SUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER
|
|
|
- Colleen Short
- 10 years ago
- Views:
Transcription
1 SUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER R. Naga Priyadarsini, S. Suma and V. Dhanakoti Department of Computer Science Engineering, Valliammai Engineering College, Kanchipuram, India ABSTRACT Peer-to-peer (P2P) computing or networking is a distributed application architecture. The tasks and workload are partitioned between multiple peers. Peers are equally privileged, equipotent participants in the application. P2P file sharing is the distribution and sharing of files using P2P networking technology. The peers of such networks are end-user computer systems that are interconnected via the internet. In this paper we develop a systematic methodology to identify P2P nodes, perform suitable cluster operation to transmit files between various peers. In-case of any fault nodes identified in the transmission path suitable alternate path must be identified so that the file can reach the destination safely. Finally the packets are transmitted to the destination by means of suitable path and there the packets are collected and decrypted. The results are obtained based on the moving nodes also. Keywords: P2P, routing, network analysis, clustering, encryption, decryption. 1. INTRODUCTION A peer-to-peer network is a network in which any node in the network can act as both a client and a server. Over the last few years, peer-to-peer (P2P) filesharing has relentlessly grown to represent a formidable component of Internet traffic. P2P volume is sufficiently dominant on some links to incent increased local peering among Internet Service Providers [1], to observable yet unquantified effect on the global Internet topology and routing system not to mention competitive market dynamics. P2P networking refers to virtual networks of computers that replace the distinct notions of server and client nodes with the notion of peers. Despite huge differences among peers with respect to processing, connection speed, local network configuration or operating system, each member of the P2P network has the same functionality at the application layer. This peering functionality is in contrast to traditional network systems such as DNS where there is a clear distinction between the operations performed by each node. The absence of centralized authorities in P2P networks results in a totally distributed configuration of directly connected peers. Some P2P networks also have a small set of special nodes that usually handle queries. The main application of such networks is file sharing among users. While P2P networks became popular only during the last few years, the concept of P2P networking was introduced early in the evolution of network communication systems. In fact both ARPANET in the late 60s and Usenet in the late 80 s are in a sense early predecessors of today s P2P networks; they were distributed, decentralized networks intended for file transfer and sharing among equal peers. With the dramatic growth of the Internet in the early 90s, the popularity of the world-wide web somewhat displaced use and development of P2P networks. However, a series of technological developments lead to the explosion of P2P applications. First, the MPEG Audio Layer-3 (i.e., the popular mp3) encoding (1995 [2]) which facilitated huge data compression gains, accompanied by the release of free mp3 players, pervasively available by 1997 (e.g., winamp [3]). Encodings that offered considerable reduction for video data were also developed later (e.g., DivX [4] in 1999). Second, the increase of available bandwidth to end users with broadband technologies that provided inexpensive high-speed Internet access. Third, the pivotal Napster network [5] fielded in 1999 revolutionized file sharing, even though Napster was technically a hybrid-p2p rather than a pure P2P network since it retained the notion of a server for indexing content of the peers. Despite this dramatic growth, reliable profiling of P2P traffic remains elusive. We no longer enjoy the fleeting benefit of first generation P2P traffic, which was relatively easily classified due to its use of well-defined port numbers. 2. RELATED WORKS Many peer-to-peer networks have been proposed for different applications in the literature; see, for example, [6], [7], [8], [9], [10], [11], [12], and [13]. In this paper, we focus on peer-to-peer networks for efficient distributed data (file) sharing among peers. Gnutella [11] is a decentralized unstructured peer-to-peer network. The network is formed by peers joining the network following some loose rules. There is no constraint on the network topology. To look up a data item, a peer sends a flooding query request to all neighbors within a certain radius. As Gnutella has no requirement on the network topology and data placement, it is extremely resilient to peer joining and leaving the system frequently. However, flooding is not scalable and consumes a lot of network bandwidth. Also, it is difficult to find a rare data item as it has to flood the query request to most of the peers. Bit Torrent [12] is a centralized unstructured peer-to-peer network for file sharing. A central server called tracker keeps track of all peers who have the file. Each file has a corresponding torrent file stored in the tracker which contains the information about the file, such as its length, name, and hashing information. When receiving a download request, the tracker sends back a 5599
2 random list of peers which are downloading the same file. When a peer has received the complete file, it should stay in the system for other peers to download at least one copy of the file from it. Since Bit Torrent uses a central server to store all the information about the file and the peers downloading the file, it suffers called single point of failure problem which means that if the central server fails, the entire system is brought to a halt. Note that in some literatures, hybrid peer-to-peer networks were used to refer to the centralized peer-to-peer systems such as Bit Torrent. Unlike previous work that proposed new centrally coordinated mechanisms [14] and new pricing mechanisms to incentivize uncoordinated p2p schemes [15], we study the effectiveness of using the popular BT algorithm for file distribution. While the performance of BT has been studied extensively as a file-sharing protocol [16], [17], [18], to the best of our knowledge, we are the first to study the performance of BT as a file distribution protocol. In file distribution, the system provides a server (BT seed) as a constant source of data content for clients that download a file and clients generally leave the system on download completion. 3. PROPOSED SYSTEM The proposed architecture Figure-1 shows the various stages such as P2P node detection, P2P clustering using K mean clustering, Geo routing methodology Data Encryption and decryption. Firstly, analyzing the network streams by P2P-nodes detection algorithm, we can get the sets of P2P-nodes. Secondly, each P2P application has its own typical P2P protocol and the nodes in one P2P application have exchanged data frequently, the P2P-nodes clustering algorithm analysis the network streams of P2P nodes, stats the symmetry, quantity and frequency of the data exchanged between each pair of nodes, and clusters a P2P application based on K-mean clustering algorithm. The path to transfer the data must be chosen in such a way that it must not contain any fault node. The behavior of the moving nodes can also be analyzed. Finally using suitable path the packets are transmitted and are decrypted on the receiver side. a) P2P Node detection Any system or device connected to a network is also called a node. Each device on the network has a network address, such as a MAC address, which uniquely identifies each device. In order to get more information from the network as soon as possible, the P2P-nodes would create connections with the other nodes as many as possible, which basically exhibit the characteristic of paroxysm. Furthermore, because the P2P nodes are decentralized, each node would have connected to much more subnet and network nodes than the common nodes. The average of the connections can be performed by Figure-1. System flow Architecture. b) Node clustering K-means is one of the simplest unsupervised learning algorithms that solve the well known clustering problem. The procedure follows a simple and easy way to classify a given data set through a certain number of clusters (assume k clusters) fixed a priori. The main idea is to define k centroids, one for each cluster. These centroids should be placed in a cunning way because of different location causes different result. So, the better choice is to place them as much as possible far away from each other. The next step is to take each point belonging to a given data set and associate it to the nearest centroid. When no point is pending, the first step is completed and an early group age is done. At this point we need to recalculate k new centroids as bar centers of the clusters resulting from the previous step. After we have these k new centroids, a new binding has to be done between the same data set points and the nearest new centroid. A loop has been generated. As a result of this loop we may notice that the k centroids change their location step by step until no more changes are done. In other words centroids do not move any more. Finally, this algorithm aims at minimizing an objective function, in this case a squared error function. The objective function. (1) 5600
3 In a T period, there are m times sampling. For each network node S, cumulates the connections at each sampling time, and form a collection {Ns 1 Ns 2, Ns m }. Ns refers the the number of connections of node S. (2) Where x i j- c j is the Euclidean distance between x i and c j, n is the number of data points in i th cluster and k is the number of cluster centers. c) Data encryption Blowfish algorithm is used to perform encryption as well as decryption. Blowfish symmetric block cipher algorithm encrypts block data of 64-bits at a time. It is suitable for applications where the key does not change often, like communication link or an automatic file encryptor. It will follow the feistel network and this algorithm is divided into two parts such as Key-expansion and Data Encryption. Figure-2. Connection between nodes. Followed by the connection establishment source and destination node can be selected to transfer the file between them by dividing them into multiple packets. The file to be sent is selected and encryption is performed as shown in Figure-3. Blowfish is designed in consideration with, Fast: It encrypts data on large 32-bit microprocessors at a rate of 26 clock cycles per byte. Compact: It can run in less than 5K of memory. Simple: It uses addition, XOR, lookup table with 32- bit operands. Secure: The key length is variable, it can be in the range of32~448 bits: default 128 bits key length. d) Geo routing methodology Geographic routing also known as positionbased routing is a routing principle that relies on geographic position information. It is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. Geographic routing requires that each node can determine its own location and that the source is aware of the location of the destination. With this information a message can be routed to the destination without knowledge of the network topology or a prior route discovery. Figure-3. Data encryption. The distance between each and every node is calculated based on the clustering algorithm and their values are obtained as shown in Figure RESULTS AND DISCUSSIONS The nodes are obtained for which the connection is to be established by using equation (1). Figure-2 shows that nodes are created and then the connection is established between all the nodes by means of clustering algorithm. Figure-4. Distance calculation. Fault node can be obtained based on the distance. The alternative path to send the packets must be provided. 5601
4 From the routing table obtained best path must be selected to transmit the data as shown in Figure-5. The comparison between existing and proposed is calculated. The result obtained shows that proposed system has the highest accuracy level. The alternate path provides the good accuracy level which is shown in Figure-7. Figure-5. Alternate path. All the above results shows when the node is still. Figure-6 shows when the nodes are in moving state. The distance travelled from source to destination by each node is calculated and the exact location of the particular node can also be obtained. In case of moving nodes the packets can be transmitted to the destination based on the angle of arrival. The track of each and every movement of the nodes can be analyzed. Figure-6. Moving nodes. Table-1 indicated the location of each and every node in the network by specifying its exact x and y region. In case when the behavior seems to be any changes then the node can be analyzed easily. Table-1. Node location. Figure-7. Comparison for existing and proposed system. 5. CONCLUSIONS In this paper, node detection based on P2P node detection algorithm, P2P node clustering algorithm geo routing methodology and data encryption and decryption techniques are explained. The comparison shows the better result for the alternate path than the original path. In case of moving nodes the location are identified and the packets are transmitted based on the angle of arrival. Finally the file reaches the destination node in more secure and shortest way and can be decrypted to figure out the exact file. 6. FUTURE WORK Followed by the alternative path, the behavior of the node can be analyzed. Incase if there is any presence of attackers or change in any behavior, it can be identified and eliminated. By doing this the file transfer can be done in more secure way. REFERENCES [1] W. B. Norton The evolution of the U.S. internet peering ecosystem. ystem.pdf. [2] Fraunhofer IIS. x.html. [3] WINAMP. [4] DivXNetowks. [5] Napster
5 [6] E.K. Lua, J. Crowcroft, M. Pias, R. Sharma, S. Lim A Survey and Comparison of Peer-to-Peer Overlay Network Schemes, IEEE Comm. Surveys and Tutorials, Vol. 7, No. 2, pp [7] E. Brosh and Y. Shavitt Approximation and Heuristic Algorithms for Minimum Delay Application-Layer Multicast Trees, Proc. IEEE INFOCOM 04. [8] A.R. Bharambe, S.G. Rao, V.N. Padmanabhan, S. Seshan, and H.Zhang The Impact of Heterogeneous Bandwidth Constraints on DHT-Based Multicast Protocols, Proc. Ann. Int l Workshop Peer-to-Peer Systems (IPTPS 05), pp , February. [9] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek and H. Balakrishnan Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications, IEEE/ACM Trans. Networking, vol. 11, no. 1, pp , February. [10] V. Vishnumurthy and P. Francis On Heterogeneous Overlay Construction and Random Node Selection in Unstructured P2P Networks", Proc. IEEE INFOCOM 06. [14] R.S. Peterson and E.G. Sirer Antfarm: Efficient Content Distribution with Managed Swarms," in Proc. USENIX Symp.Netw. Syst. Design Implement., pp [15] V. Misra, P. Barford and M.S. Squillante Incentivizing Peer-Assisted Services: A Fluid Shapley Value Approach, ACM SIGMETRICS Performance Eval. Rev., Vol. 38, No. 1, pp [16] B. Fan, J. C. S. Lui and D.-M. Chiu The Design Trade- Offs of BitTorrent-Like File Sharing Protocols, Trans. Netw., Vol. 17, No. 2, pp [17] D. Qiu and R. Srikant Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks, in Proc. ACM Conf. Appl., Technol., Architectures, Protocols Comput. Commun. pp [18] F. Simatos, P. Robert and F. Guillemin A Queueing System for Modeling a File Sharing Principle, ACM SIGMETRICS Performance Eval. Rev., Vol. 36, No. 1, pp [11] Gnutella Development Forum, The Gnutella v0.6 Protocol, gdf/files/, [12]Bittorrent [13] P. Ganesan, Q. Sun and H. Garcia-Molina YAPPERS: A Peer-to-Peer Lookup Service over Arbitrary Topology, Proc. IEEE INFOCOM 03, pp
Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY
[Kavita, 2(4): April, 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Histogram Based Live Streaming in Peer to Peer Dynamic Balancing & Clustering System
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
Unit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles [email protected],[email protected] Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 63-68 Impact Journals AUTOMATED AND ADAPTIVE DOWNLOAD
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems (Scalable and Efficient Keyword Searching) Anh-Tuan Gai INRIA Rocquencourt [email protected] Laurent Viennot INRIA Rocquencourt
A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS
A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering [email protected] [email protected]
The Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers)
Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers) Kaushik Sekaran Assistant Professor School of Computing Science & Engineering VIT University,
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
New Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea [email protected], [email protected],
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: [email protected] # K.Meena 2, Assistant Professor
A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks
1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
Async: Secure File Synchronization
Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany [email protected]
SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD
International Journal of Advances in Applied Science and Engineering (IJAEAS) ISSN (P): 2348-1811; ISSN (E): 2348-182X Vol-1, Iss.-3, JUNE 2014, 54-58 IIST SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE
Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
Design and Implementation of Performance Guaranteed Symmetric Load Balancing Algorithm
Design and Implementation of Performance Guaranteed Symmetric Load Balancing Algorithm Shaik Nagoor Meeravali #1, R. Daniel *2, CH. Srinivasa Reddy #3 # M.Tech, Department of Information Technology, Vignan's
Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Index Terms : Load rebalance, distributed file systems, clouds, movement cost, load imbalance, chunk.
Load Rebalancing for Distributed File Systems in Clouds. Smita Salunkhe, S. S. Sannakki Department of Computer Science and Engineering KLS Gogte Institute of Technology, Belgaum, Karnataka, India Affiliated
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING
Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING R.Kohila
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Distributed Hash Tables in P2P Systems - A literary survey
Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology [email protected] Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer
File sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: [email protected] Abstract: File sharing systems cause a huge portion
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
Attacks Against Peer-to-peer Networks and Countermeasures
Attacks Against Peer-to-peer Networks and Countermeasures Lin Wang Helsinki University of Technology [email protected] Abstract Peer-to-peer (P2P) networks have many distinct aspects that are different from
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India [email protected] Suraj Sanjay Dangat
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
A Reputation Management System in Structured Peer-to-Peer Networks
A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network
Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Jian Ni, Danny H. K. Tsang, Ivan S. H. Yeung, Xiaojun Hei Department of Electrical & Electronic Engineering Hong Kong University
Peer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology [email protected] Abstract In the last few years, the success of the Napster online music sharing program
Argonne National Laboratory, Argonne, IL USA 60439
LEGS: A WSRF Service to Estimate Latency between Arbitrary Hosts on the Internet R Vijayprasanth 1, R Kavithaa 2,3, and Rajkumar Kettimuthu 2,3 1 Department of Information Technology Coimbatore Institute
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
Chord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network
1 Shuang Kai, 2 Qu Zheng *1, Shuang Kai Beijing University of Posts and Telecommunications, [email protected] 2, Qu Zheng Beijing University of Posts and Telecommunications, [email protected] Abstract
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing
Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing (Research Proposal) Abhishek Agrawal ([email protected]) Abstract This proposal discusses details about Peer-VM which is a peer-to-peer
LOAD BALANCING FOR OPTIMAL SHARING OF NETWORK BANDWIDTH
LOAD BALANCING FOR OPTIMAL SHARING OF NETWORK BANDWIDTH S.Hilda Thabitha 1, S.Pallavi 2, P.Jesu Jayarin 3 1 PG Scholar,,Dept of CSE,Jeppiaar Engineering College,Chennai, 2 Research Scholar,Sathyabama University,Chennai-119.
Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta
COST MINIMIZATION OF RUNNING MAPREDUCE ACROSS GEOGRAPHICALLY DISTRIBUTED DATA CENTERS
COST MINIMIZATION OF RUNNING MAPREDUCE ACROSS GEOGRAPHICALLY DISTRIBUTED DATA CENTERS Ms. T. Cowsalya PG Scholar, SVS College of Engineering, Coimbatore, Tamilnadu, India Dr. S. Senthamarai Kannan Assistant
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
Clustering in Peer-to-Peer File Sharing Workloads
Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France Distributed Programming Laboratory, EPFL, Switzerland
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1
Advanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 [email protected] Mohamed E. Fayad Computer Engineering
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,
How To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst
The Internet is Flat: A brief history of networking over the next ten years Don Towsley UMass - Amherst 1 What does flat mean? The World Is Flat. A Brief History of the Twenty-First Century, Thomas Friedman
An Efficient Strategy for Data Recovery in Wi-Fi Systems
International Journal of Research & Development in Science and Technology Volume 1, Issue 2, December 2014, PP 1-6 ISSN 2350-4751 (Print) & ISSN 2350-4751(Online) An Efficient Strategy for Data Recovery
ABSTRACT Acknowledgments List of Abbreviations Contents ABSTRACT 3 Acknowledgments 5 List of Abbreviations 7 List of Figures 15 List of Tables 23 1 Introduction 25 2 Motivation and background 29 3 Overview
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
David R. McIntyre CS Department, Cleveland State University Cleveland, Ohio 44101
Data Distribution in a Wireless Environment with Migrating Nodes David A. Johnston EECS Department, Case Western Reserve University Cleveland, Ohio 44106 David R. McIntyre CS Department, Cleveland State
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer
A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China [email protected]
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
The Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany [email protected] Abstract. Network infrastructures are nowadays
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
CSCI-1680 CDN & P2P Chen Avin
CSCI-1680 CDN & P2P Chen Avin Based partly on lecture notes by Scott Shenker and John Jannotti androdrigo Fonseca And Computer Networking: A Top Down Approach - 6th edition Last time DNS & DHT Today: P2P
Load Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
Decentralized supplementary services for Voice-over-IP telephony
Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.
Content Distribution Network (CDN)
Content Distribution Network (CDN) Amir H. Payberah ([email protected]) Fatemeh Rahimian ([email protected]) 1 GOAL What is Content Distribution Network (CDN)? The solutions for CDN. CDN applications File Sharing
A Survey of Peer-to-Peer Network Security Issues
1 of 8 1/9/2008 12:32 PM A Survey of Peer-to-Peer Network Security Issues James Li Abstract In recent years, peer-to-peer (P2P) networks have soared in popularity in the form of file sharing applications.
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Peer to peer networks: sharing between peers. Trond Aspelund
Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
