Routing Protocols of Distributed Hash Table Based Peer to Peer Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Distributed hash tables (DHTs) is an extremely attractive study theme during the part of P2P networks; such networks be fetching especially admired in functions similar to file sharing. The idea of the Distributed Hash Table is given that the technique to explore the resources (especially files) within a P2P network. A DHT protocol usually affords a solitary task to the P2P function: afford a key and find out the node (or may be nodes) which is responsible for such key [1][3]. Each and every one function (such as really recover the resource or storing the resource on the node afford for it) is offered by superior levels of the P2P function. In such article our objective is to discover the security measures and determine them on accessible routing procedures of such networks. The Chord [4] (a DHT protocol) is selected as the objective approach for a variety of reasons it resolve be enclosed in this paper.
Authors and Affiliations
S. Rajalakshmi
Hybrid Algorithm combining Genetic algorithms and CSP approach to plane an Optimized path for a Mobile Robot moving under Time Window
Abstract: The problems of optimization are considered as a type of a constraint satisfaction problem: COP (Constraint Optimization problem). In this frame goes our first works which are interested in the optimi...
Routing and Security Issues for Trust Based Framework inMobile Ad Hoc Networks
Abstract: Mobile means moving and Ad Hoc means temporary without any fixed infrastructure, so mobile adhoc networks (MANETs) are a kind of temporary networks in which nodes are moving without any fixedinfrastructur...
Energy Conservation in Wireless Sensor Networks: A Review
A wireless sensor network consists of a large number of sensor nodes which are deployed over an area to perform local computations based on information gathered from the surroundings. Each node in the netw...
Back Office E-Commerce Application for X Store
Abstract: X store is a company which their focus on sales computer accessories. In doing their business process, all sales recorded manually. Their sales using whatsapp, BBM and email for online services. The sales depar...
Increasing Quality of the Interframe and also extract Histogram using Super-Imposing
Video enhancement approach aiming to achieve high qualities in entire video. Proposes a Superimposing algorithm for improve quality of intraframe based on multiple regions-of-interest and create piecewise tone mapp...