K. Ueda, S. Miyazaki, T. Iwata, H. Nakamura, H. Sunaga
{"title":"移动ad-hoc网络中的对等网络拓扑控制","authors":"K. Ueda, S. Miyazaki, T. Iwata, H. Nakamura, H. Sunaga","doi":"10.1109/APCC.2003.1274351","DOIUrl":null,"url":null,"abstract":"This paper discusses effective configuration methods for peer-to-peer (P2P) network topologies within a mobile ad-hoc network. With recent progress in mobile ad-hoc network technology promoting the creation of new and attractive services, we are examining and developing P2P network systems for operation within ad-hoc networks. Our focus is on identifying methods of network-topology control that provide the best balance between performance and availability. We evaluated three methods through computer simulation from the viewpoints of resource consumption and network integrity and clarified their domains of applicability. The results is useful in the design of future P2P networks for operation within mobile ad-hoc networks.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Peer-to-peer network topology control within a mobile ad-hoc network\",\"authors\":\"K. Ueda, S. Miyazaki, T. Iwata, H. Nakamura, H. Sunaga\",\"doi\":\"10.1109/APCC.2003.1274351\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper discusses effective configuration methods for peer-to-peer (P2P) network topologies within a mobile ad-hoc network. With recent progress in mobile ad-hoc network technology promoting the creation of new and attractive services, we are examining and developing P2P network systems for operation within ad-hoc networks. Our focus is on identifying methods of network-topology control that provide the best balance between performance and availability. We evaluated three methods through computer simulation from the viewpoints of resource consumption and network integrity and clarified their domains of applicability. The results is useful in the design of future P2P networks for operation within mobile ad-hoc networks.\",\"PeriodicalId\":277507,\"journal\":{\"name\":\"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APCC.2003.1274351\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APCC.2003.1274351","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Peer-to-peer network topology control within a mobile ad-hoc network
This paper discusses effective configuration methods for peer-to-peer (P2P) network topologies within a mobile ad-hoc network. With recent progress in mobile ad-hoc network technology promoting the creation of new and attractive services, we are examining and developing P2P network systems for operation within ad-hoc networks. Our focus is on identifying methods of network-topology control that provide the best balance between performance and availability. We evaluated three methods through computer simulation from the viewpoints of resource consumption and network integrity and clarified their domains of applicability. The results is useful in the design of future P2P networks for operation within mobile ad-hoc networks.