The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Small playback lag in live streaming is important for time-critical and interactive applications such as live stock, market updates, sports and remote education. In this paper, we present Elite addresses the playback lag problem in peer-assisted live streaming systems. Instead of deploying a large initial offset to all the users, Elite seeks the possibility of initializing users with layered proportional...
Distributed storage systems (DSS) play an important role in data storage applications, since they provide high reliability for huge data storage requirement. As node failures are frequent in a large distributed storage system, the performance of repairing node failure causes many researchers' interests. In this paper, we propose a distributed storage code to minimize the coding complexity during the...
Incentive protocols are crucial for enhancing contribution and cooperation among nodes in P2P networks. In this paper, we consider an analytical framework wherein peers learn the gains of different strategies and evolve adaptively towards the better performance strategy. While a unitary incentive policy in the system may exhibit its incentive capability on itself, the competition among different incentive...
This paper analysis the current situation of instant messaging (IM) server and introduces network's load balancing which can satisfied the situation of high-capacity and concurrency. Then it summarizes some useful technologies applied in server-side, such as completion port programming, EPOLL, thread-pool and P2P, and further brings forward some prospects.
It has been well known that network coding can achieve better network throughput in certain topologies by allowing coding at intermediate nodes. However, the benefit of network coding in P2P content distribution is controversial in recent literatures. In this paper, we seek to investigate how network coding performs in a BitTorrent-like protocol from a practical perspective. To validate the benefit...
We consider the energy-efficient network resource allocation that minimizes a cost function of average user powers for multi-hop wireless networks. A class of fair cost functions is derived to balance the tradeoff between efficiency and fairness in energy-efficient designs. Based on such cost functions, optimal routing, scheduling and power control schemes are developed. Relying on stochastic optimization...
In order to improve transmission throughput of a multi-hop wireless network, many efforts have been made in recent years to reduce traffic and hence transmission collisions by constructing backbone networks with minimum size. However, many other important issues need to be considered. Instead of simply minimizing the number of backbone nodes or supporting some isolated network features, in this work,...
In recent years, we have seen a surge of interest in enabling communications over meshed wireless networks. Particularly, supporting peer-to-peer communications over a multi-hop wireless network has a big potential in enabling ubiquitous computing. However, many wireless nodes have limited capabilities, for example, sensor nodes or small handheld devices. Also, the end-to-end capacity and delay degrade...
Multiple-input and multiple-output (MIMO) technique is considered as one of the most promising emerging wireless technologies that can significantly improve transmission capacity and reliability in wireless mesh networks. While MIMO has been widely studied for single link transmission scenarios in physical layer as well as from MAC perspective, its impact on network layer, especially its interaction...
Distributed storage systems provide large-scale reliable data storage by storing a certain degree of redundancy in a decentralized fashion on a group of storage nodes. To recover from data losses due to the instability of these nodes, whenever a node leaves the system, additional redundancy should be regenerated to compensate such losses. In this context, the general objective is to minimize the volume...
Multiple-input and multiple-output (MIMO) technique is considered as one of the most promising wireless technologies that can significantly improve transmission capacity and reliability. Many emerging mobile wireless applications require peer-to-peer transmissions over an ad hoc network, where the nodes often have different number of antennas, and the channel condition and network topology vary over...
The traditional discovery methods of semantic Web service are based on centralized registry, such as UDDI (universal description, discovery and integration). But they might lead to single point of failure and bottleneck. In this paper, we propose an efficient algorithm to publish and discover semantic Web services in DHT (distributed hash table) based on decentralized systems. The algorithm is primarily...
Distributed storage systems, built on peer-to-peer networks, can provide large-scale data storage and high data reliability by redundant schemes, such as replica, erasure codes and linear network coding. Redundant data may get lost due to the instability of distributed systems, such as permanent node departures, hardware failures, and accidental deletions. In order to maintain data availability, it...
The Sybil attack is one of the serious attacks to vehicular ad hoc networks (VANETs), because it severely damages the security of VANETs and, even leads to a threat to lives of drivers and passengers. In this paper, we propose a solution to detect the Sybil attack based on the differences between the normal motion trajectories of vehicles and the abnormal ones. In our approach, each node can accomplish...
P2P Live media streaming is becoming popular in the Internet. There still remain some neglected problems such as playback lag, which is extremely sensitive for users in some urgent and interactive scenarios. In addition, many current studies were based on theoretical assumptions and never be turned into reality. In this paper, we present SonicStream, a full implementation of live P2P media streaming...
Video-on-demand (VoD) service has been greatly enhanced with the maturation of both peer-to-peer (P2P) and network coding (NC) technology. Digital video cassette recording (VCR) function provides users with more freedom that they can choose different playback modes while viewing video clips. Besides, users are able to switch between different scenes with the support of video-segmentation. Based on...
Peer-to-peer applications require high cooperation among users. User cooperation consists of two aspects, upload and download operations. However, not all users are willing to cooperate, and free-riders with little upload bandwidth are widely seen in the applications. Hereby, we put forward the relation between data block probability and the node distance in static situations. Then we discuss the...
Nowadays, the real practice of network coding in wireline networks is focused on the P2P overlay networks. Although it can help to utilize network resources more efficiently, P2P network coding does not exhibit benefits in terms of the maximum throughput. Our work aims to implement network coding at the IP layer, which is an idea not fundamentally new, but with little real practice because of the...
We present an approach that takes advantage of multi-packet reception (MPR) to reduce the negative effects of multiple access interference and therefore increase the capacity of an ad hoc network. We analyze the performance upper bound of joint routing and scheduling for ad hoc networks that embrace interference by using MPR. We formulate the optimization problem under a deterministic model and seek...
VCR functionality is difficult to be implemented in a P2P VoD system, since it may give more server workload and fails some distribution paths. In this paper, we first analyze the user behavior of VCR interaction, and propose a video segmentation-aided P2P VoD System with VCR functionality. The simulation results show that our mechanism could reduce the server workload and improve the VCR performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.