A hybrid searching scheme in unstructured P2P networks

被引:0
|
作者
Li, XQ [1 ]
Wu, J [1 ]
机构
[1] Florida Atlantic Univ, Dept Comp Sci & Engn, Boca Raton, FL 33431 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The existing searching schemes in Peer-to-Peer (P2P) networks are either forwarding-based or non forwarding based. In forwarding-based schemes, queries are forwarded from the querying source to the query destination nodes. These schemes offer low state maintenance. However, querying sources do not entirely have control over query processing. In non forwarding based methods, queries are not forwarded, and the querying source directly probes its neighbors for the desired files. Non forwarding searching provides querying sources flexible control over the searching process at the cost of high state maintenance. In this paper, we seek to combine the powers of both forwarding and non forwarding searching schemes. We propose an approach where the querying source directly probes its own extended neighbors and forwards the query to a subset of its extended neighbors and guides these neighbors to probe their own extended neighbors on its behalf. Our approach can adapt query processing to the popularity of the sought files without having to maintain a large set of neighbors because its neighbors' neighbors are also in the searching scope due to the 1-hop forwarding inherent in our approach. It achieves a higher query efficiency than the forwarding scheme and a better success rate than the non forwarding approach. To the best of our knowledge, the work in this paper is the first one to combine forwarding and non forwarding P2P searching schemes. Experimental results demonstrate the effectiveness of our approach.
引用
收藏
页码:277 / 284
页数:8
相关论文
共 50 条
  • [41] ITA: Innocuous Topology Awareness for Unstructured P2P Networks
    Papadakis, Harris
    Fragopoulou, Paraskevi
    Markatos, Evangelos P.
    Roussopoulos, Mema
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (08) : 1589 - 1601
  • [42] A novel efficient search algorithm in unstructured P2P networks
    Guan, Zhitao
    Cao, Yuanda
    Hou, Xiangsong
    Zhu, Dongfeng
    [J]. SECOND WORKSHOP ON DIGITAL MEDIA AND ITS APPLICATION IN MUSEUM & HERITAGE, PROCEEDINGS, 2007, : 275 - 280
  • [43] Scalable Secure Routing for Heterogeneous Unstructured P2P Networks
    Kraxberger, Stefan
    [J]. PROCEEDINGS OF THE 19TH INTERNATIONAL EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2011, : 619 - 626
  • [44] Comparative Analysis of Unstructured P2P File Sharing Networks
    Mehr-un-Nisa
    Ashraf, Fasiha
    Naseer, Ateeqa
    Iqbal, Shaukat
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2019), 2019, : 148 - 153
  • [45] Active Worm Propagation Modeling in Unstructured P2P Networks
    Zhang, Xiaosong
    Chen, Ting
    Zheng, Jiong
    Li, Hua
    [J]. PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 35 - 38
  • [46] SKIP: An efficient search mechanism in unstructured P2P networks
    Shen W.-W.
    Su S.
    Shuang K.
    Yang F.-C.
    [J]. Journal of China Universities of Posts and Telecommunications, 2010, 17 (05): : 64 - 71
  • [47] Improved Degree Search Algorithms in Unstructured P2P Networks
    Liu, Guole
    Peng, Haipeng
    Li, Lixiang
    Yang, Yixian
    Luo, Qun
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2012, 2012
  • [48] Fast quarantining of proactive worms in unstructured P2P networks
    Chen, Ting
    Zhang, Xiao-song
    Li, Hua
    Li, Xiong-da
    Wu, Yue
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) : 1648 - 1659
  • [49] Bandwidth trading in unstructured P2P content distribution networks
    Eger, Kolja
    Killat, Ulrich
    [J]. SIXTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2006, : 39 - +
  • [50] Securing overlay activities of peers in unstructured P2P networks
    Park, Jun-Cheol
    Yu, Geonu
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1105 - 1108