Security and QOS centric protocols for P2P networks: current state of the art
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Peer-to-peer (p2p) networking technologies have gained popularity as a mechanism for users to share files without the need for centralized servers. A p2p network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining a large amount of routing state. This allows for a variety of applications beyond simple file sharing. Examples include multicast systems, anonymous communications systems, and web caches. We envisage that an increasingly diverse set of applications will seek to make use of the growing pool of resources available around the edge of the network. here in this paper we brief the security and QOS issues of peer-to-peer networks that followed by current state of the art in handling these QOS and security issues.
Authors and Affiliations
B. LALITHA,
Secured Cost Effective Group Handover Authentication Scheme For WiMAX Networks
Technological improvement of Wireless Communication is important aspect of our daily life. Mobile WiMAX IEEE 802.16m standard aims at fulfilling the requirements on 4G Systems. Providing seamless handover authentication...
A Verification Method Based On Petri Net for Online Student Registration Web Service Composition
The Main area in Web service is the Web service composition which detects the composition before execution. Petri net or Place / Transition net is a mathematical modeling language used to describe the distributed...
Evaluating NIST Metric for English to Hindi Language Using ManTra Machine
Evaluation of MT is required for Indian languages because the same MT is not works in Indian language as in European languages due to the language structure. So, there is a great need to develop appropriate evaluation...
Enhancement of the Security of a Digital Image using the Moduli Set
Digital images have found usage in many applications. These images may contain confidential information and need to be protected when stored on memory or transmitted over networks. Many techniques have been proposed...
Optimized Surveillance Solution for Unattended Baggage Recognition
Abstract—The system automatically recognize activities around protected area to improve safety and security by multiplexing hundreds of video streams in real time. Object tracking method has important role in real tim...