2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006 2006
DOI: 10.1109/noms.2006.1687675
|View full text |Cite
|
Sign up to set email alerts
|

Self-Configuration Protocols for Small-Scale P2P Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…The overloaded peer can mutually exchange the details of the underloaded peers that it has interacted with in the past and present. Wang and Vanninen (2006) and Zou et al (2002) focused on maximizing the throughput of the system and reducing message overheads and considered the CPU and memory capacities as load parameters. The maximum number of socket connections possible per unit time is considered to be a parameter.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The overloaded peer can mutually exchange the details of the underloaded peers that it has interacted with in the past and present. Wang and Vanninen (2006) and Zou et al (2002) focused on maximizing the throughput of the system and reducing message overheads and considered the CPU and memory capacities as load parameters. The maximum number of socket connections possible per unit time is considered to be a parameter.…”
Section: Related Workmentioning
confidence: 99%
“…The load must be distributed among peers based on their ability to get better throughput (Wang and Vanninen, 2006;Zou et al, 2002). Instead of transferring tasks between peers, the trend for some time has been to migrate virtual servers from one peer to another.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The utility-based resource allocation problem is a problem that aims to maximize the sum of utilities of users for each allocation period, but does not consider other factors and constraints (i.e., fair allocation [1,33], security and privacy concerns [41], uncertainty [39,40], etc.). Combinatorial auction is not only the approach for resource allocation problems.…”
Section: Combinatorial Auction and Resource Allocation Problemmentioning
confidence: 99%
“…Many research proposals exist for providing self-configuration mechanisms for decentralized and unstructured P2P networks with different goal settings. For example, Wang and Vanninen [37] proposed several protocols for selfconfiguring P2P networks with the aims of minimizing the diameter of the P2P network (i.e., the maximum latency time of message routing between two nodes through the shortest path) and the network eccentricity (i.e., the maximum logical network distance to the centroid of the P2P network from any node in the network). They discussed small-scale homogeneous P2P network environments and large-scale heterogeneous P2P network environments separately and proposed appropriate configuration strategies for each environment.…”
Section: Related Workmentioning
confidence: 99%