SlideShare a Scribd company logo
1 of 3
Download to read offline
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 1Page number 1
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Maximizing P2P File Access Availability in
Mobile Ad Hoc Networks though
Replication for Efficient File Sharing
Abstract
File sharing applications in mobile ad hoc networks (MANETs) have
attracted more and more attention in recent years. The efficiency of file querying
suffers from the distinctive properties of such networks including node mobility
and limited communication range and resource. An intuitive method to alleviate
this problem is to create file replicas in the network. However, despite the efforts
on file replication, no research has focused on the global optimal replica creation
with minimum average querying delay. Specifically, current file replication
protocols in mobile ad hoc networks have two shortcomings. First, they lack a rule
to allocate limited resources to different files in order to minimize the average
querying delay. Second, they simply consider storage as available resources for
replicas, but neglect the fact that the file holders’ frequency of meeting other nodes
also plays an important role in determining file availability. Actually, a node that
has a higher meeting frequency with others provides higher availability to its files.
This becomes even more evident in sparsely distributed MANETs, in which nodes
meet disruptively. In this paper, we introduce a new concept of resource for file
replication, which considers both node storage and meeting frequency. We
theoretically study the influence of resource allocation on the average querying
delay and derive a resource allocation rule to minimize the average querying delay.
We further propose a distributed file replication protocol to realize the proposed
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 2Page number 2
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
rule. Extensive trace-driven experiments with synthesized traces and real traces
show that our protocol can achieve shorter average querying delay at a lower cost
than current replication protocols.
EXISTING SYSTEM
The efficiency of file querying suffers from the distinctive properties of such
networks including node mobility and limited communication range and resource.
DRAWBACK OF EXISTING SYSTEM
 File querying delay is always a main concern in a file sharing system.
 Redundant replicas are easily created.
PROPOSED SYSTEM
File sharing applications in mobile ad hoc networks (MANETs) used in
proposed system. An intuitive method to alleviate this problem is to create file
replicas in the network. Extensive trace-driven experiments with synthesized traces
and real traces show that our protocol can achieve shorter average querying delay
at a lower cost than current replication protocols.
ADVANTAGE OF PROPOSED SYSTEM
 The influence of resource allocation on the average querying delay.
 The emerging of mobile file sharing applications motivates the investigation
on the peer-to-peer (P2P) file sharing over such MANETs.
 Reduce file querying delay.
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 3Page number 3
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
SYSTEM SPECIFICATION
Hardware Requirements
System : Pentium IV 2.4 GHz
Hard Disk : 40 GB
Floppy Drive : 1.44 Mb
Monitor : 15 VGA Colour
Mouse : Logitech
Ram : 512 Mb
Software Requirements
Operating system : Windows Family
Tools : eclipse/Netbeans
Technology Used : Java
Backend Used : SQL Server

More Related Content

What's hot

Delay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An OverviewDelay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An OverviewCSCJournals
 
1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-mainRizky Andawasatya
 
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...IEEEMEMTECHSTUDENTPROJECTS
 
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...IJCSIS Research Publications
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksUvaraj Shan
 
DDNFS: a Distributed Digital Notary File System
DDNFS: a Distributed Digital Notary File SystemDDNFS: a Distributed Digital Notary File System
DDNFS: a Distributed Digital Notary File SystemIJNSA Journal
 
Ravi's SOP Princeton
Ravi's SOP Princeton Ravi's SOP Princeton
Ravi's SOP Princeton RaviTandon11
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networkingWebix.pk
 
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile NetworksPart 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile NetworksDr. Mahfuzur Rahman Bosunia
 
Content-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksContent-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksTorsten Braun, Universität Bern
 
Knowledge Sharing in the Sciences - 8JPL
Knowledge Sharing in the Sciences - 8JPLKnowledge Sharing in the Sciences - 8JPL
Knowledge Sharing in the Sciences - 8JPLKaitlin Thaney
 
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKSPROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKSIJNSA Journal
 
Effects of power conservation, wireless coverage and cooperation on data diss...
Effects of power conservation, wireless coverage and cooperation on data diss...Effects of power conservation, wireless coverage and cooperation on data diss...
Effects of power conservation, wireless coverage and cooperation on data diss...marwaeng
 
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...ijdpsjournal
 
Ijartes v1-i2-007
Ijartes v1-i2-007Ijartes v1-i2-007
Ijartes v1-i2-007IJARTES
 
A Domain Based Approach to Information Retrieval in Digital Libraries - Rotel...
A Domain Based Approach to Information Retrieval in Digital Libraries - Rotel...A Domain Based Approach to Information Retrieval in Digital Libraries - Rotel...
A Domain Based Approach to Information Retrieval in Digital Libraries - Rotel...University of Bari (Italy)
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defencevisor999
 

What's hot (17)

Delay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An OverviewDelay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An Overview
 
1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main
 
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
 
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
 
DDNFS: a Distributed Digital Notary File System
DDNFS: a Distributed Digital Notary File SystemDDNFS: a Distributed Digital Notary File System
DDNFS: a Distributed Digital Notary File System
 
Ravi's SOP Princeton
Ravi's SOP Princeton Ravi's SOP Princeton
Ravi's SOP Princeton
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networking
 
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile NetworksPart 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
 
Content-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksContent-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant Networks
 
Knowledge Sharing in the Sciences - 8JPL
Knowledge Sharing in the Sciences - 8JPLKnowledge Sharing in the Sciences - 8JPL
Knowledge Sharing in the Sciences - 8JPL
 
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKSPROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
 
Effects of power conservation, wireless coverage and cooperation on data diss...
Effects of power conservation, wireless coverage and cooperation on data diss...Effects of power conservation, wireless coverage and cooperation on data diss...
Effects of power conservation, wireless coverage and cooperation on data diss...
 
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...
 
Ijartes v1-i2-007
Ijartes v1-i2-007Ijartes v1-i2-007
Ijartes v1-i2-007
 
A Domain Based Approach to Information Retrieval in Digital Libraries - Rotel...
A Domain Based Approach to Information Retrieval in Digital Libraries - Rotel...A Domain Based Approach to Information Retrieval in Digital Libraries - Rotel...
A Domain Based Approach to Information Retrieval in Digital Libraries - Rotel...
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defence
 

Viewers also liked

TU Darmstadt - KOM - P2P Group Overview 2006
TU Darmstadt - KOM - P2P Group Overview 2006TU Darmstadt - KOM - P2P Group Overview 2006
TU Darmstadt - KOM - P2P Group Overview 2006Kalman Graffi
 
Nobel financieel advies wijzigingen belasting 2014
Nobel financieel advies wijzigingen belasting 2014Nobel financieel advies wijzigingen belasting 2014
Nobel financieel advies wijzigingen belasting 2014Nobel Financieel Advies
 
Ncc technology presentation
Ncc technology presentationNcc technology presentation
Ncc technology presentationjowilson615
 
Ncc technology presentation 2014
Ncc technology presentation 2014Ncc technology presentation 2014
Ncc technology presentation 2014jowilson615
 
BATERIAS ETNA
BATERIAS ETNA BATERIAS ETNA
BATERIAS ETNA Edwin0102
 
A Topic Model of Analytics Job Adverts (The Operational Research Society 55th...
A Topic Model of Analytics Job Adverts (The Operational Research Society 55th...A Topic Model of Analytics Job Adverts (The Operational Research Society 55th...
A Topic Model of Analytics Job Adverts (The Operational Research Society 55th...Michael Mortenson
 
Heart sticker Manufacture Reps
Heart sticker Manufacture RepsHeart sticker Manufacture Reps
Heart sticker Manufacture RepsOregonbucci
 
Informació inici de curs 2016
Informació inici de curs 2016Informació inici de curs 2016
Informació inici de curs 2016datrompeta
 
menu improvement of Metro's restaurant
menu improvement of Metro's restaurant menu improvement of Metro's restaurant
menu improvement of Metro's restaurant vitrohdy
 
Felix&fido club2015new release
Felix&fido club2015new releaseFelix&fido club2015new release
Felix&fido club2015new releasePierangelo Fissore
 
Technology will save our minds and bodies rochelle
Technology will save our minds and bodies rochelleTechnology will save our minds and bodies rochelle
Technology will save our minds and bodies rochelleRochelle Ryan
 
Analysing Analytics: Evolution or Emperor's New Clothes? (Young OR Conference...
Analysing Analytics: Evolution or Emperor's New Clothes? (Young OR Conference...Analysing Analytics: Evolution or Emperor's New Clothes? (Young OR Conference...
Analysing Analytics: Evolution or Emperor's New Clothes? (Young OR Conference...Michael Mortenson
 

Viewers also liked (17)

TU Darmstadt - KOM - P2P Group Overview 2006
TU Darmstadt - KOM - P2P Group Overview 2006TU Darmstadt - KOM - P2P Group Overview 2006
TU Darmstadt - KOM - P2P Group Overview 2006
 
Nobel financieel advies wijzigingen belasting 2014
Nobel financieel advies wijzigingen belasting 2014Nobel financieel advies wijzigingen belasting 2014
Nobel financieel advies wijzigingen belasting 2014
 
Ncc technology presentation
Ncc technology presentationNcc technology presentation
Ncc technology presentation
 
HAB-Brochure
HAB-BrochureHAB-Brochure
HAB-Brochure
 
About me
About meAbout me
About me
 
Ncc technology presentation 2014
Ncc technology presentation 2014Ncc technology presentation 2014
Ncc technology presentation 2014
 
My love
My loveMy love
My love
 
BATERIAS ETNA
BATERIAS ETNA BATERIAS ETNA
BATERIAS ETNA
 
A Topic Model of Analytics Job Adverts (The Operational Research Society 55th...
A Topic Model of Analytics Job Adverts (The Operational Research Society 55th...A Topic Model of Analytics Job Adverts (The Operational Research Society 55th...
A Topic Model of Analytics Job Adverts (The Operational Research Society 55th...
 
Heart sticker Manufacture Reps
Heart sticker Manufacture RepsHeart sticker Manufacture Reps
Heart sticker Manufacture Reps
 
Informació inici de curs 2016
Informació inici de curs 2016Informació inici de curs 2016
Informació inici de curs 2016
 
Kerala beaches
Kerala beachesKerala beaches
Kerala beaches
 
Shooting location in kerala
Shooting location in keralaShooting location in kerala
Shooting location in kerala
 
menu improvement of Metro's restaurant
menu improvement of Metro's restaurant menu improvement of Metro's restaurant
menu improvement of Metro's restaurant
 
Felix&fido club2015new release
Felix&fido club2015new releaseFelix&fido club2015new release
Felix&fido club2015new release
 
Technology will save our minds and bodies rochelle
Technology will save our minds and bodies rochelleTechnology will save our minds and bodies rochelle
Technology will save our minds and bodies rochelle
 
Analysing Analytics: Evolution or Emperor's New Clothes? (Young OR Conference...
Analysing Analytics: Evolution or Emperor's New Clothes? (Young OR Conference...Analysing Analytics: Evolution or Emperor's New Clothes? (Young OR Conference...
Analysing Analytics: Evolution or Emperor's New Clothes? (Young OR Conference...
 

Similar to Maximizing p2 p file access availability in mobile ad hoc networks though replication for efficient file sharing

A proximity aware interest-clustered p2 p file sharing system
A proximity aware interest-clustered p2 p file sharing systemA proximity aware interest-clustered p2 p file sharing system
A proximity aware interest-clustered p2 p file sharing systemLeMeniz Infotech
 
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...IEEEFINALSEMSTUDENTSPROJECTS
 
An efficient and trustworthy p2 p and social network integrated file sharing ...
An efficient and trustworthy p2 p and social network integrated file sharing ...An efficient and trustworthy p2 p and social network integrated file sharing ...
An efficient and trustworthy p2 p and social network integrated file sharing ...LeMeniz Infotech
 
Data collection multi application sharing wireless sensor networks
Data collection multi application sharing wireless sensor networksData collection multi application sharing wireless sensor networks
Data collection multi application sharing wireless sensor networksLeMeniz Infotech
 
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...IEEEFINALSEMSTUDENTSPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEEMEMTECHSTUDENTPROJECTS
 
Authenticated key exchange protocols for parallel network file system
Authenticated key exchange protocols for parallel network file systemAuthenticated key exchange protocols for parallel network file system
Authenticated key exchange protocols for parallel network file systemLeMeniz Infotech
 
Keyword extraction and clustering for document recommendation in conversations.
Keyword extraction and clustering for document recommendation in conversations.Keyword extraction and clustering for document recommendation in conversations.
Keyword extraction and clustering for document recommendation in conversations.LeMeniz Infotech
 
An incremental and distributed inference methodfor large scale ontologies bas...
An incremental and distributed inference methodfor large scale ontologies bas...An incremental and distributed inference methodfor large scale ontologies bas...
An incremental and distributed inference methodfor large scale ontologies bas...LeMeniz Infotech
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationLeMeniz Infotech
 
Performing initiative data prefetching in distributed file systems for cloud ...
Performing initiative data prefetching in distributed file systems for cloud ...Performing initiative data prefetching in distributed file systems for cloud ...
Performing initiative data prefetching in distributed file systems for cloud ...LeMeniz Infotech
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageLeMeniz Infotech
 
leveraging social networks p2 p content-based file sharing in disconnected ma...
leveraging social networks p2 p content-based file sharing in disconnected ma...leveraging social networks p2 p content-based file sharing in disconnected ma...
leveraging social networks p2 p content-based file sharing in disconnected ma...swathi78
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...swathi78
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksLeMeniz Infotech
 
A time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloudA time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloudLeMeniz Infotech
 
Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...IJCI JOURNAL
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...LeMeniz Infotech
 
Incentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networksIncentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networksLeMeniz Infotech
 

Similar to Maximizing p2 p file access availability in mobile ad hoc networks though replication for efficient file sharing (20)

A proximity aware interest-clustered p2 p file sharing system
A proximity aware interest-clustered p2 p file sharing systemA proximity aware interest-clustered p2 p file sharing system
A proximity aware interest-clustered p2 p file sharing system
 
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
 
An efficient and trustworthy p2 p and social network integrated file sharing ...
An efficient and trustworthy p2 p and social network integrated file sharing ...An efficient and trustworthy p2 p and social network integrated file sharing ...
An efficient and trustworthy p2 p and social network integrated file sharing ...
 
Peer-to-peer Systems.ppt
Peer-to-peer Systems.pptPeer-to-peer Systems.ppt
Peer-to-peer Systems.ppt
 
Data collection multi application sharing wireless sensor networks
Data collection multi application sharing wireless sensor networksData collection multi application sharing wireless sensor networks
Data collection multi application sharing wireless sensor networks
 
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
 
Authenticated key exchange protocols for parallel network file system
Authenticated key exchange protocols for parallel network file systemAuthenticated key exchange protocols for parallel network file system
Authenticated key exchange protocols for parallel network file system
 
Keyword extraction and clustering for document recommendation in conversations.
Keyword extraction and clustering for document recommendation in conversations.Keyword extraction and clustering for document recommendation in conversations.
Keyword extraction and clustering for document recommendation in conversations.
 
An incremental and distributed inference methodfor large scale ontologies bas...
An incremental and distributed inference methodfor large scale ontologies bas...An incremental and distributed inference methodfor large scale ontologies bas...
An incremental and distributed inference methodfor large scale ontologies bas...
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Performing initiative data prefetching in distributed file systems for cloud ...
Performing initiative data prefetching in distributed file systems for cloud ...Performing initiative data prefetching in distributed file systems for cloud ...
Performing initiative data prefetching in distributed file systems for cloud ...
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
leveraging social networks p2 p content-based file sharing in disconnected ma...
leveraging social networks p2 p content-based file sharing in disconnected ma...leveraging social networks p2 p content-based file sharing in disconnected ma...
leveraging social networks p2 p content-based file sharing in disconnected ma...
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networks
 
A time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloudA time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloud
 
Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
 
Incentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networksIncentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networks
 

More from LeMeniz Infotech

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...LeMeniz Infotech
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...LeMeniz Infotech
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...LeMeniz Infotech
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachLeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsLeMeniz Infotech
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlLeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...LeMeniz Infotech
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...LeMeniz Infotech
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersLeMeniz Infotech
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedLeMeniz Infotech
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksLeMeniz Infotech
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...LeMeniz Infotech
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android appsLeMeniz Infotech
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication schemeLeMeniz Infotech
 

More from LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 

Recently uploaded

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Maximizing p2 p file access availability in mobile ad hoc networks though replication for efficient file sharing

  • 1. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 1Page number 1 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing Abstract File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. The efficiency of file querying suffers from the distinctive properties of such networks including node mobility and limited communication range and resource. An intuitive method to alleviate this problem is to create file replicas in the network. However, despite the efforts on file replication, no research has focused on the global optimal replica creation with minimum average querying delay. Specifically, current file replication protocols in mobile ad hoc networks have two shortcomings. First, they lack a rule to allocate limited resources to different files in order to minimize the average querying delay. Second, they simply consider storage as available resources for replicas, but neglect the fact that the file holders’ frequency of meeting other nodes also plays an important role in determining file availability. Actually, a node that has a higher meeting frequency with others provides higher availability to its files. This becomes even more evident in sparsely distributed MANETs, in which nodes meet disruptively. In this paper, we introduce a new concept of resource for file replication, which considers both node storage and meeting frequency. We theoretically study the influence of resource allocation on the average querying delay and derive a resource allocation rule to minimize the average querying delay. We further propose a distributed file replication protocol to realize the proposed
  • 2. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 2Page number 2 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com rule. Extensive trace-driven experiments with synthesized traces and real traces show that our protocol can achieve shorter average querying delay at a lower cost than current replication protocols. EXISTING SYSTEM The efficiency of file querying suffers from the distinctive properties of such networks including node mobility and limited communication range and resource. DRAWBACK OF EXISTING SYSTEM  File querying delay is always a main concern in a file sharing system.  Redundant replicas are easily created. PROPOSED SYSTEM File sharing applications in mobile ad hoc networks (MANETs) used in proposed system. An intuitive method to alleviate this problem is to create file replicas in the network. Extensive trace-driven experiments with synthesized traces and real traces show that our protocol can achieve shorter average querying delay at a lower cost than current replication protocols. ADVANTAGE OF PROPOSED SYSTEM  The influence of resource allocation on the average querying delay.  The emerging of mobile file sharing applications motivates the investigation on the peer-to-peer (P2P) file sharing over such MANETs.  Reduce file querying delay.
  • 3. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 3Page number 3 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com SYSTEM SPECIFICATION Hardware Requirements System : Pentium IV 2.4 GHz Hard Disk : 40 GB Floppy Drive : 1.44 Mb Monitor : 15 VGA Colour Mouse : Logitech Ram : 512 Mb Software Requirements Operating system : Windows Family Tools : eclipse/Netbeans Technology Used : Java Backend Used : SQL Server