Hi, Ok, I shall rephrase the question to avoid confusion. Its MAN not WAN, also same LAN/MAN. sorry. Basically, I require some statistics like, "x% of all internet nodes have at least y other internet nodes in the same LAN/MAN". I want know the extent to which groups with high bandwidth connection among each other ( in same LAN/MAN) exists in the internet.
Sincerely, Harisankar H ---------- Forwarded message ---------- > From: David Barrett <dbarr...@quinthar.com> > To: theory and practice of decentralized computer networks < > p2p-hackers@lists.zooko.com> > Date: Sun, 03 May 2009 12:08:51 -0700 > Subject: Re: [p2p-hackers] Fraction of internet nodes connected to each > other through LAN and WANs > I'm not sure if I understand the question, but wouldn't the answer > tautologically be 100%? > > In other words, aren't 100% of internet nodes connected to each other > through a series of LANs and WANs, by definition? > > Or you could state it as "100% of all internet nodes are connected to 100% > of all other internet nodes through LAN/WAN", with the caveat that some > interconnections are restricted by proxies, firewalls, and temporary > outages. > > I'm guessing this isn't the answer you're looking for, however. Can you > restate the question to resolve my confusion? > > -david > > hari sankar wrote: > >> Hi, >> I am working in the area of peer-to-peer search. I need to know what >> fraction of internet nodes are connected to each other through LAN and WANs >> also. Basically, I require some statistics like, "x% of all internet nodes >> are connected to at least y other internet nodes through LAN/WAN". >> >> Kindly inform if you know some work which estimates this or some related >> information. >> >> Thank you, >> Harisankar H >> MS Scholar, >> Distributed and Object Systems Lab, >> http://dos.iitm.ac.in >> Indian Institute of Technology, Madras >> >> >> ------------------------------------------------------------------------ >> >> _______________________________________________ >> p2p-hackers mailing list >> p2p-hackers@lists.zooko.com >> http://lists.zooko.com/mailman/listinfo/p2p-hackers >> > > > > > ---------- Forwarded message ---------- > From: Eros Pedrini <pedrini...@unimi.it> > To: p2p-hackers@lists.zooko.com > Date: Mon, 04 May 2009 12:15:14 +0200 > Subject: [p2p-hackers] STM 2009 - Call for Papers > [Apologies if you receive multiple copies of this message] > > ---------------------------------------------------------------------- > > CALL FOR PAPERS > > 5th International Workshop on Security and Trust Management (STM 2009) > Saint Malo, France -- September 24-25, 2009 > http://stm09.dti.unimi.it > > ---------------------------------------------------------------------- > > STM (Security and Trust Management) is a established working group of > ERCIM (European Research Consortium in Informatics and Mathematics). > STM 2009 is the fifth workshop in this series and will be held in Saint > Malo, France, in conjunction with ESORICS 2009 (14th European Symposium > on Research in Computer Security). STM has the following aims: > > - to investigate the foundations and applications of security and trust > in ICT; > - to study the deep interplay between trust management and common > security issues such as confidentiality, integrity, and availability; > - to identify and promote new areas of research connected with security > management (e.g. dynamic and mobile coalition management, P2P, MANETs, > Web/GRID services); > - to identify and promote new areas of research connected with trust > management (e.g., reputation, recommendation, and collaboration); > - to provide a platform for presenting and discussing emerging ideas and > trends. > > Topics of interest include, but are not limited to: > > - access control > - cryptography > - data protection > - digital right management > - economics of security and privacy > - key management > - ICT for securing digital as well as physical assets > - identity management > - networked systems security > - privacy and anonymity > - reputation systems and architectures > - security and trust management architectures > - semantics and computational models for security and trust > - trust assessment and negotiation > - trust in mobile code > - trust in pervasive environments > - trust models > - trust management policies > - trusted platforms and trustworthy systems > - trustworthy user devices > > The primary focus is on high-quality original unpublished research, case > studies, and implementation experiences. We encourage submissions > discussing the application and deployment of security technologies in > practice. > > PAPER SUBMISSIONS > Submitted papers must not substantially overlap papers that have been > published or that are simultaneously submitted to a journal or a > conference with proceedings. Papers should be at most 12 pages in ENTCS > style format (using the generic template), including the bibliography > and well-marked appendices. Committee members are not required to read > the appendices, and so the paper should be intelligible without them. > Submissions are to be made to the submission web site (to be announced). > Only pdf files will be accepted. Submissions not meeting these > guidelines risk rejection without consideration of their merits. Papers > must be received by the deadline of June 21, 2009. Authors of accepted > papers must guarantee that their papers will be presented at the > workshop. Accepted papers will be published in a post-workshop ENTCS > volume. > > GENERAL CHAIR > Christian Jensen > Technical University of Denmark, Denmark > > PROGRAM CHAIRS > Sabrina De Capitani di Vimercati > Universita' degli Studi di Milano, Italy > > Ralf Kusters > University of Trier, Germany > > PUBLICATION CHAIR > Claudio A. Ardagna > Universita' degli Studi di Milano, Italy > > PUBLICITY CHAIR > Eros Pedrini > Universita' degli Studi di Milano, Italy > > IMPORTANT DATES > Paper Submission due: June 21, 2009 > Notification to authors: July 27, 2009 > Camera ready due: August 17, 2009 > > PROGRAM COMMITTEE > TBA > > > This call for papers and additional information about the conference > can be found at http://stm09.dti.unimi.it > > > > > ---------- Forwarded message ---------- > From: "VolodyA! V Anarhist" <volo...@whengendarmesleeps.org> > To: seth.john...@realmeasures.dyndns.org, theory and practice of > decentralized computer networks <p2p-hackers@lists.zooko.com> > Date: Mon, 04 May 2009 10:54:58 +0100 > Subject: Re: [p2p-hackers] ISOC-Philippines on Pirate Bay, Dr. Potel > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Seth Johnson wrote: > >> > http://isoc.ph/portal/2009/04/isoc-philippines-statement-on-pirate-bay-and-potel/ > > Thanks for posting. Will definitely be cited in the intro of my thesis. > > - Volodya > > > > - -- > http://freedom.libsyn.com/ Echo of Freedom, Radical Podcast > http://eng.anarchopedia.org/ Anarchopedia, A Free Knowledge Portal > http://www.freedomporn.org/ Freedom Porn, anarchist and activist smut > > "None of us are free until all of us are free." ~ Mihail Bakunin > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.9 (GNU/Linux) > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org > > iEYEARECAAYFAkn+u3IACgkQuWy2EFICg+1bgACguCme6jta6OLgQhvDKNSVlMpG > N+gAoJW+Z/OCcpJhka57lLrLXGDMd56L > =6gLq > -----END PGP SIGNATURE----- > > > > _______________________________________________ > p2p-hackers mailing list > p2p-hackers@lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers > >
_______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers