Challenges in peer-to-peer gaming

被引:14
作者
Neumann, Christoph [1 ]
Prigent, Nicolas
Varvello, Matteo
Suh, Kyoungwon
机构
[1] Thomson Res Lab, Paris, France
[2] Thomson Secur Res Lab, Rennes, France
[3] Inst Eurecom, Sophia Antipolis, France
[4] Univ Massachusetts, Amherst, MA 01003 USA
关键词
design; performance; security; peer-to-peer; overlay online-gaming;
D O I
10.1145/1198255.1198269
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While multi-player online games are very successful, their fast deployment suffers from their server-based architecture. Indeed, servers both limit the scalability of the games and increase deployment costs. However, they make it easier to control the game (e.g. by preventing cheating and providing support for billing). Peer-to-peer, i.e. transfer of the game functions on each each player's machine, is an attractive communication model for online gaming. We investigate here the challenges of peer-to-peer gaming, hoping that this discussion will generate a broader interest in the research community.
引用
收藏
页码:79 / 82
页数:4
相关论文
共 50 条
[41]   Self-organizing peer-to-peer social networks [J].
Wang, Fang ;
Sun, Yaoru .
COMPUTATIONAL INTELLIGENCE, 2008, 24 (03) :213-233
[42]   JXTA: A technology facilitating mobile peer-to-peer networks [J].
Maibaum, N ;
Mundt, T .
INTERNATIONAL MOBILITY AND WIRELESS ACCESS WORKSHOP (MOBIWAC 2002), PROCEEDINGS, 2002, :7-13
[43]   An Optimal Peer Selection Algorithm for Mesh-based Peer-to-Peer Networks [J].
Han, Seung Chul ;
Nam, Ki Won .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (01) :133-151
[44]   An Analytical Study of Peer-to-Peer Media Streaming Systems [J].
Tu, Yi-Cheng ;
Sun, Jianzhong ;
Hefeeda, Mohamed ;
Prabhakar, Sunil .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2005, 1 (04)
[45]   On designing peer-to-peer systems over wireless networks [J].
Yan, Lu ;
Zhou, Xinrong .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2008, 3 (04) :245-254
[46]   BubbleStorm: Resilient, probabilistic, and exhaustive peer-to-peer search [J].
Terpstra, Wesley W. ;
Kangasharju, Jussi ;
Leng, Christof ;
Buchmann, Alejandro P. .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) :49-60
[47]   Performance management of Peer-to-Peer distributed hash tables [J].
Doyen, G ;
Nataf, E ;
Festor, O .
EUNICE 2005: NETWORKS AND APPLICATIONS TOWARDS A UBIQUITOUSLY CONNECTED WORLD, 2006, 196 :233-246
[48]   Proof-of-Play: A Novel Consensus Model for Blockchain-based Peer-to-Peer Gaming System [J].
Yuen, Ho Yin ;
Wu, Feijie ;
Cai, Wei ;
Chan, Henry C. B. ;
Yan, Qiao ;
Leung, Victor C. M. .
BSCI '19: PROCEEDINGS OF THE 2019 ACM INTERNATIONAL SYMPOSIUM ON BLOCKCHAIN AND SECURE CRITICAL INFRASTRUCTURE, 2019, :19-28
[49]   Detecting Malicious Nodes in Peer-to-Peer Streaming by Peer-Based Monitoring [J].
Jin, Xing ;
Chan, S. -H. Gary .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2010, 6 (02)
[50]   A Peer-to-Peer Recommender System Based on Spontaneous Affinities [J].
Ruffo, Giancarlo ;
Schifanella, Rossano .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2009, 9 (01)