• Title/Summary/Keyword: Peer-to-peer Network

Search Result 415, Processing Time 0.038 seconds

A Design of Peer-to-Peer Network Security Model using Fingerprint Recognition (지문 인식을 이용한 Peer to Peer Network 보안 모델의 설계)

  • 박정재;구하성
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.06a
    • /
    • pp.481-487
    • /
    • 2001
  • 본 논문은 현재까지 제시되어진 peer to peer network model들을 정리하고 대표적인 peer to peer network model에 지문인식을 적용하여 개인에 대한 신원 인증 절차를 수행함으로써 보안에 대한 새로운 해결책을 제안하였다. 기존의 peer to peer network model은 개인 대 개인간의 효율적인 network검색 기능과 분산 computing 환경을 제공하지만 보안에 관해서는 아직까지도 많은 연구가 필요하다. 본 연구에서는 기존의 peer to peer network model들에 지문인식을 사용한 새로운 보안 model을 설계하였다.

  • PDF

A Hierarchical Construction of Peer-to-Peer Systems Based on Super-Peer Networks (Super-Peer 네트워크에 기반을 둔 Peer-to-Peer 시스템의 계층적 구성)

  • Chung, Won-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.65-73
    • /
    • 2016
  • Peer-to-Peer (P2P) systems with super-peer overlay networks show combined advantages of both hybrid and pure P2P systems. Super-peer is a special peer acting as a server to a cluster of generic peers. Organizing a super-peer network is one of important issues for P2P systems with super-peer networks. Conventional P2P systems are based on two-level hierarchies of peers. One is a layer for generic peers and the other is for super-peers. And it is usual that super-peer networks have forms of random graphs. However, for accommodating a large-scale collection of generic peers, the super-peer network has also to be extended. In this paper, we propose a scheme of hierarchically constructing super-peer networks for large-scale P2P systems. At first, a two-level tree, called a simple super-peer network, is proposed, and then a scheme of generalizing and then extending the simple super-peer network to multi-level super-peer network is presented to construct a large-scale super-peer network. We call it an extended super-peer network. The simple super-peer network has several good features, but due to the fixed number of levels, it may have a scalability problem. Thus, it is extended to k-level tree of a super-peer network, called extended super-peer network. It shows good scalability and easy management of generic peers for large scale P2P system.

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture

  • Das S;Thakur A;Bose T;Chaki N
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.159-164
    • /
    • 2004
  • This paper aims towards designing and implementation of a new adaptive Peer to Peer (P2P) network that cluster itself on the basis of semantic proximity. We also developed an algorithm to classify the nodes to form the semantic groups and to direct the queries to appropriate groups without any human intervention. This is done using Bloom filters to summarise keywords of the documents shared by a peer. The queries are directed towards the appropriate clusters instead of flooding them. The proposed topology supports a system for maintaining a global, omnipresent trust value for each peer in an efficient manner both in terms of decision time and network load.

  • PDF

A Study on Effective Peer Search Algorithm Considering Peer's Attribute using JXTA in Peer-to-Peer Network (JXTA를 이용한 Peer-to-Peer 환경에서 Peer의 성향을 고려한 Peer 탐색 알고리즘의 연구)

  • Lee, Jong-Seo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.632-639
    • /
    • 2011
  • Searching distributed resource efficiently is very important in distributed computing, cloud computing environment. Distributed resource searching may have system overheads and take much time in proportion to the searching number, because distributed resource searching has to circuit many peers for searching information. The open-source community project JXTA defines an open set of standard protocols for ad hoc, pervasive, peer-to-peer computing as a common platform for developing a wide variety of decentralized network applications. In this paper, we proposed peer search algorithm based on JXTA-Sim. original JXTA peer searching algorithm selected a loosely-consistent DHT. Our Lookup algorithm decreases message number of WALK_LOOKUP and reduce the network system overload, and we make a result of same performance both original algorithm and our proposed algorithm.

A Distributed Peer Selection Method for Supporting Scalable Peer-to-Peer Services (확장성 있는 Peer-to-Peer 서비스 제공을 위한 분산적 피어 선택 기법)

  • Park, Jaesung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.471-474
    • /
    • 2013
  • In this paper, we propose a distributed parent peer selection method to construct an efficient peer-to-peer(P2P) network topology by considering the capacity of a peer and the hop distance from a data source to the peer. To achieve this goal, we propose a method to combine the two performance metrics to calculate the probability that a peer becomes a parent peer. Using the probability, we propose a method to select a parent peer stochastically by making use of the state information of the neighboring peers that each peer maintains. Through simulation studies, we show that the proposed method drives high capacity peers to support more children peers and makes the diameter of the P2P network shorter than the other methods.

Malicious Trust Managers Identification (MTMI) in Peer to Peer Networks

  • Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.91-98
    • /
    • 2021
  • Peer to Peer Networks play an increasing role in today's networks, also it's expected that this type of communication networks evolves more in the future. Since the number of users that is involved in Peer to Peer Networks is huge and will be increased more in the future, security issues will appear and increase as well. Thus, providing a sustainable solution is needed to ensure the security of Peer to Peer Networks. This paper is presenting a new protocol called Malicious Trust Managers Identification (MTMI). This protocol is used to ensure anonymity of trust manager, that computes and stores the trust value for another peer. The proposed protocol builds a secure connection between trust managers by using public key infrastructure. As well as experimental testing has been conducted to validate the proposed protocol.

A Performance Study on The Advanced Peer-to-Peer Network for Broadband Communications (Advanced Peer-to-Peer Network에서의 초고속 통신망의 성능연구)

  • 황명상;류제영;주기호;박두영
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.12a
    • /
    • pp.9-12
    • /
    • 2000
  • In this paper, we carry out a performance study related to the Advanced Peer-to-Peer Network(APPN). For this particular network, it has been proposed to use the leaky bucket as a way of controlling congestion within the network. On the top of leaky bucket type rate based congestion control scheme for high speed networks, a user will typically operate an error control scheme for retransmitting lost and erroneous packets. We propose a Perform ance model in order to study the Interaction between a user's error control scheme and the leaky bucket congestion control scheme for high speed networks. Simulation results show that parameters such as the window size and the token generation rate in the leaky bucket are key factors affecting the end-to-end delay.

  • PDF

Experience in Using Peer-to-Peer Platforms and Immersive Technologies in the Training of Future Masters of Pharmacy in Medical Lyceum

  • Volodymyrovych, Tsekhmister Yaroslav;Tetiana, Konovalova;Yaroslavovych, Tsekhmister Bogdan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.23-28
    • /
    • 2022
  • The present study has been conducted to evaluate the experience in using peer-to-peer platforms and immersive technologies in the training of future masters of pharmacy from the Pharmaceutical Faculty of Bogomolets National Medical University, Ukraine. The selected participants were given the pre- and post-test containing multiple choice questions to assess the effectiveness of immersive technologies. Further, a self-designed structured questionnaire contained 10 questions with 5 options was delivered to consented participants through email and WhatsApp. The results of test presented that students attained an average of 26% in their pre-test while the average attained score post-test was 74% that showed a significant improvement with peer-to-peer platforms and virtual reality technology. The results of survey questions also showed an overall 86.73% satisfaction for the use of peer-to-peer platforms and virtual reality technology in the training of future masters of pharmacy. These results demonstrated that 90.81% showed agreement that they gained a high level of confidence through peer-to-peer platforms and virtual reality to handle patients in clinical practice. It can be concluded that participants of this study showed a strong agreement with positive experience in using peer-to-peer platforms and virtual reality technology in the training of future masters of pharmacy in medical lyceum.

A Study on Research Scheme for Peer-to-Peer Network Using Smart Network (스마트 네트워크 구조를 활용한 Peer-to-Peer 기반 콘텐츠 검색 기법 연구)

  • Kang, Mi-Young;Nam, Ji-Seung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.2
    • /
    • pp.57-62
    • /
    • 2014
  • In order to provide real-time multimedia streaming service, a lot of system resources and network bandwidth required. Thus each computer is any computer other equivalent has the ability to act as a client and a server Peer-to-Peer(P2P) architecture with much interest. In this paper, techniques of P2P content that requires a user to efficiently retrieve the desired time in the streaming service have placed the focus of the research techniques. In a number present in the P2P contents, the user requests to find out the desired amount of time the content streaming services in order to provide seamless lookup latency contents search algorithm to minimize the study. P2P based smart network system and the structure of the super-node and the peer node is composed of super-gateway. Smart network system architecture proposed by performing a content search algorithm. The user requests a desired content, the service can be retrieved within the provided the flexibility.

Sever Selection Schemes Considering Node Status For a Fault-Tolerant Streaming Service on a Peer-to-Peer Network

  • Kim, Hyun-Joo;Kang, Soo-Yong;Yeom, Heon-Y.
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.6-12
    • /
    • 2006
  • Peer-to-Peer (P2P) networks are attracting considerable research interest because of their scalability and high performance relative to cost. One of the important services on a P2P network is the streaming service. However, because each node in the P2P network is autonomous, it is difficult to provide a stable streaming service on the network. Therefore, for a stable streaming service on the P2P network, a fault-tolerant scheme must be provided. In this paper, we propose two new node selection schemes, Playback Node First (PNF) and Playback Node first with Prefetching (PNF-P) that can be used for a service migration-based fault-tolerant streaming service. The proposed schemes exploit the fact that the failure probability of a node currently being served is lower than that of a node not being served. Simulation results show that the proposed schemes outperform traditional node selection schemes.