Modelling for a federated peer-to-peer MMOG architecture

被引:0
|
作者
Wu, Z.D. [1 ]
机构
[1] School of Information Technology, Bond University, Gold Coast, QLD 4229, Australia
关键词
Computer architecture - Network architecture - Distributed computer systems - Interactive computer graphics - Cost functions - Peer to peer networks - Social networking (online) - Queueing theory;
D O I
10.1080/1206212X.2008.11441910
中图分类号
学科分类号
摘要
In this paper we propose a methodology, in which analytical models are presented so as to abstract the characteristics of massive multiplayer online games (MMOGs). By using these models, the system performance can be evaluated in terms of two performance metrics: (i) the cost of resources consumed by a targeted game system during its game-play; (ii) the system delay and consistency loss rate. Specifically, we can investigate the impact of various factors, such as game types, the number of players, the intensity of players or NPCs interaction, the number of regions in a game-world, avatar region-transition rate and network configuration, on the system performance. In this study, a number of resource-cost functions are also defined, which map the system resource consumed to the cost during a game-play. In addition, an approach for evaluating the system delay and consistency loss is proposed. We choose the federated peer-to-peer architecture as a target for this study, because it is a typical and potential architecture proposed recently and attracting more attention. Finally, we demonstrate numerical examples for the system performance evaluation.
引用
收藏
页码:309 / 318
相关论文
共 50 条
  • [21] A peer-to-peer architecture for mobile communications
    Gonen, EK
    Xu, H
    Joshi, P
    2nd International Symposium on Wireless Communications Systems 2005 (ISWCS 2005), 2005, : 293 - 297
  • [22] A Peer-to-Peer Secure VoIP Architecture
    Cirani, Simone
    Pecori, Riccardo
    Veltri, Luca
    TRUSTWORTHY INTERNET, 2011, : 105 - 115
  • [23] Membership Inference Vulnerabilities in Peer-to-Peer Federated Learning
    Luqman, Alka
    Chattopadhyay, Anupam
    Lam, Kwok Yan
    PROCEEDINGS OF THE INAUGURAL ASIACCS 2023 WORKSHOP ON SECURE AND TRUSTWORTHY DEEP LEARNING SYSTEMS, SECTL, 2022,
  • [24] TravellingFL: Communication Efficient Peer-to-Peer Federated Learning
    Gupta, Vansh
    Luqman, Alka
    Chattopadhyay, Nandish
    Chattopadhyay, Anupam
    Niyato, Dusit
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (04) : 5005 - 5019
  • [25] Towards a Secure Peer-to-Peer Federated Learning Framework
    Piotrowski, Tim
    Nochta, Zoltan
    ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING, ESOCC 2022, 2022, 1617 : 19 - 31
  • [26] SPEAR: Design of a secured peer-to-peer architecture
    Misra, J
    Pal, P
    Bagchi, A
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 322 - 327
  • [27] A peer-to-peer architecture for workflow in virtual enterprises
    Noll, J
    QSIC 2005: FIFTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2005, : 365 - 372
  • [28] A peer-to-peer Jini architecture for pervasive multimedia
    Hui, P
    Chau, OS
    Liu, XS
    Li, VOK
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3160 - 3164
  • [29] Networked appliances and their peer-to-peer architecture AMIDEN
    Minoh, M
    Kamae, T
    IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (10) : 80 - 84
  • [30] Small world architecture for peer-to-peer networks
    Liu, Lu
    Mackin, Stephen
    Antonopoulos, Nick
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY, WORKSHOPS PROCEEDINGS, 2006, : 451 - +