Locating Equivalent Servants over P2P Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
While peer-to-peer networks are mainly used to locate unique resources across the Internet, new interesting deployment scenarios are emerging. Particularly, some applications (e.g., VoIP) are proposing the creation of overlays for the localization of services based on equivalent servants (e.g., voice relays). This paper explores the possible overlay architectures that can be adopted to provide such services, showing how an unstructured solution based on a scale-free overlay topology is an effective option to deploy in this context. Consequently, we propose EQUATOR (EQUivalent servAnt locaTOR), an unstructured overlay implementing the above mentioned operating principles, based on an overlay construction algorithm that well approximates an ideal scale-free construction model. We present both analytical and simulation results which support our overlay topology selection and validate the proposed architecture.
Authors and Affiliations
V V S NARAYANA MURTHY KAMINI, Kusuma Aparna Lakshmi, M Vamsi Krishna
Image Compression through Data Representation in Frequency Domain
Data compression is a very important field these days. You can find it in any web page, network devices, application files etc. Its importance has grown during the years as a necessity of storage and time of transpor...
Estimating the qos parameters and enhancing performance by implementing cluster head in MANET
In the MANET each node communicates with the other node temporarily and stops all the communication when all the data transfers done. Clustering (used in MANET) provides an effective way to allocate wireless channels...
Power Optimization for a Datapath of A Genral Purpose Processor
Data path is the core of the processor; it is where all computations are performed. The other blocks in the processor are supporting units. At present, most of the popular processor hardware synthesis tools give highe...
Implementation of Trust Aware Routing Framework With Link Failure Consideration and Recovery
Wireless Sensor Network has now huge scope for research and application development but sensor networks are vulnerable to different attack. Hence security is key issue while using Sensor networks. Identity deceptions...
VLSI Implementation and Design of Digital Modulation Using Xilinx
In this Paper, Digital Modulators is designed and Implemented using XILINX ISE Tool based on Very Large Scale Integration (VLSI). This is majorly to implement and obtain digitalize signals in softwaredefined radio (SD...