SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
International Journal of Computational Engineering Research||Vol, 03||Issue, 9||
||Issn 2250-3005 || ||September||2013|| Page 63
Cominga Well-Organized Hiding System And Constancy
Conservation In Mixture P2P System
N. Manjula1
, R.V. SubbaRayudu2
, K. Niharika3,
G.Prathap4
1, 3, 4
M.Tech students, 2.Assistant Professor Global College of Engineering & Technology, Kadapa.
I. INTRODUCTION:
Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular
topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-
to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in
which the topology is arbitrary. Structured peer-to-peer networks usually can provide efficient and accurate
services but need to spend a lot of effort in maintaining the regular topology. On the other hand, unstructured
peer-to-peer networks are extremely resilient to the frequent peer joining and leaving but this is usually achieved
at the expense of efficiency.Our simulation results demonstrate that the hybrid peer-to-peer system can utilize
both the efficiency of structured peer-to-peer network and the flexibility of the unstructured peer-to-peer
network and achieve a good balance between the two types of networks.In peer-to-peer file sharing systems, file
replication and consistency maintenance are widely used techniques for high system performance.
Hybrid peer-to-peer architectures use special nodes to provide directory services for regions of the
network ("regional directory services"). Hybrid peer-to-peer architectures are a potentially powerful model for
developing large-scale networks of complex digital libraries, but peer-to-peer networks have so far tended to use
very simple methods of resource selection and document retrieval. In this paper, we study the application of
content-based resource selection and document retrieval to hybrid peer-to-peer networks.
ABSTRACT
Peer-to-peer overlay networks are widely used in distributed systems. P2P is a popular
technology used for file sharing. File replication and Consistency maintenance are the techniques used
in P2P for high system performance. The objective of this work is to design a hybrid peer-to-peer
system for distributed data sharing which combines the advantages of both types of peer-to-peer
networks and minimizes their disadvantages. However, in peer-to-peer networks, Information Retrieval
(IR) performance is determined by both technology and user behavior, and little attention has been
paid in the literature to improving IR performance through incentives to change user behavior.The
proposed hybrid peer-to-peer system is composed oftwo parts: the first part is a structured core
network the second part is multiple unstructured peer-to-peer networks each of which is attached to a
node in the core network.Our cachingscheme can deliver lower query delay, better load balance and
higher cache hit ratios.
KEY WORDS: hybrid, peer-to-peer systems,consistency maintenance.
Cominga Well-Organized Hiding System…
||Issn 2250-3005 || ||September||2013|| Page 64
Recently, a number of technologies in peer-to-peer (P2P) networking have been developed. This pure
P2P personal and social networking paradigm, however, has its own limitations. For example, P2P networks
without any infrastructure support offer no connectivity guaranties. In this paper, we propose a hybrid peer-to-
peer system for distributed data sharing which combines the structured and unstructured peer-to-peer networks.
RELATED WORK:Peer-to-peer networking is the utilization of the relatively powerful computers (personal
computers) that exist at the edge of the Internet for more than just client-based computing tasks. They do not
aim to integrate P2P systems with general Internet services. Furthermore, infrastructure-nodes are not perceived
and used by the users as personal devices. Some existing file-sharing P2P systems assume that the shared data
are static or read-only, so that no update mechanism is needed. Peer-to-peer networking has the following
advantages over client/server networking:
 Content and resources can be shared from both the center and the edge of the network. In client/server
networking, content and resources are typically shared from only the center of the network.
 A network of peers is easily scaled and more reliable than a single server. A single server is subject to a
single point of failure or can be a bottleneck in times of high network utilization.
 A network of peers can share its processor, consolidating computing resources for distributed computing
tasks, rather than relying on a single computer, such as a supercomputer.
 Shared resources of peer computers can be directly accessed. Rather than sharing a file stored on a central
server, a peer can share the file directly from its local storage.
 Peer-to-peer networking solves the following problems:
 Allows the processing resources of edge computers to be utilized for distributed computing tasks.
 Allows local resources to be shared directly, without the need for intermediate servers.
 Allows efficient multipoint communication without having to rely on IP multicast infrastructure.
Peer-to-Peer Networking Scenarios
Peer-to-peer networking enables or enhances the following scenarios:
 Real-time communications (RTC)
 Collaboration
 Content distribution
 Distributed processing
 Improved Internet technologies
GNUTELLA: This is a large peer-to-peer network. It was the first decentralized peer-to-peer network of its
kind, leading to other, later networks adopting the model. It celebrated a decade of existence on March 14, 2010
and has a user base in the millions for peer-to-peer file sharing. The gnutella network is a fully distributed
alternative to such semi-centralized systems as FastTrack and the original Napster. The Gnutella network is a
fully decentralized, peer-to-peer application layer network that facilitates file sharing; and is built around an
open protocol developed to enable host discovery, distributed search, and file transfer. It consists of the
collection of Internet connected hosts on which Gnutella protocol enabled applications are running.The Gnutella
protocol makes possible all host-to-host communication through the use of messages.
Cominga Well-Organized Hiding System…
||Issn 2250-3005 || ||September||2013|| Page 65
GUID Type TTL Hops Payload Size
16 bytes 1 byte 1 byte 1 byte 4 bytes
23 bytes
Messsage Format
The gnutella search and retrieval protocol
Peer-to-peer file sharing: Peer-to-peer file sharing is the distribution and sharing of digital documents
andcomputer files using the technology of peer-to-peer (P2P) networking.P2P file sharing allows users to access
media files such as books, music, movies, and games using a specialized P2P software program that searches for
other connected computers on a P2P network and locates the desired content. The nodes (peers) of such
networks are end-user computer systems that are interconnected via the Internet.Peer-to-peer file sharing
technology has evolved through several design stages from the early networks like Napster, which popularized
the technology, to the later models like the Bit Torrent protocol.Several factors contributed to the widespread
adoption and facilitation of peer-to-peer file sharing. These included increasing Internet bandwidth, the
widespread digitization of physical media, and the increasing capabilities of residential personal computers.
Users were able to transfer either one or more files from one computer to another across the Internet through
various file transfer systems and other file-sharing networks.
II. CONSISTENCY ALGORITHM:
In the distributed data sharing, the consistency of the data needs to be focused because there are two
different networks are built on single. Maintaining consistency between frequently updated or even infrequently
updated files and their replicas is a fundamental reliability requirement for a P2P system. P2P systems are
characterized by dynamism, in which node joinand leave continuously and rapidly. Moreover, replica nodes are
dynamically and continuously created and deleted. For consistency maintenance, we introduce an algorithm for
hybrid network, which is known as Adaptive File Consistency Algorithm (AFCA).File consistency maintenance
in P2P systems is a technique for maintaining consistency between files and their replicas. Most previous
consistency maintenance methods depend on either message spreading or structure-based pushing. The
fallowing is algorithm for maintaining consistency in distributed peer-to-peer networks.
Cominga Well-Organized Hiding System…
||Issn 2250-3005 || ||September||2013|| Page 66
III. PERFORMANCE EVALUTION OF P2P NETWORKS:
In this paper we have studied and carried out performance evaluation of Peer-to-Peer (P2P) networking
in context of satellite image processing. The application scenarios identified are sharing of satellite image data,
P2P enabled now casting and forecasting and sharing of distributed computing resources using
P2P. Performance evaluation of peer-to-peer search techniques has been based on simple performance metrics,
such as message hop counts and total network traffic, mostly disregarding their inherent concurrent nature,
where contention may arise. This paper is concerned with the effect of contention in complex P2P network
search, focusing on techniques for multidimensional range search.
IV. CONCLUSION AND FUTURE WORK:
In this, we propose new system which combines both the structured peer-to-peer networkand the
unstructured peer-to-peer networks to form a two-tier hierarchy to provide efficient and flexible distributed data
sharing service.The proposed hybrid architecture enables the creation of awide range of MaIS that can be easily
customized. The efficiency can be further increased whenconsidering link heterogeneity and topology
awareness. Compared to unstructured peer-to-peer networks, the hybrid system has much lower data lookup
Cominga Well-Organized Hiding System…
||Issn 2250-3005 || ||September||2013|| Page 67
failure ratio.We have now finished our analysis of security in P2P networks. As a conclusion we can re-express
the fact that only pure P2P stand a chance against attacks, any kind of shortcuts taken in the implementation can
be turned around in order to attack the P2P application in a more dangerous manner.This application should not
solely worry about authenticating users (binding public keys to physical identities) but also how much trust can
be given to a public key. If such an application existed, it could be used by P2P applications as a very efficient
protection against malicious attacks.
REFERENCES:
[1] Min Yang, Yuanyuan Yang., “An Efficient Hybrid Peer-to-Peer System for Distributed Data Sharing “IEEE transaction on
Computers, Vol.59, no.9, September 2010.
[2] Haiying (Helen) Shen, “IRM: Integrated File Replication and Consistency Maintenance in P2P Systems”, IEEE trans on parallel
and distributed systems, vol. 21, no. 1, Jan 2010.
[3] Yuh-JzerJoung, Zhang-WenLin,“On the self-organization of a hybrid peer-to-peer system”,ELSEVIER, Journal of Network and
Computer Appln 33 (2010).
[4] Z. Li, G. Xie, Z. Li, “Efficient and scalable consistency maintenance for heterogeneous peer-to-peer systems”, TPDS (2008).
[5] B.T. Loo, R. Huebsch, I. Stoica, and J.M. Hellerstein, “The Case for a Hybrid p2p Search Infrastructure,”Proc. Workshop Peer-
to-Peer Systems (IPTPS ’04), pp. 141-150, Feb. 2004.
[6] V. Gopalakrishnan, B. Silaghi, B. Bhattacharjee, P. Keleher,“Adaptive replication in peer-to-peer systems”, in: Proc. of ICDCS,
2004.
[7] P2P traffic is booming, “BitTorrent The Dominant Protocol”.http://torrentfreak.com/p2p-traffic-still- booming-071128.
[8] P. Linga, I. Gupta, and K. Birman. Kache: “Peer-to-peer web caching using kelips”. In submission, June 2004.

Contenu connexe

Tendances

IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...IEEEMEMTECHSTUDENTPROJECTS
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 
Bacis Concept of Communication and Networking
Bacis Concept of Communication and NetworkingBacis Concept of Communication and Networking
Bacis Concept of Communication and NetworkingSnehal Shahane
 
What is computer network
What is computer networkWhat is computer network
What is computer networkMir Imad
 
Effective Approach For Content Based Image Retrieval In Peer-Peer To Networks
Effective Approach For Content Based Image Retrieval In Peer-Peer To NetworksEffective Approach For Content Based Image Retrieval In Peer-Peer To Networks
Effective Approach For Content Based Image Retrieval In Peer-Peer To NetworksIRJET Journal
 
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Pvrtechnologies Nellore
 
Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Khondoker Sadia
 
Active Network Service Composition
Active Network Service CompositionActive Network Service Composition
Active Network Service CompositionIJERD Editor
 
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...LeMeniz Infotech
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
introduction to Networking
introduction to Networkingintroduction to Networking
introduction to Networkingiicecollege
 
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...ijgca
 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
 

Tendances (19)

IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
Bacis Concept of Communication and Networking
Bacis Concept of Communication and NetworkingBacis Concept of Communication and Networking
Bacis Concept of Communication and Networking
 
What is computer network
What is computer networkWhat is computer network
What is computer network
 
Effective Approach For Content Based Image Retrieval In Peer-Peer To Networks
Effective Approach For Content Based Image Retrieval In Peer-Peer To NetworksEffective Approach For Content Based Image Retrieval In Peer-Peer To Networks
Effective Approach For Content Based Image Retrieval In Peer-Peer To Networks
 
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
 
Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317
 
Active Network Service Composition
Active Network Service CompositionActive Network Service Composition
Active Network Service Composition
 
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
 
Information-Centric Networking in Mobile Networks
Information-Centric Networking in Mobile NetworksInformation-Centric Networking in Mobile Networks
Information-Centric Networking in Mobile Networks
 
Computer network
Computer networkComputer network
Computer network
 
introduction to Networking
introduction to Networkingintroduction to Networking
introduction to Networking
 
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
 
Study guide1(1)
Study guide1(1)Study guide1(1)
Study guide1(1)
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
 
Afeche nettech
Afeche nettechAfeche nettech
Afeche nettech
 
Computer network
Computer network Computer network
Computer network
 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
 

En vedette

Grandes del futbol
Grandes del futbolGrandes del futbol
Grandes del futbolLuisM80
 
Perfil dos consumidores de produtos da banda iron maiden na cidade de fortale...
Perfil dos consumidores de produtos da banda iron maiden na cidade de fortale...Perfil dos consumidores de produtos da banda iron maiden na cidade de fortale...
Perfil dos consumidores de produtos da banda iron maiden na cidade de fortale...Renata Blima
 
Asi sera la Red en el Futuro
Asi sera la Red en el FuturoAsi sera la Red en el Futuro
Asi sera la Red en el FuturoDavidVistin1
 
IssuesWithDriverlessCars
IssuesWithDriverlessCarsIssuesWithDriverlessCars
IssuesWithDriverlessCarsRichard Di Bona
 
Egyptian Navy Experience certificate
Egyptian Navy Experience certificateEgyptian Navy Experience certificate
Egyptian Navy Experience certificateMohamed Ramadan
 
Investimentos em SI - Modelos de (in)Decisão (Semana Informática)
Investimentos em SI - Modelos de (in)Decisão (Semana Informática)Investimentos em SI - Modelos de (in)Decisão (Semana Informática)
Investimentos em SI - Modelos de (in)Decisão (Semana Informática)Jorge Pereira
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Research and planning
Research and planningResearch and planning
Research and planningTanjuma95
 
Calendario de Presentaciones de Negocio y Capacitaciones
Calendario de Presentaciones de Negocio y Capacitaciones Calendario de Presentaciones de Negocio y Capacitaciones
Calendario de Presentaciones de Negocio y Capacitaciones Tienslovercorp
 
Ejercicio arquitectura22
Ejercicio arquitectura22Ejercicio arquitectura22
Ejercicio arquitectura22Ice-man075
 
Plantilla de fichas
Plantilla de fichasPlantilla de fichas
Plantilla de fichas66651832
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Asi sera la Red en el Futuro
Asi sera la Red en el FuturoAsi sera la Red en el Futuro
Asi sera la Red en el FuturoDavidVistin1
 

En vedette (20)

Grandes del futbol
Grandes del futbolGrandes del futbol
Grandes del futbol
 
Perfil dos consumidores de produtos da banda iron maiden na cidade de fortale...
Perfil dos consumidores de produtos da banda iron maiden na cidade de fortale...Perfil dos consumidores de produtos da banda iron maiden na cidade de fortale...
Perfil dos consumidores de produtos da banda iron maiden na cidade de fortale...
 
Asi sera la Red en el Futuro
Asi sera la Red en el FuturoAsi sera la Red en el Futuro
Asi sera la Red en el Futuro
 
10
1010
10
 
Presentation
PresentationPresentation
Presentation
 
ijcer
ijcerijcer
ijcer
 
IssuesWithDriverlessCars
IssuesWithDriverlessCarsIssuesWithDriverlessCars
IssuesWithDriverlessCars
 
Egyptian Navy Experience certificate
Egyptian Navy Experience certificateEgyptian Navy Experience certificate
Egyptian Navy Experience certificate
 
Investimentos em SI - Modelos de (in)Decisão (Semana Informática)
Investimentos em SI - Modelos de (in)Decisão (Semana Informática)Investimentos em SI - Modelos de (in)Decisão (Semana Informática)
Investimentos em SI - Modelos de (in)Decisão (Semana Informática)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Research and planning
Research and planningResearch and planning
Research and planning
 
Doc
DocDoc
Doc
 
Calendario de Presentaciones de Negocio y Capacitaciones
Calendario de Presentaciones de Negocio y Capacitaciones Calendario de Presentaciones de Negocio y Capacitaciones
Calendario de Presentaciones de Negocio y Capacitaciones
 
Ejercicio arquitectura22
Ejercicio arquitectura22Ejercicio arquitectura22
Ejercicio arquitectura22
 
Plantilla de fichas
Plantilla de fichasPlantilla de fichas
Plantilla de fichas
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Asi sera la Red en el Futuro
Asi sera la Red en el FuturoAsi sera la Red en el Futuro
Asi sera la Red en el Futuro
 

Similaire à International Journal of Computational Engineering Research(IJCER)

Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...IJCI JOURNAL
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Uvaraj Shan
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...IEEEFINALSEMSTUDENTSPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEEMEMTECHSTUDENTPROJECTS
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ijcsity
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distanceIJCNCJournal
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networkingJyoti Kumari
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksService Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksIOSR Journals
 
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...IEEEFINALSEMSTUDENTSPROJECTS
 
A P2P Job Assignment Protocol For Volunteer Computing Systems
A P2P Job Assignment Protocol For Volunteer Computing SystemsA P2P Job Assignment Protocol For Volunteer Computing Systems
A P2P Job Assignment Protocol For Volunteer Computing SystemsAshley Smith
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 

Similaire à International Journal of Computational Engineering Research(IJCER) (20)

Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
Ff36968971
Ff36968971Ff36968971
Ff36968971
 
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
 
Final peersimp pt
Final peersimp ptFinal peersimp pt
Final peersimp pt
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distance
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksService Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
 
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
 
A P2P Job Assignment Protocol For Volunteer Computing Systems
A P2P Job Assignment Protocol For Volunteer Computing SystemsA P2P Job Assignment Protocol For Volunteer Computing Systems
A P2P Job Assignment Protocol For Volunteer Computing Systems
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

International Journal of Computational Engineering Research(IJCER)

  • 1. International Journal of Computational Engineering Research||Vol, 03||Issue, 9|| ||Issn 2250-3005 || ||September||2013|| Page 63 Cominga Well-Organized Hiding System And Constancy Conservation In Mixture P2P System N. Manjula1 , R.V. SubbaRayudu2 , K. Niharika3, G.Prathap4 1, 3, 4 M.Tech students, 2.Assistant Professor Global College of Engineering & Technology, Kadapa. I. INTRODUCTION: Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer- to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. Structured peer-to-peer networks usually can provide efficient and accurate services but need to spend a lot of effort in maintaining the regular topology. On the other hand, unstructured peer-to-peer networks are extremely resilient to the frequent peer joining and leaving but this is usually achieved at the expense of efficiency.Our simulation results demonstrate that the hybrid peer-to-peer system can utilize both the efficiency of structured peer-to-peer network and the flexibility of the unstructured peer-to-peer network and achieve a good balance between the two types of networks.In peer-to-peer file sharing systems, file replication and consistency maintenance are widely used techniques for high system performance. Hybrid peer-to-peer architectures use special nodes to provide directory services for regions of the network ("regional directory services"). Hybrid peer-to-peer architectures are a potentially powerful model for developing large-scale networks of complex digital libraries, but peer-to-peer networks have so far tended to use very simple methods of resource selection and document retrieval. In this paper, we study the application of content-based resource selection and document retrieval to hybrid peer-to-peer networks. ABSTRACT Peer-to-peer overlay networks are widely used in distributed systems. P2P is a popular technology used for file sharing. File replication and Consistency maintenance are the techniques used in P2P for high system performance. The objective of this work is to design a hybrid peer-to-peer system for distributed data sharing which combines the advantages of both types of peer-to-peer networks and minimizes their disadvantages. However, in peer-to-peer networks, Information Retrieval (IR) performance is determined by both technology and user behavior, and little attention has been paid in the literature to improving IR performance through incentives to change user behavior.The proposed hybrid peer-to-peer system is composed oftwo parts: the first part is a structured core network the second part is multiple unstructured peer-to-peer networks each of which is attached to a node in the core network.Our cachingscheme can deliver lower query delay, better load balance and higher cache hit ratios. KEY WORDS: hybrid, peer-to-peer systems,consistency maintenance.
  • 2. Cominga Well-Organized Hiding System… ||Issn 2250-3005 || ||September||2013|| Page 64 Recently, a number of technologies in peer-to-peer (P2P) networking have been developed. This pure P2P personal and social networking paradigm, however, has its own limitations. For example, P2P networks without any infrastructure support offer no connectivity guaranties. In this paper, we propose a hybrid peer-to- peer system for distributed data sharing which combines the structured and unstructured peer-to-peer networks. RELATED WORK:Peer-to-peer networking is the utilization of the relatively powerful computers (personal computers) that exist at the edge of the Internet for more than just client-based computing tasks. They do not aim to integrate P2P systems with general Internet services. Furthermore, infrastructure-nodes are not perceived and used by the users as personal devices. Some existing file-sharing P2P systems assume that the shared data are static or read-only, so that no update mechanism is needed. Peer-to-peer networking has the following advantages over client/server networking:  Content and resources can be shared from both the center and the edge of the network. In client/server networking, content and resources are typically shared from only the center of the network.  A network of peers is easily scaled and more reliable than a single server. A single server is subject to a single point of failure or can be a bottleneck in times of high network utilization.  A network of peers can share its processor, consolidating computing resources for distributed computing tasks, rather than relying on a single computer, such as a supercomputer.  Shared resources of peer computers can be directly accessed. Rather than sharing a file stored on a central server, a peer can share the file directly from its local storage.  Peer-to-peer networking solves the following problems:  Allows the processing resources of edge computers to be utilized for distributed computing tasks.  Allows local resources to be shared directly, without the need for intermediate servers.  Allows efficient multipoint communication without having to rely on IP multicast infrastructure. Peer-to-Peer Networking Scenarios Peer-to-peer networking enables or enhances the following scenarios:  Real-time communications (RTC)  Collaboration  Content distribution  Distributed processing  Improved Internet technologies GNUTELLA: This is a large peer-to-peer network. It was the first decentralized peer-to-peer network of its kind, leading to other, later networks adopting the model. It celebrated a decade of existence on March 14, 2010 and has a user base in the millions for peer-to-peer file sharing. The gnutella network is a fully distributed alternative to such semi-centralized systems as FastTrack and the original Napster. The Gnutella network is a fully decentralized, peer-to-peer application layer network that facilitates file sharing; and is built around an open protocol developed to enable host discovery, distributed search, and file transfer. It consists of the collection of Internet connected hosts on which Gnutella protocol enabled applications are running.The Gnutella protocol makes possible all host-to-host communication through the use of messages.
  • 3. Cominga Well-Organized Hiding System… ||Issn 2250-3005 || ||September||2013|| Page 65 GUID Type TTL Hops Payload Size 16 bytes 1 byte 1 byte 1 byte 4 bytes 23 bytes Messsage Format The gnutella search and retrieval protocol Peer-to-peer file sharing: Peer-to-peer file sharing is the distribution and sharing of digital documents andcomputer files using the technology of peer-to-peer (P2P) networking.P2P file sharing allows users to access media files such as books, music, movies, and games using a specialized P2P software program that searches for other connected computers on a P2P network and locates the desired content. The nodes (peers) of such networks are end-user computer systems that are interconnected via the Internet.Peer-to-peer file sharing technology has evolved through several design stages from the early networks like Napster, which popularized the technology, to the later models like the Bit Torrent protocol.Several factors contributed to the widespread adoption and facilitation of peer-to-peer file sharing. These included increasing Internet bandwidth, the widespread digitization of physical media, and the increasing capabilities of residential personal computers. Users were able to transfer either one or more files from one computer to another across the Internet through various file transfer systems and other file-sharing networks. II. CONSISTENCY ALGORITHM: In the distributed data sharing, the consistency of the data needs to be focused because there are two different networks are built on single. Maintaining consistency between frequently updated or even infrequently updated files and their replicas is a fundamental reliability requirement for a P2P system. P2P systems are characterized by dynamism, in which node joinand leave continuously and rapidly. Moreover, replica nodes are dynamically and continuously created and deleted. For consistency maintenance, we introduce an algorithm for hybrid network, which is known as Adaptive File Consistency Algorithm (AFCA).File consistency maintenance in P2P systems is a technique for maintaining consistency between files and their replicas. Most previous consistency maintenance methods depend on either message spreading or structure-based pushing. The fallowing is algorithm for maintaining consistency in distributed peer-to-peer networks.
  • 4. Cominga Well-Organized Hiding System… ||Issn 2250-3005 || ||September||2013|| Page 66 III. PERFORMANCE EVALUTION OF P2P NETWORKS: In this paper we have studied and carried out performance evaluation of Peer-to-Peer (P2P) networking in context of satellite image processing. The application scenarios identified are sharing of satellite image data, P2P enabled now casting and forecasting and sharing of distributed computing resources using P2P. Performance evaluation of peer-to-peer search techniques has been based on simple performance metrics, such as message hop counts and total network traffic, mostly disregarding their inherent concurrent nature, where contention may arise. This paper is concerned with the effect of contention in complex P2P network search, focusing on techniques for multidimensional range search. IV. CONCLUSION AND FUTURE WORK: In this, we propose new system which combines both the structured peer-to-peer networkand the unstructured peer-to-peer networks to form a two-tier hierarchy to provide efficient and flexible distributed data sharing service.The proposed hybrid architecture enables the creation of awide range of MaIS that can be easily customized. The efficiency can be further increased whenconsidering link heterogeneity and topology awareness. Compared to unstructured peer-to-peer networks, the hybrid system has much lower data lookup
  • 5. Cominga Well-Organized Hiding System… ||Issn 2250-3005 || ||September||2013|| Page 67 failure ratio.We have now finished our analysis of security in P2P networks. As a conclusion we can re-express the fact that only pure P2P stand a chance against attacks, any kind of shortcuts taken in the implementation can be turned around in order to attack the P2P application in a more dangerous manner.This application should not solely worry about authenticating users (binding public keys to physical identities) but also how much trust can be given to a public key. If such an application existed, it could be used by P2P applications as a very efficient protection against malicious attacks. REFERENCES: [1] Min Yang, Yuanyuan Yang., “An Efficient Hybrid Peer-to-Peer System for Distributed Data Sharing “IEEE transaction on Computers, Vol.59, no.9, September 2010. [2] Haiying (Helen) Shen, “IRM: Integrated File Replication and Consistency Maintenance in P2P Systems”, IEEE trans on parallel and distributed systems, vol. 21, no. 1, Jan 2010. [3] Yuh-JzerJoung, Zhang-WenLin,“On the self-organization of a hybrid peer-to-peer system”,ELSEVIER, Journal of Network and Computer Appln 33 (2010). [4] Z. Li, G. Xie, Z. Li, “Efficient and scalable consistency maintenance for heterogeneous peer-to-peer systems”, TPDS (2008). [5] B.T. Loo, R. Huebsch, I. Stoica, and J.M. Hellerstein, “The Case for a Hybrid p2p Search Infrastructure,”Proc. Workshop Peer- to-Peer Systems (IPTPS ’04), pp. 141-150, Feb. 2004. [6] V. Gopalakrishnan, B. Silaghi, B. Bhattacharjee, P. Keleher,“Adaptive replication in peer-to-peer systems”, in: Proc. of ICDCS, 2004. [7] P2P traffic is booming, “BitTorrent The Dominant Protocol”.http://torrentfreak.com/p2p-traffic-still- booming-071128. [8] P. Linga, I. Gupta, and K. Birman. Kache: “Peer-to-peer web caching using kelips”. In submission, June 2004.