Implementation of P2P File Sharing Using Bi-directional Chord Protocol Algorithm

  • Vasanthi Vatsavai
  • Sriram Suravarapu
  • Nader F. MirEmail author
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 362)


One of the key components of achieving efficiency when looking up on resources is the success of peer-to-peer (P2P) applications. As the structured P2P is an efficient way to locate resources, our study performs two improvements in a structured P2P resource lookup protocol of Chord-based algorithms which is widely accepted. The proposed improvements in detail are presented using two methods. In the first method, the routing information for accurate search of resource is low. In this method, only clockwise direction of resource lookup can be implemented and a unique algorithm is designed for enhancing the finger table in a Chord. A counter-clockwise finger table is also included for generating resource queries in two direction clock wise and anticlockwise increasing the density of neighboring fingers. The proposed model also employs a new functionality of eliminating excess fingers generated by the inclusion of fingers by the suggested model. The results of simulation on effectiveness of the search in the proposed model against the average lookup hops and average lookup delay are presented. The model of algorithm context is extended as finger table resulting in forwarding-storm of routing maintenance messages.


Peer-to-peer networks P2P Distributed content sharing Distributed systems Internet file sharing 


  1. 1.
    Mir, N.F.: Computer and Communication Networks, 2nd edn. Pearson Prentice Hall, Upper Saddle River (2015). ISBN: 0133814742Google Scholar
  2. 2.
    Peter, B., Tim, W., Bart, D., Piet, D.: A Comparison of Peer-to-Peer Architectures, Broadband Communication Networks Group (IBCN). Department of Information Technology (INTEC), Ghent University, Belgium, pp. 1–2 (2012)Google Scholar
  3. 3.
    Minar, N.: Distributed Systems Topologies: Part 2, O’Reilly Network. (2002)
  4. 4.
    Yang, B.H. & Garcia-Moline (February 2002), Designing a Super-Peer Network, Stanford UniversityGoogle Scholar
  5. 5.
    Shirky, C.: In: Oram, A. (ed.) Listening to Napster, Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly Press, USA (2001)Google Scholar
  6. 6.
    Tyson, J.: Marshall Brain’s HowStuffWorks. How Napster Worked. (2000)
  7. 7.
    Hebrank, M.: Gnutella & Napster. HUH? or What do I need to Know to Keep from Looking Like an Idiot.
  8. 8.
    Turcan, E.: Peer-to-Peer: The Third Generation Internet. (2010)
  9. 9.
    LimeWire: The Gnutella Protocol Specification v0.4, Document Revision 1.2.
  10. 10.
    Kan, G.: In: Oram, A. (ed.) Gnutella, Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly Press, USA (2008)Google Scholar
  11. 11.
    Dimitri, D., Antonio, G., Bill, K.: Analysis of Peer-to-Peer Network Security using Gnutella. (2003)
  12. 12.
    Guilfoyle, J., Lempsink, E.: giFT’s Interface Protocol, Source Forge. (2003)
  13. 13.
    Stoicay, I. et al.: Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications. Transactions on Networking, vol. 11(1) (2003)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Vasanthi Vatsavai
    • 1
  • Sriram Suravarapu
    • 1
  • Nader F. Mir
    • 1
    Email author
  1. 1.Department of Electrical Engineering, Charles W. Davidson College of EngineeringSan Jose State UniversitySan JoseUSA

Personalised recommendations