On Veracious Search In Unsystematic Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
The Unstructure peer-to-peer (P2P) filesharing networks are popular in the mass markets. As the peers participating in unstructure networks interconnect randomly they rely on flooding query messages to discover objects of interest and thus introduce remarkable network traffic. Empirical measurements to studies indicate that the peers in P2P networks have similar preferences and have recently proposes unstructure P2P networks that organize participating peers by exploiting their similarites. The resultant networks may not perform to searches efficiently because existing overlay topology construction algorithms often creates unstructure P2P networks without performing guarantees. We are proposing a novel overlay formation algorithm for unstructure P2P networks. Based on the file sharing pattern exhibiting the power law property our proposal is unique in that it poses rigorous performance guarante. Theoretical performance results concludes that in a constant probability 1) searching an object in our proposes network efficiently takes hops and 2) the search progressively and effectively exploits the similarity of peers. In addition to the success ratio of discovering an object approximates 100 percent.
Authors and Affiliations
K. Thushara, P. Venkata Narayana
A Study of Intrusion Detection Systems in MANETs
In past years, the use of mobile ad hoc networks (MANETs) has been widely spread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs...
Security in Web Application
Internet services and applications have become a part of daily life, enabling communications from anywhere. To accommodate this increase in applications and data complexity, web services has moved to multi-tiered desi...
Streaming of High Quality videos using Cloud
Recently many mobile entertaining applications have been launched, but most popular app like Facebook, Twitter, YouTube have large demand among users. But these media applications are limited by the unstable wireless...
Jamming Detection and Mitigation in Wireless Broadcast Networks
Wireless communication systems are often susceptible to the jamming attack where adversaries attempt to overpower transmitted signals by injecting a high level of noise. Jamming is difficult to mitigate in broadcast...
Load frequency control in Microgrid
The objective of this paper is to design a Load Frequency Control (LFC) mechanism using a Battery Storage System (BSS) and Diesel Generation (DG) units for an isolated microgrid system. Load frequency control is impo...