Skip to main content
Log in

Effective Communication in P2P Network by Introducing GOSIP–PHE Algorithms

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In more recent years peer-to-peer systems are becoming more popular in the area of research because of possessing a number of challenging issues. The entire P2P research can be divided into four areas: search, storage, security and sharing. In various circumstances, the P2P network makes sense in effective communication. The P2P networking increases the QOS, in terms of communication speed, delay, data success rate and less data loss and so on. Due to its open nature system, it deployed hugely in the area of transferring large files and it easily exposes them to the malicious activities. The election of malicious or compromised peer as a peer head is one of the most significant breaches in peer-to-peer networks. In light of these issues, we focus the improvement of P2P network performance by following the given mechanisms. Mechanism 1: topology construction based on grouping of similar interest peer (GOSIP). Mechanism 2: electing the peer-heads for each GOSIP, based on the trust-threshold value given by each peers about their neighbor peers and considering the MAC address of the top listed peers in each group. In this paper, the P2P functionality is improved in such a way that the number of request is reduced and the neighborhood peers communication is improved by finding optimized neighbor using GOSIP algorithm. We have taken these mechanisms into the test-bed through simulation. The simulations outcomes flashed out clearly that these methods significantly improve 25 % of network Scalability and 50 % of throughputs, in turn improvise the performance of P2P networks efficiently when compared to the existing methodologies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Ahmed, M., et al. (2007). A dynamic approach for the selection of super peers in ad hoc networks. In Proceedings of the sixth international conference on networking (ICN’07), IEEE.

  2. Clarke, I. (2001). Freenet: A distributed anonymous information storage and retrieval system. http://freenetproject.org/cgi-bin/twiki/view/Main/ICSI

  3. David, R., et al. (2004). Simple efficient load balancing algorithms for peer-to-peer systems. In SPAA ’04.

  4. Eunyoung, K., & Ungmo, K. (2007). Connection-degree based search and replication in mobile unstructured peer-to-peer networks. In Proceedings of the 2007 international conference on convergence information technology (pp. 919–924).

  5. Gnutella. (2001). Gnutella protocol specification v0.4. http://www.clip2.com/GnutellaProtocol04.pdf

  6. He, Q., et al. (2013). A decentralized service discovery approach on peer-to-peer network. IEEE Transactions on Services Computing, 6(1), 64–75.

    Article  Google Scholar 

  7. ICOIN. (2008, January 23–25). International conference on information networking.

  8. Jung, S. H., et al. (2008). Mobile peer-to-peer systems using super peers for mobile environments.

  9. Khalid, E., et al. (2013). RobP2P: A robust architecture for resource sharing in mobile peer-to-peer networks. Procedia Computer Science, 19, 356–363.

    Article  Google Scholar 

  10. Kwong, K. W., & Tsang, D. H. K. (2008). Building heterogeneous peer-to-peer networks: Protocol and analysis. IEEE/ACM Transactions on Networking, 16, 281.

    Article  Google Scholar 

  11. Ledlie, J., et al. (2002). Scaling filename queries in a large-scale distributed file system. Research report TR-03-02, Harvard University, January 2002.

  12. Li, X., et al. (2005). Dynamic layer management in superpeer architectures. IEEE Transactions on Parallel and Distributed Systems, 16(11), 1078–1091.

    Article  Google Scholar 

  13. Mekouar, L., et al. (2006). Peer-to-peer’s most wanted: Malicious peers. International Computer Networks Journal, 50(4), 545–562.

    Article  MATH  Google Scholar 

  14. Pawel, G., et al. (2007). Optimizing peer relationships in a super-peer network. In IEEE transactions on distributed computing system (p. 31), 25–27 June 2007.

  15. Proceedings of the sixteenth annual ACM symposium on parallelism in algorithms and architectures (pp. 36–43). New York, NY.

  16. Rajesh, S. & Anwitaman, D. (2012). SuperNova: Super-peers based architecture for decentralized online social networks, IEEE.

  17. Saroiu, S., et al. (2002, January). A measurement study of peer-to-peer file sharing systems. In Proceedings of the multimedia computing and networking (MMCN), San Jose, CA.

  18. Singla, A., & Rohrs, C. (2002, November). Ultrapeers: another step towards gnutella scalability.

  19. Stoica, I., et al. (2001, August). A scalable peer-to-peer lookup service for internet applications. In Proceedings of the ACM SIGCOMM ’01 conference.

  20. Xiaosong, L., & Kai, H. (2008). Proactive content poisoning to prevent collusive piracy in P2P file sharing. IEEE Transactions on Computers TC -2007-09-0492R2. Revised April 8, 2008.

  21. Xiang, Y. H., et al. (2010). The resource discovery algorithm based on super-peer in mobile peer-to-peer network. Journal of Chinese Computer Systems, 31(10), 31.

    Google Scholar 

  22. http://gnutella.wego.com

  23. http://www.kazaa.com

  24. http://www.napster.com

  25. http://www.suprnova.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Venkadeshan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Venkadeshan, R., Chandrasekar, M. Effective Communication in P2P Network by Introducing GOSIP–PHE Algorithms. Wireless Pers Commun 87, 923–937 (2016). https://doi.org/10.1007/s11277-015-2625-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2625-6

Keywords

Navigation