HOME JOURNALS CONTACT

Journal of Applied Sciences

Year: 2013 | Volume: 13 | Issue: 5 | Page No.: 700-707
DOI: 10.3923/jas.2013.700.707
An Optimization Model for the Interconnection among Peers of the P2P Network
Huang Yongsheng, Tian Xiaoyu and Tang Zhongbin

Abstract: In peer to peer (P2P) network with large number of peers, better service performances usually mean more network resources. Optimizing interconnection scheme among the peers is a solution to enhance efficiency of the file searching and achieving with reduced scale of interconnections. In this study, by proper formatting the interconnection relation and information about file replica searching, the Particle Swarm Optimization (PSO) algorithm is employed to optimize the interconnection among the active peers. As the variation of the active peers and the file replicas distribution in the P2P network, the optimization procedure is time consuming. In order to shorten the iteration procedure, the competitive neural network algorithm is selected to involve the optimization. Simulative experimental results indicate the proposed model can achieve enhanced and stable optimization efficiency and effectiveness. Meanwhile, the network loading will be decreased as the scale of interconnections among peers is reduced.

Fulltext PDF Fulltext HTML

How to cite this article
Huang Yongsheng, Tian Xiaoyu and Tang Zhongbin, 2013. An Optimization Model for the Interconnection among Peers of the P2P Network. Journal of Applied Sciences, 13: 700-707.

Keywords: neural network, particle swarm optimization, file replica searching and P2P

INTRODUCTION

Information sharing is becoming an important activity in daily life. Taken as file sharing technology, peer to peer (P2P) network technology is one of the most widely used network technologies (Koenigstein et al., 2012). As a peer needs a file, it sends out search request to found the file replicas in the other peer. More file replicas are found with less time and network loading cost means the service performance is better (Beraldi et al., 2009). To find more requiring file replicas with less time and network loading cost, proper organizing the interconnection among the peers is one of the main approaches (Cao and Fujita, 2012).

The number of hops a search request walking from a peer to another before finding a file replica influences the time cost directly, which requires that the peers with requiring file replicas can be reached at less number of hops (Feng et al., 2011). In P2P network, a peer has more connections with the other peers and then it can reach the other peers with less number of hops. More connections means peers should send out more search requests and then the network loading is added rapidly (Hsiao and Su, 2012). Consequently, more connections between peers and less network loading are conflicted.

To solve the contradiction, reducing connections between peers and enhancing the functions of some peers is a widely accepted approach (Erola et al., 2011; Doulkeridis et al., 2010). In the article (Garbacki et al., 2010), the architectures of P2P network with super peers are proposed utilizing multifunctional nodes based on the heterogeneity of the nodes. Adding connections between peers and meanwhile selecting a portion of connections to send search requests is another feasible approach (Huang et al., 2010; Dhurandher et al., 2011). Based on the file sharing pattern exhibiting the power-law property, Kucharzak et al. (2011) proposes an optimization model in which searching an object in the P2P network efficiently takes a small constant hops by searching progressively and effectively on the similarity of peers.

In this study, the optimization to the interconnection among peers is taken as the only essential factor beforehand. The number of the connections between two peers will be continuously adjusted according to the variation of the active peers and the file replica distribution in the P2P network. Based on designing the format of interconnection relation and information about file replica searching, the particle swarm optimization algorithm is employed with the competitive neural network algorithm involved to reduce the time cost of the optimization procedure. Simulative experimental results demonstrate the enhanced efficiency and effectiveness of the proposed model.

DESCRIPTION TO THE INTERCONNECTION AMONG PEERS AND INFORMATION ABOUT FILE SEARCHING

Interconnections among the peers: The set of the peers in the network can be denoted as P [p1, p2,... pn]. The connection relationship among the peers can be expressed by a matrix [CNij]nxn:

In the matrix, cnij represents the connection relationship between the peer pi and the peer pj. The value of cnij is denoted by the following formula:

(1)

In the P2P network, a peer pi is connected to another peer pj means pi can dispatch or relay a search request to pj. As a result, it is not necessary that the connection between two peers is bidirectional. In other word, pi is connected to pj does not means pj is connected to another peer pi. Consequently, both cnij = cnji and cnij ≠ cnji are probable. The connection of a peer itself is meaningless and then cnij is set to 0.

Dispatching procedure of the search request: The peers share their file resource in the P2P network. When a peer has not a file and wants to achieve the file, it will search the file from the other peers in the P2P network. If the file is found in some of the other peers, it can download the file from the peers and will acquire the file finally. Utilizing the technology of file block transmission, more file replicas are found, that is, more peers with searched file are found, means the file will be achieve more rapidly. Consequently, the peers with searched files are found more quickly and more peers with required file replicas are found mean the efficiency of the P2P network is higher (Endo et al., 2012).

In the running P2P network, when a peer needs to search a file, a search request will be sent to the peers which the peer is connected to. In order to widen the search scope, the peers which have received the search request should relay the search request to another peers which the peers are connected to. Correspondingly, the search scope is wider, more search requests will be relayed in the network and the load of the network will be heavier (Li et al., 2008). Consequently, the search scope should not be too wider. In the relaying procedure of the search request, a search request is relayed from a peer to another is named as a hop and the maximum number of hops is usually set beforehand when searching. On the other hand, for sake of avoiding relaying the search request repeatedly, a peer should not relay identical search request which it has received and relay before.

For convenient description, let ch =<pi, pci,... pct> denote a relay sequential chain of a search request. In the denotation, 1≤ct, c2,...., ct≤n. To express the relay procedure of a search request in the P2P network len(ch) is denoted as the length of the chain, that is, the number of the hops in the chain. Additionally, seq (ch, px, py) is put forward to represent the order of px and py in the sequential chain ch:

(2)

To a search request dispatched by the peer pi initially, a chain set CH which consists of a group of relay sequential chains will be achieved after the search procedure ends. If the maximum number of hops for search request is set to h which is a positive integer, then the length of each chain in the set CH is equal of less than h. In order to avoid relaying the search request repeatedly, for every two search chains chx =<pi, pxi,... pxt> and chy =<pi, py1,... pyd> of a search request, then:

If exits pa and pb and meanwhile pa and pb is the element of the search chains chx and chy, respectively, the following propositions is right. If pa is equal to pb, the element number in front of pa in the chain chx is identical with the element number in front of pb in the chain chy and meanwhile every two elements indicated as follows is identical:

In order to avoid calculating repeatedly, the Chain Abbreviation (CA) is defined as following:

If exists two chains chx =<pi, px1,... pα, pxp,...., pxt> and chy =<pi, px1,... pα, pyq,...., pyd> and the elements from the first one to Pα of the two chain are identical, the result of the calculation CA to Chx and CHy is two chains <pi, px1,... pα, pxp,...., pxt> and <pyq,...., pyd>. In other words, To two chains with a certain number of identical elements in the front of them, the CA to them will delete the identical elements of one chain with the other unchanged.

If no element at the back of pα in the chain chx is identical with the element in the chain chy, the characteristic above means the search request is relayed from pi to pα (or pα) and two branches after pα (or pα) appear and form the chains chx and chy. To a search chain with the length less than the maximum number of hops h, the last element of the chain should have appeared in another search chain and consequently the chair does not expand to avoiding searching in the field having been searched. In order to meet the need of the algorithm below, a search chain will stop expanding when it searches to a peer (this peer will not be taken as element of the chain as it has been taken as element of another) having been searched by other chains.

To a chain set CH consisting of all search chains of a search request, the abbreviated CH denoted as a set abbr(CH) consists of elements of the chains achieved by CA to every two search chains. As a result, every two chains in the chains achieved by CA to every two search chains have not identical elements and then the elements in abbr(CH) are the peers of a search request being relayed to without repeat.

DESCRIPTION OF THE OPTIMIZATION FACTORS

When a peer needs to acquire a file and dispatches a search request, more file replicas are found, the replicas are found in less hops and less peers are searched, the efficiency and the effectiveness of the P2P network are better.

To a file searched, the number of the replicas in all peers in the network is denoted as NR. As NR is varied corresponding to the differentiation of the files, the abstract value is improper to comprehensively represent the search ability of the P2P network and then the recall ratio to the replica search RRRS is put forward, which is calculated by:

(3)

In the formula above, RF is the replicas found by the procedure of the file searching.

The replicas being found in less hops means the needed file are found at the cost of less time expenditure and then the peer with needed file will achieve response and the file more rapidly. In a search chain ch, the fist element is the peer dispatching the search request initially. Corresponding, the sequential number of a peer in the chain ch can be used for the number of hops a replica is found. If the sequential number of px in the chain ch is k, then:

(4)

CH is a chain set according to a search request and ch is an element of the set. As more than one replicas are found according to a dispatched search request, the average value is utilized to evaluate the efficiency of the P2P network in file searching:

(5)

In the formula above, the denotation Pf is the peer set which consists of the peers found the file replicas in for a search request and the set CH is the search chain set according to the search request. |Pf| is the element number in the set Pf.

In the P2P network, the number of the connected peers with every peer is large enough, a search request dispatched by a peer can be received all the other peers with less hops. For example, if every peer is connected by all the peers, the search request will arrive at all the other peers by one hop. However, too invalid connection will add the loading of the network when search requests dispatched. Consequently, better efficiency usually means less peers are searched with larger RRRS and smaller AH. The number of peers which a search request are relayed to is the element number of the set abbr(CH) denoted as |abbr(CH)|.

To evaluate the efficiency of the P2P network, the factors of the |abbr(CH)|, RRRS and AH are interconnected and comprehensively utilized. The integrated factor for efficiency evaluation is represented as follows:

(6)

In the formula above, the parameters of λ1, λ2 and λ3 are positive constant variation which can be chosen according to the importance rank of the three factors considering designated P2P network.

PARTICLE SWARM OPTIMIZATION ALGORITHM WITH COMPETITIVE NEURAL NETWORK INVOLVED

Optimization to the interconnection among the peers with PSO algorithm: As description above, the interconnection among the peers in a P2P network can be expressed by a matrix [CNij]nxn. Utilizing the definitions and formulas above, the IFactor value can be calculated by the corresponding [CNij]nxn. As the matrix [CNij]nxn is varied, the value of IFactor will changed accordingly.

To search the matrix [CNij]nxn which can achieve optimized IFactor value, the particle swarm optimization (PSO) algorithm (Zheng and Liu, 2010) is used to adjust the matrix [CNij]nxn and optimize the interconnection among the peer. In this proposed optimization algorithm, the iteration formulas are expressed as follows:

(7)

(8)

In the formulas above, (CN)(t) and (CN)(t+1) are the matrices of [CNij]nxn which indicate the interconnection among the peers at the tth and (t+1) th iteration of the iterating particle, respectively. Accordingly, (v)(t) and (v)(t+1) are the variations at the tth and (t+1) th iteration, respectively. P(CN)(t) is the matrix which achieves the extreme value of the IFactor until the current iteration for this iterating particle and g([CN)(t)) is the matrix which achieves the extreme value of the IFactor until the current iteration for the iterating particle group. c1 and c2 are the learning ratios which are constant number and then r1(t) and r2(t) are random number whose value are less than and larger than 0. The addition of the matrices in the proposed algorithm is redefined as follows:

(9)

(10)

To the multiplication between a matrix and a number in the iteration formulas, the calculation is redefined as:

(11)

(12)

In the P2P network, the optimization procedure to the interconnection among the peers should be re-executed repeatedly for two reasons. Firstly, a peer of the network is not always active. In other words, not all peers are active. In a designated time period, the optimization is directed against the peers who are active at this time. Secondly, the distribution of the sharable files and their replicas will vary with the running of the network and then the optimal interconnection scheme will vary accordingly. On the other hand, the optimization is a large time cost procedure because of the complexity of the PSO algorithm. In order to enhance the real-time effectiveness of the optimization, the Competitive Neural Network (CNN) algorithm is chosen to involve the optimization procedure.

Matrix alteration for the input of the neural network: In P2P network, the active peers are usually part of the usable peers. Consequently, the optimization only for the interconnections among the active peers is useful in real-time running P2P network. In other words, the real-time optimization is only pointed to a portion of the matrix [CNij]nxn . For example, the active peer set is {p3, p5, p6, p8, p9} the columns and rows with order number 3, 5, 6, 8, 9 are extracted as follows to be optimized further:

As the input of the neural network is a vector, the matrix is turned into a vector by connecting the rows of the matrix one by one in order. Then, the matrix listed above can be turned into the following vector:

For the sake of convenient description, the matrix [CNij]nxn, which is pointed to all available peers, is called as the matrix for the entire peers (MEP). And then the matrix for the active peers is called as MAP. Correspondingly, the vectors transformed from the matrices are named as the vector for the entire peers (VEP) and the vector for the active peers (VAP).

As distinct active peers result in distinct VAP, the vector adjustment is put forward to better utilize the optimization information. To two active peer sets P1 and P2, the VAP of P2 can be adjusted to be used to the interconnection optimization of P1 if the element number of the intersection between P1 and P2 is large enough. The adjustment procedure is divided into two steps. Firstly, the adjusted VAP (AVAP) of P2 for the interconnection optimization of P1 consists of components identical to P1. The elements of the vector are divided into two parts. The first part consists of the elements according to the peers in the intersection between P1 and P2. The second consists of the elements according to the peers in P1 other than the peers in the intersection between P1 and P2. Secondly, the values of the two parts in AVAP are set separately.

Fig. 1: Schematic diagram for the AVAP transformation

Fig. 2: The process of the competitive neural network algorithm

The values of the elements in the first part are set by the values of the according elements in the VAP of P2. The values of the elements in the second part are all set to 0.

Figure 1 shows an example that indicates a AVAP transformed from the VAP of P2 according to P1. In the example, P1 = {p2, p3, p6, p8} and P2 = {p2, p3, p6, p8}. The elements and their values in the VAP of P2 are listed in the first row and the second row of the Figure and the fifth and the forth row show the elements and their values in the transformed AVAP. The arrows in the third row point to the partial elements of the AVAP whose value are set by the according value of the VAP of P2. The elements with value θ are the elements in the second part, whose values are set to 0 directly.

The optimization with competitive neural network algorithm involved: With the running of the P2P network, the active peers in the network vary continuously. The optimization procedure will be executed time by time again. As a result, a series of active peers sets and the corresponding VAP with optimized interconnection information will be achieved. With the variation of the active peers and the file replicas distribution, the P2P system can not bear frequent execution of the optimization procedure for the complex calculation of the PSO algorithm. To reduce the calculation quantity of the optimization procedure, the competitive neural network algorithm is selected to involve the optimization procedure.

As shown in Fig. 2, the competitive neural network is divided into two layers (Meyer-Base and Thummler, 2008). The first layer is called as the feed forward layer, in which the information of the active peers in all available peers is taken as the input by turning them into an active vector (AP). In AP, every element is corresponding to an available peer and the value of the element is defined by the following formula:

(13)

As both the active peers and the file replicas distribution act on the optimization of the interconnection among the active peers, the variation to each of them means the adjustment to the optimized interconnection. Consequently, more similar active peers and the file replicas distribution result in more similar optimized interconnection. In first layer, |AP| is the element number in AP and then the input is a |AP| dimension vector. aw1 is the weight matrix which consists of S vectors of past APs with adjustment.

The variation to the active peers can be reflected by AP. As the variation to file replicas distribution is gradually implemented with time eclipsing, the adjusted AP (AAP) is put forward to embody them. The value of an element in AAP is corresponding to that in AA and adjusting by the following formula:

(14)

ti is an element of the order number sequence TS = (1,2,3,...i,...) in which an element i denotes that the optimization procedure has been executed i times. With the optimization executing one by one time, more order numbers are added to the sequence. In the formula, ty is the order number generated by the current optimization procedure and tx is the order number generated by the past optimization procedure in which Vap appeared. Thus, the output of the first layer, oi, expresses the similarities between the input AP and every one of the selected AAPs which are formed by adjusting the selected past AP.

The second layer of the competitive neural network is called as the competitive layer, by which the APP most similar with the input AP is found. The weight matrix aw2 is set by the following formula (Nie and Cao, 2009):

(15)

Wij is the element of aw2 at the intersection of the ith row and the j th column. The first layer output oi is used to initialize the second layer, that is to say:

(16)

Then, the output of the second layer is updated according to the following recurrence relation:

(17)

With the competitive neural network involved, the APs and the corresponding optimized VAP achieved by the optimization are recorded along with the order number and used to the following optimization. When a new AP is waiting to be optimized, a new order number is generated and a certain number of the past APs are chosen and adjusted to AAPs and then the AAP most similar to the new AP is achieved by the competitive neural network algorithm. According to analysis above, the past optimized VAP corresponding to the achieved AAP is approximate to the optimized VAP of the new AP. The PSO algorithm is initialized by the following formula:

(18)

MAP(VAP) denotes the MAP according to the VAP. As the achieved AAP is approximate to the optimized VAP of the new AP, the optimized VAP according to the new AP will be achieved with less times of iteration and consequently, the PSO with the competitive neural network involved can enhance the efficiency of the optimization procedure.

Simulative experiments and analysis: For P2P network, the efficiency comparison with the models with out the renewed model involved is usually taken into account to demonstrate the efficiency of a renewed model (Sendil and Nagarajan, 2012; Ramachandran and Sikdar, 2010). In this study, simulative experiments are employed in order to testify the efficiency and the effectiveness of the proposed model. In the optimization procedure with the PSO algorithm, a series of interconnection schemes are selected to iterate to achieve optimized scheme.

The comparison between the optimized scheme and the series of interconnection schemes before achieving optimized scheme can indicate the effectiveness of the proposed model. The results in Fig. 3 are come from a series of simulative experiments. In the experiments, the P2P networks with 300, 500, 700, 900, 1100, 1300, 1500, 1700 available peers have been simulated. For every simulative P2P network, the optimization procedure has been executed 200 times accompanying with variation of the active peers and the file replicas distribution. The IFactor is calculated in every optimization procedure with λ1, λ2 and λ3 being set to 100, 1, 1, respectively (as RRRS is a percentage, λ1 is set to 100). And meantime, the IFactors corresponding to the series of interconnection scheme before optimized scheme for every optimization procedure has been recorded and the mean of the IFactors has been calculated.

In Fig. 3, the IFactor value for every P2P network with designated number of available peers is the average value of the IFactors according to 200 times of optimization procedure execution. Correspondingly, the mean IFactor value for every P2P network with designated number of available peers is the average value of the mean of the IFactors generated in the 200 times of optimization procedure execution. An effective optimization model usually means an obvious efficiency enhancement in comparison to the past proposed model (Szekeres et al., 2011). The experimental results shown in Fig. 3 indicate the IFactor Value is larger than the Mean IFactor Value for every P2P network with designated number of available peers and he IFactor Value is much larger than the Mean IFactor Value with the number of available peers increasing, which means the proposed model can achieve better effectiveness and the effectiveness is much better with the number of available peers increasing comparatively. It is common that the performance will decrease with the scale of the P2P network increasing (Sharifi and Khorsandi, 2013).

Fig. 3: Comparison between the IFactor value and mean IFactor value

Fig. 4: Results for simulative experiments to testify the efficiency of the proposed model

However, the IFactor Value almost does not reduce with the number of available peers increasing demonstrates the effectiveness stability of the proposed model is almost irrelative to the number of available peers.

Frequent execution of the optimization accompanying with the variation of the active peers and the file replicas distribution requires the optimization procedure to be implemented rapidly. The efficiency of the proposed model with the competitive neural network algorithm is testified by simulative experiments.

For sake of showing the efficiency of the proposed model, the time cost of every optimization procedure in the simulative experiments relative to Fig. 3 is recorded. The mean value corresponding to designated number of available peers are calculated and utilizing these results the efficiency comparison between the proposed model with the competitive neural network algorithm (With CNN) and the optimization only utilizing the PSO algorithm (Without CNN) are demonstrated in Fig. 4. The experimental results indicate that the time cost with CNN is smaller than that of without CNN for every simulative P2P network with designated number of available peers and accompanying with the number of the available peers increasing the time cost with CNN is much smaller and almost stable comparative to that of without CNN, which demonstrates the efficiency of the proposed model.

CONCLUSION

In P2P network, the interconnection relation among peers is the decisive factor to the performance of the network by influencing the time cost and the recall ratio of file replica searching. In this study, the interconnection among peers and the information relative to the performance of the P2P network are formatted by designated description. And then an optimization algorithm utilizing the PSO algorithm with the competitive neural network algorithm involving is put forward based on the variation characteristics about the active peers and the file replicas distribution of the P2P network. a series of simulative experiments have been implemented and the experimental results indicate the proposed model can achieve better efficiency and effectiveness for the optimization of the P2P network.

ACKNOWLEDGMENT

This study was funded by the Science and Technology Department of Tangshan City (No.12140201A-7).

REFERENCES

  • Koenigstein, N., Y. Shavitt, E. Weinsberg and U. Weinsberg, 2012. Measuring the validity of peer-to-peer data for information retrieval applications. Comput. Networks, 56: 1092-1102.
    CrossRef    


  • Beraldi, R., L. Querzoni and R. Baldoni, 2009. Low hitting time random walks in wireless networks. Wireless Communi. Mobile Comput., 9: 719-732.
    CrossRef    Direct Link    


  • Cao, Q. and S. Fujita, 2012. Load-balancing schemes for a hierarchical peer-to-peer file search system. Int. J. Grid Utility Comput., 2: 164-171.
    CrossRef    Direct Link    


  • Feng, G.F., W.Z. Li, J.C. Zhang, S.L. Lu and D.X. Chen, 2011. Replica distribution for search size minimization in unstructured overlay. Jisuanji Xuebao/Chinese J. Comput., 34: 628-635.
    CrossRef    Direct Link    


  • Hsiao, H.C. and H.W. Su, 2012. On optimizing overlay topologies for search in unstructured peer-to-peer networks. IEEE Trans. Parallel Distribut. Syst., 23: 924-935.
    CrossRef    Direct Link    


  • Erola, A., J. Castell-Roca, A. Viejo and J.M. Mateo-Sanz, 2011. Exploiting social networks to provide privacy in personalized web search. J. Syst. Software, 84: 1734-1745.
    CrossRef    Direct Link    


  • Doulkeridis, C., A. Vlachou, K. Nørvåg, Y. Kotidis and M. Vazirgiannis, 2010. Efficient search based on content similarity over self-organizing P2P networks. Peer-to-Peer Network. Applic., 3: 67-79.
    CrossRef    Direct Link    


  • Garbacki, P., D.H.J. Epema and M. van Steen, 2010. The design and evaluation of a self-organizing superpeer network. IEEE Trans. Comput., 59: 317-331.
    CrossRef    Direct Link    


  • Huang, Y.S., X.W. Meng and Y.J. Zhang, 2010. Strategy of content location of P2P based on the social network. Ruan Jian Xue Bao J. Software, 21: 2622-2630.
    Direct Link    


  • Dhurandher, S.K., S. Misra, P. Pruthi, S. Singhal, S. Aggarwal and I. Woungang, 2011. Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks. J. Network Comput. Applic., 34: 1498-1508.
    CrossRef    Direct Link    


  • Kucharzak, M., A. Siwek and K. Walkowiak, 2011. Comparison of evolutionary algorithm and heuristics for flow optimization in P2P systems. Int. J. Elect. Telecommuni., 56: 145-152.
    CrossRef    Direct Link    


  • Endo, K., R. Hamabe, D. Okano and K. Amano, 2012. An effective replication technique using rateless codes for unstructured P2P networks. J. Communic., 7: 349-356.
    CrossRef    Direct Link    


  • Li, X., J. Wu and S. Zhong, 2008. ISRL: Intelligent search by reinforcement learning in unstructured peer-to-peer networks. Int. J. Parallel, Emergent Distribut. Syst., 23: 17-44.
    CrossRef    Direct Link    


  • Zheng, X. and H. Liu, 2010. A scalable coevolutionary multi-objective particle swarm optimizer. Int. J. Comput. Intelli. Syst., 3: 590-600.
    CrossRef    Direct Link    


  • Meyer-Base, A. and V. Thummler, 2008. Local and global stability analysis of an unsupervised competitive neural network. IEEE Trans. Neural Networks, 19: 346-351.
    CrossRef    Direct Link    


  • Nie, X. and J. Cao, 2009. Multistability of competitive neural networks with time-varying and distributed delays. Nonlinear Anal. Real World Applic., 10: 928-942.
    CrossRef    


  • Sendil, M.S. and N. Nagarajan, 2012. Improving the performance of P2P networks using SPIS with query filtering. J. High Speed Networks, 18: 131-140.
    Direct Link    


  • Ramachandran, K.K. and B. Sikdar, 2010. A queuing model for evaluating the transfer latency of peer-to-peer systems. IEEE Trans. Parallel Distrib. Syst., 21: 367-378.
    CrossRef    


  • Szekeres, A., S.H. Baranga, C. Dobre and V. Cristea, 2011. A keyword search algorithm for structured peer-to-peer networks. Int. J. Grid Utility Comput., 2: 204-214.
    CrossRef    Direct Link    


  • Sharifi, L. and S. Khorsandi, 2013. A popularity-based query scheme in P2P networks using adaptive gossip sampling. Peer-to-Peer Networking Appli., 6: 75-85.
    CrossRef    

  • © Science Alert. All Rights Reserved