SlideShare a Scribd company logo
1 of 5
Download to read offline
ISSN: 2278 – 1323
                International Journal of Advanced Research in Computer Engineering & Technology
                                                                     Volume 1, Issue 5, July 2012



      Approved Protocol For Reliability In Peer to Peer Networks
                              Farzane kabudvand, adel hassas

      Department Of Computer , Zanjan Branch , Islamic Azad University , Zanjan , Iran

                                 fakabudvand@yahoo.com



Abstract

An important issue in peer-to-peer networks is discussed in this paper. peer-to-
peer networks appeared as common method of sharing huge volume of data.
These networks allow users to share their resources as completely distributed
ones. Here by changing the “Chord” protocol`s structure among increasing the
package` transmit speed we assure high reliability in package transmit.
Simulation results showed function development of new protocol comparing to
the base protocol.

Key words peer-to-peer networks, Chord protocol, routing, data transfer speed,
reliability.

Introduction

peer-to-peer networks benefit from a series of tasks in particular data sharing and
cooperation of current resources in a distributed environment. These systems due
to high scalability, possibility of increasing the number of system`s node
consequently increasing the resources causes powerful systems establishment. In
one hand because of direct connection between the nodes, though there is no
extra cost for their connections.

As you know internet servers base on the users` usages are divided into two
categories:

Webhosting networks are base on the central servers but there is no peer-to-peer
network and users themselves connect each other via ”Client” applications. The
network`s ability depends on the total users` ability.



                                                                                             135
                                All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                 International Journal of Advanced Research in Computer Engineering & Technology
                                                                      Volume 1, Issue 5, July 2012



peer-to-peer network`s purpose is data sharing and accepting the users` inquiries
and research, return a pointer to the data. peer-to-peer network`s feature
resembles a graph in which vertexes correspond to the network`s nodes and
edges correspond to the nodes links.

Data transfer speed and reliability in the networks are prominent issues in the
networks.

Chord protocol

In this section we introduce Chord protocol. Chord system is an efficient
distributed explorer service that is base on the Chard protocol. Main
characteristic of Chord is simplicity, its capability and right function.

As keys are distributed uniformly in Chord system, thus receiving many applicants
in a network doesn`t disturb the network.

Because in chord system, uniform harmony keys are allocated to nodes, key ”K”
allocated to the first key, whereas its determiner either equals to K`s determiner
or comes after K`s determiner in its environment . this knot is called K`s substitute
knot. If we represent the knots as 1 to 2n , next group is first clockwise one, in
uniform harmony allows nodes to enter or to exit the network without any
problem.

Package transmit process

When a node needs to connect other nodes, it should research, and each nodes
needs to connect with current substitute knot in the ring. To do so, it should
continue inquiring until finding two nodes in which targeted keys` determiners
locates there. To ensure research function, Chord protocol should assure that any
pointer is a substitute for up dated node and pointes the current substitutes. In
this point, node individually preserves a routing table, ith entry of the table for
node “N” is the first knot`s entity and minimum determiner distance is 2i-1
toward “n” on the ring.

The idea that is introduced for package`s transmit is that destination and starting
point`s route may breaks down for many reasons as the routes data are stored in


                                                                                              136
                                 All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
               International Journal of Advanced Research in Computer Engineering & Technology
                                                                    Volume 1, Issue 5, July 2012



the tables, if 1 to 2 direct route breaks down, an indirect route 1     2        3
Is used. If a node transmits a package to its adjacent and receives no response, it
observes a breakdown between themselves because its adjacent can either move
due to the nodes movement or it hasn`t received the requested package.

In this situation the node locates the sent data package in its local memory and
transmits a package with two steps and changes the package`s destination
address to 2 and 3 thus the response package is sent by a node that destination`s
address is located in this package.

 Practicality, this function needs adding the nodes name on the reply package. In
this manner each propeller node propels identifies propellers nodes between
itself and destination. Long distance between starting point and destination
increases the number of propeller nodes and because their maintenance is costly
this limitation can be established as: includes 2 or 3 next nodes which accepts
more excess.

Another issue is necessary band extent to transfer the data as this helps
transmitted data. As you know, when there is a package in staring point it will be
transmitted by the neighbor nodes, it is transmitted from one neighbor to
another one consequently it reaches destination. As the band`s extent is
necessary to transmit a package, neighbors transmit a package, before receiving
the package it should express their band extent to next neighbor, this extent
should be compared with needed extent, though when the node is suitable to
transmit it is done.




                                                                                            137
                               All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
               International Journal of Advanced Research in Computer Engineering & Technology
                                                                    Volume 1, Issue 5, July 2012




Simulation                                                              Packet            Packet

The proposed methods about speed and repairing was                     delivery       delivery ratio

evaluated by chord and suggested protocol.                              ratio in       in proposed
                                                                        based            protocol
The model of the web consist of 30 mobile nodes which
                                                                       protocol
are distributed randomly in a space of 1000*1000
                                                                         100                90
Square meters . the time of simulation is considered to
be 250 seconds . chosen speed of simulation is 1 meter                    82                88
per second at minimum and 25 meter per second .
                                                                          43                56
The table of simulation on the percentage of group
                                                                          28                36
reliability in comparision with the changes .
                                                                          18                32

                                                                          19                35


Conclusion                                                                10                23


Peer-to-peer networks are very important networks. This paper tries to develop
the package transmit rate regarding the band extent before the package transmit
is delayed to next time. Local repair mechanism was discussed in these networks
to create reliability. And reliability was analyzed as a function of the number of
starting point`s nodes comparing to the base protocol, Chord. Results showed the
protocol function`s development, because when the nodes route breaks down
joins the network quickly, consequently the network`s function quality gains
relative development.




                                                                                                 138
                               All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                          International Journal of Advanced Research in Computer Engineering & Technology
                                                                               Volume 1, Issue 5, July 2012



     Reference
1.   Chord: a scalable peer-to-peer lookup protocol for internet ...‫‏‬
     number of Chord nodes. Index Terms—Distributed scalable algorithms, lookup protocols, peer-to-peer networks.
     I. INTRODUCTION. PEER-TO-PEER systems ...‫‏‬
     citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.117.1761...‫-‏‬
2.   Analyzing the Chord Peer-to-Peer Network for Power Grid ...‫‏‬
     Chord is a purely decentralized peer-to-peer network. Its structure is a ring that is constructed using distributed
     hashing tables (DHT). This paper analyzes and ...‫‏‬
     www.esat.kuleuven.be/electa/publications/fulltexts/pub_1751.pdf‫ -‏‬InfoVis CyberInfrastructure - Chord Network
     Model‫‏‬
     10 Jul 2004 ... This algorithm provides an implementation of the Chord primitive for the modeling of peer-to-peer
     networks and to perform search on such ...‫‏‬
     iv.slis.indiana.edu/sw/chord-model.html‫مشابه - شده ذخيره -‏‬
3.   Peer-to-peer overlay networks Structured overlay network: Chord ...‫‏‬
     overlay network. 21 / 53. Structured overlay network: Chord. Basics. Each peer is assigned a unique m-bit
     identifier id. Every peer is assumed to store data ...‫‏‬
     www.cs.unibo.it/~babaoglu/courses/cas/slides/chord.pdf‫-‏‬
     4. Chord-PKI: A distributed trust infrastructure based on P2P networks Original Research Article
     Computer Networks, Volume 56, Issue 1, 12 January 2012, Pages 378-398
     Agapios Avramidis, Panayiotis Kotzanikolaou, Christos Douligeris, Mike Burmester


     5 ML-Chord: A multi-layered P2P resource sharing model Original Research Article
       Journal of Network and Computer Applications, Volume 32, Issue 3, May 2009, Pages 578-588
       Eric Jui-Lin Lu, Yung-Fa Huang, Shu-Chiu Lu


     6. A peer-to-peer expressway over Chord Original Research Article
     Mathematical and Computer Modelling, Volume 44, Issues 7–8, October 2006, Pages 659-677
     Hathai Tanta-ngai, Michael McAllister
     7 Cross-layer optimized Chord protocol for separated ring convergence in MANET Original Research Article
     The Journal of China Universities of Posts and Telecommunications, Volume 16, Issue 4, August 2009, Pages 84-90
     Jing-qing MEI, Hong JI, Ting LI
     8. A semantic-based P2P resource organization model R-Chord Original Research Article
     Journal of Systems and Software, Volume 79, Issue 11, November 2006, Pages 1619-1631
     Jie Liu, Hai Zhuge
     9. Topology-aware peer-to-peer overlay network for Ad-hoc Original Research Article
     The Journal of China Universities of Posts and Telecommunications, Volume 16, Issue 1, February 2009, Pages
     111-115
     10. Super-peer-based routing strategies for RDF-based peer-to-peer networks Original Research Article
     Web Semantics: Science, Services and Agents on the World Wide Web, Volume 1, Issue 2, February 2004, Pages
     177-186
     Wolfgang Nejdl, Martin Wolpers, Wolf Siberski, Christoph Schmitz, Mario Schlosser, Ingo Brunkhorst, Alexander
     Löser




                                                                                                                     139
                                              All Rights Reserved © 2012 IJARCET

More Related Content

What's hot

Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...SBGC
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingiaemedu
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challengesiaemedu
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
 
FINAL PROJECT REPORT
FINAL PROJECT REPORTFINAL PROJECT REPORT
FINAL PROJECT REPORTSoham Wadekar
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
 
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET Journal
 
Networking ieee-project-topics-ocularsystems.in
Networking ieee-project-topics-ocularsystems.in Networking ieee-project-topics-ocularsystems.in
Networking ieee-project-topics-ocularsystems.in Ocular Systems
 
Optimal packet routing for wireless body area network using software defined ...
Optimal packet routing for wireless body area network using software defined ...Optimal packet routing for wireless body area network using software defined ...
Optimal packet routing for wireless body area network using software defined ...IJECEIAES
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Parallel ...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Parallel ...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Parallel ...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Parallel ...sunda2011
 

What's hot (20)

Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routing
 
Cw25585588
Cw25585588Cw25585588
Cw25585588
 
358 365
358 365358 365
358 365
 
05173187
0517318705173187
05173187
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challenges
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
 
FINAL PROJECT REPORT
FINAL PROJECT REPORTFINAL PROJECT REPORT
FINAL PROJECT REPORT
 
Improvement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueing
Improvement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueingImprovement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueing
Improvement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueing
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
 
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
 
Networking ieee-project-topics-ocularsystems.in
Networking ieee-project-topics-ocularsystems.in Networking ieee-project-topics-ocularsystems.in
Networking ieee-project-topics-ocularsystems.in
 
Optimal packet routing for wireless body area network using software defined ...
Optimal packet routing for wireless body area network using software defined ...Optimal packet routing for wireless body area network using software defined ...
Optimal packet routing for wireless body area network using software defined ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
E42022125
E42022125E42022125
E42022125
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Parallel ...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Parallel ...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Parallel ...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Parallel ...
 
20 24
20 2420 24
20 24
 

Viewers also liked

Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication InvestigateMegan Hoerauf
 
Inside A Computer
Inside A ComputerInside A Computer
Inside A ComputermBlackwell
 
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 

Viewers also liked (8)

Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
145 153
145 153145 153
145 153
 
Inside A Computer
Inside A ComputerInside A Computer
Inside A Computer
 
1757 1761
1757 17611757 1761
1757 1761
 
Correo Equivocado
Correo EquivocadoCorreo Equivocado
Correo Equivocado
 
What is CanadaHelps and why should my charity register?
What is CanadaHelps and why should my charity register?What is CanadaHelps and why should my charity register?
What is CanadaHelps and why should my charity register?
 
11 15
11 1511 15
11 15
 
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 

Similar to 135 139

“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...ijcncs
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...IRJET Journal
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...IJEACS
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Dr Sandeep Kumar Poonia
 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...IJCNCJournal
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...IOSR Journals
 

Similar to 135 139 (20)

42 46
42 4642 46
42 46
 
42 46
42 4642 46
42 46
 
47 50
47 5047 50
47 50
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
95 101
95 10195 101
95 101
 
95 101
95 10195 101
95 101
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
 
61 66
61 6661 66
61 66
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
 
F04503057062
F04503057062F04503057062
F04503057062
 
Gokul
GokulGokul
Gokul
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...
 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
 
011001010 a
011001010 a011001010 a
011001010 a
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
 

More from Editor IJARCET

Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

More from Editor IJARCET (20)

Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Recently uploaded

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

135 139

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Approved Protocol For Reliability In Peer to Peer Networks Farzane kabudvand, adel hassas Department Of Computer , Zanjan Branch , Islamic Azad University , Zanjan , Iran fakabudvand@yahoo.com Abstract An important issue in peer-to-peer networks is discussed in this paper. peer-to- peer networks appeared as common method of sharing huge volume of data. These networks allow users to share their resources as completely distributed ones. Here by changing the “Chord” protocol`s structure among increasing the package` transmit speed we assure high reliability in package transmit. Simulation results showed function development of new protocol comparing to the base protocol. Key words peer-to-peer networks, Chord protocol, routing, data transfer speed, reliability. Introduction peer-to-peer networks benefit from a series of tasks in particular data sharing and cooperation of current resources in a distributed environment. These systems due to high scalability, possibility of increasing the number of system`s node consequently increasing the resources causes powerful systems establishment. In one hand because of direct connection between the nodes, though there is no extra cost for their connections. As you know internet servers base on the users` usages are divided into two categories: Webhosting networks are base on the central servers but there is no peer-to-peer network and users themselves connect each other via ”Client” applications. The network`s ability depends on the total users` ability. 135 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 peer-to-peer network`s purpose is data sharing and accepting the users` inquiries and research, return a pointer to the data. peer-to-peer network`s feature resembles a graph in which vertexes correspond to the network`s nodes and edges correspond to the nodes links. Data transfer speed and reliability in the networks are prominent issues in the networks. Chord protocol In this section we introduce Chord protocol. Chord system is an efficient distributed explorer service that is base on the Chard protocol. Main characteristic of Chord is simplicity, its capability and right function. As keys are distributed uniformly in Chord system, thus receiving many applicants in a network doesn`t disturb the network. Because in chord system, uniform harmony keys are allocated to nodes, key ”K” allocated to the first key, whereas its determiner either equals to K`s determiner or comes after K`s determiner in its environment . this knot is called K`s substitute knot. If we represent the knots as 1 to 2n , next group is first clockwise one, in uniform harmony allows nodes to enter or to exit the network without any problem. Package transmit process When a node needs to connect other nodes, it should research, and each nodes needs to connect with current substitute knot in the ring. To do so, it should continue inquiring until finding two nodes in which targeted keys` determiners locates there. To ensure research function, Chord protocol should assure that any pointer is a substitute for up dated node and pointes the current substitutes. In this point, node individually preserves a routing table, ith entry of the table for node “N” is the first knot`s entity and minimum determiner distance is 2i-1 toward “n” on the ring. The idea that is introduced for package`s transmit is that destination and starting point`s route may breaks down for many reasons as the routes data are stored in 136 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 the tables, if 1 to 2 direct route breaks down, an indirect route 1 2 3 Is used. If a node transmits a package to its adjacent and receives no response, it observes a breakdown between themselves because its adjacent can either move due to the nodes movement or it hasn`t received the requested package. In this situation the node locates the sent data package in its local memory and transmits a package with two steps and changes the package`s destination address to 2 and 3 thus the response package is sent by a node that destination`s address is located in this package. Practicality, this function needs adding the nodes name on the reply package. In this manner each propeller node propels identifies propellers nodes between itself and destination. Long distance between starting point and destination increases the number of propeller nodes and because their maintenance is costly this limitation can be established as: includes 2 or 3 next nodes which accepts more excess. Another issue is necessary band extent to transfer the data as this helps transmitted data. As you know, when there is a package in staring point it will be transmitted by the neighbor nodes, it is transmitted from one neighbor to another one consequently it reaches destination. As the band`s extent is necessary to transmit a package, neighbors transmit a package, before receiving the package it should express their band extent to next neighbor, this extent should be compared with needed extent, though when the node is suitable to transmit it is done. 137 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Simulation Packet Packet The proposed methods about speed and repairing was delivery delivery ratio evaluated by chord and suggested protocol. ratio in in proposed based protocol The model of the web consist of 30 mobile nodes which protocol are distributed randomly in a space of 1000*1000 100 90 Square meters . the time of simulation is considered to be 250 seconds . chosen speed of simulation is 1 meter 82 88 per second at minimum and 25 meter per second . 43 56 The table of simulation on the percentage of group 28 36 reliability in comparision with the changes . 18 32 19 35 Conclusion 10 23 Peer-to-peer networks are very important networks. This paper tries to develop the package transmit rate regarding the band extent before the package transmit is delayed to next time. Local repair mechanism was discussed in these networks to create reliability. And reliability was analyzed as a function of the number of starting point`s nodes comparing to the base protocol, Chord. Results showed the protocol function`s development, because when the nodes route breaks down joins the network quickly, consequently the network`s function quality gains relative development. 138 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Reference 1. Chord: a scalable peer-to-peer lookup protocol for internet ...‫‏‬ number of Chord nodes. Index Terms—Distributed scalable algorithms, lookup protocols, peer-to-peer networks. I. INTRODUCTION. PEER-TO-PEER systems ...‫‏‬ citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.117.1761...‫-‏‬ 2. Analyzing the Chord Peer-to-Peer Network for Power Grid ...‫‏‬ Chord is a purely decentralized peer-to-peer network. Its structure is a ring that is constructed using distributed hashing tables (DHT). This paper analyzes and ...‫‏‬ www.esat.kuleuven.be/electa/publications/fulltexts/pub_1751.pdf‫ -‏‬InfoVis CyberInfrastructure - Chord Network Model‫‏‬ 10 Jul 2004 ... This algorithm provides an implementation of the Chord primitive for the modeling of peer-to-peer networks and to perform search on such ...‫‏‬ iv.slis.indiana.edu/sw/chord-model.html‫مشابه - شده ذخيره -‏‬ 3. Peer-to-peer overlay networks Structured overlay network: Chord ...‫‏‬ overlay network. 21 / 53. Structured overlay network: Chord. Basics. Each peer is assigned a unique m-bit identifier id. Every peer is assumed to store data ...‫‏‬ www.cs.unibo.it/~babaoglu/courses/cas/slides/chord.pdf‫-‏‬ 4. Chord-PKI: A distributed trust infrastructure based on P2P networks Original Research Article Computer Networks, Volume 56, Issue 1, 12 January 2012, Pages 378-398 Agapios Avramidis, Panayiotis Kotzanikolaou, Christos Douligeris, Mike Burmester 5 ML-Chord: A multi-layered P2P resource sharing model Original Research Article Journal of Network and Computer Applications, Volume 32, Issue 3, May 2009, Pages 578-588 Eric Jui-Lin Lu, Yung-Fa Huang, Shu-Chiu Lu 6. A peer-to-peer expressway over Chord Original Research Article Mathematical and Computer Modelling, Volume 44, Issues 7–8, October 2006, Pages 659-677 Hathai Tanta-ngai, Michael McAllister 7 Cross-layer optimized Chord protocol for separated ring convergence in MANET Original Research Article The Journal of China Universities of Posts and Telecommunications, Volume 16, Issue 4, August 2009, Pages 84-90 Jing-qing MEI, Hong JI, Ting LI 8. A semantic-based P2P resource organization model R-Chord Original Research Article Journal of Systems and Software, Volume 79, Issue 11, November 2006, Pages 1619-1631 Jie Liu, Hai Zhuge 9. Topology-aware peer-to-peer overlay network for Ad-hoc Original Research Article The Journal of China Universities of Posts and Telecommunications, Volume 16, Issue 1, February 2009, Pages 111-115 10. Super-peer-based routing strategies for RDF-based peer-to-peer networks Original Research Article Web Semantics: Science, Services and Agents on the World Wide Web, Volume 1, Issue 2, February 2004, Pages 177-186 Wolfgang Nejdl, Martin Wolpers, Wolf Siberski, Christoph Schmitz, Mario Schlosser, Ingo Brunkhorst, Alexander Löser 139 All Rights Reserved © 2012 IJARCET