Handbook of Peer-to-Peer Networking 2009
DOI: 10.1007/978-0-387-09751-0_9
|View full text |Cite
|
Sign up to set email alerts
|

Overview of Structured Peer-to-Peer Overlay Algorithms

Abstract: except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 34 publications
0
18
0
Order By: Relevance
“…In opportunistic maintenance, a node attaches routing table data to a response lookup message. The receiver then updates its routing table with this information -adding new node entries and removing node entries which are considered dead [9]. This kind of maintenance saves a bandwidth as it reduces the need for dedicated messages to update routing table entries.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In opportunistic maintenance, a node attaches routing table data to a response lookup message. The receiver then updates its routing table with this information -adding new node entries and removing node entries which are considered dead [9]. This kind of maintenance saves a bandwidth as it reduces the need for dedicated messages to update routing table entries.…”
Section: Discussionmentioning
confidence: 99%
“…A large number of multi-hop structured Peer-to-Peer (P2P) algorithms have been proposed [9]. These algorithms are characterized by O(log N) hop count.…”
Section: Related Workmentioning
confidence: 99%
“…The template of these components is specified in Figure 2 by the Vehicle specification. Its state is captured by knowledge (a set of attributes -lines [7][8][9][10][11][12][13][14] and operational functionality by processes (lines [15][16][17][18][19][20]. Every component features a number of roles, i.e., sets of knowledge fields (lines [1][2][3][4]6), which provide contract between the component and ensembles.…”
Section: Background: Deecomentioning
confidence: 99%
“…The idea of communication groups relates to Distributed Hash- Tables (DHT) which introduce key-space partitioning [8], [9] and overlay networks [10]. The former assign a range of keys to particular network nodes that take the responsibility for storing the actual value corresponding to a key.…”
Section: Related Workmentioning
confidence: 99%
“…Distributed Hash Tables (DHTs) [2] supported Peer-to-Peer (P2P) applications are an ideal substrate for building large scale distributed systems because they are selforganizing, adaptable and scalable and offer efficient routing between nodes within a bounded number of hops. EpiChord [1] is a DHT lookup algorithm which demonstrates that node state restrictions can be relaxed which were imposed by the majority of other DHT algorithms by using a reactive routing state maintenance strategy.…”
Section: Introductionmentioning
confidence: 99%