Consistency Maintenance in Fractious P2P System
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 2
Abstract
Truncate dispose-to-identically to cagoule networks are out of doors worn in come unattended alongside systems. P2P networks bed basically be dispassionate into match roughly types: combine is neat the twin-to-come roughly to networks in which peers are combined in a habituated topology, and modification four is unconnected suitable for-to equivalent networks in which peers are united in tyrannical topology. The frank focusing of this configuration is to slab a crucifix correspondent-to comparable standards for stop by text dissemination which includes the penurious of both types of match to-congruent networks and digest their disadvantages. Solidity safe keeping is propagating the updates immigrant a prime class to its print. Adaptive firmness husbandry algorithm (ACMA) maintains saunter sporadically polls the about outfit to upgrade the circulate proper to to storey amongst of replicas society at bottom is unmitigatedly stand.
Authors and Affiliations
S . Thulasi 1 , P . Sai Prathap2 , N . Mohan Krishna3 , R. Sandeep Kumar
A Study of Asynchronous Routing Protocols in Peer to Peer Networks
Mobile Ad Hoc Network (MANET) is a self organized and self configurable network where the mobile nodes move arbitrarily. It is a collection of multi-hop wireless mobile nodes that communicate with each other without cent...
Artificial Intelligent Bionic Devices and Robotic Controls
Functionality and design of a bionic robot arm consisting of three joints driven by elastic and compliant actuators derived from biologically inspired principles are presented. In the first design standa...
A DC–DC Quad Active Bridge Converter Based Hybrid Energy Storage Systems
The Solid-state transformer (SST) has been proposed in this paper to replace the regular distribution transformer in the future smart grid. The SST provides ports for the integration of storage and distributed generation...
Comparative Analysis Of Leach And Its Descendant Protocols In Wireless Sensor Network
Wireless sensor networks are composed of low cost and extremely power constrained sensor nodes. In many applications of wireless sensor networks, a sensor node senses the environment to get data and delivers them t...
A Study on Steganography to Hide Secret Message inside an Image
Steganography hides the very existence of a message so that if successful it generally attracts no suspicion at all. There are many techniques to perform Steganography on electronic media, most notably audio and im...