(a) Random holding and random searching
(b) Random holding and Zipf’s searching
(c) Random holding and particular searching
(d) Zipf’s holding and random searching
(e) Zipf’s holding and Zipf’s searching
(f) Zipf’s holding and particular searching
(g) One node searching
Figure 8: Simulation results of P-EP2P using the sequential and simultaneous topology evaluation methods when all nodes always stay in the network.