Information Technology Reference
In-Depth Information
peers for peer i: L i = (LD i , LR i ), where LD i is a set of several peers with the
shortest distances from peer i, and LR i is a set of randomly selected peers. In
Zhang et al.'s results,|LR i |=|LD i |and 5≤|LR i |+|LD i |≤8.
Subsequently, peer i sends a probing message to each of the peers on the
list. The latter will then reply with their neighbor information. Peer i then
assembles all such neighbor information as a candidate list LC i . For each
peer j∈LC i , peer i computes the values of two parameters: the frequency
f i (j) representing the number of times peer j shows up in LC i thus far, and
estimated distance D(i, j) between peer i and j. Furthermore, an important
parameter, called normalized distance estimation d i (j) is determined:
D(i, j)
max k∈LC i D(i, k)
d i (j) =
(4.13)
where 0 < d i (j)≤1.
One interesting way to interpret the significance of these parameters is
as follows: LC i is a sampling of peers in the network; f i (j) is a sampling of
the degree of each candidate j; and d i (j) is an estimated distance between
peer i and j. With such interpretation, another parameter, called connection
preference is computed:
P i (j) = γP F i (j) + (1−γ)P D i (j)
(4.14)
where P D i (j) is the distance preference of peer i connecting to peer j, and
thus, serves as the probability that peer i selects peer j as one of its immediate
neighbors. Accordingly, it is defined as:
1
d i (j) −α
P D i (j) =
(4.15)
1
d i (k) −α
k∈LC i
where−∞< α≤1.
By the same token, the degree preference, denoted by P F i (j), is the prob-
ability that peer i selects peer j as one of its immediate neighbors. Here, the
more incident edges peer j has in the network, the higher the probability it ap-
pears in other peers' candidate lists. Accordingly, degree preference is defined
as:
f i (j)−β
P F i (j) =
(4.16)
k∈LC i f i (j)−β
where−∞< β≤1.
The parameters, α, β, γ serve as “control knobs” in adjusting the topology
of the P2P network. Specifically, larger values of α and γ are more suitable for
delay sensitive applications. On the other hand, a larger β and a smaller γ are
more suitable for applications that require a better balancing of load. Most
importantly, Zhang et al. showed that their proposed scheme could indeed
generate P2P network structures with power law properties [Zhang et al.,
2005a].
Search WWH ::




Custom Search