Paper Title:
A Self-Adaptive Model of Two-Level for Dynamic Peer-to-Peer Networks
  Abstract

The present thesis puts forward a hierarchical P2P model: self-adaptive P2P model of two-level. Super peers compose a self-adaptive DHT network on the top layer, and lower ordinary peers take super peer in the same group as their center server to form a cluster. Data are stored in ordinary peers and super peers hold indices of data and answer for request from ordinary peers. When super peer join or leave, it does not maintain consistency of entire network’s logic topology but only update routing table of its predecessor and successor, besides, super peers update their routing table cache when they transmit messages. The ordinary peers keep backup of super peer for system restore when super peer fails. System can optimize network structure by select peers with high capacity to be super peer and restrict amount of peers in each group.

  Info
Periodical
Key Engineering Materials (Volumes 460-461)
Edited by
Yanwen Wu
Pages
479-484
DOI
10.4028/www.scientific.net/KEM.460-461.479
Citation
F. X. Huang, Z. J. Li, "A Self-Adaptive Model of Two-Level for Dynamic Peer-to-Peer Networks", Key Engineering Materials, Vols. 460-461, pp. 479-484, 2011
Online since
January 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Ming Zhang, Jin Qiu Yang
Abstract:Unstructured peer-to-peer (P2P) systems,due to their excellent support for content lookup and sharing,are creating a large proportion of...
865
Authors: Ming Zhang, Jin Qiu Yang
Abstract:Structured peer-to-peer (P2P) systems are creating a large proportion of network traffic in today’s Internet. Peer-to-peer systems enable...
870
Authors: Lei Chen
Abstract:To solve the Grid resource discovery framework problem, this paper proposes the resource discovery mechanism based on Peer-to-Peer (P2P). The...
340
Authors: Zong Yuan Guo, Carlos Madrazo, Keiichi Koyanag
Chapter 13: Information Technologies and Networks
Abstract:In P2P networks, malice peers forge identity to interrupt routing, called Sybil attack. To avoid it, methods in related works consider...
1596