A Fault Tolerant Distributed Self Organization in Peer To Peer (P2P) Using Krill Herd Optimization J. Amudhavel Department of CSE, SMVEC Pondicherry, India. info.amudhavel@gmail.com D. Sathian Department of CSE, Pondicherry University, Pondicherry, India. dsathian@gmail.com R.S. Raghav Department of CSE, Pondicherry University, Pondicherry, India. rsraghav@outlook.com L. Pasupathi Department of CSE, SMVEC, Pondicherry, India. mailtopasul@gmail.com R. Baskaran Department of CSE, Anna University, Chennai, India. baaski@annauniv.edu P. Dhavachelvan Department of CSE, Pondicherry University, Pondicherry, India. dhavachelvan@gmail.com ABSTRACT Peer-to-Peer (p2p) is a distributing computer network has the technologies gained popularity mechanisms for the file sharing in the decentralized servers. A p2p network is the self-organization and a distributed control communication. This network is scalable mechanism on which used to find the nodes anywhere in the network without the high routing [18] state. Each node connected in the p2p network [13] the capacity of system increases. But this network has the issues in searching [1] of files in the nodes and the usage of high bandwidth which increased the network traffic. This study presents an optimizing the issues of peer-to-peer network using the effective metaheuristic [6] algorithm called Krill Herd Algorithm which inspires the behavior of Krill Herd [3] proposed by Gandomi and Alavi. Categories and Subject Descriptors C. [Computer Systems Organization ] : C.2 [COMPUTER- COMMUNICATION NETWORKS], C.2.1 [Network Architecture and Design ] General Terms Performance, Design, Standardization, Theory Keywords Krill herd, optimization of peer-to-peer, KH in p2p, issues in p2p, Fault Tolerant Distributed 1. INTRODUCTION In this modern computer world, there is one or more servers provide more services [14]. There are numerous of services like HTTP, FTP, SMTP are provides the requesting file transfer from the server side to client side.In which they are in client-server model there will be the centralized server in which for one server there will be more clients. The expenditure for the installing the server is high and space requirement is also more. To replace this system distribute the impact of services providing among the peers [7] which every nodes acts as both client and server. This form of network is called (p2p).When the server fails to provide the services required file or information is fails to transfer. It was the distributed architecture that work load between peers. P2P has the decentralized server. The link capacity of the peer to peer network is distributed through peers in their network. The machine in the P2P network does not act as a server or coordinator. The machines have the same link capacity in p2p. Peer-to-Peer’s are overlaid on the top of the internet. P2P is easy to install the entire peer has shared all the resource. It was more reliable than the client server network. Failure of one system doesn’t affect the others. The Client server node requires a copious link capacity to feed clients, but P2P pools the each resource of peer in common good health. No need of expensive servers because each system acts as a server for other nodes. The major advantage of the P2P network is that each node is connected to the network the total capacity of the system increases. DDoS (Distribute Denial of Service) attack can occur that intended to parallize the destination network. P2P uses of the malformed IP, forged IP and virus files, etc. Due to the sharing of the resource, computers performance will be slow. Major disadvantage of the peer to peer network is the usage of higher bandwidth. Caching is also the emerging problem of the peer to peer network. By using of the centralized coordinators, easily construct of the peer to peer file sharing [5] network. Resource locations in the P2P network are based on the Distributed Hash tables [19] (DHT). The three protocols in p2p network are Chord, Pastry and Kademlia these are widely used in the modern P2P networks. DHT is a hash table processing [20] key-value lookup functionality. Peer to peer platforms provides facilitates funding via direct contracts between lenders and borrowers. Using of peer to peer finance platforms has an extraordinary growth since 2005. Wellesley & Co, Market Invoice, Funding circle, Thincats.com. Lend Invest are the leading Peer to Peer Finance Association (P2PFA) members. 1.1 Motivation The searching processes in the p2p network are not efficient as of the other searching techniques. The searching algorithm in the p2p network is not optimized. Thus many searching algorithms are used in the p2p network now-a-days. Thus many algorithms are used in the unstructured peer to peer network. Many p2p applications are used of this most unstructured p2p networks. The approaches of Gnutella and Napster search are used in the structured p2p network. Blind Search methods and Informed Search methods are used on p2p network for the searching techniques. While these are uses the old algorithm methods which was not efficient for searching the terms. There are also other methods called GUESS, random walks, modified-BFS, Intelligent BFS, DRLP which are the methods are doesn’t need of the user Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org . ICARCSET '15, March 06 - 07, 2015, Unnao, India Copyright 2015 ACM 978-1- 4503-3441-9/15/03…$15.00 http://dx.doi.org/10.1145/2743065.2743088