Note-20-Sup

Note-20-Sup - if data is new, keep it repeat epidemic...

Info iconThis preview shows pages 1–21. Sign up to view the full content.

View Full Document Right Arrow Icon
direct push (IRC)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
direct push (IRC)
Background image of page 2
direct push (IRC)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
structured P2P pull (Storm)
Background image of page 4
structured P2P pull (Storm)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
structured P2P pull (Storm)
Background image of page 6
structured P2P pull (Storm)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
structured P2P pull (Storm)
Background image of page 8
structured P2P pull (Storm)
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
structured P2P pull (Storm)
Background image of page 10
structured P2P pull (Storm)
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
structured P2P pull (Storm)
Background image of page 12
epidemic algorithms
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
epidemic algorithms given that all peers have a peer list [ID, IP, port] pick a random peer exchange data
Background image of page 14
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 16
Background image of page 17

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 18
Background image of page 19

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 20
Background image of page 21
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: if data is new, keep it repeat epidemic algorithms epidemic algorithms epidemic algorithms epidemic algorithms epidemic algorithms epidemic algorithms data is distributed epidemically as in biological epidemiology coverage rate depends on specifc algorithm either exponential or logarithmic advantages there is no routing structure there is no network if the peer list is already distributed, the botnet is impossible to stop other than kill the peer list distributor and wait...
View Full Document

This note was uploaded on 08/30/2009 for the course CSE 494 taught by Professor Rao during the Spring '08 term at ASU.

Page1 / 21

Note-20-Sup - if data is new, keep it repeat epidemic...

This preview shows document pages 1 - 21. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online