skip to main content
article
Free Access

Creating an adaptive network of hubs using Schelling's model

Published:01 March 2006Publication History
Skip Abstract Section

Abstract

Adjusting the overlay network topology in a peer-to-peer network to satisfy performance criteria.

Skip Supplemental Material Section

Supplemental Material

References

  1. Adamic, L.A., Lukose, R.M., Puniyani, A.R., and Huberman, B.A. Search in power-law networks. Physical Review E 64, 4 (Oct. 2001).Google ScholarGoogle ScholarCross RefCross Ref
  2. Gamma, E., Helm, R., Johnson, R., and Vlissides, J. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Milojicic, D.S., Kalogeraki, V., Lukose, R. et al. Peer-to-peer computing. HP Labs Tech. Rep. HPL-2002-57R1, 2002.Google ScholarGoogle Scholar
  4. Pemmaraju, S. and Skiena, S. Computational Discrete Mathematics: Combinatorics and Graph Theory with Mathematica. Cambridge University Press, 2003, 280--282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Schelling, T.C. Dynamic models of segregation. Journal of Mathematical Sociology 1, 2 (1971), 143--186.Google ScholarGoogle ScholarCross RefCross Ref
  6. Schelling, T.C. Micromotives and Macrobehaviour. Norton, 1978.Google ScholarGoogle Scholar
  7. Singh, A. and Haahr, M. Topology adaptation in P2P networks using Schelling's Model. In Proceedings of the Workshop on Games and Emergent Behaviors in Distributed Computing Environments (Birmingham, U.K., Sept. 2004).Google ScholarGoogle Scholar
  8. Traversat, B., Arora, A., Abdelaziz, M. et al. Project JXTA 2.0 Super-Peer Virtual Network; www.jxta.org/project/www/docs/JXTA2.0protocols1.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Creating an adaptive network of hubs using Schelling's model

          Recommendations

          Reviews

          Andrew Robert Huber

          Peer-to-peer (P2P) systems organize peers into virtual networks based on the underlying physical Internet. These self-organized networks may result in inefficient network topologies for common P2P tasks such as searching and clustering. To solve this problem, this article describes an abstract algorithm based on Schelling’s model. This abstract algorithm is used to create a family of algorithms that, when executed by the peers, create an efficient virtual network of hubs by dynamically adapting the original P2P network. In the abstract algorithm, each peer periodically calculates whether it is satisfied with its local view of the overlay network topology (for example, its neighbor count). If not, the peer takes steps to adapt the topology, for example by adding or removing neighbors. For the particular example algorithm in the article, hubs (high-bandwidth peers connected to other hubs) are satisfied if connected to more than zero but no more than a maximum number of other hubs and no more than a maximum number of total peers. Hubs will drop nonhub neighbors and add hubs as neighbors until all hubs are satisfied. Simulations on networks with 100 to 1,000 peers with a maximum number of neighbor hubs from one to ten are reported on, showing results on how the networks converge, the numbers of messages passed to reach convergence, and other properties of interest. This is a concise, well-written article with interesting results that should be relevant to practitioners and researchers working with networks or P2P systems. Online Computing Reviews Service

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 49, Issue 3
            Self managed systems
            March 2006
            107 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/1118178
            Issue’s Table of Contents

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 March 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format