Service Providers Indexing Using P2P Systems

Author(s):  
G. Marchetto ◽  
M. Papa Manzillo ◽  
L. Torrero ◽  
L. Ciminiera ◽  
F. Risso

The idea of sharing resources across the network has become very popular during the last few years, leading to a diversified scenario in which shared resources include not only files and videos but also storage and CPU cycles. A new trend is to extend this paradigm toward a distributed architecture in which multiple network nodes cooperate to provide services in a distributed fashion, thus ensuring robustness and scalability. Peer-to-peer (P2P) overlays are the natural solution to achieve this goal as, thanks to their simplicity and flexibility, they can change their topology in order to fit the needs of the different kinds of services that can be provided on top of them. This chapter focuses on the indexing of nodes (i.e., the service providers) in these P2P systems, presenting the state-of-the-art solutions concerning the P2P-based indexing architectures and a taxonomy of possible services that can be built upon different overlay structures. Finally, emphasis is given to mechanisms implementing service selection based on some cost parameters (e.g., topological proximity) in order to introduce some mechanism based on optimality in case multiple service providers exist.

2011 ◽  
pp. 101-119
Author(s):  
Ernesto Damiani ◽  
Marco Viviani

Peer-to-peer (P2P) systems represent nowadays a large portion of Internet traffic, and are fundamental data sources. In a pure P2P system, since no peer has the power or responsibility to monitor and restrain others behaviours, there is no method to verify the trustworthiness of shared resources, and malicious peers can spread untrustworthy data objects to the system. Furthermore, data descriptions are often simple features directly connected to data or annotations based on heterogeneous schemas, a fact that makes difficult to obtain a single coherent trust value on a resource. This chapter describes techniques where the combination of Semantic Web and peer-to-peer technologies is used for expressing the knowledge shared by peers in a well-defined and formal way. Finally, dealing with Semantic-based P2P networks, the chapter suggests a research effort in this direction, where the association between cluster-based overlay networks and reputation systems based on numerical approaches seems to be promising.


2021 ◽  
Author(s):  
Hoda R.K. Nejad

With the emergence of wireless devices, service delivery for ad-hoc networks has started to attract a lot of attention recently. Ad-hoc networks provide an attractive solution for networking in the situations where network infrastructure or service subscription is not available. We believe that overlay networks, particularly peer-to-peer (P2P) systems, is a good abstraction for application design and deployment over ad-hoc networks. The principal benefit of this approach is that application states are only maintained by the nodes involved in the application execution and all other nodes only perform networking related functions. On the other hand, data access applications in Ad-hoc networks suffer from restricted resources. In this thesis, we explore how to use Cooperative Caching to improve data access efficiency in Ad-hoc network. We propose a Resource-Aware Cooperative Caching P2P system (RACC) for data access applications in Ad-hoc networks. The objective is to improve data availability by considering energy of each node, demand and supply of network. We evaluated and compared the performance of RACC with Simple Cache, CachePath and CacheData schemes. Our simulation results show that RACC improves the lay of query as well as energy usage of the network as compared to Simple Cache, CachePath and CacheData.


2012 ◽  
Vol 28 (7) ◽  
pp. 1090-1099 ◽  
Author(s):  
Neeraj Kumar ◽  
Rahat Iqbal ◽  
Naveen Chilamkurti

2021 ◽  
Vol 33 (3) ◽  
pp. 1105-1126
Author(s):  
Sai Liang ◽  
Xiaoxia Zhang ◽  
Chunxiao Li ◽  
Hui Li ◽  
Xiaoyu Yu

Purpose Due to their very different contexts, the responses made by property hosts to online reviews can differ from those posted by hotel managers. Thus, the purpose of this study is to investigate the determinants of the responding behavior of hosts on peer-to-peer property rental platforms. Design/methodology/approach This study applied a comprehensive framework based on the theory of planned behavior. Empirical models are constructed based on 89,967 guest reviews with their associated responses to reveal the responding pattern of property hosts. Findings Unlike hotel managers, property hosts are more likely to reply to positive than to negative reviews; moreover, when they do choose to respond to negative reviews, they are likely to do so negatively, in a “tit-for-tat” way. This study also finds that one reason for the difference of responding patterns between property hosts and hotel managers is the hosts’ lack of experience of consumer relationship management and service recovery. Research limitations/implications This study provides a good start point for future theoretical development regarding effective responding strategy on peer-to-peer property rental platforms, as well as some useful implications for practitioners. Originality/value This study is an early attempt to analyze the impact of the particularity of emerging platforms on the responding behavior of service providers based on a comprehensive conceptual framework and empirical model thus provides a good starting point for the further investigation of effective response strategies on these emerging platforms.


Author(s):  
Vivek Gaur ◽  
Praveen Dhyani ◽  
Om Prakash Rishi

Recent computing world has seen rapid growth of the number of middle and large scale enterprises that deploy business processes sharing variety of services available over cloud environment. Due to the advantage of reduced cost and increased availability, the cloud technology has been gaining unbound popularity. However, because of existence of multiple cloud service providers on one hand and varying user requirements on the other hand, the task of appropriate service composition becomes challenging. The conception of this chapter is to consider the fact that different quality parameters related to various services might bear varied importance for different user. This chapter introduces a framework for QoS-based Cloud service selection to satisfy the end user needs. A hybrid algorithm based on genetic algorithm (GA) and Tabu Search methods has been developed, and its efficacy is analysed. Finally, this chapter includes the experimental analysis to present the performance of the algorithm.


2011 ◽  
pp. 203-230
Author(s):  
Kin Choong Yow ◽  
Nitin Mittal

The evolution in mobile messaging and mobile devices has made it possible to provide multimedia rich messaging capabilities to personal digital assistants (PDAs). The need for this arises simply because mobile service providers want to provide an enhanced messaging experience to the user. It also opens up new avenues for business, such as a shopping mall scenario. This chapter discusses the development of a multimedia messaging client for a PDA and a kiosk providing multimedia messages composition, search, share, and sending capabilities. This chapter also discusses the various messaging technologies, enabling wireless technologies, and the peer-to-peer model. The peer-to-peer technology used was Jxta, an XML-based and language agnostic peer-to-peer platform specification from Sun Microsystems. The peers (PDA client and the kiosk) were implemented using the application programming interfaces provided by the Personal Java reference implementation and the Jxta platform’s Personal Java port.


Author(s):  
Florent Masseglia ◽  
Pascal Poncelet ◽  
Maguelonne Teisseire

With the huge number of information sources available on the Internet and the high dynamics of their data, peer-to-peer (P2P) systems propose a communication model in which each party has the same capabilities and can initiate a communication session. These networks allow a group of computer users with the same networking program to connect with each other and directly access resources from one another. P2P architectures also provide a good infrastructure for data and computer intensive operations such as data mining. In this article we consider a new data mining approach for improving resource searching in a dynamic and distributed database such as an unstructured P2P system, that is, in Masseglia, Poncelet, and Teisseire (2006) we call this problem P2P usage analysis. More precisely we aim at discovering frequent behaviors among users of such a system. We will focus on the sequential order between actions performed on each node (requests or downloads) and show how this order has to be taken into account for extracting useful knowledge. For instance, it may be discovered, in a P2P file sharing network that for 77% of nodes from which a request is sent for “Mandriva Linux,” the file “Mandriva Linux 2005 CD1 i585-Limited- Edition-Mini.iso” is chosen and downloaded; then a new request is performed with the possible name of the remaining iso images (i.e., “Mandriva Linux 2005 Limited Edition”), and in the large number of returned results the image corresponding to “Mandriva Linux 2005 CD2 i585-Limited-Edition-Mini.iso” is chosen and downloaded. Such knowledge is very useful for proposing the user with often downloaded or requested files according to a majority of behaviors. It could also be useful in order to avoid extra bandwidth consumption, which is the main cost of P2P queries (Ng, Chu, Rao, Sripanidkulchai, & Zhang, 2003).


2008 ◽  
pp. 129-150
Author(s):  
K. C. Yow ◽  
N. Mittal

The evolution in mobile messaging and mobile devices has made it possible to provide multimedia rich messaging capabilities to personal digital assistants (PDAs). The need for this arises simply because mobile service providers want to provide an enhanced messaging experience to the user. It also opens up new avenues for business, such as a shopping mall scenario. This chapter discusses the development of a multimedia messaging client for a PDA and a kiosk providing multimedia messages composition, search, share, and sending capabilities. This chapter also discusses the various messaging technologies, enabling wireless technologies, and the peer-to-peer model. The peer-to-peer technology used was Jxta, an XML-based and language agnostic peer-to-peer platform specification from Sun Microsystems. The peers (PDA client and the kiosk) were implemented using the application programming interfaces provided by the Personal Java reference implementation and the Jxta platform’s Personal Java port.


2010 ◽  
pp. 138-156
Author(s):  
Jenneke Fokker ◽  
Huib de Ridder ◽  
Piet Westendorp ◽  
Johan Pouwelse

Television and the Internet have proven to be a popular combination for both broadcasters and viewers. Because of this popularity they are increasingly facing the consequences of central bottlenecks, which could be overcome by taking a different approach: Peer-to-Peer (P2P) technology. However, P2P systems can only be successful with as much cooperation among as many users as possible. This chapter explains how this cooperation is hard to enforce, and how inducing it might be more successful. Relevant psychological theories are listed that can be used to induce this user cooperation, along with possible applications of cooperation inducing mechanisms for Peer-to-Peer Television (P2P-TV) systems. The authors aim to provide practical criteria along which these mechanisms can be evaluated on their contribution to social activity in P2P-TV systems.


Sign in / Sign up

Export Citation Format

Share Document