The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development and wide application of information technologies, enterprise network security is particularly important. IEEE802.1x standard is now widely used in the industry for a secure access technologies, this article on 802.1X agreed principles and certification process for analysis and presentations, and combined with access to Symantec's security technology, fast, secure and reliable...
We study a natural and potentially devastating attack against BitTorrent, namely, attacking the initial seed in a torrent's early stages. The goal of this attack is to diminish the seed's ability to upload blocks. If the attacker can discover and react quickly enough to the new torrent, it can possibly "nip the torrent in its bud," preventing all of the leechers from obtaining the entire...
BitTorrent is the most successful open Internet application for content distribution. Despite its importance, both in terms of its footprint in the Internet and the influence it has on emerging P2P applications, the BitTorrent Ecosystem is only partially understood. We seek to provide a nearly complete picture of the entire public BitTorrent Ecosystem. To this end, we crawl five of the most popular...
Peer Exchange (PEX), in which peers directly exchange with each other lists of active peers in the torrent, has been widely implemented in modern BitTorrent clients for decentralized peer discovery. However, there is little knowledge about the behavior of PEX in operational systems. In this paper, we perform both passive measurements and Planetlab experiments to study the impact and properties of...
The available P2P streaming protocols are not compatible with each other for real-time video-on-demand (VOD) applications. As a result, they are not suitable for business usage on large-scale networks. In contrast, the BT protocol, which is a strictly-defined file sharing protocol, performs very well in data transferring and is supported by a large number of P2P file sharing systems. In this paper,...
In this paper, BGP-Update based monitoring method is proposed to effectively alleviate bandwidth tension and link congestion, and eventually resolve the problem of update message flooding when routing anomalies. Such monitoring method tracks routings and dynamically displays the alternations of selected routings and its updating quantities by analyzing collected BGP-Update messages. With the help...
Aiming at the present situation of rapid manufacturing (RM) and demands of whole manufacture industry in China, the paper presents the rapid response service system for RM enterprises. It provides basic frame of manufacturing service which integrate RM enterprises in the area and united cooperative service. First, establish integrated thought of manufacture service for RM enterprises and try to put...
The goal of this paper is to provide a easy way for manipulating 3D graphical object in remote education system. We describe a remote collaborative framework running in an augmented reality environment. It provides a nature operation interface for manipulating graphics object in the Web browser or applications from different locations. A Jabber like protocol is designed to translate geometry information...
In DHT-based P2P systems, the technique of "virtual server" is widely used to achieve load balance. To efficiently handle the workload skewness , "virtual servers" are allowed to migrate between nodes. Among existing migration-based load balancing strategies, there are two main categories: (I) rendezvous directory strategy (RDS) and (2) independent searching strategy (ISS). However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.