Skip to main content

DHT-Based Cross-Transmission Protocol Peer-to-Peer Resource Sharing Model

  • Conference paper
Network Computing and Information Security (NCIS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 345))

Included in the following conference series:

  • 1323 Accesses

Abstract

In this paper, a DHT-based cross-transmission protocol P2P resource sharing model is proposed to address the interconnection and intercommunication problem in P2P systems, where the DHT network stores the resource information for each P2P system. Peer in the model can participate in multi P2P systems,intelligently finding out the same resources among them. Through parallel downloading file from multi P2P systems, the model can provide essential functions to original system, such as reducing user response latency, minimizing file download time and providing Quality of Services (QoS) guarantees. Simulation results demonstrate that the model has better system robustness, scalability and user experience compared with current P2P systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Meshkova, E., Riihijärvi, J., Petrova, M., Mähönen, P.: A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks. Computer Networks 52(11), 2097–2128 (2008)

    Article  Google Scholar 

  2. Chen, G., Li, Z.: P2P networks: architecture application and design, pp. 12–14. Tsinghua University Press (September 2007)

    Google Scholar 

  3. Chen, G., Li, Z.: P2P networks: architecture application and design, pp. 168–174. Tsinghua University Press (September 2007)

    Google Scholar 

  4. Dickson, F.: P2P: Content’s “Bad Body”: Tomorrow’s Distribution Channel. Report (November 2008)

    Google Scholar 

  5. Shen, L., Luo, H.-Q., Tang, H., Zhou, X.: Research on P2P Proxy Cache Based on User’s Character. Application Research of Computers 24(11), 106–108 (2007)

    Google Scholar 

  6. Shen, G., Wang, Y., Xiong, Y., Zhao, B.Y., Zhang, Z.-L.: HPTP: Relieving the Tension between ISPs and P2P. In: Sixth International Workshop on Peer-to-Peer Systems (IPTPS 2007), Bellevue, WA, US (February 2007)

    Google Scholar 

  7. Hefeeda, M., Hsu, C., Mokhtarian, K.: pCache: A Proxy Cache for Peer-to-Peer Traffic. In: ACM SIGCOMM 2008 Technical Demonstration, Seattle, WA (August 2008)

    Google Scholar 

  8. Xu, Z., Hui, T., Wei, Q., Chao, S., Nan, M.: DDP: A Novel P2P Taffic Management and Optimization Protocol. In: Third International Conference on Communications and Networking in China (ChinaCom 2008), August 25-27, pp. 208–212 (2008)

    Google Scholar 

  9. Li, X., Ling, L.: Peertrus: Supporting reputation-based trust for Peer-to-Peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)

    Article  Google Scholar 

  10. Friedman, E.J., Halpern, J.Y., Kash, I.A.: Efficiency and nash equilibria in a scrip system for P2P networks. In: Proceedings of the 7th ACM Conference on Electronic Commerce, EC 2006, Ann Arbor, Michigan, USA, pp. 140–149 (2006)

    Google Scholar 

  11. Ma, R.T.B., Lee, S., Lui, J., Yau, D.K.Y.: A game theoretic approach to provide incentive and service differentiation in P2P networks. In: Proceedings of the InternationaI Conference on Measurements and Modeling of Cormputer Systems, SIGMETRICS 2004, New York, USA, pp. 189–198 (2004)

    Google Scholar 

  12. Peng, D., Lin, C., Liu, W.: Improving the Performance of Payment Mechanism Based P2P Application with Altruistic Nodes. Chinese Journal of Computers 6(30), 953–959 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, X., Zhang, H., Yin, C. (2012). DHT-Based Cross-Transmission Protocol Peer-to-Peer Resource Sharing Model. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_68

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35211-9_68

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35210-2

  • Online ISBN: 978-3-642-35211-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics