{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,3]],"date-time":"2025-02-03T05:17:21Z","timestamp":1738559841454,"version":"3.35.0"},"reference-count":33,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2009,3,1]],"date-time":"2009-03-01T00:00:00Z","timestamp":1235865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1016\/j.comnet.2008.09.028","type":"journal-article","created":{"date-parts":[[2008,11,22]],"date-time":"2008-11-22T10:47:57Z","timestamp":1227350877000},"page":"556-568","source":"Crossref","is-referenced-by-count":7,"title":["H-P2PSIP: Interconnection of P2PSIP domains for global multimedia services based on a hierarchical DHT overlay network"],"prefix":"10.1016","volume":"53","author":[{"given":"Isaias","family":"Martinez-Yelmo","sequence":"first","affiliation":[]},{"given":"Alex","family":"Bikfalvi","sequence":"additional","affiliation":[]},{"given":"Ruben","family":"Cuevas","sequence":"additional","affiliation":[]},{"given":"Carmen","family":"Guerrero","sequence":"additional","affiliation":[]},{"given":"Jaime","family":"Garcia","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2008.09.028_bib1","doi-asserted-by":"crossref","unstructured":"S.A. Baset, H.G. Schulzrinne. An analysis of the skype peer-to-peer internet telephony protocol, in: INFOCOM 2006, Proceedings of the 25th IEEE International Conference on Computer Communications, April 2006, pp. 1\u201311.","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"10.1016\/j.comnet.2008.09.028_bib2","unstructured":"S. Guha, N. Daswani, R. Jain, An experimental study of the skype peer-to-peer voip system, in: IPTPS 2006, 2006."},{"key":"10.1016\/j.comnet.2008.09.028_bib3","unstructured":"Dario Rossi, Marco Melia, Michela Meo, A detailed measurement of skype network traffic, in: In IPTPS 2008, 2008."},{"key":"10.1016\/j.comnet.2008.09.028_bib4","unstructured":"J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler, SIP: Session Initiation Protocol, RFC 3261 (Proposed Standard), June 2002, Updated by RFCs 3265, 3853, 4320, 4916."},{"key":"10.1016\/j.comnet.2008.09.028_bib5","unstructured":"D. Bryan, P. Matthews, E. Shim, D. Willis, Concepts and terminology for peer to peer sip, Internet Draft draft-ietf-p2psip-concepts-02.txt, July 2008."},{"key":"10.1016\/j.comnet.2008.09.028_bib6","unstructured":"C. Jennings, B. Lowekamp, E. Rescorla, S. Baset, H. Schulzrinne, Resource location and discovery (reload), Internet Draft draft-ietf-p2psip-reload-00.txt, July 2008."},{"key":"10.1016\/j.comnet.2008.09.028_bib7","unstructured":"P. Maymounkov, D. Mazieres, IPTPS 2002 Cambridge, MA, USA, March 7\u20138, 2002, Revised Papers, Lecture Notes in Computer Science, Chapter Kademlia: A Peer-to-peer Information System Based on the XOR Metric, Springer, vol. 2429, 2002, pp. 53\u201365."},{"issue":"1","key":"10.1016\/j.comnet.2008.09.028_bib8","doi-asserted-by":"crossref","DOI":"10.1109\/TNET.2002.808407","article-title":"Chord: a scalable peer-to-peer lookup protocol for internet applications","volume":"11","author":"Stoica","year":"2003","journal-title":"IEEE\/ACM Trans. Network."},{"key":"10.1016\/j.comnet.2008.09.028_bib9","series-title":"SIGCOMM\u201901","article-title":"A scalable content-addressable network","author":"Ratnasamy","year":"2001"},{"key":"10.1016\/j.comnet.2008.09.028_bib10","unstructured":"H.A. Simon, The architecture of complexity, in: MIT Press, editor, The Sciences of the Artificial, 1981, pp. 192\u2013229."},{"key":"10.1016\/j.comnet.2008.09.028_bib11","doi-asserted-by":"crossref","unstructured":"B. Beverly Yang, H. Garcia-Molina, Designing a super-peer network, in: Proceedings of the 19th International Conference on Data Engineering, 2003, pp. 49\u201360.","DOI":"10.1109\/ICDE.2003.1260781"},{"key":"10.1016\/j.comnet.2008.09.028_bib12","unstructured":"E. Marocco, D. Bryan, Interworking between p2psip overlays and conventional sip networks, Internet Draft Draft-marocco-p2psip-interwork-01.txt, March 2007."},{"key":"10.1016\/j.comnet.2008.09.028_bib13","doi-asserted-by":"crossref","unstructured":"T. Dierks, E. Rescorla, The transport layer security (TLS) protocol version 1.1., RFC 4346, Internet Engineering Task Force, April 2006.","DOI":"10.17487\/rfc4346"},{"key":"10.1016\/j.comnet.2008.09.028_bib14","doi-asserted-by":"crossref","unstructured":"E. Rescorla, N. Modadugu, Datagram transport layer security, RFC 4347, Internet Engineering Task Force, April 2006.","DOI":"10.17487\/rfc4347"},{"key":"10.1016\/j.comnet.2008.09.028_bib15","unstructured":"J. Rosenberg, Interactive connectivity establishment (ice): a protocol for network address translator (nat) traversal for offer\/answer protocols, Internet Draft draft-ietf-mmusic-ice-19.txt, October 2007."},{"key":"10.1016\/j.comnet.2008.09.028_bib16","doi-asserted-by":"crossref","unstructured":"Su-Hong Min, J. Holliday, Dong-Sub Cho, Optimal super-peer selection for large-scale p2p system, in: International Conference on Hybrid Information Technology, 2006, ICHIT\u201906, vol. 2, 2006, pp. 588\u2013593.","DOI":"10.1109\/ICHIT.2006.253666"},{"key":"10.1016\/j.comnet.2008.09.028_bib17","doi-asserted-by":"crossref","unstructured":"A.T. Mizrak, Yuchung Cheng, Vineet Kumar, S. Savage, Structured super-peers: leveraging heterogeneity to provide constant-time lookup, in: Proceedings of the Internet Applications, WIAPP, 2003, pp. 104\u2013111.","DOI":"10.1109\/WIAPP.2003.1210294"},{"issue":"2","key":"10.1016\/j.comnet.2008.09.028_bib18","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/COMST.2005.1610546","article-title":"A survey and comparison of peer-to-peer overlay network schemes","volume":"7","author":"Lua","year":"2005","journal-title":"Commun. Survey Tutorial IEEE"},{"key":"10.1016\/j.comnet.2008.09.028_bib19","doi-asserted-by":"crossref","unstructured":"Zhiyong Xu, Rui Min, Yiming Hu, Hieras: a dht based hierarchical p2p routing algorithm, in: Proceedings of the International Conference on Parallel Processing, 2003.","DOI":"10.1109\/ICPP.2003.1240580"},{"key":"10.1016\/j.comnet.2008.09.028_bib20","doi-asserted-by":"crossref","unstructured":"P. Ganesan, K. Gummadi, H. Garcia-Molina, Canon in g major: designing dhts with hierarchical structure, in: Proceedings of the 24th International Conference on Distributed Computing Systems, 2004, pp. 263\u2013272.","DOI":"10.1109\/ICDCS.2004.1281591"},{"key":"10.1016\/j.comnet.2008.09.028_bib21","unstructured":"Luis Garces-Erice, Ernst W. Biersack, Keith W. Ross, Pascal A. Felber, Guillaume Urvoy-Keller, Hierarchical p2p systems, in: Proceedings of the ACM\/IFIP International Conference on Parallel and Distributed Computing (Euro-Par), 2003."},{"key":"10.1016\/j.comnet.2008.09.028_bib22","doi-asserted-by":"crossref","unstructured":"S. Zoels, Z. Despotovic, W. Kellerer, Cost-based analysis of hierarchical dht design, in: Sixth IEEE International Conference on Peer-to-Peer Computing, P2P, 2006, pp. 233\u2013239.","DOI":"10.1109\/P2P.2006.13"},{"key":"10.1016\/j.comnet.2008.09.028_bib23","doi-asserted-by":"crossref","unstructured":"Isaias Martinez-Yelmo, Ruben Cuevas, Carmen Guerrero, Andreas Mauthe, Routing performance in hierarchical dht-based overlay networks, in: Proceedings of the 16th Euromicro International Conference on Parallel Distributed and Network-based Processing, February 2008.","DOI":"10.1109\/PDP.2008.79"},{"key":"10.1016\/j.comnet.2008.09.028_bib24","unstructured":"V. Darlagiannis, A. Mauthe, N. Liebau, R. Steinmetz, An adaptable, role-based simulator for P2P networks, in: Proceedings of the International Conference on Modeling, Simulation and Visualization Methods, 2004, pp. 52\u201359."},{"key":"10.1016\/j.comnet.2008.09.028_bib25","doi-asserted-by":"crossref","unstructured":"Moritz Steiner, Taoufik En-Najjary, Ernst W. Biersack, A global view of kad. in: IMC\u201907 \u2013 Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, New York, NY, USA, 2007, pp. 117\u2013122.","DOI":"10.1145\/1298306.1298323"},{"issue":"5","key":"10.1016\/j.comnet.2008.09.028_bib26","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1290168.1290176","article-title":"Exploiting kad: possible uses and misuses","volume":"37","author":"Steiner","year":"2007","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"10.1016\/j.comnet.2008.09.028_bib27","unstructured":"Moritz Steiner, Ernst W. Biersack, Taoufik En-Najjary, Actively monitoring peers in KAD, in: IPTPS\u201907, 6th International Workshop on Peer-to-Peer Systems, Bellevue, USA, February 26\u201327, 2007."},{"key":"10.1016\/j.comnet.2008.09.028_bib28","unstructured":"Moritz Steiner, Taoufik En-Najjary, Ernst W. Biersack, Analyzing peer behavior in KAD, Technical Report EURECOM+2358, Institut Eurecom, France, October 2007."},{"issue":"3","key":"10.1016\/j.comnet.2008.09.028_bib29","article-title":"Overlay design mechanisms for heterogeneous, large scale, dynamic P2P systems","volume":"12","author":"Darlagiannis","year":"2004","journal-title":"J. Network Syst. Manage. Special Issue Distribut. Manage."},{"key":"10.1016\/j.comnet.2008.09.028_bib30","unstructured":"M. Kwon, S. Fahmy, Toward cooperative inter-overlay networking, in: Proceedings of the IEEE ICNP, 2003."},{"key":"10.1016\/j.comnet.2008.09.028_bib31","unstructured":"M. Kwon, S. Fahmy. Synergy: an overlay internetworking architecture, in: Proceedings of the 14th International Conference on Computer Communications and Networks, ICCCN 2005, pp. 401\u2013406."},{"key":"10.1016\/j.comnet.2008.09.028_bib32","unstructured":"Zhichen Xu, Zheng Zhang, Building low-maintenance expressways for p2p systems, Technical Report, Internet Systems and Storage Laboratory, HP Laboratories Palo Alto, 2002."},{"year":"2007","series-title":"LNCS: Parallel and Distributed Processing and Applications","author":"Zhang","key":"10.1016\/j.comnet.2008.09.028_bib33"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128608003794?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128608003794?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,2,3]],"date-time":"2025-02-03T04:28:39Z","timestamp":1738556919000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128608003794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,3]]}},"alternative-id":["S1389128608003794"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2008.09.028","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2009,3]]}}}