2004
DOI: 10.1007/978-3-540-24668-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Bootstrapping in Gnutella: A Measurement Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
18
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(20 citation statements)
references
References 2 publications
1
18
0
Order By: Relevance
“…These studies cover several topics: (i) file characteristics [31]- [34], (ii) transfer characteristics [32], [35], (iii) peer characteristics [13], [23], (vi) query characteristics [33], [36]- [38], and (v) comparisons of different implementations [39], [40]. Since they explore different aspects of peer-to-peer networks, these studies complement our work.…”
Section: Related Workmentioning
confidence: 82%
“…These studies cover several topics: (i) file characteristics [31]- [34], (ii) transfer characteristics [32], [35], (iii) peer characteristics [13], [23], (vi) query characteristics [33], [36]- [38], and (v) comparisons of different implementations [39], [40]. Since they explore different aspects of peer-to-peer networks, these studies complement our work.…”
Section: Related Workmentioning
confidence: 82%
“…This is suitable in realistic scenarios, e.g. during bootstrapping in p2p networks like Gnutella [5], a newly arriving node need not evaluate the trust to all the nodes in the network. Rather it will preferably connect to a small number of trusted peers and hence need to obtain the trust of only a small subset of the whole network.…”
Section: Trustwebrankmentioning
confidence: 99%
“…In order to learn more about traffic information, some P2P traffic identification research emphasized detailed features of a small subset of P2P protocols and/or networks [4][5][6], often motivated by the dominance of that protocol in a particular provider's infrastructure or during a specific time period. Some other systems used information such as known port number, flow level analysis [1], payload information (such as signatures) [8], topological feature and transport layer features [7].…”
Section: Related Research Literaturementioning
confidence: 99%
“…To address the afore-mentioned drawbacks of port-based classification, several payload-based analysis techniques have been proposed [5,7,11]. In this approach, packet payloads are analyzed to determine whether they contain characteristic signatures of known applications.…”
Section: Payload-based Featurementioning
confidence: 99%