2007
DOI: 10.1109/jsac.2007.070103
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing peer-to-peer systems through redundancy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…When systems like DHTs are used, more security mechanisms [Castro et al 2002] and data replication mechanisms [Flocchini et al 2007] must be employed to ensure that requests are successfully performed.…”
Section: Mitigating Denial Of Service Attacksmentioning
confidence: 99%
“…When systems like DHTs are used, more security mechanisms [Castro et al 2002] and data replication mechanisms [Flocchini et al 2007] must be employed to ensure that requests are successfully performed.…”
Section: Mitigating Denial Of Service Attacksmentioning
confidence: 99%
“…Redundant strategy has been proven to be very efficient in Peer to Peer (P2P) file sharing system 13 named Hyper-Chord. Different from that, our proposed A5 is not a structured architecture.…”
Section: Related Workmentioning
confidence: 99%
“…As the number of data nodes increases, the work load on a single centralized namenode server increases and has a great impact on the performance and availability of the cluster. It is therefore, increasing work load and memory that restricts the scalability of the Hadoop cluster [6,20]. A single centralized namenode server is more prone to failures.…”
Section: Introductionmentioning
confidence: 99%
“…Chord's main goal is the location of entities in P2P environments, like documents, files, or any resource that one might want to share in a computer network [20,21,25,26]. It is a distributed lookup protocol.…”
Section: Introductionmentioning
confidence: 99%