DPT: A topology construction method for P2P networks

被引:0
|
作者
Yu, Zhen [1 ]
Yao, Xuan-Xia [1 ]
Wang, Ying [1 ]
Wang, Shao-Jie [2 ]
机构
[1] School of Info. Eng., Univ. of Sci. and Technol. Beijing, Beijing 100083, China
[2] National Research Center for Info. Technol. Sanctity, Beijing 100094, China
关键词
Quality of service - Location - Efficiency - Peer to peer networks - Titration;
D O I
暂无
中图分类号
学科分类号
摘要
To improve the efficiency of resource locating in Peer-to-Peer (P2P) networks, and isolate malicious peers, a topology construction method for unstructured P2P networks called DPT was proposed. In DPT, each neighbor of a peer had a changeable TTL (time-to-live), the reliable TTL of each neighbor was changed by its transmitting condition after each interaction, and the transmitting condition of direct forwarding peers of query paths was also recorded. The method designed some structures to store peers' transmitting information, and proposed algorithms to adjust the topology of P2P networks. Simulations demonstrated that the topology construction method of DPT can isolate malicious peers to the fringe of the network, and improve the efficiency of resource locating, enhancing the quality of service in P2P networks effectively.
引用
收藏
页码:103 / 110
相关论文
共 50 条
  • [31] A new trust propagation and aggregation method for P2P networks
    Yuan, FuYong
    Li, Hong
    Fu, Qianqian
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1176 - 1181
  • [32] A privacy data leakage prevention method in P2P networks
    Cheol-Joo Chae
    YongJu Shin
    Kiseok Choi
    Ki-Bong Kim
    Kwang-Nam Choi
    Peer-to-Peer Networking and Applications, 2016, 9 : 508 - 519
  • [33] Connecting IPvX networks over IPvY with a P2P method
    Leng, Xiaoxiang
    Bi, Jun
    Zhang, Miao
    Wu, Jianping
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2007, 15 (03) : 383 - 399
  • [34] Connecting IPvX Networks Over IPvY with a P2P Method
    Xiaoxiang Leng
    Jun Bi
    Miao Zhang
    Jianping Wu
    Journal of Network and Systems Management, 2007, 15 : 383 - 399
  • [35] A privacy data leakage prevention method in P2P networks
    Chae, Cheol-Joo
    Shin, YongJu
    Choi, Kiseok
    Kim, Ki-Bong
    Choi, Kwang-Nam
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (03) : 508 - 519
  • [36] Efficient Degree Constrained Broadcast Method on P2P Networks
    Hanazawa, Yuki
    Sasaki, Yusuke
    Miwa, Hiroyoshi
    2009 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS 2009), 2009, : 347 - 352
  • [37] An Efficient Replica Location Method in Hierarchical P2P Networks
    Sun, Xin
    Li, Kan
    Liu, Yushu
    PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 769 - 774
  • [38] An adaptive probabilistic replication method for unstructured P2P networks
    Tsoumakos, Dimitrios
    Roussopoulos, Nick
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: COOPIS, DOA, GADA, AND ODBAS, PT 1, PROCEEDINGS, 2006, 4275 : 480 - 497
  • [39] Layered P2P video streaming using asymmetric P2P topology and membership management
    Huang, Chung-Ming
    Yang, Chia-Ching
    Cheng, Chung-Heng
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2014, 37 (06) : 731 - 740
  • [40] A Basic Study on a Robust P2P Network Distributed Construction Method
    Sakamoto, Rikuho
    Yamaoka, Katsunori
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2015, : 488 - 489