SlideShare a Scribd company logo
1 of 9
Download to read offline
Sundarapandian et al. (Eds) : ACITY, AIAA, CNSA, DPPR, NeCoM, WeST, DMS, P2PTM, VLSI - 2013
pp. 165–173, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3417
HAMALT : GENETICS BASED PEER-TO-
PEER NETWORK ARCHITECTURE TO
ENCOURAGE THE COOPERATION OF
SELFISH NODES
T. C. Jermin Jeaunita1
,T. C. Jermin Jersha2
1
Department of Computer Science and Engineering,
PESIT Bangalore South Campus, Bangalore, India
jerminjeaunitatc@pes.edu
2
Department of Computer Science and Engineering,
P.S.V. Padmavathy Engineering College, Chennai, India
jerminjershatc@gmail.com
ABSTRACT
Since its inception, Internet has grown tremendously not only in the size of its customers but
also with the technology used behind to run it. For the well ex-istence and proper development
of Peer-to-Peer Networks, all nodes in the overlay must be cooperative and donate their
resources for any other peer. The paper dis-cusses the reason of peers being selfish, causes of
selfish peers and the methods used so far to resolve selfish peers problem. A Genetic Algorithm
based solution has been proposed in this paper that solves the selfish nodes problem in Peer-to-
Peer Networks and that also encourages the cooperation among all nodes in the overlay. An
architecture HAMALT is proposed in this paper for disseminating altruism among the peers.
KEYWORDS
Altruism, Genetics, Kin Selection, Overlay, Peer-to-Peer Networks, Selfish Nodes.
1. INTRODUCTION
In peer to peer networks, a peer takes up the task of a master as well as slave; a client and a
server; a requester and a provider. These peers are overlaid on the Internet for information
sharing, hardware or software resource sharing, instant communication, on demand audio or
video sharing and so on. For successful survival of a network that is made for such purpose, the
well cooperation of all the peers in the network is required. But there will be some coward and
selfish peers among the good peers that may stop the other peers in achieving the sole purpose of
the network and threaten the proper subsistence of the network. Such peers are called as selfish
nodes or free riders as they utilize the network for their benefit and sit inoperative otherwise and
this practice of such nodes is termed as leeching.
166 Computer Science & Information Technology (CS & IT)
Peers may be selfish for various purposes. In Peer-to-Peer networks which are used for various
applications including social networking, a malicious peer may try to acquire the personal
information of other peers to threaten them or for cost. When such misbehaving node is detected
through the shared history mechanism[1] or trust mechanism[2], and when the node has learnt
about this detection of its behavior, it can leave the network and join the same network with
different identity. Such type of nodes is called as white-washers [3]. Some peer-to-peer networks
punish such deviant nodes and when a new node joins the network and misinterpreted as a
deviant node, the node might be discouraged [4]. Some Peer-to-Peer networks are built with tit-
for-tat strategy, where in a peer is allowed to access a resource based on its interaction with the
corresponding node before the case. This leads to the discouragement of strange or new nodes
after joining the network that obviously would not have had any interaction before with the peer it
requested. This may inculcate selfishness in the new node which it can reflect later, when it
receives a request. A node may also act selfish to increase its own utility and to reduce overheads
[5]. They may go selfish about their limited battery power, bandwidth availability and
transmission speed.
The free loaders can be treated in various ways. They can be deprived from accessing the
network. Authors of reference [6] proposed an approach to punish the free riders by forbidding
them to download files from the network if their utility value is lower than the size of the
requested file. The requests submitted by the selfish nodes can be ignored or the TTL(Time to
Live) of these request messages can be reduced[7]. A selfish peer if identified needs to pay a fine
in the form of packet sending cost, which means the deviant node has to send some n number of
penalty packets to continue in the network. A selfish node receives low QoS while a cooperative
node receives high QoS.
The growth of selfish nodes worsens the continued existence of the network in various ways. It
may also give wrong reputation to improve its incentive[8]. Some nodes are socially selfish such
that they share resources to other peers which are only socially tied with them. Some peers may
share with peers of stronger social tie than with weaker social tie. A selfish node may give wrong
routing information or may devoid from forwarding routing packets, which may lead to longest
path, more cost and wastage of resources. Peers may also deviate from forwarding data packets to
any other peer proving individual selfishness. A selfish peer may utilize the services provided by
other nodes in spite of concern of the resources of other peers. A selfish node may change its
identity or neighbor to utilize the resources, so that it will not be identified as deviant node.
This paper proposes a new and interesting solution to resolve the free loaders problem by
appropriately choosing the neighbor peers and keep the peers encouraging incessantly.
Developing a framework to dole out altruism in the network will be a touchstone if the total
evolutionary change of a network is also considered. The trait of a node to behave selfish is
considered as evolved right from the self organization of the network. Hence for effective as well
as efficient self organization of the network the problem is considered as a natural selection
process of Genetics. Instead of considering socially tied peers as a drawback in the network, since
they share information only with their socially tied peers, this paper considers the psychology of
peers for forming a network of altruistic peers. Hence the architecture proposed is named as
‘HAMALT’- a Hamilton Rule based Altruism Dissemination.
The remaining sections of the paper are organized as follows. Section 2 discusses the concepts of
Genetics used for the proposed architecture. Section 3 describes the proposed HAMALT
Computer Science & Information Technology (CS & IT) 167
architecture. Mathematical proofs of the proposed lemmas that make the architecture are
elaborated in section 4. Section 5 concludes the usefulness of the proposed framework.
2. GENETICS
Genetics is a scientific discipline that deals with the genes that are responsible for heredity of a
living organism, and more specifically the physical or character trait of an organism. A gene can
take various forms and each form of a same gene is called an allele. So literally an allele becomes
responsible for the different observable or non observable traits present in any organism. Genes
emanates phenes, as if genes are the biochemical instructions in the form of alleles in organisms
while phenes are the observable characteristic of the organism itself. Hence the phenotype
directly relates to the process of natural selection in organisms. Natural selection can be explained
as the statistically consistent difference in reproductive success or fitness among phenotypes.
Even more specific is the kin selection strategy of genetics that favors the reproductive success
among relatives in-spite of an organism’s own cost or survival.
2.1 Kin Selection
Genetics define kin selection as a theory of organisms helping their relatives than to any others, in
spite of its own well being or survival. This leads to the transfer of a part or whole of the altruistic
allele to the later generation of the selected kin.
2.2 Inclusive Fiteness
Inclusive fitness theory plays a vital role in learning the evolution of social behavior[9-12]. It is
also said that inclusive fitness improves the phenotypic success of organisms by their altruistic
social trait. Hence the genetic endowment of altruistic trait is considered as a predictor in the
proposed mechanism. The goal of the proposal is to disseminate the fecundity of altruism among
the peers of the network, so as to improve the coordination of all peers in the network.
3. SYSTEM MODEL
3.1 Problem Description
The system is considered as an overlay network with the peers ready to share their resources and
the peers waiting to collect resources of their interest from other peers. If none other than few
peers are ready to share their resources, the network either fails or very soon become a
master/slave overlay network, and the goal of the Peer-to-Peer network may not be able to attain.
Hence this paper proposes a framework called ‘HAMALT’ – a Hamilton Rule based Altruism
Dissemination. The paper discusses solutions to keep all the peers active and encouraged for
altruism.
3.2 Parameters Used
The parameters used in the proposed framework are tabularized in Table 1.
168 Computer Science & Information Technology (CS & IT)
Table 1: Parameters Description
Parameters Description
Ai Inclusive fitness responsible for altruism
ai Individual fitness of any peer i
Vi Average contribution of any peer i’s cluster of all two
hop peers
Ci Contribution of peer i to any other peer in the network
Cvi Summation of contributions of all one hop peers of peer i
rij Degree of connectedness between peer i and peer j
L Loss to the donor
G Gain to the recipient
k Total number of chunks uploaded
δ Quantity of altruistic allele donated to the recipients
Pi Representation of a peer with its nature as i
3.3. HAMALT Architecture
The proposed architecture with only two peers- one as donor and the other as recipient is modeled
in Fig. (1). The working consists of two phases. In phase 1, every peer node calculates the
altruistic fitness of itself using the fitness of other peers. The fitness is calculated using the
contribution factor of the peer and its neighbors. Since the altruistic fitness depends on other
peer’s altruism, it is claimed that altruism of any peer encourages the other related and neighbor
peers. The goal of Phase 2, is to spread altruism to the next generation. To keep all the nodes
encouraged throughout the network’s lifetime, it is not enough only to encourage the nodes to be
altruistic. But at the same time, altruism itself must be transmitted from one generation to the
next.
Computer Science & Information Technology (CS & IT)
Fig.1. HAMALT Architecture with two peers
of altruism and altruistic allele dissemination.
The contribution calculator calculates the contribution factor using the contribution factor
exchange process. The allowances that can be provided for a donor node or if the node is selfish,
necessary action to be taken is decided using the benefits calculator. The quantity of altruistic
allele received by the recipients is also fed to the benefits calculator in case the node is a recipient
so that the node is stimulated to be altruistic.
4. SYSTEM DESIGN
The two phases of the proposed framework are explained with mathematical proofs in the
following subsections.
4. 1 Phase 1: Dependence of altruism
Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate
neighbors or can be called as kin peers. Every peer tries to improve its own fitness for the
survival in the network which will happen only if the peer possesses altruism. Inclusive fitness
denoted as Ai of a peer i is found as
Where ai is the individual fitness of a peer
of all two hop nodes. The personal fitness or individual fitness of a peer is given by
Ci is the contribution factor of peer
of contributions of all one hop peers of peer
Computer Science & Information Technology (CS & IT)
HAMALT Architecture with two peers- donor and recipient demonstrating the dependence
altruism and altruistic allele dissemination.
The contribution calculator calculates the contribution factor using the contribution factor
exchange process. The allowances that can be provided for a donor node or if the node is selfish,
o be taken is decided using the benefits calculator. The quantity of altruistic
allele received by the recipients is also fed to the benefits calculator in case the node is a recipient
so that the node is stimulated to be altruistic.
two phases of the proposed framework are explained with mathematical proofs in the
4. 1 Phase 1: Dependence of altruism
Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate
can be called as kin peers. Every peer tries to improve its own fitness for the
survival in the network which will happen only if the peer possesses altruism. Inclusive fitness
denoted as Ai of a peer i is found as
Ai = ai / Vi (1)
Where ai is the individual fitness of a peer i and Vi is the average contribution of a peer i’s cluster
of all two hop nodes. The personal fitness or individual fitness of a peer is given by
ai = Ci + Cvi (2)
Ci is the contribution factor of peer i to any other peer in the network and Cvi is the summation
of contributions of all one hop peers of peer i, as shown in equ. (3).
169
donor and recipient demonstrating the dependence
The contribution calculator calculates the contribution factor using the contribution factor
exchange process. The allowances that can be provided for a donor node or if the node is selfish,
o be taken is decided using the benefits calculator. The quantity of altruistic
allele received by the recipients is also fed to the benefits calculator in case the node is a recipient
two phases of the proposed framework are explained with mathematical proofs in the
Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate
can be called as kin peers. Every peer tries to improve its own fitness for the
survival in the network which will happen only if the peer possesses altruism. Inclusive fitness
is the average contribution of a peer i’s cluster
is the summation
170 Computer Science & Information Technology (CS & IT)
‫݅ݒܥ‬ = ∑ ‫.݆݅ݎ‬ ‫݆ܥ‬௝ (3)
Where rij is the degree of connectedness between the peer i and its one hop peers j = 1 to n, n is
maximum number of one hop neighbors of peer i. The kin selection criteria also propose the
selection of degree of relatedness. This degree of relatedness is shown in Fig. (2).
Lemma 1: Altruism of a peer depends on the altruism of the neighbor peers.
Proof: Equations (1) & (2) show the dependence of altruism that discusses about the altruistic
measure of every node which depends on the contribution of a neighbor peer to any other peer.
When one peer’s altruism depends on the altruism of another peer which is directly proportional
to each other, obviously the peer also improves the altruistic measure of the neighbor peer. The
degree of connectedness plays a major role to maintain the altruistic fitness and it is considered
that r ≤1.
Dependence of altruism on other peer is demonstrated using Fig. (3). The figure shows an overlay
of 7 peers. Fitness of peer P1 is calculated from the contribution factor of itself and contribution
of its 1-hop peers (P2, P3, P4, P5). The contribution of peers up to two-hop (P2, P3, P4, P5, P6,
P7), shown in the figure helps to calculate the average contribution of the peer’s population. The
inclusive fitness Ai can be found from these two parameters.
Lemma 2: Personal fitness of a peer is reduced if it is not ready for contribution in the network.
Proof: If a request is neglected by a peer or if the individual altruistic factor Ci is constant for a
specified duration, the individual contribution factor of a peer is reduced. A peer may utilize the
altruistic nature of its neighbor and try to survive in the network without its own contribution as
anyways the altruistic fitness of a neighbor increases its own too. But if allowed will invite more
free riders. In order to avoid such scenario in the network, if a node is not ready to contribute or if
the node goes to sleep mode, its contribution factor is reduced and it may lead to a chance of its
ID added in the Neglected Peers List(NPL). Once if a node is added in the NPL, it is not allowed
to access the benefits of the network.
Fig. 2. Coefficient of Connectedness: The directly connected peers are related by a factor of
r = 0.5 and 0.25 otherwise.
Donor
Peer
Recipient
Peer (j)
Connectedness
(rij)P1 P2 0.5
P2 P3 0.5
P2 P4 0.5
P2 P5 0.5
P1 P3 0.25
P1 P5 0.25
P1 P4 0.25
Computer Science & Information Technology (CS & IT) 171
Fig. 3. Dependence of altruism on other peers
Lemma 3: A closely related peer encourages the altruism of its neighbor peers.
Proof: By Lemma 2, If the inclusive fitness of altruism is reduced, the framework notifies the
intimates about the issue. The neighbor peers, find the relatedness with the selfish peer and sends
an alert to its neighbor for its contribution to the network. The alert sent to the peer varies based
on its relatedness with the other peer. If r = 0.5, the alert carries the recommendation of the selfish
peer to other peers, so that the so far selfish peer might get a request and improve its altruistic
factor. This encourages the peer to come out of selfishness and act altruistic, as well as its chance
of survival to benefit the network is improved.
4.2 Phase 2: Spreading Altruism
According to Hamilton’s rule, altruism spreads to the recipients if the gain to the recipients is
more than the loss to the donor, which is formulated as
L < rG (4)
Where L is the loss factor to the donor, r is the connectedness of the recipient to the donor and G
is the gain factor to the recipient. The formulation represented in equation (4), had also revealed
that the donor’s fitness is also improved by assisting their relative peers[13].
Lemma 4: The peer also donates its altruism to the recipient peer with the resources.
Proof: If the cost of each chunk i of resource is Li, the overall loss factor of a donor for one
upload is given by
‫ܮ‬ = ∑ ‫݅ܮ‬ − ߜ௞
௜ୀଵ (5)
Where k is the total number of chunks, δ is the altruistic allele donated to the recipients. If the
gain of each chunk i of resource is Gi, the overall gain factor of a donor for one download is
given by
‫ܩ‬ = ∑ ‫݅ܩ‬௞
௜ୀଵ (6)
and for simplicity, Gi is calculated from Li and it is given as
‫݅ܩ‬ = ‫݅ܮ‬ + ߜ (7)
δ in equation (7) is the altruistic allele transferred from the donor to the recipient.
172 Computer Science & Information Technology (CS & IT)
Lemma 5: A peer with more gain is more altruistic in the next generation.
Proof: During the content discovery process a peer node searches for a resource for itself or for its
relatives. When this peer identifies the resource and the same in x peers where x ≥ 2, then there
arises a tie for the proper peer as donor. Then a peer P is selected as a donor using the following
criteria.
‫ݔܽ݉ܣ‬ = maxሺ ‫݅݌ܣ‬ሻ ; ݅ = 1 ‫݋ݐ‬ ݊ (8)
Where n is the maximum number of peers with the searched resource and Amax is the maximum
fitness out of those n peers.
The donor peer is Pd,
such that Pd = Pj if Apj = Amax
Where Apj is the fitness of peer Pj. Now Pd will act as the donor peer of next generation which is
because of the altruistic allele δ in its gain factor G that has improved its chance of being a donor.
Lemma 6: A peer with more fitness is recommended for benefits in the network.
Proof: Peers also maintain their interest on resources. When the loss factor L of a peer reaches or
crosses a loss threshold, the peer is recommended for its resources of interest without any request
by its relative peer to other peers in the network. This encourages every peer to be altruistic.
5. CONCLUSION
As the interest and demand for P2P networks accessing is growing day by day, the cooperation
among nodes should attract more nodes to join the network. If the nodes are selfish to take up
other peer’s resources and not donate their resources, it may lead to the shutdown of the network
or the network will be static. Even though many incentive based peer-to-peer resource sharing
approaches exists, an approach based on kin selection is proposed in this paper. Since selfishness
is a character of humanness or many other living organisms, and the solution to solve this trait in
Genetics is proposed as a solution in selfishness problem in Peer-to-Peer networks. Hence this
framework will avoid a peer to behave selfish, and encourage and disseminate altruism in all peers.
REFERENCES
[1] Stefano Arteconi, David Hales, and Ozalp Babaoglu: Greedy Cheating Liars and the ools Who
Believe Them, ESOA 2006, LNAI 4335, pp. 161–175, Springer(2007).
[2] Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao: A routing protocol for socially selfish delay
tolerant networks, Ad Hoc Networks, Elsevier, 2012, Volume 10, Issue 8, Pages 1619–1632 (2012).
[3] Murat Karakaya, Ibrahim Korpeoglu, Ozgur Ulusoy: Counteracting free riding in Peer-to-Peer
networks, Computer Networks, Science Direct, 52: 675–694 (2008).
[4] Alex Friedman and Idit Keidar: Discouraging Selfishness in Lossy Peer-to-Peer Networks, Technion
(2009)
[5] Idit Keidar Roie Melamed Ariel Orda: EquiCast: Scalable Multicast with Selfish Users, ACM, PODC
(2006).
Computer Science & Information Technology (CS & IT) 173
[6] Landon P. Cox, Brian D. Noble: Samsara: Honor Among Thieves in Peer-to-Peer Storage, ACM,
SOSP (2003).
[7] Alberto Blanc, Yi-Kai Liu, Amin Vahdat: Designing Incentives for Peer-to-Peer Routing, IEEE,
INFOCOM (2005).
[8] Michael Sirivianos Xiaowei Yang Stanislaw Jarecski: Dandelion: Cooperative Content Dis-tribution
with Robust Incentives, Usenix (2007).
[9] James A.R. Marshall: Group selection and kin selection: Formally equivalent approaches, Trends in
Ecology and Evolution, Elsevier (2011).
[10] W. D. Hamilton: Innate Social Aptitude of Man: An approach from Evolutionary Genetics, Biosocial
Anthropology. pp. 133–155. Wiley, New York. Hardin, G. (1968).
[11] Steven A Frank: George Price’s Contributions to Evolutionary Genetics, Journal of Evolutio nary
Biology, Elsevier (1995).
[12] B. Brembs: Hamilton’s theory, Encyclopedia of Genetics, Academic Press (2001).
[13] (Online) www.wwnorton.com

More Related Content

What's hot

Cite track presentation
Cite track presentationCite track presentation
Cite track presentationAmir Razmjou
 
Master thesis presentation
Master thesis presentation Master thesis presentation
Master thesis presentation Jessica Russell
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measuresdnac
 
11 Network Experiments and Interventions
11 Network Experiments and Interventions11 Network Experiments and Interventions
11 Network Experiments and Interventionsdnac
 
05 Communities in Network
05 Communities in Network05 Communities in Network
05 Communities in Networkdnac
 
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSA QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSijait
 
02 Network Data Collection
02 Network Data Collection02 Network Data Collection
02 Network Data Collectiondnac
 
06 Regression with Networks – EGO Networks and Randomization (2017)
06 Regression with Networks – EGO Networks and Randomization (2017)06 Regression with Networks – EGO Networks and Randomization (2017)
06 Regression with Networks – EGO Networks and Randomization (2017)Duke Network Analysis Center
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...Daniel Katz
 
IRJET- A Survey on Link Prediction Techniques
IRJET-  	  A Survey on Link Prediction TechniquesIRJET-  	  A Survey on Link Prediction Techniques
IRJET- A Survey on Link Prediction TechniquesIRJET Journal
 
Comparison of Online Social Relations in terms of Volume vs. Interaction: A C...
Comparison of Online Social Relations in terms of Volume vs. Interaction: A C...Comparison of Online Social Relations in terms of Volume vs. Interaction: A C...
Comparison of Online Social Relations in terms of Volume vs. Interaction: A C...Haewoon Kwak
 
thesis-final-version-for-viewing
thesis-final-version-for-viewingthesis-final-version-for-viewing
thesis-final-version-for-viewingSanket Patil
 

What's hot (17)

04 Network Data Collection
04 Network Data Collection04 Network Data Collection
04 Network Data Collection
 
06 Community Detection
06 Community Detection06 Community Detection
06 Community Detection
 
01 Network Data Collection (2017)
01 Network Data Collection (2017)01 Network Data Collection (2017)
01 Network Data Collection (2017)
 
Cite track presentation
Cite track presentationCite track presentation
Cite track presentation
 
04 Ego Network Analysis
04 Ego Network Analysis04 Ego Network Analysis
04 Ego Network Analysis
 
Master thesis presentation
Master thesis presentation Master thesis presentation
Master thesis presentation
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
 
11 Network Experiments and Interventions
11 Network Experiments and Interventions11 Network Experiments and Interventions
11 Network Experiments and Interventions
 
05 Communities in Network
05 Communities in Network05 Communities in Network
05 Communities in Network
 
11 Keynote (2017)
11 Keynote (2017)11 Keynote (2017)
11 Keynote (2017)
 
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSA QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
 
02 Network Data Collection
02 Network Data Collection02 Network Data Collection
02 Network Data Collection
 
06 Regression with Networks – EGO Networks and Randomization (2017)
06 Regression with Networks – EGO Networks and Randomization (2017)06 Regression with Networks – EGO Networks and Randomization (2017)
06 Regression with Networks – EGO Networks and Randomization (2017)
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
 
IRJET- A Survey on Link Prediction Techniques
IRJET-  	  A Survey on Link Prediction TechniquesIRJET-  	  A Survey on Link Prediction Techniques
IRJET- A Survey on Link Prediction Techniques
 
Comparison of Online Social Relations in terms of Volume vs. Interaction: A C...
Comparison of Online Social Relations in terms of Volume vs. Interaction: A C...Comparison of Online Social Relations in terms of Volume vs. Interaction: A C...
Comparison of Online Social Relations in terms of Volume vs. Interaction: A C...
 
thesis-final-version-for-viewing
thesis-final-version-for-viewingthesis-final-version-for-viewing
thesis-final-version-for-viewing
 

Viewers also liked

AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITYAN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITYcsandit
 
AUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKS
AUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKSAUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKS
AUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKScsandit
 
AN APPROACH FOR SOFTWARE EFFORT ESTIMATION USING FUZZY NUMBERS AND GENETIC AL...
AN APPROACH FOR SOFTWARE EFFORT ESTIMATION USING FUZZY NUMBERS AND GENETIC AL...AN APPROACH FOR SOFTWARE EFFORT ESTIMATION USING FUZZY NUMBERS AND GENETIC AL...
AN APPROACH FOR SOFTWARE EFFORT ESTIMATION USING FUZZY NUMBERS AND GENETIC AL...csandit
 
DESIGN OF A RULE BASED HINDI LEMMATIZER
DESIGN OF A RULE BASED HINDI LEMMATIZERDESIGN OF A RULE BASED HINDI LEMMATIZER
DESIGN OF A RULE BASED HINDI LEMMATIZERcsandit
 
SEMANTIC WEB QUERY ON EGOVERNANCE DATA AND DESIGNING ONTOLOGY FOR AGRICULTURE...
SEMANTIC WEB QUERY ON EGOVERNANCE DATA AND DESIGNING ONTOLOGY FOR AGRICULTURE...SEMANTIC WEB QUERY ON EGOVERNANCE DATA AND DESIGNING ONTOLOGY FOR AGRICULTURE...
SEMANTIC WEB QUERY ON EGOVERNANCE DATA AND DESIGNING ONTOLOGY FOR AGRICULTURE...csandit
 
SINGLE FAULT DETECTION AND DIAGNOSIS TECHNIQUE FOR DIGITAL MICRO-FLUIDIC BASE...
SINGLE FAULT DETECTION AND DIAGNOSIS TECHNIQUE FOR DIGITAL MICRO-FLUIDIC BASE...SINGLE FAULT DETECTION AND DIAGNOSIS TECHNIQUE FOR DIGITAL MICRO-FLUIDIC BASE...
SINGLE FAULT DETECTION AND DIAGNOSIS TECHNIQUE FOR DIGITAL MICRO-FLUIDIC BASE...csandit
 
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...csandit
 
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...csandit
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
 
Soc nanobased integrated
Soc nanobased integratedSoc nanobased integrated
Soc nanobased integratedcsandit
 
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...csandit
 
On the modeling of
On the modeling ofOn the modeling of
On the modeling ofcsandit
 
Enhancing an atl transformation
Enhancing an atl transformationEnhancing an atl transformation
Enhancing an atl transformationcsandit
 
Pdd crawler a focused web
Pdd crawler  a focused webPdd crawler  a focused web
Pdd crawler a focused webcsandit
 
Low altitude airships for seamless
Low altitude airships for seamlessLow altitude airships for seamless
Low altitude airships for seamlesscsandit
 
Biografa paramore
Biografa paramoreBiografa paramore
Biografa paramoreLizy Novo
 
Podio HD TV setembro
Podio HD TV setembroPodio HD TV setembro
Podio HD TV setembroLuiz Fausto
 
Stress diary guide 12. coping style
Stress diary guide 12. coping styleStress diary guide 12. coping style
Stress diary guide 12. coping styleGino Norris
 

Viewers also liked (20)

AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITYAN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
 
AUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKS
AUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKSAUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKS
AUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKS
 
AN APPROACH FOR SOFTWARE EFFORT ESTIMATION USING FUZZY NUMBERS AND GENETIC AL...
AN APPROACH FOR SOFTWARE EFFORT ESTIMATION USING FUZZY NUMBERS AND GENETIC AL...AN APPROACH FOR SOFTWARE EFFORT ESTIMATION USING FUZZY NUMBERS AND GENETIC AL...
AN APPROACH FOR SOFTWARE EFFORT ESTIMATION USING FUZZY NUMBERS AND GENETIC AL...
 
DESIGN OF A RULE BASED HINDI LEMMATIZER
DESIGN OF A RULE BASED HINDI LEMMATIZERDESIGN OF A RULE BASED HINDI LEMMATIZER
DESIGN OF A RULE BASED HINDI LEMMATIZER
 
SEMANTIC WEB QUERY ON EGOVERNANCE DATA AND DESIGNING ONTOLOGY FOR AGRICULTURE...
SEMANTIC WEB QUERY ON EGOVERNANCE DATA AND DESIGNING ONTOLOGY FOR AGRICULTURE...SEMANTIC WEB QUERY ON EGOVERNANCE DATA AND DESIGNING ONTOLOGY FOR AGRICULTURE...
SEMANTIC WEB QUERY ON EGOVERNANCE DATA AND DESIGNING ONTOLOGY FOR AGRICULTURE...
 
SINGLE FAULT DETECTION AND DIAGNOSIS TECHNIQUE FOR DIGITAL MICRO-FLUIDIC BASE...
SINGLE FAULT DETECTION AND DIAGNOSIS TECHNIQUE FOR DIGITAL MICRO-FLUIDIC BASE...SINGLE FAULT DETECTION AND DIAGNOSIS TECHNIQUE FOR DIGITAL MICRO-FLUIDIC BASE...
SINGLE FAULT DETECTION AND DIAGNOSIS TECHNIQUE FOR DIGITAL MICRO-FLUIDIC BASE...
 
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
 
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
Soc nanobased integrated
Soc nanobased integratedSoc nanobased integrated
Soc nanobased integrated
 
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
 
On the modeling of
On the modeling ofOn the modeling of
On the modeling of
 
Enhancing an atl transformation
Enhancing an atl transformationEnhancing an atl transformation
Enhancing an atl transformation
 
Pdd crawler a focused web
Pdd crawler  a focused webPdd crawler  a focused web
Pdd crawler a focused web
 
Low altitude airships for seamless
Low altitude airships for seamlessLow altitude airships for seamless
Low altitude airships for seamless
 
Biografa paramore
Biografa paramoreBiografa paramore
Biografa paramore
 
Podio HD TV setembro
Podio HD TV setembroPodio HD TV setembro
Podio HD TV setembro
 
Stress diary guide 12. coping style
Stress diary guide 12. coping styleStress diary guide 12. coping style
Stress diary guide 12. coping style
 
Test
TestTest
Test
 
Actividades
ActividadesActividades
Actividades
 

Similar to HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COOPERATION OF SELFISH NODES

Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...eSAT Publishing House
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
 
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEM
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEMA COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEM
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEMcscpconf
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systemsijp2p
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systemsijp2p
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systemsijp2p
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systemsijp2p
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systemsijp2p
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systemsijp2p
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksIJNSA Journal
 
Dynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer ArchitecturesDynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer ArchitecturesZhenyun Zhuang
 
New Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community DetectionNew Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community DetectionIRJET Journal
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
 
Resume Yourself Examples Essay Writing, Myself Essa
Resume Yourself Examples Essay Writing, Myself EssaResume Yourself Examples Essay Writing, Myself Essa
Resume Yourself Examples Essay Writing, Myself EssaPamela Williams
 
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and SecurityAnonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Securityijceronline
 
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...Rick Vogel
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
Dynamic analysis of agent network in self organisation using service level ag...
Dynamic analysis of agent network in self organisation using service level ag...Dynamic analysis of agent network in self organisation using service level ag...
Dynamic analysis of agent network in self organisation using service level ag...inventionjournals
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
 

Similar to HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COOPERATION OF SELFISH NODES (20)

Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
 
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEM
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEMA COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEM
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEM
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
 
Dynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer ArchitecturesDynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer Architectures
 
New Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community DetectionNew Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community Detection
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
 
Network literacy-high-res
Network literacy-high-resNetwork literacy-high-res
Network literacy-high-res
 
Resume Yourself Examples Essay Writing, Myself Essa
Resume Yourself Examples Essay Writing, Myself EssaResume Yourself Examples Essay Writing, Myself Essa
Resume Yourself Examples Essay Writing, Myself Essa
 
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and SecurityAnonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Security
 
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
Dynamic analysis of agent network in self organisation using service level ag...
Dynamic analysis of agent network in self organisation using service level ag...Dynamic analysis of agent network in self organisation using service level ag...
Dynamic analysis of agent network in self organisation using service level ag...
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COOPERATION OF SELFISH NODES

  • 1. Sundarapandian et al. (Eds) : ACITY, AIAA, CNSA, DPPR, NeCoM, WeST, DMS, P2PTM, VLSI - 2013 pp. 165–173, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3417 HAMALT : GENETICS BASED PEER-TO- PEER NETWORK ARCHITECTURE TO ENCOURAGE THE COOPERATION OF SELFISH NODES T. C. Jermin Jeaunita1 ,T. C. Jermin Jersha2 1 Department of Computer Science and Engineering, PESIT Bangalore South Campus, Bangalore, India jerminjeaunitatc@pes.edu 2 Department of Computer Science and Engineering, P.S.V. Padmavathy Engineering College, Chennai, India jerminjershatc@gmail.com ABSTRACT Since its inception, Internet has grown tremendously not only in the size of its customers but also with the technology used behind to run it. For the well ex-istence and proper development of Peer-to-Peer Networks, all nodes in the overlay must be cooperative and donate their resources for any other peer. The paper dis-cusses the reason of peers being selfish, causes of selfish peers and the methods used so far to resolve selfish peers problem. A Genetic Algorithm based solution has been proposed in this paper that solves the selfish nodes problem in Peer-to- Peer Networks and that also encourages the cooperation among all nodes in the overlay. An architecture HAMALT is proposed in this paper for disseminating altruism among the peers. KEYWORDS Altruism, Genetics, Kin Selection, Overlay, Peer-to-Peer Networks, Selfish Nodes. 1. INTRODUCTION In peer to peer networks, a peer takes up the task of a master as well as slave; a client and a server; a requester and a provider. These peers are overlaid on the Internet for information sharing, hardware or software resource sharing, instant communication, on demand audio or video sharing and so on. For successful survival of a network that is made for such purpose, the well cooperation of all the peers in the network is required. But there will be some coward and selfish peers among the good peers that may stop the other peers in achieving the sole purpose of the network and threaten the proper subsistence of the network. Such peers are called as selfish nodes or free riders as they utilize the network for their benefit and sit inoperative otherwise and this practice of such nodes is termed as leeching.
  • 2. 166 Computer Science & Information Technology (CS & IT) Peers may be selfish for various purposes. In Peer-to-Peer networks which are used for various applications including social networking, a malicious peer may try to acquire the personal information of other peers to threaten them or for cost. When such misbehaving node is detected through the shared history mechanism[1] or trust mechanism[2], and when the node has learnt about this detection of its behavior, it can leave the network and join the same network with different identity. Such type of nodes is called as white-washers [3]. Some peer-to-peer networks punish such deviant nodes and when a new node joins the network and misinterpreted as a deviant node, the node might be discouraged [4]. Some Peer-to-Peer networks are built with tit- for-tat strategy, where in a peer is allowed to access a resource based on its interaction with the corresponding node before the case. This leads to the discouragement of strange or new nodes after joining the network that obviously would not have had any interaction before with the peer it requested. This may inculcate selfishness in the new node which it can reflect later, when it receives a request. A node may also act selfish to increase its own utility and to reduce overheads [5]. They may go selfish about their limited battery power, bandwidth availability and transmission speed. The free loaders can be treated in various ways. They can be deprived from accessing the network. Authors of reference [6] proposed an approach to punish the free riders by forbidding them to download files from the network if their utility value is lower than the size of the requested file. The requests submitted by the selfish nodes can be ignored or the TTL(Time to Live) of these request messages can be reduced[7]. A selfish peer if identified needs to pay a fine in the form of packet sending cost, which means the deviant node has to send some n number of penalty packets to continue in the network. A selfish node receives low QoS while a cooperative node receives high QoS. The growth of selfish nodes worsens the continued existence of the network in various ways. It may also give wrong reputation to improve its incentive[8]. Some nodes are socially selfish such that they share resources to other peers which are only socially tied with them. Some peers may share with peers of stronger social tie than with weaker social tie. A selfish node may give wrong routing information or may devoid from forwarding routing packets, which may lead to longest path, more cost and wastage of resources. Peers may also deviate from forwarding data packets to any other peer proving individual selfishness. A selfish peer may utilize the services provided by other nodes in spite of concern of the resources of other peers. A selfish node may change its identity or neighbor to utilize the resources, so that it will not be identified as deviant node. This paper proposes a new and interesting solution to resolve the free loaders problem by appropriately choosing the neighbor peers and keep the peers encouraging incessantly. Developing a framework to dole out altruism in the network will be a touchstone if the total evolutionary change of a network is also considered. The trait of a node to behave selfish is considered as evolved right from the self organization of the network. Hence for effective as well as efficient self organization of the network the problem is considered as a natural selection process of Genetics. Instead of considering socially tied peers as a drawback in the network, since they share information only with their socially tied peers, this paper considers the psychology of peers for forming a network of altruistic peers. Hence the architecture proposed is named as ‘HAMALT’- a Hamilton Rule based Altruism Dissemination. The remaining sections of the paper are organized as follows. Section 2 discusses the concepts of Genetics used for the proposed architecture. Section 3 describes the proposed HAMALT
  • 3. Computer Science & Information Technology (CS & IT) 167 architecture. Mathematical proofs of the proposed lemmas that make the architecture are elaborated in section 4. Section 5 concludes the usefulness of the proposed framework. 2. GENETICS Genetics is a scientific discipline that deals with the genes that are responsible for heredity of a living organism, and more specifically the physical or character trait of an organism. A gene can take various forms and each form of a same gene is called an allele. So literally an allele becomes responsible for the different observable or non observable traits present in any organism. Genes emanates phenes, as if genes are the biochemical instructions in the form of alleles in organisms while phenes are the observable characteristic of the organism itself. Hence the phenotype directly relates to the process of natural selection in organisms. Natural selection can be explained as the statistically consistent difference in reproductive success or fitness among phenotypes. Even more specific is the kin selection strategy of genetics that favors the reproductive success among relatives in-spite of an organism’s own cost or survival. 2.1 Kin Selection Genetics define kin selection as a theory of organisms helping their relatives than to any others, in spite of its own well being or survival. This leads to the transfer of a part or whole of the altruistic allele to the later generation of the selected kin. 2.2 Inclusive Fiteness Inclusive fitness theory plays a vital role in learning the evolution of social behavior[9-12]. It is also said that inclusive fitness improves the phenotypic success of organisms by their altruistic social trait. Hence the genetic endowment of altruistic trait is considered as a predictor in the proposed mechanism. The goal of the proposal is to disseminate the fecundity of altruism among the peers of the network, so as to improve the coordination of all peers in the network. 3. SYSTEM MODEL 3.1 Problem Description The system is considered as an overlay network with the peers ready to share their resources and the peers waiting to collect resources of their interest from other peers. If none other than few peers are ready to share their resources, the network either fails or very soon become a master/slave overlay network, and the goal of the Peer-to-Peer network may not be able to attain. Hence this paper proposes a framework called ‘HAMALT’ – a Hamilton Rule based Altruism Dissemination. The paper discusses solutions to keep all the peers active and encouraged for altruism. 3.2 Parameters Used The parameters used in the proposed framework are tabularized in Table 1.
  • 4. 168 Computer Science & Information Technology (CS & IT) Table 1: Parameters Description Parameters Description Ai Inclusive fitness responsible for altruism ai Individual fitness of any peer i Vi Average contribution of any peer i’s cluster of all two hop peers Ci Contribution of peer i to any other peer in the network Cvi Summation of contributions of all one hop peers of peer i rij Degree of connectedness between peer i and peer j L Loss to the donor G Gain to the recipient k Total number of chunks uploaded δ Quantity of altruistic allele donated to the recipients Pi Representation of a peer with its nature as i 3.3. HAMALT Architecture The proposed architecture with only two peers- one as donor and the other as recipient is modeled in Fig. (1). The working consists of two phases. In phase 1, every peer node calculates the altruistic fitness of itself using the fitness of other peers. The fitness is calculated using the contribution factor of the peer and its neighbors. Since the altruistic fitness depends on other peer’s altruism, it is claimed that altruism of any peer encourages the other related and neighbor peers. The goal of Phase 2, is to spread altruism to the next generation. To keep all the nodes encouraged throughout the network’s lifetime, it is not enough only to encourage the nodes to be altruistic. But at the same time, altruism itself must be transmitted from one generation to the next.
  • 5. Computer Science & Information Technology (CS & IT) Fig.1. HAMALT Architecture with two peers of altruism and altruistic allele dissemination. The contribution calculator calculates the contribution factor using the contribution factor exchange process. The allowances that can be provided for a donor node or if the node is selfish, necessary action to be taken is decided using the benefits calculator. The quantity of altruistic allele received by the recipients is also fed to the benefits calculator in case the node is a recipient so that the node is stimulated to be altruistic. 4. SYSTEM DESIGN The two phases of the proposed framework are explained with mathematical proofs in the following subsections. 4. 1 Phase 1: Dependence of altruism Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate neighbors or can be called as kin peers. Every peer tries to improve its own fitness for the survival in the network which will happen only if the peer possesses altruism. Inclusive fitness denoted as Ai of a peer i is found as Where ai is the individual fitness of a peer of all two hop nodes. The personal fitness or individual fitness of a peer is given by Ci is the contribution factor of peer of contributions of all one hop peers of peer Computer Science & Information Technology (CS & IT) HAMALT Architecture with two peers- donor and recipient demonstrating the dependence altruism and altruistic allele dissemination. The contribution calculator calculates the contribution factor using the contribution factor exchange process. The allowances that can be provided for a donor node or if the node is selfish, o be taken is decided using the benefits calculator. The quantity of altruistic allele received by the recipients is also fed to the benefits calculator in case the node is a recipient so that the node is stimulated to be altruistic. two phases of the proposed framework are explained with mathematical proofs in the 4. 1 Phase 1: Dependence of altruism Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate can be called as kin peers. Every peer tries to improve its own fitness for the survival in the network which will happen only if the peer possesses altruism. Inclusive fitness denoted as Ai of a peer i is found as Ai = ai / Vi (1) Where ai is the individual fitness of a peer i and Vi is the average contribution of a peer i’s cluster of all two hop nodes. The personal fitness or individual fitness of a peer is given by ai = Ci + Cvi (2) Ci is the contribution factor of peer i to any other peer in the network and Cvi is the summation of contributions of all one hop peers of peer i, as shown in equ. (3). 169 donor and recipient demonstrating the dependence The contribution calculator calculates the contribution factor using the contribution factor exchange process. The allowances that can be provided for a donor node or if the node is selfish, o be taken is decided using the benefits calculator. The quantity of altruistic allele received by the recipients is also fed to the benefits calculator in case the node is a recipient two phases of the proposed framework are explained with mathematical proofs in the Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate can be called as kin peers. Every peer tries to improve its own fitness for the survival in the network which will happen only if the peer possesses altruism. Inclusive fitness is the average contribution of a peer i’s cluster is the summation
  • 6. 170 Computer Science & Information Technology (CS & IT) ‫݅ݒܥ‬ = ∑ ‫.݆݅ݎ‬ ‫݆ܥ‬௝ (3) Where rij is the degree of connectedness between the peer i and its one hop peers j = 1 to n, n is maximum number of one hop neighbors of peer i. The kin selection criteria also propose the selection of degree of relatedness. This degree of relatedness is shown in Fig. (2). Lemma 1: Altruism of a peer depends on the altruism of the neighbor peers. Proof: Equations (1) & (2) show the dependence of altruism that discusses about the altruistic measure of every node which depends on the contribution of a neighbor peer to any other peer. When one peer’s altruism depends on the altruism of another peer which is directly proportional to each other, obviously the peer also improves the altruistic measure of the neighbor peer. The degree of connectedness plays a major role to maintain the altruistic fitness and it is considered that r ≤1. Dependence of altruism on other peer is demonstrated using Fig. (3). The figure shows an overlay of 7 peers. Fitness of peer P1 is calculated from the contribution factor of itself and contribution of its 1-hop peers (P2, P3, P4, P5). The contribution of peers up to two-hop (P2, P3, P4, P5, P6, P7), shown in the figure helps to calculate the average contribution of the peer’s population. The inclusive fitness Ai can be found from these two parameters. Lemma 2: Personal fitness of a peer is reduced if it is not ready for contribution in the network. Proof: If a request is neglected by a peer or if the individual altruistic factor Ci is constant for a specified duration, the individual contribution factor of a peer is reduced. A peer may utilize the altruistic nature of its neighbor and try to survive in the network without its own contribution as anyways the altruistic fitness of a neighbor increases its own too. But if allowed will invite more free riders. In order to avoid such scenario in the network, if a node is not ready to contribute or if the node goes to sleep mode, its contribution factor is reduced and it may lead to a chance of its ID added in the Neglected Peers List(NPL). Once if a node is added in the NPL, it is not allowed to access the benefits of the network. Fig. 2. Coefficient of Connectedness: The directly connected peers are related by a factor of r = 0.5 and 0.25 otherwise. Donor Peer Recipient Peer (j) Connectedness (rij)P1 P2 0.5 P2 P3 0.5 P2 P4 0.5 P2 P5 0.5 P1 P3 0.25 P1 P5 0.25 P1 P4 0.25
  • 7. Computer Science & Information Technology (CS & IT) 171 Fig. 3. Dependence of altruism on other peers Lemma 3: A closely related peer encourages the altruism of its neighbor peers. Proof: By Lemma 2, If the inclusive fitness of altruism is reduced, the framework notifies the intimates about the issue. The neighbor peers, find the relatedness with the selfish peer and sends an alert to its neighbor for its contribution to the network. The alert sent to the peer varies based on its relatedness with the other peer. If r = 0.5, the alert carries the recommendation of the selfish peer to other peers, so that the so far selfish peer might get a request and improve its altruistic factor. This encourages the peer to come out of selfishness and act altruistic, as well as its chance of survival to benefit the network is improved. 4.2 Phase 2: Spreading Altruism According to Hamilton’s rule, altruism spreads to the recipients if the gain to the recipients is more than the loss to the donor, which is formulated as L < rG (4) Where L is the loss factor to the donor, r is the connectedness of the recipient to the donor and G is the gain factor to the recipient. The formulation represented in equation (4), had also revealed that the donor’s fitness is also improved by assisting their relative peers[13]. Lemma 4: The peer also donates its altruism to the recipient peer with the resources. Proof: If the cost of each chunk i of resource is Li, the overall loss factor of a donor for one upload is given by ‫ܮ‬ = ∑ ‫݅ܮ‬ − ߜ௞ ௜ୀଵ (5) Where k is the total number of chunks, δ is the altruistic allele donated to the recipients. If the gain of each chunk i of resource is Gi, the overall gain factor of a donor for one download is given by ‫ܩ‬ = ∑ ‫݅ܩ‬௞ ௜ୀଵ (6) and for simplicity, Gi is calculated from Li and it is given as ‫݅ܩ‬ = ‫݅ܮ‬ + ߜ (7) δ in equation (7) is the altruistic allele transferred from the donor to the recipient.
  • 8. 172 Computer Science & Information Technology (CS & IT) Lemma 5: A peer with more gain is more altruistic in the next generation. Proof: During the content discovery process a peer node searches for a resource for itself or for its relatives. When this peer identifies the resource and the same in x peers where x ≥ 2, then there arises a tie for the proper peer as donor. Then a peer P is selected as a donor using the following criteria. ‫ݔܽ݉ܣ‬ = maxሺ ‫݅݌ܣ‬ሻ ; ݅ = 1 ‫݋ݐ‬ ݊ (8) Where n is the maximum number of peers with the searched resource and Amax is the maximum fitness out of those n peers. The donor peer is Pd, such that Pd = Pj if Apj = Amax Where Apj is the fitness of peer Pj. Now Pd will act as the donor peer of next generation which is because of the altruistic allele δ in its gain factor G that has improved its chance of being a donor. Lemma 6: A peer with more fitness is recommended for benefits in the network. Proof: Peers also maintain their interest on resources. When the loss factor L of a peer reaches or crosses a loss threshold, the peer is recommended for its resources of interest without any request by its relative peer to other peers in the network. This encourages every peer to be altruistic. 5. CONCLUSION As the interest and demand for P2P networks accessing is growing day by day, the cooperation among nodes should attract more nodes to join the network. If the nodes are selfish to take up other peer’s resources and not donate their resources, it may lead to the shutdown of the network or the network will be static. Even though many incentive based peer-to-peer resource sharing approaches exists, an approach based on kin selection is proposed in this paper. Since selfishness is a character of humanness or many other living organisms, and the solution to solve this trait in Genetics is proposed as a solution in selfishness problem in Peer-to-Peer networks. Hence this framework will avoid a peer to behave selfish, and encourage and disseminate altruism in all peers. REFERENCES [1] Stefano Arteconi, David Hales, and Ozalp Babaoglu: Greedy Cheating Liars and the ools Who Believe Them, ESOA 2006, LNAI 4335, pp. 161–175, Springer(2007). [2] Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao: A routing protocol for socially selfish delay tolerant networks, Ad Hoc Networks, Elsevier, 2012, Volume 10, Issue 8, Pages 1619–1632 (2012). [3] Murat Karakaya, Ibrahim Korpeoglu, Ozgur Ulusoy: Counteracting free riding in Peer-to-Peer networks, Computer Networks, Science Direct, 52: 675–694 (2008). [4] Alex Friedman and Idit Keidar: Discouraging Selfishness in Lossy Peer-to-Peer Networks, Technion (2009) [5] Idit Keidar Roie Melamed Ariel Orda: EquiCast: Scalable Multicast with Selfish Users, ACM, PODC (2006).
  • 9. Computer Science & Information Technology (CS & IT) 173 [6] Landon P. Cox, Brian D. Noble: Samsara: Honor Among Thieves in Peer-to-Peer Storage, ACM, SOSP (2003). [7] Alberto Blanc, Yi-Kai Liu, Amin Vahdat: Designing Incentives for Peer-to-Peer Routing, IEEE, INFOCOM (2005). [8] Michael Sirivianos Xiaowei Yang Stanislaw Jarecski: Dandelion: Cooperative Content Dis-tribution with Robust Incentives, Usenix (2007). [9] James A.R. Marshall: Group selection and kin selection: Formally equivalent approaches, Trends in Ecology and Evolution, Elsevier (2011). [10] W. D. Hamilton: Innate Social Aptitude of Man: An approach from Evolutionary Genetics, Biosocial Anthropology. pp. 133–155. Wiley, New York. Hardin, G. (1968). [11] Steven A Frank: George Price’s Contributions to Evolutionary Genetics, Journal of Evolutio nary Biology, Elsevier (1995). [12] B. Brembs: Hamilton’s theory, Encyclopedia of Genetics, Academic Press (2001). [13] (Online) www.wwnorton.com