4
International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 Volume 6, No. 5, May 2017 Impact Factor: 5.913 www.irjcjournals.org 1 A Review on P2P Contents Sharing in MANET Vijay Kumar, Assistant Professor, Department of Computer Science, Central University of Haryana Er. Bhupinder Kumar, Department of Computer Engineering, Guru Kashi University, Tawandi Sabo Bathinda, Punjab ABSTRACT A distributed hash table (DHT) is a class of a decentralized distributed system that provides a lookup service similar to a hash table: (key, value) pairs are stored in a DHT, and any participating node can efficiently retrieve the value associated with a given key. Responsibility for maintaining the mapping from keys to values is distributed among the nodes, in such a way that a change in the set of participants causes a minimal amount of disruption. This allows a DHT to scale to extremely large numbers of nodes and to handle continual node arrivals, departures, and failures. This P2P Contents Sharing in MANET handles the contents being shared from one node to other node efficiently. Because it will be comparatively easy to access the route based on hash table. It is fast to update and select the route from route table stored in the hash table. For DHT services OLSR is better protocol uses flood free route discovery for P2P Contents sharing. Keywords DHT, P2P, MANET. INTRODUCTION Peer-to-peer network is a distributed, robust and fault tolerant network for sharing resources such as files, CPU, memory, etc. In a P2P network, peers self-organize themselves in a decentralized way, forming an overlay network at application layer over the underlying physical network. Thus, a link between two logically linked peers in the overlay network may spans multi hops in the physical network. An example of P2P overlay is shown in Fig. 1 . Fig. 1 Peer to Peer [1] In a P2P network, a peer acts as both a server that provides or shares its content with other users/peers; and a client, that accesses the content from other users/peers. To access a content/data item, the requesting peer invokes the lookup phase to locate the source peer that provides the required data item. In the lookup phase, a peer forwards the lookup query to its neighboring peers according to the overlay routing algorithm. Upon receiving the reply for the lookup query, the requesting peer accesses the data item directly from the source peer. To join a P2P network, the node contacts an existing peer of the P2P network. This step is called bootstrapping[1]. After finding the existing peer in the P2P network, the node places itself in the P2P overlay by establishing connection with other peers according to the overlay routing algorithm. On the basis of overlay structure, P2P networks can be roughly classified into unstructured and structured architecture. Each of them has its own applications and advantages. In an unstructured P2P network, a peer establishes and maintains connection with a certain number of other peers chosen randomly, thus a random topology is established among the peers. Each peer in the unstructured P2P network holds its shared data items with itself; therefore, each peer uses flooding mechanism for data discovery in the P2P network.

A Review on P2P Contents Sharing in MANETirjcjournals.org/ijieasr/May2017/1.pdf ·  · 2017-05-31A Review on P2P Contents Sharing in MANET Vijay Kumar, ... tolerant network for sharing

  • Upload
    vankien

  • View
    215

  • Download
    1

Embed Size (px)

Citation preview

International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 Volume 6, No. 5, May 2017

Impact Factor: 5.913 www.irjcjournals.org

1

A Review on P2P Contents Sharing in MANET

Vijay Kumar, Assistant Professor, Department of Computer Science, Central University of Haryana

Er. Bhupinder Kumar, Department of Computer Engineering, Guru Kashi University, Tawandi

Sabo Bathinda, Punjab

ABSTRACT

A distributed hash table (DHT) is a class of a

decentralized distributed system that provides a lookup

service similar to a hash table: (key, value) pairs are

stored in a DHT, and any participating node can

efficiently retrieve the value associated with a given key.

Responsibility for maintaining the mapping from keys to

values is distributed among the nodes, in such a way that a

change in the set of participants causes a minimal amount

of disruption. This allows a DHT to scale to extremely

large numbers of nodes and to handle continual node

arrivals, departures, and failures.

This P2P Contents Sharing in MANET handles the

contents being shared from one node to other node

efficiently. Because it will be comparatively easy to access

the route based on hash table. It is fast to update and

select the route from route table stored in the hash table.

For DHT services OLSR is better protocol uses flood free

route discovery for P2P Contents sharing.

Keywords

DHT, P2P, MANET.

INTRODUCTION

Peer-to-peer network is a distributed, robust and fault

tolerant network for sharing resources such as files, CPU,

memory, etc. In a P2P network, peers self-organize

themselves in a decentralized way, forming an overlay

network at application layer over the underlying physical

network. Thus, a link between two logically linked peers

in the overlay network may spans multi hops in the

physical network. An example of P2P overlay is shown in

Fig. 1 .

Fig. 1 Peer to Peer [1]

In a P2P network, a peer acts as both a server that provides

or shares its content with other users/peers; and a client,

that accesses the content from other users/peers. To access

a content/data item, the requesting peer invokes the lookup

phase to locate the source peer that provides the required

data item. In the lookup phase, a peer forwards the lookup

query to its neighboring peers according to the overlay

routing algorithm. Upon receiving the reply for the lookup

query, the requesting peer accesses the data item directly

from the source peer. To join a P2P network, the node

contacts an existing peer of the P2P network. This step is

called bootstrapping[1]. After finding the existing peer in

the P2P network, the node places itself in the P2P overlay

by establishing connection with other peers according to

the overlay routing algorithm. On the basis of overlay

structure, P2P networks can be roughly classified into

unstructured and structured architecture. Each of them has

its own applications and advantages.

In an unstructured P2P network, a peer establishes and

maintains connection with a certain number of other peers

chosen randomly, thus a random topology is established

among the peers. Each peer in the unstructured P2P

network holds its shared data items with itself; therefore,

each peer uses flooding mechanism for data discovery in

the P2P network.

International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 Volume 6, No. 5, May 2017

Impact Factor: 5.913 www.irjcjournals.org

2

ROUTING PROTOCOLS FOR MANETS

Fig 2. Routing protocol [1]

P2P overlays over MANETs that works at the application

layer for content sharing rely on underlying (network

layer) routing protocol for data communication. Several

routing protocols have been proposed for MANET by

research community. These protocols can be classified

into different categories according to different criteria.

Each of them has its own applications and advantages. By

the manner in which they react to network topology, the

routing protocols can be segregate into reactive and

proactive routing protocols. Reactive routing protocols

find route on demand, i.e., they find the route to a

destination node when the data is to be sent to that

destination node. Reactive protocols have larger delivery

delay and are not efficient for higher traffic load [1] .

Proactive routing protocols periodically update routing

information to all nodes in the network regardless of

whether the data is to be sent or not [1] . Proactive routing

can have unnecessary route discovery producing more

extra traffic overhead. By the role of routing nodes and the

organization of the network, routing protocols of MANET

can be classified into flat protocols and

hierarchical/cluster-based routing protocols. In flat

routing, every node has the same role and the whole

network is considered as a single flat structure, e.g. AODV

[1] .

Flat routing protocols are suitable for small-size network

and their performance degrades as the size of network

grows. In cluster-based routing, the nodes are grouped into

clusters. Each cluster has one node as a cluster-head and

the inter-cluster communication is done through gateway

nodes. By grouping nodes into clusters, only selected

nodes forward the route discovery packets reducing

redundant traffic.

Cluster-based routing protocol scales well as the network’s

size grows. One example of cluster-based routing protocol

is CBRP [1]. Using the geographic positioning

information of nodes, the routing protocols for MANET

can be classified into geographic and non-geographic

routing. Geographic routing utilizes the geographic

location of the nodes through GPS, e.g., GPSR [1] or via

other schemes like in [1] .

The geographic location of nodes is used to confine the

route search space into a smaller estimated range reducing

routing overhead and scales better in terms of per-route

state. Based on using flooding, routing protocols can also

be classified as flooding-based and flooding-free category

[1] .

In flooding-based routing protocol, route is discovered or

maintained by flooding (i.e. broadcasting) the route

discovery message in the network, e.g.OLSR, AODV,

DSDV, ABR, DYMO, CBRP , etc. Flooding-free routing

protocols, are also referred as DHT-based routing,

implement a logical DHT based structure to connect nodes

with respect to their LIDs at the network layer for routing,

thus a logical network is built over the physical network to

eliminate flooding mechanism as described in [1] .

Both routing and forwarding of packets is carried out

based on nodes’ LIDs in the logical network rather than

International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 Volume 6, No. 5, May 2017

Impact Factor: 5.913 www.irjcjournals.org

3

their UID (IP addresses/MAC address). Each node acts as

an anchor node and stores mapping information (LID,

UID) of other nodes in the network. A source node first

retrieves the mapping information of the destination node

from the destination node’s anchor and then sends the data

packet to one of its logical neighbors ( L nbr) having LID

closest to the destination node’s LID.

LITERATURE SURVEY

Nadir Shah (2016) et al: several approaches have been

proposed for Peer-to-peer (P2P) content/file sharing in

mobile ad hoc networks (MANETs). They apprise a

comprehensive survey of researches related to P2P overlay

networks for sharing the content at the application layer in

MANETs. They compare and contemplate the features,

vitality, and vulnerability of these approaches and

highlight indispensable research challenges that are

imperative to address and will have substantial vantages.

The fallout of the analysis would serve as a substantial

guide for anyone willing to delve into research on the

topic of P2P overlay over MANETs [1].

G. Usha (2016) et al: Mobile ad hoc networks (MANETs)

are one of the emerging technologies of wireless

communication, in which each node in the MANET acts

as a router. In an adhoc network, any node can

communicate with any other node in the network.

However, this infrastructure of mobile nodes makes this

system more vulnerable to various types of attacks. A

black hole attack is one such attack in which the packet is

dropped maliciously. They propose a security solution

known as the honeypot-based dynamic anomaly detection

using cross-layer security (HBDADCS). The proposed

technique detects and isolates black hole attacks from the

ad hoc network [2].

TheofilosChrysikos (2016) et al: Wireless Information-

Theoretic Security (WITS) has been suggested as a robust

security scheme, especially for infrastructure-less

networks. Based on the physical layer, WITS considers

quasi-static Rayleigh fading instead of the classic

Gaussian wiretap scenario. In this paper, the key

parameters of WITS are investigated by implementing an

802.11n ad-hoc network in an outdoor obstacle-dense

topology. Measurements performed throughout the

topology allow for a realistic evaluation of a scenario with

multiple moving eavesdroppers. Low speed user

movement has been considered, so that Doppler spread

can be discarded. In addition, the Outage Probability has

been estimated with regard to a non-zero target Secrecy

Rate for both techniques. The results have been compared

with the respective values of WITS key parameters

derived from theoretical analysis[3].

SajalSarkar (2016) et al: In this paper they propose a

game theoretic framework for stochastic multipath routing

in mobile ad hoc networks (MANETs). In a MANET,

intelligent and adaptive attackers may try to hijack, jam or

intercept data packets traveling from source to destination.

At each stage the source node keeps track of the available

multiple paths, the residual bandwidth of the paths and the

strategy of the attackers from the information gathered

during the previous stage. Based on these observations, the

source node selects a path for data communication and

switching strategy among the multiple established paths

between the source node and the destination node.

Performance analysis and numerical results show that our

proposed scheme achieves significant performance gains

in terms of residual bandwidth utilization, average end-to-

end delay, packet delivery ratio, routing overhead and

security[4].

Mohammad Masdari (2017) et al: Mobile ad hoc

networks (MANETs) are vulnerable to various security

attacks conducted by the malicious nodesand attackers. To

defend against the attackers, their public key certificates

should be revoked by certificate authority. Thus, each

MANET node before conducting any secure

communications, should check the status of

communicating parties’ certificates. Inconsistency of the

certificate status information is one of the critical

problems which reduce the correctness and effectiveness

of the whole certificate validation process. They conduct

a Markov-chain based analysis and evaluation of the

OCSP-based certificate validations in the hybrid

MANETs.

PROPOSED WORK

In current research paper they have put up the survey of

peer to peer content sharing in MANET. They have

undertaken various parameters for study. Under the study

they have taken various research papers for concluding

various factors. The factors are P2P overlay construction

with underlying flooding free routing, Network merging

detection and merging process at overlay layer, Network

partitioning for P2P overlay over MANETs, Data

replication, A holistic approach.

In current research work we are taking DHT based routing

for peer to peer content sharing. So that two nodes can

communicating to each other for sharing different

contents. In current research we are using flooding free

routing protocol like OLSR for establishing the route. As

International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 Volume 6, No. 5, May 2017

Impact Factor: 5.913 www.irjcjournals.org

4

according to this research paper no research for P-T-P for

flooding free based routing have been done so far.

CONCLUSION

From the review of the various research papers and other

study material it is clear that DHT based routing protocol

will perform better and fast for flood free routing from

source to the destination. Suitable for P2P contents

sharing. So that contents can be shared between two peer

in decentralized network. One peer will works as server

and other peer will works as client. The OLSR is proactive

category of protocol for peer to per contents sharing.

REFRENCES

[1] Nadir Shah a ,S.A. Abid a , Depei Qian b ,

WaqarMehmood,” A survey of P2P content sharing

in MANETs”, Computers and Electrical

Engineering 57 (2017) 55–68

[2] G. Usha a ,M. Rajesh Babu b , S. Saravana Kumar,”

Dynamic anomaly detection using cross layer

security in MANET”, Computers and Electrical

Engineering 0 0 0 (2016) 1–11

[3] Theofilos Chrysikosa, Konstantinos Birkos a, Tasos

Dagiuklas b, Stavros Kotsopoulos,” Wireless

Information-Theoretic Security: Theoretical

analysis & experimental measurements with

multiple eavesdroppers in an outdoor obstacle-

dense MANET”, 18 November 2016

[4]SajalSarkara,RajaDatta,” A game theoretic

framework for stochastic multipath routing in self-

organized MANETs”, 22 June 2016.

[5] Mohammad Masdari,” Markov chain-based

evaluation of the certificate status validations in

hybrid MANETs”,Journal of Network and

Computer Applications 80 (2017) 79–89

[6] Shah N , Qian D , Wang R . MANET adaptive

structured P2P overlay. Peer-to-Peer NetwAppl

2012;5(2):143–60 .

[7] da Hora DN , Macedo DF , Oliveira LB , Siqueira

IG , Loureiro AA , Nogueira JM , et al. Enhancing

peer-to-peer content discovery techniques over

mobile ad hoc networks. ComputCommun

2009;32(13):1445–59 .

[8] CalommeS , Leduc G . An overlay maintenance

protocol for overlay routing on top of ad hoc

networks. In: International conference on research

in networking. Berlin Heidelberg: Springer; May,

2008. p. 48–59 .

[9] SeddikiM ,Benchaïba M . An adaptive P2P overlay

for MANETs. In: Proceedings of the 2015

International conference on distributed computing

and networking. ACM; January, 2015. p. 24 .

[10] JerbiM ,Senouci SM , Ghamri-Doudane Y , Cherif

M . Vehicular communications networks: current

trends and challenges. IGI Global 2010:251–62.