We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Reliable Peer Discovery in Content-Aware Overlay Network

by Jayashree  D, Yogesh P
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Number 18
Year of Publication: 2012
Authors: Jayashree  D, Yogesh P
10.5120/9794-4398

Jayashree  D, Yogesh P . Reliable Peer Discovery in Content-Aware Overlay Network. International Journal of Computer Applications. 60, 18 ( December 2012), 25-30. DOI=10.5120/9794-4398

@article{ 10.5120/9794-4398,
author = { Jayashree  D, Yogesh P },
title = { Reliable Peer Discovery in Content-Aware Overlay Network },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 60 },
number = { 18 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume60/number18/9794-4398/ },
doi = { 10.5120/9794-4398 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:07:40.334361+05:30
%A Jayashree  D
%A Yogesh P
%T Reliable Peer Discovery in Content-Aware Overlay Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 60
%N 18
%P 25-30
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Peer to peer (p2p) file sharing protocol and ad hoc wireless routing protocol shares many intriguing similarities even though they operate on a totally different level of a network. With the popularity of p2p application for resource sharing and the availability of resources has motivated the researchers to examine the potentials of p2p applications in a dynamic environment. With the success of p2p for file sharing applications, its benefits can be brought by constructing the overlay network with easy access of content to improve their availability and performance. This paper is one such an attempt to exploit the potential of mobile characteristics for the benefit of p2p application to satisfy the users demand. This paper focuses on how reliable content sharing could be realized in an ad hoc environment through peer to peer (p2p) system. This efficient content delivering system reduces the search latency of content peer selection. Also the reliable path for sharing content with trust calculation has been proposed. Unstructured peer to peer network is considered for the platform, emphasizing the content based interaction with a pro-active routing protocol at the network layer. The experiments have been performed on the network simulator NS-2 and the results showed that the proposed system improves the hit ratio and reduces the overhead traffic.

References
  1. Mascolo. C, Capra. L, and Emmerich. W. (2002) 'Middleware for Mobile Computing (A Survey)' In E. Gregori, G. Anastasi, and S. Basagni, editors, Neworking 2002 Tutorial Papers, LNCS 2497, pages 20–58.
  2. Yang. B, and Garcia-Molina H, (2002) 'Efficient search in peer-to-peer networks', Proceedings of the 22nd International Conference on Distributed Computing Systems, July.
  3. Lv, Q. , Cao, P. , Cohen, E. , Li, K. , and Shenker, S. , (2002) 'Search and replication in unstructured peer-to-peer networks', in ICS '02 : Proceedings of the 16th International Conference on supercomputing, June.
  4. Adamic, L. , Lukose, R. M. , Puniyani, A. R. and Huberman, B. A. , (2001)'Search in power-law networks', Physics Review Letters, no. 64 046135.
  5. Lv, Q. , Ratnasamy, S. , and Shenker, S. , (2002) 'Can heterogeneity make gnutella scalable?' in IPTPS '02: Proceedings of the 1st International Workshop on Peer-to-Peer Systems.
  6. Lv, Q. , Cao, P. , Cohen, E. , Li, K. , and Shenker, S. , Search and replication in unstructured peer-to-peer networks," in Proceedings of the 16th International Conference on supercomputing (ICS '02), June 2002.
  7. Klingberg, T. , Manfredi, R. , (2002)' Gnutella 0. 6'[Online], http://rfc-gnutella. sourceforge. net/src/rfc-0_6-draft. html.
  8. Zhang, X. Y. , Zhang, Q. , Zhang, Z. , Song, G. , and Zhu,W. , (2004), 'A Construction of Locality-Aware Overlay Network: mOverlay and Its Performance,' IEEE Journal Selected Areas in Communications Vol. 22, No. 1, pp. 18-28.
  9. Kim, S. K. , Lee, K. J. , and Yang, S. B. , (2011) 'An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments,' in ISWPC-11: Proceedings of 6th International Symposium on Wireless and Pervasive Computing.
  10. Mawji, A. , Hassanein, H. , and Zhang, X. , (2011) 'Peer-to-peer overlay topology control for mobile ad hoc networks', Pervasive and Mobile Computing, Elsevier, vol. 7, no. 4. pp. 467-478
  11. Rao, W. , Chen, L. , Wai-Chee Fu, A. and Wang, G. , (2010) 'Optimal Resource Placement in Structured Peer-to-Peer Networks', IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 7, pp. 1011 - 1026
  12. Schollmeier, R. , Gruber, I. , and Niethammer, F. , (2003) 'Protocol for peer-to-peer networking in mobile environments, in ICCCN 2003: Proceedings of the 12th International Conference on Computer Communications and Networks, pp. 121–127.
  13. Yang, B. , and Garcia-Molina, H. , (2002) 'Efficient Search in Peer-to-Peer Networks,' Proceedings International Conference on Distributed Computing Systems, Vienna, Austria, pp. 5-15.
  14. Ratnasamy, S. , Handley, M. , Karp, R. , and Shenker, S. , (2002), 'Topologically-aware Overlay Construction and Server Selection,' INFOCOM 2002: Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, New York, NY USA, vol. 3, pp. 1190-1199
  15. Lv, Q. , Ratnasamy, S. , Shenker, S. , (2002), 'Can Heterogeneity Make Gnutella Scalable?' The First International Workshop on Peer-to-Peer Systems, Springer-Verlag, Cambridge, MA, USA, pp. 94103.
  16. Z. , Tang, C. , and Zhang, Z. , (2003), 'Building Topology-Aware Overlays Using Global Soft-State,' Proceedings of the 23rd International Conference on Distributed Computing Systems, IEEE, Providence, Rhode Island USA, pp. 500-508
  17. Chen, W. -T. , Chao, C. -H. , and Chiang, J. -L. , 2006, "An Interest-Based Architecture for Peer-to-Peer Network Systems," Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA'06), Vienna, Austria, Vol. 1, pp. 707-712.
  18. Wang, J. Z. , and Vanninen, M. A. , 2004, "A Novel Self-Configuration Mechanism for Heterogeneous P2P Networks," Proceedings of IEEE/WIC/ACM International Conference the Intelligent Agent Technology, IEEE, Beijing, China, pp. 281-287.
  19. Bestavros, A. , and Jin, S. , 2003, "OSMOSIS: Scalable Delivery of Real-Time Streaming Media in Ad-Hoc Overlay Networks," Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops, IEEE Computer Society, Vienna, Austria, pp. 214-219.
  20. Cohen, E. , and Shenker, S. , 2002, "Replication Strategies in Unstructured Peer-to-Peer Networks," SIGCOMM Computer Communication Review, Vol. 32 No. 4, pp. 177-190.
  21. Sun, Y. , Sun, L. , Huang, X. , and Lin, Y. , 2006, "Resource Discovery in Locality-Aware Group-Based Semantic Overlay of Peer-to-Peer Networks," Proceedings of the 1st International Conference on Scalable Information Systems, ACM, Hong Kong, Article No. 44.
  22. Zhang, X. Y. , Zhang, Q. , Zhang, Z. , Song, G. , and Zhu, W. , 2004, "A Construction of Locality-Aware Overlay Network: mOverlay and Its Performance," IEEE Journal Selected Areas in Communications, Vol. 22, No. 1, pp. 18-28.
  23. Dou Wen, Wang Huaimin, Jia Yan , et al (2004) A recommendation-based peer-to-peer trust model [J]. Journal of Software,15(4): 571-583,
  24. GNutella. http://www. GNutella. com/.
  25. SD. Kamvar, M. T. Schlosser, and H. Garcia-Molina. , (2003) The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International WWW Conference, Budapest, Hungary, May.
  26. S. Marti and H. Garcia-Molina, (2004) "Limited reputation sharing in p2p systems," Proceedings of ACM EC'04, New York, USA, pp 91– 101, May.
  27. Y. Wang and V. Varadharajan. Interaction trust evaluation in decentralized environments. (2004) In K. Bauknecht, M. Bichler, and B. Pr¨oll, editors, Proceedings of 5th International Conference on Electronic Commerce and Web Technologies (EC-Web04), volume LNCS 3182, Springer-Verlag, pages 144–153, Zaragoza, Spain, August-September.
  28. B. Yu, M. P. Singh, and K. Sycara. (2004) ,Developing trust in largescale peer-to-peer systems. In Proceedings of 2004 IEEE First Symposium on Multi-Agent Security and Survivability, pages 1–10, August.
Index Terms

Computer Science
Information Sciences

Keywords

Peer-to-Peer Network Ad hoc network Resource search Trust