2003
DOI: 10.1109/mic.2003.1215663
|View full text |Cite
|
Sign up to set email alerts
|

Overlay networks a scalable alternative for p2p

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0
8

Year Published

2005
2005
2014
2014

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 94 publications
(44 citation statements)
references
References 9 publications
0
34
0
8
Order By: Relevance
“…More general approaches establish an overlay network to completely abstract from technological details of the underlying transport layer (e.g. [6]). …”
Section: Mobile Web Service Architectures and Use Of Mediator Componentsmentioning
confidence: 99%
See 1 more Smart Citation
“…More general approaches establish an overlay network to completely abstract from technological details of the underlying transport layer (e.g. [6]). …”
Section: Mobile Web Service Architectures and Use Of Mediator Componentsmentioning
confidence: 99%
“…proposed in [6]). To detect other devices in the environment, participating devices use their communication adapter to send short broadcast messages in periodic intervals.…”
Section: Listing 1 Wsdl Bindingmentioning
confidence: 99%
“…By using the node lookup protocol, we can classify overlay networks into one of two types: 8 • Content-addressable overlays, in which network topology and object content are related. Distributed hash table-(DHT-) based techniques 9 convert object identifiers into overlay node identifiers, thus guaranteeing object location (if the object is present); search times are bounded.…”
Section: Figure 3 Event Model Taxonomy This Is the Basis For Classimentioning
confidence: 99%
“…However, overlay networks can help in addressing these issues because they have a network semantics layer above the basic transport protocol level ( Figure 1). This organizes the network topology according the nodes' content, implementing a distributed hash table abstraction that provides load balancing, query forwarding and bounded lookup times [2].…”
Section: Introductionmentioning
confidence: 99%