Vivaldi coordinates
Encyclopedia
Vivaldi Network Coordinates establish a virtual positioning system that has a prime use in networking. The algorithm behind the system uses a distributed technique to estimate propagation times between peers in the network.

Through this scheme, network topology awareness can be used to tune the network behaviour to more efficiently distribute data. For example, in a Peer-to-Peer
Peer-to-peer
Peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads among peers. Peers are equally privileged, equipotent participants in the application...

 network, more responsive identification and delivery of content can be achieved. In the Azureus
Vuze
Vuze is a BitTorrent client used to transfer files via the BitTorrent protocol. Vuze is written in Java, and uses the Azureus Engine. In addition to downloading data linked to by .torrent files, Azureus allows users to view, publish and share original DVD and HD quality video content...

 application, Vivaldi is used to improve the performance of the distributed hash table
Distributed hash table
A distributed hash table is a class of a decentralized distributed system that provides a lookup service similar to a hash table; pairs are stored in a DHT, and any participating node can efficiently retrieve the value associated with a given key...

 that facilitates query matches.

Advantages

  • Vivaldi is a fully distributed scheme, which achieves good scalability.
  • The Vivaldi protocol is simple, and very easy to implement.

Drawbacks

  • Vivaldi is based on Euclidean distance model, which requires the predicted distances to obey the triangle inequality
    Triangle inequality
    In mathematics, the triangle inequality states that for any triangle, the sum of the lengths of any two sides must be greater than or equal to the length of the remaining side ....

    . However, there are lots of triangle inequality violations (TIVs) on the Internet.
  • Lack of security design, very easy for malicious nodes to conduct various attacks.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK