Proceedings. Second International Conference on Peer-to-Peer Computing,
DOI: 10.1109/ptp.2002.1046331
|View full text |Cite
|
Sign up to set email alerts
|

Dependability properties of P2P architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 1 publication
0
17
0
Order By: Relevance
“…Even though it is useful to evaluate and compare frameworks with respect to the raw performance of their architectures and protocols, e.g., typical P2P quality attributes such as scalability, reliability, connection bandwidth, peer discovery, node addressing, and so on [10], we have chosen to focus on evaluating how well the design of LightPeers supports development and execution of applications for nomadic learning. Thus, in our evaluation of the framework we have not only measured its performance, but also considered how well the framework and its applications could support tasks within the use-domain, e.g., pupils joining and leaving groups, and producing, sharing and annotating material on a range of diverse mobile devices.…”
Section: Discussionmentioning
confidence: 99%
“…Even though it is useful to evaluate and compare frameworks with respect to the raw performance of their architectures and protocols, e.g., typical P2P quality attributes such as scalability, reliability, connection bandwidth, peer discovery, node addressing, and so on [10], we have chosen to focus on evaluating how well the design of LightPeers supports development and execution of applications for nomadic learning. Thus, in our evaluation of the framework we have not only measured its performance, but also considered how well the framework and its applications could support tasks within the use-domain, e.g., pupils joining and leaving groups, and producing, sharing and annotating material on a range of diverse mobile devices.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, it is also interesting to know what is different between them. A lot of P2P file-sharing P2P networks have the following common features [10]: user privacy, encryption, distribution, data redundancy, direct transfer and high availability.…”
Section: P2p Architecture Analysismentioning
confidence: 99%
“…The protocol builds a hierarchical decentralized overlay network [8] in which each host is required to forward both resource discovery and network maintenance messages. The protocol uses just five message types as follows:…”
Section: The Gnutella Protocolmentioning
confidence: 99%