A survey on content-centric technologies for the current Internet: CDN and P2P solutions

A Passarella - Computer Communications, 2012 - Elsevier
One of the most striking properties of the Internet is its flexibility to accommodate features it
was not conceived for. Among the most significant examples, in this survey we consider the …

Towards a load balancing in a three-level cloud computing network

SC Wang, KQ Yan, WP Liao… - 2010 3rd international …, 2010 - ieeexplore.ieee.org
Network bandwidth and hardware technology are developing rapidly, resulting in the
vigorous development of the Internet. A new concept, cloud computing, uses low-power …

A survey and taxonomy of ID/Locator Split Architectures

W Ramírez, X Masip-Bruin, M Yannuzzi… - Computer Networks, 2014 - Elsevier
The IP-based addressing scheme currently supporting the whole routing architecture
embeds some well-known limitations that may significantly hinder the deployment of new …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Minimizing churn in distributed systems

PB Godfrey, S Shenker, I Stoica - ACM SIGCOMM Computer …, 2006 - dl.acm.org
A pervasive requirement of distributed systems is to deal with churn-change in the set of
participating nodes due to joins, graceful leaves, and failures. A high churn rate can …

MDHT: A hierarchical name resolution service for information-centric networks

M D'Ambrosio, C Dannewitz, H Karl… - Proceedings of the ACM …, 2011 - dl.acm.org
Information-centric network architectures are an increasingly important approach for future
Internet architectures. Several approaches are based on a non-hierarchical identifier (ID) …

Comparing the performance of distributed hash tables under churn

J Li, J Stribling, TM Gil, R Morris… - International Workshop on …, 2004 - Springer
A protocol for a distributed hash table (DHT) incurs communication costs to keep up with
churn–changes in membership–in order to maintain its ability to route lookups efficiently …

Heterogeneity and load balance in distributed hash tables

PB Godfrey, I Stoica - … IEEE 24th Annual Joint Conference of …, 2005 - ieeexplore.ieee.org
Existing solutions to balance load in DHTs incur a high overhead either in terms of routing
state or in terms of load movement generated by nodes arriving or departing the system. In …

A super-peer model for resource discovery services in large-scale grids

C Mastroianni, D Talia, O Verta - Future Generation Computer Systems, 2005 - Elsevier
As deployed Grids increase from tens to thousands of nodes, peer-to-peer (P2P) techniques
and protocols can be used to implement scalable services and applications. The super-peer …

Hybrid distributed and cloud backup architecture

JD Mehr, EES Murphy, N Virk, LM Sosnosky - US Patent 8,935,366, 2015 - Google Patents
The claimed Subject matter provides a system and/or a method that facilitates integration of
a distributed backup environment and a online backup environment. A Super peer device …