P2P networks
- Introduction
[1]D. S. Milojicic, V. Kalogeraki, R. Lukose, K. Nagaraja1, J. Pruyne, B. Richard, S. Rollins, Z. Xu. “Peer-to-Peer Computing”, Technical Report HPL-2002-57, HP Labs, March 2002.
[2]S. Androutsellis-Theotokis. “A survey of peer-to-peer file sharing technologies”, White paper of ELTRUN, Athens University of Economics and Business, Greece. 2002
[3]S. Androutsellis-Theotokis and D. Spinellis. “A survey of peer-to-peer content distribution technologies”, ACM Journal on Computing Surveys, VOL. 36, NO.4, pp.335-371, 2004
[4]Lua, E.-K., Crowcroft, J., Pias, M., Sharma, R., and Lim, S., “A Survey and Comparison of Peer-to-Peer Overlay Network Schemes”, IEEE Journal on Communications Surveys and Tutorials, VOL.7, NO.2, pp.72–93, 2005
- Cross Layer Issues
[1]Conti, M., Gregori, E., and Turi, G, “ A cross-layer optimization of gnutella for mobile ad hoc networks”. Proceedings of the 6th ACM international Symposium on Mobile Ad Hoc Networking and Computing (Urbana-Champaign, IL, USA, May 25 - 27, 2005). MobiHoc '05. ACM, pp. 343-354.
[2]Bisignano, M., Modica, G. D., Tomarchio, O., and Vita, L. 2007. P2P over Manet: a comparison of cross-layer approaches. In Proceedings of the 18th international Conference on Database and Expert Systems Applications (September 03 - 07, 2007). DEXA. IEEE Computer Society, Washington, DC, 814-818
[3]Ho-Hyun Park, Woosik Kim, Miae Woo: A Gnutella-based P2P System Using Cross-Layer Design for MANET. Proc. WASET 22: 163-168
[4]Rajagopalan, Sundaram; Shen, Chien-Chung, "A Cross-layer Decentralized BitTorrent for Mobile Ad hoc Networks," Mobile and Ubiquitous Systems - Workshops, 2006. 3rd Annual International Conference on , vol., no., pp.1-10, 17-21 July 2006
[5]Cheng-Chang Hoh; Ren-Hung Hwang, "P2P File Sharing System over MANET based on Swarm Intelligence: A Cross-Layer Design," Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE , pp.2674-2679, 11-15 March 2007
- CAN
[1]S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, “A scalable content-addressable network”, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, August, pp.161-172, 2001
[2]Sahin, O.D., Agrawal, D., El Abbadi, A., “Techniques for efficient routing and load balancing in content-addressable networks”, Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing, pp.67-74, 2005.
[3]Reidemeister, T., Ward, P.A.S., Bohm, K., Buchmann, E., “Malicious behaviour in content-addressable peer-to-peer networks”, Proceedings of the 3rd Annual Communication Networks and Services Research Conference, pp.319-326, 2005.
[4]Gergely Biczók , Rolland Vida, “On Faster and fair lookup operation in content-addressable networks”, Proceedings of the 2005 ACM conference on Emerging network experiment and technology, pp.226-227, 2005
[5]Fabrizio Falchi , Claudio Gennaro , Pavel Zezula, “Nearest neighbor search in metric spaces through Content-Addressable Networks”, ACM Journal on Information Processing and Management, VOL.43 NO.3, pp.665-683, May, 2007
- Chord
[1]I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan.“Chord: A scalable content-addressable network”, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.149-160, 2001
[2]Dabek, F., Brunskill, E. Kaashoek, F., Karger, D., Morris, R., Stoica, I., and Balakrishnan, H. 2001. “Building Peer-to-Peer Systems With Chord, a Distributed Lookup Service”, Proceedings of the 8th Workshop on Hot Topics in Operating Systems, pp.81, May 2001.
[3]Yuh-Jzer Joung , Jiaw-Chang Wang, “Chord2: A two-layer Chord for reducing maintenance overhead via heterogeneity”,ACM Journal on Computer and Telecommunications Networking, VOL.51 NO.3, pp.712-731, February, 2007
[4]David Liben-Nowell , Hari Balakrishnan , David Karger, “Analysis of the evolution of peer-to-peer systems”, Proceedings of the twenty-first annual symposium on Principles of distributed computing, pp.233-242, July2002
[5]Reinhard, J., Stober, S., Nurnberger, A., “Enhancing chord classification through neighbourhood histograms”,Proceedings of International Workshop onContent-Based Multimedia Indexing, pp.33-40, 2008
- BitTorrent
[1]Jincheng Nie, Xiaohui Chen, Weidong Wang, “Modeling BitTorrent System in a Network Circumstance with Bottleneck Links”, Proceedings of 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp.1-5, 2008
[2]Guo, L., Chen, S., Xiao, Z., Tan, E.; Ding, X., Zhang, X., “A performance study of BitTorrent-like peer-to-peer systems”, IEEE Journal on Selected Areas in Communications, VOL. 25,NO.1, pp.155-169, Jan. 2007
[3]Erman, David, Ilie, Dragos, Popescu, Adrian, “BitTorrent Traffic Characteristics”, Proceedings of the International Multi-Conference on Computing in the Global Information Technology, pp.42, 2006
[4]Qi, Jiayin, Zhang, Hongli, Ji, Zhenzhou, Yun, Liu, “Analyzing BitTorrent Traffic Across Large Network Cyberworlds”, Proceedings of the 2008 International Conference on Cyberworlds, pp.759-764 ,2008
[5]Dale, C., Jiangchuan Liu, Peters, J., Bo Li, “Evolution and Enhancement ofBitTorrent Network Topologies Quality of Service”, Proceedings of 16th International Workshop on Qulity of Service, pp.1-10, June 2008