Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Performance Analysis of Controlled Scalability in Unstructured Peer-to-Peer Networks

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 40 - Number 8
Year of Publication: 2012
Authors:
P. M. Rubesh Anand
Vidhyacharan Bhaskar
10.5120/4984-7247

Rubesh P M Anand and Vidhyacharan Bhaskar. Article: Performance Analysis of Controlled Scalability in Unstructured Peer-to-Peer Networks. International Journal of Computer Applications 40(8):23-29, February 2012. Full text available. BibTeX

@article{key:article,
	author = {P. M. Rubesh Anand and Vidhyacharan Bhaskar},
	title = {Article: Performance Analysis of Controlled Scalability in Unstructured Peer-to-Peer Networks},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {40},
	number = {8},
	pages = {23-29},
	month = {February},
	note = {Full text available}
}

Abstract

In unstructured peer-to-peer networks, the analysis of scalability is a challenging task due to the unpredictable nature of churn rate. Specifically, in the P2P file sharing applications, peers join and leave the overlay network in a dynamic fashion increase the complexity of the network and leads to a huge wastage of bandwidth during the search for a particular file. In this paper, we proposed a controlled scalability model in unstructured P2P networks for achieving efficient bandwidth utilization and high scalability. Performance measures such as peer availability and scalability are analyzed and compared with the BitTorrent system show that the proposed model overcomes the problems of bandwidth wastage and initial time flash crowd while maintaining the scalability of the network. Mathematical modeling and simulation results illustrates that the controlled scalability performs well in utilizing bandwidth during the event of polluted or infected files sharing than the uncontrolled scalability in the existing unstructured P2P networks.

References

  • Giesler, M.and Pohlmann, M. 2003.The Anthropology of File Sharing: Consuming Napster as a gift. Advances in Consumer Research.vol. 30, 273-279.
  • Gnutella2. [Online]. Available: http://en.wikipedia.org/wiki/Gnutella2
  • Liang, J., Kumar, R., and Ross, K.2005. The Kazaa Overlay: A Measurement Study. Computer Networks (Special Issue on Overlays) (2005).
  • BitTorrent. Available: http://www.bittorrent.com
  • Cohen, B., 2003. Incentives Build Robustness in BitTorrent. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems, Berkeley, California, USA, (May 2003).
  • Christin, N., Weigend, A.S., and Chuang, J. 2005. Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks. In Proceedings of the 6thACM conference on Electronic commerce (EC'05), Vancouver, Canada, (June 2005), 68-77.
  • Rubenstein, D. and Sahu, S. 2005. Can unstructured P2P protocols survive flash crowds? IEEE Transactions on Networking, vol. 13, no. 3, 501-512.
  • Chiu, Y.-M. and Eun, D.Y. 2010. On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network. IEEE Transactions on Parallel and Distributed Systems, vol.21, no.10, 1487-1500.
  • Yang, M. and Yang, Y. 2010. An Efficient Hybrid Peer-to-Peer System for Distributed Data Sharing. IEEE Transactions on Computers, vol.59, no.9, 1158-1171.
  • Marchetto, G., Manzillo, M.P., Torrero, L., Ciminiera, L.,and Risso, F.2011. Robustness analysis of an unstructured overlay for media communication. IET Communications, vol.5, no.4, 409-417.
  • Smaragdakis, G. et al., 2011. Selfish Overlay Network Creation and Maintenance. IEEE/ACM Transactions on Networking, vol.19, no.6, 1624-1637.
  • Anand, P.M.R., and Bhaskar, V. 2011. Polluted Content Prevention in Peer-to-Peer File Sharing Networks. In Proceedings of the IEEE Conference on Engineering Sustainable Solutions, (Dec. 2011), 1-4.
  • Izal, M., Biersack, E. W., Felber, P. A., and Hamra, A. A. 2004. Dissecting BitTorrent : Five Months in a Torrent’s Lifetime. Passive and Active Network Measurement, Lecture Notes in Computer Science, Springer, vol. 3015, 1-11.
  • Montresor and Jelasity, M. 2009. PeerSim: A scalable P2P simulator. In Proceedings of the IEEE Ninth International Conference on Peer-to-Peer Computing, Seattle, Washington, USA, (Sep. 2009), 99-100.