An immune symmetrical network-based service model in peer-to-peer network environment

被引:0
|
作者
Zhang, Xiangfeng [1 ]
Ren, Lihong [1 ]
Ding, Yongsheng [1 ,2 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai 201620, Peoples R China
[2] Donghua Univ, Engn Res Ctr Digitized Text & Fash Technol, Minist Educ, Shanghai 201620, Peoples R China
关键词
D O I
10.1142/9789812774118_0076
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Requirements for future Internet are implemented possibly in peer-to-peer network environments where all network nodes are equal to each other. Inspired by the similar features between immune systems and future Internet, based on the immune symmetrical network theory, a network service model in a peer-to-peer network environment is designed on our bio-network platform. To validate the feasibility of the model, we do experiments with different network service distributions and user requests towards each node. The results of the hops per request with time show that the users can acquire network services flexibly and efficiently.
引用
收藏
页码:533 / +
页数:2
相关论文
共 50 条
  • [21] A new peer-to-peer network
    Harutyunyan, Hovhannes
    He, Junlei
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 120 - +
  • [22] Diffusion on the Peer-to-Peer Network
    Riposo, Julien
    JOURNAL OF RISK AND FINANCIAL MANAGEMENT, 2022, 15 (02)
  • [23] A New Global Trust Model based on Recommendation for Peer-To-Peer Network
    Wang, Weijie
    Wang, Xinsheng
    Pan, Shuqin
    Liang, Ping
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 325 - 328
  • [24] PBiz: An e-business model based on peer-to-peer network
    Chen, SD
    Wu, ZD
    Zhang, W
    Ma, FY
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 404 - 411
  • [25] A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks
    Alhussain, Alanoud
    Kurdi, Heba
    Altoaimy, Lina
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (03): : 805 - 815
  • [26] A restricted-scope lookup service in Peer-to-Peer network
    Li, Jianchun
    Li, Jianyong
    Huang, Daoying
    Shi, Lihua
    Journal of Theoretical and Applied Information Technology, 2012, 45 (01) : 246 - 251
  • [27] Bayesian network trust model in peer-to-peer networks
    Wang, Y
    Vassileva, J
    AGENTS AND PEER-TO-PEER COMPUTING, 2004, 2872 : 23 - 34
  • [28] A peer mutual authentication method on super peer based peer-to-peer network
    Oh, Byeong-Thaek
    Lee, Sang-Bong
    Park, Ho-Jin
    2008 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2008, : 121 - 124
  • [29] A “cluster” based search scheme in peer-to-peer network
    Li Zhen-wu
    Yang Jian
    Shi Xu-dong
    Bai Ying-cai
    Journal of Zhejiang University-SCIENCE A, 2003, 4 (5): : 549 - 554
  • [30] Practical Implementation of Femtolet Based Peer-to-Peer Network
    Deepsubhra Guha Roy
    Anwesha Mukherjee
    Debashis De
    Satish Narayana Srirama
    Wireless Personal Communications, 2019, 108 : 2477 - 2498