A Reciprocal Capacity Based Adaptive Topology Protocol for P2P Networks

  • Huirong Tian
  • Shihong Zou
  • Wendong Wang
  • Shiduan Cheng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3961)


A Reciprocal Capacity based Adaptive Topology Protocol (RC-ATP) for P2P networks is proposed in this paper. It is based on the rational belief that a peer is only willing to maintain connections with those which will benefit it in future. Reciprocal capacity is defined based on peers’ capacity of providing services and of recommending service providers. As a result, reciprocal peers connect each other adequately. Therefore the resulting topologies are more efficient and resilient compared with Adaptive Peer-to-Peer Topologies (APT).


Rational Belief Connection Request Init Capacity Query Message Malicious Peer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Buyya, R., Stockinger, H., Giddy, J., Abramson, D.: Economic Models for Management of Resources in Peer-to-Peer and Grid Computing. In: SPIE International Conference on Commercial Applications for High-Performance Computing, Denver, USA, pp. 1–12. Computational Economics Press (2001)Google Scholar
  2. 2.
    Adar, E., Huberman, B.A.: Free Riding on Gnutella. Technical Report, SSL-00-63, Internet Ecologies Area Xerox Palo Alto Research Center, Palo Alto, Canada (October 2002)Google Scholar
  3. 3.
    Condie, T., Kamvar, S.D., Garcia-Molina, H.: Adaptive Peer-to-Peer Topologies. In: The 4th International Conference on Peer-to-Peer Computing, Zurich, Switzerland (August 2004)Google Scholar
  4. 4.
    Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: Proceeding of ACM SIGCOMM 2001, San Diego, California, USA (August 2001)Google Scholar
  5. 5.
    Ratnasamy, S., Francis, P., Handley, M., Karp, R.: A Scalable Content-addressable Network. In: Proceeding of ACM SIGCOMM 2001, San Diego, California, USA (August 2001)Google Scholar
  6. 6.
    Wen, D.: The Research on Trust-aware P2P Topologies and Constructing Technologies. Ph.D Thesis, National University of Defense Technology, P.R. China (2003)Google Scholar
  7. 7.
    Cooper, B.F., Garcia-Molina, H.: Ad Hoc, Self-supervising Peer-to-Peer Search Networks. Technical Report, Stanford University (2003),
  8. 8.
    Lv, Q., Ratsnasamy, S., Shenker, S.: Can Heterogeneity Make Gnutella Scalable? In: Proceeding of the First International Workshop on P2P Systems, USA (March 2002)Google Scholar
  9. 9.
    Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making Gnutella-like P2P Systems Scalable. In: Proceeding of ACM SIGCOMM 2003, Germany (August 2003)Google Scholar
  10. 10.
    Heckerman, D.: A Tutorial on Learning With Bayesian Networks. Technical Report, MSR-TR-95-06 (1995),
  11. 11.
    Saroiu, S., Gummadi, P.K., Gribble, S.D.: A Measurement Study of Peer-to-Peer File Sharing Systems. In: Proceedings of Multimedia Conferencing and Networking, San Jose (January 2002)Google Scholar
  12. 12.
  13. 13.
    Schlosser, M., Condie, T., Kamvar, S.: Simulating a File-Sharing P2P Network. In: First Workshop on Semantics in P2P and Grid Computing (December 2002)Google Scholar
  14. 14.
    Albert, R., Jeong, H., Barabasi, A.L.: Error and Attack Tolerance of Complex Networks. Nature 406, 378–382 (2000)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Huirong Tian
    • 1
  • Shihong Zou
    • 1
  • Wendong Wang
    • 1
  • Shiduan Cheng
    • 1
  1. 1.State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingP.R. China

Personalised recommendations