SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering
           Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 6, November- December 2012, pp.117-122
   Implementation Of Coquos On Unstructured P2P Network To
                  Achieve Continuous Queries
             Venkata Santhosh Deepak*1 ,Mudiganti Vijaya Bhaskar*2
                   *1
                     M.Tech Student, Gokul Institute of Technology & Science, Bobilli , INDIA
            *2
                 Asst.Professor, CSE Dept, Gokul Institute of Technology & Science, Bobilli, INDIA



Abstract
         Considering        on-demand     content
discovery mechanism, currently P2P content
distribution systems are constructed. By
including two major capabilities like a
mechanism through which peers register long
term interest in network which notify new data
items whenever they occur, and second capability
is that advertising its content which enhances the
utility of the systems. Presents proposals need
intricate indexing and routing schemes to fulfil
the above two capabilities which not only make
them highly complex but also render the overlay
network less flexible toward transient peers. For
which we proposed a Scalable and effective
middleware which is called as CoQUOS to
support unremitting queries in unstructured                 Fig.1: Decentralized P2P Architecture
overlay networks. We proposed two techniques
namely, cluster-resilient random walk algorithm                       A second research area that is closely
and      dynamic       probability-based    query           related to work presented in this paper is that of
registration scheme. First scheme used for                  pub-sub systems (event delivery systems. The early
propagating the queries to various regions of the           pub-sub systems adopted a centralized architecture
network and second scheme to ensure that the                for subscription maintenance and matching and
registrations are well distributed in the overlay.          notification of published data items, whereas the
And we also proposed effective and efficient                latter systems were either partially or completely
schemes for providing resilience to the churn of            decentralized. More recently, researchers have
the P2P network and for ensuring a fair                     designed decentralized pub-sub systems on top of
distribution of the notification load among the             P2P networks several pub-sub systems have been
peers.                                                      successfully implemented on structured P2P
                                                            platforms. Unstructured P2P networks-based pub-
Keywords- content delivery, continuous queries,             sub systems are relatively less explored. The main
                                                            difficulty in designing pub-sub systems on
P2P networks, publish-subscribe systems, random
                                                            unstructured P2P networks emerges from the fact
walk.
                                                            that the topologies of most unstructured P2P
                                                            networks have no relationship to the data (or other
I. INTRODUCTION                                             information) in individual peers. As a result, routing
          In the past few years, both structured and
                                                            in these networks is, in general, independent of
unstructured P2P networks have experienced
                                                            peers' contents (a few unstructured P2P networks
significant research searching through ad-hoc
                                                            use content-sensitive heuristics for routing). Most
queries has been the predominant information
                                                            unstructured P2P networks-based pub-sub systems
discovery mechanism in P2P networks. Several
                                                            try to overcome these difficulties by carefully
researchers have studied efficient and scalable
                                                            controlling the manner in which the topology of the
alternatives to the flooding-based searching in
                                                            overlay network evolves, and by adopting intricate
unstructured P2P networks Random walk and its
                                                            indexing strategies for routing subscriptions and
variants have been explored as alternatives to the
                                                            notifications. Unfortunately, these mechanisms are
broadcast strategy. However, the ad-hoc query
                                                            highly complex and they introduce significant
paradigm is inadequate for advanced P2P content
                                                            overlay management overheads thereby limiting the
sharing applications.
                                                            scalability of the corresponding systems. As
                                                            mentioned in the introduction, the Sub- 2-Sub
                                                            requires peers to be clustered on the basis of their

                                                                                                  117 | P a g e
Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering
           Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 6, November- December 2012, pp.117-122
subscriptions. The publisher of a data item is           research challenge is to develop a completely
required to reach the cluster that exactly corresponds   distributed mechanism to register the continuous
to the data item being published, and then start the     queries at various regions of the P2P network so that
dissemination process. The RDF-based pub-sub             the system has high notification effectiveness.
scheme designed in the context of ELENA project          Further, it is also necessary to develop low-cost
also suffers from similar limitations. This system       techniques for providing resilience to the churn of
also requires the peers of the overlay to be             the overlay network and for achieving fair
meticulously organized, in this case, to form an         distribution of notification load among the peers in
intricate bi-level Hyper cup architecture. Besides       the network. Towards addressing these challenges,
having limited scalability, the system is very           this paper makes four novel contributions.
vulnerable to super peer failures. The CoQUOS            • First, we present a novel query propagation
system differs fundamentally from P2Pbased pub-          technique called Cluster Resilient Random Walk
sub schemes. All of the above-mentioned systems          (CRW). This technique retains the overall
are essentially pub-sub systems which are                framework of the random walk paradigm. However,
implemented on a P2P platform. In contrast, the          at each step of propagation, CRW favors neighbors
goal of our work is to enhance the content discovery     that are more likely to send messages deeper into the
capabilities of unstructured P2P content distribution    network thereby enabling the continuous queries to
networks. With the goal of achieving guaranteed          reach different topological regions of the overlay
notification, most unstructured                          network.
          P2P-based pub-sub systems include              • Second, a dynamic probability scheme is proposed
complex overlay management strategies. On the            for enabling the recipients of a continuous query to
other hand, our CoQUOS system does not impose            make independent decisions on whether to register
any restrictions on the topology of the overlay,         the query. In this scheme, a query that has not been
employs lightweight techniques, yet it provides high     registered in the past several hops has a higher
success rates. However, CoQUOS might not be              chance of getting registered in its next hop, which
appropriate for applications where guaranteed            ensures that registrations are well distributed along
notification is necessary. Smart Seer is a structured    the path of a query message.
P2P overlay-based continuous query system for
document repositories. Unlike Smart Seer, CoQUOS
does not rely upon DHT for mapping continuous
queries to peer nodes hosting them or for routing
notifications. Instead, it incorporates lightweight
mechanisms like CRW and dynamic probability
scheme for registering continuous queries on
various peer nodes of the overlay. Peer CQ is a
P2Pbased continual query system for information
change monitoring. It too uses the DHT to distribute
change monitoring queries to the nodes of the
network. Researchers have studied the properties of
random walk as well as its utility for various P2P
applications such as computing aggregate queries
and uniform sampling of peers in unstructured P2P
networks.
          Several variants of random walk such as
popularity biased random walk have been proposed
                                                         Fig.2: CoQUOS system overview
for P2P searching. Show that the performance of
random walk degrades if the overlay network
exhibits considerable degree of node clustering.         • Third, we discuss a passive replication-based
                                                         scheme     for    preserving     high    notification
CRW overcomes this limitation by favoring out-of-
                                                         effectiveness of the system even when the
cluster peers at each hop of message propagation.
                                                         underlying P2P network experiences significant
                                                         churn.
II. SYSTEM OVERVIEW                                      • Finally, we propose a local load re-distribution
         The fundamental idea of the CoQUOS
                                                         strategy to achieve fair distribution of notification
system is to register the continuous query on a set of
                                                         loads among the participating peers.
peers that are located in various topological regions
of the overlay network. These query replicas are
                                                         a) Cluster-Resilient Random Walk
used by the CoQUOS system to notify the
                                                         Flooding-based broadcast is an option for
respective source peers of matching advertisements
                                                         circulating continuous queries. However, this would
issued by other peers. Considering the decentralized
                                                         be analogous to a breadth first traversal of the
nature of unstructured P2P networks, an important

                                                                                               118 | P a g e
Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering
           Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 6, November- December 2012, pp.117-122
network. As previous studies have reported, in this      any of its beacon nodes, thus leading to low success
scheme, messages remain in close vicinity of the         rates.
source node and do not go deep into the network.         The objectives of our experimental study of the
Random walk is another message propagation               CoQUOS system are fourfold:
paradigm that has received considerable attention        1. Evaluating the effectiveness of the CRW
from the P2P research community. In the context of       technique in propagating continuous queries,
P2P networks, random walk works as follows:              2. Studying the performance of the dynamic
When a peer node Pi receives a message whose TTL         probability approach for query registrations,
has not expired, it selects one of its neighbors         3. Evaluating the churn resilience and the load
completely at random and forwards the message to         balancing mechanisms, and
that peer. Since, at each step the message is            4. Evaluating the communication costs.
forwarded to only one neighbor, the message load
imposed by random walk is very low. Random walk          III.  SYSTEM                     DESIGN              &
corresponds to a depth-first traversal of the network,   IMPLEMENTATION
and a message propagated through random walks                      For      implementation          independent
has a higher probability of reaching remote regions      specification and verification, and for subsequent
of the network than its flooding-based counterpart.      synthesis     of   specifications     into     efficient
In this paper, we use the terms random walk and          implementations.
pure random walk (PRW) interchangeably.                  The proposal is divided into below sub-tasks:
                                                         i) adopt/further develop a model for formal, high-
                                                         level system specification and verification.
                                                         ii) Demonstrate the efficacy of the developed model
                                                         by applying it to a suitable part of the consortium
                                                         demonstrator, the network terminal for broadband
                                                         access.
                                                         iii) Develop a systematic method to refine the
                                                         specification into synthesizable code and a
                                                         prototype tool which supports the refinement
                                                         process and links it to synthesis and compilation
                                                         tools.




Fig.3 : Illustration of cluster resilient random walk

b) Dynamic-Probability-Based Query Registration
The CRW scheme provides a mechanism for
propagating a continuous query. But, how does a
node receiving this message decide whether to
register the query? A straightforward solution would
be to register a query at every node it visits.
However, this would result in large numbers of
unnecessary subscriptions, which affects the
efficiency of the network. Alternatively, each peer      Fig.4 : System Architecture
receiving a query message can decide register it
with a certain fixed probability, say Rp. We call this            The Modelling represents a collection of
scheme the fixed probability-based query                 best engineering practices that have proven
registration scheme (FP scheme). Although this           successful in the modelling of large and complex
strategy seems intuitive, it cannot guarantee high       systems. The modelling is a very important part of
notification success rates for every query. The          developing objects oriented software and the
reason is that for some continuous queries a long        software development process. The modelling uses
series of peers in the path of the query message may     mostly graphical notations to express the design of
all decide not to register the query, whereas another    software projects. Using the modelling helps
sequence of consecutive nodes may all decide to          project teams communicate, explore potential
host the query. The announcements originated near        designs, and validate the architectural design of the
the dry patches of a query‟s this might fail to reach    software.

                                                                                                 119 | P a g e
Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering
                   Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                           Vol. 2, Issue 6, November- December 2012, pp.117-122
                                                                                                    System
                                                  Login
                                                                                                                                           Change Password                       Server Data Info

                                                                                    Add Server
                                              ServerInfo
                                                                                                                         Self Data
                                                                                                                                          3 : Change Password()     1 : Server Data Info()
                                                 PeerInfo
                                                                                     Register Peer


Admin
                                                   Data

                                                                                      Upload Data


                                                 User Info                                                              2 : Self Data()
                                                                                                                                                                                              Logout
                                                                                                                                              Peer
                                                Change Password
                                                                                                                                                                  4 : Logout()

                                                                                                                      Fig.7 : Interoperational Collavoration Diagram for
                                                  Logout
                                                                                                                      Peers

                                                                                                                      IV. RESULTS
        Fig.5 : Interoperational Usecase diagram for
        adminstrator



            Peer                 Login           Server Data Info       Self Data        Change Password     Logout


                   1 : login()


                       2 : Server Data Info()


                                         3 : Self Data()




                                               4 : Change Password()




                                                                5 : Logout()
                                                                                                                      Fig.8 : Viewing all Customer Details



        Fig.6 : Interoperational Sequence Diagram for Peers




                                                                                                                                                                          120 | P a g e
Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering
           Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 6, November- December 2012, pp.117-122




Fig.9 : Information for the User about the data in the
server                                                   Fig.11 : Details of the User

                                                         CONCLUSION
                                                                   Allowing peers of a formless P2P content
                                                         sharing networks for registering longstanding
                                                         queries and receiving notification when a new
                                                         matching item appears can considerably increase
                                                         effectiveness. We overcome the complexity of pub-
                                                         sub system on unstructured overlays by our
                                                         continues query paradigm study in this paper. Here
                                                         we presented CoQUOS system which support
                                                         continues queries in Unstructured P2P network by
                                                         including different features such as lazy replication
                                                         technique for countering network churn, cluster
                                                         resilient random walk for query propagation and
                                                         dynamic probability scheme for query registration.

                                                         References
                                                           [1]    R. Baldoni, C. Marchetti, A. Virgillito, and
                                                                  R. Vitenberg. Contentbased Publish-
                                                                  Subscribe over Structured Overlay
                                                                  Networks. In Proceedings of ICDCS ,
                                                                  2005.
                                                           [2]    G. Banavar, T. Chandra, B. Mukherjee, J.
                                                                  Nagarajarao, R. E. Strom, and D. C.
                                                                  Sturman. An Ef_cient Multicast Protocol
                                                                  for Content- Based Publish-Subscribe
Fig.10 : Informatio of the Peers                                  Systems. In Proceedings of ICDCS 1999,
                                                                  1999.
                                                           [3]    S.    Androutsellis-Theotokis     and     D.
                                                                  Spinellis. A Survey of Peerto- Peer Content
                                                                  Distribution Technologies. ACM Comput.
                                                                  Surv., 2004.


                                                                                               121 | P a g e
Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering
           Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 6, November- December 2012, pp.117-122
  [4]    J. Chen, L. Ramaswamy, and A. Meka.
         Message Diffusion in Unstructured
         Overlay Networks. In Proceedings of NCA,
         2007.
  [5]    T. Bu and D. F. Towsley. On
         Distinguishing between Internet Power
         Law Topology Generators. In INFOCOM,
         2002.
  [6]    A. Carzaniga, D. S. Rosenblum, and A. L.
         Wolf. Design and evaluation of a wide-area
         event     noti_cation     service.  ACM
         Transactions on Computer Systems,
         19(3):332.383, 2001.
  [7]    P. Reynolds and A. Vahdat, “Efficient
         Peer-to-Peer Keyword Searching,” Proc.
         ACM/IFIP/USENIX Int‟l Middleware
         Conf. ‟03, 2003.
  [8]    B. Segall, D. Arnold, J. Boot, M.
         Henderson, and T. Phelps, “Content Based
         Routing with Elvin4,” Proc. Australian
         Unix System User Group Conf., 2000.
  [9]    K. Sripanidkulchai, “The Popularity of
         Gnutella Queries and Its Implications on
         Scalability,” O‟Reilly‟s www.openp2p.com
         website. Feb. 2001.
  [10]   I. Stoica, R.Morris, D.Karger, M.F.
         Kaashoek, and H. Balakrishnan, “Chord: A
         Scalable Peer-to-Peer Lookup Service for
         Internet Applications,” Proc. ACM
         SIGCOMM ‟01, Aug. 2001.
  [11]   D.J. Watts and S.H. Strogatz, “Collective
         Dynamics of „Small- World‟ Networks,”
         Nature, vol. 393, no. 6684, pp. 440-442,
         1998.

Author List:




            Venkata Santhosh Deepak received
B.Tech in Computer science from JNTUH, Pursuing
M.Tech in       Computer Networks from Gokul
institute of Engineering & Technology Affiliated to
JNTUK.. His research area of interest is Web
Technology.

Mudiganti Vijaya Bhaskar received B.Tech in
Computer science from AU, M.Tech in Computer
Science from AU. Pursuing Ph.d in soft computing
in AU. His research area of interest is Soft
Computing.




                                                                              122 | P a g e

Más contenido relacionado

La actualidad más candente

Bz32915919
Bz32915919Bz32915919
Bz32915919IJMER
 
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...ijaia
 
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...IDES Editor
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
 
A dynamic performance-based_flow_control
A dynamic performance-based_flow_controlA dynamic performance-based_flow_control
A dynamic performance-based_flow_controlingenioustech
 
10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13Uvaraj Shan
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS cscpconf
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 

La actualidad más candente (17)

Bz32915919
Bz32915919Bz32915919
Bz32915919
 
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
 
Ag26204209
Ag26204209Ag26204209
Ag26204209
 
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
 
A dynamic performance-based_flow_control
A dynamic performance-based_flow_controlA dynamic performance-based_flow_control
A dynamic performance-based_flow_control
 
10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13
 
Chapter3[one.]
Chapter3[one.]Chapter3[one.]
Chapter3[one.]
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Md ux mza5mtg=14
Md ux mza5mtg=14Md ux mza5mtg=14
Md ux mza5mtg=14
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 

Destacado (20)

Cf31537544
Cf31537544Cf31537544
Cf31537544
 
Z26167171
Z26167171Z26167171
Z26167171
 
Ms2521852190
Ms2521852190Ms2521852190
Ms2521852190
 
Mx2522172219
Mx2522172219Mx2522172219
Mx2522172219
 
Y25124127
Y25124127Y25124127
Y25124127
 
Kf2517971799
Kf2517971799Kf2517971799
Kf2517971799
 
Ja2516031606
Ja2516031606Ja2516031606
Ja2516031606
 
Iq2515441549
Iq2515441549Iq2515441549
Iq2515441549
 
Hz2514321439
Hz2514321439Hz2514321439
Hz2514321439
 
Il2515051516
Il2515051516Il2515051516
Il2515051516
 
Kd2517851787
Kd2517851787Kd2517851787
Kd2517851787
 
Jj2516631667
Jj2516631667Jj2516631667
Jj2516631667
 
Jo2516951697
Jo2516951697Jo2516951697
Jo2516951697
 
Iw2515781584
Iw2515781584Iw2515781584
Iw2515781584
 
Jr2517091717
Jr2517091717Jr2517091717
Jr2517091717
 
Lg2519531959
Lg2519531959Lg2519531959
Lg2519531959
 
Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
 
Ic2514531457
Ic2514531457Ic2514531457
Ic2514531457
 
Jv2517361741
Jv2517361741Jv2517361741
Jv2517361741
 
Cultura
CulturaCultura
Cultura
 

Similar a S26117122

Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe SystemOntology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe Systemtheijes
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
 
Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache foringenioustech
 
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...ijp2p
 
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...ijp2p
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Uvaraj Shan
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE ijp2p
 
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...ijp2p
 
Congestion control for_p2_p_live_streaming
Congestion control for_p2_p_live_streamingCongestion control for_p2_p_live_streaming
Congestion control for_p2_p_live_streamingijp2p
 
CONGESTION CONTROL FOR P2P LIVE STREAMING
CONGESTION CONTROL FOR P2P LIVE STREAMINGCONGESTION CONTROL FOR P2P LIVE STREAMING
CONGESTION CONTROL FOR P2P LIVE STREAMINGijp2p
 
Ijp2 p
Ijp2 pIjp2 p
Ijp2 pijp2p
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional HistoricalArul Suju
 
Dynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer ArchitecturesDynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer ArchitecturesZhenyun Zhuang
 
Effective Approach For Content Based Image Retrieval In Peer-Peer To Networks
Effective Approach For Content Based Image Retrieval In Peer-Peer To NetworksEffective Approach For Content Based Image Retrieval In Peer-Peer To Networks
Effective Approach For Content Based Image Retrieval In Peer-Peer To NetworksIRJET Journal
 

Similar a S26117122 (20)

Fu2510631066
Fu2510631066Fu2510631066
Fu2510631066
 
84 88
84 8884 88
84 88
 
Cs24613620
Cs24613620Cs24613620
Cs24613620
 
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe SystemOntology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
 
Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache for
 
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
 
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE
 
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...
 
Congestion control for_p2_p_live_streaming
Congestion control for_p2_p_live_streamingCongestion control for_p2_p_live_streaming
Congestion control for_p2_p_live_streaming
 
CONGESTION CONTROL FOR P2P LIVE STREAMING
CONGESTION CONTROL FOR P2P LIVE STREAMINGCONGESTION CONTROL FOR P2P LIVE STREAMING
CONGESTION CONTROL FOR P2P LIVE STREAMING
 
Ijp2 p
Ijp2 pIjp2 p
Ijp2 p
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional Historical
 
Dynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer ArchitecturesDynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer Architectures
 
Effective Approach For Content Based Image Retrieval In Peer-Peer To Networks
Effective Approach For Content Based Image Retrieval In Peer-Peer To NetworksEffective Approach For Content Based Image Retrieval In Peer-Peer To Networks
Effective Approach For Content Based Image Retrieval In Peer-Peer To Networks
 

Último

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 

Último (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 

S26117122

  • 1. Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.117-122 Implementation Of Coquos On Unstructured P2P Network To Achieve Continuous Queries Venkata Santhosh Deepak*1 ,Mudiganti Vijaya Bhaskar*2 *1 M.Tech Student, Gokul Institute of Technology & Science, Bobilli , INDIA *2 Asst.Professor, CSE Dept, Gokul Institute of Technology & Science, Bobilli, INDIA Abstract Considering on-demand content discovery mechanism, currently P2P content distribution systems are constructed. By including two major capabilities like a mechanism through which peers register long term interest in network which notify new data items whenever they occur, and second capability is that advertising its content which enhances the utility of the systems. Presents proposals need intricate indexing and routing schemes to fulfil the above two capabilities which not only make them highly complex but also render the overlay network less flexible toward transient peers. For which we proposed a Scalable and effective middleware which is called as CoQUOS to support unremitting queries in unstructured Fig.1: Decentralized P2P Architecture overlay networks. We proposed two techniques namely, cluster-resilient random walk algorithm A second research area that is closely and dynamic probability-based query related to work presented in this paper is that of registration scheme. First scheme used for pub-sub systems (event delivery systems. The early propagating the queries to various regions of the pub-sub systems adopted a centralized architecture network and second scheme to ensure that the for subscription maintenance and matching and registrations are well distributed in the overlay. notification of published data items, whereas the And we also proposed effective and efficient latter systems were either partially or completely schemes for providing resilience to the churn of decentralized. More recently, researchers have the P2P network and for ensuring a fair designed decentralized pub-sub systems on top of distribution of the notification load among the P2P networks several pub-sub systems have been peers. successfully implemented on structured P2P platforms. Unstructured P2P networks-based pub- Keywords- content delivery, continuous queries, sub systems are relatively less explored. The main difficulty in designing pub-sub systems on P2P networks, publish-subscribe systems, random unstructured P2P networks emerges from the fact walk. that the topologies of most unstructured P2P networks have no relationship to the data (or other I. INTRODUCTION information) in individual peers. As a result, routing In the past few years, both structured and in these networks is, in general, independent of unstructured P2P networks have experienced peers' contents (a few unstructured P2P networks significant research searching through ad-hoc use content-sensitive heuristics for routing). Most queries has been the predominant information unstructured P2P networks-based pub-sub systems discovery mechanism in P2P networks. Several try to overcome these difficulties by carefully researchers have studied efficient and scalable controlling the manner in which the topology of the alternatives to the flooding-based searching in overlay network evolves, and by adopting intricate unstructured P2P networks Random walk and its indexing strategies for routing subscriptions and variants have been explored as alternatives to the notifications. Unfortunately, these mechanisms are broadcast strategy. However, the ad-hoc query highly complex and they introduce significant paradigm is inadequate for advanced P2P content overlay management overheads thereby limiting the sharing applications. scalability of the corresponding systems. As mentioned in the introduction, the Sub- 2-Sub requires peers to be clustered on the basis of their 117 | P a g e
  • 2. Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.117-122 subscriptions. The publisher of a data item is research challenge is to develop a completely required to reach the cluster that exactly corresponds distributed mechanism to register the continuous to the data item being published, and then start the queries at various regions of the P2P network so that dissemination process. The RDF-based pub-sub the system has high notification effectiveness. scheme designed in the context of ELENA project Further, it is also necessary to develop low-cost also suffers from similar limitations. This system techniques for providing resilience to the churn of also requires the peers of the overlay to be the overlay network and for achieving fair meticulously organized, in this case, to form an distribution of notification load among the peers in intricate bi-level Hyper cup architecture. Besides the network. Towards addressing these challenges, having limited scalability, the system is very this paper makes four novel contributions. vulnerable to super peer failures. The CoQUOS • First, we present a novel query propagation system differs fundamentally from P2Pbased pub- technique called Cluster Resilient Random Walk sub schemes. All of the above-mentioned systems (CRW). This technique retains the overall are essentially pub-sub systems which are framework of the random walk paradigm. However, implemented on a P2P platform. In contrast, the at each step of propagation, CRW favors neighbors goal of our work is to enhance the content discovery that are more likely to send messages deeper into the capabilities of unstructured P2P content distribution network thereby enabling the continuous queries to networks. With the goal of achieving guaranteed reach different topological regions of the overlay notification, most unstructured network. P2P-based pub-sub systems include • Second, a dynamic probability scheme is proposed complex overlay management strategies. On the for enabling the recipients of a continuous query to other hand, our CoQUOS system does not impose make independent decisions on whether to register any restrictions on the topology of the overlay, the query. In this scheme, a query that has not been employs lightweight techniques, yet it provides high registered in the past several hops has a higher success rates. However, CoQUOS might not be chance of getting registered in its next hop, which appropriate for applications where guaranteed ensures that registrations are well distributed along notification is necessary. Smart Seer is a structured the path of a query message. P2P overlay-based continuous query system for document repositories. Unlike Smart Seer, CoQUOS does not rely upon DHT for mapping continuous queries to peer nodes hosting them or for routing notifications. Instead, it incorporates lightweight mechanisms like CRW and dynamic probability scheme for registering continuous queries on various peer nodes of the overlay. Peer CQ is a P2Pbased continual query system for information change monitoring. It too uses the DHT to distribute change monitoring queries to the nodes of the network. Researchers have studied the properties of random walk as well as its utility for various P2P applications such as computing aggregate queries and uniform sampling of peers in unstructured P2P networks. Several variants of random walk such as popularity biased random walk have been proposed Fig.2: CoQUOS system overview for P2P searching. Show that the performance of random walk degrades if the overlay network exhibits considerable degree of node clustering. • Third, we discuss a passive replication-based scheme for preserving high notification CRW overcomes this limitation by favoring out-of- effectiveness of the system even when the cluster peers at each hop of message propagation. underlying P2P network experiences significant churn. II. SYSTEM OVERVIEW • Finally, we propose a local load re-distribution The fundamental idea of the CoQUOS strategy to achieve fair distribution of notification system is to register the continuous query on a set of loads among the participating peers. peers that are located in various topological regions of the overlay network. These query replicas are a) Cluster-Resilient Random Walk used by the CoQUOS system to notify the Flooding-based broadcast is an option for respective source peers of matching advertisements circulating continuous queries. However, this would issued by other peers. Considering the decentralized be analogous to a breadth first traversal of the nature of unstructured P2P networks, an important 118 | P a g e
  • 3. Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.117-122 network. As previous studies have reported, in this any of its beacon nodes, thus leading to low success scheme, messages remain in close vicinity of the rates. source node and do not go deep into the network. The objectives of our experimental study of the Random walk is another message propagation CoQUOS system are fourfold: paradigm that has received considerable attention 1. Evaluating the effectiveness of the CRW from the P2P research community. In the context of technique in propagating continuous queries, P2P networks, random walk works as follows: 2. Studying the performance of the dynamic When a peer node Pi receives a message whose TTL probability approach for query registrations, has not expired, it selects one of its neighbors 3. Evaluating the churn resilience and the load completely at random and forwards the message to balancing mechanisms, and that peer. Since, at each step the message is 4. Evaluating the communication costs. forwarded to only one neighbor, the message load imposed by random walk is very low. Random walk III. SYSTEM DESIGN & corresponds to a depth-first traversal of the network, IMPLEMENTATION and a message propagated through random walks For implementation independent has a higher probability of reaching remote regions specification and verification, and for subsequent of the network than its flooding-based counterpart. synthesis of specifications into efficient In this paper, we use the terms random walk and implementations. pure random walk (PRW) interchangeably. The proposal is divided into below sub-tasks: i) adopt/further develop a model for formal, high- level system specification and verification. ii) Demonstrate the efficacy of the developed model by applying it to a suitable part of the consortium demonstrator, the network terminal for broadband access. iii) Develop a systematic method to refine the specification into synthesizable code and a prototype tool which supports the refinement process and links it to synthesis and compilation tools. Fig.3 : Illustration of cluster resilient random walk b) Dynamic-Probability-Based Query Registration The CRW scheme provides a mechanism for propagating a continuous query. But, how does a node receiving this message decide whether to register the query? A straightforward solution would be to register a query at every node it visits. However, this would result in large numbers of unnecessary subscriptions, which affects the efficiency of the network. Alternatively, each peer Fig.4 : System Architecture receiving a query message can decide register it with a certain fixed probability, say Rp. We call this The Modelling represents a collection of scheme the fixed probability-based query best engineering practices that have proven registration scheme (FP scheme). Although this successful in the modelling of large and complex strategy seems intuitive, it cannot guarantee high systems. The modelling is a very important part of notification success rates for every query. The developing objects oriented software and the reason is that for some continuous queries a long software development process. The modelling uses series of peers in the path of the query message may mostly graphical notations to express the design of all decide not to register the query, whereas another software projects. Using the modelling helps sequence of consecutive nodes may all decide to project teams communicate, explore potential host the query. The announcements originated near designs, and validate the architectural design of the the dry patches of a query‟s this might fail to reach software. 119 | P a g e
  • 4. Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.117-122 System Login Change Password Server Data Info Add Server ServerInfo Self Data 3 : Change Password() 1 : Server Data Info() PeerInfo Register Peer Admin Data Upload Data User Info 2 : Self Data() Logout Peer Change Password 4 : Logout() Fig.7 : Interoperational Collavoration Diagram for Logout Peers IV. RESULTS Fig.5 : Interoperational Usecase diagram for adminstrator Peer Login Server Data Info Self Data Change Password Logout 1 : login() 2 : Server Data Info() 3 : Self Data() 4 : Change Password() 5 : Logout() Fig.8 : Viewing all Customer Details Fig.6 : Interoperational Sequence Diagram for Peers 120 | P a g e
  • 5. Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.117-122 Fig.9 : Information for the User about the data in the server Fig.11 : Details of the User CONCLUSION Allowing peers of a formless P2P content sharing networks for registering longstanding queries and receiving notification when a new matching item appears can considerably increase effectiveness. We overcome the complexity of pub- sub system on unstructured overlays by our continues query paradigm study in this paper. Here we presented CoQUOS system which support continues queries in Unstructured P2P network by including different features such as lazy replication technique for countering network churn, cluster resilient random walk for query propagation and dynamic probability scheme for query registration. References [1] R. Baldoni, C. Marchetti, A. Virgillito, and R. Vitenberg. Contentbased Publish- Subscribe over Structured Overlay Networks. In Proceedings of ICDCS , 2005. [2] G. Banavar, T. Chandra, B. Mukherjee, J. Nagarajarao, R. E. Strom, and D. C. Sturman. An Ef_cient Multicast Protocol for Content- Based Publish-Subscribe Fig.10 : Informatio of the Peers Systems. In Proceedings of ICDCS 1999, 1999. [3] S. Androutsellis-Theotokis and D. Spinellis. A Survey of Peerto- Peer Content Distribution Technologies. ACM Comput. Surv., 2004. 121 | P a g e
  • 6. Venkata Santhosh Deepak, Mudiganti Vijaya Bhaskar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.117-122 [4] J. Chen, L. Ramaswamy, and A. Meka. Message Diffusion in Unstructured Overlay Networks. In Proceedings of NCA, 2007. [5] T. Bu and D. F. Towsley. On Distinguishing between Internet Power Law Topology Generators. In INFOCOM, 2002. [6] A. Carzaniga, D. S. Rosenblum, and A. L. Wolf. Design and evaluation of a wide-area event noti_cation service. ACM Transactions on Computer Systems, 19(3):332.383, 2001. [7] P. Reynolds and A. Vahdat, “Efficient Peer-to-Peer Keyword Searching,” Proc. ACM/IFIP/USENIX Int‟l Middleware Conf. ‟03, 2003. [8] B. Segall, D. Arnold, J. Boot, M. Henderson, and T. Phelps, “Content Based Routing with Elvin4,” Proc. Australian Unix System User Group Conf., 2000. [9] K. Sripanidkulchai, “The Popularity of Gnutella Queries and Its Implications on Scalability,” O‟Reilly‟s www.openp2p.com website. Feb. 2001. [10] I. Stoica, R.Morris, D.Karger, M.F. Kaashoek, and H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications,” Proc. ACM SIGCOMM ‟01, Aug. 2001. [11] D.J. Watts and S.H. Strogatz, “Collective Dynamics of „Small- World‟ Networks,” Nature, vol. 393, no. 6684, pp. 440-442, 1998. Author List: Venkata Santhosh Deepak received B.Tech in Computer science from JNTUH, Pursuing M.Tech in Computer Networks from Gokul institute of Engineering & Technology Affiliated to JNTUK.. His research area of interest is Web Technology. Mudiganti Vijaya Bhaskar received B.Tech in Computer science from AU, M.Tech in Computer Science from AU. Pursuing Ph.d in soft computing in AU. His research area of interest is Soft Computing. 122 | P a g e