A cluster-based Peer-to-Peer routing algorithm

被引:0
作者
Wu, ZD [1 ]
Rao, WX [1 ]
Ma, FY [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
来源
2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS | 2003年
关键词
routing; Peer-to-Peer network; distributed systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Structured Peer-to-Peer overlay Is based on node Identifier, which lead to low efficient in routing. In order to improve routing efficiency, this paper presents clustered based routing algorithm, which combine physical network and overlay network In choosing next hop. Experimental results show that the algorithm greatly improves efficiency of Peer-to-Peer routing.
引用
收藏
页码:334 / 337
页数:4
相关论文
共 50 条
  • [31] Strategies for peer-to-peer downloading
    Herman, T
    Johnen, C
    INFORMATION PROCESSING LETTERS, 2005, 94 (05) : 203 - 209
  • [32] A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks
    Qu, Dapeng
    Zhang, Jiankun
    Hou, Zhenhuan
    Wang, Min
    Dong, Bo
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 22 - 29
  • [33] Routing queries through a peer-to-peer InfoBeacons network using information retrieval techniques
    Seshadri, Sangeetha
    Cooper, Brian F.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (12) : 1754 - 1765
  • [34] Peer-to-Peer Streaming Capacity
    Sengupta, Sudipta
    Liu, Shao
    Chen, Minghua
    Chiang, Mung
    Li, Jin
    Chou, Philip A.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) : 5072 - 5087
  • [35] To Code or Not to Code: Rate Optimality of Network Coding versus Routing in Peer-to-Peer Networks
    Shao, Ziyu
    Li, Shuo-Yen Robert
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2011, 59 (04) : 948 - 954
  • [36] On the fundamental tradeoffs between routing table size and network diameter in peer-to-peer networks
    Xu, J
    Kumar, A
    Yu, XX
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004, 22 (01) : 151 - 163
  • [37] Implementation of secure peer group in peer-to-peer network
    Li, ZP
    Dong, YG
    Zhuang, L
    Huang, JH
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 192 - 195
  • [38] Research of Trust Model Based on Peer-to-Peer Network Security
    Kun, Huang
    Lu, Wang
    2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 126 - 129
  • [39] Popularity based network statistical analysis in peer-to-peer application
    Wang Jing-Xin
    Wang Yue
    Li Yi-Peng
    Yuan Jian
    Shan Xiu-Ming
    Feng Zhen-Ming
    Ren Yong
    ACTA PHYSICA SINICA, 2011, 60 (11)
  • [40] LAAPS: an efficient file-based search in unstructured peer-to-peer networks using reinforcement algorithm
    Shamshirband S.
    Soleimani H.
    Shamshirband, Shahaboddin (shahaboddin.shamshirband@tdt.edu.vn), 1600, Taylor and Francis Ltd. (43): : 62 - 69