The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The distributed computing of data is a challenging task in terms of the self-organizing task distribution and computing, especially if distributed computing systems are becoming very large and complex. Therefore, the distributed hash table (DHT)-based P2P system called DuDE has been developed to compute statistics of access nodes of Internet service providers in an efficient way. DuDE exploits the...
For the realization of decentralized communication infrastructures, P2P technology offers an excellent technological foundation to complement or replace existing centralized structures, which take the client-server network model as a basis. In particular, the distributed hash table-based P2P network Kad impresses with high lookup performance, scalability, and resilience against failures and attacks...
Multi-tenant data centers host a high diversity of applications with continuously changing demands. Applications require response times ranging from a few microseconds to seconds. Therefore, network traffic within the data center needs to be managed in order to meet the requested SLAs. Current feedback congestion control protocols may be too slow to converge to a stable state under high congestion...
Providing confidentiality, integrity, and availability is indispensable for secure systems. In particular, almost every commerce application requires that integrity be provided in a secure manner, such that the integrity of data is retained even if the owner of the data is malicious. However, providing secure integrity in mobile environments, where participating nodes and their communication channels...
Grid is collection of heterogeneous resources. The availability and searching the appropriate resources for job execution determine the computing performance of grid. In this paper a model namely `Decentralized P2P Grid Resources Discovery' has been proposed and designed with prototype implementation. This model uses the resources information that is stored in data structure called LC-Trie (Level...
Currently, P2P application accounts for a majority of the network traffic. It is significant to study P2P recognition for network monitoring and management, as well as the improvement of service quality. There are many ways to identify P2P traffic, but it is difficult to identify effectively with only one method. To obtain the optimal classification, different methods should be used comprehensively...
In the last few years, peer-to-peer systems became well known to the general public by allowing fast and simple exchange of resources between users. The complexity of these systems resides in the absence of a central authority and the fact that each user can act both as a client and as a server. Thus, a need for self-regulation arises in order to guarantee that every user contributes to the system...
The application layer multicast for streaming media is one of the hot and difficult problems in the field of network video broadcast. At first, the paper analyzed the principles and performances of classical application layer multicast models suitable for streaming media. Then we pointed out the application occasion of every model and the advantages and disadvantages. At last, a cluster splitting...
OneHop was the first DHT protocol providing the feature which enables DHT to be applied in HLR/HSS that a high fraction of the lookups are solved within only one hop. In this protocol the event in overlay (node joins and leaves) will be disseminated in a hierarchical fashion from slice leader to unit leader and unit leader to normal node. There is little concern about the situation that the leader...
Nowadays, content distribution is of high attention in peer to peer information systems. There are two main problems that could be mentioned in this context. The first problem is how to disseminate fragments of information efficiently and the next is to avoid missing same rare fragments towards end of download. For overcoming these problems, a new mechanism is presented in this paper which uses gossip...
File sharing among heterogeneous systems is always a pain due to different conventions and file sharing mechanisms involved in both ends. Although the evolving of USB standards and the spread of USB storage devices alleviate the heterogeneous file sharing effort, the performance of the file transferring is degraded due to the bandwidth reduction introduced by the storage technologies and the fact...
DHT-based peer-to-peer networks represent a particular environment with specific security problems. Some types of malicious activity in this kind of networks can cause the same problems as Byzantine failure in distributed computer systems. In this work we propose to integrate solutions for Byzantine Agreement (BA) used in distributed computing environment and reputation mechanisms designed for P2P...
The remote file synchronization problem is how to update an outdated version of a file located on one machine to the current version located on another machine with a minimal amount of network communication. It arises in many scenarios including Web site mirroring, file system backup and replication, or web access over slow links. A widely used open-source tool called rsync uses a single round of...
In this paper we describe the evolution of eConference, a text-based conferencing system that has turned into a collaborative platform. We draw the lessons learned from the evolution process, as first we changed the underlying communication framework, from the JXTA P2P platform to the XMPP client/server protocol, and then its overall architecture, from traditional plugin to pure-plugin system, built...
Wikis, a popular tool for sharing knowledge, are basically collaborative editing systems. However, existing Wiki systems offer limited support for co-operative authoring, and they do not scale well, because they are based on a centralised architecture. This paper compares the well-known centralised MediaWiki system with several peer-to-peer approaches to editing of wiki pages: an operational transformation...
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.