Randomized Protocol for Duplicate Elimination in Peer-to-Peer Storage System
#1

Randomized Protocol for Duplicate Elimination in Peer-to-Peer Storage System


PEER-TO-PEER systems have emerged as cost-effective alternatives for scalable data sharing, backup, and archival storage. Peers contribute data and storage and, in return, gain access to data at other peers. Effective storage management is an important issue in the deployment of such systems. Data replication and caching are key enabling techniques for scalability, performance, and availability. In this context, an important problem relates to pruning unwanted copies of data efficiently and safely. Attempts at aggressive replication may lead to significant overheads associated with thrashing in resource constrained environments. Even if replication at peers is controlled, as in systems such as Samsara, the network as a whole must provide mechanisms for eliminating replicas that are not accessed, while leaving a minimum number of replicas in the network to satisfy availability constraints.
In this paper, we investigate the problem of eliminating duplicate data items in peer-to-peer systems. We examine this issue in the context of unstructured networks, where no assumptions can be made about the relationship between an object and the peers at which it resides. Unstructured networks differ from their structured counter-parts in several important respects. Structured networks provide a simple primitive for locating an object which relies on a distributed hash table (DHT) abstraction. The associated lookup techniques provide bounds on the number of hops as a function of the number of peers. These bounds are achieved by establishing and maintaining a well-defined overlay topology. In networks with a high transient population, the overhead associated with this may be significant. In contrast to structured peer-to-peer networks, unstructured networks are resilient to node failures and incur low overhead on node arrivals and departures. These characteristics make unstructured networks attractive for use in highly transient networks, where peers do not have significant resources. Unfortunately, the issue of object location, which is central to the problem of identifying redundant copies, is significantly more complex in this environment.
The primary focus of this paper is on systems where peers are cooperative and non malicious. Peers divide their storage into two spaces: a private and a public space. The private space contains the peerâ„¢s data and is not subject to duplicate elimination. The public space holds data from other peers and is subject to duplicate elimination. We can view the public space as back up storage or a cache to facilitate availability and performance, respectively.

HARDWARE SPECIFICATION
Processor : Any Processor above 500 Mhz.
Ram : 128Mb.
Hard Disk : 10 Gb.
Compact Disk : 650 Mb.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.

SOFTWARE SPECIFICATION
Operating System : Windows 2000 server Family.
Techniques : JDK 1.5
Data Bases : Microsoft SQL Server
External Tool : JFree Chart
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: peer to peer interview, bandpass filter band elimination filter using matlab information, report for duplicate test case detector, list of advanced harmonics elimination techniques, duplicate record detection ppt, ieee technical papers on zipper noise elimination by digital volume control pdf, peer fusion middleware architecture of internet scale retrieval information seminar report,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,384 14-07-2015, 02:25 PM
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 1,331 14-07-2015, 02:11 PM
Last Post: seminar report asees
  Image Transfer Protocol for Internt project topics 3 2,286 26-03-2013, 07:42 PM
Last Post: vvk chary
  distributed cache updating for the dynamic source routing protocol project report tiger 4 3,000 05-03-2013, 02:22 PM
Last Post: Guest
  Stateless Multicast Protocol for Ad Hoc Networks Projects9 1 1,337 29-11-2012, 01:06 PM
Last Post: seminar details
  SECURE DATA COLLECTION IN WIRELESS SENSOR NETWORKS USING RANDOMIZED DISPERSIVE ROUTES project topics 11 7,984 14-03-2012, 12:06 PM
Last Post: tamannablaire
  Distributed cache updating for the Dynamic source routing protocol electronics seminars 1 2,453 23-02-2012, 02:17 PM
Last Post: seminar paper
  HBA DISTRIBUTED METADATA MANAGEMENT FOR LARGE SCALE CLUSTER BASED STORAGE SYSTEM --PA electronics seminars 1 1,829 20-02-2012, 01:24 PM
Last Post: seminar paper
  A Packet Sniffer On HTTP Protocol Electrical Fan 1 2,147 10-02-2012, 09:50 AM
Last Post: seminar addict

Forum Jump: