A Point-Based Inventive System to Prevent Free-Riding on P2P Network Environments
Unlike Client-Server system, P2P network systems are based on active file sharing communications among the users. Free-Riding syndrome is a serious problem in P2P systems because free-riders, who use free resources from others but don’t share their own, make the communications passive and pessimistic. Free-Riding syndrome interrupts P2P network systems from workload decentralization, causes the performance degradation, and finally undermines the foundation of P2P network systems. This paper proposes a point-based incentive system that activates file sharing communications and prevents free-riding syndrome in advance. This system can lead users to aware their status and take part in more active communications using real-time point monitor.
KeywordsP2P distributed system free-riding incentive Gnutella
Unable to display preview. Download preview PDF.
- 1.Saroiu, S., Gummadi, P.K., Gribble, S.D.: A Measurement Study of Peer-to-Peer File Sharing Systems. In: Proceedings of Multimedia Computing and Networking (MMCN 2002) (2002)Google Scholar
- 2.Hughes, D., Coulson, G., Walkerdine, J.: Free Riding on Gnutella Revisited: the Bell Tolls? Published in IEEE Distributed Systems Online 6(6) (2005)Google Scholar
- 3.Jun, S., Ahamad, M.: Incentives in BitTorrent Induce Free Riding. Applications, Technologies, Architectures, and Protocols for Computer Communication, 116–121 (2005)Google Scholar
- 4.Ripeanu, M.: Peer-to-Peer Architecture Case Study: Gnutella Network. In: First International Conference on Peer-to-Peer Computing (2001)Google Scholar
- 5.Pouwelse, J.A., Garbacki, P., Epema, D.H.J., Sips, H.J.: A Measurement Study of the BitTorrent Peer-to-Peer File-Sharing System. Technicla Report PDS-2004-007, Delft University of Technology (2004)Google Scholar
- 8.Damiani, E., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 207–216 (2002)Google Scholar