International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 3 | Issue 3 | Year 2012 | Article Id. IJCTT-V3I3P106 | DOI : https://doi.org/10.14445/22312803/IJCTT-V3I3P106

Session Based Protocol: Data Sharing in an Overlay System


Birbal Saran, Anil Saroliya, Varun Sharma, Richa Arya

Citation :

Birbal Saran, Anil Saroliya, Varun Sharma, Richa Arya, "Session Based Protocol: Data Sharing in an Overlay System," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 3, pp. 333-339, 2012. Crossref, https://doi.org/10.14445/22312803/IJCTT-V3I3P106

Abstract

Overlay network such a network in which no existence of any server. It is recommended research spot for network architecture. There are various applications which can be deployed on this architecture. Overlay network is more reliable and efficient for sharing data. There are a variety of approaches exists which need to improve the overlay system efficiency. In overlay network instead of a centralized server every node has equal potential and priority. Peer’s age not fix in the overlay network node may leave or join network frequently. Paper addresses the problem of extremely temporary populations in unstructured and loosely structured peer-to-peer (P2P) systems. In existing system query strategy is based on flooding where every query propagated to all achievable nodes inside certain area of network. This approach faces the limitation of scalability. In this paper, a session based approach for query supply, cashing and duplication is discussed. The problem of high temporary node in unstructured and loosely structured in P2P system can be solved by session based approach.

Keywords

P2P, Overlay Network, Cashing, Replication, Time Span Protocol.

References

[1] http://en.wikipedia.org/wiki/Pareto_distribution
[2] F. E. Bustamante and Y. Qiao. Friendships that last: Peer lifespan and its role in P2P protocols. In Proc. of 8th WCW Workshop, 2003
[3] L. Peterson, T. Anderson, D. Culler, and T. Roscoe. A blueprint for introducing disruptive technology into the Internet. In Proc. of ACM HotNets-1, October 2002
[4] KaZaA. http://www.kazaa.com. 2001.
[5] T. Klingberg and R. Manfredi. Gnutella 0.6. RFC, the Gnutella RFC, 2002.
[6] Clip2. The Gnutella protocol specification v0.4. RFC, the Gnutella RFC, 2000.
[7] 
Yunfei ZHANG, Changjia CHEN, Siaoping WANG. Recent advance research in P2P networks 2008. 
[8] A. Singla and C. Rohrs. Ultrapeers: Another step towards Gnutella scalability. Working draft, Lime Wire LLC, 2001. 
[9] Fabi´an E. Bustamante and Yi Qiao. Friendships that last: Peer lifespan and its role in P2P protocols.
[10] E. Cohen and S. Shenker. Replication strategies in unstructured peer to peer networks. In Proc. of ACM SIGCOMM, 2002.
[11] Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker. Search and replication in unstructured peer-to-peer networks. In Proc. of ICS, 2002.
[12] L. A. Adamic, R. M. Lukose, A. R. Puniyani, and B. A. Huberman. Search in power-law networks. Physical Review, 64(046135), 2001.
[13] DfdM. Roussopoulos and M. Baker. Cup: Controlled update propagation in peer-to-peer networks. In Proc. of USENIX Annual Tech., 2003.
[14] M. Roussopoulos and M. Baker. Cup: Controlled update propagation in peer-to-peer networks. In Proc. of USENIX Annual Tech., 2009.
[15] I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proc. of ACM SIGCOMM, 2010.
[16] B. Yang and H. Garcia-Molina. Efficient search in peer-to-peer networks. In Proc. of ICDCS, 2009.
[17] F. E. Bustamante and Y. Qiao. Friendships that last: Peer lifespan and its role in P2P protocols. In Proc. of 8th WCW Workshop, 2003.
[18] J. Chu, K. Labonte, and B. N. Levine. Availability and locality measurements of peer-to-peer file systems. In Proc. of ITCom, 2002.
[19] E. P. Markatos. Tracing a large-scale peer to peer system: an hour in the life of gnutella. In Proc. of CCGrid, 2002. a DHT. June 2004.
[20] M. Roussopoulos and M. Baker. Cup: Controlled update propagation in peer-to-peer networks. In Proc. of USENIX Annual Tech., 2003.
[21] Liangmin Guo, Shoubao Yang Leitao Guo Kai Shen Weina Lu: Trustaware Adaptive P2P Overlay Topology Based on Super peer-partition 2007
[22] Jin Bo. An Effective Search Scheme for Gnutella-Like P2P Networks 2010
[23] TAN Le-Ting, TAN Tao. A Search Algorithm on Gnutella Networks Based on Resource Replication 2010