On Veracious Search In Unsystematic Networks

Abstract

The Unstructure peer-to-peer (P2P) filesharing networks are popular in the mass markets. As the peers participating in unstructure networks interconnect randomly they rely on flooding query messages to discover objects of interest and thus introduce remarkable network traffic. Empirical measurements to studies indicate that the peers in P2P networks have similar preferences and have recently proposes unstructure P2P networks that organize participating peers by exploiting their similarites. The resultant networks may not perform to searches efficiently because existing overlay topology construction algorithms often creates unstructure P2P networks without performing guarantees. We are proposing a novel overlay formation algorithm for unstructure P2P networks. Based on the file sharing pattern exhibiting the power law property our proposal is unique in that it poses rigorous performance guarante. Theoretical performance results concludes that in a constant probability 1) searching an object in our proposes network efficiently takes hops and 2) the search progressively and effectively exploits the similarity of peers. In addition to the success ratio of discovering an object approximates 100 percent.

Authors and Affiliations

K. Thushara, P. Venkata Narayana

Keywords

Related Articles

An Optimized MAC Unit Using S-MB Recoding Scheme and Compressors

In this paper, we demonstrate a MAC unit using 8 bit Booth multiplier and addition operation. Most of DSP applications uses addition and multiplication unit for faster operation. This arithmetic unit mainly multiplica...

Key Frame Extraction and Shot Change Detection for compressing Color Video

Progress intechnology is rapidly increasing now-a-days. The number of user are increasing but the resources are limited. So this project is to effectively and efficiently use the limited and expensive resource, soas...

A Novel Approach for Text Dependent Speaker Recognition

In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...

Automatic Membership Service For Large-Scale Dependable Storage Systems

Byzantine-fault-tolerant replication increases the reliability and availability of Internet services that store significant state and protect it in spite of attacks or software errors. Existing Byzantine-fault-toleran...

Comparison Study Among Various Anomaly Detection Techniques

Many approaches are implemented for the detection of anomalies on the system. Anomalies based approaches are considered as efficient from that user intention based approach is preferred for the implementation of anom...

Download PDF file
  • EP ID EP27796
  • DOI -
  • Views 253
  • Downloads 1

How To Cite

K. Thushara, P. Venkata Narayana (2014). On Veracious Search In Unsystematic Networks. International Journal of Research in Computer and Communication Technology, 3(1), -. https://europub.co.uk/articles/-A-27796