Protection Strategies in Peer-To-Peer Networks File Duplication and Regularity

نویسنده

  • Mohana Rao
چکیده

Duplication is used to increase data availability in the presence of site or communication failures and to decrease retrieval costs by local access if possible. Our system is completely decentralized and nodes can be removed/added dynamically. P2P is a trendy technology used for file sharing. File duplication and Regularity protection are the methods used in P2P for elevated system performance. File duplication methods indicate replica nodes without thinking about regularity protection which may lead to high overhead for redundant file duplications and regularity protection. Regularity protection methods update files without considering file duplication dynamism which may not give the accuracy of replica regularity. Hence there is a need to think about regularity protection while file duplication to achieve high performance and high availability. When data files are replicated at many nodes, regularity must be maintained among the nodes. In this paper we point out different duplication strategies that are applied P2P systems. This paper presents an Integrated file Duplication and regularity Protection mechanism. Integrated file Duplication and regularity Protection mechanism integrates the two techniques in a systematic and harmonized manner. The security has become one of the major issues for data communication over worldwide networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

A Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory

The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...

متن کامل

Demand and Supply-side Dynamics of Piracy Diffusion in P2P Networks

Digital piracy, the sharing files of music on peer-to-peer (P2P) networks has been cited as the key threat to the music industry by distorting promoting plans of albums (Billboard.biz, 2009). To combat widespread digital piracy on file-sharing networks, the content industries have employed diverse anti-piracy strategies including pollution technologies and stronger copyright legislation for mus...

متن کامل

A Genetic Programming-based trust model for P2P Networks

Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...

متن کامل

A Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory

The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013