ABSTRACT I. INTRODUCTION

Size: px
Start display at page:

Download "ABSTRACT I. INTRODUCTION"

Transcription

1 International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 1 ISSN : A Proximity-Aware Interest-Clustered P2P File Sharing System D. Mounika 1, V. Sridhar Reddy 2 1 M.Tech Scholar, Department of CSE, Vignana Bharathi Institute of Technology Aushapur (V), Ghatkesar (M), R.R., Telangana, India 2 Assistant Professor, Department of CSE, Vignana Bharathi Institute of Technology Aushapur (V), Ghatkesar (M), R.R.Dist, ABSTRACT Telangana, India Powerful archive question is basic to the general execution of distributed (P2P) record sharing systems. Gathering peers by their consistent favorable circumstances can basically enhance the capability of record request. Packing peers by their physical closeness can in like manner upgrade record question execution. Nevertheless, couple of current works can bunch peers in perspective of both friend interest and physical closeness. Yet sorted out P2Ps give higher archive request capability than unstructured P2Ps, it is difficult to recognize it in light of their totally portrayed topologies. In this work, we show a Proximity-Aware and Interest-clustered P2P record sharing System (PAIS) in perspective of a sorted out P2P, which shapes physically-close center points into a gathering and further social affairs physically-close and ordinary interest centers into a sub-assemble in light of a different leveled topology. PAIS uses a sharp archive replication figuring to moreover enhance record question viability. It makes duplicates of reports that are a great part of the time requested by a social occasion of physically close center points in their general vicinity. Furthermore, PAIS updates the intra-sub-bundle archive looking for through a couple of systems. To begin with, it moreover arranges the energy of a sub-pack to different sub-interests, and gatherings standard sub-interest center points into a social occasion for archive sharing. Second, PAIS develops an overlay for each get-together that interfaces cut down restrain centers as far as possible center points for flowed report addressing while in the meantime keeping up a key separation from center point over-load. Third, to reduce archive looking for delay, PAIS uses proactive record information amassing so a report requester can know whether its requested archive is in its near to center points. Fourth, to reduce the overhead of the record information collection, PAIS uses grow channel based report information assembling and looking at appropriated archive chasing. Fifth, to upgrade the record sharing viability, PAIS positions the grow channel achieves ask. sixth, taking a gander at that as a starting late passed by record tends to be gone to again, the bloom channel based approach is enhanced by simply checking the as of late added grow channel information to reduce archive looking for delay. Take after driven trial comes to fruition due to this present reality Planet Lab test bed display that PAIS definitely decreases overhead and updates the viability of record offering to and without mix. Further, the exploratory results show the high feasibility of the intra-sub-bundle report looking strategies in improving record looking for viability. Keywords : P2P, File Sharing System, PAIS, DHT, Node Vicinity Portrayal I. INTRODUCTION Appropriated preparing is a field of programming building that audits spread structures. An appropriated structure is an item system in which fragments arranged on sorted out PCs grant and organize their exercises by passing messages. The parts interface with each other to achieve a mutual CSEIT Received : 05 Jan 2018 Accepted : 19 Jan 2018 January-February-2018 [(3) 1 : ] 254

2 goal. There are various alternatives for the message passing part, including RPC-like connectors and message lines. Three basic characteristics of passed on structures are: synchronization of fragments, nonappearance of an overall clock, and free frustration of sections. A basic goal and trial of appropriated systems is zone straightforwardness. Instances of scattered structures vary from SOAbased systems to enormously multiplayer electronic diversions to circulated applications. The condition is also snared by the traditional occupations of the terms parallel and scattered count that don't precisely facilitate the above implications of parallel and circled systems; see the region Theoretical foundations underneath for more clear exchange. Regardless, as a tried and true rule, predominant parallel estimation in a shared memory multiprocessor uses parallel computations while the coordination of a significant scale circled system uses passed on counts. II. LITERATURE SURVEY Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Authors: A. Rowstron and P. Druschel This paper demonstrates the blueprint and evaluation of Pastry, an adaptable, appropriated question zone and coordinating substrate for wide-domain conveyed applications. Prepared great performs application-level directing and question range in a conceivably tremendous overlay arrangement of centers related through the Internet. It can be used to help an arrangement of disseminated applications, including overall data storing, data sharing, accumulate correspondence and naming. Each center point in the Pastry orchestrate has a unique identifier (nodeid). Exactly when given a message and a key, a Pastry center point beneficially courses the message to the center point with a nodeid that is numerically closest to the key, among all at display live Pastry center points. Each Pastry center point screens its speedy neighbors in the nodeid space, and tells usages of new center arrivals, center frustrations and recoveries. Prepared great considers orchestrate area; it tries to constrain the detachment messages go, as showed by a to scalar closeness metric like the amount of IP coordinating skips Pastry is completely decentralized, adaptable, and self-dealing with; it normally changes with the passage, departure and disillusionment of centers. Exploratory results got with a model execution on a duplicated arrangement of up to 100,000 center points certify Pastry's flexibility and adequacy, its ability to self-organize and change in accordance with center frustrations, and its incredible framework territory properties. Semantic-mindful metadata association worldview in cutting edge record frameworks Creators: Y. Hua, H. Jiang, Y. Zhu, D. Feng, and L. Tian Existing information collecting frameworks in context of the diverse leveled list tree association don't meet the flexibility and esteem necessities for exponentially making edifying records and ceaselessly complex metadata ask for in colossal scale, Exabyte-level record structures with billions of documents. This paper proposes a novel decentralized semantic-watchful metadata alliance, called SmartStore, which mishandle semantics of records' metadata to shrewdly mean related reports into semantic-cautious get-togethers by utilizing data recovery contraptions. The key idea of SmartStore is to limit the request degree of a brain boggling metadata question to a single or a unimportant number of semantically related get-togethers and avoid or help savage power look in the entire structure. The decentralized arrangement of SmartStore can upgrade system versatility and lessen request latency for complex inquiries (tallying range and best k request). Moreover, it is furthermore useful for creating semantic-careful holding, and standard filename-based point question. We have executed a model of SmartStore and expansive trials in perspective of certifiable takes after exhibit that SmartStore on a very basic level upgrades structure 255

3 flexibility and reduces request inaction over database approaches. To the best of our knowledge, this is the essential examination on the execution of complex inquiries in tremendous scale record systems. Existing System 1. A key standard to judge a P2P record sharing system is its archive zone capability. To improve this viability, different systems have been proposed. One strategy uses a super partner topology which contains super hubs with speedy affiliations and standard center points with slower affiliations. A super hub interfaces with various super hubs and some predictable centers, and a standard center partners with a super hub. In this super-peer topology, the centers at the point of convergence of the framework are speedier and therefore make a more strong and stable spine. This empowers a bigger number of messages to be coordinated than a slower spine and, along these lines, allows more critical flexibility. Super-peer frameworks include the inside ground amongst 2. concentrated and absolutely symmetric P2P organizes, and can join the upsides of both consolidated and flowed looks. 3. Another class of systems to upgrade report range capability is through a closeness careful structure. 4. The inferior class of systems to upgrade report zone capability is to bundle centers with practically identical interests which decrease the record territory inaction. Proposed System 1. This paper demonstrates a region careful and interest packed P2P record sharing System (PAIS) on a sorted out P2P structure. It outlines physically-close center points into a cluster and further social events physicallyclose and ordinary interest center points into a sub-gathering. It in like manner puts reports with comparative interests together and make them accessible through the DHT Lookup() directing limit. More indispensably, it keeps every single point of convergence of DHTs over unstructured P2Ps. Contingent upon DHT question course of action as opposed to broadcasting, the PAIS improvement consumes impressively less cost in mapping centers to gatherings and mapping bundles to interest sub-gatherings. PAIS uses a clever archive replication count to also overhaul record inquiry efficiency. 2. It makes impersonations of reports that are a significant part of the time requested by a social affair of physically close center points in their general vicinity. Likewise, PAIS enhances the intra sub-bunch record looking for through a couple of strategies 3. To start with, it also portrays the eagerness of a sub-group to different sub-interests, and clusters fundamental sub-interest centers into a social occasion for archive sharing. 4. Second, PAIS creates an overlay for each gettogether that interfaces cut down restrain center points as far as possible centers for coursed record addressing while in the meantime evading center over-trouble. 5. Third, to diminish archive looking deferment, PAIS uses proactive record information gathering with the objective that a report requester can know whether its requested archive is in its adjoining center points. 6. Fourth, to diminish the overhead of the record information gathering, PAIS uses grow channel based archive information amassing and relating spread record chasing. 7. Fifth, to upgrade the archive sharing capability, PAIS positions the bloom channel achieves ask. sixth, taking a gander at that as a starting late passed by record tends to be passed by afresh, the bloom channel based approach is overhauled by simply checking the as of late added grow channel 256

4 information to diminish archive looking for delay. System Design Figure 1. System Architecture 1. The DFD is also called as bubble chart. It is a simple graphical formalism that can be used to represent a system in terms of input data to the system, various processing carried out on this data, and the output data is generated by this system. 2. The data flow diagram (DFD) is one of the most important modeling tools. It is used to model the system components. These components are the system process, the data used by the process, an external entity that interacts with the system and the information flows in the system. 3. DFD shows how the information moves through the system and how it is modified by a series of transformations. It is a graphical technique that depicts information flow and the transformations that are applied as data moves from input to output. 4. DFD is also known as bubble chart. A DFD may be used to represent a system at any level of abstraction. DFD may be partitioned into levels that represent increasing information flow and functional detail. Figure 2. Data Flow Diagram 257

5 Modules: 1. PAIS Structure III. IMPLEMENTATION 2. Node vicinity portrayal 3. Node intrigue portrayal 4. Clustering physically close and normal intrigue hubs 5. File Distribution The purpose behind testing is to discover bumbles. Testing is the path toward endeavoring to locate every conceivable fault or inadequacy in a work thing. It gives a way to deal with check the convenience of parts, sub social events, assemblages and also a finished thing It is the route toward working on programming with the arrangement of ensuring that the Software system satisfies its essentials and customer wants and does not bomb in an unsuitable way. There are diverse sorts of test. Each test sort watches out for a specific testing need. Input design The data setup is the association between the information structure and the customer. It contains the making subtle element and methodologies for data course of action and those methods are vital to put trade data in to a usable shape for planning can be expert by surveying the PC to examine data from a made or printed report or it can occur by having people entering the data clearly into the structure. The arrangement of data focuses on controlling the measure of data required, controlling the goofs, keeping up a vital separation from delay, sidestepping extra means and keeping the technique direct. The data is laid out in such a course thusly, to the point that it gives security and ease of use with holding the assurance. Data Design considered the going with things: 1. What information ought to be given as info? 2. How the information ought to be orchestrated or coded? 3. The exchange to control the working staff in giving information. 4. Methods for getting ready information approvals and ventures to take after when mistake happen. Output Design A quality yield is one, which meets the essentials of the end customer and presents the information clearly. In any system results of taking care of are bestowed to the customers and to other structure through yields. In yield design it is settled how the information is to be removed for speedy need and moreover the printed duplicate yield. It is the most fundamental and direct source information to the customer. Capable and astute yield arrangement upgrades the structure's relationship to help customer essential initiative. 1. Planning PC yield ought to continue in a sorted out, well thoroughly considered way; the correct yield must be produced while guaranteeing that each yield component is composed with the goal that individuals will discover the framework can utilize effortlessly and adequately. At the point when investigation outline PC yield, they should identify the particular yield that is expected to meet the prerequisites. 2. Select strategies for introducing data. 3. Make record, report, or different arrangements that contain data created by the framework. The yield type of a data framework ought to finish at least one of the accompanying goals. 1. Convey data about past exercises, current status or projections of the Future. 2. Signal critical occasions, openings, issues, or notices. 3. Trigger an activity. 4. Confirm an activity. 258

6 IV. RESULTS 259

7 V. CONCLUSION Starting late, to overhaul record zone efficiency in P2P structures, interest assembled super-peer frameworks and region grouped super-peer frameworks have been proposed. But the two procedures improve the execution of P2P structures; few works amass peers in perspective of both partner interest and physical proximity in the meantime. In addition, it is harder to recognize it in sorted out P2P systems as a result of their totally described topologies, regardless of the way that they have high viability of report region than unstructured P2Ps. In this paper, we show proximity careful and premium assembled P2P archive sharing system in light of a composed P2P. It groups peers in light of both interest and closeness by abusing a dynamic structure of a composed P2P. PAIS uses a sharp report replication estimation that emulates a record as frequently as conceivable requested by physically close center points near their physical region to overhaul the archive inquiry efficiency. Finally, PAIS enhances the archive looking viability among the region close and normal intrigue center points through different techniques. The take after driven trial comes to fruition on Planet Lab display the adequacy of PAIS in examination with other P2P archive sharing systems. It definitely diminishes the overhead and yields vital upgrades in record range. Balakrishnan, "Chord: A scalable peer-topeer lookup protocol for internet applications," IEEE/ACM Trans. Netw., vol. 11, no. 1, pp , Feb [5]. A. Rowstron and P. Druschel, "Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems," in Proc. IFIP/ACM Int. Conf. Distrib. Syst. Platforms Heidelberg, 2001, pp VI. REFERENCES [1]. BitTorrent. (2013) [Online]. Available: com/ [2]. Gnutella home page. (2003) [Online]. Available: [3]. I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, "Freenet: A distributed anonymous information storage and retrieval system," in Proc. Int. Workshop Des. Issues Anonymity Unobservability, 2001, pp [4]. I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. 260

A Proximity Knowledge on Passion Clustered P2p Distributed File System

A Proximity Knowledge on Passion Clustered P2p Distributed File System A Proximity Knowledge on Passion Clustered P2p Distributed File System R.Lakshmana Rao PG Scholar, Dept of CSE, Pydah College of Engineering and Technology, Visakhapatnam, AP, India. K.Saran Kumar Assistant

More information

Location Efficient Proximity and Interest Clustered P2p File Sharing System

Location Efficient Proximity and Interest Clustered P2p File Sharing System Location Efficient Proximity and Interest Clustered P2p File Sharing System B.Ajay Kumar M.Tech, Dept of Computer Science & Engineering, Usharama College of Engineering & Technology, A.P, India. Abstract:

More information

An Efficient Clustered Based P2P File Sharing System Using Bloom Filters

An Efficient Clustered Based P2P File Sharing System Using Bloom Filters An Efficient Clustered Based P2P File Sharing System Using Bloom Filters B. Bhavya M.Tech Student, Department of IT, SNIST, Telangana, India. ABSTRACT: Effective file query is imperative to the general

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD

SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD 1 SHAIK SHAHEENA, 2 SD. AFZAL AHMAD, 3 DR.PRAVEEN SHAM 1 PG SCHOLAR,CSE(CN), QUBA ENGINEERING COLLEGE & TECHNOLOGY, NELLORE 2 ASSOCIATE PROFESSOR, CSE, QUBA ENGINEERING COLLEGE & TECHNOLOGY, NELLORE 3

More information

Query Result Extraction Using Dynamic Query Forms

Query Result Extraction Using Dynamic Query Forms Query Result Extraction Using Dynamic Query Forms #1 Mrs. I. Anitha Rani, #2 Y.Vijay, #3 Abdul Moseen #1 Assistant Professor, Department of Computer Science Engineering,Andhra Loyola Institute Of Engineering

More information

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

Athens University of Economics and Business. Dept. of Informatics

Athens University of Economics and Business. Dept. of Informatics Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems Global Journal of Computer Science and Technology Volume 11 Issue 16 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS

DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS Harshit Yadav Student, Bal Bharati Public School, Dwarka, New Delhi

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

Chunk Scheduling Strategies In Peer to Peer System-A Review

Chunk Scheduling Strategies In Peer to Peer System-A Review Chunk Scheduling Strategies In Peer to Peer System-A Review Sanu C, Deepa S S Abstract Peer-to-peer ( P2P) s t r e a m i n g systems have become popular in recent years. Several peer- to-peer systems for

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

Decentralized Approach for Balancing Load in Dynamic Cloud Environment

Decentralized Approach for Balancing Load in Dynamic Cloud Environment Decentralized Approach for Balancing Load in Dynamic Cloud Environment Karthick Smiline Britto.J 1, PrittoPaul.P 2 ME, Department of CSE, Velammal Engineering College, Anna University, Chennai, India 1

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable

More information

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity 546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and

More information

Locating Equivalent Servants over P2P Networks

Locating Equivalent Servants over P2P Networks Locating Equivalent Servants over P2P Networks KUSUMA. APARNA LAKSHMI 1 Dr.K.V.V.S.NARAYANA MURTHY 2 Prof.M.VAMSI KRISHNA 3 1. MTECH(CSE), Chaitanya Institute of Science & Technology 2. Prof & Head, Department

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 8, August 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Structured Peer-to-Peer

More information

Excogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks

Excogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks Excogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks Bollimuntha Kishore Babu #1, Divya Vadlamudi #2, Movva

More information

Peer Clustering and Firework Query Model

Peer Clustering and Firework Query Model Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk

More information

APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing

APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing ABSTRACT Warren Kenny Distributed Systems Group Department of Computer Science Trinity College, Dublin, Ireland kennyw@cs.tcd.ie Current

More information

A P2P File Sharing Technique by Indexed-Priority Metric

A P2P File Sharing Technique by Indexed-Priority Metric A P2P File Sharing Technique by Indexed-Priority Metric Toshinori Takabatake and Yoshikazu Komano Abstract Recently, the improvements in processing performance of a computer and in high speed communication

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

Malugo: A peer-to-peer storage system

Malugo: A peer-to-peer storage system Int. J. Ad Hoc and Ubiquitous Computing, Vol. 5, No. 4, 2010 209 Malugo: A peer-to-peer storage system Yu-Wei Chan, Tsung-Hsuan Ho, Po-Chi Shih and Yeh-Ching Chung* Department of Computer Science, National

More information

: Scalable Lookup

: Scalable Lookup 6.824 2006: Scalable Lookup Prior focus has been on traditional distributed systems e.g. NFS, DSM/Hypervisor, Harp Machine room: well maintained, centrally located. Relatively stable population: can be

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

A Square Root Topologys to Find Unstructured Peer-To-Peer Networks

A Square Root Topologys to Find Unstructured Peer-To-Peer Networks Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 2 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Computer Communications and Networking (SC 546) Professor D. Starobinksi Brian Mitchell U09-62-9095 James Nunan U38-03-0277

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture 1 S. Das 2 A. Thakur 3 T. Bose and 4 N.Chaki 1 Department of Computer Sc. & Engg, University of Calcutta, India, soumava@acm.org

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS Neha Jain 1, Manasvi Mannan 2 1 Research Scholar, Electronics and Communication Engineering, Punjab College Of

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 12.1.2015 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

Degree Optimal Deterministic Routing for P2P Systems

Degree Optimal Deterministic Routing for P2P Systems Degree Optimal Deterministic Routing for P2P Systems Gennaro Cordasco Luisa Gargano Mikael Hammar Vittorio Scarano Abstract We propose routing schemes that optimize the average number of hops for lookup

More information

Providing File Services using a Distributed Hash Table

Providing File Services using a Distributed Hash Table Providing File Services using a Distributed Hash Table Lars Seipel, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany lars.seipel@stud.h-da.de

More information

Hybrid Overlay Structure Based on Random Walks

Hybrid Overlay Structure Based on Random Walks Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft

More information

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Relaxing Routing Table to Alleviate Dynamism in P2P Systems Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,

More information

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,

More information

Distributed Cycle Minimization Protocol (DCPM) for Peer-to-Peer Networks

Distributed Cycle Minimization Protocol (DCPM) for Peer-to-Peer Networks 470 Distributed Cycle Minimization Protocol (DCPM) for Peer-to-Peer Networks K Srinivas 1, Dr. Gunamani Jena 2, A Satyamallesh 3 1 Department of Computer science and Engineering, B.V.C.Enggineering College,

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

On Veracious Search In Unsystematic Networks

On Veracious Search In Unsystematic Networks On Veracious Search In Unsystematic Networks K.Thushara #1, P.Venkata Narayana#2 #1 Student Of M.Tech(S.E) And Department Of Computer Science And Engineering, # 2 Department Of Computer Science And Engineering,

More information

Location Based Optimization of Interset Clustered P2p File Sharing System (LBOIS)

Location Based Optimization of Interset Clustered P2p File Sharing System (LBOIS) Location Based Optimization of Interset Clustered P2p File Sharing System (LBOIS) Govardhana Rao Inampudi Research Scholar, Department of Computer Science & engineering University College of engineering,

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Hong-Jong Jeong, Dongkyun Kim, Jeomki Song, Byung-yeub Kim, and Jeong-Su Park Department of Computer Engineering, Kyungpook

More information

OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM Chauhan Ajitkumar 1, Asst. Prof. Jignesh V. Patel 2 1PG Scholar, EC Dept., SPCE, Visnagar, Gujarat, India. 2Assistant

More information

Improving the Efficiency of Fast Using Semantic Similarity Algorithm

Improving the Efficiency of Fast Using Semantic Similarity Algorithm International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 1 Improving the Efficiency of Fast Using Semantic Similarity Algorithm D.KARTHIKA 1, S. DIVAKAR 2 Final year

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 13.1.2014 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

Securing Chord for ShadowWalker. Nandit Tiku Department of Computer Science University of Illinois at Urbana-Champaign

Securing Chord for ShadowWalker. Nandit Tiku Department of Computer Science University of Illinois at Urbana-Champaign Securing Chord for ShadowWalker Nandit Tiku Department of Computer Science University of Illinois at Urbana-Champaign tiku1@illinois.edu ABSTRACT Peer to Peer anonymous communication promises to eliminate

More information

Structured Peer-to-Peer Networks

Structured Peer-to-Peer Networks Structured Peer-to-Peer Networks The P2P Scaling Problem Unstructured P2P Revisited Distributed Indexing Fundamentals of Distributed Hash Tables DHT Algorithms Chord Pastry Can Programming a DHT Graphics

More information

A Search Theoretical Approach to P2P Networks: Analysis of Learning

A Search Theoretical Approach to P2P Networks: Analysis of Learning A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.

More information

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks

Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks Guanyu Tian Fontbonne University gtian@fontbonne.edu Zhenhai Duan Florida State University duan@cs.fsu.edu Todd Baumeister, Yingfei Dong

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

Peer to Peer Networks

Peer to Peer Networks Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer

More information

Slides for Chapter 10: Peer-to-Peer Systems

Slides for Chapter 10: Peer-to-Peer Systems Slides for Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, Addison-Wesley 2012 Overview of Chapter Introduction Napster

More information

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,

More information

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Load Sharing in Peer-to-Peer Networks using Dynamic Replication Load Sharing in Peer-to-Peer Networks using Dynamic Replication S Rajasekhar, B Rong, K Y Lai, I Khalil and Z Tari School of Computer Science and Information Technology RMIT University, Melbourne 3, Australia

More information

Chapter 10: Peer-to-Peer Systems

Chapter 10: Peer-to-Peer Systems Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Introduction To enable the sharing of data and resources

More information

Push-Pull Gossiping for Information Sharing in Peer-to-Peer Communities

Push-Pull Gossiping for Information Sharing in Peer-to-Peer Communities Push-Pull Gossiping for Information Sharing in Peer-to-Peer Communities Mujtaba Khambatti Arizona State University Tempe, AZ 85287-5406 mujtaba@asu.edu Kyung Ryu Arizona State University Tempe, AZ 85287-5406

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large

More information

Implementation of Data Clustering With Meta Information Using Improved K-Means Algorithm Based On COATES Approach

Implementation of Data Clustering With Meta Information Using Improved K-Means Algorithm Based On COATES Approach www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10647-10651 Implementation of Clustering With Meta Information Using Improved

More information

Survey of DHT Evaluation Methods

Survey of DHT Evaluation Methods Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the

More information

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashock, Frank Dabek, Hari Balakrishnan March 4, 2013 One slide

More information

Simple Determination of Stabilization Bounds for Overlay Networks. are now smaller, faster, and near-omnipresent. Computer ownership has gone from one

Simple Determination of Stabilization Bounds for Overlay Networks. are now smaller, faster, and near-omnipresent. Computer ownership has gone from one Simple Determination of Stabilization Bounds for Overlay Networks A. Introduction The landscape of computing has changed dramatically in the past half-century. Computers are now smaller, faster, and near-omnipresent.

More information

08 Distributed Hash Tables

08 Distributed Hash Tables 08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

of viruses, spywares, ad ware, malware through file sharing applications.

of viruses, spywares, ad ware, malware through file sharing applications. An Efficient Architecture for Consistency Maintenance and Peer Synchronization in Distributed Systems Bollimuntha Kishore Babu 1 and Attaluri Rajesh 2 M.Tech (CNS), Green Fields, K.L.Univerisity, Vijayawada,

More information

Building Dependable Peer-to-Peer systems

Building Dependable Peer-to-Peer systems Building Dependable Peer-to-Peer systems Koen Vanthournout Geert Deconinck Ronnie Belmans K.U.Leuven, Dept. Elektrotechniek, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium Tel: +32/16/32.18.12

More information

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.5, September 27 PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS Farida Chowdhury

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

Understanding Chord Performance

Understanding Chord Performance CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

Distributed hash table - Wikipedia, the free encyclopedia

Distributed hash table - Wikipedia, the free encyclopedia Page 1 sur 6 Distributed hash table From Wikipedia, the free encyclopedia Distributed hash tables (DHTs) are a class of decentralized distributed systems that provide a lookup service similar to a hash

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems Distributed Hash Tables (DHT) Overview and Issues Paul Francis CS514: Intermediate Course in Computer Systems Lecture 26: Nov 19, 2003 Distributed Hash Tables (DHT): Overview and Issues What is a Distributed

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

Introduction to P2P Computing

Introduction to P2P Computing Introduction to P2P Computing Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Introduction A. Peer-to-Peer vs. Client/Server B. Overlay Networks 2. Common Topologies 3. Data Location 4. Gnutella

More information

Super-Peer Architectures for Distributed Computing

Super-Peer Architectures for Distributed Computing Whitepaper Super-Peer Architectures for Distributed Computing Fiorano Software, Inc. 718 University Avenue, Suite 212 Los Gatos, CA 95032 U.S.A. +1.408.354.3210 email info@fiorano.com www.fiorano.com Entire

More information

Small World Overlay P2P Networks

Small World Overlay P2P Networks Small World Overlay P2P Networks Ken Y. K. Hui and John C. S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, Hong Kong ykhui,cslui @cse.cuhk.edu.hk David K.

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems

EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville,

More information

DRing: A Layered Scheme for Range Queries over DHTs

DRing: A Layered Scheme for Range Queries over DHTs DRing: A Layered Scheme for Range Queries over DHTs Nicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens and Xavier Bonnaire Université Pierre et Marie Curie, CNRS INRIA - REGAL, Paris,

More information

Code Based Compression Techniques in Digital VLSI

Code Based Compression Techniques in Digital VLSI Code Based Compression Techniques in Digital VLSI Mr.Mohammad Iliyas Assistant Professor, Dept of ECE and Research Scholar, Nawab Shah Alam Khan College of Engineering and Technology, Hyderabad, India.

More information

Peer-to-Peer Semantic Search Engine

Peer-to-Peer Semantic Search Engine Peer-to-Peer Semantic Search Engine Tomáš Havryluk, Ivan Jelínek Abstract: Peer-to-Peer is a relatively old but still an evolving branch of web technologies. This article gives a survey of Peer-to-Peer

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Scalable and Self-configurable Eduroam by using Distributed Hash Table

Scalable and Self-configurable Eduroam by using Distributed Hash Table Scalable and Self-configurable Eduroam by using Distributed Hash Table Hiep T. Nguyen Tri, Rajashree S. Sokasane, Kyungbaek Kim Dept. Electronics and Computer Engineering Chonnam National University Gwangju,

More information

A Robust and Scalable Peer-to-Peer Gossiping Protocol

A Robust and Scalable Peer-to-Peer Gossiping Protocol A Robust and Scalable Peer-to-Peer Gossiping Protocol Spyros Voulgaris 1, Márk Jelasity 2, and Maarten van Steen 1 1 Department Computer Science, Faculty of Sciences, Vrije Universiteit Amsterdam, The

More information