{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T13:25:00Z","timestamp":1776950700356,"version":"3.51.4"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,9,27]],"date-time":"2018-09-27T00:00:00Z","timestamp":1538006400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s12083-018-0680-y","type":"journal-article","created":{"date-parts":[[2018,9,27]],"date-time":"2018-09-27T06:54:42Z","timestamp":1538031282000},"page":"809-829","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An adaptable and ISP-friendly multicast overlay network"],"prefix":"10.1007","volume":"12","author":[{"given":"Andr\u00e9","family":"Sampaio","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Sousa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,27]]},"reference":[{"key":"680_CR1","unstructured":"Hardwick J (2004) IP Multicast explained, Metaswitch, http:\/\/kambing.ui.ac.id\/onnopurbo\/library\/library-ref-eng\/ref-eng-3\/network\/multicast.pdf , 71"},{"key":"680_CR2","unstructured":"Cisco IP Multicast, https:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/ip-multicast\/index.html , as seen in 2017"},{"key":"680_CR3","unstructured":"Cisco (2000) IP Multicast Technology Overview, https:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/ip-multicast\/white-paper-listing.html (as seen in 2017), p 24"},{"key":"680_CR4","unstructured":"Arora H What is IP Multicasting? Concept of IP Multicast Address Explained, http:\/\/www.thegeekstuff.com\/2013\/05\/ip-multicasting\/ , 2013, as seen in 2017"},{"issue":"1","key":"680_CR5","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/65.819174","volume":"14","author":"C Diot","year":"2000","unstructured":"Diot C., Levine B.N., Lyles B., Kassem H., Balensiefen D. (2000) Deployment issues for the IP multicast service and architecture. IEEE Netw 14(1):78\u201388","journal-title":"IEEE Netw"},{"key":"680_CR6","doi-asserted-by":"crossref","unstructured":"GalubaAffiliated W, Girdzijauskas S (2009) Peer to peer overlay networks: Structure, routing and maintenance, Encyclopedia of Database Systems, pp 2056\u20132061","DOI":"10.1007\/978-0-387-39940-9_1215"},{"key":"680_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-1-4614-2110-8_2","volume":"2","author":"A Vlachou","year":"2012","unstructured":"Vlachou A., Doulkeridis C., Norvag K., Kotidis Y. (2012) Peer-to-peer query processing over multidimensional data. SpringerBriefs in Computer Science Chapter 2:5\u201312","journal-title":"SpringerBriefs in Computer Science Chapter"},{"key":"680_CR8","doi-asserted-by":"crossref","unstructured":"Banerjee Suman, Bhattacharjess Bobby (2002) A comparative study of application layer multicast protocols, University of Maryland","DOI":"10.1145\/633042.633045"},{"key":"680_CR9","unstructured":"Bittorrent Available at http:\/\/www.bittorrent.com\/"},{"key":"680_CR10","unstructured":"Gnutella Described and available at http:\/\/whatis.techtarget.com\/definition\/Gnutella"},{"key":"680_CR11","unstructured":"Zhang X, Liu J, Li B, Yum T-SP (2005) CoolStreaming\/DONet: A data-driven overlay network for peer-to-peer live media streaming, Proc IEEE INFOCOM, pp 2102\u20132111"},{"key":"680_CR12","unstructured":"Skype Available at https:\/\/www.skype.com\/"},{"key":"680_CR13","unstructured":"Stanford University Folding Coin, available at http:\/\/foldingcoin.net\/"},{"key":"680_CR14","unstructured":"UC Berkeley SETI@home, available at https:\/\/setiathome.berkeley.edu\/"},{"key":"680_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2015.04.014","volume":"55","author":"A Malatras","year":"2015","unstructured":"Malatras A (2015) State-of-the-art survey on P2P overlay networks in pervasive computing environments. J Netw Comput Appl 55:1\u201323","journal-title":"J Netw Comput Appl"},{"key":"680_CR16","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/COMST.2005.1610546","volume":"7","author":"J Eng Keong Lua","year":"2005","unstructured":"Eng Keong Lua J, Crowcroft M, Pias R, Sharma S, Lim A (2005) Survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutorials 7:72\u201393","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"10","key":"680_CR17","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/1831407.1831427","volume":"53","author":"R Rodrigues","year":"2010","unstructured":"Rodrigues R, Druschel P (2010) Peer-to-peer systems. Commun ACM 53(10):72\u201382","journal-title":"Commun ACM"},{"key":"680_CR18","unstructured":"Napster Available at http:\/\/www.napster.com\/"},{"key":"680_CR19","doi-asserted-by":"crossref","unstructured":"Castro M, Druschel P, Ganesh A, Rowstron A, Wallach DS (2002) Secure routing for structured peer-to-peer overlay networks, 5th Symposium on Operating Systems Design and Implementation, pp 2909\u2013314","DOI":"10.1145\/1060289.1060317"},{"key":"680_CR20","doi-asserted-by":"crossref","unstructured":"Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: A scalable peer-to-peer lookup service for internet applications, SIGCOMM, Conference on Applications, technologies, architectures, and protocols for computer communications, pp 149\u2013160","DOI":"10.1145\/964723.383071"},{"issue":"6","key":"680_CR21","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1016\/j.comnet.2006.08.004","volume":"51","author":"N Bisnik","year":"2007","unstructured":"Bisnik N, Alhussein A (2007) Abouzeid Optimizing random walk search algorithms in P2P networks. Comput Netw 51(6):1499\u2013 1514","journal-title":"Comput Netw"},{"issue":"3","key":"680_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1273445.1273449","volume":"37","author":"V Aggarwal","year":"2007","unstructured":"Aggarwal V, Feldmann A, Scheideler C (2007) Can ISPs and P2P users cooperate for improved performance?. ACM SIGCOMM Computer Communication Review 37(3):29\u201340","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"680_CR23","unstructured":"K\u00fchlewind M, Seedorf J, Gurbani V ALTO Status Page, IETF Group, https:\/\/datatracker.ietf.org\/wg\/alto\/charter\/"},{"issue":"1","key":"680_CR24","doi-asserted-by":"publisher","first-page":"37","DOI":"10.24138\/jcomss.v11i1.116","volume":"11","author":"P Sousa","year":"2015","unstructured":"Sousa P (2015) Towards effective control of P2P traffic aggregates in network infrastructures. J Commun Soft Syst 11(1):37\u201347","journal-title":"J Commun Soft Syst"},{"issue":"4","key":"680_CR25","doi-asserted-by":"publisher","first-page":"236","DOI":"10.24138\/jcomss.v9i4.144","volume":"9","author":"P Sousa","year":"2013","unstructured":"Sousa P (2013) A framework for highly reconfigurable P2P trackers. J Commun Soft Syst 9(4):236\u2013246","journal-title":"J Commun Soft Syst"},{"key":"680_CR26","doi-asserted-by":"crossref","unstructured":"Sousa P (2013) Traffic engineering approaches in P2P environments. In: 5th international conference on advanced infocomm technology (ICAIT 2012). LNCS, vol 7593. Springer, Paris, pp 61\u201374","DOI":"10.1007\/978-3-642-38227-7_10"},{"key":"680_CR27","doi-asserted-by":"crossref","unstructured":"Shi SY, Turner JS, Waldvogel M (2001) Dimensioning server access bandwidth and multicast routing in overlay networks, NOSSDAV: Proceedings of the 11th international workshop on Network and operating systems support for digital audio and video, pp 83\u201391","DOI":"10.1145\/378344.378357"},{"issue":"6","key":"680_CR28","doi-asserted-by":"publisher","first-page":"1408","DOI":"10.1016\/j.comnet.2013.01.002","volume":"57","author":"K-W Ke","year":"2013","unstructured":"Ke K-W, Huang C-H (2013) Performance evaluation of multisource Application Layer Multicast (ALM): Theoretical and simulative aspects. Comput Netw 57(6):1408\u20131424","journal-title":"Comput Netw"},{"key":"680_CR29","doi-asserted-by":"crossref","unstructured":"Banerjee S, Bhattacharjee B, Kommareddy C (2002) Scalable application layer multicast, Proceedings of conference on Applications, technologies, architectures, and protocols for computer communications, pp 205\u2013217","DOI":"10.1145\/633042.633045"},{"issue":"3","key":"680_CR30","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/COMST.2007.4317616","volume":"9","author":"M Hosseini","year":"2007","unstructured":"Hosseini M, Ahmed DT, Shirmohammadi S, Georganas ND (2007) A survey of Application-Layer multicast protocols. IEEE Commun Surv Tutorials 9(3):58\u201374","journal-title":"IEEE Commun Surv Tutorials"},{"key":"680_CR31","unstructured":"Jannotti J, Gifford DK, Johnson KL, Kaashoek MF, O\u2019Toole JR JW (2000) Overcast: Reliable multicasting with an overlay network, Proc Of the 4th conference on Symposium on Operating System Design and Implementation, 4:197\u2013212"},{"key":"680_CR32","first-page":"1521","volume":"2","author":"S Banerjee","year":"2003","unstructured":"Banerjee S, Kommareddy C, Kar K, Bhattacharjee B, Khuller S (2003) Construction of an efficient overlay multicast infrastructure for real-time applications. IEEE Societies INFOCOM 2:1521\u2013 1531","journal-title":"IEEE Societies INFOCOM"},{"key":"680_CR33","volume-title":"An architecture for internet content distribution as an infrastructure service","author":"Y Chawathe","year":"2000","unstructured":"Chawathe Y, McCanne S, Brewer E (2000) An architecture for internet content distribution as an infrastructure service. Ph.D. Thesis University of California, Berkeley"},{"key":"680_CR34","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TPDS.2007.1008","volume":"4","author":"L Lao","year":"2007","unstructured":"Lao L, Cui J-H, Gerla M, Chen S (2007) A scalable overlay multicast architecture for Large-Scale applications. IEEE Trans Parallel Distrib Syst 4:449\u2013459","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"680_CR35","unstructured":"Lao L, Cui J-H, Gerla M (2005) Multicast service overlay design, proc. of international symposium on performance evaluation of computer and telecommunication systems (SPECTS\u201905), Philadelphia,PA, USA"},{"key":"680_CR36","doi-asserted-by":"crossref","unstructured":"Mokhtarian K, Jacobsen H-A (2013) Minimum-delay overlay multicast. Proceedings IEEE INFOCOM, pp 1771\u20131779","DOI":"10.1109\/INFCOM.2013.6566975"},{"key":"680_CR37","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.ins.2014.03.130","volume":"279","author":"H-C Lin","year":"2014","unstructured":"Lin H-C, Lin T-M, Wu C-F (2014) Constructing application-layer multicast trees for minimum-delay message distribution. Inf Sci 279:433\u2013445","journal-title":"Inf Sci"},{"key":"680_CR38","doi-asserted-by":"crossref","unstructured":"Li Y, Cai W, Tang X (2013) Application layer multicast in P2P distributed interactive applications. In: International Conference on Parallel and Distributed Systems, pp 396\u2013403","DOI":"10.1109\/ICPADS.2013.62"},{"key":"680_CR39","doi-asserted-by":"crossref","unstructured":"Besharati R, Bag-Mohammadi M, Dezfouli MA (2010) A topology-aware application layer multicast protocol. In: Consumer communications and networking conference (CCNC). IEEE. pp 1\u20135","DOI":"10.1109\/CCNC.2010.5421721"},{"issue":"1","key":"680_CR40","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.compeleceng.2012.07.002","volume":"39","author":"J Cui","year":"2013","unstructured":"Cui J, Xiong N, Park JH, Jia K, Wu L (2013) A novel and efficient source-path discovery and maintenance method for application layer multicast. Comput Electr Eng 39(1):67\u201375","journal-title":"Comput Electr Eng"},{"key":"680_CR41","doi-asserted-by":"crossref","unstructured":"Wydrych P, Cholda P (2011) ISP - Supported traffic reduction for Application-Level multicast. In: IEEE International Conference on Communications, pp 1\u20136","DOI":"10.1109\/icc.2011.5962457"},{"key":"680_CR42","doi-asserted-by":"crossref","unstructured":"Picconi F, Massoulie L (2009) ISP Friend Or Foe? Making P2P Live Streaming ISP-aware. In: IEEE International Conference on Distributed Computing Systems, pp 413\u2013422","DOI":"10.1109\/ICDCS.2009.37"},{"key":"680_CR43","unstructured":"Graph Library http:\/\/algs4.cs.princeton.edu\/41graph\/SymbolGraph.java.html , as seen in 2017"},{"key":"680_CR44","unstructured":"Graphs data structures for library, http:\/\/algs4.cs.princeton.edu\/ , as seen in 2017"},{"key":"680_CR45","unstructured":"PRIM algorithm, http:\/\/www.geeksforgeeks.org\/greedy-algorithms-set-5-prims-minimum-spanning-tree-mst-2\/ , as seen in 2017"},{"key":"680_CR46","unstructured":"CORE network emulator, https:\/\/www.nrl.navy.mil\/itd\/ncs\/products\/core , version 4.8"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0680-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-018-0680-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0680-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T05:04:29Z","timestamp":1605071069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-018-0680-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,27]]},"references-count":46,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["680"],"URL":"https:\/\/doi.org\/10.1007\/s12083-018-0680-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,27]]},"assertion":[{"value":"26 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}