Descriptive agent-based modeling of the "Chord" P2P protocol

Descriptive agent-based modeling of the "Chord" P2P protocol

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Modeling and Simulation of Complex Communication Networks — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this chapter, we have modeled Chord in DescRiptivE Agent-based Models (DREAM) for higher level of abstraction. For textual description of Chord, Overview, design concepts and details (ODD) is used. To best of our knowledge, Chord is not yet modeled in DREAM and ODD in the literature. The main contributions of our works are as follows: We have replicated the results of PeerSim-Chord in NetLogo. We have modeled Chord in ODD for its textual description. For pseudo-code-based specification and centralities measure, we have modeled Chord in DREAM. We have compared and discussed the results of PeerSim and NetLogo. Rest of the chapter is organized as follows. Second section covers background and literature review, and in the third section we have modeled Chord in ODD and DREAM. Fourth section discusses the results, and the last section concludes the chapter.

Chapter Contents:

  • 9.1 Introduction
  • 9.2 Background and literature review
  • 9.2.1 CAS literature
  • 9.2.2 Modeling and simulation of CACOONS
  • Agent-based modeling
  • Complex network modeling
  • 9.2.3 Chord P2P protocol
  • Architecture and working
  • 9.2.4 Hashing and key mapping
  • 9.2.5 Node joining
  • 9.2.6 Finger table
  • 9.2.7 Stabilization
  • 9.2.8 Performance of chord
  • 9.2.9 PeerSim
  • 9.2.10 Literature review
  • Security-based chord
  • Peer data management-based chord
  • Mobility-based chord
  • Hierarchy-based chord
  • Routing and latency-based chord
  • Load distribution and resource allocation based Chord
  • Other chord-based approaches
  • 9.3 ODD model of a "Chord"
  • 9.3.1 Purpose
  • 9.3.2 Entities, state variables, and scales
  • Agents/Individuals
  • Spatial units
  • Environment
  • Collectives
  • 9.3.3 Process overview and scheduling
  • 9.3.4 Design concepts
  • Basic principles
  • Emergence
  • Adaptation
  • Objectives
  • Learning
  • Sensing
  • Stochasticity
  • Interaction
  • Collectives
  • Observation
  • 9.3.5 Initialization
  • 9.3.6 Input data
  • 9.3.7 Sub-models
  • Set-up
  • Init-node
  • Create-network
  • Go
  • 9.4 DREAM model of a "Chord"
  • 9.4.1 Agent design
  • State charts (of agents)
  • 9.4.2 Activity diagrams
  • 9.4.3 Flowchart
  • 9.4.4 Pseudo-code based specification
  • Agents and breed
  • Globals
  • Procedures
  • Experiments
  • 9.5 Results and discussion
  • 9.5.1 Metrics (table and description)
  • 9.5.2 PeerSim results
  • 9.5.3 ABM results
  • 9.5.4 Comparison of PeerSim and ABM
  • 9.5.5 DREAM network models
  • Plots of centralities
  • Plots of centralities using power-law
  • 9.5.6 Discussion (ODD vs. DREAM pros and cons of both) and which is more useful for modeling the chosen P2P protocol
  • 9.5.7 Chord and theory of computation
  • Complexity theory
  • 9.6 Conclusions and future work
  • References

Inspec keywords: protocols; peer-to-peer computing

Other keywords: NetLogo; Overview, design concepts and details; textual description; ODD modelling; Chord P2P protocol; peer-to-peer distributed protocol; PeerSim-Chord; pseudo-code-based specification; DescRiptivE Agent-based Models; DREAM modelling; descriptive agent-based modeling

Subjects: Computer networks and techniques; Internet software; Protocols; Protocols; Computer communications

Preview this chapter:
Zoom in

Descriptive agent-based modeling of the "Chord" P2P protocol, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc018e/PBPC018E_ch9-1.gif /docserver/preview/fulltext/books/pc/pbpc018e/PBPC018E_ch9-2.gif

Related content

This is a required field
Please enter a valid email address