SlideShare a Scribd company logo
1 of 8
International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013
DOI : 10.5121/ijp2p.2013.4201 1
A Cooperative Peer Clustering Scheme for
Unstructured Peer-to-Peer Systems
Satoshi Fujita1
1
Department of Information Engineering, Hiroshima University, Japan
fujita@se.hiroshima-u.ac.jp
ABSTRACT
This paper proposes a peer clustering scheme for unstructured Peer-to-Peer (P2P) systems. The proposed
scheme consists of an identification of critical links, local reconfiguration of incident links, and a
retaliation rule. The simulation result indicates that the proposed scheme improves the performance of
previous schemes and that a peer taking a cooperative action will receive a higher profit than selfish peers.
KEYWORDS
Unstructured P2P, Peer Clustering, Local Reconfiguration, Retaliation Rule
1. INTRODUCTION
Peer clustering is a key operation for fully distributed systems such as wireless ad hoc networks
and unstructured Peer-to-Peer (P2P) systems [4,7,8,9,10,11]. The objective of peer clustering is to
reconfigure the structure of an overlay network in such a way that the specific peers becomes
closer without increasing the total number of links in the network.
The performance of peer clustering schemes in unstructured P2Ps is generally measured by the hit
rate of a search task and/or the cost required for specific tasks such as message routing, streaming,
and others. Although there are several peer clustering schemes proposed in the literature [1,5,6],
the performance of those schemes is severely affected by the “criticalness” of links in the overlay.
For example, in unstructured P2Ps, a file search is realized by flooding a query message through
an overlay by setting an appropriate TTL (Time-to-Live) to each query. Hence, the removal of a
critical link would cause an unreachability of queries to their destination, which significantly
degrades the hit rate of the overall search process. On the other hand, many of existing clustering
schemes could not tolerate a situation in which a peer which fully utilizes its incident links
refuses an additional request for a connection even if it has a neighbor to have enough capacity.
Such observations motivate us to develop a peer clustering scheme in which participating peers
wish to cooperate with each other, in such a way that the profit of all peers are kept sufficiently
high, important links will be given a high priority, and a peer with high capacity could support the
connection of other low-capacity peers.
In this paper, we propose a peer clustering scheme to attain such goals. More concretely, after
reviewing related work in Section 2, we will propose a cooperative peer clustering scheme for
unstructured P2Ps. The basic idea of the scheme is to use the notion of retaliation similar to Tit-
for-Tat strategy which has been widely used in many P2P systems including BitTorrent. The
performance of the proposed scheme is evaluated by simulation. The result of simulations
International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013
2
indicates that the proposed scheme certainly improves the performance of previous schemes with
respect to the hit rate and a peer taking a cooperative action will receive a higher profit than
selfish peers.
Figure 1.Reconfiguration of overlay network.
2. RELATED WORK
Cholvi et al. [1]proposed a clustering scheme in which two peers are connected by a link when
they mutually recognize their counterpart as an acquaintance, where peer “a” recognizes peer “b”
as an acquaintance if “b” provides “a” a file requested by “a.”Raftpoulou and Petrakis proposed a
scheme based on the similarity of interest [5], where interest of users is defined as the type of files,
and is represented by a characteristic vector in an appropriate vector space. Sripanidkulchai et al.
proposed a scheme based on the notion of shortcuts which are temporally established between
peers while conducting a file search [6]. The reader should note that in all of the above three
schemes, each peer conducts a (re)establishment of links in a selfish manner and does not
consider the benefit of other peers while conducting such a (re)establishment.
Tit-for-tat (TFT) is a common strategy used in two-players games, which is informally described
as follows: Unless provoked, the player will always cooperate, and if provoked, the player will
retaliate. It is widely recognized that under such an equivalent retaliation strategy, a selfish player
could not obtain enough profit compared with a cooperative player who tries to keep the profit of
the other players while trying to increase its own profit. TFT strategy has already been used in
many P2P applications. For example, in BitTorrent [2], each shared file is divided into small
fragments called pieces, and is downloaded from the network by repeating an exchange of pieces
among nearby peers, where TFT is used in such a way that a peer who uploaded a piece to other
peers is granted a right to download necessary pieces from other peers. As another example, in
Garbacki’s protocol [3], a peer is granted to use the communication bandwidth of other peers if it
contributes to those peers by providing its communication bandwidth.
3. PROPOSED METHOD
3.1. Critical Links
In this paper, for simplicity, we assume that each peer belongs to exactly one community sharing
the same interest1
. As for the definition of interest and community, we adopt a simple model in
1
We also assume that such a community is constructed merely implicitly and it is not possible to register all such
communities to a centralized computer such as tracker and index server used in many existing P2P systems.
International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013
3
order to concentrate on the effect of the retaliation in peer clustering (see Section 4.1 for the detail
of simulation model). In addition, we assume that each peer wants to collect as many peers
belonging to the same community within a predetermined “visible” region as possible, and regard
the number of such visible peers as the profit received through a peer clustering. More concretely,
peers in each community are initially distributed over an overlay network in an arbitrary manner,
and during a clustering, they try to reconfigure the network in such a way that the number of
visible peers is maximized, without increasing the total number of links and without reducing the
number of visible peers for the other peers. See Figure 1 for illustration. The left figure shows the
initial overlay in which two blue peers are not visible with each other with TTL one and the right
figure shows the overlay after conducting a reconfiguration so that two blue peers are visible with
each other.
Let t be an integer representing the limit for such a visible region, i.e., t corresponds to the TTL of
queries issued by each peer. Let A be a community. As a formal definition of the criticalness of
links, the notion of t-criticalness is now defined as follows:
Definition1LetubeapeerincommunityAandebealinkinG. eis said to be t-critical for u if there is a
peer v in community A such that: 1) the distance between u and v in G = (V,E) is at most t, and 2)
the distance between u and v in G’= (V,E −{e}) is at least t+1.
In what follows, a t-critical link for some peer is simply referred to as t-critical, and we often omit
parameter t if it is clear from the context.
3.2. Recognition of Critical Links
In the proposed scheme, query and query response play an important role to recognize critical
links. Before issuing a query, the originator of the query attaches its interest to the query. It then
broadcasts the query to all peers within a fixed TTL, where each copy of the query records: 1) the
length of a shortest path from the originator (i.e., hop count) and 2) ID of peers existing on the
forwarding path. Suppose that peer u receives a query from an adjacent peer. If it satisfies one of
the following two conditions, u returns a query response to the originator, and otherwise, it
simply forwards a copy of the received query to its neighbors as long as it did not exhaust the
TTL:
• If it holds a file matching the given query, or
• If it has a similar interest to the originator of the query.
Query response is returned to the originator through the forwarding path in a reverse direction. By
analyzing query responses received from adjacent peers, the originator can identify a peer which
has a similar interest to the originator and is located at distance t from him.
After identifying such critical links in the network, each peer notifies it to all peers in its range of
TTL by attaching it to the queries issued in the succeeding steps. By this notification, each peer
can recognize the criticalness of links incident to the peer.
3.3. Recognition Rule
In the proposed clustering scheme, the notion of mate plays an important role. Two peers “a” and
“b” sharing the same interest are said to be mate if “a” is incident on a critical link for “b,” and “b”
is incident on a critical link for “a.” The proposed reconfiguration rule is designed in such a way
that each peer tries to keep critical links for its mates. More concretely, each peer can remove its
incident links according to the following rule:
International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013
4
1. A link which is not critical for any mate can always be removed.
2. If all incident links are critical for some mate, then with probability 1/k for some integer k (≥
1), it can remove one of such links.
In the evaluation shown in the next section, we will fix parameter k to 20 according to the result
of preliminary experiments.
3.4. Retaliation
In order to realize an effective retaliation to a treachery, in the proposed scheme, we use a tracker
to keep the history of reconfigurations conducted by the participant peers2
. Concrete procedure is
described as follows.
Step 1: Suppose that peer “a” removes an incident link connecting to peer“b.” After completing
such a removal, peer “a” notifies the fact of removal to the tracker with the following
information: 1) address of “a,” 2) address of “b,” and 3) interests of “b.” In the following, we call
it an update information. Received update information is stored at the tracker for a predetermined
time period.
Step 2: Each peer “c” periodically requests the tracker to send back a list of update information.
After receiving it, “c” identifies a set of peers which removed a critical link for “c” (the set may
be empty if all peers are cooperative). Let “d” be a peer contained in the identified set. If the
number of critical links for “c” which are removed by peer “d” exceeds a predetermined threshold,
“c” reports the fact to the tracker. If the number of reports concerned with peer “d” exceeds
another threshold, the tracker appends “d” to the black list.
Step 3: Each peer periodically requests the tracker to send back the black list. Then, for each
peer “d” contained in the list, the link connecting to “d” is forced to be removed (if any), and any
request received from “d” will be refused.
4. EVALUATION
4.1. Setup
Fix a set of 20 communities, and associate each peer with a random subset of four communities.
We say that two peers are friends if their corresponding subsets have a non-empty intersection (by
definition, a mate is a friend, but the reverse is not true). The number of peers is fixed to 1000.
Each peer has a file associated with each community in the subset, and each query issued by the
peers designates a community concerned with the requested file.
The performance of a clustering scheme is evaluated by using the following two metrics:
(1) The number of friends within t hops from the examined peer (Measure 1), and
(2) The number of friends weighted by an inverse of the distance from the examined peer
(Measure 2),
2
Note that it is reasonable to assume the existence of such a centralized computer, since many P2P systems such as
BitTorrent rely on the tracker to realize a join of new peers to the network.
International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013
5
where by letting N(h) be the number of friends at distance h, the latter metric is formally
described as
( )
In the following, we assume that each peer follows a predetermined clustering scheme in
establishing a link. More concretely, in Section 4.2, we will use a simple clustering scheme which
tries to establish a link to a friend discovered during a flooding of queries, and in Section 4.3, we
examine several clustering schemes proposed in the literature. On the other hand, as for the
removal of links, we will distinguish two cases, i.e., whether it follows the proposed
disconnection rule or not. A peer which follows the rule is called Type 1, and a peer which does
not follow the rule is called Type 2. In the simulation, we assume that x % of peers are of Type 1
and the remaining peers are of Type 2, where parameter x varies from 10 to 100. The retaliation
rule is uniformly applied to both types of peers. Thus, it is expected that although peer of Type 2
could receive a high profit within a short time period, as the elapsed time increases, the profit of
Type 1 peers becomes higher than the profit of Type 2 peers. In the simulation, we fix the
simulation time to 5 min. During this time period, each peer repeats the issue of a query and a
reconfiguration of incident links about 150 times.
(a) Measure 1.
(b) Measure 2.
Figure 2.Performance of the proposed scheme.
International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013
6
(a) Measure 1.
(b) Measure 2.
Figure 3.Comparison with previous schemes.
4.2. Effect of Proposed Disconnection Rule
At first, we evaluate the effect of the proposed cooperative disconnection rule. Figure 2
summarizes the result for k = 20 and t = 3, where the horizontal axis is the percentage x of Type 1
peers. As shown in the figure, in both metrics, the profit of Type 1 decreases as x decreases, while
that of Type 2 increases as x decreases. Two curves cross around x = 40% in Measure 1 and 10%
in Measure 2, where in general, Measure 2 evaluates the schemes more accurately than Measure 1,
since it reflects the distribution of friends beyond TTL.
Thus, although a detailed game theoretic analysis is left as a future work, if there are more Type 1
peers than the crossing point, a reasonable peer should take a cooperative action to increase its
own profit since it provides the peer a higher profit. In addition, peers at the crossing point should
International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013
7
take a cooperative action since it increases the chance of obtaining a higher profit, where the
badness of Type 2 peers is apparently due to the retaliation process and selfish behavior
conducted by other Type 2 peers.
4.3. Effect of Cooperative Disconnection in Other Schemes
Next, we evaluate the impact of the proposed disconnection rule in existing clustering schemes
described in Section 2. Figure 3 summarizes the result for k = 20 and t = 3, where the horizontal
axis is the percentage of Type 1 peers and the vertical axis is the profit averaged over all peers
including Type 1 and Type 2.
In Cholvi’s scheme, two peers are connected by a link if they mutually recognize their
counterpart as an acquaintance. In other words, the criteria for establishing a connection is much
higher than the random scheme examined in the last subsection although the possibility of
removing a link by an incident peer is rather small. As a result, although it beats the randomized
scheme with respect to Measure 1 for small x’s, the profit does not glow as rapidly as the
randomized scheme for larger x’s. In addition, as for Measure 2, the profit of the randomized
scheme is almost twice of the Cholvi’s scheme.
The heuristic adopted in the Raftpolou’s scheme conflicts with the cooperative behavior of Type
1 peers. In Raftpoulou’s scheme, each peer acquires the information of remote peers through
long-range links, i.e., it uses those links in keeping the scope of the participant peers, while it
reconfigures the overlay based on the similarity of their interest. Thus the effect of
reconfigurations becomes small if many peers act cooperatively. In fact, as shown in the figure,
the randomized scheme outperforms the Raftpolou’s scheme for large x’s; e.g., the amount of
improvement is 12% for Measure 1 and 21% for Measure 2.
The superiority of the randomized scheme can also be observed in a comparison with the
Sripanidkulchai’s scheme; e.g., the amount of improvement is 69% for Measure 1 and 74% for
Measure 2. The key idea of the Sripanidkulchai’s scheme is to use shortcuts in realizing effective
reconfigurations, where shortcut is a tentative link established during a file exploration and will
be removed after completing the exploration. Thus, even if it would be t-critical for some peer, a
shortcut is easily removed in many cases, and such a selfish behavior increases the frequency of
invocations of the retaliations, which degrades the performance of the overall scheme.
5. CONCLUDING REMARKS
This paper proposed a cooperative peer clustering scheme for unstructured P2Ps based on the
notion of retaliation. The performance of the proposed scheme is evaluated by simulation, and the
result of simulations indicates that it certainly improves the performance of conventional schemes
particularly when the percentage of cooperative peers is large. A future work is to provide a
theoretical analysis of the proposed scheme, including the analysis of the convergence speed.
ACKNOWLEDGEMENTS
The author would like to thank Mr. Aoki for his contribution to conduct simulations.
International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013
8
REFERENCES
[1] V. Cholvi, P. Felberand E. Biersack, (2004) “Efficient Search in Unstructured Peer-to-Peer
Networks,”Proc. 16th Annual ACM Symp.on Parallelism in Algorithms and Architectures, pp.271-
272.
[2] B. Cohen, (2003) “Incentives Build Robustness in BitTorrent,”bittorrent.org.
[3] P.Garbacki,D.H.J.EpemaandM.V.Steen, (2007) “AnAmortizedTit-For-Tat Protocol for Exchanging
Bandwidth instead of Content in P2P Networks,” Proc. 1st International Conference on Self-
Adaptive and Self-OrganizingSystems, pp.119-128.
[4] Available at http://en.wikipedia.org/wiki/Gnutella.
[5] P. Raftopoulou and E. G. M. Petrakis, (2008) “iCluster: A Self-organizing OverlayNetwork for P2P
Information Retrieval,”Advances in Information Retrieval:Springer, pp.65-76.
[6] K.Sripanidkulchai,B.MaggsandH.Zhang, (2003) “Efficientcontentlocationusing interest-based locality
in peer-to-peer systems,”Proc. INFOCOM, pp.2166-2176.
[7] M. Xu, G.-Z. Liu, (2011) “Building self-adaptive Peer-to-Peer overlay networks with dynamic cluster
structure,” Proc. 13th International Conference on Communication Technology (ICCT), IEEE,
pp.520-525.
[8] D. B.Khedher, (2012) “A Peer-to-Peer Self-Organizing Scheme for Multiparty
Session,”Proc. International Conference on Communication (ICC 2012), IEEE, pp. 6535-6539.
[9] H.-C.Jang, L.-J.Tzeng, (2012) “Affinity Propagation with File Similarity based Clustering for P2P
File Sharing in VANET,”Proc. the 15th International Symposium on Wireless Personal Multimedia
Communications (WPMC 2012), pp.70-74.
[10] Z.-J. Deng, W. Song, X.-F.Zheng, (2010) “P2PKMM: A Hybrid Clustering Algorithm over P2P
Network,”Proc. the3rd International Symposium on Intelligent Information Technology and Security
Informatics (IITSI 2010), pp. 450-454.
[11] S. Aslam, I. Kazmi, M. Y. Javed, M.S. Anwar, (2010) “Cluster based peers configuration with
multiple physical parameters using HCNP in Peer-to-Peer overlay networks,” Proc.2010 International
Conference on Computer Applications and Industrial Electronics (ICCAIE), pp.142-147.
AUTHOR
Dr. Satoshi Fujita received the B.E. degree in electrical engineering, M.E. degree in systems engineering, and
Dr.E. degree in information engineering from Hiroshima University in 1985, 1987, and 1990, respectively.
Currently, he is a Professor at the Institute of Engineering, Hiroshima University. His research interests include
communication algorithms in interconnection networks, parallel algorithms, graph algorithms, and parallel and
distributed computer systems. He is a member of the IEICE, IPSJ, SIAM Japan, IEEE Computer Society, and
SIAM.

More Related Content

What's hot

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...ijcsit
 
Social network analysis basics
Social network analysis basicsSocial network analysis basics
Social network analysis basicsPradeep Kumar
 
Using Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactUsing Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactYunhao Zhang
 
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...csandit
 
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK csandit
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...ijcisjournal
 
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelA Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelEswar Publications
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
Using content and interactions for discovering communities in
Using content and interactions for discovering communities inUsing content and interactions for discovering communities in
Using content and interactions for discovering communities inmoresmile
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...IJCNCJournal
 
Finding bursty topics from microblogs
Finding bursty topics from microblogsFinding bursty topics from microblogs
Finding bursty topics from microblogsmoresmile
 

What's hot (11)

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
 
Social network analysis basics
Social network analysis basicsSocial network analysis basics
Social network analysis basics
 
Using Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactUsing Networks to Measure Influence and Impact
Using Networks to Measure Influence and Impact
 
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...
 
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
 
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelA Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
Using content and interactions for discovering communities in
Using content and interactions for discovering communities inUsing content and interactions for discovering communities in
Using content and interactions for discovering communities in
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
 
Finding bursty topics from microblogs
Finding bursty topics from microblogsFinding bursty topics from microblogs
Finding bursty topics from microblogs
 

Viewers also liked

1 s2.0-s0272884214017489-main
1 s2.0-s0272884214017489-main1 s2.0-s0272884214017489-main
1 s2.0-s0272884214017489-mainAntonio Silva
 
TAIWO MICHEAL SUNDAY new (1) CV
TAIWO MICHEAL SUNDAY new (1) CVTAIWO MICHEAL SUNDAY new (1) CV
TAIWO MICHEAL SUNDAY new (1) CVTaiwo Michael.S
 
ANZ Fabric Frnt Pic2014_
ANZ Fabric Frnt Pic2014_ANZ Fabric Frnt Pic2014_
ANZ Fabric Frnt Pic2014_Geoff Pearson
 
mICF poster 3 (thomas) micf content specifications
mICF poster 3 (thomas) micf content specificationsmICF poster 3 (thomas) micf content specifications
mICF poster 3 (thomas) micf content specificationsStefanus Snyman
 
TWR EDPL Homes MT Mar 16
TWR EDPL Homes MT Mar 16TWR EDPL Homes MT Mar 16
TWR EDPL Homes MT Mar 16Miranda Tay
 
Trabajos blogger
Trabajos bloggerTrabajos blogger
Trabajos bloggerMeritaBrm
 
Biblioteca Bielorruso
Biblioteca BielorrusoBiblioteca Bielorruso
Biblioteca BielorrusoPameLoAr
 
Training Project Timeline
Training Project TimelineTraining Project Timeline
Training Project TimelineDeborah Crowley
 
Pendidikan Kewarganegaraan
Pendidikan KewarganegaraanPendidikan Kewarganegaraan
Pendidikan KewarganegaraanMuhamad Yogi
 

Viewers also liked (15)

'Open' (Data) in the Library
 'Open' (Data) in the Library 'Open' (Data) in the Library
'Open' (Data) in the Library
 
1 s2.0-s0272884214017489-main
1 s2.0-s0272884214017489-main1 s2.0-s0272884214017489-main
1 s2.0-s0272884214017489-main
 
TAIWO MICHEAL SUNDAY new (1) CV
TAIWO MICHEAL SUNDAY new (1) CVTAIWO MICHEAL SUNDAY new (1) CV
TAIWO MICHEAL SUNDAY new (1) CV
 
Vetor
VetorVetor
Vetor
 
ANZ Fabric Frnt Pic2014_
ANZ Fabric Frnt Pic2014_ANZ Fabric Frnt Pic2014_
ANZ Fabric Frnt Pic2014_
 
mICF poster 3 (thomas) micf content specifications
mICF poster 3 (thomas) micf content specificationsmICF poster 3 (thomas) micf content specifications
mICF poster 3 (thomas) micf content specifications
 
Mountains
MountainsMountains
Mountains
 
Finaldoc
FinaldocFinaldoc
Finaldoc
 
TWR EDPL Homes MT Mar 16
TWR EDPL Homes MT Mar 16TWR EDPL Homes MT Mar 16
TWR EDPL Homes MT Mar 16
 
Trabajos blogger
Trabajos bloggerTrabajos blogger
Trabajos blogger
 
Biblioteca Bielorruso
Biblioteca BielorrusoBiblioteca Bielorruso
Biblioteca Bielorruso
 
Training Project Timeline
Training Project TimelineTraining Project Timeline
Training Project Timeline
 
Pendidikan Kewarganegaraan
Pendidikan KewarganegaraanPendidikan Kewarganegaraan
Pendidikan Kewarganegaraan
 
İnovatif Kimya Dergisi Sayı-31
İnovatif Kimya Dergisi Sayı-31İnovatif Kimya Dergisi Sayı-31
İnovatif Kimya Dergisi Sayı-31
 
İnovatif Kimya Dergisi Sayı-3
İnovatif Kimya Dergisi Sayı-3 İnovatif Kimya Dergisi Sayı-3
İnovatif Kimya Dergisi Sayı-3
 

Similar to A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems

IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
 
Preclusion Measures for Protecting P2P Networks from Malware Spread
Preclusion Measures for Protecting P2P Networks from Malware  SpreadPreclusion Measures for Protecting P2P Networks from Malware  Spread
Preclusion Measures for Protecting P2P Networks from Malware SpreadIOSR Journals
 
Hamalt genetics based peer to-peer network architecture to encourage the coo...
Hamalt  genetics based peer to-peer network architecture to encourage the coo...Hamalt  genetics based peer to-peer network architecture to encourage the coo...
Hamalt genetics based peer to-peer network architecture to encourage the coo...csandit
 
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...cscpconf
 
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...csandit
 
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSIJNSA Journal
 
Analyzing peer selection policies for
Analyzing peer selection policies forAnalyzing peer selection policies for
Analyzing peer selection policies forIJCNCJournal
 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...IJMTST Journal
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
 
EXPLORING PEER-TO-PEER DATA MINING
EXPLORING PEER-TO-PEER DATA MININGEXPLORING PEER-TO-PEER DATA MINING
EXPLORING PEER-TO-PEER DATA MININGcscpconf
 
A MOBILE AGENT-BASED P2P E-LEARNING SYSTEM. Takao KAWAMURA & others
A MOBILE AGENT-BASED P2P E-LEARNING SYSTEM. Takao KAWAMURA & othersA MOBILE AGENT-BASED P2P E-LEARNING SYSTEM. Takao KAWAMURA & others
A MOBILE AGENT-BASED P2P E-LEARNING SYSTEM. Takao KAWAMURA & otherseraser Juan José Calderón
 
DISTRIBUTED E-LEARNING SYSTEM USING AN HYBRID P2P-BASED CONTENT ADDRESSABLE ...
DISTRIBUTED E-LEARNING SYSTEM USING AN  HYBRID P2P-BASED CONTENT ADDRESSABLE ...DISTRIBUTED E-LEARNING SYSTEM USING AN  HYBRID P2P-BASED CONTENT ADDRESSABLE ...
DISTRIBUTED E-LEARNING SYSTEM USING AN HYBRID P2P-BASED CONTENT ADDRESSABLE ...ijdpsjournal
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS ijp2p
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
 
Social Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network ContextSocial Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network ContextIRJET Journal
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
 

Similar to A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems (20)

IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
 
Preclusion Measures for Protecting P2P Networks from Malware Spread
Preclusion Measures for Protecting P2P Networks from Malware  SpreadPreclusion Measures for Protecting P2P Networks from Malware  Spread
Preclusion Measures for Protecting P2P Networks from Malware Spread
 
Hamalt genetics based peer to-peer network architecture to encourage the coo...
Hamalt  genetics based peer to-peer network architecture to encourage the coo...Hamalt  genetics based peer to-peer network architecture to encourage the coo...
Hamalt genetics based peer to-peer network architecture to encourage the coo...
 
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
 
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
 
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
 
Analyzing peer selection policies for
Analyzing peer selection policies forAnalyzing peer selection policies for
Analyzing peer selection policies for
 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
EXPLORING PEER-TO-PEER DATA MINING
EXPLORING PEER-TO-PEER DATA MININGEXPLORING PEER-TO-PEER DATA MINING
EXPLORING PEER-TO-PEER DATA MINING
 
A MOBILE AGENT-BASED P2P E-LEARNING SYSTEM. Takao KAWAMURA & others
A MOBILE AGENT-BASED P2P E-LEARNING SYSTEM. Takao KAWAMURA & othersA MOBILE AGENT-BASED P2P E-LEARNING SYSTEM. Takao KAWAMURA & others
A MOBILE AGENT-BASED P2P E-LEARNING SYSTEM. Takao KAWAMURA & others
 
DISTRIBUTED E-LEARNING SYSTEM USING AN HYBRID P2P-BASED CONTENT ADDRESSABLE ...
DISTRIBUTED E-LEARNING SYSTEM USING AN  HYBRID P2P-BASED CONTENT ADDRESSABLE ...DISTRIBUTED E-LEARNING SYSTEM USING AN  HYBRID P2P-BASED CONTENT ADDRESSABLE ...
DISTRIBUTED E-LEARNING SYSTEM USING AN HYBRID P2P-BASED CONTENT ADDRESSABLE ...
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
 
Social Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network ContextSocial Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network Context
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
 

More from ijp2p

International Journal of Peer to Peer Networks .docx
International Journal of Peer to  Peer Networks .docxInternational Journal of Peer to  Peer Networks .docx
International Journal of Peer to Peer Networks .docxijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)ijp2p
 
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)ijp2p
 
7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...ijp2p
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)ijp2p
 
11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...ijp2p
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)ijp2p
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022) 4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022) ijp2p
 
CIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdfCIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdfijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)ijp2p
 
3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...ijp2p
 
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)ijp2p
 
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...ijp2p
 
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)ijp2p
 
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)ijp2p
 
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)ijp2p
 
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...ijp2p
 

More from ijp2p (20)

International Journal of Peer to Peer Networks .docx
International Journal of Peer to  Peer Networks .docxInternational Journal of Peer to  Peer Networks .docx
International Journal of Peer to Peer Networks .docx
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
 
7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
 
11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022) 4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
 
CIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdfCIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdf
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...
 
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
 
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
 
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
 
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...
 

Recently uploaded

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 

Recently uploaded (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems

  • 1. International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013 DOI : 10.5121/ijp2p.2013.4201 1 A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems Satoshi Fujita1 1 Department of Information Engineering, Hiroshima University, Japan fujita@se.hiroshima-u.ac.jp ABSTRACT This paper proposes a peer clustering scheme for unstructured Peer-to-Peer (P2P) systems. The proposed scheme consists of an identification of critical links, local reconfiguration of incident links, and a retaliation rule. The simulation result indicates that the proposed scheme improves the performance of previous schemes and that a peer taking a cooperative action will receive a higher profit than selfish peers. KEYWORDS Unstructured P2P, Peer Clustering, Local Reconfiguration, Retaliation Rule 1. INTRODUCTION Peer clustering is a key operation for fully distributed systems such as wireless ad hoc networks and unstructured Peer-to-Peer (P2P) systems [4,7,8,9,10,11]. The objective of peer clustering is to reconfigure the structure of an overlay network in such a way that the specific peers becomes closer without increasing the total number of links in the network. The performance of peer clustering schemes in unstructured P2Ps is generally measured by the hit rate of a search task and/or the cost required for specific tasks such as message routing, streaming, and others. Although there are several peer clustering schemes proposed in the literature [1,5,6], the performance of those schemes is severely affected by the “criticalness” of links in the overlay. For example, in unstructured P2Ps, a file search is realized by flooding a query message through an overlay by setting an appropriate TTL (Time-to-Live) to each query. Hence, the removal of a critical link would cause an unreachability of queries to their destination, which significantly degrades the hit rate of the overall search process. On the other hand, many of existing clustering schemes could not tolerate a situation in which a peer which fully utilizes its incident links refuses an additional request for a connection even if it has a neighbor to have enough capacity. Such observations motivate us to develop a peer clustering scheme in which participating peers wish to cooperate with each other, in such a way that the profit of all peers are kept sufficiently high, important links will be given a high priority, and a peer with high capacity could support the connection of other low-capacity peers. In this paper, we propose a peer clustering scheme to attain such goals. More concretely, after reviewing related work in Section 2, we will propose a cooperative peer clustering scheme for unstructured P2Ps. The basic idea of the scheme is to use the notion of retaliation similar to Tit- for-Tat strategy which has been widely used in many P2P systems including BitTorrent. The performance of the proposed scheme is evaluated by simulation. The result of simulations
  • 2. International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013 2 indicates that the proposed scheme certainly improves the performance of previous schemes with respect to the hit rate and a peer taking a cooperative action will receive a higher profit than selfish peers. Figure 1.Reconfiguration of overlay network. 2. RELATED WORK Cholvi et al. [1]proposed a clustering scheme in which two peers are connected by a link when they mutually recognize their counterpart as an acquaintance, where peer “a” recognizes peer “b” as an acquaintance if “b” provides “a” a file requested by “a.”Raftpoulou and Petrakis proposed a scheme based on the similarity of interest [5], where interest of users is defined as the type of files, and is represented by a characteristic vector in an appropriate vector space. Sripanidkulchai et al. proposed a scheme based on the notion of shortcuts which are temporally established between peers while conducting a file search [6]. The reader should note that in all of the above three schemes, each peer conducts a (re)establishment of links in a selfish manner and does not consider the benefit of other peers while conducting such a (re)establishment. Tit-for-tat (TFT) is a common strategy used in two-players games, which is informally described as follows: Unless provoked, the player will always cooperate, and if provoked, the player will retaliate. It is widely recognized that under such an equivalent retaliation strategy, a selfish player could not obtain enough profit compared with a cooperative player who tries to keep the profit of the other players while trying to increase its own profit. TFT strategy has already been used in many P2P applications. For example, in BitTorrent [2], each shared file is divided into small fragments called pieces, and is downloaded from the network by repeating an exchange of pieces among nearby peers, where TFT is used in such a way that a peer who uploaded a piece to other peers is granted a right to download necessary pieces from other peers. As another example, in Garbacki’s protocol [3], a peer is granted to use the communication bandwidth of other peers if it contributes to those peers by providing its communication bandwidth. 3. PROPOSED METHOD 3.1. Critical Links In this paper, for simplicity, we assume that each peer belongs to exactly one community sharing the same interest1 . As for the definition of interest and community, we adopt a simple model in 1 We also assume that such a community is constructed merely implicitly and it is not possible to register all such communities to a centralized computer such as tracker and index server used in many existing P2P systems.
  • 3. International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013 3 order to concentrate on the effect of the retaliation in peer clustering (see Section 4.1 for the detail of simulation model). In addition, we assume that each peer wants to collect as many peers belonging to the same community within a predetermined “visible” region as possible, and regard the number of such visible peers as the profit received through a peer clustering. More concretely, peers in each community are initially distributed over an overlay network in an arbitrary manner, and during a clustering, they try to reconfigure the network in such a way that the number of visible peers is maximized, without increasing the total number of links and without reducing the number of visible peers for the other peers. See Figure 1 for illustration. The left figure shows the initial overlay in which two blue peers are not visible with each other with TTL one and the right figure shows the overlay after conducting a reconfiguration so that two blue peers are visible with each other. Let t be an integer representing the limit for such a visible region, i.e., t corresponds to the TTL of queries issued by each peer. Let A be a community. As a formal definition of the criticalness of links, the notion of t-criticalness is now defined as follows: Definition1LetubeapeerincommunityAandebealinkinG. eis said to be t-critical for u if there is a peer v in community A such that: 1) the distance between u and v in G = (V,E) is at most t, and 2) the distance between u and v in G’= (V,E −{e}) is at least t+1. In what follows, a t-critical link for some peer is simply referred to as t-critical, and we often omit parameter t if it is clear from the context. 3.2. Recognition of Critical Links In the proposed scheme, query and query response play an important role to recognize critical links. Before issuing a query, the originator of the query attaches its interest to the query. It then broadcasts the query to all peers within a fixed TTL, where each copy of the query records: 1) the length of a shortest path from the originator (i.e., hop count) and 2) ID of peers existing on the forwarding path. Suppose that peer u receives a query from an adjacent peer. If it satisfies one of the following two conditions, u returns a query response to the originator, and otherwise, it simply forwards a copy of the received query to its neighbors as long as it did not exhaust the TTL: • If it holds a file matching the given query, or • If it has a similar interest to the originator of the query. Query response is returned to the originator through the forwarding path in a reverse direction. By analyzing query responses received from adjacent peers, the originator can identify a peer which has a similar interest to the originator and is located at distance t from him. After identifying such critical links in the network, each peer notifies it to all peers in its range of TTL by attaching it to the queries issued in the succeeding steps. By this notification, each peer can recognize the criticalness of links incident to the peer. 3.3. Recognition Rule In the proposed clustering scheme, the notion of mate plays an important role. Two peers “a” and “b” sharing the same interest are said to be mate if “a” is incident on a critical link for “b,” and “b” is incident on a critical link for “a.” The proposed reconfiguration rule is designed in such a way that each peer tries to keep critical links for its mates. More concretely, each peer can remove its incident links according to the following rule:
  • 4. International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013 4 1. A link which is not critical for any mate can always be removed. 2. If all incident links are critical for some mate, then with probability 1/k for some integer k (≥ 1), it can remove one of such links. In the evaluation shown in the next section, we will fix parameter k to 20 according to the result of preliminary experiments. 3.4. Retaliation In order to realize an effective retaliation to a treachery, in the proposed scheme, we use a tracker to keep the history of reconfigurations conducted by the participant peers2 . Concrete procedure is described as follows. Step 1: Suppose that peer “a” removes an incident link connecting to peer“b.” After completing such a removal, peer “a” notifies the fact of removal to the tracker with the following information: 1) address of “a,” 2) address of “b,” and 3) interests of “b.” In the following, we call it an update information. Received update information is stored at the tracker for a predetermined time period. Step 2: Each peer “c” periodically requests the tracker to send back a list of update information. After receiving it, “c” identifies a set of peers which removed a critical link for “c” (the set may be empty if all peers are cooperative). Let “d” be a peer contained in the identified set. If the number of critical links for “c” which are removed by peer “d” exceeds a predetermined threshold, “c” reports the fact to the tracker. If the number of reports concerned with peer “d” exceeds another threshold, the tracker appends “d” to the black list. Step 3: Each peer periodically requests the tracker to send back the black list. Then, for each peer “d” contained in the list, the link connecting to “d” is forced to be removed (if any), and any request received from “d” will be refused. 4. EVALUATION 4.1. Setup Fix a set of 20 communities, and associate each peer with a random subset of four communities. We say that two peers are friends if their corresponding subsets have a non-empty intersection (by definition, a mate is a friend, but the reverse is not true). The number of peers is fixed to 1000. Each peer has a file associated with each community in the subset, and each query issued by the peers designates a community concerned with the requested file. The performance of a clustering scheme is evaluated by using the following two metrics: (1) The number of friends within t hops from the examined peer (Measure 1), and (2) The number of friends weighted by an inverse of the distance from the examined peer (Measure 2), 2 Note that it is reasonable to assume the existence of such a centralized computer, since many P2P systems such as BitTorrent rely on the tracker to realize a join of new peers to the network.
  • 5. International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013 5 where by letting N(h) be the number of friends at distance h, the latter metric is formally described as ( ) In the following, we assume that each peer follows a predetermined clustering scheme in establishing a link. More concretely, in Section 4.2, we will use a simple clustering scheme which tries to establish a link to a friend discovered during a flooding of queries, and in Section 4.3, we examine several clustering schemes proposed in the literature. On the other hand, as for the removal of links, we will distinguish two cases, i.e., whether it follows the proposed disconnection rule or not. A peer which follows the rule is called Type 1, and a peer which does not follow the rule is called Type 2. In the simulation, we assume that x % of peers are of Type 1 and the remaining peers are of Type 2, where parameter x varies from 10 to 100. The retaliation rule is uniformly applied to both types of peers. Thus, it is expected that although peer of Type 2 could receive a high profit within a short time period, as the elapsed time increases, the profit of Type 1 peers becomes higher than the profit of Type 2 peers. In the simulation, we fix the simulation time to 5 min. During this time period, each peer repeats the issue of a query and a reconfiguration of incident links about 150 times. (a) Measure 1. (b) Measure 2. Figure 2.Performance of the proposed scheme.
  • 6. International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013 6 (a) Measure 1. (b) Measure 2. Figure 3.Comparison with previous schemes. 4.2. Effect of Proposed Disconnection Rule At first, we evaluate the effect of the proposed cooperative disconnection rule. Figure 2 summarizes the result for k = 20 and t = 3, where the horizontal axis is the percentage x of Type 1 peers. As shown in the figure, in both metrics, the profit of Type 1 decreases as x decreases, while that of Type 2 increases as x decreases. Two curves cross around x = 40% in Measure 1 and 10% in Measure 2, where in general, Measure 2 evaluates the schemes more accurately than Measure 1, since it reflects the distribution of friends beyond TTL. Thus, although a detailed game theoretic analysis is left as a future work, if there are more Type 1 peers than the crossing point, a reasonable peer should take a cooperative action to increase its own profit since it provides the peer a higher profit. In addition, peers at the crossing point should
  • 7. International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013 7 take a cooperative action since it increases the chance of obtaining a higher profit, where the badness of Type 2 peers is apparently due to the retaliation process and selfish behavior conducted by other Type 2 peers. 4.3. Effect of Cooperative Disconnection in Other Schemes Next, we evaluate the impact of the proposed disconnection rule in existing clustering schemes described in Section 2. Figure 3 summarizes the result for k = 20 and t = 3, where the horizontal axis is the percentage of Type 1 peers and the vertical axis is the profit averaged over all peers including Type 1 and Type 2. In Cholvi’s scheme, two peers are connected by a link if they mutually recognize their counterpart as an acquaintance. In other words, the criteria for establishing a connection is much higher than the random scheme examined in the last subsection although the possibility of removing a link by an incident peer is rather small. As a result, although it beats the randomized scheme with respect to Measure 1 for small x’s, the profit does not glow as rapidly as the randomized scheme for larger x’s. In addition, as for Measure 2, the profit of the randomized scheme is almost twice of the Cholvi’s scheme. The heuristic adopted in the Raftpolou’s scheme conflicts with the cooperative behavior of Type 1 peers. In Raftpoulou’s scheme, each peer acquires the information of remote peers through long-range links, i.e., it uses those links in keeping the scope of the participant peers, while it reconfigures the overlay based on the similarity of their interest. Thus the effect of reconfigurations becomes small if many peers act cooperatively. In fact, as shown in the figure, the randomized scheme outperforms the Raftpolou’s scheme for large x’s; e.g., the amount of improvement is 12% for Measure 1 and 21% for Measure 2. The superiority of the randomized scheme can also be observed in a comparison with the Sripanidkulchai’s scheme; e.g., the amount of improvement is 69% for Measure 1 and 74% for Measure 2. The key idea of the Sripanidkulchai’s scheme is to use shortcuts in realizing effective reconfigurations, where shortcut is a tentative link established during a file exploration and will be removed after completing the exploration. Thus, even if it would be t-critical for some peer, a shortcut is easily removed in many cases, and such a selfish behavior increases the frequency of invocations of the retaliations, which degrades the performance of the overall scheme. 5. CONCLUDING REMARKS This paper proposed a cooperative peer clustering scheme for unstructured P2Ps based on the notion of retaliation. The performance of the proposed scheme is evaluated by simulation, and the result of simulations indicates that it certainly improves the performance of conventional schemes particularly when the percentage of cooperative peers is large. A future work is to provide a theoretical analysis of the proposed scheme, including the analysis of the convergence speed. ACKNOWLEDGEMENTS The author would like to thank Mr. Aoki for his contribution to conduct simulations.
  • 8. International Journal of Peer to Peer Networks (IJP2P) Vol.4, No 2, May 2013 8 REFERENCES [1] V. Cholvi, P. Felberand E. Biersack, (2004) “Efficient Search in Unstructured Peer-to-Peer Networks,”Proc. 16th Annual ACM Symp.on Parallelism in Algorithms and Architectures, pp.271- 272. [2] B. Cohen, (2003) “Incentives Build Robustness in BitTorrent,”bittorrent.org. [3] P.Garbacki,D.H.J.EpemaandM.V.Steen, (2007) “AnAmortizedTit-For-Tat Protocol for Exchanging Bandwidth instead of Content in P2P Networks,” Proc. 1st International Conference on Self- Adaptive and Self-OrganizingSystems, pp.119-128. [4] Available at http://en.wikipedia.org/wiki/Gnutella. [5] P. Raftopoulou and E. G. M. Petrakis, (2008) “iCluster: A Self-organizing OverlayNetwork for P2P Information Retrieval,”Advances in Information Retrieval:Springer, pp.65-76. [6] K.Sripanidkulchai,B.MaggsandH.Zhang, (2003) “Efficientcontentlocationusing interest-based locality in peer-to-peer systems,”Proc. INFOCOM, pp.2166-2176. [7] M. Xu, G.-Z. Liu, (2011) “Building self-adaptive Peer-to-Peer overlay networks with dynamic cluster structure,” Proc. 13th International Conference on Communication Technology (ICCT), IEEE, pp.520-525. [8] D. B.Khedher, (2012) “A Peer-to-Peer Self-Organizing Scheme for Multiparty Session,”Proc. International Conference on Communication (ICC 2012), IEEE, pp. 6535-6539. [9] H.-C.Jang, L.-J.Tzeng, (2012) “Affinity Propagation with File Similarity based Clustering for P2P File Sharing in VANET,”Proc. the 15th International Symposium on Wireless Personal Multimedia Communications (WPMC 2012), pp.70-74. [10] Z.-J. Deng, W. Song, X.-F.Zheng, (2010) “P2PKMM: A Hybrid Clustering Algorithm over P2P Network,”Proc. the3rd International Symposium on Intelligent Information Technology and Security Informatics (IITSI 2010), pp. 450-454. [11] S. Aslam, I. Kazmi, M. Y. Javed, M.S. Anwar, (2010) “Cluster based peers configuration with multiple physical parameters using HCNP in Peer-to-Peer overlay networks,” Proc.2010 International Conference on Computer Applications and Industrial Electronics (ICCAIE), pp.142-147. AUTHOR Dr. Satoshi Fujita received the B.E. degree in electrical engineering, M.E. degree in systems engineering, and Dr.E. degree in information engineering from Hiroshima University in 1985, 1987, and 1990, respectively. Currently, he is a Professor at the Institute of Engineering, Hiroshima University. His research interests include communication algorithms in interconnection networks, parallel algorithms, graph algorithms, and parallel and distributed computer systems. He is a member of the IEICE, IPSJ, SIAM Japan, IEEE Computer Society, and SIAM.