Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers)
نویسنده
چکیده
Peer-to-peer networks are useful for the file transferring within the group of peers in the network. But usually files are transferred in slow speed, if the files are larger in size. Also the peers don‟t have much utility within them. In order to enhance the utilities of the individual peers, each peer has to configure with greater CPU power, bandwidth, and storage space. But practically it is an impossible task, as the cost goes high by configuring peers with higher configuration. So my approach is to monitor the network carefully and to find out some random peers and to configure, say in a hundred peer attached network, one peer has to be configured with higher configuration. That will enhance the transfer speed among all peers. I introduce a new term called “G-peers”, gargantuan peers, which is having all the utility with it. These G-peers are useful in securing and transferring files at a higher speed and enhance the overall performance of the network. By adding repeated G-peers in the network, it is notable that it will increase the speed of file transfer and also the files are much secured as we are transferring using G-peers authentication. Therefore, a high success rate can be achieved within the Peer-to-peer network by these G-peers. General Terms Peer-to-peer networks, file transfer and higher configuration.
منابع مشابه
Integrated Framework for Authentication and Access Control in Peer to Peer Groups
Collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user games, having varied security requirements, require a secure and reliable group communication system to provide co-ordination among the processes. Peer to peer computing allows users to interact with each other and find and share resources without requiring a centraliz...
متن کاملEfficient File Dissemination using Peer-to-Peer Technology
We consider a problem which is partially motivated by the BitTorrent protocol. Suppose that a large file is initially available only at some server and we desire to disseminate it amongst N end users in the least possible time. We suppose that the file is divided in M parts of equal size and that an end user may download a part from either the server or one of the peers who has previously downl...
متن کاملSecure Reputation Mechanism For Unstructured Peer To Peer System
Distributed hash tables (DHTs) share storage and routing responsibility among all nodes in a peer-to-peer network. These networks have bounded path length unlike unstructured networks. Unfortunately, nodes can deny access to keys or misroute lookups. We address both of these problems through replica placement. In its simplest form, a peer-topeer network is created when two or more PCs are conne...
متن کاملIntegrated Framework for Authentication and Access Control in Peer to Peer Groups
Collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user games, having varied security requirements, require a secure and reliable group communication system to provide co-ordination among the processes. Peer to peer computing allows users to interact with each other and find and share resources without requiring a centraliz...
متن کاملMastering selfishness and heterogeneity in mobile P2P content distribution networks with multiple source download in cellular networks
The performance of Peer-to-Peer (P2P) content distribution networks depends highly on the coordination of the peers. This is especially true for cellular networks with mobile and often selfish users, as the resource constraints on accessible bandwidth and battery power are even more limitating in this context. Thus, it is a major challenge to indentify mobile network specific problems and to de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011