify the IP addresses of all other
+\texttt{mshd} instances running on the allocated hosts.  The verification
+proceeds in rounds where each instance verifies IP addresses of several
+instances.  At the beginning of each round, every instance opens a socket bound
+to a random port and all available IP addresses on its host and sends the IP
+addresses to the instances for verification.  The set of instances $n$ to be
+contacted is determined by the current round $r$ and the round width $R$ such
+that
 \begin{center}
   $ n = \{i\in I | (r.R + 1) \le i \le (r.R + r)\} $
 \end{center}
@@ -131,5 +164,14 @@
 tree reduction).  The reduction is made by intersecting the reported IP
 addresses for an instance.
 
+\section{Limitations}
+MSH does not have terminal handling capabilities.  This means that applications
+such as \texttt{screen}, \texttt{less}, \texttt{vim} which require terminal
+(\texttt{tty}) support do not work through MSH.  This also means that there is
+no support for sending control character sequences such as \texttt{Control+C} 
to
+the remote command.
 
+\bibliographystyle{plain}
+\bibliography{related_work}
+
 \end{document}

Added: msh/doc/related_work.bib
===================================================================
--- msh/doc/related_work.bib                            (rev 0)
+++ msh/doc/related_work.bib    2013-08-23 12:25:37 UTC (rev 28811)
@@ -0,0 +1,1447 @@
address@hidden {totakura2013ms,
+       title = {Large Scale Distributed Evaluation of Peer-to-Peer Protocols},
+       volume = {Master of Science},
+       year = {2013},
+       month = {06/2013},
+       pages = {76},
+       school = {Technische Universit\"at M\"unchen},
+       type = {Masters },
+       address = {Garching bei M\"unchen},
+       abstract = {Evaluations of P2P protocols during the 
system{\textquoteright}s design and implementation phases are commonly done 
through simulation and emulation respectively.  While the current 
state-of-the-art simulation allows evaluations with many millions of peers 
through the use of abstractions, emulation still lags behind as it involves 
executing the real implementation at some parts of the system.  This difference 
in scales can make it hard to relate the evaluations made created with 
simulation and emulation during the design and implementation phases and can 
results in a limited evaluation of the implementation, which may cause severe 
problems after deployment.
+
+In this thesis, we build upon an existing emulator for P2P applications to 
push the scales offered by emulation towards the limits set by simulation.  Our 
approach distributes and co-ordinates the emulation across many hosts.  Large 
deployments are possible by deploying hundreds or thousands of peers on each 
host.
+
+To address the varying needs of an experimenter and the range of available 
hardware, we make our approach scalable such that it can easily be adapted to 
run evaluations on a single machine or a large group of hosts.  Specifically, 
the system automatically adjusts the number of overlapping operations to the 
available resources efficiently using a feedback mechanism, thus relieving the 
experimenter from the hassles of manual tuning.
+
+We specifically target HPC systems like compute clusters and supercomputers 
and demonstrate how such systems can be used for large scale emulations by 
evaluating two P2P applications with deployment sizes up to 90k peers on a 
supercomputer.},
+       keywords = {emulation, GNUnet, large scale testing, protocol 
evaluation, testbed},
+       author = {Totakura, Sree Harsha}
+}
+
address@hidden:conf/tridentcom/AlbrechtH10,
+  author = {Jeannie R. Albrecht and Danny Yuxing Huang},
+  title = {Managing Distributed Applications Using Gush},
+  booktitle = {TRIDENTCOM},
+  year = {2010},
+  pages = {401-411},
+  bibsource = {DBLP, http://dblp.uni-trier.de},
+  crossref = {DBLP:conf/tridentcom/2010},
+  ee = {http://dx.doi.org/10.1007/978-3-642-17851-1_31},
+  file = {:gush.pdf:PDF}
+}
+
address@hidden:conf/acsac/EvansGG07,
+  author = {Nathan S. Evans and Chris GauthierDickey and Christian Grothoff},
+  title = {Routing in the Dark: Pitch Black},
+  booktitle = {ACSAC},
+  year = {2007},
+  pages = {305-314},
+  bibsource = {DBLP, http://dblp.uni-trier.de},
+  crossref = {DBLP:conf/acsac/2007},
+  ee = {http://doi.ieeecomputersociety.org/10.1109/ACSAC.2007.36},
+  file = {:RoutingintheDark.pdf:PDF}
+}
+
address@hidden:conf/tridentcom/HermenierR12,
+  author = {Fabien Hermenier and Robert Ricci},
+  title = {How to Build a Better Testbed: Lessons from a Decade of Network 
Experiments
+       on Emulab},
+  booktitle = {TRIDENTCOM},
+  year = {2012},
+  pages = {287-304},
+  bibsource = {DBLP, http://dblp.uni-trier.de},
+  crossref = {DBLP:conf/tridentcom/2012},
+  ee = {http://dx.doi.org/10.1007/978-3-642-35576-9_24},
+  file = {:how-to-build-a-better-testbed.pdf:PDF}
+}
+
address@hidden,
+  author = {Mike Hibler and Robert Ricci and Leigh Stoller and Jonathon Duerig
+       and Shashi Guruprasad and Tim Stack and Kirk Webb and Jay Lepreau},
+  title = {Large-scale Virtualization in the Emulab Network Testbed},
+  booktitle = {USENIX Annual Technical Conference},
+  year = {2008},
+  pages = {113-128},
+  bibsource = {DBLP, http://dblp.uni-trier.de},
+  crossref = {DBLP:conf/usenix/2008},
+  ee = 
{http://www.usenix.org/events/usenix08/tech/fullpapers/hibler/hibler.pdf},
+  file = {:emulab_virtualisation.pdf:PDF}
+}
+
address@hidden:conf/tridentcom/NguyenRKFMB10,
+  author = {Hung X. Nguyen and Matthew Roughan and Simon Knight and Nick 
Falkner
+       and Olaf Maennel and Randy Bush},
+  title = {How to Build Complex, Large-Scale Emulated Networks},
+  booktitle = {TRIDENTCOM},
+  year = {2010},
+  pages = {3-18},
+  bibsource = {DBLP, http://dblp.uni-trier.de},
+  crossref = {DBLP:conf/tridentcom/2010},
+  ee = {http://dx.doi.org/10.1007/978-3-642-17851-1_1},
+  file = {:AutoNetkit.pdf:PDF}
+}
+
address@hidden:conf/tridentcom/PeralaPML10,
+  author = {Pekka H. J. Per{\"a}l{\"a} and Jori P. Paananen and Milton 
Mukhopadhyay
+       and Jukka-Pekka Laulajainen},
+  title = {A Novel Testbed for P2P Networks},
+  booktitle = {TRIDENTCOM},
+  year = {2010},
+  pages = {69-83},
+  bibsource = {DBLP, http://dblp.uni-trier.de},
+  crossref = {DBLP:conf/tridentcom/2010},
+  ee = {http://dx.doi.org/10.1007/978-3-642-17851-1_5},
+  file = {:A Novel Testbed for P2P Networks.pdf:PDF}
+}
+
address@hidden,
+  author = {Albrecht, J. and Tuttle, C. and Snoeren, A.C. and Vahdat, A.},
+  title = {PlanetLab application management using Plush},
+  journal = {ACM SIGOPS Operating Systems Review},
+  year = {2006},
+  volume = {40},
+  pages = {33--40},
+  number = {1},
+  file = {:plush.pdf:PDF},
+  publisher = {ACM}
+}
+
address@hidden,
+  title = {InfiniBand Architecture Specification: Release 1.0},
+  publisher = {InfiniBand Trade Association},
+  year = {2000},
+  author = {InfiniBand Trade Association}
+}
+
address@hidden,
+  title = {Handbook of simulation},
+  publisher = {Wiley Online Library},
+  year = {1998},
+  author = {Banks, Jerry and others}
+}
+
address@hidden,
+  author = {Barab{\'a}si, Albert-L{\'a}szl{\'o} and Albert, R{\'e}ka},
+  title = {Emergence of scaling in random networks},
+  journal = {science},
+  year = {1999},
+  volume = {286},
+  pages = {509--512},
+  number = {5439},
+  file = {:emergence_of_scaling_in_random_networks.pdf:PDF},
+  publisher = {American Association for the Advancement of Science}
+}
+
address@hidden,
+  author = {Barham, Paul and Dragovic, Boris and Fraser, Keir and Hand, Steven
+       and Harris, Tim and Ho, Alex and Neugebauer, Rolf and Pratt, Ian
+       and Warfield, Andrew},
+  title = {Xen and the art of virtualization},
+  journal = {ACM SIGOPS Operating Systems Review},
+  year = {2003},
+  volume = {37},
+  pages = {164--177},
+  number = {5},
+  publisher = {ACM}
+}
+
address@hidden,
+  author = {Baumgart, I. and Heep, B. and Krause, S.},
+  title = {OverSim: A Flexible Overlay Network Simulation Framework},
+  booktitle = {IEEE Global Internet Symposium, 2007},
+  year = {2007},
+  pages = {79-84},
+  doi = {10.1109/GI.2007.4301435},
+  file = {:OverSim_2007.pdf:PDF},
+  keywords = {graphical user interfaces;peer-to-peer 
computing;protocols;OMNeT++;OverSim;flexible
+       overlay network simulation framework;generic lookup mechanism;overlay
+       protocols;peer-to- peer networks;peer-to-peer protocols;Access 
protocols;Application
+       software;Computational modeling;Costs;Discrete event 
simulation;Java;Next
+       generation networking;Object oriented modeling;Peer to peer 
computing;Testing}
+}
+
address@hidden,
+  author = {Benzel, T. and Braden, R. and Kim, D. and Neuman, C. and Joseph,
+       A. and Sklower, K. and Ostrenga, R. and Schwab, S.},
+  title = {Experience with DETER: a testbed for security research},
+  booktitle = {Testbeds and Research Infrastructures for the Development of 
Networks
+       and Communities, 2006. TRIDENTCOM 2006. 2nd International Conference
+       on},
+  year = {2006},
+  pages = {10 pp.-388},
+  doi = {10.1109/TRIDNT.2006.1649172},
+  issn = {Not Applica},
+  keywords = {security of data;telecommunication security;DETER;malicious 
code;security
+       research;Computer science;Computer security;Data 
security;Hardware;Information
+       security;Internet;Protection;System testing;Telecommunication 
traffic;Traffic
+       control}
+}
+
address@hidden,
+  author = {Bolze, Raphaël and Cappello, Franck and Caron, Eddy and Daydé, 
Michel
+       and Desprez, Frédéric and Jeannot, Emmanuel and Jégou, Yvon and Lanteri,
+       Stephane and Leduc, Julien and Melab, Noredine and Mornet, Guillaume
+       and Namyst, Raymond and Primet, Pascale and Quetier, Benjamin and
+       Richard, Olivier and Talbi, El-Ghazali and Touche, Iréa},
+  title = {Grid'5000: A Large Scale And Highly Reconfigurable Experimental Grid
+       Testbed},
+  journal = {International Journal of High Performance Computing Applications},
+  year = {2006},
+  volume = {20},
+  pages = {481-494},
+  number = {4},
+  abstract = {Large scale distributed systems such as Grids are difficult to 
study
+       from theoretical models and simulators only. Most Grids deployed
+       at large scale are production platforms that are inappropriate research
+       tools because of their limited reconfiguration, control and monitoring
+       capabilities. In this paper, we present Grid'5000, a 5000 CPU 
nation-wide
+       infrastructure for research in Grid computing. Grid'5000 is designed
+       to provide a scientific tool for computer scientists similar to the
+       large-scale instruments used by physicists, astronomers, and biologists.
+       We describe the motivations, design considerations, architecture,
+       control, and monitoring infrastructure of this experimental platform.
+       We present configuration examples and performance results for the
+       reconfiguration subsystem.},
+  doi = {10.1177/1094342006070078},
+  eprint = {http://hpc.sagepub.com/content/20/4/481.full.pdf+html},
+  url = {http://hpc.sagepub.com/content/20/4/481.abstract}
+}
+
address@hidden,
+  author = {Chertov, Roman and Fahmy, Sonia and Shroff, Ness B.},
+  title = {Fidelity of network simulation and emulation: A case study of 
TCP-targeted
+       denial of service attacks},
+  journal = {ACM Trans. Model. Comput. Simul.},
+  year = {2009},
+  volume = {19},
+  pages = {4:1--4:29},
+  number = {1},
+  month = jan,
+  acmid = {1456649},
+  address = {New York, NY, USA},
+  articleno = {4},
+  doi = {10.1145/1456645.1456649},
+  file = {:fidelity_sim_emu.pdf:PDF},
+  issn = {1049-3301},
+  issue_date = {December 2008},
+  keywords = {Simulation, TCP, congestion control, denial of service attacks, 
emulation,
+       low-rate TCP-targeted attacks, testbeds},
+  numpages = {29},
+  publisher = {ACM},
+  url = {http://doi.acm.org/10.1145/1456645.1456649}
+}
+
address@hidden,
+  author = {Chun, Brent and Culler, David and Roscoe, Timothy and Bavier, Andy
+       and Peterson, Larry and Wawrzoniak, Mike and Bowman, Mic},
+  title = {PlanetLab: an overlay testbed for broad-coverage services},
+  journal = {SIGCOMM Comput. Commun. Rev.},
+  year = {2003},
+  volume = {33},
+  pages = {3--12},
+  number = {3},
+  month = jul,
+  acmid = {956995},
+  address = {New York, NY, USA},
+  doi = {10.1145/956993.956995},
+  issn = {0146-4833},
+  issue_date = {July 2003},
+  numpages = {10},
+  publisher = {ACM},
+  url = {http://doi.acm.org/10.1145/956993.956995}
+}
+
address@hidden,
+  author = {Clarke, Ian and Sandberg, Oskar and Wiley, Brandon and Hong, 
TheodoreW.},
+  title = {Freenet: A Distributed Anonymous Information Storage and Retrieval
+       System},
+  booktitle = {Designing Privacy Enhancing Technologies},
+  publisher = {Springer Berlin Heidelberg},
+  year = {2001},
+  editor = {Federrath, Hannes},
+  volume = {2009},
+  series = {Lecture Notes in Computer Science},
+  pages = {46-66},
+  doi = {10.1007/3-540-44702-4_4},
+  file = {:freenet.pdf:PDF},
+  isbn = {978-3-540-41724-8},
+  language = {English},
+  url = {http://dx.doi.org/10.1007/3-540-44702-4_4}
+}
+
address@hidden,
+  author = {Cohen, Bram},
+  title = {The BitTorrent protocol specification},
+  year = {2008},
+  publisher = {BITTORRENT}
+}
+
address@hidden,
+  author = {Dagum, L. and Menon, R.},
+  title = {OpenMP: an industry standard API for shared-memory programming},
+  journal = {Computational Science Engineering, IEEE},
+  year = {1998},
+  volume = {5},
+  pages = {46-55},
+  number = {1},
+  doi = {10.1109/99.660313},
+  issn = {1070-9924},
+  keywords = {application program interfaces;parallel programming;shared memory
+       systems;software portability;software reviews;software 
standards;Fortran;Fortran
+       90;Fortran 95;Fortran compiler;OpenMP;X3H5 
concepts;allocatables;callable
+       runtime library;callable runtime library routines;coarse grain 
parallelism;compiler
+       directives;environment variables;industry standard API;pointers;shared
+       memory parallelism;shared memory programming;ANSI 
standards;Coherence;Computer
+       architecture;Hardware;Message passing;Parallel processing;Parallel
+       programming;Power system modeling;Scalability;Software systems}
+}
+
address@hidden,
+  author = {Dingledine, R and Mathewson, N and Syverson, P},
+  title = {TOR: the onion router. Tor Project/EFF},
+  howpublished = {\url{https://www.torproject.org/}}
+}
+
address@hidden,
+  author = {Tien Tuan Anh Dinh and Lees, M. and Theodoropoulos, G. and Minson,
+       R.},
+  title = {Large Scale Distributed Simulation of p2p Networks},
+  booktitle = {Parallel, Distributed and Network-Based Processing, 2008. PDP 
2008.
+       16th Euromicro Conference on},
+  year = {2008},
+  pages = {499-507},
+  doi = {10.1109/PDP.2008.67},
+  file = {:dpeersim.pdf:PDF},
+  keywords = {discrete event simulation;peer-to-peer computing;Chord p2p 
protocol;PeerSim;large
+       scale distributed simulation;p2p networks;parallel discrete event
+       simulation techniques;Algorithm design and analysis;Analytical 
models;Computational
+       modeling;Discrete event simulation;Large-scale systems;Network 
servers;Peer
+       to peer computing;Protocols;Robustness;Scalability;Distributed;Large
+       Scale;Parallel;Simulation}
+}
+
address@hidden:2007:ESL:1272980.1272986,
+  author = {Eger, Kolja and Ho\ssfeld, Tobias and Binzenh\"{o}fer, Andreas and
+       Kunzmann, Gerald},
+  title = {Efficient simulation of large-scale p2p networks: packet-level vs.
+       flow-level simulations},
+  booktitle = {Proceedings of the second workshop on Use of P2P, GRID and 
agents
+       for the development of content networks},
+  year = {2007},
+  series = {UPGRADE '07},
+  pages = {9--16},
+  address = {New York, NY, USA},
+  publisher = {ACM},
+  acmid = {1272986},
+  doi = {10.1145/1272980.1272986},
+  file = {:p2p_sim_flow_level_vs_packet_level.pdf:PDF},
+  isbn = {978-1-59593-718-6},
+  keywords = {BitTorrent, content distribution, peer-to-peer, simulation},
+  location = {Monterey, California, USA},
+  numpages = {8},
+  url = {http://doi.acm.org/10.1145/1272980.1272986}
+}
+
address@hidden,
+  author = {Erdos, Paul and R{\'e}nyi, Alfr{\'e}d},
+  title = {On the evolution of random graphs},
+  journal = {Bull. Inst. Internat. Statist},
+  year = {1961},
+  volume = {38},
+  pages = {343--347},
+  number = {4}
+}
+
address@hidden:2003:LPB:945506.945507,
+  author = {Eugster, P. Th. and Guerraoui, R. and Handurukande, S. B. and 
Kouznetsov,
+       P. and Kermarrec, A.-M.},
+  title = {Lightweight probabilistic broadcast},
+  journal = {ACM Trans. Comput. Syst.},
+  year = {2003},
+  volume = {21},
+  pages = {341--374},
+  number = {4},
+  month = nov,
+  acmid = {945507},
+  address = {New York, NY, USA},
+  doi = {10.1145/945506.945507},
+  issn = {0734-2071},
+  issue_date = {November 2003},
+  keywords = {Broadcast, buffering, garbage collection, gossip, noise, 
randomization,
+       reliability, scalability},
+  numpages = {34},
+  publisher = {ACM},
+  url = {http://doi.acm.org/10.1145/945506.945507}
+}
+
address@hidden,
+  author = {Evans, N.S. and Grothoff, C.},
+  title = {R5n: Randomized recursive routing for restricted-route networks},
+  booktitle = {Network and System Security (NSS), 2011 5th International 
Conference
+       on},
+  year = {2011},
+  pages = {316--321},
+  organization = {IEEE},
+  file = {:r5n.pdf:PDF}
+}
+
address@hidden,
+  author = {Evans, Nathan and Polot, Bartlomiej and Grothoff, Christian},
+  title = {Efficient and secure decentralized network size estimation},
+  booktitle = {NETWORKING 2012},
+  publisher = {Springer},
+  year = {2012},
+  pages = {304--317}
+}
+
address@hidden,
+  author = {Nathan S. Evans},
+  title = {Methods for Secure Decentralized Routing in Open Networks},
+  school = {Technische Universit{\"a}t M{\"u}nchen},
+  year = {2011},
+  address = {Garching bei M{\"u}nchen},
+  month = {08/2011},
+  abstract = { The contribution of this thesis is the study and improvement of 
secure,
+       decentralized, robust routing algorithms for open networks including
+       ad-hoc networks and peer-to-peer (P2P) overlay networks. The main
+       goals for our secure routing algorithm are openness, efficiency,
+       scalability and resilience to various types of attacks. Common P2P
+       routing algorithms trade-off decentralization for security; for instance
+       by choosing whether or not to require a centralized authority to
+       allow peers to join the network. Other algorithms trade scalability
+       for security, for example employing random search or flooding to
+       prevent certain types of attacks. Our design attempts to meet our
+       security goals in an open system, while limiting the performance
+       penalties incurred.
+       
+        The first step we took towards designing our routing algorithm was
+       an analysis of the routing algorithm in Freenet. This algorithm is
+       relevant because it achieves efficient (order O(log n)) routing in
+       realistic network topologies in a fully decentralized open network.
+       However, we demonstrate why their algorithm is not secure, as malicious
+       participants are able to severely disrupt the operation of the network.
+       The main difficulty with the Freenet routing algorithm is that for
+       performance it relies on information received from untrusted peers.
+       We also detail a range of proposed solutions, none of which we found
+       to fully fix the problem.
+       
+        A related problem for efficient routing in sparsely connected networks
+       is the difficulty in sufficiently populating routing tables. One
+       way to improve connectivity in P2P overlay networks is by utilizing
+       modern NAT traversal techniques. We employ a number of standard NAT
+       traversal techniques in our approach, and also developed and 
experimented
+       with a novel method for NAT traversal based on ICMP and UDP hole
+       punching. Unlike other NAT traversal techniques ours does not require
+       a trusted third party.
+       
+       Another technique we use in our implementation to help address the
+       connectivity problem in sparse networks is the use of distance vector
+       routing in a small local neighborhood. The distance vector variant
+       used in our system employs onion routing to secure the resulting
+       indirect connections. Materially to this design, we discovered a
+       serious vulnerability in the Tor protocol which allowed us to use
+       a DoS attack to reduce the anonymity of the users of this extant
+       anonymizing P2P network. This vulnerability is based on allowing
+       paths of unrestricted length for onion routes through the network.
+       Analyzing Tor and implementing this attack gave us valuable knowledge
+       which helped when designing the distance vector routing protocol
+       for our system.
+       
+        Finally, we present the design of our new secure randomized routing
+       algorithm that does not suffer from the various problems we discovered
+       in previous designs. Goals for the algorithm include providing 
efficiency
+       and robustness in the presence of malicious participants for an open,
+       fully decentralized network without trusted authorities. We provide
+       a mathematical analysis of the algorithm itself and have created
+       and deployed an implementation of this algorithm in GNUnet. In this
+       thesis we also provide a detailed overview of a distributed emulation
+       framework capable of running a large number of nodes using our full
+       code base as well as some of the challenges encountered in creating
+       and using such a testing framework. We present extensive experimental
+       results showing that our routing algorithm outperforms the dominant
+       DHT design in target topologies, and performs comparably in other
+       scenarios.},
+  attachments = {https://gnunet.org/sites/default/files/NET-2011-08-1.pdf},
+  file = {:NET-2011-08-1.pdf:PDF},
+  isbn = {3-937201-26-2},
+  issn = {1868-2642},
+  keywords = {DHT, Freenet, GNUnet, NAT, R5N, Tor},
+  pages = {234},
+  volume = {Dr. rer. nat.}
+}
+
address@hidden,
+  author = {Nathan S. Evans and Christian Grothoff},
+  title = {Beyond Simulation: Large-Scale Distributed Emulation of P2P 
Protocols},
+  booktitle = {4th Workshop on Cyber Security Experimentation and Test (CSET 
2011)},
+  year = {2011},
+  address = {San Francisco, California},
+  organization = {USENIX Association},
+  publisher = {USENIX Association},
+  abstract = {This paper presents details on the design and implementation of a
+       scalable framework for evaluating peer-to-peer protocols. Unlike
+       systems based on simulation, emulation-based systems enable the 
experimenter
+       to obtain data that reflects directly on the concrete implementation
+       in much greater detail. This paper argues that emulation is a better
+       model for experiments with peer-to-peer protocols since it can provide
+       scalability and high flexibility while eliminating the cost of moving
+       from experimentation to deployment. We discuss our unique experience
+       with large-scale emulation using the GNUnet peer-to-peer framework
+       and provide experimental results to support these claims. },
+  file = {:cset2011.pdf:PDF},
+  keywords = {DHT, emulation, GNUnet, scalability, security analysis}
+}
+
address@hidden,
+  author = {Nathan S. Evans and Polot, Bartlomiej and Christian Grothoff},
+  title = {Efficient and Secure Decentralized Network Size Estimation, Tech
+       Report},
+  year = {2012},
+  month = {05/2012},
+  abstract = {The size of a Peer-to-Peer (P2P) network is an important 
parameter
+       for performance tuning of P2P routing algorithms. This paper introduces
+       and evaluates a new efficient method for participants in an unstructured
+       P2P network to establish the size of the overall network. The presented
+       method is highly efficient, propagating information about the current
+       size of the network to all participants using O(|E|) operations where
+       |E| is the number of edges in the network. Afterwards, all nodes
+       have the same network size estimate, which can be made arbitrarily
+       accurate by averaging results from multiple rounds of the protocol.
+       Security measures are included which make it prohibitively expensive
+       for a typical active participating adversary to significantly manipulate
+       the estimates. This paper includes experimental results that demonstrate
+       the viability, efficiency and accuracy of the protocol.},
+  address = {Garching bei Muenchen},
+  attachments = {https://gnunet.org/sites/default/files/nse-techreport.pdf},
+  file = {:nse2012.pdf:PDF},
+  institution = {Technische Universitaet Muenchen},
+  keywords = {GNUnet, network security, network size estimation, peer-to-peer 
networking}
+}
+
address@hidden,
+  author = {Fall, Kevin and Varadhan, Kannan},
+  title = {The network simulator (ns-2)},
+  journal = {URL: http://www. isi. edu/nsnam/ns},
+  year = {2007}
+}
+
address@hidden,
+  author = {Freire, ClaudioDaniel and Quereilhac, Alina and Turletti, Thierry
+       and Dabbous, Walid},
+  title = {Automated Deployment and Customization of Routing Overlays on 
Planetlab},
+  booktitle = {Testbeds and Research Infrastructure. Development of Networks 
and
+       Communities},
+  publisher = {Springer Berlin Heidelberg},
+  year = {2012},
+  editor = {Korakis, Thanasis and Zink, Michael and Ott, Maximilian},
+  volume = {44},
+  series = {Lecture Notes of the Institute for Computer Sciences, Social 
Informatics
+       and Telecommunications Engineering},
+  pages = {240-255},
+  doi = {10.1007/978-3-642-35576-9_21},
+  isbn = {978-3-642-35575-2},
+  keywords = {networking; overlays; PlanetLab; NEPI},
+  url = {http://dx.doi.org/10.1007/978-3-642-35576-9_21}
+}
+
address@hidden,
+  author = {Zihui Ge and Figueiredo, D.R. and Jaiswal, S. and Kurose, J. and
+       Towsley, D.},
+  title = {Modeling peer-peer file sharing systems},
+  booktitle = {INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE 
Computer
+       and Communications. IEEE Societies},
+  year = {2003},
+  volume = {3},
+  pages = {2188-2198 vol.3},
+  doi = {10.1109/INFCOM.2003.1209239},
+  file = {:modelling_p2p_file_sharing.pdf:PDF},
+  issn = {0743-166X},
+  keywords = {Internet;distributed processing;file organisation;query 
processing;centralized
+       indexing;distributed indexing;distributed network applications;file
+       sharing systems;flooded queries;freeloaders;hashing directed 
queries;mathematical
+       models;peer-peer network;performance degradation;spare capacity;system
+       throughput;Application software;Availability;Computer 
science;Degradation;Indexing;Mathematical
+       model;Network servers;Peer to peer computing;System 
performance;Throughput}
+}
+
address@hidden,
+  author = {Thomas J. Giuli and Mary Baker},
+  title = {Narses: A Scalable Flow-Based Network Simulator},
+  journal = {CoRR},
+  year = {2002},
+  volume = {cs.PF/0211024},
+  bibsource = {DBLP, http://dblp.uni-trier.de},
+  ee = {http://arxiv.org/abs/cs.PF/0211024},
+  file = {:Narses_a_scalable_flow_based_network_simulator.pdf:PDF}
+}
+
address@hidden,
+  title = {Using MPI-: Portable Parallel Programming with the Message Passing
+       Interface},
+  publisher = {MIT press},
+  year = {1999},
+  author = {Gropp, William and Lusk, Ewing L and Skjellum, Anthony},
+  volume = {1}
+}
+
address@hidden,
+  author = {Gupta, Diwaker and Vishwanath, Kashi Venkatesh and McNett, Marvin
+       and Vahdat, Amin and Yocum, Ken and Snoeren, Alex and Voelker, Geoffrey
+       M.},
+  title = {DieCast: Testing Distributed Systems with an Accurate Scale Model},
+  journal = {ACM Trans. Comput. Syst.},
+  year = {2011},
+  volume = {29},
+  pages = {4:1--4:48},
+  number = {2},
+  month = may,
+  acmid = {1963560},
+  address = {New York, NY, USA},
+  articleno = {4},
+  doi = {10.1145/1963559.1963560},
+  file = {:diecast.pdf:PDF},
+  issn = {0734-2071},
+  issue_date = {May 2011},
+  keywords = {Virtualization, Xen, network emulation},
+  numpages = {48},
+  publisher = {ACM},
+  url = 
{http://static.usenix.org/event/nsdi08/tech/full_papers/gupta/gupta_html/}
+}
+
address@hidden,
+  author = {Gupta, Diwaker and Yocum, Kenneth and McNett, Marvin and Snoeren,
+       Alex C. and Vahdat, Amin and Voelker, Geoffrey M.},
+  title = {To infinity and beyond: time warped network emulation},
+  booktitle = {Proceedings of the twentieth ACM symposium on Operating systems 
principles},
+  year = {2005},
+  series = {SOSP '05},
+  pages = {1--2},
+  address = {New York, NY, USA},
+  publisher = {ACM},
+  acmid = {1118605},
+  doi = {10.1145/1095810.1118605},
+  file = {:emulation_timewrap.pdf:PDF},
+  isbn = {1-59593-079-5},
+  location = {Brighton, United Kingdom},
+  numpages = {2},
+  url = {http://doi.acm.org/10.1145/1095810.1118605}
+}
+
address@hidden,
+  author = {Gupta, Indranil and Birman, Ken and Linga, Prakash and Demers, Al
+       and Van Renesse, Robbert},
+  title = {Kelips: Building an efficient and stable P2P DHT through increased
+       memory and background overhead},
+  booktitle = {Peer-to-Peer Systems II},
+  publisher = {Springer},
+  year = {2003},
+  pages = {160--169},
+  file = {:kelips.pdf:PDF}
+}
+
address@hidden,
+  author = {Gupta, Rajiv},
+  title = {The fuzzy barrier: a mechanism for high speed synchronization of
+       processors},
+  booktitle = {ACM SIGARCH Computer Architecture News},
+  year = {1989},
+  volume = {17},
+  number = {2},
+  pages = {54--63},
+  organization = {ACM}
+}
+
address@hidden,
+  author = {Handigol, N. and Heller, B. and Jeyakumar, V. and Lantz, B. and 
McKeown,
+       N.},
+  title = {Reproducible network experiments using container based emulation},
+  journal = {Proc. CoNEXT},
+  year = {2012},
+  __markedentry = {[harsha:1]},
+  file = {:mininet-hifi.pdf:PDF}
+}
+
address@hidden,
+  author = {Qi He and Ammar, M. and Riley, G. and Raj, H. and Fujimoto, R.},
+  title = {Mapping peer behavior to packet-level details: a framework for 
packet-level
+       simulation of peer-to-peer systems},
+  booktitle = {Modeling, Analysis and Simulation of Computer Telecommunications
+       Systems, 2003. MASCOTS 2003. 11th IEEE/ACM International Symposium
+       on},
+  year = {2003},
+  pages = {71-78},
+  doi = {10.1109/MASCOT.2003.1240644},
+  file = {:p2p_sim_framework.pdf:PDF},
+  issn = {1526-7539},
+  keywords = {discrete event simulation;parallel processing;performance 
evaluation;transport
+       protocols;Gnutella protocol;Gnutella system performance;discrete-event
+       simulation;network simulator;packet-level simulation;parallelization
+       techniques;peer-to-peer system;underlying network 
characteristic;Computational
+       modeling;Network servers;Network topology;Peer to peer 
computing;Proposals;Protocols;Telecommunication
+       computing;Telecommunication traffic;Throughput;Traffic control}
+}
+
address@hidden,
+  author = {Herrmann, Michael and Grothoff, Christian},
+  title = {Privacy-Implications of Performance-Based Peer Selection by 
Onion-Routers:
+       A Real-World Case Study Using I2P},
+  booktitle = {Privacy Enhancing Technologies},
+  publisher = {Springer Berlin Heidelberg},
+  year = {2011},
+  editor = {Fischer-Hübner, Simone and Hopper, Nicholas},
+  volume = {6794},
+  series = {Lecture Notes in Computer Science},
+  pages = {155-174},
+  doi = {10.1007/978-3-642-22263-4_9},
+  isbn = {978-3-642-22262-7},
+  url = {http://dx.doi.org/10.1007/978-3-642-22263-4_9}
+}
+
address@hidden,
+  author = {Isdal, Tomas and Piatek, Michael and Krishnamurthy, Arvind and 
Anderson,
+       Thomas},
+  title = {Privacy-preserving P2P data sharing with OneSwarm},
+  booktitle = {ACM SIGCOMM Computer Communication Review},
+  year = {2010},
+  volume = {40},
+  number = {4},
+  pages = {111--122},
+  organization = {ACM},
+  file = {:oneswarm.pdf:PDF}
+}
+
address@hidden,
+  author = {Jansen, Rob and Hooper, Nicholas},
+  title = {Shadow: Running Tor in a box for accurate and efficient 
experimentation},
+  institution = {DTIC Document},
+  year = {2011}
+}
+
address@hidden,
+  author = {Kangasharju, Jussi and Schmidt, Uwe and Bradler, Dirk and 
Schr\"{o}der-Bernhardi,
+       Julian},
+  title = {ChunkSim: simulating peer-to-peer content distribution},
+  booktitle = {Proceedings of the 2007 spring simulaiton multiconference - 
Volume
+       1},
+  year = {2007},
+  series = {SpringSim '07},
+  pages = {25--32},
+  address = {San Diego, CA, USA},
+  publisher = {Society for Computer Simulation International},
+  acmid = {1404599},
+  file = {:chunksim.pdf:PDF},
+  isbn = {1-56555-312-8},
+  keywords = {BitTorrent, content distribution, peer-to-peer},
+  location = {Norfolk, Virginia},
+  numpages = {8},
+  url = {http://dl.acm.org/citation.cfm?id=1404595.1404599}
+}
+
address@hidden,
+  author = {Kashyap, Vivek},
+  title = {IP over InfiniBand (IPoIB) Architecture},
+  year = {2006},
+  howpublished = {\url{https://tools.ietf.org/html/rfc4392}}
+}
+
address@hidden,
+  author = {Knight, Simon and Jaboldinov, Askar and Maennel, Olaf and Phillips,
+       Iain and Roughan, Matthew},
+  title = {AutoNetkit: simplifying large scale, open-source network 
experimentation},
+  journal = {SIGCOMM Comput. Commun. Rev.},
+  year = {2012},
+  volume = {42},
+  pages = {97--98},
+  number = {4},
+  month = aug,
+  acmid = {2377699},
+  address = {New York, NY, USA},
+  doi = {10.1145/2377677.2377699},
+  file = {:autonetkit-small.pdf:PDF},
+  issn = {0146-4833},
+  issue_date = {October 2012},
+  keywords = {automated configuration, emulation, network management},
+  numpages = {2},
+  publisher = {ACM},
+  url = {http://doi.acm.org/10.1145/2377677.2377699}
+}
+
address@hidden,
+  author = {Kostoulas, D. and Psaltoulis, D. and Gupta, I. and Birman, K. and
+       Al Demers},
+  title = {Decentralized Schemes for Size Estimation in Large and Dynamic 
Groups},
+  booktitle = {Network Computing and Applications, Fourth IEEE International 
Symposium
+       on},
+  year = {2005},
+  pages = {41-48},
+  doi = {10.1109/NCA.2005.15},
+  keywords = {grid computing;peer-to-peer computing;decentralized 
algorithm;distributed
+       system;dynamic group;grid system;group size estimation;large-scale
+       group;nonfaulty process;peer-to-peer system;probabilistic 
accuracy;scalable
+       per-process overhead;statistic collection problem;Algorithm design
+       and analysis;Computer science;Delay estimation;Global 
communication;Large-scale
+       systems;Multicast algorithms;Peer to peer 
computing;Protocols;Routing;Statistical
+       distributions}
+}
+
address@hidden,
+  author = {Kotilainen, N. and Vapa, M. and Keltanen, T. and Auvinen, A. and
+       Vuori, J.},
+  title = {P2PRealm - peer-to-peer network simulator},
+  booktitle = {Computer-Aided Modeling, Analysis and Design of Communication 
Links
+       and Networks, 2006 11th International Workshop on},
+  year = {2006},
+  pages = {93-99},
+  doi = {10.1109/CAMAD.2006.1649724},
+  file = {:p2prealm.pdf:PDF},
+  keywords = {Java;neural nets;peer-to-peer computing;Java native 
interface;P2PRealm;P2PStudio
+       network visualization tool;neural networks;peer-to-peer network 
simulator;Computational
+       modeling;Crawlers;Data structures;Information 
technology;Monitoring;Neural
+       networks;Peer to peer computing;Protocols;Visualization;Workstations}
+}
+
address@hidden,
+  author = {Lantz, Bob and Heller, Brandon and McKeown, Nick},
+  title = {A network in a laptop: rapid prototyping for software-defined 
networks},
+  booktitle = {Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in 
Networks},
+  year = {2010},
+  series = {Hotnets-IX},
+  pages = {19:1--19:6},
+  address = {New York, NY, USA},
+  publisher = {ACM},
+  acmid = {1868466},
+  articleno = {19},
+  doi = {10.1145/1868447.1868466},
+  file = {:mininet.pdf:PDF},
+  isbn = {978-1-4503-0409-2},
+  keywords = {emulation, open-flow, rapid prototyping, software defined 
networking,
+       virtualization},
+  location = {Monterey, California},
+  numpages = {6},
+  url = {http://doi.acm.org/10.1145/1868447.1868466}
+}
+
address@hidden,
+  author = {Leber, Mike},
+  title = {Global IPv6 Deployment Progress Report},
+  journal = {Hurricane Electric,[Online]},
+  year = {2009},
+  howpublished = {\url{http://bgp.he.net/ipv6-progress-report.cgi}}
+}
+
address@hidden,
+  author = {Leiserson, C.E.},
+  title = {Fat-trees: Universal networks for hardware-efficient 
supercomputing},
+  journal = {Computers, IEEE Transactions on},
+  year = {1985},
+  volume = {C-34},
+  pages = {892-901},
+  number = {10},
+  doi = {10.1109/TC.1985.6312192},
+  issn = {0018-9340},
+  keywords = {computer networks;finite element analysis;parallel 
processing;trees
+       (mathematics);fat trees;finite-element analysis;general-purpose parallel
+       supercomputer;hardware size;hardware-efficient 
supercomputing;simultaneous
+       communication;three-dimensional VLSI model;universal 
networks;universality
+       theorem;Channel capacity;Hardware;Program 
processors;Routing;Switches;Wires;Fat-trees;VLSI
+       theory;interconnection networks;parallel supercomputing;routing 
networks;universality}
+}
+
address@hidden,
+  author = {Jinyang Li and Stribling, J. and Morris, R. and Kaashoek, M.F. and
+       Gil, T.M.},
+  title = {A performance vs. cost framework for evaluating DHT design tradeoffs
+       under churn},
+  booktitle = {INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer 
and
+       Communications Societies. Proceedings IEEE},
+  year = {2005},
+  volume = {1},
+  pages = {225-236 vol. 1},
+  doi = {10.1109/INFCOM.2005.1497894},
+  file = {:p2psim_structured_DHT.pdf:PDF},
+  issn = {0743-166X},
+  keywords = {bandwidth allocation;file organisation;maintenance 
engineering;routing
+       protocols;table lookup;telecommunication traffic;distributed hash
+       tables;lookup traffic;maintenance traffic;network bandwidth;performance
+       versus cost framework;proactive flooding;routing protocols;routing
+       table stabilization;stabilization protocols;Artificial 
intelligence;Bandwidth;Computer
+       science;Costs;Delay;Floods;Gas insulated transmission 
lines;Laboratories;Routing
+       protocols;Telecommunication traffic}
+}
+
address@hidden,
+  author = {Shiding Lin and Aimin Pan and Rui Guo and Zheng Zhang},
+  title = {Simulating large-scale P2P systems with the WiDS toolkit},
+  booktitle = {Modeling, Analysis, and Simulation of Computer and 
Telecommunication
+       Systems, 2005. 13th IEEE International Symposium on},
+  year = {2005},
+  pages = {415-424},
+  doi = {10.1109/MASCOTS.2005.63},
+  file = {:p2p_simulation_with_wids_toolkit.pdf:PDF},
+  issn = {1526-7539},
+  keywords = {large-scale systems;logic simulation;peer-to-peer 
computing;protocols;relaxation
+       theory;workstation clusters;SMR;WiDS toolkit;commodity PC 
cluster;critical
+       optimization;distributed protocol;large-scale P2P system;logical
+       time window;lookahead scheme;simulation engine;slow message 
relaxation;trade
+       simulation accuracy;Debugging;Discrete event 
simulation;Engines;Large-scale
+       systems;Libraries;Logic testing;Production;Protocols;Runtime;Switches}
+}
+
address@hidden,
+  author = {Makris, Nikos and Keranidis, Stratos and Giatsios, Dimitris and 
Korakis,
+       Thanasis and Koutsopoulos, Iordanis and Tassiulas, Leandros and 
Rakotoarivelo,
+       Thierry and Parmentelat, Thierry},
+  title = {Cross-Testbed Experimentation Using the Planetlab-NITOS Federation},
+  booktitle = {Testbeds and Research Infrastructure. Development of Networks 
and
+       Communities},
+  publisher = {Springer Berlin Heidelberg},
+  year = {2012},
+  editor = {Korakis, Thanasis and Zink, Michael and Ott, Maximilian},
+  volume = {44},
+  series = {Lecture Notes of the Institute for Computer Sciences, Social 
Informatics
+       and Telecommunications Engineering},
+  pages = {373-376},
+  doi = {10.1007/978-3-642-35576-9_34},
+  isbn = {978-3-642-35575-2},
+  url = {http://dx.doi.org/10.1007/978-3-642-35576-9_34}
+}
+
address@hidden,
+  author = {Manku, Gurmeet Singh and Bawa, Mayank and Raghavan, Prabhakar and
+       others},
+  title = {Symphony: Distributed hashing in a small world},
+  booktitle = {Proceedings of the 4th USENIX Symposium on Internet Technologies
+       and Systems},
+  year = {2003},
+  volume = {4},
+  pages = {10--10},
+  file = {:symphony.pdf:PDF}
+}
+
address@hidden:2006:PCS:1146381.1146402,
+  author = {Massouli{\'e}, Laurent and Le Merrer, Erwan and Kermarrec, 
Anne-Marie
+       and Ganesh, Ayalvadi},
+  title = {Peer counting and sampling in overlay networks: random walk 
methods},
+  booktitle = {Proceedings of the twenty-fifth annual ACM symposium on 
Principles
+       of distributed computing},
+  year = {2006},
+  series = {PODC '06},
+  pages = {123--132},
+  address = {New York, NY, USA},
+  publisher = {ACM},
+  acmid = {1146402},
+  doi = {10.1145/1146381.1146402},
+  isbn = {1-59593-384-0},
+  keywords = {expander graphs, peer-to-peer systems, random walks, sampling},
+  location = {Denver, Colorado, USA},
+  numpages = {10},
+  url = {http://doi.acm.org/10.1145/1146381.1146402}
+}
+
address@hidden,
+  author = {Maymounkov, Petar and Mazieres, David},
+  title = {Kademlia: A peer-to-peer information system based on the xor 
metric},
+  booktitle = {Peer-to-Peer Systems},
+  publisher = {Springer},
+  year = {2002},
+  pages = {53--65},
+  file = {:kademlia.pdf:PDF}
+}
+
address@hidden,
+  author = {Montresor, A. and Jelasity, M.},
+  title = {PeerSim: A scalable P2P simulator},
+  booktitle = {Peer-to-Peer Computing, 2009. P2P '09. IEEE Ninth International 
Conference
+       on},
+  year = {2009},
+  pages = {99-100},
+  doi = {10.1109/P2P.2009.5284506},
+  file = {:PeerSim.pdf:PDF},
+  keywords = {peer-to-peer computing;PeerSim;peer-to-peer system;scalable P2P 
simulator;Discrete
+       event simulation;Engines;Java;Monitoring;Peer to peer 
computing;Protocols;Scalability;Testing;Topology;Writing}
+}
+
address@hidden,
+  author = {Naicken, S. and Livingston, B. and Basu, A. and Rodhetbhai, S. and
+       Wakeman, I. and Chalmers, D.},
+  title = {The state of peer-to-peer simulators and simulations},
+  journal = {SIGCOMM Comput. Commun. Rev.},
+  year = {2007},
+  volume = {37},
+  pages = {95--98},
+  number = {2},
+  month = mar,
+  acmid = {1232932},
+  address = {New York, NY, USA},
+  doi = {10.1145/1232919.1232932},
+  file = {:TheStateOfP2PSimulatorsAndSimulations.pdf:PDF},
+  issn = {0146-4833},
+  issue_date = {April 2007},
+  keywords = {peer-to-peer, simulator evaluation, simulator usage},
+  numpages = {4},
+  publisher = {ACM},
+  url = {http://doi.acm.org/10.1145/1232919.1232932}
+}
+
address@hidden,
+  author = {Nakamoto, Satoshi},
+  title = {Bitcoin: A peer-to-peer electronic cash system},
+  journal = {Consulted},
+  year = {2008},
+  volume = {1},
+  pages = {2012}
+}
+
address@hidden,
+  author = {Nussbaum, Lucas and Richard, Olivier},
+  title = {Lightweight emulation to study peer-to-peer systems},
+  journal = {Concurrency and Computation: Practice and Experience},
+  year = {2008},
+  volume = {20},
+  pages = {735--749},
+  number = {6},
+  doi = {10.1002/cpe.1242},
+  file = {:p2plab-cpe.pdf:PDF},
+  issn = {1532-0634},
+  keywords = {peer-to-peer, evaluation, emulation, network, virtualization, 
BitTorrent},
+  publisher = {John Wiley \& Sons, Ltd.},
+  url = {http://dx.doi.org/10.1002/cpe.1242}
+}
+
address@hidden,
+  author = {Pizzonia, Maurizio and Rimondini, Massimo},
+  title = {Netkit: easy emulation of complex networks on inexpensive hardware},
+  booktitle = {Proceedings of the 4th International Conference on Testbeds and 
research
+       infrastructures for the development of networks \& communities},
+  year = {2008},
+  series = {TridentCom '08},
+  pages = {7:1--7:10},
+  address = {ICST, Brussels, Belgium, Belgium},
+  publisher = {ICST (Institute for Computer Sciences, Social-Informatics and 
Telecommunications
+       Engineering)},
+  acmid = {1390585},
+  articleno = {7},
+  file = {:netkit.pdf:PDF},
+  isbn = {978-963-9799-24-0},
+  keywords = {network emulation, routing, user-mode Linux, virtual 
laboratories},
+  location = {Innsbruck, Austria},
+  numpages = {10},
+  url = {http://dl.acm.org/citation.cfm?id=1390576.1390585}
+}
+
address@hidden,
+  author = {Pujol-Ahullo, J. and Garcia-Lopez, P.},
+  title = {PlanetSim: An extensible simulation tool for peer-to-peer networks
+       and services},
+  booktitle = {Peer-to-Peer Computing, 2009. P2P '09. IEEE Ninth International 
Conference
+       on},
+  year = {2009},
+  pages = {85-86},
+  doi = {10.1109/P2P.2009.5284504},
+  file = {:planetsim.pdf:PDF},
+  keywords = {Java;discrete event simulation;peer-to-peer 
computing;Java;PlanetSim
+       tool;discrete event-based simulation framework;peer-to-peer overlay
+       network;Analytical models;Computational modeling;Computer 
simulation;Discrete
+       event simulation;Documentation;Java;Peer to peer 
computing;Protocols;Statistics;Testing;Java;event-based;peer-to-peer;simulator}
+}
+
address@hidden,
+  author = {Rhea, Sean and Godfrey, Brighten and Karp, Brad and Kubiatowicz,
+       John and Ratnasamy, Sylvia and Shenker, Scott and Stoica, Ion and
+       Yu, Harlan},
+  title = {OpenDHT: a public DHT service and its uses},
+  journal = {SIGCOMM Comput. Commun. Rev.},
+  year = {2005},
+  volume = {35},
+  pages = {73--84},
+  number = {4},
+  month = aug,
+  acmid = {1080102},
+  address = {New York, NY, USA},
+  doi = {10.1145/1090191.1080102},
+  file = {:openDHT.pdf:PDF},
+  issn = {0146-4833},
+  issue_date = {October 2005},
+  keywords = {distributed hash table, peer-to-peer, resource allocation},
+  numpages = {12},
+  publisher = {ACM},
+  url = {http://doi.acm.org/10.1145/1090191.1080102}
+}
+
address@hidden,
+  author = {Ritter, Jordan},
+  title = {Why gnutella can’t scale. no, really},
+  year = {2001}
+}
+
address@hidden,
+  author = {Rodriguez, A. and Killian, C. and Bhat, S. and Kostic, D. and 
Vahdat,
+       A.},
+  title = {{MACEDON: Methodology for Automatically Creating, Evaluating, and
+       Designing Overlay Networks",}},
+  booktitle = {Proc. of the 1st USENIX/ACM Symposium on Networked Systems 
Design
+       and Implementation (NSDI)},
+  year = {\# 2004},
+  month = mar,
+  abstract = {{Currently, researchers designing and implementing largescale 
overlay
+       services employ disparate techniques at each stage in the production
+       cycle: design, implementation, experimentation, and evaluation. As
+       a result, complex and tedious tasks are often duplicated leading
+       to ine\#ective resource use and di\#culty in fairly comparing competing
+       algorithms. In this paper, we present MACEDON, an infrastructure
+       that provides facilities to: i) specify distributed algorithms in
+       a concise domainspecific...}},
+  citeulike-article-id = {217372},
+  citeulike-linkout-0 = {http://citeseer.ist.psu.edu/rodriguez04macedon.html},
+  citeulike-linkout-1 = {http://citeseer.lcs.mit.edu/rodriguez04macedon.html},
+  citeulike-linkout-2 = {http://citeseer.ifi.unizh.ch/rodriguez04macedon.html},
+  citeulike-linkout-3 = 
{http://citeseer.comp.nus.edu.sg/rodriguez04macedon.html},
+  file = {:macedon.pdf:PDF},
+  keywords = {2004, distributed, nsdi, overlays},
+  posted-at = {2005-06-02 23:45:16},
+  priority = {0},
+  url = {http://citeseer.ist.psu.edu/rodriguez04macedon.html}
+}
+
address@hidden,
+  author = {Rossi, D. and Veglia, P. and Sammarco, M. and Larroca, F.},
+  title = {ModelNet-TE: An emulation tool for the study of P2P and traffic 
engineering
+       interaction dynamics},
+  journal = {Peer-to-Peer Networking and Applications},
+  year = {2012},
+  pages = {1--19},
+  file = {:modelnet-si-ppna11.pdf:PDF},
+  publisher = {Springer}
+}
+
address@hidden,
+  author = {Rowstron, Antony and Druschel, Peter},
+  title = {Pastry: Scalable, decentralized object location, and routing for
+       large-scale peer-to-peer systems},
+  booktitle = {Middleware 2001},
+  year = {2001},
+  pages = {329--350},
+  organization = {Springer},
+  file = {:pastry.pdf:PDF}
+}
+
address@hidden,
+  author = {Sakumoto, Y. and Asai, R. and Ohsaki, H. and Imase, M.},
+  title = {Design and Implementation of Flow-Level Simulator for Performance
+       Evaluation of Large Scale Networks},
+  booktitle = {Modeling, Analysis, and Simulation of Computer and 
Telecommunication
+       Systems, 2007. MASCOTS '07. 15th International Symposium on},
+  year = {2007},
+  pages = {166-172},
+  doi = {10.1109/MASCOTS.2007.17},
+  file = {:Sakumoto07_MASCOTS.pdf:PDF},
+  issn = {1526-7539},
+  keywords = {Acceleration;Analytical models;Computational modeling;Computer 
simulation;Differential
+       equations;Discrete event simulation;Information 
science;Internet;Large-scale
+       systems;Mathematical analysis}
+}
+
address@hidden,
+  author = {Kazuyuki Shudo and Yoshio Tanaka and Satoshi Sekiguchi},
+  title = {Overlay Weaver: An overlay construction toolkit },
+  journal = {Computer Communications },
+  year = {2008},
+  volume = {31},
+  pages = {402 - 412},
+  number = {2},
+  note = {<ce:title>Special Issue: Foundation of Peer-to-Peer 
Computing</ce:title>
+       },
+  doi = {10.1016/j.comcom.2007.08.002},
+  file = {:overlayweaver.pdf:PDF},
+  issn = {0140-3664},
+  keywords = {Overlay network},
+  url = {http://www.sciencedirect.com/science/article/pii/S0140366407002939}
+}
+
address@hidden,
+  author = {Spring, Neil and Peterson, Larry and Bavier, Andy and Pai, Vivek},
+  title = {Using PlanetLab for network research: myths, realities, and best
+       practices},
+  journal = {SIGOPS Oper. Syst. Rev.},
+  year = {2006},
+  volume = {40},
+  pages = {17--24},
+  number = {1},
+  month = jan,
+  acmid = {1113368},
+  address = {New York, NY, USA},
+  doi = {10.1145/1113361.1113368},
+  issn = {0163-5980},
+  issue_date = {January 2006},
+  numpages = {8},
+  publisher = {ACM},
+  url = {http://doi.acm.org/10.1145/1113361.1113368}
+}
+
address@hidden,
+  author = {Stoica, Ion and Morris, Robert and Liben-Nowell, David and Karger,
+       David R and Kaashoek, M Frans and Dabek, Frank and Balakrishnan,
+       Hari},
+  title = {Chord: a scalable peer-to-peer lookup protocol for internet 
applications},
+  journal = {Networking, IEEE/ACM Transactions on},
+  year = {2003},
+  volume = {11},
+  pages = {17--32},
+  number = {1},
+  file = {:chord.pdf:PDF},
+  publisher = {IEEE}
+}
+
address@hidden:2006:UCP:1177080.1177105,
+  author = {Stutzbach, Daniel and Rejaie, Reza},
+  title = {Understanding churn in peer-to-peer networks},
+  booktitle = {Proceedings of the 6th ACM SIGCOMM conference on Internet 
measurement},
+  year = {2006},
+  series = {IMC '06},
+  pages = {189--202},
+  address = {New York, NY, USA},
+  publisher = {ACM},
+  acmid = {1177105},
+  doi = {10.1145/1177080.1177105},
+  file = {:understanding_churn.pdf:PDF},
+  isbn = {1-59593-561-4},
+  keywords = {Gnutella, bitTorrent, churn, kad, peer-to-peer, session length, 
uptime},
+  location = {Rio de Janeriro, Brazil},
+  numpages = {14},
+  url = {http://doi.acm.org/10.1145/1177080.1177105}
+}
+
address@hidden,
+  author = {Maximilian Szengel},
+  title = {Decentralized Evaluation of Regular Expressions for Capability 
Discovery
+       in Peer-to-Peer Networks},
+  school = {Technische Universitaet Muenchen},
+  year = {2012},
+  type = {Masters},
+  address = {Garching bei Muenchen},
+  month = {11/2012},
+  abstract = {This thesis presents a novel approach for decentralized 
evaluation
+       of regular expressions for capability discovery in DHT-based overlays.
+       The system provides support for announcing capabilities expressed
+       as regular expressions and discovering participants offering adequate
+       capabilities.
+       
+       The idea behind our approach is to convert regular expressions into
+       finite automatons and store the corresponding states and transitions
+       in a DHT. We show how locally constructed DFA are merged in the DHT
+       into an NFA without the knowledge of any NFA already present in the
+       DHT and without the need for any central authority. Furthermore we
+       present options of optimizing the DFA.
+       
+       There exist several possible applications for this general approach
+       of decentralized regular expression evaluation. However, in this
+       thesis we focus on the application of discovering users that are
+       willing to provide network access using a specified protocol to a
+       particular destination.
+       
+       We have implemented the system for our proposed approach and conducted
+       a simulation. Moreover we present the results of an emulation of
+       the implemented system in a cluster.},
+  file = {:szengel2012ms.pdf:PDF},
+  howpublished = {\url{https://www.gnunet.org/szengel2012ms}},
+  keywords = {DFA, DHT, GNUnet, NFA, regular expressions, search},
+  pages = {100},
+  volume = {M.S.}
+}
+
address@hidden,
+  author = {Tang, Peiyi and Yew, Pen-Chung},
+  title = {Processor self-scheduling for multiple-nested parallel loops},
+  booktitle = {Proceedings of the 1986 international conference on parallel 
processing},
+  year = {1986},
+  pages = {528--535}
+}
+
address@hidden,
+  author = {Vahdat, Amin and Yocum, Ken and Walsh, Kevin and Mahadevan, Priya
+       and Kosti\'{c}, Dejan and Chase, Jeff and Becker, David},
+  title = {Scalability and accuracy in a large-scale network emulator},
+  journal = {SIGOPS Oper. Syst. Rev.},
+  year = {2002},
+  volume = {36},
+  pages = {271--284},
+  number = {SI},
+  month = dec,
+  acmid = {844154},
+  address = {New York, NY, USA},
+  doi = {10.1145/844128.844154},
+  file = {:modelnet-osdi02.pdf:PDF},
+  issn = {0163-5980},
+  issue_date = {Winter 2002},
+  numpages = {14},
+  publisher = {ACM},
+  url = {http://doi.acm.org/10.1145/844128.844154}
+}
+
address@hidden,
+  author = {Varga, Andr{\'a}s and others},
+  title = {The OMNeT++ discrete event simulation system},
+  booktitle = {Proceedings of the European Simulation Multiconference 
(ESM’2001)},
+  year = {2001},
+  volume = {9},
+  organization = {sn},
+  file = {:OMNet++.pdf:PDF}
+}
+
address@hidden,
+  author = {Vishwanath, K.V. and Gupta, D. and Vahdat, A. and Yocum, K.},
+  title = {ModelNet: Towards a datacenter emulation environment},
+  booktitle = {Peer-to-Peer Computing, 2009. P2P '09. IEEE Ninth International 
Conference
+       on},
+  year = {2009},
+  pages = {81-82},
+  doi = {10.1109/P2P.2009.5284497},
+  file = {:modelnet-timedilation.pdf:PDF},
+  keywords = {computer centres;computer networks;protocols;virtual 
machines;ModelNet;complex
+       network load;data center emulation environment;high-capacity 
networks;large-scale
+       experimentation;multicore architectures;network emulator;network
+       protocols;sophisticated infrastructure 
software;virtualization;Application
+       software;Complex networks;Computer architecture;Computer 
networks;Emulation;Large-scale
+       systems;Multicore processing;Next generation 
networking;Protocols;Testing}
+}
+
address@hidden,
+  author = {Weing{\"a}rtner, Elias and Schmidt, Florian and Vom Lehn, Hendrik
+       and Heer, Tobias and Wehrle, Klaus},
+  title = {Slicetime: A platform for scalable and accurate network emulation},
+  booktitle = {Proceedings of the 8th USENIX conference on Networked systems 
design
+       and implementation},
+  year = {2011},
+  pages = {19--19},
+  organization = {USENIX Association},
+  file = {:slicetime.pdf:PDF}
+}
+
address@hidden,
+  author = {White, Brian and Lepreau, Jay and Stoller, Leigh and Ricci, Robert
+       and Guruprasad, Shashi and Newbold, Mac and Hibler, Mike and Barb,
+       Chad and Joglekar, Abhijeet},
+  title = {An integrated experimental environment for distributed systems and
+       networks},
+  journal = {SIGOPS Oper. Syst. Rev.},
+  year = {2002},
+  volume = {36},
+  pages = {255--270},
+  number = {SI},
+  month = dec,
+  acmid = {844152},
+  address = {New York, NY, USA},
+  doi = {10.1145/844128.844152},
+  file = {:emulab.pdf:PDF},
+  issn = {0163-5980},
+  issue_date = {Winter 2002},
+  numpages = {16},
+  publisher = {ACM},
+  review = {combines simulation, emulation and live networks. Netlab is a 
descendant
+       of Emulab},
+  url = {http://doi.acm.org/10.1145/844128.844152}
+}
+
address@hidden,
+  author = {Zeilemaker, N. and Capota, M. and Bakker, A. and Pouwelse, J.},
+  title = {Tribler: Search and stream},
+  booktitle = {Peer-to-Peer Computing (P2P), 2011 IEEE International Conference
+       on},
+  year = {2011},
+  pages = {164-165},
+  doi = {10.1109/P2P.2011.6038729},
+  issn = {2161-3559},
+  keywords = {media streaming;peer-to-peer computing;public domain 
software;security
+       of data;video on demand;P2P technology;Tribler;content 
publishing;content
+       searching;content sharing;content streaming;live streaming;open-source
+       software;spam prevention;video on demand;Graphical user interfaces;Open
+       source software;Peer to peer computing;Protocols;Publishing;Video
+       on demand}
+}
+
address@hidden,
+  author = {Zhao, Ben Y and Huang, Ling and Stribling, Jeremy and Rhea, Sean
+       C and Joseph, Anthony D and Kubiatowicz, John D},
+  title = {Tapestry: A resilient global-scale overlay for service deployment},
+  journal = {Selected Areas in Communications, IEEE Journal on},
+  year = {2004},
+  volume = {22},
+  pages = {41--53},
+  number = {1},
+  file = {:tapestry.pdf:PDF},
+  publisher = {IEEE}
+}
+
address@hidden:conf/usenix/2008,
+  title = {2008 USENIX Annual Technical Conference, Boston, MA, USA, June 
22-27,
+       2008. Proceedings},
+  year = {2008},
+  editor = {Rebecca Isaacs and Yuanyuan Zhou},
+  publisher = {USENIX Association},
+  bibsource = {DBLP, http://dblp.uni-trier.de},
+  booktitle = {USENIX Annual Technical Conference},
+  isbn = {978-1-931971-59-1}
+}
+
address@hidden:conf/tridentcom/2012,
+  title = {Testbeds and Research Infrastructure. Development of Networks and
+       Communities - 8th International ICST Conference, TridentCom 2012,
+       Thessanoliki, Greece, June 11-13, 2012, Revised Selected Papers},
+  year = {2012},
+  editor = {Thanasis Korakis and Michael Zink and Maximilian Ott},
+  volume = {44},
+  series = {Lecture Notes of the Institute for Computer Sciences, Social 
Informatics
+       and Telecommunications Engineering},
+  publisher = {Springer},
+  bibsource = {DBLP, http://dblp.uni-trier.de},
+  booktitle = {TRIDENTCOM},
+  ee = {http://dx.doi.org/10.1007/978-3-642-35576-9},
+  isbn = {978-3-642-35575-2}
+}
+
address@hidden:conf/tridentcom/2010,
+  title = {Testbeds and Research Infrastructures. Development of Networks and
+       Communities - 6th International ICST Conference, TridentCom 2010,
+       Berlin, Germany, May 18-20, 2010, Revised Selected Papers},
+  year = {2011},
+  editor = {Thomas Magedanz and Anastasius Gavras and Huu-Thanh Nguyen and 
Jeffrey
+       S. Chase},
+  volume = {46},
+  series = {Lecture Notes of the Institute for Computer Sciences, Social 
Informatics
+       and Telecommunications Engineering},
+  publisher = {Springer},
+  bibsource = {DBLP, http://dblp.uni-trier.de},
+  booktitle = {TRIDENTCOM},
+  ee = {http://dx.doi.org/10.1007/978-3-642-17851-1},
+  isbn = {978-3-642-17850-4}
+}
+
address@hidden,
+  title = {Infiniband cluster at LRR-TUM},
+  howpublished = {\url{http://www.lrr.in.tum.de/Par/arch/infiniband/}}
+}
+
address@hidden,
+  title = {NITOS Wireless Testbed - Network Implementation Testbed Laboratory},
+  howpublished = {\url{http://nitlab.inf.uth.gr/NITlab/index.php/testbed}},
+  owner = {totakura},
+  timestamp = {2013.06.03},
+  url = {http://nitlab.inf.uth.gr/NITlab/index.php/testbed}
+}
+
address@hidden,
+  title = {SuperMUC: Petascale System at Leibniz-Rechenzentrum},
+  howpublished = {\url{https://www.lrz.de/services/compute/supermuc/}},
+  year = {2012},
+  url = {https://www.lrz.de/services/compute/supermuc/}
+}
+
address@hidden:conf/acsac/2007,
+  title = {23rd Annual Computer Security Applications Conference (ACSAC 2007),
+       December 10-14, 2007, Miami Beach, Florida, USA},
+  year = {2007},
+  publisher = {IEEE Computer Society},
+  bibsource = {DBLP, http://dblp.uni-trier.de},
+  booktitle = {ACSAC}
+}
+




reply via email to

[Prev in Thread] Current Thread [Next in Thread]