Open Access Open Access  Restricted Access Subscription or Fee Access

Enhancing Peer to Peer Performance Using Sandwich Methodology

M. Sadish Sendil, Dr. N. Nagarajan


Peer-to-Peer (P2P) system has become one of the hottest research topics, its excellent characteristics of fully decentralized control and self-organizing make it attractive for some particular applications. Routing algorithm has great influence in P2P applications. Current routing algorithm concentrates on creating well organized network architecture to improve the routing performance. However, for each routing procedure, system returns location information of the requested file only and the characteristics of system workload are considered. Routing performance is critical for P2P networks to achieve high performance. Using sandwich method, the HDHTR and SDHTR are combined based on the following criteria: 1. creating a P2P ring where routing tasks are first executed in lower level ring before they go to higher level thus reducing routing overhead. 2. A super node based routing algorithm which reduce the average routing latency and cost. Hence it reduces the routing overhead and average routing latency, which thereby reduce the traffic.


Peer to Peer, Dynamic Hash Table, Hierarchical DHT Routing, Super Node DHT Routing.

Full Text:



Zhiyong Xu,, “HIERAS: A DHT Based Hierarchical P2P Routing Algorithm”, IEEE International Conference on Parallel Processing, 2003, 0190-3918/03, pp. 1- 8.

Zhiyong Xu,, “SBARC: A Supernode Based Peer-to-Peer File Sharing System”, IEEE International Symposium on Computers and Communication, 2003, 1530-1346/03, pp 1-6.

Ohzahata. S,, "A Traffic Identification Method and Evaluations for a Pure P2P Application", Lecture Notes in Computer Science, 2005, p 55 Vol. 3431.

Yunfei ZHANG,, “Recent Advances in Research on P2P Networks”, Proceedings of Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), 2006, 0-7695-2736-1/06.

Marcell Perényi,, “Identification and Analysis of Peer-to-Peer Traffic”, Journal of Communications, 2006, Vol. 1, No. 7, November / December.

Li Jun,, “Active P2P Traffic Identification Technique”, Proceedings of IEEE Computational Intelligence and Security, 2007, 0-7695-3072-9/07.

R. Mohamed,, “A Review of Peer-to-Peer Systems”, Proceedings of the International Conference on Electrical Engineering and Informatics, 2007, pp. 1094 - 1099

M. Sadish Sendil,, “An Optimized Method for Analyzing the Peer to Peer Traffic”, European Journal of Scientific Research, 2009, Vol.34 No.4, pp 535-541.

M. Sadish Sendil,, “An Informative Study on Peer to Peer across Networks”, IEEE International Advance Computing Conference (IACC09), 2009, Patiala, India.

Antonio Nogueira,, “Towards the On-line Identification of Peer-to-peer Flow Patterns”, Journal of Networks, 2009, vol. 4, No. 2.

Satoshi Ohzahata,, “A Measurement Study on Peer Behaviors for a Pure P2P Network”, International Conference on Advanced Information Networking and Applications, 2009, pp. 241 -248.

M. Sadish Sendil,, “Analyzing the Peer to Peer Traffic Aggregation Using an Optimized Method”, Journal of Computer Science, 2009, vol. 5 (10), pp.738-744.

M. Sadish Sendil,, “Analyzing the P2P Traffic Using Probability Schemes”, International Journal of Computer Science and Information Technology, 2010, Vol.2 No.1. PP 85 – 94.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.