Locating Equivalent Servants over P2P Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
While peer-to-peer networks are mainly used to locate unique resources across the Internet, new interesting deployment scenarios are emerging. Particularly, some applications (e.g., VoIP) are proposing the creation of overlays for the localization of services based on equivalent servants (e.g., voice relays). This paper explores the possible overlay architectures that can be adopted to provide such services, showing how an unstructured solution based on a scale-free overlay topology is an effective option to deploy in this context. Consequently, we propose EQUATOR (EQUivalent servAnt locaTOR), an unstructured overlay implementing the above mentioned operating principles, based on an overlay construction algorithm that well approximates an ideal scale-free construction model. We present both analytical and simulation results which support our overlay topology selection and validate the proposed architecture.
Authors and Affiliations
V V S NARAYANA MURTHY KAMINI, Kusuma Aparna Lakshmi, M Vamsi Krishna
Design and Analysis of an Efficient Object Tracking System using Modified Mean Shift Tracking
Object tracking is the process of locating a moving object (or multiple objects) over time using a camera. It has a variety of uses, some of which are: human-computer interaction, security and surveillance, video com...
Design Of Virtual Sense Technology For System Interface
A gesture-based human computer interaction can make computers and devices easier to use, such as by allowing people to control the application on windows by moving their hands through the air. Existing solutions have...
Self-motivated probe forms designed for database Uncertainties
Query form is a standout amongst the most broadly utilized client interfaces for questioning databases. Conventional inquiry structures are planned and precharacterized by engineers or DBA in different data administra...
Detection & Prevention of Unauthorized User through Policy Server for a Network
Now a day’s Accessing the information all over the world is very fast & quick. Accessing the information is done over the internet. Industry & various organizations are facing access management problems that require n...
Top-Down Heuristics for Multi-Dimensional Partitioning To Satisfy Imprecision Bounds
Role-based Access Control (RBAC) agrees to important permissions on objects based on roles in an organization. An RBAC policy configuration is collected of a set of Users (U), a set of Roles (R), and a set of Permiss...