Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955)
DOI: 10.1109/icon.2004.1409169
|View full text |Cite
|
Sign up to set email alerts
|

Bootstrapping locality-aware P2P networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
41
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(41 citation statements)
references
References 8 publications
0
41
0
Order By: Relevance
“…A malicious bootstrap node can influence the view of the network for the new user [23]. Several solutions already exist for this problem such as not relaying in a single bootstrap node, use of cached peers for subsequent connections, random address probing, using external mechanisms, using specific bootstrapping services, or using network layer solutions (e.g., use of a special multicast group for bootstrapping) [16,36,37].…”
Section: Fake Bootstrappingmentioning
confidence: 99%
“…A malicious bootstrap node can influence the view of the network for the new user [23]. Several solutions already exist for this problem such as not relaying in a single bootstrap node, use of cached peers for subsequent connections, random address probing, using external mechanisms, using specific bootstrapping services, or using network layer solutions (e.g., use of a special multicast group for bootstrapping) [16,36,37].…”
Section: Fake Bootstrappingmentioning
confidence: 99%
“…At first, a Dnode sends a discovery message with its networkID to level-1 Onodes known in advance or by bootstrapping [3]. Only level-1 Onodes with the same networkID will reply with their λ parameter.…”
Section: Protocol Descriptionmentioning
confidence: 99%
“…A new Onode can establish its first connection with any Onode known in advance or by bootstrapping [3]. First, it sends a discovery message with its networkID.…”
Section: Protocol Descriptionmentioning
confidence: 99%
“…New ACs must authenticate with ACs in their group. It can establish its first connections with any AC known in advance or by bootstrapping [21]. First, it sends an "AC discovery" message with its groupID.…”
Section: Protocol Operationmentioning
confidence: 99%
“…Next new nodes in that group enter as DNs and will acquire roles as a function of their δ. In order to join new groups to the architecture, the GC of the new group must to send a "GG discovery" message, with its groupID, to GCs from other groups known in advance or by bootstrapping [21] (a groupID value of 0xFF indicates the architecture must assign next available groupID value, and if the new GC has a groupID value that is used, it will be invited to change the groupID indicating next groupID available). If there is not any reply in a certain period of time, it will begin the process again.…”
Section: Protocol Operationmentioning
confidence: 99%