Hi,
Ok, I shall rephrase the question to avoid confusion. Its MAN not WAN, also
same LAN/MAN. sorry.
Basically, I require some statistics like, "x% of all internet nodes have at
least  y other  internet nodes in the same  LAN/MAN".
I want know the extent to which groups with high bandwidth connection among
each other ( in same LAN/MAN) exists in the internet.

Sincerely,
Harisankar H

---------- Forwarded message ----------
> From: David Barrett <dbarr...@quinthar.com>
> To: theory and practice of decentralized computer networks <
> p2p-hackers@lists.zooko.com>
> Date: Sun, 03 May 2009 12:08:51 -0700
> Subject: Re: [p2p-hackers] Fraction of internet nodes connected to each
> other through LAN and WANs
> I'm not sure if I understand the question, but wouldn't the answer
> tautologically be 100%?
>
> In other words, aren't 100% of internet nodes connected to each other
> through a series of LANs and WANs, by definition?
>
> Or you could state it as "100% of all internet nodes are connected to 100%
> of all other internet nodes through LAN/WAN", with the caveat that some
> interconnections are restricted by proxies, firewalls, and temporary
> outages.
>
> I'm guessing this isn't the answer you're looking for, however.  Can you
> restate the question to resolve my confusion?
>
> -david
>
> hari sankar wrote:
>
>> Hi,
>> I am working in the area of peer-to-peer search. I need to know what
>> fraction of internet nodes are connected to each other through LAN and WANs
>> also. Basically, I require some statistics like, "x% of all internet nodes
>> are connected to at least  y  other  internet nodes through LAN/WAN".
>>
>> Kindly inform if you know some work which estimates this or some related
>> information.
>>
>> Thank you,
>> Harisankar H
>> MS Scholar,
>> Distributed and Object Systems Lab,
>> http://dos.iitm.ac.in
>> Indian Institute of Technology, Madras
>>
>>
>> ------------------------------------------------------------------------
>>
>> _______________________________________________
>> p2p-hackers mailing list
>> p2p-hackers@lists.zooko.com
>> http://lists.zooko.com/mailman/listinfo/p2p-hackers
>>
>
>
>
>
> ---------- Forwarded message ----------
> From: Eros Pedrini <pedrini...@unimi.it>
> To: p2p-hackers@lists.zooko.com
> Date: Mon, 04 May 2009 12:15:14 +0200
> Subject: [p2p-hackers] STM 2009 - Call for Papers
>       [Apologies if you receive multiple copies of this message]
>
> ----------------------------------------------------------------------
>
>                           CALL FOR PAPERS
>
> 5th International Workshop on Security and Trust Management (STM 2009)
>              Saint Malo, France -- September 24-25, 2009
>                       http://stm09.dti.unimi.it
>
> ----------------------------------------------------------------------
>
> STM (Security and Trust Management) is a established working group of
> ERCIM (European Research Consortium in Informatics and Mathematics).
> STM 2009 is the fifth workshop in this series and will be held in Saint
> Malo, France, in conjunction with ESORICS 2009 (14th European Symposium
> on Research in Computer Security). STM has the following aims:
>
> - to investigate the foundations and applications of security and trust
>  in ICT;
> - to study the deep interplay between trust management and common
>  security issues such as confidentiality, integrity, and availability;
> - to identify and promote new areas of research connected with security
>  management (e.g. dynamic and mobile coalition management, P2P, MANETs,
>  Web/GRID services);
> - to identify and promote new areas of research connected with trust
>  management (e.g., reputation, recommendation, and collaboration);
> - to provide a platform for presenting and discussing emerging ideas and
>  trends.
>
> Topics of interest include, but are not limited to:
>
> - access control
> - cryptography
> - data protection
> - digital right management
> - economics of security and privacy
> - key management
> - ICT for securing digital as well as physical assets
> - identity management
> - networked systems security
> - privacy and anonymity
> - reputation systems and architectures
> - security and trust management architectures
> - semantics and computational models for security and trust
> - trust assessment and negotiation
> - trust in mobile code
> - trust in pervasive environments
> - trust models
> - trust management policies
> - trusted platforms and trustworthy systems
> - trustworthy user devices
>
> The primary focus is on high-quality original unpublished research, case
> studies, and implementation experiences. We encourage submissions
> discussing the application and deployment of security technologies in
> practice.
>
> PAPER SUBMISSIONS
> Submitted papers must not substantially overlap papers that have been
> published or that are simultaneously submitted to a journal or a
> conference with proceedings. Papers should be at most 12 pages in ENTCS
> style format (using the generic template), including the bibliography
> and well-marked appendices. Committee members are not required to read
> the appendices, and so the paper should be intelligible without them.
> Submissions are to be made to the submission web site (to be announced).
> Only pdf files will be accepted. Submissions not meeting these
> guidelines risk rejection without consideration of their merits. Papers
> must be received by the deadline of June 21, 2009. Authors of accepted
> papers must guarantee that their papers will be presented at the
> workshop. Accepted papers will be published in a post-workshop ENTCS
> volume.
>
> GENERAL CHAIR
> Christian Jensen
> Technical University of Denmark, Denmark
>
> PROGRAM CHAIRS
> Sabrina De Capitani di Vimercati
> Universita' degli Studi di Milano, Italy
>
> Ralf Kusters
> University of Trier, Germany
>
> PUBLICATION CHAIR
> Claudio A. Ardagna
> Universita' degli Studi di Milano, Italy
>
> PUBLICITY CHAIR
> Eros Pedrini
> Universita' degli Studi di Milano, Italy
>
> IMPORTANT DATES
> Paper Submission due: June 21, 2009
> Notification to authors: July 27, 2009
> Camera ready due: August 17, 2009
>
> PROGRAM COMMITTEE
> TBA
>
>
> This call for papers and additional information about the conference
> can be found at http://stm09.dti.unimi.it
>
>
>
>
> ---------- Forwarded message ----------
> From: "VolodyA! V Anarhist" <volo...@whengendarmesleeps.org>
> To: seth.john...@realmeasures.dyndns.org, theory and practice of
> decentralized computer networks <p2p-hackers@lists.zooko.com>
> Date: Mon, 04 May 2009 10:54:58 +0100
> Subject: Re: [p2p-hackers] ISOC-Philippines on Pirate Bay, Dr. Potel
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Seth Johnson wrote:
> >>
> http://isoc.ph/portal/2009/04/isoc-philippines-statement-on-pirate-bay-and-potel/
>
> Thanks for posting. Will definitely be cited in the intro of my thesis.
>
>           - Volodya
>
>
>
> - --
> http://freedom.libsyn.com/       Echo of Freedom, Radical Podcast
> http://eng.anarchopedia.org/     Anarchopedia, A Free Knowledge Portal
> http://www.freedomporn.org/      Freedom Porn, anarchist and activist smut
>
>  "None of us are free until all of us are free."    ~ Mihail Bakunin
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iEYEARECAAYFAkn+u3IACgkQuWy2EFICg+1bgACguCme6jta6OLgQhvDKNSVlMpG
> N+gAoJW+Z/OCcpJhka57lLrLXGDMd56L
> =6gLq
> -----END PGP SIGNATURE-----
>
>
>
> _______________________________________________
> p2p-hackers mailing list
> p2p-hackers@lists.zooko.com
> http://lists.zooko.com/mailman/listinfo/p2p-hackers
>
>
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to