{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:35:48Z","timestamp":1740180948034,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1-4","license":[{"start":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T00:00:00Z","timestamp":1556496000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672060"],"award-info":[{"award-number":["61672060"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. Netw."],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s42045-019-00016-8","type":"journal-article","created":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T11:03:07Z","timestamp":1556535787000},"page":"28-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Peer-to-peer file sharing in next generation eXpressive Internet Architecture"],"prefix":"10.1007","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7207-6966","authenticated-orcid":false,"given":"Ziqian","family":"Meng","sequence":"first","affiliation":[]},{"given":"Zhong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,29]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Adar, E., Bernardo, A.H.: Free riding on Gnutella. First monday\u00a05.10 (2000)","DOI":"10.5210\/fm.v5i10.792"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Anand, A., et al.: Packet caches on routers: the implications of universal redundant traffic elimination. ACM SIGCOMM Computer Communication Review, vol. 38, no. 4. ACM (2008)","DOI":"10.1145\/1402946.1402984"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Anand, A., et al.: XIA: an architecture for an evolvable and trustworthy Internet. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks. ACM (2011)","DOI":"10.1145\/2070562.2070564"},{"key":"16_CR4","first-page":"2005","volume":"98052","author":"AR Bharambe","year":"2005","unstructured":"Bharambe, A.R., Herley, C., Padmanabhan, V.N.: Analyzing and improving bittorrent performance. Microsoft Res. Microsoft Corp. One Microsoft Way Redmond WA 98052, 2005\u20132103 (2005)","journal-title":"Microsoft Res. Microsoft Corp. One Microsoft Way Redmond WA"},{"key":"16_CR5","unstructured":"Choe, Y.R.: Analyzing and improving a bittorrent network\u2019s performance mechanisms. ACM MM\u201907\u00a0(2007)"},{"key":"16_CR6","unstructured":"Cohen, B.: Incentives build robustness in BitTorrent. Workshop on Economics of Peer-to-Peer Systems, vol. 6 (2003)"},{"key":"16_CR7","unstructured":"Cohen, B.: The BitTorrent protocol specification, version 11031 (2008)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Dehghan, M., et al.: A utility optimization approach to network cache design. Computer Communications, IEEE INFOCOM 2016\u2014The 35th Annual IEEE International Conference on. IEEE (2016)","DOI":"10.1109\/INFOCOM.2016.7524445"},{"issue":"2","key":"16_CR9","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1109\/TNET.2008.2002553","volume":"17","author":"B Fan","year":"2009","unstructured":"Fan, B., John, L., Dah-Ming, C.: The design trade-offs of BitTorrent-like file sharing protocols. IEEE ACM Trans. Netw. 17(2), 365\u2013376 (2009)","journal-title":"IEEE ACM Trans. Netw."},{"key":"16_CR10","unstructured":"Felber, P., Ernst, W.B.: Self-scaling networks for content distribution. In: Proceedings of International Workshop on Self-* Properties in Complex Information Systems (2004)"},{"key":"16_CR11","first-page":"1","volume":"25","author":"L Guo","year":"2007","unstructured":"Guo, L., et al.: A performance study of BitTorrent-like peer-to-peer systems. IEEE J. Select. Areas Commun. 25, 1 (2007)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"16_CR12","unstructured":"Han, D. et al.: XIA: efficient support for evolvable internetworking. NSDI, vol. 12 (2012)"},{"issue":"7","key":"16_CR13","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1109\/TC.2011.57","volume":"60","author":"M Hefeeda","year":"2011","unstructured":"Hefeeda, M., Hsu, C.-H., Mokhtarian, K.: Design and evaluation of a proxy cache for peer-to-peer traffic. IEEE Trans. Comput. 60(7), 964\u2013977 (2011)","journal-title":"IEEE Trans. Comput."},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Hu, X., et al.: Enhancing in-network caching by coupling cache placement, replacement and location. Communications (ICC), 2015 IEEE International Conference on. IEEE (2015)","DOI":"10.1109\/ICC.2015.7249226"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Kondo, D., HyunYong, L., Akihiro, N.: Content piece rarity aware in-network caching for BitTorrent. Global Communications Conference (GLOBECOM), 2015 IEEE. IEEE (2015)","DOI":"10.1109\/GLOCOM.2015.7416996"},{"issue":"2","key":"16_CR16","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/2457459.2457462","volume":"23","author":"W-C Liao","year":"2013","unstructured":"Liao, W.-C., et al.: Modeling BitTorrent-like systems with many classes of users. ACM Trans. Model. Comput. Simul 23(2), 13 (2013)","journal-title":"ACM Trans. Model. Comput. Simul"},{"key":"16_CR17","unstructured":"Locher, T., et al.: Free riding in BitTorrent is cheap. In: Proceedings of Workshop on Hot Topics in Networks (HotNets) (2006)"},{"key":"16_CR18","unstructured":"Loewenstern, A., Arvid N.: BEP 5: DHT protocol. Last modified on Feb\u00a028 (2008)"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Mastorakis, S., et al.: nTorrent: peer-to-peer file sharing in named data networking. Computer Communication and Networks (ICCCN), 2017 26th International Conference on. IEEE (2017)","DOI":"10.1109\/ICCCN.2017.8038462"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Ming, Z., Mingwei, X., Dan, W.: Age-based cooperative caching in information-centric networking. Computer Communication and Networks (ICCCN), 2014 23rd International Conference on. IEEE (2014)","DOI":"10.1109\/ICCCN.2014.6911725"},{"issue":"12","key":"16_CR21","doi-asserted-by":"publisher","first-page":"3810","DOI":"10.1093\/ietcom\/e91-b.12.3810","volume":"91","author":"A Nakao","year":"2008","unstructured":"Nakao, A., Sasaki, K., Yamamoto, S.: A remedy for network operators against increasing P2P traffic: enabling packet cache for P2P applications. IEICE Trans. Commun. 91(12), 3810\u20133820 (2008)","journal-title":"IEICE Trans. Commun."},{"issue":"3","key":"16_CR22","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/2656877.2656885","volume":"44","author":"D Naylor","year":"2014","unstructured":"Naylor, D., et al.: XIA: architecting a more trustworthy and evolvable internet. ACM SIGCOMM Comput. Commun. Rev. 44(3), 50\u201357 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"16_CR23","unstructured":"Piatek, M., et al.: Do incentives build robustness in BitTorrent. In: Proceedings of NSDI, vol. 7 (2007)"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Pouwelse, J., et al.: The bittorrent p2p file-sharing system: measurements and analysis. IPTPS, vol. 5 (2005)","DOI":"10.1007\/11558989_19"},{"key":"16_CR25","unstructured":"Price, D.: An estimate of infringing use of the internet. Dispon\u0131vel em. \n                    http:\/\/documents.envisional.com\/docs\/Envisional-Internet-Usage-Jan2011.pdf\n                    \n                  \u00a0(2011)"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Qiu, D., Rayadurgam, S.: Modeling and performance analysis of BitTorrent-like peer-to-peer networks. ACM SIGCOMM computer communication review, vol. 34. no. 4. ACM (2004)","DOI":"10.1145\/1030194.1015508"},{"key":"16_CR27","unstructured":"Sandvine, Inc ULC. Global Internet Phenomena Report (2017)"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Shin, K., et al.: T-chain: a general incentive scheme for cooperative computing. IEEE ACM Trans. Netw. (2017)","DOI":"10.1109\/TNET.2017.2685560"},{"key":"16_CR29","doi-asserted-by":"publisher","DOI":"10.1201\/9781439813737","volume-title":"Overlay Networks: Toward Information Networking","author":"S Tarkoma","year":"2010","unstructured":"Tarkoma, S.: Overlay Networks: Toward Information Networking. CRC Press, Boca Raton (2010)"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Wu, D., et al.: Understanding peer exchange in bittorrent systems. In: Peer-to-Peer Computing (P2P), 2010 IEEE Tenth International Conference on. IEEE (2010)","DOI":"10.1109\/P2P.2010.5569967"},{"issue":"2","key":"16_CR31","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/SURV.2010.021110.00036","volume":"12","author":"RL Xia","year":"2010","unstructured":"Xia, R.L., Jogesh, K.M.: A survey of bittorrent performance. IEEE Commun. Surv. Tutor. 12(2), 140\u2013158 (2010)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Yamamoto, S., Akihiro, N.: P2P packet cache router for network-wide traffic redundancy elimination. Computing, Networking and Communications (ICNC), 2012 International Conference on. IEEE (2012)","DOI":"10.1109\/ICCNC.2012.6167541"},{"issue":"18","key":"16_CR33","doi-asserted-by":"publisher","first-page":"3946","DOI":"10.1016\/j.comcom.2006.06.015","volume":"29","author":"Y Yue","year":"2006","unstructured":"Yue, Y., Lin, C., Tan, Z.: Analyzing the performance and fairness of BitTorrent-like networks using a general fluid model. Comput. Commun. 29(18), 3946\u20133956 (2006)","journal-title":"Comput. Commun."},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, F., et al.: Content delivery in the mobilityfirst future internet architecture. Sarnoff Symposium (SARNOFF), 2012 35th IEEE. IEEE (2012)","DOI":"10.1109\/SARNOF.2012.6222763"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, F., et al.: EdgeBuffer: caching and prefetching content at the edge in the MobilityFirst future Internet architecture. World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2015 IEEE 16th International Symposium on. IEEE (2015a)","DOI":"10.1109\/WoWMoM.2015.7158137"},{"key":"16_CR36","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1016\/j.comnet.2015.08.035","volume":"91","author":"X Zhang","year":"2015","unstructured":"Zhang, X., et al.: A distributed in-network caching scheme for P2P-like content chunk delivery. Comput. Netw. 91, 577\u2013592 (2015b)","journal-title":"Comput. Netw."},{"issue":"3","key":"16_CR37","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1109\/COMST.2015.2420097","volume":"17","author":"M Zhang","year":"2015","unstructured":"Zhang, M., Luo, H., Zhang, H.: A survey of caching mechanisms in information-centric networking. IEEE Commun. Surv. Tutor. 17(3), 1473\u20131499 (2015c)","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["CCF Transactions on Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42045-019-00016-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42045-019-00016-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42045-019-00016-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T23:27:11Z","timestamp":1588030031000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42045-019-00016-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,29]]},"references-count":37,"journal-issue":{"issue":"1-4","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["16"],"URL":"https:\/\/doi.org\/10.1007\/s42045-019-00016-8","relation":{},"ISSN":["2520-8462","2520-8470"],"issn-type":[{"type":"print","value":"2520-8462"},{"type":"electronic","value":"2520-8470"}],"subject":[],"published":{"date-parts":[[2019,4,29]]},"assertion":[{"value":"5 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}