2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)
DOI: 10.1109/icw.2005.31
|View full text |Cite
|
Sign up to set email alerts
|

Bandwidth and Latency Model for DHT Based Peer-to-Peer Networks under Variable Churn

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 7 publications
0
4
0
1
Order By: Relevance
“…The construction method of parameter k as formula (3) can be used to design Churn model or adjust other Churn models in different network environments. For example in formula (3), N represents the scale of network, W represents the busy degree of network, and B represents the stabilization of network. Of course, we can also use other factors in Table I according to different research needs.…”
Section: Methods To Improve the Present P2p Churn Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The construction method of parameter k as formula (3) can be used to design Churn model or adjust other Churn models in different network environments. For example in formula (3), N represents the scale of network, W represents the busy degree of network, and B represents the stabilization of network. Of course, we can also use other factors in Table I according to different research needs.…”
Section: Methods To Improve the Present P2p Churn Modelmentioning
confidence: 99%
“…Previous Churn-related studies can be mainly divided into three categories. The first is to directly acquire and analyze Churn correlative factors [1][2][3][4], such as the arrival and departure time of peers. The second category builds Churn models based on some simulation or analysis study of P2P system [5,6].…”
Section: Introductionmentioning
confidence: 99%
“…The mesh devices of WMN are less dynamic in nature, which are running an overlay application for resource sharing and discovery. The Chord overlay performs well under low churn and less dynamic scenarios with respect to the latency of lookup messages 48 Fog nodes container service: An execution environment is needed to run microservices in the participating fog nodes.…”
Section: Proposed Frameworkmentioning
confidence: 99%
“…EDFs are related to peer-to-peer systems for which there is plenty of literature, however, mostly focused on analyzing the performance and scalability of distributed hashing and routing algorithms (e.g., [1,20,25]). To the best of our knowledge, no techniques exist in the literature for automated model extraction of EDFs and we are not aware of any performance modeling case studies of EDFs.…”
Section: Related Workmentioning
confidence: 99%