IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 294- 297

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

File Sharing Algorithms over MANET Using Peer to Peer Networks Mr. Gaurao Darekar1, Dr. S.P. Deshpande2 1

M.E. Student, Department of Computer Science and Information Technology, H.V.P.M’s College of Engineering & Technology, Amravati (M.S), India

[email protected] 2

Head of Department, MCA , H.V.P.M’s PG Department of Computer Science & Technology, Amravati (M.S), India

Abstract Establishing peer-to-peer (P2P) file sharing for mobile ad hoc networks (MANET) requires the construction of a search algorithm for transmitting queries and search results as well as the development of a transfer protocol for downloading files matching a query. We analyze the networks using data from a campus network for peer-to-peer file sharing that recorded extraordinary data on 6,530 users sharing 291,930 music files over an 81-day period. We categorize them into four categories: the DHT-based methods, flooding-based methods, advertisement-based methods and social-based methods according to different searching method. We present a comprehensive up to date survey of these methods. Furthermore, we analyze some challenging issues which inspire the future work. Keywords: peer-to-peer networks, DHT, Flooding

1. Introduction P2P over MANETs is the most popular used pattern of file sharing within MANETs. P2P system is initiated in the middle of 1990s. P2P system is deployed on the Internet which is formed by creating an overlay network. P2P overlay consists of upper-layer connections among nodes, or peers, which are independent of the underlay or substrate network, abstract peers view of the connections that make up the network. Here the interaction among peers generally appears at network and application level. P2P file sharing network is very widely used in recent Internet. And within MANETs, P2P file sharing approach is also widely adopted. P2P over MANETs is the most popular used pattern of file sharing within MANETs. P2P system is initiated in the middle of 1990s. P2P system is deployed on the Internet which is formed by made a overlay network. P2P overlay consists of uppermost -layer connections among nodes, or peers, which are independent of the underlay or substrate network, abstract peers see of the connections that make up the network. Mobile ad-hoc networks (Manet) and peer-to-peer (P2P) systems are recently emerging technology which share a common decentralized networking paradigm. However, the two fields have been mainly investigated by different research communities, without catching several cross-cutting issues. Both systems share some common issues and relevant differences: however, similarities could be exploited in a more synergic way when coupling the two systems. In particular, very recently, some cross-layer approaches have appeared, trying to improve the overall performance of a P2P-Manet system.

Mr. Gaurao Darekar, IJRIT

294

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 294- 297

Fig.1: Peer to Peer Network’s

2. The Comparision Between P2P and Manets We observe there are some comman features for P2P file sharing network and MANETs. The P2P network and MANETs are both self-organization and decentralization. There is no central server which can manage and coordinate the network. Nodes establish connection to each other spontaneously.  The security and Quality of Service are too much hard to solve in both networks.  P2P network refers to search protocol on application layer, and MANETs focus on routing protocol on the network layer. The virtually overlay network that created to connect nodes is separated from the physical network in P2P network. In contrast, the logical structure of MANETs generally can be mapped directly to the physical network excepting for using hierarchical structure.  The behavior of executing a broadcast is difficult. A P2P network is a single casting network and it only generates a virtual broadcast, which may consist of numerous of single casting messages. Whereas MANETs always performs a physical broadcasting.

3. DHT Based Method DHT-based searching methods rely on DHT to record the content information of the neighbors. If a node need to search some content, it firstly resorts to the DHT to achieve the relative information. From this point, DHT-based searching approach is very effective. However, the establishment and maintain of the DHT are not easy due to the dynamic topology. A lot of messages are needed to keep the DHTs renew and consistence, which leads to heavy traffic in the networks.

Fig 2: DHT Overlay

Mr. Gaurao Darekar, IJRIT

295

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 294- 297

LocP2P (Location-assisted P2P) adopts indexing algorithm and distributed hashed table (DHT). In LocP2P, a number of mobile content server nodes manage the information of all mobile nodes in a distributed manner through DHT. The mobile nodes location is set as the major key and object ID are selected as secondary key respectively in DHT. In LocP2P, the mobile nodes location is achieved during they are running other applications such as whats App, Twitter, etc. This method is effective to energy consumption.

4. Flooding-Based Method Flooding is one of the most fundamental operations in mobile ad hoc networks. This mechanism provides maximum content deliverability ratio. But flooding suffers from the problems of excessive redundancy of messages, resource contention, and signal collision. This causes high protocol overhead and interference with the existing traffic in the networks. Flooding-based searching methods are based on broadcasting to implement the search process. When a node wants to search some content, it firstly broadcasts the requirement to its neighbors. Then from the response messages, it can obtain the information which relate to the content owner. The most default in flooding-based methods is the high overhead because of the high amount of duplicated messages. These overhead induces the high congestion due to a high volume of traffic, which is a significant problem in MANETs. In addition, local broadcasting used in some methods cannot guarantee file searching success.

Fig 3: Flooding Mechanism Simple Flooding cannot satisfy the requirement (R1). Counter-based scheme and LDCF cannot satisfy the requirement (R2). To meet the requirements, we proposed "Effective Flooding based on Neighbor Information Exchange (EFNEX)" . In EFNEX, the broadcaster selects the next broadcasting node with the maximum number of neighbors by collecting neighbor node information within a radio area. EFNEX satisfies (R1) by eliminating the number of rebroadcasting nodes and (R2) by simple adding and sustraction instead of complex status management.

5. Conclusions In this paper, we had compare the recent P2P file sharing methods over MANETs. Basically we focus on the DHT-based method, flooding-based method i.e single casting and broad casting. We study the brief description to each approach and analyze the properties of method. Though a lot of research in the field of P2P file sharing over MANETs has made in recent past, there are many challenge issues to be fodder for future research work. Firstly, a suitable content sharing paradigm must minimize the consumption of network resources and must divide the burden of sharing data equally among the set of nodes by thinking about the topology of the network and giving enough incentives for fair sharing. Furthermore, it must maximize the global capacity of the system by using the ability to have parallel communications in different areas of multi-hop wireless networks. Secondly, content is various and large file sharing such as the multimedia content is required with the rapid development of the wireless communication technology. The large file sharing needs more stable end to end path and long transmission time, which is a challenging problem in the MANETs. Last but not least, more relationship between nodes will be used to Mr. Gaurao Darekar, IJRIT

296

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 294- 297

promote the file sharing process. More and more mobile devices are carried by people, and the relationship between people represents the relationship between mobile devices. And the social information is more stable which can help to complete the dynamic topology of MANETs. The social network properties are more important roles in the file sharing application which will be the trend in the future research work.

References [1] [2] [3]

[4] [5]

[6]

[7]

[8]

[9]

[10]

[11]

“Next Generation Smartphones Players, Opportunities & Forecasts 2008-2013,” Juniper Research, Tech. Rep., 2009. Y. C. Hu, S. M. Das, and H. Pucha, “Exploiting the synergy between peer-to-peer and mobile ad hoc networks”. In Proc. of HotOS-IX, May 2003. A. Klemm, C. Lindemann, and O. Waldhorst, “A special-purpose peer-to-peer file sharing system for mobile ad hoc networks”, in: IEEE VEHICULAR TECHNOLOGY CONFERENCE, vol. 4, Citeseer, 2003, pp. 2758–2763. A. Rowstron and P. Druschel. Pastry, “Scalable, distributed object location and routing for large scale peer-to-peer systems”. In Proc. Of Middleware, November 2001. Ben Y. Zhao, John D. Kubiatowicz, and Anthony D. Joseph, “Tapestry: an Infrastructure for FaultTolerant Wide-Area Location and Technical Report”. University of California at Berkeley, Berkeley, CA, USA, 2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. “Chord: A scalable peer-to-peer lookup service for internet applications”. SIGCOMM Comput. Commun. Rev. 31, 4 (August 2001), 149-160, 2001. H. Pucha, S.M. Das, Y.C. Hu, “Ekta: An efficient dht substrate for distributed applications in mobile ad hoc networks”, in: WMCSA ’04: Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications, IEEE Computer Society, Washington, DC, USA, 2004, pp. 163–173. Yu-Chih Tung and Lin, K.C.-J., “Location-assisted energy-efficient content search for mobile peer-to-peer networks,” Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on , vol., no., pp.477-482, 21-25 March 2011. Swati Garg, “Efficient Data Sharing and its Application in Mobile Adhoc Networks”. Journal of Information Systems and Communication, ISSN: 0976-8742 & E-ISSN: 0976-8750, Volume 3, Issue 1, pp.-96-101.2012 Srinivasan, S. Moghadam, A, Se Gi Hong, and Schulzrinne, H., “7DS -Node Cooperation and Information Exchange in Mostly Disconnected Networks,” Communications, 2007. ICC '07. IEEE International Conference on , vol., no., pp.3921-3927, 24-28 June 2007. Turganzhan Kassymov,Keisuke Utsu,Hiroshi Sano,Naoki Morita,Hiroshi Ishii,”Effective Flooding based on neighbor list exchange over Ad Hoc Networks,2011 IEICE Society Conference, B-765,(2011)

Mr. Gaurao Darekar, IJRIT

297

File Sharing Algorithms File Sharing Algorithms over MANET ... - IJRIT

Establishing peer-to-peer (P2P) file sharing for mobile ad hoc networks ... methods, flooding-based methods, advertisement-based methods and social-based ... P2P over MANETs is the most popular used pattern of file sharing within MANETs. .... [10]. Srinivasan, S. Moghadam, A, Se Gi Hong, and Schulzrinne, H., “7DS ...

743KB Sizes 2 Downloads 412 Views

Recommend Documents

File Sharing Algorithms File Sharing Algorithms over MANET ... - IJRIT
Establishing peer-to-peer (P2P) file sharing for mobile ad hoc networks ... methods, flooding-based methods, advertisement-based methods and social-based ... P2P over MANETs is the most popular used pattern of file sharing within MANETs. .... [10]. S

Opera file sharing
A file sharing Opera file sharing ? A opera file sharing opera software down. A link down Opera file sharing A computer share software,ebooks,movies,window operating system software share share ? hardrive data/information A share U ?A unlimited share

free pdf file sharing
Whoops! There was a problem loading more pages. free pdf file sharing. free pdf file sharing. Open. Extract. Open with. Sign In. Main menu. Displaying free pdf ...

pdf file sharing sites
There was a problem loading more pages. pdf file sharing sites. pdf file sharing sites. Open. Extract. Open with. Sign In. Main menu. Displaying pdf file sharing ...

Sharing-Aware Algorithms for Virtual Machine ... - Research at Google
ity]: Nonnumerical Algorithms and Problems—Computa- tions on discrete structures; D.4.2 [Operating Systems]:. Storage Management—Main memory; D.4.7 [ ...

Encrypted Peer to Peer File Sharing System using ...
1Student, Department of Computer Science, SSBT's COET, Bambhori, Jalgaon ... 1. Introduction. Over the past years, the immense popularity of the Internet has produced a significant stimulus .... file's replication degree based on its popularity.

Forensic Investigation of Peer-to-Peer File Sharing ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Forensic Investigation of Peer-to-Peer File Sharing Net ... ely, Thomas Kerle, Brian Neil Levine, Clay Shiel

Forensic Investigation of Peer-to-Peer File Sharing Networks by ...
Massachusetts State Police, [email protected] ... Specifically, over 40 agencies share data ... provides a partial list of current peers (called a GWe- bCache), or by using a list of known peers distributed ... Sharing Networks by, Marc Li

Knowledge+sharing+over+Social+Networking+Systems.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.

Comparison of Symmetric Key Encryption Algorithms - IJRIT
Today it becomes very essential to protect data and database mostly in .... within today's on-chip cache memory, and typically do so with room to spare. RC6 is a ...

Data sharing in the Cloud using Ensuring ... - IJRIT
Sep 9, 2013 - where software objects that offer sensitive functions or hold sensitive data are responsible for protecting .... Log files should be reliable and tamper proof to avoid illegal insertion, deletion, and ..... attacker erase or tamper a re

Comparison of Symmetric Key Encryption Algorithms - IJRIT
In this paper we provides a comparison between most common symmetric key cryptography algorithms: DES, AES, RC2, ... Today it becomes very essential to protect data and database mostly in e-transaction. The information has .... For most applications,

Multi Receiver Based Data Sharing in Delay Tolerant Mobile ... - IJRIT
Multi Receiver Based Data Sharing in Delay Tolerant Mobile .... resources such as storage space, batterey power and available bandwidth provided by ...

Multi Receiver Based Data Sharing in Delay Tolerant Mobile ... - IJRIT
resources such as storage space, batterey power and available bandwidth provided ... based on providing incentive such as battery power storage capacity to.

The Evolution of the Peer-to-Peer File Sharing Industry.pdf ...
The Evolution of the Peer-to-Peer File Sharing Industry.pdf. The Evolution of the Peer-to-Peer File Sharing Industry.pdf. Open. Extract. Open with. Sign In.

Sharing Online Poster
Page 1. GET A PLAN FOR SHARING AND STAYING SAFE ONLINE. www.dhs.gov/stopthinkconnect.

Sharing - Peg.pdf
Sharing Calendar. Page 2 of 2. Sharing - Peg.pdf. Sharing - Peg.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Sharing - Peg.pdf. Page 1 of 2.

pdf sharing free
File: Pdf sharing free. Download now. Click here if your download doesn't start automatically. Page 1 of 1. pdf sharing free. pdf sharing free. Open. Extract.

BP_example_Labor sharing approach -
Name of Approach: Social labor sharing. 2 Detailed description. 2.1 Definition. One of the important traditional associations still common in the Ethiopian ...

A knowledge sharing experience - Esri
National Centre for Sustainable. Coastal Management (NCSCM), ... Page 2 ... of natural resources. Making his ... transport, renewable energy development.