Gemini: Probabilistic routing algorithm in structured P2P overlay

被引:0
|
作者
Li, M [1 ]
Hu, JF [1 ]
Dong, HT [1 ]
Wang, DS [1 ]
Zheng, WM [1 ]
机构
[1] Tsing Hua Univ, Comp Sci & Technol Dept, Beijing 100084, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose a new Structured overlay protocol, which is more efficient and scalable than previous ones. We call it Gemini, because its routing table consists of two parts, one containing nodes with common prefix and the other containing nodes with common suffix. Gemini routes messages to their destinations in just 2 hops, with a very high probability of 0.99. When running in a p2p network of 5,000,000 peers, each Gemini node consumes only 6 messages per second for maintenance. This cost, as well as routing table size, varies as a O (rootN) function to the overlay scale, so Gemini can also run well in an even larger environment.
引用
收藏
页码:519 / 526
页数:8
相关论文
共 50 条
  • [31] Query Based Clustering Method in Structured P2P Overlay Networks
    Ma, Qing
    Zhao, Kun
    Wang, Xiaoxiang
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 527 - 531
  • [32] A P2P Overlay Network Routing Algorithm Based on Group-Average Agglomerative Clustering Topology
    Ma, Yi
    Tan, Zhenhua
    Chang, Guiran
    Gao, Xiaoxing
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 445 - +
  • [33] A Small World Routing Model for Structured P2P Systems
    Huang, Guimin
    Zhou, Ya
    Zhang, Yanchun
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 632 - +
  • [34] The exclusion of malicious routing peers in structured P2P systems
    Rob, Bong-Soo
    Kwon, O-Hoon
    Flong, Sung Je
    Kim, Jong
    AGENTS AND PEER-TO-PEER COMPUTING, 2008, 4461 : 43 - 50
  • [35] Simulation and Analysis of Routing Schemes in Structured P2P System
    Cheng, Yinbo
    Wen, Xiangming
    Sun, Yong
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 524 - 527
  • [36] Adaptive flooding routing algorithm in unstructured P2P
    Luo Jiaqing
    Zhou Shijie
    Wu Chunjiang
    Deng Yiyi
    Yang Xiaoqian
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1557 - +
  • [37] An Improved Kademlia Routing Algorithm for P2P Network
    Liang Guangmin
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 63 - 66
  • [38] A Topology Matching Algorithm of Structured P2P Network
    Pan, Lili
    PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 167 - 170
  • [39] A Routing Scheme Based on Autonomous Clustering and P2P Overlay Network in MANETs
    Nakahara, Shoma
    Ohta, Tomoyuki
    Kakuda, Yoshiaki
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 518 - 524
  • [40] A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 128 - 134