Security and QOS centric protocols for P2P networks: current state of the art
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Peer-to-peer (p2p) networking technologies have gained popularity as a mechanism for users to share files without the need for centralized servers. A p2p network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining a large amount of routing state. This allows for a variety of applications beyond simple file sharing. Examples include multicast systems, anonymous communications systems, and web caches. We envisage that an increasingly diverse set of applications will seek to make use of the growing pool of resources available around the edge of the network. here in this paper we brief the security and QOS issues of peer-to-peer networks that followed by current state of the art in handling these QOS and security issues.
Authors and Affiliations
B. LALITHA,
Energy Aware Architecture Using Spectrum Sensing Technique in Cognitive Radio Network
Cognitive radio (CR) is a novel concept that allows wireless systems to sense the environment, adapt, and learn from previous experience to improve the communication quality. The signal is detected by comparing the...
SECURE MULTICAST COMMUNICATION USING GROUP BASED MULTICAST HIERARCHY
Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providi...
An Automated Mobile Applications Generator for Remote Database Access
Due to the display area and resource restrictions of small mobile devices, currently, most reported database query systems developed for them are only offering a small set of pre-determined queries that can be po...
REVIEW OF PASSWORD PROTECTING MECHANISM
In the online communication, the password has an important role to secure user personal details. These passwords are taken to be secure and it must be retain personally. The third person may take a password witho...
Design of Dynamic Error Handling Tool
t— In any programming language or environment, error messages perform role of intermediate between system (program development tool) and programmer. So it is important point of interaction in system. This point bec...