Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers)
|
|
|
- Giles Newton
- 10 years ago
- Views:
Transcription
1 Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers) Kaushik Sekaran Assistant Professor School of Computing Science & Engineering VIT University, Vellore, India. ABSTRACT Peer-to-peer networks are useful for the file transferring within the group of peers in the network. But usually files are transferred in slow speed, if the files are larger in size. Also the peers don t have much utility within them. In order to enhance the utilities of the individual peers, each peer has to configure with greater CPU power, bandwidth, and storage space. But practically it is an impossible task, as the cost goes high by configuring peers with higher configuration. So my approach is to monitor the network carefully and to find out some random peers and to configure, say in a hundred peer attached network, one peer has to be configured with higher configuration. That will enhance the transfer speed among all peers. I introduce a new term called G-peers, gargantuan peers, which is having all the utility with it. These G-peers are useful in securing and transferring files at a higher speed and enhance the overall performance of the network. By adding repeated G-peers in the network, it is notable that it will increase the speed of file transfer and also the files are much secured as we are transferring using G-peers authentication. Therefore, a high success rate can be achieved within the Peer-to-peer network by these G-peers. General Terms Peer-to-peer networks, file transfer and higher configuration. Keywords Gargantuan peers (G-peers). 1. INTRODUCTION Peer-to-peer networks are used in the Internet to share resources (i.e. CPU power, bandwidth and storage space) between numerous peers. Resources are consequently distributed all over the Peer-to-peer network. The benefits of this approach are the efficient use of existing resources, scalability and consistency of the files shared between peers. The original intent of my work is to secure the files through proper authentication mechanism in the client (pool of peers) and also retrieving the files from the servers (G-peers), using the G-peers search Algorithm. In order to avoid the flooding and buffer overflow of the queries from the different peers, here I m changing the G-peers in a random interval according to its DHT s index rank using G-peer Ranking technique. 2. BACKGROUND STUDY 2.1 Literature review In conventional centralized networks there will low number of servers which provides core value to application, whereas in the peer to peer networks uses dissimilar connectivity among nodes in the network and collective bandwidth of participants in the network. Mostly peer-peer networks are used for establishing connection among the nodes via ad hoc connectivity. One of the true peer - peer networks are Gnutella [2, 3, 4] or Freenet [18] which is greatly assisted by directory servers that intimate the network address of the peers to other peer in the network. 2.2 Classifications of Peer-to-peer Networks The Peer-to-peer networks are classified into five types according to their degree of centralization [13]. Centralized Peer-to-peer network Decentralized Peer-to-peer network Structured Peer-to-peer network Unstructured Peer-to-peer network Hybrid Peer-to-peer network 2.3 File Sharing in Peer-to-peer Networks File sharing [1, 20] is based on peer-to-peer model, where all the files are stored and served by users system. Most people who indulge in file sharing using Internet provide upload and download file. File trading [14] and Peer-to-peer file sharing are different, one mentioned later does not require uploading, but still some networks provide option for uploading such as credits or enforcing the sharing of files currently being downloaded. Apart from the traditional file sharing there are services [5] that send streams instead of files over a Peer-to-peer network. Hence anyone will be able to hear radio and watch television without the need of server. It is important that instead of a tree structure network [9, 11], a brimful technology from BitTorrent [19] is used. 2.4 Distributed Hash Table (DHT) [5, 6, 10] While a peer queries for a certain file, then the file is searched for in an index structure maintained in every peer of the network. In order to maintain such an index structure we make use of a Distributed hash table. This Distributed hash table (DHT) serves as an index to satisfy the queries of other peers. 22
2 These are a class of decentralized distributed systems [21] that provide a lookup service [6] similar to a hash table: (name, value) pairs are stored in the DHT, and any participating node can efficiently retrieve the value associated with a given name. Responsibility for maintaining the mapping from names to values is distributed among the nodes, in such a way that a change in the set of participants causes a minimal amount of disruption. This allows DHTs to scale to extremely large numbers of nodes and to handle continual node arrivals, departures, and failures. DHTs form an infrastructure that can be used to build more complex services, such as distributed file systems, peer-to-peer file sharing and content distribution systems [8], cooperative web caching, multicast, anycast, domain name services, and instant messaging. DHTs characteristically emphasize the following properties: Decentralization: The peers collectively form the system without any central coordination. Scalability: The system should function efficiently even with thousands or millions of nodes. Fault tolerance: The system should be reliable (in some sense) even with nodes continuously joining, leaving, and failing. 3. SELECTION OF G-PEER(S) The below pseudocode has been applied for selecting G-peer in a group of peers. Initially, the peer with higher configuration would be taken as G-peer. So the demand once comes to G-peer from the queried peer is automatically transferred to DHT (Distributed Hash Table), for searching [7, 15, 17] the similar file in the network. If the file is not found in the first search by G-peer(1), the query is re-routed to the succeeding G-peer. 3.1 Pseudocode While Pi is an G-peer If Qi is in DHTi then Send Ri as ACK to Qi Else Pj communicates Qi to network If Qi is in DHTk then Qi resolved to Pj Increment Rank of Pk Make K as G-peer- n Decrement Rank of Pi Make I as Normal peer End if End if End while 4. SYSTEM DESIGN 4.1 Decision Flow chart G-peer(1) takes action to the Demand Yes Yes Increment its rank and make it as a G- peer(n) Decrement the rank of Current demanded G-peer (n-1) No Fig 1: Decision Flow of G-peers search Algorithm 4.2 G-peers Search algorithm In the Fig-1, the flow chart illustration clearly explains about the demand can be raised by any of the peer in the network and that file demand will be transferred to the G-peer index. If file found in G-peer-1, then it takes action.i.e., it will send that file to the Queried peer. If the file is not found by G-peer(1), then it will communicate the message to every peer in the network. Hence, here the message is being transmitted to every peer. If that particular file has been found in any other peer, then in the peers DHT, the rank is being incremented by 1. Also, the G-peer-1 th rank is decremented by 1. Thus the queried file will be retrieved successfully using our G-peers search algorithm. 4.3 Design requirements The design requirements for my approach are discussed below Security In my work, security is important as each peer which enters the network should authenticate itself with the G-peer node. Start Demand for a file in G-peer(1) If File Found in G-peer(1) Communicate message to every peer If File Found in Any Other Peer Stop No 23
3 4.3.2 Efficiency The efficiency of the network is improved in this approach by using G-peers search algorithms. 6. RESULT 6.1 Test screens Fault tolerance Fault-tolerance or graceful degradation is the property that enables a system (often computer-based) to continue operating properly in the event of the failure of (or one or more faults within) some of its components. Usually Peer-to-peer networks is fully a fault tolerant networks i.e., even if a peer fails other peers in the network can able to share the files among them Scalability Peer-to-peer networks are scalable networks [9, 16] as n numbers of peers can be added to the network for file sharing utility. 5. IMPLEMENTATION I have implemented my approach in a closed environment using Java language. 5.1 Sample coding For authentication with G-peer: public void sendtgsinfo(string un,string servername,string ts) /* Function used to add authentication tags to the peer queries. Authentication serves as an extended feature for securing the network */ Fig 2: File Specified to the G-peer by querying Using Java language as the front end and Microsoft SQL server 2005 as the back end, it is possible to call up a value (file) in the peers connected through a LAN (Local Area Network). The basic mechanism is to trigger the peers with search query. Here, in the Fig-2, a text file named kau1.txt is being asked by one of the peer in the network. If the file is not found in the G-peer- 1, it shows the message File not found on server. The variation of a peer s query reply action is demonstrated in Fig-3. The query is transmitted to the succeeding G-peer(n), with the message Please communicate later... Server searching to locate the file on the other server Fig-4. This process helps us to find the file in any one of the G-peer with hit ratio of 90%. Finally the file can be retrieved from the G-peer (n-1). Fig-5. For Searching files in the G-peer: public void listtextfilesintree(file file) /* used to search for a file queried from the DHT of an G-peer. Also supports Query forwarding [12] incase of a G-peer File Miss.*/ public SendTgsInfo(String d,vector v1,vector v2) /* Function used to establish Communication between peers */ Fig 3: Query to the next G-peer(s) SendInfo(Client cl1,string data1) /* This Function is used to Send the file information to the respective peers*/ 24
4 Fig 4: File searching by the G-peer Fig 5: File queried is successfully retrieved 7. CONCLUSION On Summarizing the contributions and limitations of my work, I discuss the directions for the future investigation. In my approach, the G-peers search algorithm proposed is a fully discrete approach which helps to increase the speed of file transfer. Also, the security implementation part in my authentication module serves to avoid the DDoS (Distributed Denial of Service) attacks [21]. 8. ACKNOWLEDGEMENT I would like to thank our editor, Kamaljit Lakhtaria for their valuable reviews and comments. Also, I thank my wife Revathi Saravanan and my kid Hariharasudhan for their support. 9. REFERENCES [1] S. Saroiu, P. Gummadi, and S. Gribble, A Measurement Study of Peer-to-Peer File Sharing Systems, Proc. Multimedia Computing, [2] Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker, Making Gnutella-Like P2P Systems Scalable, Proc. SIGCOMM, [3] Q. Lv, S. Ratnasamy, and S. Shenker, Can Heterogeneity Make Gnutella Scalable? Proc. Int l Workshop Peer-to- Peer Systems (IPTPS), [4] E. Adar and B.A. Huberman, Free Riding on Gnutella, [5] B.Y. Zhao, L. Huang, J. Stribling, S.C. Rhea, A.D. Joseph, and J.Kubiatowicz, Tapestry: A Resilient Global-Scale Overlay for Service Deployment, J. Selected Areas in Comm., [6] R.M. Stoica, D. Karger, M.F. Kaashoek, and H. Balakrishnan, Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications, Proc. ACM SIGCOMM, [7] B.F. Cooper, An Optimal Overlay Topology for Routing Peer-to-Peer Searches, Proc. IFIP/ACM Middleware Conf., [8] B.F. Cooper, Quickly Routing Searches without Having to Move Content, Proc. Int l Workshop Peer-to-Peer Systems (IPTPS), [9] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A Scalable Content-Addressable Network, Proc. ACM SIGCOMM, [10] MAYMOUNKOV, P., AND MAZIERES, D. Kademlia: A Peer-to-peer Information System Based On the XOR Metric. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS 02) (Cambridge, MA, Mar. 2002) [11] K. Sripanidkulchai, B. Maggs, and H. Zhang, Efficient Content Location Using Interest-Based Locality in Peer-to- Peer Systems, Proc. INFOCOM, [12] S. Patro and Y.C. Hu, Transparent Query Caching in Peerto-Peer Overlay Networks, Proc. 17th Int l Parallel and Distributed Processing Symp. (IPDPS), [13] M. Roussopoulos and M. Baker, Controlled Update Propagation in Peer-to-Peer Networks, Proc. USENIX Ann. Technical Conf., [14] C. Gkantsidis, M. Mihail, and A. Saberi, Random Walks in Peer-to-Peer Networks, Proc. INFOCOM, [15] B. Yang and H. Garcia-Molina, Efficient Search in Peerto-Peer Networks, Proc. Int l Conf. Distributed Computing Systems (ICDCS), [16] B. Yang and H. Garcia-Molina, Designing a Super-Peer Network, Proc. Int l Conf. Data Eng. (ICDE), [17] C. Wang, L. Xiao, and P. Zheng, Differentiated Search in Hierarchical Peer to Peer Networks, Proc. Int l Conf. Parallel Processing (ICPP), [18] Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hon,"Freenet: A Distributed Anonymous Information Storage and Retrieval System", Marshall Aid Commemoration Commission and the National Science Foundation,2001. [19] Nazareno Andrade, Miranda Mowbray, Aliandro Lim, Gustavo Wagne, Matei Ripeanu, "Influences on 25
5 Cooperation in BitTorrent Communities",SIGCOMM 05 Workshops, August 22 26, 2005, Philadelphia, PA, USA. [20] Huu Tran,Michael Hitchens,Vijay Varadharajan,Paul Watters, "A Trust based Access Control Framework for P2P File-Sharing Systems",IEEE Proceedings of the 38th Hawaii International Conference on System Sciences [21] Felix Lau, Stuart H. Rubi, Michael H. Smith, Ljiljana Traj kovi, "Distributed Denial of Service Attacks", IEEE, AUTHORS PROFILE Kaushik Sekaran received his Bachelor of Technology in Computer Science and Engineering from SASTRA University, Thanjavur in the year He then pursued postgraduate studies and received his Master of Engineering degree (in Computer Science and Engineering) from Mepco Schlenk engineering college, Affiliated to Anna Univesity, Chennai in the year Since March 2009 he is an Assistant Professor in School of computing science and Engineering at VIT University, Vellore, India. He is pursuing his Ph.D studies in VIT University. His current research interests include in the areas of distributed and Internet systems, overlay systems and applications, and Security issues in Peer-to-peer Networks. He is a member of IEEE Computer Society. 26
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
New Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer
Distributed Hash Tables in P2P Systems - A literary survey
Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology [email protected] Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks
: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks Liangzhong Yin and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 16802
Clustering in Peer-to-Peer File Sharing Workloads
Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France Distributed Programming Laboratory, EPFL, Switzerland
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
Clustering in Peer-to-Peer File Sharing Workloads
Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France EPFL, Lausanne, Switzerland Microsoft Research,
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems (Scalable and Efficient Keyword Searching) Anh-Tuan Gai INRIA Rocquencourt [email protected] Laurent Viennot INRIA Rocquencourt
Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing
Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing (Research Proposal) Abhishek Agrawal ([email protected]) Abstract This proposal discusses details about Peer-VM which is a peer-to-peer
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems Dr.K.P.Kaliyamurthie 1, D.Parameswari 2 1.Professor and Head, Dept. of IT, Bharath University, Chennai-600 073. 2.Asst. Prof.(SG), Dept. of Computer Applications,
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
LOOKING UP DATA IN P2P SYSTEMS
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed
Join and Leave in Peer-to-Peer Systems: The DASIS Approach
Join and Leave in Peer-to-Peer Systems: The DASIS Approach Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer {kenoa@inf, rarnold@inf, mgaehwil@student, wattenhofer@inf}.ethz.ch Department
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network
1 Shuang Kai, 2 Qu Zheng *1, Shuang Kai Beijing University of Posts and Telecommunications, [email protected] 2, Qu Zheng Beijing University of Posts and Telecommunications, [email protected] Abstract
Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities
Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities Kavitha Ranganathan, Adriana Iamnitchi, Ian Foster Department of Computer Science, The University
Peer-to-Peer Replication
Peer-to-Peer Replication Matthieu Weber September 13, 2002 Contents 1 Introduction 1 2 Database Replication 2 2.1 Synchronous Replication..................... 2 2.2 Asynchronous Replication....................
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
Locality-Aware Randomized Load Balancing Algorithms for DHT Networks
Locality-Aware ized Load Balancing Algorithms for DHT Networks Haiying Shen and Cheng-Zhong Xu Department of Electrical & Computer Engineering Wayne State University, Detroit, MI 4822 {shy,czxu}@ece.eng.wayne.edu
Design and Implementation of Performance Guaranteed Symmetric Load Balancing Algorithm
Design and Implementation of Performance Guaranteed Symmetric Load Balancing Algorithm Shaik Nagoor Meeravali #1, R. Daniel *2, CH. Srinivasa Reddy #3 # M.Tech, Department of Information Technology, Vignan's
GRIDB: A SCALABLE DISTRIBUTED DATABASE SHARING SYSTEM FOR GRID ENVIRONMENTS *
GRIDB: A SCALABLE DISTRIBUTED DATABASE SHARING SYSTEM FOR GRID ENVIRONMENTS * Maha Abdallah Lynda Temal LIP6, Paris 6 University 8, rue du Capitaine Scott 75015 Paris, France [abdallah, temal]@poleia.lip6.fr
SUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER
SUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER R. Naga Priyadarsini, S. Suma and V. Dhanakoti Department of Computer Science Engineering, Valliammai Engineering College, Kanchipuram, India ABSTRACT
A NEW FULLY DECENTRALIZED SCALABLE PEER-TO-PEER GIS ARCHITECTURE
A NEW FULLY DECENTRALIZED SCALABLE PEER-TO-PEER GIS ARCHITECTURE S.H.L. Liang Department of Geomatics Engineering, University of Calgary, Calgary, Alberta, CANADA T2N 1N4 [email protected] Commission
Chord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS *
SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS * Maha Abdallah LIP6, Université Paris 6, rue du Capitaine Scott 75015 Paris, France [email protected] Hung Cuong Le
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks
1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many
LOAD BALANCING FOR OPTIMAL SHARING OF NETWORK BANDWIDTH
LOAD BALANCING FOR OPTIMAL SHARING OF NETWORK BANDWIDTH S.Hilda Thabitha 1, S.Pallavi 2, P.Jesu Jayarin 3 1 PG Scholar,,Dept of CSE,Jeppiaar Engineering College,Chennai, 2 Research Scholar,Sathyabama University,Chennai-119.
A Reputation Management System in Structured Peer-to-Peer Networks
A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology
The Case for a Hybrid P2P Search Infrastructure
The Case for a Hybrid P2P Search Infrastructure Boon Thau Loo Ryan Huebsch Ion Stoica Joseph M. Hellerstein University of California at Berkeley Intel Research Berkeley boonloo, huebsch, istoica, jmh @cs.berkeley.edu
Research Issues in Peer-to-Peer Data Management
Research Issues in Peer-to-Peer Data Management Özgür Ulusoy Department of Computer Engineering Bilkent University, Ankara, Turkey [email protected] Abstract-Data management in Peer-to-Peer (P2P)
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes
Peer to peer networks: sharing between peers. Trond Aspelund
Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server
IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
A Review on Efficient File Sharing in Clustered P2P System
A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY
[Kavita, 2(4): April, 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Histogram Based Live Streaming in Peer to Peer Dynamic Balancing & Clustering System
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany [email protected] Abstract. Network infrastructures are nowadays
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
Load Balancing in Structured P2P Systems
1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica ananthar, karthik, sonesh, karp, istoica @cs.berkeley.edu Abstract Most P2P systems
A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia
A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia Felipe de Castro Louback Rocha 1, Linnyer Beatriz 1 Programa de Pós Graduação em Engenharia Elétrica, Universidade Federal
Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
Research on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network
Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Jian Ni, Danny H. K. Tsang, Ivan S. H. Yeung, Xiaojun Hei Department of Electrical & Electronic Engineering Hong Kong University
New Algorithms for Load Balancing in Peer-to-Peer Systems
New Algorithms for Load Balancing in Peer-to-Peer Systems David R. Karger Matthias Ruhl MIT Laboratory for Computer Science Cambridge, MA 02139, USA {karger, ruhl}@theory.lcs.mit.edu Abstract Load balancing
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
Peer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology [email protected] Abstract In the last few years, the success of the Napster online music sharing program
Denial of Service Resilience in Peer to Peer. D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik
Denial of Service Resilience in Peer to Peer File Sharing Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik Outline 1. Background on P2P systems 2. File
AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 63-68 Impact Journals AUTOMATED AND ADAPTIVE DOWNLOAD
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
R-Chain: A Self-Maintained Reputation Management System in P2P Networks Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasgupta Dept. of Computer Science & Engineering Arizona State University Tempe, AZ
File sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: [email protected] Abstract: File sharing systems cause a huge portion
Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD
International Journal of Advances in Applied Science and Engineering (IJAEAS) ISSN (P): 2348-1811; ISSN (E): 2348-182X Vol-1, Iss.-3, JUNE 2014, 54-58 IIST SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Secure Communication in a Distributed System Using Identity Based Encryption
Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA [email protected] Abstract Distributed systems require the ability to communicate
Enhance UDDI and Design Peer-to-Peer Network for UDDI to Realize Decentralized Web Service Discovery
Enhance UDDI and Design Peer-to-Peer Network for UDDI to Realize Decentralized Web Service Discovery De-Ke Guo 1, Hong-Hui Chen 1, Xian-Gang Luo 2,Xue-Shan Luo 1, Wei-Ming Zhang 1 1 School of Information
P2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross [email protected], {YongLiu, Panwar, Ross}@poly.edu, [email protected]
P2P Networking - Advantages and Disadvantages of Virtualization
Are Virtualized Overlay Networks Too Much of a Good Thing? Pete Keleher, Bobby Bhattacharjee, Bujor Silaghi Department of Computer Science University of Maryland, College Park [email protected] 1 Introduction
Information Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Arpeggio: Metadata Searching and Content Sharing with Chord
Arpeggio: Metadata Searching and Content Sharing with Chord Austin T. Clements, Dan R. K. Ports, and David R. Karger MIT Computer Science and Artificial Intelligence Laboratory 32 Vassar St., Cambridge
A Comparison of Mobile Peer-to-peer File-sharing Clients
1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics
A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS
A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering [email protected] [email protected]
MANAGEMENT AND ANALYTIC OF SOCIAL NETWORK APPLICATION WITH MOBILE BASED MEMORY DATABASE AND DYNAMIC QUERYING
MANAGEMENT AND ANALYTIC OF SOCIAL NETWORK APPLICATION WITH MOBILE BASED MEMORY DATABASE AND DYNAMIC QUERYING G. Dheepa and V. Vijayakaveri Department of Information Technology, Sathyabama University, Sholinganallur,
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea [email protected], [email protected],
Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland [email protected], [email protected] Abstract This
A Survey of Peer-to-Peer Content Distribution Technologies
A Survey of Peer-to-Peer Content Distribution Technologies STEPHANOS ANDROUTSELLIS-THEOTOKIS AND DIOMIDIS SPINELLIS Athens University of Economics and Business Distributed computer architectures labeled
A Parameter-Free Load Balancing Mechanism For P2P Networks
A Parameter-Free Load Balancing Mechanism For P2P Networks Tyler Steele, Vivek Vishnumurthy and Paul Francis Department of Computer Science, Cornell University, Ithaca, NY 14853 {ths22,francis,vivi}@cs.cornell.edu
Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS
Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble University of Washington Abstract: Despite
How To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
