Please use this identifier to cite or link to this item:

Reliable response delivery in peer-to-peer systems

Authors Liu, X.
Liu, Y. View this author's profile
Xiao, L.
Issue Date 2004
Source Proceedings - IEEE Computer Society's Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, MASCOTS , 2004, p. 427-434
Summary Unstructured peer-to-peer (P2P) system is the prevalent model in today's P2P system. In such systems, a response is sent along the same path that carried the incoming query message. To guarantee the anonymity of the requestor, no requestor information is included in the query message and each node in the query incoming path only knows its immediate neighbors who sent the query request to it. This mechanism introduces response loss when any one node or connection in the path fails, which is a general case in the P2P system due to its dynamic nature. In this paper, we aim at addressing the response loss problem and present three techniques to alleviate this problem: redundant response delivery (RRD) scheme as a proactive approach, adaptive response delivery (ARD) scheme as a reactive approach, and extended adaptive response delivery to render ARD to function in an unstructured P2P system with limited or no flooding based search mechanism. With limited traffic overhead, all three techniques reduces response loss rate by more than 65% and they are all fully distributed. © 2004 IEEE.
ISSN 1526-7539
Rights © 2004 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Language English
Format Conference paper
Access View full-text via Scopus
Files in this item:
File Description Size Format
xiaomei.pdf 184638 B Adobe PDF