SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 38
Estimating various DHT protocols
Vishal Wadhwani1, Nayan Jain2
1,2B.E.:Computer Engineering Dept., VESIT, Mumbai, India.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - This project involves the use of Peer-to-Peer
networks to facilitate premium digital content streaming.
Clients seeking this service will not have to rely upon a third
party to ensure the safety of the data. Our system mitigates
the common problems associated with centralized systems
such as trust issues, data failures, outages and traditional
security concerns. Unlike the non-standard encryption in
centralized systems, we use client-side encryption to ensure
data privacy against the nodes storing the data. Data
availability is a major concern associated with the Peer-to-
Peer networks. We seek to solve this problem with a
verification system proposed by Storj[1] which involves a
challenge-response protocol. We further propose a model
for distributing and accessing the data referencing the
BitTorrent ‘Distributed Sloppy Hash Table’ protocol[4]
based upon the Kademlia protocol[2]. Each node in our
network is a valid Ethereum address. To implement the
above-stated project we had to compare the below three
protocols.
Keywords—Distributed hash table, Tapestry, Chord,
Kademlia.
1. INTRODUCTION
Distributed hash table protocols might look identical in
some aspects such as node forward lookups, but they have
their share of discrepancies in terms of the amount of state
they possess, search for low latency routes, selecting
between alternatives for parameters like frequency, etc.
Instead of the traditional approach of comparing DHT's
with focus on hop-count latency, or routing size table we
are assessing the protocols in the face of joining and
leaving protocols. It will make it simple to examine
tradeoffs between state maintenance detriments and
lookup performance. In this paper, we will be analysing
three Distributed Hash Table protocols namely, Kademlia,
Tapestry and Chord as they exhibit a wide variety of
design choices for Distributed Hash Table protocols.
The illustration of inter-node latencies has been realised
using a simple simulator called King method. The King
method overlooks the effects of congestion. Using lookup
operations and churn we distinguish the performance of
the protocols. We examine these protocols under varying
settings of the parameters and come up to a conclusion
that the protocols can have similar or different
performance depending on the parameters.
In our framework, we are comparing different cost and
performance measures. Instead of conventional cost
measures of CPU time or memory we are using the
number of bytes of the message sent. For performance, we
are using lookup latency as the performance metric in
place of success rate or hop-count. We penalise or award
toward the cost of the framework depending upon the
efficacy of the routes taken by the protocol. We have
delineated the model to highlight the discrepancies solely
based upon our choice of parameters. We assess each DHT
over a range of parameter values, planning a performance
envelope from which we can extrapolate an optimal cost-
performance tradeoff curve.
2. Protocol Overview
In this paper, we estimate the performance of three
Distributed Hash Table protocol(Tapestry, Chord, and
Kademlia) using the mentioned framework. In this section,
we try to present a concise summary of each of the above-
mentioned DHT and discern the tunable parameters.e.
Tapestry is a peer-to-peer overlay network which
provides a distributed hash table, routing, and
multicasting infrastructure for distributed applications.
Tapestry has a large identifier space. This identifier space
is produced using the SHA-1 algorithm. This is a 160-bit
identifier space represented by 40 digit hex key. In this
large identifier space, each node is assigned an unique
node id. NodeIDs and GUIDs are roughly evenly
distributed in the overlay network with each node storing
several different IDs. Multiple applications sharing the
same overlay network increases efficiency as tapestry’s
efficiency increases with network size.
To locate a piece of data in the P2P system we use Chord
where every node, where data is stored, is mapped to a
key in a distributed system in a scalable manner.
Using SHA1 Cryptographic Hash Algorithm chord uses
uniform hashing to map every node and data to an m bit
identifier. The address of both the node and data item is
the SHA1 of IP in the case of node and content in the case
of the data item. Considering identifiers are arranged in a
circular manner and every data item is mapped to a node
whose id is equal to data item's id. Every node stores
A.Tapestry
B. Chord
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 39
routing information about nodes 1, 2, 4, 8 ... hops away.
This information is stored in the finger table.
On receiving a key to lookup, a node reroutes it to another
node close to the key's id. Stabilization protocol keeps the
finger table correct in case of failure. Successor list
contains information about r next successors in the circle.
On failure of a node, it will be replaced with the next live
node in its successor table.
C. Kademlia
One of the most popular peer-to-peer (P2P) architecture
in use today is Kademlia. Kademlia has many advantages
over other DHTs. These advantages make it a more
preferable choice over other DHTs. These advantages
include:
It minimizes the number of inter-node introduction
messages.
Configuration knowledge such as nodes on the network
and neighbouring nodes spread automatically as a result
of key lookups.
Nodes in Kademlia are aware of different nodes. This
enables routing queries through low latency paths.
Kademlia avoids timeout delays from failed nodes using
parallel and asynchronous queries.
Kademlia is immune to some DOS attacks.
To give a simplified version of Kademlia we can delineate
it as a binary tree where the leaves represent the nodes. In
this tree, by tracing the bit value of the edges of the node
we can find the participating key. Over this, the Kademlia
protocol ensures that every node knows at least one node
in each of its subtrees if that subtree contains a node.
The closeness of keys x and y are taken by computing the
XOR value of the two keys. Kademlia converges to the
lookup target in many steps by finding the successively
closer nodes to the desired ID. Using a replication
parameter Kademlia specifies the number of nodes on
which a data should be replicated. Routing table and
network information of a node are stored at the node state
and at each remaining node the routing table containing
contacts of other DHT nodes is stored. This routing table is
made up of 160 buckets with each bucket storing k
contacts at different distances away from the node for
some notion of distance.
Kademlia has four RPCs: PING, STORE, FIND_NODE and
FIND_VALUE. The PING remote procedure call examines a
node to see if it’s online. The STORE remote procedure call
directs a node to store a [key, value] pair for later
retrieval. The FIND_NODE remote procedure call takes a
160-bit key as an argument, the recipient of the
FIND_NODE remote procedure call returns knowledge for
the k nodes nearest to the target id. The FIND_VALUE
remote procedure call behaves like FIND_NODE returning
the k nodes nearest to the target Identifier with one
anomaly – on accepting a STORE key, the remote
procedure call just returns the stored value.
3. Evaluation
The DHTs have been implemented in P2PSIM, a discrete-
event packet-level simulator. The simulated network
consists of 1,024 nodes with inter-node latencies derived
from measuring the pairwise latencies of 1,024 DNS
servers using the King method. The round-trip delay is
152 milliseconds. The simulator does not simulate link
transmission rate or queuing delay. Only key lookup is
involved.
Nodes issue lookups for random keys at interims
exponentially diffused with a mean of ten minutes and
nodes crash and rejoin at exponentially diffused intervals
with a mean of one hour. This choice of mean session time
is uniform with past studies, while the lookup rate
guarantees that nodes perform numerous lookups per
session. All experiments run for a duration of six hours
with nodes keeping their IP address and ID for the time
span of the experiment.
A. Protocol Comparison
A protocol has numerous parameters that influence its
cost and performance. There is no single reliable
aggregate of parameter values. Instead, there is a set of
best possible cost-performance sequences: for each given
cost, there is a least feasible latency, and for each latency,
there is a least feasible cost.
B. Parameter Exploration
The first question to be answered is what parameters do
we choose who have relative importance on the
performance tradeoff for a single protocol and whether
similar parameters have a similar effect on the
performance of different protocols. Because of the
interaction between parameters, the question is quite
complex to be answered easily. After careful examination,
we have chosen the below parameters for each of our
protocols.
Tapestry: Base (2 – 128), Stabilization interval (36 sec –
19 min), Number of backup nodes (1–4), Number of nodes
contacted during repair (1 – 20).
Chord: Number of successors (4 – 32), Finger base (2 –
128), Finger stabilization interval (40 sec – 19 min),
Successor stabilization interval (4 sec – 19 min).
Kademlia: Nodes per entry (4, 8, 16, 32), Parallel lookups
(1 – 10), Stabilization interval (20 min – 1 hour).
Keeping the above parameters in consideration we then
plot the average lookup latency to average live bandwidth.
To separate the influence of a single parameter, we
calculate the convex hull segment for every value of a
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 40
parameter while varying all the other parameter values.
This helps in tracing the full convex hull.
Chord:
In Chord finger and successors are stabilised separately.
By our observation faster rates result in wasted
bandwidth while slower rates result in a greater number
of timeouts during lookups. The finger stabilization
interval is independent of success rate in term of
performance so its value must be varied to achieve the
best tradeoff. Faster finger stabilization results in lower
lookup latency due to fewer timeouts, but at the at a much
higher communication cost. In Chord, there is no
particular best base value like in Tapestry. In Chord, there
is a more involved join algorithm that samples a larger
number of candidate neighbours during PNS.
Kademlia:
In Kademlia the parameter parallel lookup causes a
decrease in latency at higher values but at the cost of more
lookup traffic. Our observation also shows that the
Kademlia stabilization interval has little impact on latency,
but it does increase communication cost. Though it does
decrease the number of routing table entries pointing to
dead nodes and thus limits the number of timeouts during
lookups. However, parallel lookups already assure that
these timeouts are not on the critical path for lookups, so
their exclusion does not decrease lookup latency
Tapestry
The latency results in Tapestry are a bit counter-intuitive:
every value of base is able to achieve the identical lookup
performance, even though a meagerer base results in
more hops per lookup on average. This response is due to
Tapestry’s contiguity routing. The starting hops in every
lookup tend to be to nearby neighbours, and so the time
for the lookup becomes overshadowed by the last hop,
which is vital to a random node in the network. Therefore,
in a protocol with proximity routing, the base can be set to
be a small value in order to preserve bandwidth costs due
to stabilization.
As more and more nodes stabilize, they achieve lower
latencies by evading more timeouts on the critical path of
a lookup. Although this development comes at the cost of
bandwidth, the outcomes show that the cost in bandwidth
is peripheral when compared to the savings in lookup
latency. Thus, along with setting the base low, we can also
frequently stabilise to keep routing table up to date.
CONCLUSION
In this paper, we present a unified framework for studying
the cost versus lookup latency tradeoffs in various DHT
protocols and evaluates Tapestry, Chord, and Kademlia in
that framework. Under the discussed conditions, these
protocols can achieve identical performance if parameters
are adequately well-tuned. However, because of the
interaction of parameters within a protocol, the cost
versus performance tradeoff can be affected, but similar
parameters in other protocols, such as base and
stabilization interval, can behave conversely.
REFERENCES
[1] G. Eason, B. Noble, and I. N. Sneddon, “On certain
integrals of Lipschitz-Hankel type involving
products of Bessel functions,” Phil. Trans. Roy. Soc.
London, vol. A247, pp. 529–551, April 1955.
(references)
[2] J. Clerk Maxwell, A Treatise on Electricity and
Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892,
pp.68–73.
[3] I. S. Jacobs and C. P. Bean, “Fine particles, thin films
and exchange anisotropy,” in Magnetism, vol. III, G.
T. Rado and H. Suhl, Eds. New York: Academic,
1963, pp. 271–350.
[4] K. Elissa, “Title of paper if known,” unpublished.
[5] R. Nicole, “Title of paper with only first word
capitalized,” J. Name Stand. Abbrev., in the press.
[6] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa,
“Electron spectroscopy studies on magneto-optical
media and plastic substrate interface,” IEEE Transl.
J. Magn. Japan, vol. 2, pp. 740–741, August 1987
[Digests 9th Annual Conf. Magnetics Japan, p. 301,
1982].
[7] M. Young, The Technical Writer’s Handbook. Mill
Valley, CA: University Science, 1989.

Weitere Àhnliche Inhalte

Was ist angesagt?

Distributed Hash Table
Distributed Hash TableDistributed Hash Table
Distributed Hash Tableravindra.devagiri
 
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET Journal
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksIJERA Editor
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsijcisjournal
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches forijcsa
 
Tapestry
TapestryTapestry
TapestrySutha31
 
A network behavior analysis method to detect this writes about a method to ...
A network behavior analysis method to detect   this writes about a method to ...A network behavior analysis method to detect   this writes about a method to ...
A network behavior analysis method to detect this writes about a method to ...Thang Nguyen
 
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSPROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSZac Darcy
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSKathirvel Ayyaswamy
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
Genetic Algorithm Based Cryptographic Approach using  Karnatic  MusicGenetic Algorithm Based Cryptographic Approach using  Karnatic  Music
Genetic Algorithm Based Cryptographic Approach using Karnatic MusicIRJET Journal
 

Was ist angesagt? (20)

call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Distributed Hash Table
Distributed Hash TableDistributed Hash Table
Distributed Hash Table
 
Ab26180184
Ab26180184Ab26180184
Ab26180184
 
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor Networks
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systems
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Nd
NdNd
Nd
 
560 229-237
560 229-237560 229-237
560 229-237
 
Tapestry
TapestryTapestry
Tapestry
 
A network behavior analysis method to detect this writes about a method to ...
A network behavior analysis method to detect   this writes about a method to ...A network behavior analysis method to detect   this writes about a method to ...
A network behavior analysis method to detect this writes about a method to ...
 
new-Modified
new-Modifiednew-Modified
new-Modified
 
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSPROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
Genetic Algorithm Based Cryptographic Approach using  Karnatic  MusicGenetic Algorithm Based Cryptographic Approach using  Karnatic  Music
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Unit 4
Unit 4Unit 4
Unit 4
 

Ähnlich wie IRJET- Estimating Various DHT Protocols

Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...journalBEEI
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE IJERA Editor
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSCOMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSijp2p
 
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET Journal
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallseSAT Journals
 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallseSAT Publishing House
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2hanums1
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compahanums1
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionCentrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
 
Disadvantages Of Robotium
Disadvantages Of RobotiumDisadvantages Of Robotium
Disadvantages Of RobotiumSusan Tullis
 

Ähnlich wie IRJET- Estimating Various DHT Protocols (20)

Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSCOMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewalls
 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewalls
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compa
 
42 46
42 4642 46
42 46
 
42 46
42 4642 46
42 46
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
ewsn09
ewsn09ewsn09
ewsn09
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionCentrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
 
Disadvantages Of Robotium
Disadvantages Of RobotiumDisadvantages Of Robotium
Disadvantages Of Robotium
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

KĂŒrzlich hochgeladen

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon âœĄïž9711147426✹Call In girls Gurgaon Sector 51 escort service
Gurgaon âœĄïž9711147426✹Call In girls Gurgaon Sector 51 escort serviceGurgaon âœĄïž9711147426✹Call In girls Gurgaon Sector 51 escort service
Gurgaon âœĄïž9711147426✹Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 

KĂŒrzlich hochgeladen (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Gurgaon âœĄïž9711147426✹Call In girls Gurgaon Sector 51 escort service
Gurgaon âœĄïž9711147426✹Call In girls Gurgaon Sector 51 escort serviceGurgaon âœĄïž9711147426✹Call In girls Gurgaon Sector 51 escort service
Gurgaon âœĄïž9711147426✹Call In girls Gurgaon Sector 51 escort service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 

IRJET- Estimating Various DHT Protocols

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 38 Estimating various DHT protocols Vishal Wadhwani1, Nayan Jain2 1,2B.E.:Computer Engineering Dept., VESIT, Mumbai, India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - This project involves the use of Peer-to-Peer networks to facilitate premium digital content streaming. Clients seeking this service will not have to rely upon a third party to ensure the safety of the data. Our system mitigates the common problems associated with centralized systems such as trust issues, data failures, outages and traditional security concerns. Unlike the non-standard encryption in centralized systems, we use client-side encryption to ensure data privacy against the nodes storing the data. Data availability is a major concern associated with the Peer-to- Peer networks. We seek to solve this problem with a verification system proposed by Storj[1] which involves a challenge-response protocol. We further propose a model for distributing and accessing the data referencing the BitTorrent ‘Distributed Sloppy Hash Table’ protocol[4] based upon the Kademlia protocol[2]. Each node in our network is a valid Ethereum address. To implement the above-stated project we had to compare the below three protocols. Keywords—Distributed hash table, Tapestry, Chord, Kademlia. 1. INTRODUCTION Distributed hash table protocols might look identical in some aspects such as node forward lookups, but they have their share of discrepancies in terms of the amount of state they possess, search for low latency routes, selecting between alternatives for parameters like frequency, etc. Instead of the traditional approach of comparing DHT's with focus on hop-count latency, or routing size table we are assessing the protocols in the face of joining and leaving protocols. It will make it simple to examine tradeoffs between state maintenance detriments and lookup performance. In this paper, we will be analysing three Distributed Hash Table protocols namely, Kademlia, Tapestry and Chord as they exhibit a wide variety of design choices for Distributed Hash Table protocols. The illustration of inter-node latencies has been realised using a simple simulator called King method. The King method overlooks the effects of congestion. Using lookup operations and churn we distinguish the performance of the protocols. We examine these protocols under varying settings of the parameters and come up to a conclusion that the protocols can have similar or different performance depending on the parameters. In our framework, we are comparing different cost and performance measures. Instead of conventional cost measures of CPU time or memory we are using the number of bytes of the message sent. For performance, we are using lookup latency as the performance metric in place of success rate or hop-count. We penalise or award toward the cost of the framework depending upon the efficacy of the routes taken by the protocol. We have delineated the model to highlight the discrepancies solely based upon our choice of parameters. We assess each DHT over a range of parameter values, planning a performance envelope from which we can extrapolate an optimal cost- performance tradeoff curve. 2. Protocol Overview In this paper, we estimate the performance of three Distributed Hash Table protocol(Tapestry, Chord, and Kademlia) using the mentioned framework. In this section, we try to present a concise summary of each of the above- mentioned DHT and discern the tunable parameters.e. Tapestry is a peer-to-peer overlay network which provides a distributed hash table, routing, and multicasting infrastructure for distributed applications. Tapestry has a large identifier space. This identifier space is produced using the SHA-1 algorithm. This is a 160-bit identifier space represented by 40 digit hex key. In this large identifier space, each node is assigned an unique node id. NodeIDs and GUIDs are roughly evenly distributed in the overlay network with each node storing several different IDs. Multiple applications sharing the same overlay network increases efficiency as tapestry’s efficiency increases with network size. To locate a piece of data in the P2P system we use Chord where every node, where data is stored, is mapped to a key in a distributed system in a scalable manner. Using SHA1 Cryptographic Hash Algorithm chord uses uniform hashing to map every node and data to an m bit identifier. The address of both the node and data item is the SHA1 of IP in the case of node and content in the case of the data item. Considering identifiers are arranged in a circular manner and every data item is mapped to a node whose id is equal to data item's id. Every node stores A.Tapestry B. Chord
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 39 routing information about nodes 1, 2, 4, 8 ... hops away. This information is stored in the finger table. On receiving a key to lookup, a node reroutes it to another node close to the key's id. Stabilization protocol keeps the finger table correct in case of failure. Successor list contains information about r next successors in the circle. On failure of a node, it will be replaced with the next live node in its successor table. C. Kademlia One of the most popular peer-to-peer (P2P) architecture in use today is Kademlia. Kademlia has many advantages over other DHTs. These advantages make it a more preferable choice over other DHTs. These advantages include: It minimizes the number of inter-node introduction messages. Configuration knowledge such as nodes on the network and neighbouring nodes spread automatically as a result of key lookups. Nodes in Kademlia are aware of different nodes. This enables routing queries through low latency paths. Kademlia avoids timeout delays from failed nodes using parallel and asynchronous queries. Kademlia is immune to some DOS attacks. To give a simplified version of Kademlia we can delineate it as a binary tree where the leaves represent the nodes. In this tree, by tracing the bit value of the edges of the node we can find the participating key. Over this, the Kademlia protocol ensures that every node knows at least one node in each of its subtrees if that subtree contains a node. The closeness of keys x and y are taken by computing the XOR value of the two keys. Kademlia converges to the lookup target in many steps by finding the successively closer nodes to the desired ID. Using a replication parameter Kademlia specifies the number of nodes on which a data should be replicated. Routing table and network information of a node are stored at the node state and at each remaining node the routing table containing contacts of other DHT nodes is stored. This routing table is made up of 160 buckets with each bucket storing k contacts at different distances away from the node for some notion of distance. Kademlia has four RPCs: PING, STORE, FIND_NODE and FIND_VALUE. The PING remote procedure call examines a node to see if it’s online. The STORE remote procedure call directs a node to store a [key, value] pair for later retrieval. The FIND_NODE remote procedure call takes a 160-bit key as an argument, the recipient of the FIND_NODE remote procedure call returns knowledge for the k nodes nearest to the target id. The FIND_VALUE remote procedure call behaves like FIND_NODE returning the k nodes nearest to the target Identifier with one anomaly – on accepting a STORE key, the remote procedure call just returns the stored value. 3. Evaluation The DHTs have been implemented in P2PSIM, a discrete- event packet-level simulator. The simulated network consists of 1,024 nodes with inter-node latencies derived from measuring the pairwise latencies of 1,024 DNS servers using the King method. The round-trip delay is 152 milliseconds. The simulator does not simulate link transmission rate or queuing delay. Only key lookup is involved. Nodes issue lookups for random keys at interims exponentially diffused with a mean of ten minutes and nodes crash and rejoin at exponentially diffused intervals with a mean of one hour. This choice of mean session time is uniform with past studies, while the lookup rate guarantees that nodes perform numerous lookups per session. All experiments run for a duration of six hours with nodes keeping their IP address and ID for the time span of the experiment. A. Protocol Comparison A protocol has numerous parameters that influence its cost and performance. There is no single reliable aggregate of parameter values. Instead, there is a set of best possible cost-performance sequences: for each given cost, there is a least feasible latency, and for each latency, there is a least feasible cost. B. Parameter Exploration The first question to be answered is what parameters do we choose who have relative importance on the performance tradeoff for a single protocol and whether similar parameters have a similar effect on the performance of different protocols. Because of the interaction between parameters, the question is quite complex to be answered easily. After careful examination, we have chosen the below parameters for each of our protocols. Tapestry: Base (2 – 128), Stabilization interval (36 sec – 19 min), Number of backup nodes (1–4), Number of nodes contacted during repair (1 – 20). Chord: Number of successors (4 – 32), Finger base (2 – 128), Finger stabilization interval (40 sec – 19 min), Successor stabilization interval (4 sec – 19 min). Kademlia: Nodes per entry (4, 8, 16, 32), Parallel lookups (1 – 10), Stabilization interval (20 min – 1 hour). Keeping the above parameters in consideration we then plot the average lookup latency to average live bandwidth. To separate the influence of a single parameter, we calculate the convex hull segment for every value of a
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 40 parameter while varying all the other parameter values. This helps in tracing the full convex hull. Chord: In Chord finger and successors are stabilised separately. By our observation faster rates result in wasted bandwidth while slower rates result in a greater number of timeouts during lookups. The finger stabilization interval is independent of success rate in term of performance so its value must be varied to achieve the best tradeoff. Faster finger stabilization results in lower lookup latency due to fewer timeouts, but at the at a much higher communication cost. In Chord, there is no particular best base value like in Tapestry. In Chord, there is a more involved join algorithm that samples a larger number of candidate neighbours during PNS. Kademlia: In Kademlia the parameter parallel lookup causes a decrease in latency at higher values but at the cost of more lookup traffic. Our observation also shows that the Kademlia stabilization interval has little impact on latency, but it does increase communication cost. Though it does decrease the number of routing table entries pointing to dead nodes and thus limits the number of timeouts during lookups. However, parallel lookups already assure that these timeouts are not on the critical path for lookups, so their exclusion does not decrease lookup latency Tapestry The latency results in Tapestry are a bit counter-intuitive: every value of base is able to achieve the identical lookup performance, even though a meagerer base results in more hops per lookup on average. This response is due to Tapestry’s contiguity routing. The starting hops in every lookup tend to be to nearby neighbours, and so the time for the lookup becomes overshadowed by the last hop, which is vital to a random node in the network. Therefore, in a protocol with proximity routing, the base can be set to be a small value in order to preserve bandwidth costs due to stabilization. As more and more nodes stabilize, they achieve lower latencies by evading more timeouts on the critical path of a lookup. Although this development comes at the cost of bandwidth, the outcomes show that the cost in bandwidth is peripheral when compared to the savings in lookup latency. Thus, along with setting the base low, we can also frequently stabilise to keep routing table up to date. CONCLUSION In this paper, we present a unified framework for studying the cost versus lookup latency tradeoffs in various DHT protocols and evaluates Tapestry, Chord, and Kademlia in that framework. Under the discussed conditions, these protocols can achieve identical performance if parameters are adequately well-tuned. However, because of the interaction of parameters within a protocol, the cost versus performance tradeoff can be affected, but similar parameters in other protocols, such as base and stabilization interval, can behave conversely. REFERENCES [1] G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references) [2] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73. [3] I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350. [4] K. Elissa, “Title of paper if known,” unpublished. [5] R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in the press. [6] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982]. [7] M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.