Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally
Effective Approach For Content Based Image Retrieval In Peer-Peer To NetworksIRJET Journal
The document describes a proposed approach for content-based image retrieval in peer-to-peer networks. Existing methods represent images as high-dimensional feature vectors and index them using distributed high-dimensional indexes or locality sensitive hashing over distributed hash tables. However, these approaches have high network costs and workload imbalances. The proposed approach uses the bag-of-visual-words model to represent images, building inverted indexes of visual codewords over the distributed hash table. It also develops a dynamic codebook updating method to optimize the mutual information between the codebook and relevance information, balancing the workload among nodes as the peer-to-peer network and data evolve dynamically.
An efficient hybrid peer to-peersystemfordistributeddatasharingambitlick
The document proposes a hybrid peer-to-peer system that combines the advantages of structured and unstructured networks. It consists of two parts: 1) a structured core network that forms the backbone and provides efficient data lookup; 2) multiple unstructured networks attached to each core node, allowing flexible peer joining/leaving. This two-tier design decouples efficiency and flexibility. Simulation results show the hybrid system balances these properties better than single-approach networks.
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Editor IJCATR
Peer-to-peer (P2P) networks existing on a MANET are a natural evolution since both are decentralized and have dynamic
topologies. As MANETs grow in use due to the increasing popularity of wireless mesh and 4G networks, it is expected that P2P
applications will remain as a popular means of obtaining files. Network coding has been shown as an efficient means of sharing large
Files in a P2P network. With network coding, all file blocks have the same relative importance. This paper presents an efficient
content distribution scheme that uses network coding to share large files in a P2P overlay running on a MANET. Peers request file
blocks from multiple server nodes and servers multicast blocks to multiple receivers, providing efficient multipoint-to-multipoint
communication.
Simulation results show that compared to other common download techniques, the proposed scheme performs very well, having lower
download time and energy consumption. Also, more peers participate in uploading the file, resulting in greater fairness.
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation
cost: every node in the network has to code. Interested in minimizing resource consumption of network
coding while maintaining its performance, in this paper, we propose a practical network coder placement
algorithm which achieves comparable content distribution time as network coding, and at the same time,
substantially reduces the number of network coders compared to a full network coding solution in which all
peers have to encode, i.e. become encoders. Our algorithm is derived from two key elements. First, it is
based on the insight that coding at upstream peers eliminates information duplication to downstream peers,
which results in efficient content distribution. Second, our placement strategy exploits centrality
characteristics of the network topology to quickly determine key positions to place encoders. Performance
evaluation using various topology and algorithm parameters confirms the effectiveness of our proposed
method.
Shortest Tree Routing With Security In Wireless Sensor NetworksIJERA Editor
We propose STR to resolve the main reasons of overall network performance degradation of ZTR, which are the detour path problem and the traffic concentration problem. Second, we prove that the 1-hop neighbor nodes used by STR improve the routing path efficiency and alleviate the traffic load concentrated on tree links in ZTR. Third, we analyze the performance of ZTR, STR, and AODV by differentiating the network conditions such as network density, ZigBee network constraints, traffic types, and the network traffic. For modification security purpose we are also encrypting the data packets during transmission. So that the intermediate nodes are not able to view the data during transmission. For Encryption process, we are using RC4 Algorithm. Short cut tree routing is used for minimizing the routing path from source to destination.
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
Peer-to-Peer systems form logical overlay networks on top of the Internet. Essentially, peers randomly
choose logical neighbours without any knowledge about underlying physical topology. This may cause
inefficient communications among peers. This topology mismatch problem may result in poor
performance and scalability for Peer-to-Peer systems. A possible way to improve the performance of
Peer-to-Peer systems is the overlay network construction based on the knowledge of the physical network
topology. In this paper, we will propose the use of the “Record Route” and “Timestamp” options
supported in the IP protocol to explore the paths between peers. By the topology-aware peer selection,
our approach outperforms traditional P2P systems using random peer selection. Our approach only
incurs a low overhead and can be deployed easily in various P2P systems.
Effective Approach For Content Based Image Retrieval In Peer-Peer To NetworksIRJET Journal
The document describes a proposed approach for content-based image retrieval in peer-to-peer networks. Existing methods represent images as high-dimensional feature vectors and index them using distributed high-dimensional indexes or locality sensitive hashing over distributed hash tables. However, these approaches have high network costs and workload imbalances. The proposed approach uses the bag-of-visual-words model to represent images, building inverted indexes of visual codewords over the distributed hash table. It also develops a dynamic codebook updating method to optimize the mutual information between the codebook and relevance information, balancing the workload among nodes as the peer-to-peer network and data evolve dynamically.
An efficient hybrid peer to-peersystemfordistributeddatasharingambitlick
The document proposes a hybrid peer-to-peer system that combines the advantages of structured and unstructured networks. It consists of two parts: 1) a structured core network that forms the backbone and provides efficient data lookup; 2) multiple unstructured networks attached to each core node, allowing flexible peer joining/leaving. This two-tier design decouples efficiency and flexibility. Simulation results show the hybrid system balances these properties better than single-approach networks.
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Editor IJCATR
Peer-to-peer (P2P) networks existing on a MANET are a natural evolution since both are decentralized and have dynamic
topologies. As MANETs grow in use due to the increasing popularity of wireless mesh and 4G networks, it is expected that P2P
applications will remain as a popular means of obtaining files. Network coding has been shown as an efficient means of sharing large
Files in a P2P network. With network coding, all file blocks have the same relative importance. This paper presents an efficient
content distribution scheme that uses network coding to share large files in a P2P overlay running on a MANET. Peers request file
blocks from multiple server nodes and servers multicast blocks to multiple receivers, providing efficient multipoint-to-multipoint
communication.
Simulation results show that compared to other common download techniques, the proposed scheme performs very well, having lower
download time and energy consumption. Also, more peers participate in uploading the file, resulting in greater fairness.
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation
cost: every node in the network has to code. Interested in minimizing resource consumption of network
coding while maintaining its performance, in this paper, we propose a practical network coder placement
algorithm which achieves comparable content distribution time as network coding, and at the same time,
substantially reduces the number of network coders compared to a full network coding solution in which all
peers have to encode, i.e. become encoders. Our algorithm is derived from two key elements. First, it is
based on the insight that coding at upstream peers eliminates information duplication to downstream peers,
which results in efficient content distribution. Second, our placement strategy exploits centrality
characteristics of the network topology to quickly determine key positions to place encoders. Performance
evaluation using various topology and algorithm parameters confirms the effectiveness of our proposed
method.
Shortest Tree Routing With Security In Wireless Sensor NetworksIJERA Editor
We propose STR to resolve the main reasons of overall network performance degradation of ZTR, which are the detour path problem and the traffic concentration problem. Second, we prove that the 1-hop neighbor nodes used by STR improve the routing path efficiency and alleviate the traffic load concentrated on tree links in ZTR. Third, we analyze the performance of ZTR, STR, and AODV by differentiating the network conditions such as network density, ZigBee network constraints, traffic types, and the network traffic. For modification security purpose we are also encrypting the data packets during transmission. So that the intermediate nodes are not able to view the data during transmission. For Encryption process, we are using RC4 Algorithm. Short cut tree routing is used for minimizing the routing path from source to destination.
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
Peer-to-Peer systems form logical overlay networks on top of the Internet. Essentially, peers randomly
choose logical neighbours without any knowledge about underlying physical topology. This may cause
inefficient communications among peers. This topology mismatch problem may result in poor
performance and scalability for Peer-to-Peer systems. A possible way to improve the performance of
Peer-to-Peer systems is the overlay network construction based on the knowledge of the physical network
topology. In this paper, we will propose the use of the “Record Route” and “Timestamp” options
supported in the IP protocol to explore the paths between peers. By the topology-aware peer selection,
our approach outperforms traditional P2P systems using random peer selection. Our approach only
incurs a low overhead and can be deployed easily in various P2P systems.
New approaches with chord in efficient p2p grid resource discoveryijgca
Grid computing is a type of distributed computing which allows sharing of computer resources through
Internet. It not only allows us to share files but also most of the software and hardware resources. An
efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it
supports resource management and scheduling of applications. Among various discovery mechanisms,
Peer-to-Peer (P2P) technology witnessed rapid development and the key component for this success is
efficient lookup applications of P2P. Chord is a P2P structural model widely used as a routing protocol to
find resources in grid environment. Plenty of ideas are implemented by researchers to improve the lookup
performance of chord protocol in Grid environment. In this paper, we discuss the recent researches made
on Chord Structured P2P protocol and present our proposed methods in which we use the address of
Recently Visited Node (RVN) and fuzzy technique to locate the grid resources to reduce message and time
complexity.
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Networkijwmn
We developed a new content routing based on the virtual backbone structure, which groups wireless nodes and contents into a virtual architecture. Our approach is scalable, works with local information, and does not rely on address information. The naming system uses flat naming to identify nodes and contents, and organizes these identifiers together. Backbone nodes can be selected automatically or predefined to direct their associated normal nodes in a local area. The normal nodes are guided by the backbone nodes to full fill the searching and routing processe
Java Abs Peer To Peer Design & Implementation Of A Tuple Spacencct
Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, microcontroller projects, vlsi projects, dsp projects, free projects, project review, project report, project presentation, free source code, free project report, Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, final year java projects, final year asp.net projects, final year vb.net projects, vb.net projects, c# projects, final year c# projects, electrical projects, power electronics projects, motors and drives projects, robotics projects, ieee electrical projects, ieee power electronics projects, ieee robotics projects, power system projects, power system ieee projects, engineering projects, ieee engineering projects, engineering students projects, be projects, mca projects, mtech projects, btech projects, me projects, mtech projects, college projects, polytechnic projects, real time projects, ieee projects, non ieee projects, project presentation, project ppt, project pdf, project source code, project review, final year project, final year projects
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...IJCNCJournal
Distributed Hash Table (DHT) based structured peer-to-peer (P2P) systems provide an efficient method of disseminating information in a VANET environment owing to its high performance and properties (e.g., self-organization, decentralization, scalability, etc.). The topology of ad hoc vehicle networks (VANET) varies dynamically; its disconnections are frequent due to the high movement of vehicles. In such a topology, information availability is an ultimate problem for vehicles, in general, connect and disconnect frequently from the network. Data replication is an appropriate and adequate solution to this problem. In this contribution, to increase the accessibility of data, which also increases the success rate of the lookup, a method based on replication in the Vanet network is proposed named LAaR-Vanet. Also, this replication strategy is combined with a locality-awareness method to promote the same purpose and to avoid the problems of long paths. The performance of the proposed solution is assessed by a series of in-depth simulations in urban areas. The obtained results indicate the efficiency of the proposed approach, in terms of the following metrics: lookup success rate, the delay, and the number of the logical hop.
Replica Placement In Unstable Radio LinksCSCJournals
In this paper, proposed a solution for replica placement onto mobile hosts which are continuously moving and disconnections occur by unstable radio links, which are likely to be disconnected after a short time. Consider an Ad Hoc network in which mobile hosts are entered and communicate with other mobile hosts in the network and get replicas from the neighbors, while accessing the data items disconnections may occur due to unstable radio links. In this way accessing the data items is difficult. In this paper, develop a mechanism to access the data items from the mobile hosts after disconnection occur for short time. The proposed mechanism works efficiently in mosaic networks also. The technique incorporates the access frequency from mobile hosts to each data object, the status of the network connectivity by exhibit an adjacent matrix, and communication costs, which are very low by accessing data items from nearest neighbors. The derived mechanism is general, flexible and adaptable to cater for various applications in ad hoc networks. This approach is efficient in both execution time and solution quality.
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...journalBEEI
This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols-Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network.
Bacis Concept of Communication and NetworkingSnehal Shahane
The document provides information on various topics related to computer networks and networking concepts:
It defines the OSI 7-layer model and describes the functions of each layer, from the physical layer (layer 1) that deals with physical connections, to the application layer (layer 7) that supports application-level processes.
It also discusses common network topologies like bus, star, ring, and mesh; protocols like TCP/IP; different types of computer networks from LAN to WAN; and networking devices like clients, servers, routers, and switches.
Finally, it gives examples of specific protocols, standards, and technologies that operate at each of the 7 layers of the OSI model, such as Ethernet, IP,
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Yayah Zakaria
Owing to the wireless and mobility nature, nodes in a mobile ad hoc network are not within the transmission range. It needs to transfer data through the multi-intermediate nodes. Opportunistic data forwarding is an assuring solution to make use of the broadcast environment of wireless communication links. Due to absence of source routing capability with efficient proactive routing protocol, it is not widely used. To rectify the
problem, we proposed memory and routing efficient proactive routing protocol using Depth-First Iterative-Deepening and hello messaging scheme. This protocol can conserve the topology information in every node in the network. In experimental analysis and discussion, we implemented the proposed work using NS2 simulator tool and proved that the proposed technique is performed well in terms of average delay, buffer and throughput.
International Refereed Journal of Engineering and Science (IRJES)irjes
a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications.
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ijcsity
A mobile peer-to-peer computer network is the one in which each computer in the network can act as a
client or server for the other computers in the network. The communication process among the nodes in the
mobile peer to peer network requires more no of messages. Due to this large number of messages passing,
propose an interconnection structure called distributed Spanning Tree (DST) and it improves the efficiency
of the mobile peer to peer network. The proposed method improves the data availability and consistency
across the entire network and also reduces the data latency and the required number of message passes for
any specific application in the network. Further to enhance the effectiveness of the proposed system, the
DST network is optimized with the Ant Colony Optimization method. It gives the optimal solution of the
DST method and increased availability, enhanced consistency and scalability of the network. The
simulation results shows that reduces the number of message sent for any specific application and average
delay and increases the packet delivery ratio in the network.
The document discusses the Internet Protocol (IP) and its role in facilitating communication between hosts over the Internet. It describes the structure of IP addresses, including the use of four bytes to represent each address. It also discusses how classes and subnets divide IP addresses to allow for more devices to connect as the number of Internet users grows. Routers are used to create and manage subnets and allow communication between internal and external networks. Virtual IPs are also discussed as a way to extend the number of connectable devices since not all can be assigned a unique IP address.
Iaetsd an enhancement for content sharing overIaetsd Iaetsd
This document proposes an efficient content sharing scheme called discover-predict-deliver (DPD) for smartphone-based delay tolerant networks (DTNs). It uses a hidden Markov model to predict individual mobility information to improve content discovery and delivery. The existing system results in a 2% CPU overhead and reduces smartphone battery life by 15%. To minimize energy consumption, the document proposes using sensor scheduling schemes in an opportunistic context. It aims to solve problems in content sharing and minimize energy use through sensor scheduling.
This document provides a comparative analysis of two main hierarchical distributed hash table (DHT) systems - the homogenous design and the superpeer design. It presents an analytical framework and cost model to evaluate these designs. The analysis reveals that contrary to initial expectations, the costs incurred by the hierarchical superpeer design are not necessarily minimized. Key aspects of the two designs like load balancing, fault tolerance, and advantages/disadvantages are discussed. The document aims to help identify the better hierarchical DHT design for a given workload or application.
LAN Technologies
Ethernet and IEEE Token Ring
IEEE Token Ring
Message transfer in OSI reference Model
Example of Message Transfer in the OSI Model
Application Layer Protocols.
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner.
We present proofs of our algorithms as well as experimental results and evaluations.
IRJET- Estimating Various DHT ProtocolsIRJET Journal
This document compares three distributed hash table (DHT) protocols: Tapestry, Chord, and Kademlia. It analyzes their performance using a simulator under varying parameters like stabilization interval, number of backup nodes, number of successors, and number of parallel lookups. The analysis seeks to determine the optimal cost-performance tradeoff for each protocol based on metrics like lookup latency and number of messages sent. Key differences between the protocols are described, such as Tapestry using a 160-bit identifier space, Chord arranging nodes in a circular identifier space and using a finger table for routing, and Kademlia storing contacts in buckets and finding closer nodes through iterative lookups. Simulation results are used to compare the protocols
Efficient routing mechanism using cycle based network and k hop security in a...ijait
In a multi-domain network, Topology Aggregation (TA) may be adopted to provide limited information
regarding intra cluster connectivity without revealing detailed topology information. Nodes are grouped
into the cluster. Every cluster has border nodes, which is used for data transmission between source and
destination. The K-hop security can be used for the purpose of securing the data communication. The
topologies are spanning tree and balanced tree that can be used to reduce bandwidth overhead, delivery
delay and to increase throughput and packet delivery ratio. The shortest path can be found using
Bhandari’s algorithm and Cycle-Based Minimum-Cost Domain-Disjoint Paths (CMCDP) Algorithm for
establish the second path in the network . These topologies are compared to demonstrate the advantage of
finding shortest path using Bhandari’s algorithm.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The document discusses various protocols used in Internet of Things (IoT). It begins with defining IoT and how it works. It then discusses the current status and future of IoT. The major sections of the document are on IoT data link protocols like IEEE 802.15.4, WirelessHART, Z-Wave, and Bluetooth Low Energy. It also covers network layer routing protocols such as RPL and CORPL, and network layer encapsulation protocols.
The document summarizes the design of an HDLC controller with CRC generation using VHDL. It discusses:
1. HDLC is a standard protocol that organizes data into frames for point-to-point transmission with error detection. It includes address, control and CRC fields.
2. The design of the HDLC controller includes transmitter and receiver sections. The transmitter adds flag sequences and CRC to frames. The receiver detects flags, removes stuffing and checks the CRC.
3. Simulation results show the controller can generate and check CRC to detect errors for an example transmission of an 8-bit data byte and 8-bit address.
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemIDES Editor
Kademlia is a structured peer-to-peer (P2P)
application level network, which implements a distributed
hash table (DHT). Its key-value storage and lookup service is
made efficient and reliable by its well-designed binary tree
topology and dense mesh of connections between participant
nodes. While it can carry out data storage and retrieval in
logarithmic time if the key assigned to the value in question
is precisely known, no complex queries of any kind are
supported. In this article a broadcast algorithm for the
Kademlia network is presented, which can be used to
implement such queries. The replication scheme utilized is
compatible with the lookup algorithm of Kademlia, and it
uses the same routing tables. The reliability (coverage) of the
algorithm is increased by assigning the responsibility of
disseminating the broadcast message to many nodes at the
same time. The article presents a model validated with
simulation as well. The model can be used by nodes at runtime
to calculate the required level of replication for any desired
level of coverage. This calculation can take node churn, packet
loss ratio and the size of the overlay into account.
Java Abs Peer To Peer Design & Implementation Of A Tuple Sncct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
New approaches with chord in efficient p2p grid resource discoveryijgca
Grid computing is a type of distributed computing which allows sharing of computer resources through
Internet. It not only allows us to share files but also most of the software and hardware resources. An
efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it
supports resource management and scheduling of applications. Among various discovery mechanisms,
Peer-to-Peer (P2P) technology witnessed rapid development and the key component for this success is
efficient lookup applications of P2P. Chord is a P2P structural model widely used as a routing protocol to
find resources in grid environment. Plenty of ideas are implemented by researchers to improve the lookup
performance of chord protocol in Grid environment. In this paper, we discuss the recent researches made
on Chord Structured P2P protocol and present our proposed methods in which we use the address of
Recently Visited Node (RVN) and fuzzy technique to locate the grid resources to reduce message and time
complexity.
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Networkijwmn
We developed a new content routing based on the virtual backbone structure, which groups wireless nodes and contents into a virtual architecture. Our approach is scalable, works with local information, and does not rely on address information. The naming system uses flat naming to identify nodes and contents, and organizes these identifiers together. Backbone nodes can be selected automatically or predefined to direct their associated normal nodes in a local area. The normal nodes are guided by the backbone nodes to full fill the searching and routing processe
Java Abs Peer To Peer Design & Implementation Of A Tuple Spacencct
Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, microcontroller projects, vlsi projects, dsp projects, free projects, project review, project report, project presentation, free source code, free project report, Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, final year java projects, final year asp.net projects, final year vb.net projects, vb.net projects, c# projects, final year c# projects, electrical projects, power electronics projects, motors and drives projects, robotics projects, ieee electrical projects, ieee power electronics projects, ieee robotics projects, power system projects, power system ieee projects, engineering projects, ieee engineering projects, engineering students projects, be projects, mca projects, mtech projects, btech projects, me projects, mtech projects, college projects, polytechnic projects, real time projects, ieee projects, non ieee projects, project presentation, project ppt, project pdf, project source code, project review, final year project, final year projects
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...IJCNCJournal
Distributed Hash Table (DHT) based structured peer-to-peer (P2P) systems provide an efficient method of disseminating information in a VANET environment owing to its high performance and properties (e.g., self-organization, decentralization, scalability, etc.). The topology of ad hoc vehicle networks (VANET) varies dynamically; its disconnections are frequent due to the high movement of vehicles. In such a topology, information availability is an ultimate problem for vehicles, in general, connect and disconnect frequently from the network. Data replication is an appropriate and adequate solution to this problem. In this contribution, to increase the accessibility of data, which also increases the success rate of the lookup, a method based on replication in the Vanet network is proposed named LAaR-Vanet. Also, this replication strategy is combined with a locality-awareness method to promote the same purpose and to avoid the problems of long paths. The performance of the proposed solution is assessed by a series of in-depth simulations in urban areas. The obtained results indicate the efficiency of the proposed approach, in terms of the following metrics: lookup success rate, the delay, and the number of the logical hop.
Replica Placement In Unstable Radio LinksCSCJournals
In this paper, proposed a solution for replica placement onto mobile hosts which are continuously moving and disconnections occur by unstable radio links, which are likely to be disconnected after a short time. Consider an Ad Hoc network in which mobile hosts are entered and communicate with other mobile hosts in the network and get replicas from the neighbors, while accessing the data items disconnections may occur due to unstable radio links. In this way accessing the data items is difficult. In this paper, develop a mechanism to access the data items from the mobile hosts after disconnection occur for short time. The proposed mechanism works efficiently in mosaic networks also. The technique incorporates the access frequency from mobile hosts to each data object, the status of the network connectivity by exhibit an adjacent matrix, and communication costs, which are very low by accessing data items from nearest neighbors. The derived mechanism is general, flexible and adaptable to cater for various applications in ad hoc networks. This approach is efficient in both execution time and solution quality.
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...journalBEEI
This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols-Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network.
Bacis Concept of Communication and NetworkingSnehal Shahane
The document provides information on various topics related to computer networks and networking concepts:
It defines the OSI 7-layer model and describes the functions of each layer, from the physical layer (layer 1) that deals with physical connections, to the application layer (layer 7) that supports application-level processes.
It also discusses common network topologies like bus, star, ring, and mesh; protocols like TCP/IP; different types of computer networks from LAN to WAN; and networking devices like clients, servers, routers, and switches.
Finally, it gives examples of specific protocols, standards, and technologies that operate at each of the 7 layers of the OSI model, such as Ethernet, IP,
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Yayah Zakaria
Owing to the wireless and mobility nature, nodes in a mobile ad hoc network are not within the transmission range. It needs to transfer data through the multi-intermediate nodes. Opportunistic data forwarding is an assuring solution to make use of the broadcast environment of wireless communication links. Due to absence of source routing capability with efficient proactive routing protocol, it is not widely used. To rectify the
problem, we proposed memory and routing efficient proactive routing protocol using Depth-First Iterative-Deepening and hello messaging scheme. This protocol can conserve the topology information in every node in the network. In experimental analysis and discussion, we implemented the proposed work using NS2 simulator tool and proved that the proposed technique is performed well in terms of average delay, buffer and throughput.
International Refereed Journal of Engineering and Science (IRJES)irjes
a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications.
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ijcsity
A mobile peer-to-peer computer network is the one in which each computer in the network can act as a
client or server for the other computers in the network. The communication process among the nodes in the
mobile peer to peer network requires more no of messages. Due to this large number of messages passing,
propose an interconnection structure called distributed Spanning Tree (DST) and it improves the efficiency
of the mobile peer to peer network. The proposed method improves the data availability and consistency
across the entire network and also reduces the data latency and the required number of message passes for
any specific application in the network. Further to enhance the effectiveness of the proposed system, the
DST network is optimized with the Ant Colony Optimization method. It gives the optimal solution of the
DST method and increased availability, enhanced consistency and scalability of the network. The
simulation results shows that reduces the number of message sent for any specific application and average
delay and increases the packet delivery ratio in the network.
The document discusses the Internet Protocol (IP) and its role in facilitating communication between hosts over the Internet. It describes the structure of IP addresses, including the use of four bytes to represent each address. It also discusses how classes and subnets divide IP addresses to allow for more devices to connect as the number of Internet users grows. Routers are used to create and manage subnets and allow communication between internal and external networks. Virtual IPs are also discussed as a way to extend the number of connectable devices since not all can be assigned a unique IP address.
Iaetsd an enhancement for content sharing overIaetsd Iaetsd
This document proposes an efficient content sharing scheme called discover-predict-deliver (DPD) for smartphone-based delay tolerant networks (DTNs). It uses a hidden Markov model to predict individual mobility information to improve content discovery and delivery. The existing system results in a 2% CPU overhead and reduces smartphone battery life by 15%. To minimize energy consumption, the document proposes using sensor scheduling schemes in an opportunistic context. It aims to solve problems in content sharing and minimize energy use through sensor scheduling.
This document provides a comparative analysis of two main hierarchical distributed hash table (DHT) systems - the homogenous design and the superpeer design. It presents an analytical framework and cost model to evaluate these designs. The analysis reveals that contrary to initial expectations, the costs incurred by the hierarchical superpeer design are not necessarily minimized. Key aspects of the two designs like load balancing, fault tolerance, and advantages/disadvantages are discussed. The document aims to help identify the better hierarchical DHT design for a given workload or application.
LAN Technologies
Ethernet and IEEE Token Ring
IEEE Token Ring
Message transfer in OSI reference Model
Example of Message Transfer in the OSI Model
Application Layer Protocols.
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner.
We present proofs of our algorithms as well as experimental results and evaluations.
IRJET- Estimating Various DHT ProtocolsIRJET Journal
This document compares three distributed hash table (DHT) protocols: Tapestry, Chord, and Kademlia. It analyzes their performance using a simulator under varying parameters like stabilization interval, number of backup nodes, number of successors, and number of parallel lookups. The analysis seeks to determine the optimal cost-performance tradeoff for each protocol based on metrics like lookup latency and number of messages sent. Key differences between the protocols are described, such as Tapestry using a 160-bit identifier space, Chord arranging nodes in a circular identifier space and using a finger table for routing, and Kademlia storing contacts in buckets and finding closer nodes through iterative lookups. Simulation results are used to compare the protocols
Efficient routing mechanism using cycle based network and k hop security in a...ijait
In a multi-domain network, Topology Aggregation (TA) may be adopted to provide limited information
regarding intra cluster connectivity without revealing detailed topology information. Nodes are grouped
into the cluster. Every cluster has border nodes, which is used for data transmission between source and
destination. The K-hop security can be used for the purpose of securing the data communication. The
topologies are spanning tree and balanced tree that can be used to reduce bandwidth overhead, delivery
delay and to increase throughput and packet delivery ratio. The shortest path can be found using
Bhandari’s algorithm and Cycle-Based Minimum-Cost Domain-Disjoint Paths (CMCDP) Algorithm for
establish the second path in the network . These topologies are compared to demonstrate the advantage of
finding shortest path using Bhandari’s algorithm.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The document discusses various protocols used in Internet of Things (IoT). It begins with defining IoT and how it works. It then discusses the current status and future of IoT. The major sections of the document are on IoT data link protocols like IEEE 802.15.4, WirelessHART, Z-Wave, and Bluetooth Low Energy. It also covers network layer routing protocols such as RPL and CORPL, and network layer encapsulation protocols.
The document summarizes the design of an HDLC controller with CRC generation using VHDL. It discusses:
1. HDLC is a standard protocol that organizes data into frames for point-to-point transmission with error detection. It includes address, control and CRC fields.
2. The design of the HDLC controller includes transmitter and receiver sections. The transmitter adds flag sequences and CRC to frames. The receiver detects flags, removes stuffing and checks the CRC.
3. Simulation results show the controller can generate and check CRC to detect errors for an example transmission of an 8-bit data byte and 8-bit address.
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemIDES Editor
Kademlia is a structured peer-to-peer (P2P)
application level network, which implements a distributed
hash table (DHT). Its key-value storage and lookup service is
made efficient and reliable by its well-designed binary tree
topology and dense mesh of connections between participant
nodes. While it can carry out data storage and retrieval in
logarithmic time if the key assigned to the value in question
is precisely known, no complex queries of any kind are
supported. In this article a broadcast algorithm for the
Kademlia network is presented, which can be used to
implement such queries. The replication scheme utilized is
compatible with the lookup algorithm of Kademlia, and it
uses the same routing tables. The reliability (coverage) of the
algorithm is increased by assigning the responsibility of
disseminating the broadcast message to many nodes at the
same time. The article presents a model validated with
simulation as well. The model can be used by nodes at runtime
to calculate the required level of replication for any desired
level of coverage. This calculation can take node churn, packet
loss ratio and the size of the overlay into account.
Java Abs Peer To Peer Design & Implementation Of A Tuple Sncct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
Wireless sensor network (WSN) is the collection of many micro-sensor nodes, connecting each other by a
wireless medium. WSN exhibits different approaches to provide reliable sensing of the environment,
detecting and reporting events. In this paper, we have proposed an algorithm for hierarchy based protocols
of wireless sensor networks, which consist of two groups of sensor nodes in a single cluster node. Each
cluster consists of a three cluster head. The event driven data sensing mechanism is used in this paper and
this sensed data is transmitted to the master section head. Hence efficient way of data transmission is possible with larger group of nodes. In this approach, using hierarchy based protocols; the lifetime of the sensor network is increased.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Design of an Efficient Communication Protocol for 3d Interconnection NetworkIJMTST Journal
Three-dimensional integrated circuits (3D ICs) provide better device integration, reduced signal delay and reduced interconnect power. They additionally give better layout flexibility by permitting heterogeneous integration, by taking the advantage of intrinsic capability of reducing the wire length in 3D ICs, 3D NOC Bus Hybrid mesh layout was suggested. This layout provides an apparently significant stage to implement economical multicast routings for 3D networks-on-chip. A unique multicast partitioning and routing strategy for the 3D NOC-Bus Hybrid mesh architectures to improve the system performance and to decrease the power consumption is being proposed. The planned design exploits the useful attribute of a single-hop (bus-based) interlayer communication of the 3D stacked mesh design to supply superior hardware multicast support. Finally customized partitioning approach and an effective routing method is given to decrease the average hop count and network latency. Compared to the recently designed 3D NOC architectures being capable of supporting hardware multicasting, huge simulations with traffic profiles reveals design exploitation, which is the planned multicast routing strategy will facilitate significant performance enhancements.
The document describes a new code consistency maintenance protocol called DHV for wireless sensor networks. DHV allows nodes to detect version differences and identify newer code versions using only necessary bit-level information, requiring far fewer messages and bits transmitted than previous protocols. Simulations and experiments show DHV reduces messages by 50%, converges faster, and reduces transmitted bits by 40-60% compared to the state-of-the-art DIP protocol.
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies’ solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERYijgca
Grid computing is a type of distributed computing which allows sharing of computer resources through Internet. It not only allows us to share files but also most of the software and hardware resources. An efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it supports resource management and scheduling of applications. Among various discovery mechanisms, Peer-to-Peer (P2P) technology witnessed rapid development and the key component for this success is efficient lookup applications of P2P. Chord is a P2P structural model widely used as a routing protocol to find resources in grid environment. Plenty of ideas are implemented by researchers to improve the lookup performance of chord protocol in Grid environment. In this paper, we discuss the recent researches made on Chord Structured P2P protocol and present our proposed methods in which we use the address of Recently Visited Node (RVN) and fuzzy technique to locate the grid resources to reduce message and time complexity.
Efficient End-to-End Secure Key Management Protocol for Internet of Things IJECEIAES
Internet of things (IoT) has described a futurevision of internetwhere users, computing system, and everyday objects possessing sensing and actuating capabilities are part of distributed applications and required to support standard internet communication with more powerful device or internet hosts. This vision necessitates the security mechanisms for end-to-end communication. A key management protocol is critical to ensuring the secure exchange of data between interconnecting entities, but due to the nature of this communication system where a high resource constrained node may be communicating with node with high energy makes the application of existing key management protocols impossible. In this paper, we propose a new lightweight key management protocol that allows the constrained node in 6loWPAN network to transmit captured data to internet host in secure channel. This protocol is based on cooperation of selected 6loWPAN routers to participate in computation of highly consuming cryptographic primitives. Our protocol is assessed with AVISPA tool, the results show that our scheme ensured security properties.
MAP REDUCE BASED ON CLOAK DHT DATA REPLICATION EVALUATIONijdms
Distributed databases and data replication are effective ways to increase the accessibility and reliability of
un-structured, semi-structured and structured data to extract new knowledge. Replications offer better
performance and greater availability of data. With the advent of Big Data, new storage and processing
challenges are emerging.
To meet these challenges, Hadoop and DHTs compete in the storage domain and MapReduce and others in
distributed processing, with their strengths and weaknesses.
We propose an analysis of the circular and radial replication mechanisms of the CLOAK DHT. We
evaluate their performance through a comparative study of data from simulations. The results show that
radial replication is better in storage, unlike circular replication, which gives better search results.
Map Reduce based on Cloak DHT Data Replication Evaluationijdms
Distributed databases and data replication are effective ways to increase the accessibility and reliability of un-structured, semi-structured and structured data to extract new knowledge. Replications offer better performance and greater availability of data. With the advent of Big Data, new storage and processing challenges are emerging.
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
Analyse the performance of mobile peer to Peer network using ant colony optim...IJCI JOURNAL
The document describes analyzing the performance of a mobile peer-to-peer network using ant colony optimization. It proposes using a distributed spanning tree (DST) structure to improve efficiency by reducing the large number of messages. The DST is optimized using ant colony optimization to give an optimal solution. Simulation results show the approach reduces the number of messages, average delay, and increases packet delivery ratio in the network.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
The document summarizes a proposed fuzzy informer homed routing protocol for wireless sensor networks. The protocol uses fuzzy logic to select primary cluster heads based on distance to the base station and remaining energy. Each primary cluster head then chooses a backup cluster head from its cluster with the most remaining energy. The backup cluster head monitors the primary cluster head for failures by sending inquiry messages. If the primary cluster head fails to respond after multiple inquiries, the backup cluster head informs nodes to send data to it directly. Simulation results showed the proposed protocol significantly reduces energy consumption and improves reliability compared to existing protocols.
Similar to COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS (20)
5th International Conference on Natural Language Computing Advances (NLCA 2024)ijp2p
5th International Conference on Natural Language Computing Advances (NLCA 2024)
September 28 ~ 29, 2024, Toronto, Canada
https://itcse2024.org/nlca/index
Scope &Topics
5th International Conference on Natural Language Computing Advances (NLCA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology, and applications of Natural Language Computing and its advances.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works, and industrial experiences that describe significant advances in NLP.
Topics of interest include but are not limited to, the following
Chunking/Shallow Parsing Dialog Systems Discourse Information Extraction Information Retrieval Lexical Semantics Linguistic Resources Machine Translation Ontology Paraphrasing/Entailment/Generation Parsing/Grammatical Formalisms Phonology, Morphology POS Tagging Question Answering Semantic Processing Speech Recognition and Synthesis Spoken Language Processing Statistical and Knowledge-based Methods Text Mining NLP and Machine Learning NLP and Computational Linguistics NLP and Information Retrieval NLP and AI
Paper Submission Authors are invited to submit papers through the conference Submission System by June 22, 2024. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).
Important Dates:
Submission Deadline: June 22, 2024 Authors Notification: August 03, 2024 Registration & Camera-Ready Paper Due: August 10, 2024
Contact Us:
Here's where you can reach us: nlca@itcse2024.org or nlcaconference@yahoo.com
Submission Link: https://itcse2024.org/submission/index.php
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally.
International Journal of Peer to Peer Networks .docxijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of P2P networks.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results
in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best
practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems,
large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety
of fields can exchange ideas to further research and improve practices in all areas of P2P.
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)ijp2p
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Big Data, Internet of Things (IoT) and Machine Learning. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Big Data, IoT and Machine Learning.
7th International Conference on Networks, Communications, Wireless and Mobile...ijp2p
7th International Conference on Networks, Communications, Wireless and Mobile Computing (NCWMC 2022) looks for significant contributions to the Computer Networks, Communications, wireless and mobile computing for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, network protocols and wireless networks, Data communication Technologies, network security and mobile computing. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
4th International Conference on Internet of Things (CIoT 2022)ijp2p
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT.
11th International conference on Parallel, Distributed Computing and Applicat...ijp2p
11th International conference on Parallel, Distributed Computing and Applications (IPDCA 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Parallel, Distributed Computing. Original papers are invited on Algorithms and Applications, computer Networks, Cyber trust and security, Wireless networks and mobile Computing and Bioinformatics. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)ijp2p
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Cloud computing. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
4th International Conference on Internet of Things (CIoT 2022) ijp2p
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT.
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
3rd International Conference on Networks, Blockchain and Internet of Things (...ijp2p
3rd International Conference on Networks, Blockchain and Internet of Things (NBIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Networks, Blockchain and Internet of Things. The Conference looks for significant contributions to all major fields of the Networks, Blockchain and Internet of Things in theoretical and practical aspects.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas but are not limited to:
3rd International Conference on NLP & Information Retrieval (NLPI 2022)ijp2p
3rd International Conference on NLP & Information Retrieval (NLPI 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Information Retrieval.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...ijp2p
14th International Conference on Wireless & Mobile Networks (WiMoNe 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Wireless & Mobile computing Environment. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Wireless, Mobile Networks & its applications had received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)ijp2p
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of P2P networks.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)ijp2p
3rd International Conference on Blockchain and Internet of Things (BIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and
applications of Blockchain and Internet of Things. The Conference looks for significant contributions to all major fields of the Blockchain and Internet of Things in theoretical and
practical aspects. Authors are solicited to contribute to the conference by submitting articles that illustrate research
results, projects, surveying works and industrial experiences that describe significant advances in the areas of Blockchain and Internet of Things.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
Levelised Cost of Hydrogen (LCOH) Calculator ManualMassimo Talia
The aim of this manual is to explain the
methodology behind the Levelized Cost of
Hydrogen (LCOH) calculator. Moreover, this
manual also demonstrates how the calculator
can be used for estimating the expenses associated with hydrogen production in Europe
using low-temperature electrolysis considering different sources of electricity
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
1. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
DOI : 10.5121/ijp2p.2021.12301 1
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA
AND CHORD DHTS
Lacine KABRE1
and Telesphore TIENDREBEOGO2
1
Departement of Mathematics and Computer Engineering Joseph Ki-Zerbo University,
Ouagadougou, Burkina Faso
2
Departement of Mathematics and Computer Engineering Nazi Boni University, Bobo-
Dioulasso, Burkina Faso
ABSTRACT.
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally.
KEYWORDS
P2P, DHT, peerfactSim, CAN, Pastry, Kademlia, Chord.
1. INTRODUCTION
With the arrival of concept of P2P, people have changed the way they use Internet. It allows users
to create an application based on a virtual network in which data can be exchanged, even with the
restrictions of the underlying networks of the Internet, such as firewalls, dynamic IP address
assignment (1). This new generation of file sharing systems has been completely
decentralized in terms of storage and resource sharing. It has many advantages that break the
limits of the client/server model. We have among others:
the absence of a central element allowing to increase considerably the fault tolerance of the
services, because if the disappearance of a server generates the unavailability of the offered
service, the disappearance of a peer is without consequence;
the fair distribution of data and executed tasks balances the traffic of the underlying
network and the load assigned to each participant;
2. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
2
the potential aggregation of the computing power and storage space of millions of
machines offers users a power that exceeds any existing centralized infrastructure;
the use of machines belonging to different owners allows to reduce the costs related to the
purchase and maintenance of equipment.
In the absence of centralized and fixed coordination, P2P networks, for more scalability, allow
interaction between the nodes that constitute them. This scalability is made even more robust by
the introduction of Distributed Hash Tables (DHTs) in P2P systems. When a peer-to-peer
network is equipped with this indexing distributed technique, over all the nodes, it is then referred
to as a structured system. The most known are CAN [21], Kademlia [6], Pastry [20] and Chord
[11]. The principle of these structured networks is to organize the peers according to a structured
logical network. The routing protocols in P2P networks using DHTs are simply called DHTs. A
Distributed Hash Table is a data structure that associates a key with an object by hashing and
create an index. A key is the result of a hash function (e.g. SHA-1: Secure Hash Algorithm)
applied to an element of the object. For example, the key of a peer is the result of applying a hash
function to the IP address of its node, while the key of an object is the hash of its name. The
particularity of distributed hash tables is the new distribution and localization technique it
proposes. In a DHT, peers and objects are identified in the same namespace. Each node is
responsible for a portion of the keys in the system and each object is stored in the node whose
identifier is closest to its key according to the distance metric used. These structured P2P
networks give several types of routing topology that will change the performance of peer-to peer
systems. The trend today is to use these DHTs in all peer-to-peer applications.
In most of the DHT comparison work, a study of the four protocols that are the subject of our
study is missing. The objective of our work is to make a comparison of the theoretical and
practical performances of the CAN, pastry, Kademlia and chord protocols. We are interested in
metrics such as the number of hops, the latency, the success rate of the messages sent. Our
contribution is to compare in terms of hop count, latency and transmitted messages both
theoretical results and simulation results of CAN, Pastry, Kademlia and chord protocols by using
the peerfactSim [18] simulator. This simulator abstracts the different network layers which gives
the advantage to test the performances with a good accuracy.
Our article is subdivided in three main parts. First, we analyze the operating principles of the
four DHTs that are the subject of our study. Secondly, we proceed to their simulation and finish
with a comparative analyse.
Fig 1:Achitecture of a P2P overlay network, from [9].
3. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
3
2. RELATED WORKS
2.1. Principle of the Kademlia DHT
2.1.1. Distance between Two Nodes With XOR Metric
The notion of distance in the Kademlia protocol is based on the “or-exclusive bit by bit” operator.
For two given identifiers (id), the distance between them is:
d(x; y) = XOR(binary(x); binary(y)) (1)
The mathematical properties of the XOR [3] allow us to say that its result is always positive or
null (only if x = y), d(x;y) = d(y; x), which guarantees the symmetry of this metric. Thus we
obtain the distance between two id.
2.1.2. The Kademlia protocol works
Kademlia is a network protocol based on distributed hash tables and the XOR metric. It uses the
principle of distributed hash tables to prioritize and organize the network into a binary tree. The
complexity being in Log(n) during a search (Fig:2). One of its main advantages compared to
other DHT systems is the reduced number of configuration messages to send. In terms of
searching for its neighbors, a node must be able to know the network topology to be able to
transmit its requests with a short latency. This latency is kept to a minimum by using the UDP
[10] protocol to send all configuration and communication messages within the network.
Similarly, requests are sent in parallel and not synchronized to speed up transmission times and
avoid waiting times from faulty nodes. Each node in the network has its own identifier (id) which
is a 160 bit key. The entries of the hash table are also 160 bit keys, and are associated with a
value, which in our case will be a structure, which gives the pair (key-value) as element of the
table. A node in the network stores in its table only those (key-value) pairs whose key is nearest
to its id. The other main advantage of Kademlia is the new XOR metric used. Since it is a
symmetric metric, it allows Kademlia’s nodes to receive query responses from the same set of
nodes as contained in its table (the set of nodes that corresponds to the set of nodes contacted).
Indeed, the nodes of the Kademlia network update their routing table with each UDP message
received, and store, if necessary, the information relating to the sending node. Each node ”A” in
Kademlia maintains a routing table composed of a set of nodes called buckets. The nodes in the
buckets are ranked in order of distance according to the XOR metric. The average degree of a
node is therefore O(k*logb
2N). All the nodes of the same bucket are at the same distance from
node ”A”. Each bucket corresponds to a sub-tree (Fig:2) and contains k neighbors classified
according to their seniority in the system.
Fig 2: Kademlia tree, from [6]
4. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
4
The blue circles in Figure (Fig:2) represent the neighbors of node 0011. The location of an
identifier (or key), which can represent a connected machine or a file in the network, relies on a
unique search algorithm, unlike many other DHTs. Indeed, the space of identifiers is treated by
Kademlia as a binary tree where each node of the network is a leaf corresponding to a unique
identifier. If the tree is not complete, the search for an identifier may not converge to a unique
identifier, but return all the nearest identifiers. For a given node, we divide the binary tree into a
series of sub-trees that do not contain the intended node. The first sub-tree obtained corresponds
to half of the starting tree not containing the node. The next one is the half of the remaining tree
that does not contain the node, and so on. The Kademlia protocol ensures that all nodes in the
network know at least one node in each of its subtrees. This guarantee allows any node in the
network to contact another node by its identifier.
2.1.3. Arrival and Departure of a node
When a new peer ”A” arrives on the overlay, it generates its own identifier (id), then sends a
message containing its key. When a peer receives a message, it updates the appropriate bucket. If
the sending node is already in that bucket, it is moved down the list. Otherwise, if the bucket is
not full, the new entry is inserted. If the bucket is full, node ”A” sends a PING to the oldest
neighbor in this bucket. If the latter responds to the PING, it is then moved to the end of the list
and the new entry is ignored. Kademlia therefore keeps the oldest nodes in the network in its
table. A peer is detected as unavailable when the other peers can no longer communicate with it
due to a failure or breakdown. Thus, the other peers update their routing tables. Applications like
Bittorent and mule work using Kademlia.
2.2. Principle of the Chord DHT
2.2.1. Protocol Operation
In a Chord overlay network [11], nodes are organized in a directed ring topology of 2m
peers,
where m is the number of bits in the used hash function (typically 160 bits). Each peer is linked
to a predecessor and several successors. A node maintains a routing table to nodes of identifiers n
+ 2K-1
with k the number of bits used for identification. The table is thus of logarithmic size and
the key search operations are performed in logarithmic time. The Chord protocol keeps track in
its K-entry routing table and users can contact K nodes in the network directly to transmit their
requests.
Fig 3: Architecture of a Chord network [19].
2.2.2. Routing in Chord
The Chord [11]: protocol is the simplest implementation of a DHT. There is no routing table.
Each node communicates only with its successor in a stringlike fashion. For example, when a
5. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
5
query is made for a key, each node examines whether the key being searched for is less than or
equal to its successor’s identifier. If there is a match, then the node returns its successor’s id. In
addition, there is a more optimal routing. Figure (Fig:4) describes how in optimal routing one can
very quickly find a user in this decentralized network. Suppose that user ”A” is looking for user
”B”, because he has a file that he is looking for. User ”A” needs the IP address of this user, but
only knows the key ”Key(B)” in the Chord network (this key alone does not give a route in the
physical network of the Internet). The user ”A” has stored in his memory the log (N) nodes
corresponding to the log(N) additional links he has on the virtual ring. If B is among these nodes,
then ”A” finds directly the address of ”B”. Otherwise, ”A” will send its request to the node
whose key is nearest to ”Key(B)” among the log (N) nodes that it has stored.
Fig 3: Optimal routing in Chord [19].
Chord supports well the scaling. Different works [14] have been conducted and show that the
average length of path used to route a request evolves in O(log(N)), with N the size of the
network.
2.2.3. Arrival and Departure of A Node
When a new peer X arrives on the overlay, it first takes its place in the ring according to its
identifier (node id). Then it sends a message to the nearest successor, which sends all its lower
keys to the peer X. Then the peers update their routing tables. A peer is detected as unavailable
when the other peers cannot communicate with it because the failing peer has left the overlay or a
failure has been introduced. Then the other peers update their routing tables. There are several
applications that use Chord as their basic protocol. There are :
CFS (Collaborative File System) [5]: a file system distributed at the scale of the Internet,
and where each file is shared in blocks;
ConChord [1]: a distributed infrastructure that uses CFS and issues SDSI (Simple
Distributed Security Infrastructure) certificates.
2.3. Principle of the Pastry DHT
Pastry is a purely decentralized system [20] inspired by Chord’s ring topology, but the
identification space is circular and undirected, so searches can be done in either direction. The
6. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
6
identifier of a node has a size of 128 bits and is obtained randomly through a hash function based
on the IP address or by using a public key.
The identifiers are generated and distributed uniformly over the identifier space. Routing is
guaranteed by distinguishing the node in the table, presenting the longest common prefix with the
resource identifier to make the next routing. Pastry is based on a prefix-based routing mechanism.
2.3.1. Routing in Pastry
Let’s assume that a node ”A” is looking for another node with to key ”K” to transmit a message
”m”, it routes the message the node that has the identifier (idNode) nearsest to numerically to the
key ”K”. In other words to a node where idNode shares with the key K, a common common
prefix. This routing is based on the prefix matching. The figure(Fig:5) shows an example of
message routing, where node 89B1CC routes a message to the node that key is E19BCA. In the
first step, node 89B1CC sends the message to a node whose identifier has a digit in common with
the key it is looking for. In this example the node is EF25BA. During the second step, the node
E1CC5A retransmits ”m” to a node whose identifier has three digits in common with the
searched key, here the node E192C5. So on until ”m” reaches the node whose key is E19BCA.
Fig 4:Routing a message from node to node in Pastry[20]
2.3.2. Arrival and departure of a node
When a new peer X arrives on the overlay, it generates its node id, then sends a message
containing its key. The DHT Pastry forwards the message to the numerically nearest node id.
Then each intermediate peer in this route sends a row of their routing table corresponding to the
node id to X. X then establishes its routing table from this information. A peer is detected as
unavailable when the other peers can no longer communicate with it, i.e. when the failing peer
leaves the overlay or when a failure has been introduced. This causes the other peers to update
their routing tables. There are also some applications based on Pastry:
SCRIBE [23]: a multi-group broadcast application.
PASTICHE [13]: a backup system which exploits the available capacities of the memories
distributed in the network.
7. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
7
2.4. Principle of the CAN DHT
The CAN distributed hash table design described is based on a virtual cartesian coordinate space
of torus space (Fig:6). This coordinate space is completely logical and has no relation to any
physical coordinate system. At any point in time, the coordination space is dynamically shared
among all the nodes in the system so that each node has its own distinct area in the space.
Fig 5: Space CAN on two dimensions [21]
The CAN DHT provides a multidimensional cartesian vector space where each portion of the
space can be adopted by a node, and each node acquires information about its directly connected
neighbors. Each identifier is converted into coordinates in CAN space. The routing in CAN is
done from near to near, passing through all the neighbors until it reaches the target peer. To make
a hop, the node receiving the request communicates it to the neighbor whose coordinates of that
neighbor overlap on d-1 dimensions and are contiguous on the remaining dimension. At each
hop, we can only change coordinates on one dimension. For example, the previous figure (Fig:7)
shows a two-dimensional coordinate space of [0; 1] over [0;1] partitioned between 6 CAN nodes.
This virtual coordinate space is used to store (key, value) pairs: to store a (key, Value) pair, the
key is determined on a point P in the coordinate space using a uniform hash function. The
corresponding (key, value) pair is then stored on the node that owns the field. To retrieve an entry
that matches a key, any node can apply the same deterministic hash function to map the given
key to point P and retrieve the corresponding value from point P. If point P is not owned by the
requesting node or its immediate neighbors, the request must be routed through the CAN
infrastructure until it reaches the node in the area. Efficient routing is therefore a critical aspect of
the CAN protocol. Nodes in CAN automatically organize themselves into an overlay network
that represents this virtual coordinate space. A node learns and maintains the addresses of nodes
that contain coordinate areas adjacent to its own area. This set of nearest neighbors in the
coordinate space serves as a coordinate routing table.
8. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
8
Fig 6: Routing CAN on two dimensional space [21]
In Figure (Fig:7), node 5 is a neighbor of node 1 because its coordinate area overlaps with 1 on
the Y axis and follows along the X axis. On the other hand, node 6 is not a neighbor of 1 because
their coordinate areas engage along the X and Y axes. Using its neighboring set of coordinates, a
node transmits a message to its destination by a simple gluttonous routing gluttonous routing: a
path that is constructed point by point to the neighbor with coordinates nearest to the destination
coordinates. For a space divided into n equal areas, the average routing path length is O(d /4)
(n1/d
). The hops and individual nodes maintaining the 2d neighbors. These scaling results mean
that for a d-dimensional space, we can increase the number of nodes (and thus areas) without
increasing the state of the nodes. However the average path length increases and can tend to
O(n1/d
).Note that many different paths exist between two points in space, even if one or more of a
node’s neighbors should crash, a node can automatically route to another available path. But
when a node loses all of its neighbors in a certain direction there are repair mechanisms that are
triggered.
Note: the formula (d/4) (n1/d
), represents the average routing path length of CAN. The routing
depends on two factors: the size of the network(N) and the dimension of the space(d). Thus by
varying d from 2 to 4 and by taking N=1000, we have the evolution of the average number of
hops on the figure ( Fig :8). These graphs show that for a two (02) dimensional space the average
number of hops goes from 5 per 100 nodes to about 16 per 1000 nodes. For a 3-dimensional
space, the value of the average number of hops varies from 1.54 to 3.33 per 1000 nodes. This
evolution tends the logarithmic order: log(N). For a 4 dimensional space, the value of the average
number of hops decreases considerably. It goes from 0.8 to 1.4 per 1000 nodes. In conclusion: the
more the space is multidimensional, the more the routing improves considerably.
9. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
9
Fig 7: Performance CAN according to dimensions.
2.5. Optimization of DHTs with the De Bruijn graph
The routing of the various DHTs previously studied can be optimized by adopting the De Bruijn
graph approach. De Bruijn’s graph is a fixed degree directed graph with outgoing and incoming
edges for each node. The degree is the total number of nodes. It has a diameter of logkN with N
the number of nodes and k outgoing edges and k incoming edges. An arc is drawn between two
vertices if the last n-2 characters of the initial word correspond to the first n-2 characters of the
terminal word. The arc is labeled by the last character of the terminal word (Fig:9). The authors
in [8] have proposed the construction of DHTs(CAN, Chord, Pastry) on a graph of fixed degree
to obtain a small routing diameter. Indeed, with De bruijn’s graph, the routing is done with half
the time of the classical approach of CAN or Chord. Moreover, De Bruijn’s graphs offer a
diameter four times smaller than those of Chord or CAN. Thus, implementing CAN based on the
De Bruijn graph would give it a better performance in terms of routing.
Fig 8: graph of De Bruijn [8]
10. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
10
2.6. Work on the Analysis of DHTs
A comparison of the performance of Chord and Kademlia DHTs in a context of high churn has
been proposed by Elizabeth Perez and Miguel Lopez in [4]. This study shows that under similar
conditions (experiment condition), Kademlia shows higher performance than Chord. Therefore,
These authors concluded that DHTs must have mechanisms to deal with high churn throughout
their existence. Otherwise they may not reach a state where peers are properly connected. In
addition, the results suggest that DHTs should rely on less dynamic peers to improve their
performance. An evaluation of structured peer-to-peer performance in mobile networks described
in [7] evaluates the performance of five structured P2P protocols based on popular DHTs,
namely: Chord, Pastry, Kademlia, Broose [7] and EpiChord [7]. This experimentation showed
that Kademlia and EpiChord are good candidates for mobile networks that have an environment
with a high churn rate. In addition, a study of Kademlia and Chord protocols in a peer-to-peer
session initiation environment (P2P SIP) shows that Chord offers slightly better scalability in
terms of messaging cost. The difference is mainly a consequence of Kademlia’s higher frequency
of keepalive . The second finding was that the average packet size was slightly smaller (about
14%) when using Kademlia. The results regarding routing performance revealed that Kademlia is
much better compared to Chord by about 40% shorter search path length on average. The
differences can be explained both by the general routing efficiency of the topologies used and by
the means of updating the routing information. It must be noted that this work did not clearly
establish a comparison of the CAN, Pastry, Chord and Kademlia DHTs. In this work ,we have
conducted a comparative theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. With a
simulation, we will evaluate the performance in terms of latency, number of hops and number of
transmitted messages. This study is done using the simple network layer of the peerfactsim
simulator. The use of the single network layer can be considered as an ideal case because the
node searches are done locally.
2.7. Existing Peer-to-Peer Simulator
There are many simulators for peer-to-peer networks. We give in this paragraph an non-
exhaustive list of peer-to-peer simulators.
• P2Psim [16]: Simple to use but with limited statistics, scales to 3000 nodes maximum. It
does not have a graphical display.
• PeerSim [16]: Scales up to 106 nodes in cyclic mode. The physical network is not modeled,
there is little documentation on the discrete event simulation mode and there is no graphical
visualization.
• QueryCycle [16] : specialized in file exchange systems with a network modeling in cyclic
mode; scaling up to 20 nodes.
• OverSim [16]: scaling up to 105 nodes, physical network modeling, network visualization
and statistics. Several DHTs implemented Chord, Kademlia. In case of error it blocks the
simulation without displaying error messages.
• PeerfactSim [18] : the nodes of the physical network are modeled, possibility to visualize
statistics. Several DHTs implemented like Chord, Kademlia, CAN, Pastry and also content
distribution systems like gnutella. It scales up to more than 105 nodes, generates data files
even in case of errors and consumes more memory compared to other simulators like
PeerSim.
In the context of this study, we have chosen the peerfactSim simulator for various reasons that we
will give in the following subsection.
11. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
11
2.8. The PeerfactSim simulator
The PeerfactSim simulator, based on Java, is a project launched by the Multimedia
Communication Laboratory (KOM) for the simulation of large-scale peer-to-peer systems. It is
often called PeerfactSim. PeerfactSim peer act is a discrete-event P2P simulator written in Java,
developed by the Technical University of Darmstadt and published under the GNU General
Public License. The stated goal of the project is to create an adaptive and lightweight simulation
tool for efficient, accurate and realistic modeling of P2P protocols and applications.
2.9. Advantages
This simulator particularly meets our expectations in the sense that its architecture clearly
separates the different levels of abstraction:
at the level of the IP network layer, the simulator models the latency times for each
message sent;
at the overlay network layer, existing P2P protocols (CAN, Omicron, Chord,
Kademlia, Pastry) are originally implemented in the simulator;
at the user level, the user behavior part is totally detached from the corresponding
physical node. Thus, we can implement a behavior model without having to modify
the network parts. In addition, the spatial and temporal distribution of users is taken
into account.
2.10. Drawbacks
The documentation is relatively weak and the only way to learn how the simulator works is to
dive into its implementation and have some knowledge of the P2P protocols that are
implemented. The basic architecture of PeerfactSim, can currently be divided in two parts: the
functionality layer and the simulation layer (the PeerfactSim engine). Each layer provides well
defined interfaces to express its individual functionality, operations and services provided.
Specifically, the core components for each layer are identified and provide different services that
can be used by other layers or components.The network layer of the simulator maintains a
number of services that embody the functionality of the three lower layers of the ISO/OSI model.
3. THE CHARACTERISTICS OF THE SIMULATION LAYER
In general, all discrete event-based simulations have a common structure. We will briefly
describe some of the components.
3.1. The Event Scheduler
This is the most executed component during a simulation. This method is executed before each
event and can be called several times in an event to trigger other new events. The actions
performed by this method are:
the scheduling of event x at a time t;
the cancellation of a previously scheduled event x;
the obtaining of the simulation time;
the determination of the final time of a simulation.
12. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
12
3.2. Simulation Time and Progression Mechanism
Each simulation has a global variable representing the simulation time. The scheduler is
responsible for the progress of this time which will be updated automatically according to the
time of the nearest event.
3.3. The Event Queue
The planning of events is done by keeping an ordered list of future events to simulate. Each
simulation event contains the time at which it should occur and a reference to a simulation event
handler who will be informed of the occurrence of this event.
3.4. Hosts in the simulator
It is important to understand that, during a simulation, each peer is represented by a host (Figure
10) in the current version. This host is implemented by the DefaultHost class. The host also
includes an additional component called HostProperties that contains general information about
the download rate,bandwidth consumed according to the requirements of the simulation.
HostProperties can be extended with other properties such as CPU power, storage, RAM, etc.
3.5. Simulation With the Simple Network Model Implemented in Peerfactsim
The simple network model is intended to implement a stable and efficient network layer, without
going into too much detail about the network characteristics. It is mainly applicable for
debugging and testing overlays and provides a fast simulation. Other aspects include high
memory efficiency and faster loading of network stacks at the beginning of the simulation.
Currently, only transmissions with UDP (User Datagram Protocol) can be configured using this
network layer. The use of this layer can be considered as the ideal case.
Fig 10:Architecture of peerfactSim [18]
3.6. Description of the Simple Network Model
3.6.1. The addressing
The addressing scheme applied to the simple network model is based on integers. Theaddress of a
simulated peer in the network layer is assigned by the Simple Net Factory component of the
peerfactSim simulator, starting with the identifier 0, and increased by 1 for each new network
layer.
13. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
13
3.6.2. Behavior of the Peers
In the simple network model, when a peer sends a message to another peer, it first checks if the
sender is online or offline. Messages from senders, who are offline, will be deleted immediately.
If the sender is online, the subnet (SimpleSubnet) corresponding to the model calculates the
latency for the transmission based on the time taken before the messages are received after a
given time, which is determined by the latency model chosen. In order to ensure the orderly
delivery of messages, different latency calculation strategies ensure that previously sent messages
will always be delivered before later sent messages. When a packet is delivered, we check if the
receiver is still online, otherwise the packet is dropped.
3.6.3. Size of messages
Messages are generated by the SimpleNetMessage component. The size of a SimpleNetMessage,
of the simple network model, is only the size of the transported payload (the size of the data
field). It does not add a header or footer to the packet.
3.6.4. Bandwidth management
Bandwidth management for the transmission of messages from one peer to another is not
currently implemented in the simple network model. Peers have almost unlimited bandwidth.
This means that neither the number of messages received or sent nor their size is a not problem.
We are interested here in the simple latency model. In the simple latency model, the
SimpleLatencyModel class assigns a random position to each peer based on a two dimensional
torus surface, of size 40,000 * 40,000 km2.
The torus is a kind of cylinder curved on itself whose ends meet, forming a ring. The formula for
calculating the latency for a transmitter S and a receiver R is based on Kovacevic’s idea [17] as
follows:
latency(S;R) = f:(df(n) + (dist(S;R))/v)
In this formula, dist (S,R) denotes the shortest Euclidean distance between the two peers S and R
on the torus. df(n) is a time uniformly distributed between 0 and 31 ms, which is immutably
related to each even n. The absolute term V represents the propagation speed of the signal, which
is 100,000 km/s, and f is a random number between [0,1 :1].
In the rest of our work, we will use the network characteristics described previously, namely
bandwidth capacity, message size, peer behavior and addressing to perform simulations. These
simulations will be performed by switching from one DHT protocol to another using an xml file
to retrieve data for analysis.
4. THE CHARACTERISTICS OF THE SIMULATION LAYER
4.1. The Configuration
Syntax and semantics of the configuration XML file In PeerfactSim, each scenario is defined by a
configuration file. The configuration is represented by an XML file that can be divided into
several formal parts and each part is delimited by a tag. Before we start highlighting the different
parts, we first present the general XML-language schema, which is used to specify all
components required for a simulation. Each element that defines a component in a scenario is a
14. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
14
sub-element of the configuration tag (root element). The name of the nested element is chosen
according to the type of component and has an impact on the operation of the simulator.
Therefore, the configuration mechanism looks for XML elements with listed names, which
embody the requested functionality. The figure (Fig:11) is a capture of our xml file.
Fig 9: The variable values in the configuration file
In order to be able to switch from the execution of a protocol to another, we just changing the
values specified in the ”Default” part. We have declared our components in this xml file by
referring to other xml files. For example, we declared the component ”simulatorCore” in the
”Simulator.xml” file after the “Description” tag. The ”simulatorCore” component is the engine of
the simulation. It is responsible for the management of all the components involved in the
simulation. The seed variable (line 4 as well as line 6 of our global configuration xml file) is used
to generate random numbers. If the same seed is used for several simulations, we end up finding
the same random number sequences. The global simulation time is defined in the finish Time
variable, here it is 240 minutes. After this period, the events are not processed anymore and the
simulation is evaluated. After configuring the simulator engine and the approximate simulation
times, it is necessary to define the components to be used in the simulation. An important
component is the network layer. In our case, it is the simple network layer defined in the file
”SimpleNetLayer.xml”. To be able to deploy the CAN protocol on the nodes initialized by the
simulator, we define the component ”CanNodeFactory” with the port 123 in the xml file
CanNode.
Fig 12: Specification of the simulatorCore component.
15. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
15
Fig 10: Specification of the CanNode component.
4.2. Process of Examining the Configuration in the XML File by the Simulator
This subsection focuses on the processing of the configuration file in the simulator and describes
the components responsible for data extraction. Therefore, we first highlight the parsing of the
configuration file and then explain the instantiation of the objects defined in the different parts of
the configuration file. In order to obtain the information for the configuration of a simulation, the
simulator needs the location as well as the name of the configuration file at startup. The path of
the file is therefore specified in the IDE (e.g. the IDE in which the PeerfactSim simulator is
integrated). After the provision of the necessary values when launching the simulator the class,
taking into account the configuration, obtains the transmitted information. At present, the
simulator only offers the class ”DefaultConfigurator” as an implementation, which is ready to run
simulations and is sufficient for most scenarios. The simulation process of the peerfactSim
simulator according to the following order:
the simulator is started and gets the configuration file;
the component responsible of the configuration of the scenario is instantiated;
the list of additional variables separated by spaces is processed and stored;
the class representing and implementing the simulator, passes the control flow to the
configurator to configure the required components.
the configuration component parses the passed configuration file and creates an XML tree
from the information in the file;
on this tree, the configurator uses the first level to instantiate all the specified objects.
Consequently, this step executes a loop, the number of iterations of which depends on the
number of elements in the first level;
Among these elements, the loop differentiates the definition of the variables, which are
surrounded by the default element and between the components, representing the peers, the
additional functionalities for the simulator and so on;
in this step, the configurator creates the predefined variables and values out of the
configuration file.
4.3. The Simulation Method
In this simulation phase, we will perform the operation several times taking the simulation time
and the number of nodes as a factor. The idea is to find the average number of hops according to
the network size and see if the time influences the routing performance. So by setting a certain
number of nodes, we perform ten (10) simulations with a certain number of nodes set. For each
simulation we calculate the average number of hops every 10 minutes for a duration of two (02)
hours. To find the average number of hops, we perform the following operation let x1; x2; x3;….
x10, be the averages obtained for each simulation and Y the number of average hops.
y = (x1; x2; x3;…; x10)/10 (3)
16. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
16
5. RESULT
In this section we will analyze the results obtained from our simulation. This analysis also
focuses on the average number of hops, the latency and the messages sent by each protocol. The
performance parameters remain the time and the number of nodes. The use of the single network
layer can be considered as an ideal case because the node searches are done locally.
5.1. Graph and Theoretical Comparison of DHT
Our analysis of the DHTs systems and other analysis works carried out in [12] and [2] allow to
summarize in Figure (Fig:14), a complete analysis of their theoretical properties. For each of the
topologies, we present the routing diameter and the neighborhood degree. The degree represents
the size of the routing table. The diameter is the largest distance, in number of hops, between two
peers. Finally, the flexibility of a DHT represents the degree of freedom of the nodes when
choosing the nodes in the routing table and the next hop.
Table 1. Comparison of degrees and diameters of some P2P routing protocols [2].
DHT Degree Diameter
Chord O(log(N)) O(log(N))
Kademlia O(k*log2
b
(N)) O(log2
b
(N))
CAN O(d) O(d)
Pastry O(2b-1
*log2
b
(N)) O(log2
b
(N))
b : is a configuration parameter typically equal to 2 (often 4);
N : the size of the network;
d : the dimension of the space;
k: (for Kademlia) the number of neighbors in each subtree of a node.
Figure (Fig:14) is a graphical representation of the performances of the CAN, Chord, Pastry and
Kademlia DHTs. We have three curves instead of four. This is due to the fact that Kademlia and
Pastry have theoretically the same performance in terms of routing. We see that in terms of
routing CAN (3 dimensional) and Chord have a good performance compared to Pastry. Indeed,
the performance of CAN depends more on the dimension of the space in which it carries out its
routing. The more the space is with several dimension, the more the number of hops decreases.
Thus, if in two dimensions, the routing is carried out from close to close according to two axes, in
three or four dimensions, we have respectively three and four axes to reach a peer.
17. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
17
Fig 11: Theoretical comparison graph of DHTs.
5.2. Path Length Versus Number of Nodes
The figure (Fig :15) shows that the average path length increases algorithmically with the number
of nodes, except for the CAN protocol. The blue curve, which represents the evolution of the path
length of the CAN protocol, obtains the highest values (from 6.95 per 100 nodes to 21.5 per 1000
nodes), while the orange curve obtains the lowest values (from 2 per 100 nodes to 3.6 per 1000
nodes). Also, we have the brown curve that shows the evolution of the path length of Kademlia
according of the size of the network (this value goes from 5.5 per 100 nodes to 6.4 per 1000
nodes) and the curve in Yellow which indicates that of Chord (the value goes from 4 per 100 to
5.8 per 1000 nodes). Finally to find the base of the logarithmic function of the routing order, we
make a comparison with calculated values (log10(n), log2(n)). The result is that Pastry’s routing is
closer to the logarithmic order with base equal to 10 (log10(n)) and Chord and Kademlia have a
routing closer to log2
b
(n). b: number of bits in the alphabet used (e.g. in hexadecimal b=4), n:
number of nodes. For the CAN protocol, its routing is closer to (d /4) (n1/d
).
18. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
18
Fig 12: Evaluation of the average number of jumps according to the size of the network.
5.3. Path Length Versus Number of Nodes
variation of path length versus time Finally, to find the impact of time on the performance of the
protocols in terms of path length, we performed the simulation experiment with 1000 nodes over
a period of 2 hours. Figure (Fig:16) clearly shows that there is no significant influence of time on
the path length, for a certain number of active nodes, whatever the protocol used. This proves the
efficiency of self-organization of DHTs protocols. From the observations made on Figure
(Fig:16) and Figure (Fig:12), we conclude that the best performing protocol in terms of path
length, in the peerfactSim simulator is Pastry. And the Chord, Pastry, Kademlia protocols have a
better scalability compared to the CAN protocol.
Fig 13: Evaluation of the average number of hops as a function of time.
5.4. Path Length Versus Number of Nodes
The absolute dispersion parameters indicate how much the values of a distribution deviate in
general from the reference value. An absolute scatter parameter is always expressed in the unit of
19. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
19
measurement of the variable under consideration. The four most common absolute dispersion
parameters are the range, the interquartile range, the mean absolute deviation and the standard
deviation. In our case, we use the range because the averages calculated as a function of the size
of the network vary slightly: 6,94, 6,89, 6,91 The range is the difference between its highest and
lowest value. if we have values called X, we will have:
X = Xmax - Xmin (4)
Thus we have: 0.5 for CAN, 0.1 for Chord, 0.8 for Pastry and 0.09 for Kademlia. These values
are represented by segments on each curve in Figure (Fig:16).
5.5. Path Length Versus Number of Nodes
Fig 14: CAN and Pastry
Fig 15 : Kademlia and Chord
On the figures (Fig:17) and figure(Fig:18), we have the curves drawn from the theoretical results
and the results obtained after simulation. The curves with the bars are obtained from the data of
the simulation. Note all the curves have the same shape and for each protocol, there is a
difference between the theoretical values and the values of the simulation. CAN, Pastry and
Kademlia have a logarithmic function according to the network size but with a difference in
values.
5.6. Latency
Figure (Fig :19) shows the latency of operations performed during the simulation. Operations in
PeerfactSim boil down to sending messages. latency is defined as the time between sending and
receiving a message.
20. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
20
Fig 16: Latency time according to the size of the network.
The latency is approximately one second for these four protocols. Note that the physical network
layer is local. So the search for keys in the identifier space and the requests sent remain local.
This can optimize the latency time. We also notice that the average latency evolves weakly with
the number of nodes, which confirms that these DHTs are scalable.
5.7. Average Number of Failed Messages and Number of Transmitted Messages
In this section we analyzed the initialized messages and the correctly transmitted messages to
determine the average number of failed messages as a function of time.
Fig 17:Number of messages transmitted versus time.
On the figure (Fig:20) we notice that the CAN protocol sends more messages. But this number
decreases slightly with time and also the number of failed messages is low. The number of
massages sent by Pastry increases with time and the number of failed massages increases
proportionally with the number of messages sent. Chord sends less messages and without failure.
Obviously the CAN protocol has a long routing time compared to the others but ensures the
sending of a very large number of messages.
All previous results showed that Pastry is efficient in terms of routing and that these protocols
have approximately the same latency. In terms of message delivery, DHT Chord is more efficient
because it has less transmission failure. Kademlia has a middle position between Pastry and
21. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
21
Chord in terms of performance. CAN, on the other hand, is first in terms of the number of
massages sent.
6. CONCLUSION
Peer-to-peer networks, structured or unstructured, are globally recognized as a viable solution for
the implementation of various distributed applications. Existing applications and research
projects indicate that structured peer-to-peer systems are very valuable technologies in a data
sharing environment. Distributed hash tables provide reliable scaling while maintaining network
performance compared to unstructured peer-to-peer technologies. Several comparative studies of
DHTs have been done in order to classify them according to their performance but most of them
do not take into account the CAN protocol. Therefore, in this work, we have highlighted CAN
and its performance by comparing it to Chord, Kademlia and Pastry. The simulation not only
gives us a view on their performance in terms of routing, latency and messages sent but also an
overview on the theoretical and real performances. The simulation scenarios were built with the
PeerfactSim simulator after a comparison between existing peer-to-peer network simulators. It
was found that the Peerfactsim simulator implements all four protocols in our study and is open
source. Today, with the advent of the cloud [22] and the techniques of parallel computing on the
large amounts of data that are stored there, structured peer-to-peer protocols seem to be a solution
to overcome the problems often encountered due to its strongly coupled architecture. In
perspective, structured peer-to-peer protocols like CAN could be used to provide a fully
distributed environment for storing and computing these large amounts of data. This will avoid
bottlenecks and increase the availability of large-scale cloud applications.
REFERENCES
[1] Sameer ajmani, dwaine e. clarke, chuang-hue moh, and steven richman. conchord : Cooperative sdsi
certi cate storage and name resolution. , pages 141154. Springer, 2002.,journal = In
InternationalWorkshop on Peer-to-Peer Systems, year= 2002,.
[2] Krishna gummadi, ramakrishna gummadi, steven gribble, sylvia ratnasamy, scott shenker, and ion
stoica. the impact of dht routing geometry on resilience and proximity. in proceedings of the 2003
conference on applications, technologies, architectures, and protocols for computer communications,
pages 381394. ACM, 2003. conference on Applications, technologies, architectures, and protocols for
computer communications, 2003.
[3] Jares-runser katia and cedric lauradoux. authentication planning for xor network coding in wireless
sensor networks. in international symposium on network coding (net- cod2011), 2011. In
International Symposium on Network Coding, 2011.
[4] Elizabeth P´erez-Cort´es Miguel Lopez-Guerrero Adan G. Medrano-Ch´avez. Peer-to-peer
networking and applications. Peerto-Peer Networking and Applications, 2015.
[5] Kasyful Amron. Collaborative file sharing system using jxta p2p networking infrastructure – an
application development. Journal of Enviromental Engineering and Sustainable Technology, 4:31–40,
07 2017.
[6] Ingmar Baumgart and Sebastian Mies. S/kademlia. A practica ble approach towards secure key-based
routing. in parallel and distributed systems, 2007 international conference on, pages 18. IEEE, 2007.,
journal = International Conference , year = 2007,.
[7] F. Chowdhury and M. Kolberg. Performance evaluation of structured peer-to-peer overlays for use on
mobile networks. In 2013 Sixth International Conference on Developments in eSystems Engineering,
pages 57–62, 2013.
[8] IEEE Juan Casas Dmitri Loguinov, Member and IEEE Xiaom ing Wang, Student Member. Graph-
theoretic analysis of struc tured peer-to-peer systems: Routing distances and fault resilience.
IEEE/ACM TRANSACTIONS ON NETWORKING,, 2005.
[9] Marguerite Fayc¸al. Routage efficace pour les reseaux pair- a-pair utilisant des tables de hachage
distribuees . PhD thesis, Telecom ParisTech, 2010.
22. International Journal of Peer to Peer Networks (IJP2P) Vol 12, No.1/2/3, August 2021
22
[10] Bernard Cousin Houssein Wehbe, Gerard Babonneau. Optimisation de la retransmission des paquets
perdus en streaming p2p. JDIR, Mar 2010, Sophia Antipolis, France., 2010.
[11] David Karger-M. Frans Kaashoek Ion Stoica, Robert Morris and Hari Balakrishnan. Chord : A
scalable peer-to-peer lookup service for internet applications. acm sigcomm computer communication
review, 31(4) :149160, 2001., journal = ACM SIGCOMM Computer Communication, year = 2001,.
[12] Steven Gribble-Sylvia Ratnasamy Scott Shenker Krishna Gum madi, Ramakrishna Gummadi. and ion
stoica. the impact of dht routing geometry on resilience and proximity. in proceedings of the 2003
conference on applications, technologies, architectures, and protocols for computer communications,
pages 381. In Proceedings of the 2003 conference on Applications, technologies, architectures, and
protocols for computer communications, 2003.
[13] Christopher D. Murray Landon P. Cox and Brian D. Noble. De partment of electrical engineering and
computer science university of michigan, ann arbor, mi 48109-2122. 2007.
[14] Emmanuelle Lebhar. Emmanuelle lebhar. algorithmes de routage et modeles aleatoires pour les
graphes petits mondes. phd thesis, ecole normale superieure de lyon-ens lyon. ´ Ecole normale
superieure de lyon ´ , 2005.
[15] Rahmani A.M. Conti-M. Maleki, N. Mapreduce: an infrastructure review and research insights. j
supercomput 75, 6934–7002. https://doi.org/10.1007/s11227-019-02907-5, 4, 07 2019.
[16] Shujaat Khan Mansoor Ebrahim and Syed Sheraz Ul Hasan Mohani. Peer-to-peer network simulators:
an analytical review. https://www.researchhub.com/, 2014.
[17] Sebastian Kaune Patrick Mukherjee Nicolas Liebau Aleksan dra Kovacevic and Ralf Steinmetz.
Benchmarking platform for peer-to-peer systems. it - information technology (methods and appli-
cations of informatics and information technology), 49(5) :312319., Sep 2007., journal = Informatics
and Information Technology, year = 2007,.
[18] peerfact. Peerfactsim.kom : A simulator for large-scale peer-to peer networks. http
://www.peerfactsim.com. 2007.
[19] David R. Karger‡ M. Frans Kaashoek‡ Frank Dabek‡ Hari Bal akrishnan‡ Robert Morris‡, David
Liben-Nowell‡. A scal able peer-to-peer lookup protocol for internet applications.
https://pdos.csail.mit.edu/papers/ton:chord/paper-ton.pdf.
[20] Antony Rowstron and Peter Druschel. Pastry : Scalable, decen tralized object location, and routing
for large-scale peer-to-peer systems, pages 329350. Springer, 2001., journal = In IFIP/ACM
International Conference on Distributed Systems Platforms and Open Distributed Processing, year =
2001,.
[21] Mark Handley Richard Karp Sylvia Ratnasamy, Paul Francis and Scott Shenker. A scalable content-
addressable network, volume 31. acm, 2001. 2001.
[22] C. Wu T. Dillon and E. Chang. Peer-to-peer networking and appli cations. 2010 24th IEEE
International Conference on Advanced Information Networking and Applications, Perth, WA,
Australia,2010.
[23] Yan Wang. An advanced p2p multicast algorithm based on scribe. Advanced Materials Research,
2013
Authors
Laciné Kabre Currently I am a PhD student. I have a master’s degree from Joseph
Ki-Zerbo University in information systems and network. My research interests
include Big data, Software Defined Networking, Distributed Hash Tables.
Telesphore Tiendrebeogo PhD and overlay network and assistant professor at
Nazi Boni University. I have a master's degree in multimedia and real time
system. My current research is on big data and image watermarking.