GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. 2005
DOI: 10.1109/glocom.2005.1577765
|View full text |Cite
|
Sign up to set email alerts
|

On the stability of chord-based P2P systems

Abstract: The current generation of P2P networks is intended to provide cost-effective alternatives to the traditional clientserver architecture. The main goal is to store and retrieve data in a decentralized manner. The challenge in doing so consists in creating a stable overlay network that allows for fast and efficient searches. In this paper we consider the Chord P2P algorithm in this context and analyze its stability and efficiency with stochastic methods. We present realistic probabilities for a disconnection and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
13
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 3 publications
0
13
0
Order By: Relevance
“…However, the stability studied in those work are not the same one we studied here. For example, in [15], the stability of Chord-based P2P systems is studied. The stability there, however, is mainly about how stable or robust the overlay network connections can be maintained if there are peers leaving the system.…”
Section: Introductionmentioning
confidence: 99%
“…However, the stability studied in those work are not the same one we studied here. For example, in [15], the stability of Chord-based P2P systems is studied. The stability there, however, is mainly about how stable or robust the overlay network connections can be maintained if there are peers leaving the system.…”
Section: Introductionmentioning
confidence: 99%
“…The decentralized P2P networks are independent of a single server and they have to invest in server farms to guarantee the scalability of their systems [6]. There are some obvious advantages to decentralizing the C7C mechanism "self-healing" nature of the network, along with "servers" that actually share files.…”
Section: Introductionmentioning
confidence: 99%
“…we have a tendency to seek advice from a furtive P2P botnet as a P2P botnet whose malicious activities might not be evident within the network traffic. significantly, our system aims to discover furtive P2P botnet albeit P2P botnet traffic is overlapped with traffic generated by legitimate P2P applications running on a similar compromised host and ii) attain high quantifiability [16], [19]. To the current finish, our system identifies P2P bots among a monitored network by detection the Command-and-Control communication patterns that characterize P2P botnets, notwithstanding however they perform malicious activities in response to the botmaster's commands [18].…”
Section: Introductionmentioning
confidence: 99%