Two-layer hybrid peer-to-peer networks (original) (raw)
Access this article
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime View plans
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
References
- Wolff R, Schuster A (2004) Association rule mining in peer-to-peer systems. IEEE Trans Syst Man Cybern B Cybern 34:2426–2438
Article Google Scholar - Shen H, Liu G (2013) A lightweight and cooperative multifactor considered file replication method in structured P2P systems. IEEE Trans Comput 62:2115–2130
Article MathSciNet MATH Google Scholar - Gnutella. http://www.gnutella.com
- Tu X, Jin H, Cao J, Guo S, Zheng L, Lv Z (2013) An efficient data scheduling scheme for P2P storage-constrained IPTV system. IEEE Trans Syst Man Cybern Syst 43:379–389
Article Google Scholar - Chen M, Ponec M, Sengupta S, Li J, Chou A (2012) Utility maximization in peer-to-peer systems with applications to video conferencing. IEEE/ACM Trans Networking 20:1681–1694
Article Google Scholar - Ghanea-Hercock A, Wang F, Sun Y (2006) Self-organizing and adaptive peer-to-peer network. IEEE Trans Syst Man Cybern B Cybern 36:1230–1236
Article Google Scholar - Pitoura E, Abiteboul S, Pfoser D, et al. (2003) DBGlobe: a service-oriented P2P system for global computing. ACM Sigmod Record 32:77–82
Article Google Scholar - Napster. http://www.napster.com
- Blond S, Fessant F, Merrer E (2012) Choosing partners based on availability in P2P networks. ACM Trans Auton Adapt Syst 7(25)
- LimeWire Website http://www.limewire.com
- Lewthwaite J (2012) FrostWire P2P forensic examinations[J]. Digit Investig
- BearShare Website. http://en.wikipedia.org/wiki/BearShare
- Chen H, Jin H, Luo X, Liu Y, Gu T, Chen K, Ni M (2012) BloomCast: efficient and effective full-text retrieval in unstructured P2P networks. IEEE Trans Parallel Distrib Syst 23:232–241
Article Google Scholar - Hsiao H, Su H (2012) On optimizing overlay topologies for search in unstructured peer-to-peer networks. IEEE Trans Parallel Distrib Syst 23:924–935
Article Google Scholar - Suto K, Nishiyama H, Kato N, Nakachi T, Fujii T, Takahara A (2013) THUP: a P2P network robust to churn and DoS attack based on bimodal degree distribution. IEEE J Sel Areas Commun 31:247–256
Article Google Scholar - Li J, Chao C (2010) An efficient P2P content distribution system based on altruistic demand and recoding dissemination. IEEE Trans Syst Man Cybern Syst Hum 40:1083–1093
Article Google Scholar - Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for Internet applications. In: Proceedings of the 2001 SIGCOMM conference, pp 149–160
- Ratnasamy S, Francis P, Handley M, Karp R, Shenker S (2001) A scalable content-addressable network. In: Proceedings of the 2001 SIGCOMM conference, pp 161–172
- Rowstron A, Druschel P (2001) Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Proceedings of the 18th IFIP/ACM international conference on distributed systems platforms, pp 329–350
- Zhao B, Kubiatowicz J, Joseph A (2001) Tapestry: an infrastructure for fault-tolerant wide-area location and routing, Report NO: CSD-01-1141, Computer Science Division
- Mittal P, Borisov N (2012) Information leaks in structured peer-to-peer anonymous communication systems. ACM Trans Inf Syst Secur 15:267–278
Article Google Scholar - Giordanelli R, Mastroianni C, Meo M (2012) Bio-inspired P2P systems: the case of multidimensional overlay. ACM Trans Auton Adapt Syst 7(35)
- KaZaA http://www.kazaa.com/
- Cohen B (2005) The BitTorrent protocol specification[EB/OL]. http://bitconjurer.org/BitTorrent/protocol.html
- Kulbak Y, Bickson D (2005) The eMule protocol specification[EB/OL], http://www.cs.huji.ac.il/labs/danss/presentations/emule.pdf
- Xu Z, Hu Y (2003) SBARC: a supernode based peer-to-peer file sharing system. In: Proceedings of ISCC 2003, pp 1053–1058
- Ganesan P, Gummadi K, Garcia-Molina H (2004) Canon in G major: designing DHTs with hierarchical structure. In: Proceedings of the 24th International Conference on Distributed Computing Systems, pp 263–272
- Peng Z, Duan Z, Qi J, Cao Y, Lv E (2007) HP2P: a hybrid hierarchical P2P network. In: Proceedings of the first international conference on the digital society, p 18
- Lv E, Duan Z, Qi J, Cao Y, Peng Z (2007) Incorporating clusters into hybrid P2P network. In: Proceedings of the first international conference on the digital society, p 17
- Cao Y, Duan ZH, Qi JJ, Peng Z, Lv ET (2006) Implementing chord for HP2P network. In: OTM workshops 2006, pp 1480–1489
- Wang L, Duan ZH, Wang B (2008) The performance of HP2P. In: In the proceedings of ICPCA08, pp 959–964
- Wang B, Duan ZH, Wang L (2008) Kapa: a file sharing system based on HP2P. In: Proceedings of ICIW08, pp 403–409
- Glendenning L, Beschastnikh I, Krishnamurthy A, Anderson TE (2011) Scalable consistency in scatter. In: Proceedings of the 23rd SOSP, pp 15–28
- Liang J, Kumar R, Ross KW Understanding KaZaA, http://cis.poly.edu/ross/papers/UnderstandingKaZaA.pdf
- Garcés-Erice L, Biersack EW, Felber PA, Ross KW, Urvoy-Keller G (2003) Hierarchical peer-to-peer systems. World Scientific 13:543–657
MathSciNet Google Scholar - Lu E, Huang Y, Lu S (2009) ML-Chord: a multi-layered P2P resource sharing model. J Netw Comput Appl 32:578– 588
Article Google Scholar - Castro M, Druschel P, Hu YC, Rowstron A (2002) Exploiting network proximity in peer-to-peer overlay networks, MSR-TR-2002-82
- Doyen G, Nataf E, Festor O (2005) A hierarchical architecture for a distributed management of P2P networks and services. Ambient Netw 3775:257–268
Article Google Scholar - Voulgaris S, Jelasity M, Steen MV (2005) A robust and scalable peer-to-peer gossip protocol. Agents and Peer-to-Peer Computing 2872:47–58
Article MATH Google Scholar - Karger D, Lehman E, Leighton T, Levine M, Lewin D, Panigrahy R (1997) Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web. In: Proceedings of the 29th annual ACM symposium on theory of computing, pp 654–663
- Secure Hash Standard (1995) U. S. Department of Commerce/NIST. National Technical Information Service, Springfield
Google Scholar - Lin MJ, Marzullo K, Masini S (2000) Gossip versus DeterministicallyConstrained flooding on small networks. Distrib Comput 1914:85–89
MATH Google Scholar - PeerSim, http://sourceforge.net/projects/peersim/