The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present an interactive view-dependent technique for streaming progressively encoded 3D models over lossy networks. The 3D model data is represented and encoded with progressive octree particles. TCP/IP protocol assures reliable transmission but does not well suit to real-time interactive graphics streaming over lossy networks with limited bandwidth. Though being unreliable, UDP provides...
Nowadays, BitTorrent packets constitutes a large part of peer-to-peer application traffic on the Internet. Due to increasing size of BitTorrent traffic, it becomes inevitable to take into account the effects of it in network management. Generally, studies relevant with Bittorrent traffic measurement have performed analysis with packets transmitted via IPv4 protocol. However, provided many facilities...
Data replication is an indispensable service for mobile ad hoc networks and it helps to increase data availability, reduce communication overhead, achieve fault-tolerance and load balancing. Our scalable and reactive data replication framework SCALAR operates in a peer-to-peer manner where the network nodes construct a connected dominating set based on the topology graph, and use that virtual backbone...
Efficient key management is an indispensable element for supporting security in ad hoc networks. However, several key pre-distribution approaches based on a trusted third party have limitations caused by their centralized principles. Distributed key selection mechanisms are offered to deal with the limitations of the centralized counterparts in ad hoc networks. In this study, we consider distributed...
Data replication protocols proposed for MANETs are often prone to the scalability problems due to their definitions or underlying routing protocols they are based on. In particular, they exhibit poor performance when the network size is scaled up. However,scalability is an important criterion for several MANET applications. We propose a scalable and reactive data replication approach, named SCALAR,...
Analyzing the behavior of epidemic spreading in a network is a good way of modeling several network phenomena. There are several studies analyzing the spreading of email viruses. Spreading of epidemics is also a good model for several types of information dissemination in distributed systems. In this study, we examine spreading of epidemics for anti-entropy algorithms in a peer-to-peer network with...
An efficient data replication service is crucial for improving data accessability and resource utilization as well as providing consistency in mobile ad hoc systems. In this study, we investigate the applicability of eigenvector centrality (EVC) principle as an aid to determine replica nodes for data items in mobile ad hoc networks. There exist several studies for mathematical modeling of networks...
Key establishment has a significant role in providing secure infrastructure for ad hoc networks. For this purpose, several key pre-distribution schemes have been proposed, but majority of the existing schemes rely on a trusted third party which causes a constraint in ad hoc platforms. We propose a seed-based distributed key selection algorithm, namely SeeDKS, for groups of nodes in ad hoc networks...
We consider buffer management problem in support of large-scale bio-inspired peer-to-peer data dissemination services. Bio-inspired epidemic protocols have considerable benefits as they are robust against network failures, scalable and provide probabilistic reliability guarantees. Coupled with an efficient buffering mechanism, system wide buffer usage can be optimized while providing reliability and...
We present a novel protocol EraMobile (epidemic-based reliable and adaptive multicast for mobile ad hoc networks) and its performance analysis. EraMobile's target is group applications requiring high-level of reliability and the protocol aims to provide fully reliable multicast data delivery with minimal network overhead even in the adverse network conditions. EraMobile utilizes an epidemic-based...
In reliable group communication, epidemic or probabilistic protocols gained popularity due to their scalability to large number of peers and robustness against network failures. Reliability properties of these protocols are ensured via probabilistic guarantees. A key issue to consider when offering reliability is the buffer space used by individual peers of the group. Our aim is to optimize the buffer...
We propose an efficient cooperative content distribution protocol in which the cooperation among participants is based on a peer-to-peer (P2P) paradigm. Our main contribution to P2P content distribution is the use of an epidemic communication approach. Since epidemic algorithms are easy to use, robust and adaptive to dynamic conditions, they have found several application areas in distributed systems...
A new peer-to-peer architecture for multipoint video conferencing is presented. It targets end points with low bandwidth network connections (single video in and out), allowing them to create a multipoint conference without any additional networking and computing resources than what is needed for a point-to-point conference. The new architecture is based on use of layered video coding with two layers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.