SlideShare a Scribd company logo
Conference on Future Internet
Communications 2013
Guaranteed Greedy Routing in
Overlay Networks
Dragan Milic and Torsten Braun
Universität Bern, Switzerland
braun@iam.unibe.ch, cds.unibe.ch
Overview
> Introduction
— Motivation
— Greedy Routing in Virtual Spaces
— Greedy Routing Failure
> Overlay Network Construction for Greedy Routing
— Nearest Neighbours Convex Set (NNCS)
— Algorithm for NNCS Maintenance
— NNCS Robustness
— Routing Optimization
> NNCS Applications
— Building of Multicast Trees
— Service Discovery
— Spatially Bound Query Flooding
— Network Optimization / QoS
> Evaluation: Relative Path Stretch
> Conclusions
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
2
Motivation
> Overlay network construction does often not consider
underlying network topology.
> Overlay network routing protocols
— optimize number of hops along the path, but
— disregard paths’ RTT stretch
= actual RTT on the path through the overlay network
RTT along the optimal path in the underlying network
> Proposal: apply greedy routing in virtual spaces,
where distance between nodes is proportional to their RTT
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
3
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
4
Positioning Hosts in a Virtual Space
Host 1
Host 2
Host 8
Host 3
Host 5
Host 7
Host 4
Host 6
Physical Network
Virtual Space
Host 1
Host 8
Host 2
Host 3
Host 7
Host 4
Host 5
Host 6
x
y
Greedy Routing in Virtual Spaces
> Next hop =
neighbour with minimal
distance to destination
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
5
Greedy Routing Failure
> Problem
— There might not always be
a neighbour closer to the
destination.
> Solutions
— For geographical routing in
mobile ad-hoc networks:
backup routing modes,
e.g., using right-hand rule
in GPSR
— For overlay networks:
construct an overlay
network that ensures to
have always a neighbour
closer to the destination
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
6
Overlay Network Construction
for Greedy Routing
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
7
> Delaunay triangulation
— can ensure existence of
closer neighbours towards
destination,
— but distributed approach is
complex.
> Solution
— Nearest Neighbors
Convex Set (NNCS)
is based on dividing the
virtual space into half spaces.
Current Node
Neighbour Node
Half Space
Nearest Neighbours Convex Set (NNCS)
> Construct half spaces
for all neighbours of a node
> NNCS
— is a convex set
defined by intersection of
all half spaces.
— guarantees that
greedy routing makes
progress at each node.
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
8
Current Node
Neighbour Node
Other Nodes
Half Space
Algorithm for NNCS Maintenance
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
9
NNCS Robustness
> Problem
— In case of churns or
failures, NNCS may lead to
routing failures or isolated
nodes.
> Solution
— Add second NNCS layer by
constructing a NNCS without
considering the nodes in the
first layer of the NNCS
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
10
Routing Optimization
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
11
> Problem
— NNCS selects close
neighbours, which leads to many
hops.
— Fisheye overlay network with a
mix of close and distant
neighbours, but greedy routing
using a Fisheye overlay network
does not guarantee progress.
> Solution
— maintain NNCS and Fisheye
overlay network sets
— select next hop making most
progress from both node sets
D. Milic, T. Braun: “Fisheye: Topology aware
choice of peers for overlay networks”,
34th IEEE Local Computer Networks, 2009
Applications
> Building of Multicast Trees
> Service Discovery
> Spatially Bound Query Flooding
> Network Optimization / QoS
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
12
Building of Multicast Trees
> Reverse path multicast routing
> Node R forwards a received
multicast message to all
nodes that would use R
for routing a unicast
message to the source
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
13
Service Discovery
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
14
> Problem
— Service discovery is
usually based on flooding.
— Efficient flooding
mechanisms
> Solution
— Forwarding of query
message along reverse path
Query Source
End Systems
with Query Source
in their NNCS
Other Nodes
Flooding Path
Spatially Bound Query Flooding
> Queries can easily bound
within a certain area, e.g.,
a hyper ball, to ensure RTT
between query source and
server.
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
15
Query Source
End Systems
with Query Source
in their NNCS
Other Nodes
Flooding Path
Network Optimization / QoS
> Paths fulfilling RTT / QoS
requirements must be within
an ellipsoid around source
and destination.
> Ellipsoid as bounding area
for path to be selected.
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
16
Relative Path Stretch
> NNCS evaluation using OMNET++
> Different data sets
— PlanetLab data for 217 overlay nodes
— KING data for 462 overlay nodes
> Comparison of NNCS using different
virtual space dimensions with Pastry
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
17
Conclusions
> NNCS enables greedy routing in overlay networks using
virtual space embedding.
> Various applications can take advantage of NNCS.
> NNCS based approach outperforms Pastry.
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
18
Thanks for your Attention !
> cds.unibe.ch
> slideshare.net/torstenbraun
> braun@iam.unibe.ch
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
CFIC, Coimbra, May 16, 2013 19

More Related Content

PDF
Easily Deployable A4 Wireless Mesh Networks
PPTX
Content-Centric Networking in Opportunistic and Mobile Networks
PPTX
Information-Centric Networking in Mobile Networks
PPTX
June 28 Presentation
PDF
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
PDF
Evaluation of a topological distance
PDF
Literature Review: Convey the Data in Massive Parallel Computing
DOC
Stochastic bandwidth estimation in networks with random service
Easily Deployable A4 Wireless Mesh Networks
Content-Centric Networking in Opportunistic and Mobile Networks
Information-Centric Networking in Mobile Networks
June 28 Presentation
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
Evaluation of a topological distance
Literature Review: Convey the Data in Massive Parallel Computing
Stochastic bandwidth estimation in networks with random service

What's hot (19)

PPT
Caching in Information Centric Network (ICN)
PDF
Cm32996999
PPTX
Named Data Networking
PDF
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
PDF
A Systematic Review of Congestion Control in Ad Hoc Network
PDF
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
PDF
Congestion control, routing, and scheduling 2015
PDF
Content centric networks
PPTX
Information Centric Networking and Content Addressability
PDF
Named data networking. Basic Principle
PDF
Optimal Converge cast Methods for Tree- Based WSNs
PDF
I1102014953
PDF
M.Phil Computer Science Wireless Communication Projects
PPTX
QOD PHASE-1 FINAL PPT
PPTX
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
PPTX
Link Capacity Estimation in SDN-based End-hosts
PDF
M.E Computer Science Wireless Communication Projects
PDF
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
PDF
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Caching in Information Centric Network (ICN)
Cm32996999
Named Data Networking
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
A Systematic Review of Congestion Control in Ad Hoc Network
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Congestion control, routing, and scheduling 2015
Content centric networks
Information Centric Networking and Content Addressability
Named data networking. Basic Principle
Optimal Converge cast Methods for Tree- Based WSNs
I1102014953
M.Phil Computer Science Wireless Communication Projects
QOD PHASE-1 FINAL PPT
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
Link Capacity Estimation in SDN-based End-hosts
M.E Computer Science Wireless Communication Projects
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Ad

Viewers also liked (11)

PDF
Internet of Things and Future Internet
PPTX
Collaborations with U Coimbra and BME
PPTX
Soziale Netze – Einsatzmöglichkeiten der Zukunft
PPTX
Real-World Energy Measurements of a Wireless Mesh Network
PPT
Mobile transport layer
PPTX
TCP Performance Optimizations for Wireless Sensor Networks
PPT
ad-hoc network by divyajyothi
PDF
TCP over wireless slides
PDF
Inter-Cell Interference Coordination in Heterogeneous Networks with Open Ac...
PDF
IT6601 MOBILE COMPUTING
PDF
IoT architecture
Internet of Things and Future Internet
Collaborations with U Coimbra and BME
Soziale Netze – Einsatzmöglichkeiten der Zukunft
Real-World Energy Measurements of a Wireless Mesh Network
Mobile transport layer
TCP Performance Optimizations for Wireless Sensor Networks
ad-hoc network by divyajyothi
TCP over wireless slides
Inter-Cell Interference Coordination in Heterogeneous Networks with Open Ac...
IT6601 MOBILE COMPUTING
IoT architecture
Ad

Similar to Guaranteed Greedy Routing in Overlay Networks (20)

PDF
Geographic routing : Notes
PDF
Ce24539543
PDF
Fuessler wkmh03
DOCX
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Cost effective resource allocation of over...
DOCX
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Cost effective resource allocatio...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
PDF
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
DOCX
Virtual Position based Olsr Protocol for Wireless Sensor Networks
DOCX
Bahg back bone-assisted hop greedy routing for vanet’s city environments
DOCX
cost effective resource allocation of overlay routing relay nodes
PPTX
CN-UNIT-3 __Network Layer (2).pptx
PPTX
Computer networks for cse Unit-3 (1).pptx
PPTX
Module 3 Part B - computer networks module 2 ppt
PPTX
NETWORK LAYER PRESENTATION IP ADDRESSING UNIT-3.pptx
PPTX
Vanet Presentation
PPTX
Computer Network - Unicast Routing Distance vector Link state vector
PPTX
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
PDF
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
PPT
Geo-Rtg-Sp-10.ppt
Geographic routing : Notes
Ce24539543
Fuessler wkmh03
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
IEEE 2014 JAVA NETWORKING PROJECTS Cost effective resource allocation of over...
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Cost effective resource allocatio...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Bahg back bone-assisted hop greedy routing for vanet’s city environments
cost effective resource allocation of overlay routing relay nodes
CN-UNIT-3 __Network Layer (2).pptx
Computer networks for cse Unit-3 (1).pptx
Module 3 Part B - computer networks module 2 ppt
NETWORK LAYER PRESENTATION IP ADDRESSING UNIT-3.pptx
Vanet Presentation
Computer Network - Unicast Routing Distance vector Link state vector
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Geo-Rtg-Sp-10.ppt

More from Torsten Braun, Universität Bern (14)

PPTX
Ic0906 wi-uav UAVNet
PPTX
Die Evolution des Internet
PPTX
Information-Centric Networking in Wireless/Mobile Networks
PPTX
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
PPTX
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
PPTX
Future Mobile Telecommunication Networks Using Cloud Technologies
PPTX
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
PPTX
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
PPTX
Topology Control and Mobility Strategy for UAV Ad-hoc Networks
PPTX
Content-Centric Networking in Delay/Disruption-Tolerant Networks
PPT
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
PPTX
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
PPTX
Research Challenges in Networked Systems
PPTX
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
Ic0906 wi-uav UAVNet
Die Evolution des Internet
Information-Centric Networking in Wireless/Mobile Networks
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
Future Mobile Telecommunication Networks Using Cloud Technologies
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Topology Control and Mobility Strategy for UAV Ad-hoc Networks
Content-Centric Networking in Delay/Disruption-Tolerant Networks
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
Research Challenges in Networked Systems
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
KodekX | Application Modernization Development
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
NewMind AI Monthly Chronicles - July 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
Encapsulation_ Review paper, used for researhc scholars
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
Understanding_Digital_Forensics_Presentation.pptx

Guaranteed Greedy Routing in Overlay Networks

  • 1. Conference on Future Internet Communications 2013 Guaranteed Greedy Routing in Overlay Networks Dragan Milic and Torsten Braun Universität Bern, Switzerland braun@iam.unibe.ch, cds.unibe.ch
  • 2. Overview > Introduction — Motivation — Greedy Routing in Virtual Spaces — Greedy Routing Failure > Overlay Network Construction for Greedy Routing — Nearest Neighbours Convex Set (NNCS) — Algorithm for NNCS Maintenance — NNCS Robustness — Routing Optimization > NNCS Applications — Building of Multicast Trees — Service Discovery — Spatially Bound Query Flooding — Network Optimization / QoS > Evaluation: Relative Path Stretch > Conclusions CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 2
  • 3. Motivation > Overlay network construction does often not consider underlying network topology. > Overlay network routing protocols — optimize number of hops along the path, but — disregard paths’ RTT stretch = actual RTT on the path through the overlay network RTT along the optimal path in the underlying network > Proposal: apply greedy routing in virtual spaces, where distance between nodes is proportional to their RTT CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 3
  • 4. CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 4 Positioning Hosts in a Virtual Space Host 1 Host 2 Host 8 Host 3 Host 5 Host 7 Host 4 Host 6 Physical Network Virtual Space Host 1 Host 8 Host 2 Host 3 Host 7 Host 4 Host 5 Host 6 x y
  • 5. Greedy Routing in Virtual Spaces > Next hop = neighbour with minimal distance to destination CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 5
  • 6. Greedy Routing Failure > Problem — There might not always be a neighbour closer to the destination. > Solutions — For geographical routing in mobile ad-hoc networks: backup routing modes, e.g., using right-hand rule in GPSR — For overlay networks: construct an overlay network that ensures to have always a neighbour closer to the destination CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 6
  • 7. Overlay Network Construction for Greedy Routing CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 7 > Delaunay triangulation — can ensure existence of closer neighbours towards destination, — but distributed approach is complex. > Solution — Nearest Neighbors Convex Set (NNCS) is based on dividing the virtual space into half spaces. Current Node Neighbour Node Half Space
  • 8. Nearest Neighbours Convex Set (NNCS) > Construct half spaces for all neighbours of a node > NNCS — is a convex set defined by intersection of all half spaces. — guarantees that greedy routing makes progress at each node. CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 8 Current Node Neighbour Node Other Nodes Half Space
  • 9. Algorithm for NNCS Maintenance CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 9
  • 10. NNCS Robustness > Problem — In case of churns or failures, NNCS may lead to routing failures or isolated nodes. > Solution — Add second NNCS layer by constructing a NNCS without considering the nodes in the first layer of the NNCS CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 10
  • 11. Routing Optimization CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 11 > Problem — NNCS selects close neighbours, which leads to many hops. — Fisheye overlay network with a mix of close and distant neighbours, but greedy routing using a Fisheye overlay network does not guarantee progress. > Solution — maintain NNCS and Fisheye overlay network sets — select next hop making most progress from both node sets D. Milic, T. Braun: “Fisheye: Topology aware choice of peers for overlay networks”, 34th IEEE Local Computer Networks, 2009
  • 12. Applications > Building of Multicast Trees > Service Discovery > Spatially Bound Query Flooding > Network Optimization / QoS CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 12
  • 13. Building of Multicast Trees > Reverse path multicast routing > Node R forwards a received multicast message to all nodes that would use R for routing a unicast message to the source CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 13
  • 14. Service Discovery CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 14 > Problem — Service discovery is usually based on flooding. — Efficient flooding mechanisms > Solution — Forwarding of query message along reverse path Query Source End Systems with Query Source in their NNCS Other Nodes Flooding Path
  • 15. Spatially Bound Query Flooding > Queries can easily bound within a certain area, e.g., a hyper ball, to ensure RTT between query source and server. CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 15 Query Source End Systems with Query Source in their NNCS Other Nodes Flooding Path
  • 16. Network Optimization / QoS > Paths fulfilling RTT / QoS requirements must be within an ellipsoid around source and destination. > Ellipsoid as bounding area for path to be selected. CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 16
  • 17. Relative Path Stretch > NNCS evaluation using OMNET++ > Different data sets — PlanetLab data for 217 overlay nodes — KING data for 462 overlay nodes > Comparison of NNCS using different virtual space dimensions with Pastry CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 17
  • 18. Conclusions > NNCS enables greedy routing in overlay networks using virtual space embedding. > Various applications can take advantage of NNCS. > NNCS based approach outperforms Pastry. CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 18
  • 19. Thanks for your Attention ! > cds.unibe.ch > slideshare.net/torstenbraun > braun@iam.unibe.ch Torsten Braun: Guaranteed Greedy Routing in Overlay Networks CFIC, Coimbra, May 16, 2013 19