Locating Equivalent Servants over P2P Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
While peer-to-peer networks are mainly used to locate unique resources across the Internet, new interesting deployment scenarios are emerging. Particularly, some applications (e.g., VoIP) are proposing the creation of overlays for the localization of services based on equivalent servants (e.g., voice relays). This paper explores the possible overlay architectures that can be adopted to provide such services, showing how an unstructured solution based on a scale-free overlay topology is an effective option to deploy in this context. Consequently, we propose EQUATOR (EQUivalent servAnt locaTOR), an unstructured overlay implementing the above mentioned operating principles, based on an overlay construction algorithm that well approximates an ideal scale-free construction model. We present both analytical and simulation results which support our overlay topology selection and validate the proposed architecture.
Authors and Affiliations
V V S NARAYANA MURTHY KAMINI, Kusuma Aparna Lakshmi, M Vamsi Krishna
Edge Detection to Enhance Definite Range Image Segmentation by Clustering Algorithms
Edges of an image are considered a type of crucial information that can be extracted by applying detectors with different methodologies. However, edge detection provides rich information about the scene being observed...
Addressing MDX Injection issue in Big Data using ASCII Based String Matching
MDX injection is one of the most threats for application written for Web. Big data is the ability of providing exponential growth and availability of data. Since the data in here are unstructured and therefore normal...
Enabling Secure File Sharing On Untrusted Servers Using Mona
Identity privacy is one of the most important obstruction for the wide operation of cloud computing. Without the guarantee of identity privacy users may be reluctant to join in cloud computing systems since their rea...
An Effective Scheme for Countering Distributed Denial of Service Attacks on Mobile Ad-hoc Networks
Mobile ad hoc networks play a key role in the private and public communication, yet their application is being hampered by network attacks. One of the most dangerous attacks that pose a serious threat to the mobile a...
EEG and Picture Based Brain Controlled Pic and Place Robot for Paralyzed Patients
This anticipate talked about around a cerebrum controlled biometric in light of Brain–computer interfaces (BCI). BCIs are frameworks that can sidestep traditional channels of correspondence (i.e., muscles and thought...