A dependable cluster-based topology in P2P networks

被引:0
|
作者
Wei G. [1 ]
Ling Y. [1 ]
Gu Y. [1 ]
Ge Y. [1 ]
机构
[1] School of Computer Science and Information Engineering, Zhejiang Gongshang University, Hangzhou
来源
Journal of Communications | 2010年 / 5卷 / 01期
关键词
Cluster; Complete rate; Heavy-tail; Topology control; Unstructured P2P network;
D O I
10.4304/jcm.5.1.57-62
中图分类号
学科分类号
摘要
Unstructured peer-to-peer network is a prevalent model in current P2P networks. In general, unstructured P2P model divides the sharing file into many chunks. A peer must search the positions before downloads a chunk. Since a peer does not know the global topology of the overlay network and the distributions of the wanted chunks, what he can do is flooding chunk queries without a proper order when search and download chunks. Additionally, some peers may behavior selfish: leaves network after completed downloading, downloads but not (or limit) its upload. So, the heavy-tail (or long-tail) phenomenon always exists in the unstructured peer-to-peer networks. Some peers cannot complete their download tasks for the scarcity of certain chunks. By combining topology-control and priority-order, this paper proposes a cluster-based model solve the heavy-tail problem. It analyzes the distribution of file chunks and increases the replication speed of the rarest chunks transmitted among the group. Our simulation experiments show the proposed model provide a dependent network topology for a P2P system, and it helps to transmit the rarest chunk efficiently and improve the overall download completion rate. © 2010 Academy Publisher.
引用
收藏
页码:57 / 62
页数:5
相关论文
共 50 条
  • [41] Worm detection system based on P2P networks
    Tang, Haokun
    Liu, Yanbing
    Huang, Jun
    Xiao, Yunpeng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 230 - 235
  • [42] An Anonymity Scheme Based on Pseudonym in P2P Networks
    Peng Hao
    Lu Songnian
    Li Jianhua
    Zhang Aixin
    Zhao Dandan
    CHINA COMMUNICATIONS, 2010, 7 (06) : 157 - 160
  • [43] Load Balancing in DHT based P2P Networks
    Rahman, Md. Ahsanur
    PROCEEDINGS OF ICECE 2008, VOLS 1 AND 2, 2008, : 920 - 923
  • [44] MoDast: A MoD system based on P2P networks
    Chen, Y
    Dai, QH
    GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 843 - 846
  • [46] A group based reputation system for P2P networks
    Tian, Huirong
    Zou, Shihong
    Wang, Wendong
    Cheng, Shiduan
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 342 - 351
  • [47] Media streaming in P2P networks based on BitTorrent
    Charls, Ankit
    Sharma, Tushar
    Singh, P. K.
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 169 - 173
  • [48] Choosing Partners Based on Availability in P2P Networks
    Le Blond, Stevens
    Le Fessant, Fabrice
    Le Merrer, Erwan
    ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2012, 7 (02)
  • [49] Credibility Based Reputation Calculation in P2P Networks
    Prasad, R. V. V. S. V.
    Srinivas, Vegi
    Kumari, V. Valli
    Raju, K. V. S. V. N.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2008, 5375 : 188 - +
  • [50] Availability in P2P based Online Social Networks
    Shahriar, Nashid
    Chowdhury, Shihabur Rahman
    Ahmed, Reaz
    Sharmin, Mahfuza
    Boutaba, Raouf
    Mathieu, Bertrand
    PROCEEDINGS OF 2017 4TH INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 29 - 37