Peer-to-Peer File Sharing Across Private Networks Using Proxy Servers
#1

Peer-to-Peer File Sharing Across Private Networks Using Proxy Servers


The Internet today is commonly used as a medium to share large size multimedia content. This sharing is carried out, a number of times, through the Peer to Peer sharing architecture rather than the conventional server-client model. The paucity of network addresses in the Internet has led to the emergence of private and global networks. Because the identity of peers in a private network remains hidden behind their global endpoint, P2P applications cannot run between two peers in separate private networks. Techniques such as hole-punching require the use of a centralized entity which serves as a bottleneck to the P2P application.

We have proposed a hierarchical P2P network of private and global networks. Here, the lower tier is formed by the peers in each private network, while the upper tier is formed by the global endpoints (called proxies) of each of these private networks. We have designed a new file sharing protocol, FTPNP, between these proxies which preserves the identities of the actual endpoints of the file transfer, present in separate private networks. We have also created a Credit Management System in order to ensure fairness and incentive to share in the designed hierarchical P2P system. We have implemented all the above proposed features and tested them to ensure the preservation of the essential features of a P2P network.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: proxy servers gmailructures ppt, file sharing in vista, plasma membrane barrier and drug diffusion across it ppt, file sharing audio books, leakage across labyrinth seal, automated moving bridge across river project abstract, metadata management across,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,542 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Privacy- and Integrity-Preserving Range Queries in Sensor Networks 1 849 15-02-2017, 04:10 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 780 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 742 15-02-2017, 11:00 AM
Last Post: jaseela123d
  projects on computer networks? shakir_ali 2 1,575 25-01-2016, 02:26 PM
Last Post: seminar report asees
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,326 14-07-2015, 02:25 PM
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 1,301 14-07-2015, 02:11 PM
Last Post: seminar report asees
  Crime File management project topics 11 15,596 11-04-2014, 04:23 PM
Last Post: babs01
  Fast Data Collection in Tree-Based Wireless Sensor Networks Projects9 9 3,983 12-03-2014, 06:30 PM
Last Post: computer topic
  E -Crime File Management System seminar class 8 13,340 24-06-2013, 10:02 AM
Last Post: computer topic

Forum Jump: