2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design 2006
DOI: 10.1109/caidcd.2006.329410
|View full text |Cite
|
Sign up to set email alerts
|

Efficient flooding in peer-to-peer networks

Abstract: Peer-to-Peer (P2P) computing has emerged as a popular model aiming at further utilizing Internet information and resources. Flooding is the basic method of searching in unstructured P2P networks, however, the blind flooding based search mechanism causes a large volume of unnecessary traffic, and greatly limits the performance of P2P systems. Our study shows that a large amount of these unwanted traffic is divinable and can be avoided while searching in P2P networks. Aiming at reducing the volume of unnecessary… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Prior work also proposed feedback-based approaches to ooding [3,49]. However, we believe that to work e ciently (have a horizon larger than 1), this work would have unacceptable information leakage.…”
Section: Related Workmentioning
confidence: 98%
“…Prior work also proposed feedback-based approaches to ooding [3,49]. However, we believe that to work e ciently (have a horizon larger than 1), this work would have unacceptable information leakage.…”
Section: Related Workmentioning
confidence: 98%
“…Such an assumption is valid for most of the practical distributed networks in use. These networks usually employ techniques like the distributed hash table [15] or flooding [16] for resource lookout. To reduce lookout latency, these techniques make users store data files in demand across the network in their memory.…”
Section: Network Modelmentioning
confidence: 99%
“…The parameter G and T are set by the designer and c max is calculated using (16). The equations ( 23) and ( 24) provide the generic value of the model parameters.…”
Section: E Tuning Pi Controllermentioning
confidence: 99%