期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2017
卷号:5
期号:7
页码:13294
DOI:10.15680/IJIRCCE.2017.0507059
出版社:S&S Publications
摘要:Distributed hash tables (DHTs) is an extremely attractive study theme during the part of P2Pnetworks; such networks be fetching especially admired in functions similar to file sharing. The idea of theDistributed Hash Table is given that the technique to explore the resources (especially files) within a P2P network.A DHT protocol usually affords a solitary task to the P2P function: afford a key and find out the node (or maybe nodes) which is responsible for such key. Each and every one function (such as really recover the resource orstoring the resource on the node afford for it) is offered by superior levels of the P2P function. In such article ourobjective is to discover the security measures and determine them on accessible routing procedures of suchnetworks. The Chord (a DHT protocol) is selected as the objective approach for a variety of reasons it resolve beenclosed in this paper. It aims to improving data availability and increasing reliability in chord secure servicediscovery on peer to peer networks.
关键词:routing protocol; peer to peer networks; distributed hash table