Zorilla: a peer-to-peer middleware for real-world distributed systems

2011 ◽  
Vol 23 (13) ◽  
pp. 1506-1521 ◽  
Author(s):  
Niels Drost ◽  
Rob V. van Nieuwpoort ◽  
Jason Maassen ◽  
Frank J. Seinstra ◽  
Henri E. Bal
Author(s):  
Fabian Stäber ◽  
Gerald Kunzmann ◽  
Jörg P. Müller

Decentralized peer-to-peer systems fit well as the underlying infrastructure for IP-telephony, as they provide the scalability for a large number of participants, and are able to handle the limited storage and bandwidth capabilities on the clients. We studied a commercial peer-to-peer-based decentralized communication platform supporting video communication, voice communication, instant messaging, et cetera. One of the requirements of the communication platform is the implementation of a user directory, allowing users to search for other participants. In this chapter, we present the Extended Prefix Hash Tree algorithm that enables the implementation of a user directory on top of the peer-to-peer communication platform in a fully decentralized way. We evaluate the performance of the algorithm with a real-world phone book. The results can be transferred to other scenarios where support for range queries is needed in combination with the decentralization, self-organization, and resilience of an underlying peer-to-peer infrastructure.


2020 ◽  
Vol 270 ◽  
pp. 115061 ◽  
Author(s):  
Liliane Ableitner ◽  
Verena Tiefenbeck ◽  
Arne Meeuw ◽  
Anselma Wörner ◽  
Elgar Fleisch ◽  
...  

2011 ◽  
Vol 22 (05) ◽  
pp. 1123-1142 ◽  
Author(s):  
EMMANUELLE ANCEAUME ◽  
FRANCISCO BRASILEIRO ◽  
ROMARIC LUDINARD ◽  
BRUNO SERICOLA ◽  
FRÉDÉRIC TRONEL

Awerbuch and Scheideler have shown that peer-to-peer overlay networks can survive Byzantine attacks only if malicious nodes are not able to predict what will be the topology of the network for a given sequence of join and leave operations. In this paper we investigate adversarial strategies by following specific protocols. Our analysis demonstrates first that an adversary can very quickly subvert overlays based on distributed hash tables by simply never triggering leave operations. We then show that when all nodes (honest and malicious ones) are imposed on a limited lifetime, the system eventually reaches a stationary regime where the ratio of polluted clusters is bounded, independently from the initial amount of corruption in the system.


2015 ◽  
Vol 34 (5) ◽  
pp. 621-631
Author(s):  
Alan Burnell O'Neill ◽  
Ritchie Bent

Purpose – Developing capable and competent executives remains a critical and ongoing challenge for many organisations due to the ever changing landscape of the global business environment. Traditional executive development methods in artificial, once removed “classroom” type environments do not prepare executives sufficiently with the experience and insights needed to handle the complexities and uncertainties that befall them in the current volatile business environment. The purpose of this paper is to study the development of senior executives in a more real-world and authentic manner, that a leading Asia-based conglomerate has developed a senior executive “peer-to-peer” learning approach that brings together chief executives and senior managers from a number of businesses so they can share and learn from each other. Design/methodology/approach – This paper presents by way of a narrative description an alternative approach to classroom-based executive development. The paper looks at some of the limitations of more traditional executive development methods by contrasting these with a peer-to-peer learning framework that has been used successfully over the last 12 years. It outlines the why, what and how to implement a peer-to-peer learning practice based on transorganisational development (TD) practices to facilitate individual and organisational change. Findings – Getting senior executives out of the “classroom” and in front of executives from other businesses and organisations in a real-world peer-to-peer learning environment, exposes “participants” to a more credible, grounded and authentic development opportunity, that is difficult to replicate with more traditional methods. The diversity of delegates and companies that engage in this approach enable “participants” to explore new ideas and to confront, in very direct ways, their predispositions to repeat well-learned institutional responses which may have helped them succeed in the past. Originality/value – Although much of the literature on TD focuses predominately on the initiation, planning and implementation of system or organisation wide change, little has been written to emphasise how TD makes a viable contribution to the understanding of the processes of change at an individual level. By highlighting this the authors intend to make the relationship more explicit, thereby opening up prospects for TD’s wider use in the field senior executive development.


2006 ◽  
pp. 226-258 ◽  
Author(s):  
Silvana Castano ◽  
Alfio Ferrara ◽  
Stefano Montanelli

In open distributed systems like peer-to-peer networks and Grids, many independent peers, possibly spanned across multiple organizations, need to share information resources (e.g., data, documents, services) provided by other nodes. By dynamic knowledge discovery we mean the capability of each node of finding knowledge in the system about information resources that, at a given moment, best match the requirements of a request for given target resource(s). The chapter will focus on describing models and techniques for ontology metadata management and ontology-based dynamic knowledge discovery in open distributed systems, by describing the architecture of a toolkit for information resource discovery and sharing developed in the Helios peer-based system.


Sign in / Sign up

Export Citation Format

Share Document