Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for suppressing free rider of nodes in peer-to-peer network

A peer-to-peer network and free-rider technology, applied in the field of computer networks, can solve the problems of node service load imbalance, high computational complexity, and difficult engineering implementation, and achieve increased software usage complexity, maintenance of service quality, and multiple economic benefits. Effect

Inactive Publication Date: 2007-05-30
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The ubiquitous free-rider phenomenon has led to a serious imbalance in the node service load in the peer-to-peer network. More than 90% of the nodes are just enjoying the service, while less than 10% of the nodes are providing services for the entire peer-to-peer network
This method has high computational complexity and generally needs to collect real-time peer-to-peer network global status information, and it is difficult for large-scale peer-to-peer networks to provide global status information, so this method is difficult to implement, and it has not been used in actual large-scale peer-to-peer networks so far. report

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for suppressing free rider of nodes in peer-to-peer network
  • Method for suppressing free rider of nodes in peer-to-peer network

Examples

Experimental program
Comparison scheme
Effect test

example

[0057] The network topology diagram shown in FIG. 3 represents a subgraph of the overall topology of the peer-to-peer network. Circles 1-9 in the figure represent nodes in the peer-to-peer network, and solid lines c301-c308 are logical connections between peer-to-peer network nodes.

[0058] (1) When each node {1, 2, ... 9} in the figure joins the peer-to-peer network, it first obtains its own service status overload threshold.

[0059] (2) Each node regularly monitors its own service status, and the sampling period is set to one minute.

[0060] (3) Node 1 finds itself overloaded;

[0061] (4.1) Node 1 sends status query requests b311-b315 to all its neighboring nodes {2, 3, 6, 8, 9}. After node {2, 3, 6, 8, 9} receives the request, it immediately feeds back its own status information to node 1.

[0062] (4.2) Node 1 receives feedback information from neighboring nodes. Let's set a threshold here n is the number of peer-to-peer network connections of the overloaded node...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses one equal network point hinge behavior repression method, which comprises the following steps: each point timely monitors host machine servo status; once the point is in overload status, it selects near hinge car point as common materials transfer aim point set; overload point converts the common materials into aim point set and then updating topological structure.

Description

technical field [0001] The invention belongs to computer network technology, and in particular relates to a method for suppressing node free riding (Free riding) behavior in a peer-to-peer (Peer-to-Peer, P2P) network. Background technique [0002] At the beginning of the peer-to-peer network technology, each node is expected to do its best to serve other nodes in the peer-to-peer network, and there are fewer selfish behavior restraint mechanisms for nodes. However, since 2000, the measurement results of many large-scale peer-to-peer network traffic around the world show that most nodes have serious selfish behavior. Its selfish behavior is mainly manifested as follows: first, nodes do not share files or only share a very small number of files; second, nodes only share files that few other users are interested in; third, nodes do not provide routing for peer-to-peer networks Transiting services or not responding to service requests sent by other users, the above behavior is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 金海余一娇袁平鹏宁小敏武浩
Owner HUAZHONG UNIV OF SCI & TECH