Cooperative strategies for network management in the Internet of the future

被引:0
作者
Zseby T. [1 ]
Kleis M. [1 ]
Hirsch T. [1 ]
机构
[1] Fraunhofer Institut FOKUS, 10589 Berlin
关键词
D O I
10.1007/s00287-010-0422-x
中图分类号
学科分类号
摘要
Cooperation strategies are gaining in importance in the Internet. Cooperation models are present in peer to peer networks for example, or in the cooperative routing algorithms for wirelessmesh networks. Approaches are being discussed in the context of future Internet research, which delegate decision cycles from the network management into the network. This creates higher requirements for information management in the network. In this contribution we describe how cooperation of functions on the network and the service layers can support this kind of decision cycles. By an example in load management, we explain how the cooperation of all participating components increases both the group utility and the utility of all individual service providers. © Springer-Verlag 2010.
引用
收藏
页码:160 / 170
页数:10
相关论文
共 20 条
  • [1] Anagnostakis K.G., Greenwald M.B., Exchange-based incentive mechanisms for peer-to-peer file sharing, Proceedings of the 24th International Conference on Distributed Computing Systems (Icdcs'04), pp. 524-533, (2004)
  • [2] Blanc A., Liu Y.-K., Vahdat A., Designing incentives for peer-to-peer routing, 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proc IEEE, (2005)
  • [3] Caronni G., Walking the web of trust, Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 153-158, (2000)
  • [4] Clark D.D., Wroclawski J., Sollins K.R., Braden R., Tussle in cyberspace: Defining tomorrow's internet, Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 347-356, (2002)
  • [5] Dasgupta D., Artificial Immune Systems and Their Applications, (1999)
  • [6] Douceur J.R., The sybil attack, Revised Papers from the First International Workshop on Peer-To-Peer Systems, 2429, pp. 251-260, (2002)
  • [7] Feldman M., Lai K., Stoica I., Chuang J., Robust incentive techniques for peer-to-peer networks, Proceedings of the 5th ACM Conference on Electronic Commerce, pp. 102-111, (2004)
  • [8] Felegyhazi M., Hubaux J.-P., Buttyan L., Nash equilibria of packet forwarding strategies in wireless ad hoc networks, IEEE Trans Mobile Comput, 5, 5, pp. 463-476, (2006)
  • [9] (2009)
  • [10] Gambetta D., Trust: Making and Breaking Cooperative Relations, (1990)