SlideShare a Scribd company logo
1 of 7
Download to read offline
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
1 | P a g e
A Survey Of Free-Ridingbehaviour In Peer-To-Peer Networks
Neha M Qureshi
Assistant professorat Anjuman-I-Islamkalsekar Technical campus
Dr. Saurabh Mehta
Associate professor at Vidyalankar Institute Of Technology
Abstract
This paper present the extensive survey of P2P file sharing network with different
protocols.This paper presents the most highlighted issue in the network that is Free-Riding
issue. Free riding is an important issue for any peer-to-peer system. An extensive analysis of
user traffic on Gnutella shows a significant amount of free riding in the system. Reseachers
have analyse Free-Riding extensively and give various results. They found that nearly 70%
of Gnutella users share no files, and nearly 50% of all responses are returned by the top 1%
of sharing hosts.In this paper we present Bittorent Protocol that can overcome Free-Riding to
a greater extent,and many other methodology. While it is well-known that BitTorrent is
vulnerable to selfish behaviour of the networkbehavior
Key Words: Napster , Gnutella, Bittorent ,freeriding.
Introduction
Peer - to - peer networking, often referred to as P2P, is a class of applications that take
advantage of resources like storage, cycles, content, human presence, etc. available at the
edges of the Internet. It is an emerging model for service distribution. The P2P model has
already been established as an important area of distributed computing where an extremely
large number of users collaborate and share their resources. In contrast to the traditional
centralized server-based service model, i.e., client-server and push models, the P2P model is
characterized by cooperation among peers, decentralization, self-organization, and
heterogeneity. The notion of client or server is dubious here; instead, any peer is eligible to
take the place of any other peer, if the resource constraints are satisfied.It is an alternative
approach to network communication because accessing these decentralized resources means
operating in an environment of unstable connectivity and unpredictable IP addresses, peer-to-
peer nodes must operate outside the DNS and have significant or total autonomy of central
servers. Every participating node acts as both a client and a server – servent.
Fig.1 Peer-to-peer model
Server
Clients
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
2 | P a g e
The peer - to - peer approach is completely different from either the scaling up or scaling out
approach. With P2P, instead of focusing on and attempting to streamline the communication
between the server and its clients, you instead look at ways in which clients can communicate
with each other.In this paper, we present a comprehensive survey of P2P networks protocols
and also we present a survey of Free-Riding problem in the network.
1. PEER-TO-PEER NETWORK
The peer-to-peer (P2P) communications model has emerged a widely deployed alternativeto
the traditional client-server model for many distributed systems. In a typical P2P system,
each node is owned and operated by an independent entity, and the nodes collectively form a
self-organizing, self maintaining network with no central authority[1]. John
Colquhounexamined that in the domain of file-sharing, the problem of server overloading has
been successfully addressed by the use of Peer-to-Peer (P2P) techniques in which users
(peers) supply files – or pieces of files – to each other[2].
Figure2. P2P file sharing
There are certain characteristic properties of a P2P Network as described below:
a. Nodes are autonomous (no administrative authority).
b. Network is dynamic: nodes enter and leave the network “frequently”.
c. Nodes collaborate directly with each other (not through well-known servers).
d. There is no central coordination and database.
e. No peer has a global view of the system.
f. All existing data and services are accessible from any peer, thus global behaviour
emerges from local interactions.
1.1 Major protocols used in P2P network
When we talk about file sharing, there are 3 major protocols used, viz. Napster,
Gnutella, and Kazaa. These protocols are discussed in detail ahead.
2.1.1 Napster
Napster is a file-sharing P2P application that allows people to search for and share MP3
music files through the vast Internet. It was single handedly written by a teenager named
Shawn Fanning (Jeff, 2000). Not only did he develop the application, but he also
pioneered the design of a protocol that would allow peer computers to communicate
directly with each other. This paved a way for more efficient and complex P2P protocols
by other organizations and groups. Shawn Fanning designed Napster protocol in such a
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
3 | P a g e
way that protocol is divided into peer to server communications and P2P
communications. Each message is composed of three fields; they are “length”, “type” and
“data”. The fields of “length” and “type” are 2 byte-long data. The “length” field specifies
the length in bytes of the “data” portion of the message. The “type” field specifies the
type of message and the “data” portion of the message is a plain ASCII string.Bsically
Napster was used to share MP3 music files through Internet.
2.1.2 Gnutella
Gnutella (pronounced "newtella") is a protocol for distributed search. In the early of March
2000, Gnutella was originated by Justin Frankel and Tom Pepper, working under the
Gnullsoft, which is one of the AOL subsidiaries. Although the Gnutella protocol supports a
traditional client/centralized server search paradigm, Gnutella’s distinction is its peer-to-peer,
decentralized model. In this model, every client is a server, and vice versa. These so-called
Gnutella serventsperform tasks normally associated with both clients and servers. They
provide client-side interfaces through which users can issue queries and view search results,
while at the same time they also accept queries from other servents, check for matches
against their local data set, and respond with applicable results. Due to its distributed nature, a
network of servents that implements the Gnutella protocol is highly fault-tolerant, as
operation of the network will not be interrupted if a subset of servents goes offline. Many
open-source developers quickly reverse-engineered Gnutella’s communication protocol and
published a number of Gnutella clones with several improvements, e.g., LimeWire,
BearShear, Gnucleus, XoloX, and Shareaza.
2. FREE-RIDING
It is widely believed that the success of P2P file sharing systems depends upon the quality of
service offered by such systems. Inspite of quality of service there is one more parameter that
reflects the success of P2P file sharing that is quality of the data present in the system. For a
file sharing system, no matter how excellent the lookup capabilities of a system are, or what
speed it offers to download a file, if the system does not have a large and quality files, it will
eventually fail to attract or retain users.This problem is exemplified by the phenomenon of
free riding in many P2P file sharing systems [8]. . The Achilles heel of P2P file-sharing is
Freeriding. This occurs when users use the resources of the P2P network without contributing
back. Free riding is when the user downloads content and doesn’t share it.A recent study [6]
on Gnutella file sharing system shows that as many as 70% of its users don't share any files at
all. This means that these users use the system for free. This behaviour of an individual user
who uses the system resources without contributing anything to the system is the first form of
the Free Ridingproblem. Such users are referred to as free riders [6].
It is based on the principle that the user should download as well as share the content. But
there is no methodology to ensure that the user shares the content. Freeriding is one of the
man issue in P2P networks[7]. In the Gnutella v0.6, 42% of users are free riders and 16% of
all hosts are distributed among the top 2 backbone providers (Asvanund et al., 2003). Since
2000, the number of free riders has increased markedly (Hughes, Coulson, &Walkerdine,
2005)[12]. Free riders significantly decrease the performance of P2P file-sharing systems and
the will to share resources with other peers. In designing incentive compatible P2P networks,
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
4 | P a g e
it is important to understand the characteristics and parameters that affect the degree of free-
riding. The main focus of this paper is free-riding.
2.1 Free-Riding in Gnutella
Eytan Adar and Bernardo A Hubermananalyzed by sampling messages on the Gnutella
network that over a 24-hour period, they found that nearly 70% of Gnutella users share no
files, and nearly 50% of all responses are returned by the top 1% of sharing hosts.[6]
In their analysis they have consider two types of free riding. In the first type, peers that free
ride on Gnutella are those that only download files for themselves without ever providing
files for download by others. The second definition of free riding considers not only the
amount of downloadable content a producer has, but how much of that content is actually
desirable content. This is essentially a quantity versus quality argument that also poses a
social dilemma when there is a cost to the provider to make desirable files available to others.
The provider to make desirable files available to others.[6]
3. BITTORRENT
Bittorrent is a protocol supporting the practice of P2P file sharing that is used to distribute
large amounts of data over the internet. Programmer BRAM COHEN, university of Buffalo,
graduate student in computer science, designed the protocol in April 2001, and released first
version on 2nd July 2001, and final version in 2008.As of January 2012, bitTorrent is utilized
by 150 million active users. BitTorrent is one of the most common protocols for transferring
large files, and peer-to-peer networks have been estimated to collectively account for
approximately 43% to 70% of all Internet traffic (depending on geographical location) as of
February 2009. In November 2004, BitTorrent was responsible for 35% of all Internet traffic.
As of February 2013, BitTorrent was responsible for 3.35% of all worldwide bandwidth,
more than half of the 6% of total bandwidth dedicated to file sharing.
Bittorrent is a file distribution system used for transferring files across a network of
people.As you download a file,BitTorrent places what you download on upload for other
users, when multiple people are downloading the same file at the same time they upload
pieces of the file to each other .BitTorrent pieces together the file you are downloading, to
where the first part of a file you get may be the last part someone else gets.
The BitTorrent protocol can be used to reduce the server and network impact of distributing
large files. Rather than downloading a file from a single source server, the BitTorrent
protocol allows users to join a "swarm" of hosts to download and upload from each other
simultaneously. The protocol is an alternative to the older single source, multiple mirror
sources technique for distributing data, and can work over networks with lower bandwidth.
This lower bandwidth usage also helps prevent large spikes in internet traffic in a given area,
keeping internet speeds higher for all users in general, regardless of whether or not they use
the BitTorrent protocol.
3.1 Mechanism of Bittorent protocol
The BitTorrent protocol divides the file, which is to be shared into small chunks specifically
into 256KB, and share these chunks among the peers. The peers can share the chunks among
themselves in the network.The BitTorrent protocol involves three parties: the server of the
torrent file, the tracker, and the client. The torrent file contains meta-data information of the
file to be downloaded, which includes the tracker’s URL, the file’s name and length, and the
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
5 | P a g e
SHA-1 hash values of individual file chunks. A trackermaintains a list of all the clients that
are currently downloading a certain file (leechers) or have the complete file and only upload
it to others (seeders)[5]. The tracker, the leechers, andthe seeders constitute a
BitTorrentswarm(also referred to as torrent). To download a file, a client: 1) obtains the
corresponding torrent file; 2) contacts the tracker to obtain a partial swarm view, which
usually consists of up to 50 peers; 3) connects to the peers in the partial view; and 4)
downloads file chunks from the seeders and/or exchanges file chunks with the leechers.
Figure3.Bittorent protocol mechanism
3.2 How to solve Free-Riding using Bittorent.
BitTorrent [4] has incorporated a fairness mechanism from the beginning. Although this
mechanism has similarities to the well known tit-for-tat mechanism [3], the mechanism
employed in
BitTorrent distinguishes itself from the classic tit-for-tat mechanism in many respects.
BitTorrent
clients use a tit-for-tat scheme for chunk exchanges: a client always cooperates in the first
move by
uploading to another peer (optimistic unchoking). Thereafter, it uploads to peers that
reciprocally
upload to it. Cohen [5] describes that this strategy leads to cooperation, as the data exchange
between
two peers can be modeled as a repeated prisoner dilemma game and tit-for-tat is the winning
strategy
[5]. According to Peng Shi and KshipraBhawalkar a big breakthrough came with the advent
Of
BitTorrent, which breaks files into many “chunks” and have users obtain files by trading with
peers.
This system now dominates P2P file-sharing, claiming about 33% of all internet bandwidth in
the US
In BitTorrent, each user maintains connections with 4 peers who are uploading to him/her
the most,
and the other peers are “choked”– temporarily dropped as trading partners. The creators of
Bit-
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
6 | P a g e
Torrent argue that this choking algorithm follows the ancient notion of “tit-for-tat” –an eye
for an eye,
a tooth for a tooth–which is one of the best known strategies to the repeated Prisoner’s
Dillemma.
They claim that BitTorrent provides robust incentives against freeriding. According to Jun
and Ahamad [16][13], the problem is that choking in BitTorrent is not strictly “tit-for-tat”:
users perform so-called “optimistic unchoking”–uploading chunks to a random peer for up to
30 seconds [16] to lure the peers with higher upload bandwidths to trade chunks. Jun and
Ahamad showed empirically that in the current BitTorrent system, a user’s average
completion time has little correlation with that user’s upload rate [16][13]. Qiu and Srikant
studied BitTorrent’s performance both analytically and experimentally, and they found that
optimistic unchoking provides opportunities to freeride [17].
These studies demonstrate that BitTorrent does not possess a robust incentive mechanism to
eliminate freeriding.[13]
3.2.1 Other Methodology To Overcome Free-Riding
There have been many incentives based mechanism proposed to achieve freeriding free
network.Proposed schemes include peer auditing [18], upload credits and download debits
[19], utility-based allocation [20],chunk-for-chunk exchange [21], [22], and strict tit-for-tat
choking[16][13].
CONCLUSION
Here in this paper we have discussed the most serious issue in network - Free-riding .The
original problem with freeriding is that it restricts the total throughput of the system, so such
solutions would
only replace freeriding with a greater evil. Here we have shown different methodology to
overcome this issue . The most famous protocol is Bittorrent protocol which can be used to
avoid Free-Riding. The research has shown that BitTorrent provides robust incentives against
freeriding. Some researchers conclude thatbittorent does not effectively overcome
Freeriding. They have found that all currently proposed mechanisms that ensure fairness are
either not robust or overly-restrictive.
ACKNOWLEDGEMENT
The authors would like to thank their staff members and her guide Dr.Saurabh Mehta for the
numerous fruitful discussions on this work.
REFERENCES
[1] Michal Feldman and John”Overcoming Free-Riding Behavior in Peer-to-Peer Systems”.
[2] John Colquhoun ,” A BitTorrent based Peer-to-Peer Database Server”
[3] Nazareno Andrade, Francisco Brasileiro and WalfredoCirne,” Discouraging Free Riding
in a Peer-to-Peer CPU-Sharing Grid”
[4] Thomas Locher, Patrick Moor, Stefan Schmid, Roger Wattenhofer,” Free Riding in
BitTorrent is Cheap”
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
7 | P a g e
[5] Michael Sirivianos Jong Han Park Rex Chen Xiaowei Yang,” Free-riding in BitTorrent
Networks with the Large View Exploit”.
[6] Eytan Adar and Bernardo A. Huberman,” Free Riding on Gnutella”.
[7] Mohan Kumar, R Divya Ravi,” A Minimal Share Approach to Overcome Free Riding in
Peer To Peer Network”.
[8] LakshmishRamaswamy.Ling Liu,” Free Riding: A New Challenge to Peer-to-Peer File
Sharing Systems”.
[9] J.J.D. Mol, J.A. Pouwelse, M. Meulpolder, D.H.J. Epema, and H.J. Sips,” Give-to-Get:
Free-riding-resilient Video-on-Demand in P2P Systems”.
[10]Raymond Lei Xia and Jogesh K Muppala,”A survey of Bittorent Performance”.
[11]Yuh-Min Tseng,Fu-GuiChen,”A free-rider aware reputation system for peer-to-peer file-
sharing networks”,”Expert Systems with Applications”,2011.
[13]Peng Shi KshipraBhawalkarMegaTorrent: An Incentive-Based Solution to Freeriding in
P2P File-Sharing Networks.
[14] B. Cohen. Incentives Build Robustness in BitTorrent.In Proc. 1st Workshop on
Economics of Peer-to-Peer Systems (P2PECON), 2003.
[15] S. Jun and M. Ahamad. Incentives in BitTorrent Induce Free Riding. In Proc. 3rd ACM
SIGCOMM Workshop on Economics of Peer-to-Peer Systems (P2PECON), 2005.
[16] Seung Jun and MoustaqueAhamad. Incentives in bittorrent induce free riding. In
SIGCOMM ’05: Proceedings of the 2005 Conference of the Special Interest Group on Data
Communication, pages 116–121, 2005.
[17]DongyuQiu and R. Srikant.Modeling and performance analysis of bittorrent-like peer-to-
peer networks. In SIGCOMM ’04: Proceedingsof the 2004 Conference of the Special Interest
Group on Data Communication, pages 367–377, 2004.
[18] Dan S. Wallach Tsuen-Wan Ngan and Peter Druschel. Enforcing fair sharing of peer-to-
peer resources. In IPTPS ’03: Proceedings of the 2nd
International Workshop on Peer-to-
peer Systems, 2003.
[19] Paul Judge Minaxi Gupta and MostafaAmmar.A reputation system for peer-to-peer
networks. In NOSSDAV ’03: Proceedings of the 13th
International Workshop on Newtork and
Operating System Support for Digital Audio and Video, pages 144–152, 2003.
[20] LakshmishRamaswamy and Ling Liu. Free riding: A new challenge to peer-to-peer file
sharing systems. In HICSS ’03: Proceedings of the 36th Hawaii International Conference on
System Sciences, 2002.
[21] Kostas G. Anagnostakis and Michael B. Greewald. Exchange-based incentive
mechanisms for peer-to-peer file sharing. In ICDCS ’04: Proceedings of the 24th
International Conference on Distributed Computing Systems, 2004.
[22] Brian Bershad Paul Gauthier and Steven D. Gribble.Dealing with cheaters in anonymous
peer-to-peer networks.Technical report, University of Washington, January 2004. Available
at www:cs:washington:edu=homes=gribble=papers.

More Related Content

What's hot

COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Uvaraj Shan
 
A study of index poisoning in peer topeer
A study of index poisoning in peer topeerA study of index poisoning in peer topeer
A study of index poisoning in peer topeerIJCI JOURNAL
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Reportgkmv
 
Study of the topology mismatch problem in peer to-peer networks
Study of the topology mismatch problem in peer to-peer networksStudy of the topology mismatch problem in peer to-peer networks
Study of the topology mismatch problem in peer to-peer networksAlexander Decker
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksIOSR Journals
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environmentpaperpublications3
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol ReportSridharBR
 
Network traffic locality in a rural african village, ictd, 2012
Network traffic locality in a rural african village, ictd, 2012Network traffic locality in a rural african village, ictd, 2012
Network traffic locality in a rural african village, ictd, 2012Lynn Langit
 
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesA Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesIOSR Journals
 
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...IJCSIS Research Publications
 

What's hot (14)

COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
 
G0434045
G0434045G0434045
G0434045
 
A study of index poisoning in peer topeer
A study of index poisoning in peer topeerA study of index poisoning in peer topeer
A study of index poisoning in peer topeer
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
Study of the topology mismatch problem in peer to-peer networks
Study of the topology mismatch problem in peer to-peer networksStudy of the topology mismatch problem in peer to-peer networks
Study of the topology mismatch problem in peer to-peer networks
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environment
 
D1803022335
D1803022335D1803022335
D1803022335
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
Network traffic locality in a rural african village, ictd, 2012
Network traffic locality in a rural african village, ictd, 2012Network traffic locality in a rural african village, ictd, 2012
Network traffic locality in a rural african village, ictd, 2012
 
IJCA
IJCAIJCA
IJCA
 
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesA Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast Services
 
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
 

Similar to A Survey Of Free-Ridingbehaviour In Peer-To-Peer Networks

FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docxPeer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docxherbertwilson5999
 
Preclusion Measures for Protecting P2P Networks from Malware Spread
Preclusion Measures for Protecting P2P Networks from Malware  SpreadPreclusion Measures for Protecting P2P Networks from Malware  Spread
Preclusion Measures for Protecting P2P Networks from Malware SpreadIOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Copyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer NetworkCopyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer NetworkIJERA Editor
 
FILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEYFILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEYcsandit
 
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...IRJET Journal
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemEditor IJMTER
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!DigitalThinkerHelp
 
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksService Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksIOSR Journals
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptxHananShk
 
ICT349RDines31510992Assign1ResearchEssay
ICT349RDines31510992Assign1ResearchEssayICT349RDines31510992Assign1ResearchEssay
ICT349RDines31510992Assign1ResearchEssayRod Dines
 
Dynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer ArchitecturesDynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer ArchitecturesZhenyun Zhuang
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsWaqas Tariq
 
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Zhenyun Zhuang
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
 

Similar to A Survey Of Free-Ridingbehaviour In Peer-To-Peer Networks (20)

FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docxPeer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
 
Preclusion Measures for Protecting P2P Networks from Malware Spread
Preclusion Measures for Protecting P2P Networks from Malware  SpreadPreclusion Measures for Protecting P2P Networks from Malware  Spread
Preclusion Measures for Protecting P2P Networks from Malware Spread
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Copyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer NetworkCopyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer Network
 
FILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEYFILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEY
 
A370110
A370110A370110
A370110
 
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
 
Ff36968971
Ff36968971Ff36968971
Ff36968971
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksService Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
ICT349RDines31510992Assign1ResearchEssay
ICT349RDines31510992Assign1ResearchEssayICT349RDines31510992Assign1ResearchEssay
ICT349RDines31510992Assign1ResearchEssay
 
Dynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer ArchitecturesDynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer Architectures
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent Systems
 
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 

More from ijiert bestjournal

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMPijiert bestjournal
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...ijiert bestjournal
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFijiert bestjournal
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINEijiert bestjournal
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY ijiert bestjournal
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINijiert bestjournal
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ijiert bestjournal
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...ijiert bestjournal
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...ijiert bestjournal
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR ijiert bestjournal
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTijiert bestjournal
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ijiert bestjournal
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTijiert bestjournal
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH ijiert bestjournal
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW ijiert bestjournal
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSijiert bestjournal
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ijiert bestjournal
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...ijiert bestjournal
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...ijiert bestjournal
 

More from ijiert bestjournal (20)

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERS
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
 
MAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHINGMAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHING
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

A Survey Of Free-Ridingbehaviour In Peer-To-Peer Networks

  • 1. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 3 MARCH2015 1 | P a g e A Survey Of Free-Ridingbehaviour In Peer-To-Peer Networks Neha M Qureshi Assistant professorat Anjuman-I-Islamkalsekar Technical campus Dr. Saurabh Mehta Associate professor at Vidyalankar Institute Of Technology Abstract This paper present the extensive survey of P2P file sharing network with different protocols.This paper presents the most highlighted issue in the network that is Free-Riding issue. Free riding is an important issue for any peer-to-peer system. An extensive analysis of user traffic on Gnutella shows a significant amount of free riding in the system. Reseachers have analyse Free-Riding extensively and give various results. They found that nearly 70% of Gnutella users share no files, and nearly 50% of all responses are returned by the top 1% of sharing hosts.In this paper we present Bittorent Protocol that can overcome Free-Riding to a greater extent,and many other methodology. While it is well-known that BitTorrent is vulnerable to selfish behaviour of the networkbehavior Key Words: Napster , Gnutella, Bittorent ,freeriding. Introduction Peer - to - peer networking, often referred to as P2P, is a class of applications that take advantage of resources like storage, cycles, content, human presence, etc. available at the edges of the Internet. It is an emerging model for service distribution. The P2P model has already been established as an important area of distributed computing where an extremely large number of users collaborate and share their resources. In contrast to the traditional centralized server-based service model, i.e., client-server and push models, the P2P model is characterized by cooperation among peers, decentralization, self-organization, and heterogeneity. The notion of client or server is dubious here; instead, any peer is eligible to take the place of any other peer, if the resource constraints are satisfied.It is an alternative approach to network communication because accessing these decentralized resources means operating in an environment of unstable connectivity and unpredictable IP addresses, peer-to- peer nodes must operate outside the DNS and have significant or total autonomy of central servers. Every participating node acts as both a client and a server – servent. Fig.1 Peer-to-peer model Server Clients
  • 2. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 3 MARCH2015 2 | P a g e The peer - to - peer approach is completely different from either the scaling up or scaling out approach. With P2P, instead of focusing on and attempting to streamline the communication between the server and its clients, you instead look at ways in which clients can communicate with each other.In this paper, we present a comprehensive survey of P2P networks protocols and also we present a survey of Free-Riding problem in the network. 1. PEER-TO-PEER NETWORK The peer-to-peer (P2P) communications model has emerged a widely deployed alternativeto the traditional client-server model for many distributed systems. In a typical P2P system, each node is owned and operated by an independent entity, and the nodes collectively form a self-organizing, self maintaining network with no central authority[1]. John Colquhounexamined that in the domain of file-sharing, the problem of server overloading has been successfully addressed by the use of Peer-to-Peer (P2P) techniques in which users (peers) supply files – or pieces of files – to each other[2]. Figure2. P2P file sharing There are certain characteristic properties of a P2P Network as described below: a. Nodes are autonomous (no administrative authority). b. Network is dynamic: nodes enter and leave the network “frequently”. c. Nodes collaborate directly with each other (not through well-known servers). d. There is no central coordination and database. e. No peer has a global view of the system. f. All existing data and services are accessible from any peer, thus global behaviour emerges from local interactions. 1.1 Major protocols used in P2P network When we talk about file sharing, there are 3 major protocols used, viz. Napster, Gnutella, and Kazaa. These protocols are discussed in detail ahead. 2.1.1 Napster Napster is a file-sharing P2P application that allows people to search for and share MP3 music files through the vast Internet. It was single handedly written by a teenager named Shawn Fanning (Jeff, 2000). Not only did he develop the application, but he also pioneered the design of a protocol that would allow peer computers to communicate directly with each other. This paved a way for more efficient and complex P2P protocols by other organizations and groups. Shawn Fanning designed Napster protocol in such a
  • 3. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 3 MARCH2015 3 | P a g e way that protocol is divided into peer to server communications and P2P communications. Each message is composed of three fields; they are “length”, “type” and “data”. The fields of “length” and “type” are 2 byte-long data. The “length” field specifies the length in bytes of the “data” portion of the message. The “type” field specifies the type of message and the “data” portion of the message is a plain ASCII string.Bsically Napster was used to share MP3 music files through Internet. 2.1.2 Gnutella Gnutella (pronounced "newtella") is a protocol for distributed search. In the early of March 2000, Gnutella was originated by Justin Frankel and Tom Pepper, working under the Gnullsoft, which is one of the AOL subsidiaries. Although the Gnutella protocol supports a traditional client/centralized server search paradigm, Gnutella’s distinction is its peer-to-peer, decentralized model. In this model, every client is a server, and vice versa. These so-called Gnutella serventsperform tasks normally associated with both clients and servers. They provide client-side interfaces through which users can issue queries and view search results, while at the same time they also accept queries from other servents, check for matches against their local data set, and respond with applicable results. Due to its distributed nature, a network of servents that implements the Gnutella protocol is highly fault-tolerant, as operation of the network will not be interrupted if a subset of servents goes offline. Many open-source developers quickly reverse-engineered Gnutella’s communication protocol and published a number of Gnutella clones with several improvements, e.g., LimeWire, BearShear, Gnucleus, XoloX, and Shareaza. 2. FREE-RIDING It is widely believed that the success of P2P file sharing systems depends upon the quality of service offered by such systems. Inspite of quality of service there is one more parameter that reflects the success of P2P file sharing that is quality of the data present in the system. For a file sharing system, no matter how excellent the lookup capabilities of a system are, or what speed it offers to download a file, if the system does not have a large and quality files, it will eventually fail to attract or retain users.This problem is exemplified by the phenomenon of free riding in many P2P file sharing systems [8]. . The Achilles heel of P2P file-sharing is Freeriding. This occurs when users use the resources of the P2P network without contributing back. Free riding is when the user downloads content and doesn’t share it.A recent study [6] on Gnutella file sharing system shows that as many as 70% of its users don't share any files at all. This means that these users use the system for free. This behaviour of an individual user who uses the system resources without contributing anything to the system is the first form of the Free Ridingproblem. Such users are referred to as free riders [6]. It is based on the principle that the user should download as well as share the content. But there is no methodology to ensure that the user shares the content. Freeriding is one of the man issue in P2P networks[7]. In the Gnutella v0.6, 42% of users are free riders and 16% of all hosts are distributed among the top 2 backbone providers (Asvanund et al., 2003). Since 2000, the number of free riders has increased markedly (Hughes, Coulson, &Walkerdine, 2005)[12]. Free riders significantly decrease the performance of P2P file-sharing systems and the will to share resources with other peers. In designing incentive compatible P2P networks,
  • 4. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 3 MARCH2015 4 | P a g e it is important to understand the characteristics and parameters that affect the degree of free- riding. The main focus of this paper is free-riding. 2.1 Free-Riding in Gnutella Eytan Adar and Bernardo A Hubermananalyzed by sampling messages on the Gnutella network that over a 24-hour period, they found that nearly 70% of Gnutella users share no files, and nearly 50% of all responses are returned by the top 1% of sharing hosts.[6] In their analysis they have consider two types of free riding. In the first type, peers that free ride on Gnutella are those that only download files for themselves without ever providing files for download by others. The second definition of free riding considers not only the amount of downloadable content a producer has, but how much of that content is actually desirable content. This is essentially a quantity versus quality argument that also poses a social dilemma when there is a cost to the provider to make desirable files available to others. The provider to make desirable files available to others.[6] 3. BITTORRENT Bittorrent is a protocol supporting the practice of P2P file sharing that is used to distribute large amounts of data over the internet. Programmer BRAM COHEN, university of Buffalo, graduate student in computer science, designed the protocol in April 2001, and released first version on 2nd July 2001, and final version in 2008.As of January 2012, bitTorrent is utilized by 150 million active users. BitTorrent is one of the most common protocols for transferring large files, and peer-to-peer networks have been estimated to collectively account for approximately 43% to 70% of all Internet traffic (depending on geographical location) as of February 2009. In November 2004, BitTorrent was responsible for 35% of all Internet traffic. As of February 2013, BitTorrent was responsible for 3.35% of all worldwide bandwidth, more than half of the 6% of total bandwidth dedicated to file sharing. Bittorrent is a file distribution system used for transferring files across a network of people.As you download a file,BitTorrent places what you download on upload for other users, when multiple people are downloading the same file at the same time they upload pieces of the file to each other .BitTorrent pieces together the file you are downloading, to where the first part of a file you get may be the last part someone else gets. The BitTorrent protocol can be used to reduce the server and network impact of distributing large files. Rather than downloading a file from a single source server, the BitTorrent protocol allows users to join a "swarm" of hosts to download and upload from each other simultaneously. The protocol is an alternative to the older single source, multiple mirror sources technique for distributing data, and can work over networks with lower bandwidth. This lower bandwidth usage also helps prevent large spikes in internet traffic in a given area, keeping internet speeds higher for all users in general, regardless of whether or not they use the BitTorrent protocol. 3.1 Mechanism of Bittorent protocol The BitTorrent protocol divides the file, which is to be shared into small chunks specifically into 256KB, and share these chunks among the peers. The peers can share the chunks among themselves in the network.The BitTorrent protocol involves three parties: the server of the torrent file, the tracker, and the client. The torrent file contains meta-data information of the file to be downloaded, which includes the tracker’s URL, the file’s name and length, and the
  • 5. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 3 MARCH2015 5 | P a g e SHA-1 hash values of individual file chunks. A trackermaintains a list of all the clients that are currently downloading a certain file (leechers) or have the complete file and only upload it to others (seeders)[5]. The tracker, the leechers, andthe seeders constitute a BitTorrentswarm(also referred to as torrent). To download a file, a client: 1) obtains the corresponding torrent file; 2) contacts the tracker to obtain a partial swarm view, which usually consists of up to 50 peers; 3) connects to the peers in the partial view; and 4) downloads file chunks from the seeders and/or exchanges file chunks with the leechers. Figure3.Bittorent protocol mechanism 3.2 How to solve Free-Riding using Bittorent. BitTorrent [4] has incorporated a fairness mechanism from the beginning. Although this mechanism has similarities to the well known tit-for-tat mechanism [3], the mechanism employed in BitTorrent distinguishes itself from the classic tit-for-tat mechanism in many respects. BitTorrent clients use a tit-for-tat scheme for chunk exchanges: a client always cooperates in the first move by uploading to another peer (optimistic unchoking). Thereafter, it uploads to peers that reciprocally upload to it. Cohen [5] describes that this strategy leads to cooperation, as the data exchange between two peers can be modeled as a repeated prisoner dilemma game and tit-for-tat is the winning strategy [5]. According to Peng Shi and KshipraBhawalkar a big breakthrough came with the advent Of BitTorrent, which breaks files into many “chunks” and have users obtain files by trading with peers. This system now dominates P2P file-sharing, claiming about 33% of all internet bandwidth in the US In BitTorrent, each user maintains connections with 4 peers who are uploading to him/her the most, and the other peers are “choked”– temporarily dropped as trading partners. The creators of Bit-
  • 6. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 3 MARCH2015 6 | P a g e Torrent argue that this choking algorithm follows the ancient notion of “tit-for-tat” –an eye for an eye, a tooth for a tooth–which is one of the best known strategies to the repeated Prisoner’s Dillemma. They claim that BitTorrent provides robust incentives against freeriding. According to Jun and Ahamad [16][13], the problem is that choking in BitTorrent is not strictly “tit-for-tat”: users perform so-called “optimistic unchoking”–uploading chunks to a random peer for up to 30 seconds [16] to lure the peers with higher upload bandwidths to trade chunks. Jun and Ahamad showed empirically that in the current BitTorrent system, a user’s average completion time has little correlation with that user’s upload rate [16][13]. Qiu and Srikant studied BitTorrent’s performance both analytically and experimentally, and they found that optimistic unchoking provides opportunities to freeride [17]. These studies demonstrate that BitTorrent does not possess a robust incentive mechanism to eliminate freeriding.[13] 3.2.1 Other Methodology To Overcome Free-Riding There have been many incentives based mechanism proposed to achieve freeriding free network.Proposed schemes include peer auditing [18], upload credits and download debits [19], utility-based allocation [20],chunk-for-chunk exchange [21], [22], and strict tit-for-tat choking[16][13]. CONCLUSION Here in this paper we have discussed the most serious issue in network - Free-riding .The original problem with freeriding is that it restricts the total throughput of the system, so such solutions would only replace freeriding with a greater evil. Here we have shown different methodology to overcome this issue . The most famous protocol is Bittorrent protocol which can be used to avoid Free-Riding. The research has shown that BitTorrent provides robust incentives against freeriding. Some researchers conclude thatbittorent does not effectively overcome Freeriding. They have found that all currently proposed mechanisms that ensure fairness are either not robust or overly-restrictive. ACKNOWLEDGEMENT The authors would like to thank their staff members and her guide Dr.Saurabh Mehta for the numerous fruitful discussions on this work. REFERENCES [1] Michal Feldman and John”Overcoming Free-Riding Behavior in Peer-to-Peer Systems”. [2] John Colquhoun ,” A BitTorrent based Peer-to-Peer Database Server” [3] Nazareno Andrade, Francisco Brasileiro and WalfredoCirne,” Discouraging Free Riding in a Peer-to-Peer CPU-Sharing Grid” [4] Thomas Locher, Patrick Moor, Stefan Schmid, Roger Wattenhofer,” Free Riding in BitTorrent is Cheap”
  • 7. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 3 MARCH2015 7 | P a g e [5] Michael Sirivianos Jong Han Park Rex Chen Xiaowei Yang,” Free-riding in BitTorrent Networks with the Large View Exploit”. [6] Eytan Adar and Bernardo A. Huberman,” Free Riding on Gnutella”. [7] Mohan Kumar, R Divya Ravi,” A Minimal Share Approach to Overcome Free Riding in Peer To Peer Network”. [8] LakshmishRamaswamy.Ling Liu,” Free Riding: A New Challenge to Peer-to-Peer File Sharing Systems”. [9] J.J.D. Mol, J.A. Pouwelse, M. Meulpolder, D.H.J. Epema, and H.J. Sips,” Give-to-Get: Free-riding-resilient Video-on-Demand in P2P Systems”. [10]Raymond Lei Xia and Jogesh K Muppala,”A survey of Bittorent Performance”. [11]Yuh-Min Tseng,Fu-GuiChen,”A free-rider aware reputation system for peer-to-peer file- sharing networks”,”Expert Systems with Applications”,2011. [13]Peng Shi KshipraBhawalkarMegaTorrent: An Incentive-Based Solution to Freeriding in P2P File-Sharing Networks. [14] B. Cohen. Incentives Build Robustness in BitTorrent.In Proc. 1st Workshop on Economics of Peer-to-Peer Systems (P2PECON), 2003. [15] S. Jun and M. Ahamad. Incentives in BitTorrent Induce Free Riding. In Proc. 3rd ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems (P2PECON), 2005. [16] Seung Jun and MoustaqueAhamad. Incentives in bittorrent induce free riding. In SIGCOMM ’05: Proceedings of the 2005 Conference of the Special Interest Group on Data Communication, pages 116–121, 2005. [17]DongyuQiu and R. Srikant.Modeling and performance analysis of bittorrent-like peer-to- peer networks. In SIGCOMM ’04: Proceedingsof the 2004 Conference of the Special Interest Group on Data Communication, pages 367–377, 2004. [18] Dan S. Wallach Tsuen-Wan Ngan and Peter Druschel. Enforcing fair sharing of peer-to- peer resources. In IPTPS ’03: Proceedings of the 2nd International Workshop on Peer-to- peer Systems, 2003. [19] Paul Judge Minaxi Gupta and MostafaAmmar.A reputation system for peer-to-peer networks. In NOSSDAV ’03: Proceedings of the 13th International Workshop on Newtork and Operating System Support for Digital Audio and Video, pages 144–152, 2003. [20] LakshmishRamaswamy and Ling Liu. Free riding: A new challenge to peer-to-peer file sharing systems. In HICSS ’03: Proceedings of the 36th Hawaii International Conference on System Sciences, 2002. [21] Kostas G. Anagnostakis and Michael B. Greewald. Exchange-based incentive mechanisms for peer-to-peer file sharing. In ICDCS ’04: Proceedings of the 24th International Conference on Distributed Computing Systems, 2004. [22] Brian Bershad Paul Gauthier and Steven D. Gribble.Dealing with cheaters in anonymous peer-to-peer networks.Technical report, University of Washington, January 2004. Available at www:cs:washington:edu=homes=gribble=papers.