Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Peer-to-peer
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Current research== Researchers have used computer simulations to aid in understanding and evaluating the complex behaviors of individuals within the network. "Networking research often relies on simulation in order to test and evaluate new ideas. An important requirement of this process is that results must be reproducible so that other researchers can replicate, validate, and extend existing work."<ref name="Basu, A. 2013">Basu, A., Fleming, S., Stanier, J., Naicken, S., Wakeman, I., & Gurbani, V. K. (2013). The state of peer-to-peer network simulators. ACM Computing Surveys, 45(4), 46.</ref> If the research cannot be reproduced, then the opportunity for further research is hindered. "Even though new simulators continue to be released, the research community tends towards only a handful of open-source simulators. The demand for features in simulators, as shown by our criteria and survey, is high. Therefore, the community should work together to get these features in open-source software. This would reduce the need for custom simulators, and hence increase repeatability and reputability of experiments."<ref name="Basu, A. 2013"/> Popular simulators that were widely used in the past are NS2, OMNeT++, SimPy, NetLogo, PlanetLab, ProtoPeer, QTM, PeerSim, ONE, P2PStrmSim, PlanetSim, GNUSim, and Bharambe.<ref>{{Cite journal |last1=Ihle |first1=Cornelius |last2=Trautwein |first2=Dennis |last3=Schubotz |first3=Moritz |last4=Meuschke |first4=Norman |last5=Gipp |first5=Bela |date=2023-01-24 |title=Incentive Mechanisms in Peer-to-Peer Networks β A Systematic Literature Review |journal=ACM Computing Surveys |volume=55 |issue=14s |pages=1β69 |doi=10.1145/3578581 |issn=0360-0300 |s2cid=256106264 |doi-access=free}}</ref> Besides all the above stated facts, there has also been work done on ns-2 open source network simulators. One research issue related to free rider detection and punishment has been explored using ns-2 simulator here.<ref>A Bhakuni, P Sharma, R Kaushal [https://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6779311&tag=1 "Free-rider detection and punishment in BitTorrent based P2P networks"], International Advanced Computing Conference, 2014. {{doi|10.1109/IAdCC.2014.6779311}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)