The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Processor allocation in todays many core MPSoCs is a challenging task, especially since the order and requirements of incoming applications are unknown during design stage. To improve network performance, balance the workload across processing cores, or mitigate the effect of hot processing elements in thermal management methodologies, task migration is a method which has attracted much attention...
Ad hoc networks are useful for providing communication support where no fixed infrastructure exists or the deployment of a fixed infrastructure is not economically profitable, and movement of communicating parties are allowed. Due to the dynamic topology, developing better routing protocol became a challenging task. The Dynamic Source Routing (DSR) protocol is a simple and efficient routing protocol...
We develop a protocol through which multipath enabled IP routers collectively engage in dynamic traffic engineering, to optimize performance in concert with legacy TCP congestion control. We build on recent theory which shows a globally optimum resource allocation across the TCP/IP layers can be achieved through control of rates and multipath routing fractions following a consistent congestion signal...
Emerging Peer-to-Peer (P2P) technologies have enabled various types of content to be efficiently distributed over the Internet. Most P2P systems adopt selfish peer selection schemes in the application layer that in some sense optimize the user quality of experience. On the network side, traffic engineering (TE) is deployed by ISPs in order to achieve overall efficient network resource utilization...
Recently, structured P2P (Peer-to-Peer) system has become more and more popular. However, P2P systems' large scale and high dynamics have brought a great challenge to data availability and accessing performance. Redundancy techniques are used to solve these problems. However, in structured P2P systems, due to the consistent hash, the overlay network could not match underlying physical network well...
Load balancing is a key component of P2P network. In this paper, we present a new load balancing scheme for Chord system, called dynamic group-based duplications scheme (DGDS). Firstly, we divide Chord ring into several continuous groups, in which light-loaded peers share the load of overloaded peers. Secondly, DGDS computes out how many duplications are required to lighten the load of overloaded...
As a superior approach for peer-to-peer (P2P) streaming live media, mesh-based overlay has made much success due to its potential scalability and ease of deployment. Peers in mesh streaming systems employ a swarming content delivery mechanism to exchange resources. However, the limited availability of new content heavily affects the quality of delivered stream. Aiming at leveraging and optimizing...
To improve the efficiency and the topology mismatch problem of P2P overlay network, a new method of topology construction, CLSP2P, was introduced. The topology construction of CLSP2P not only consideration the physical location of nodes, but also consideration the semantic information of nodes: Nodes in CLSP2P were first organized as autonomous domain based on their physical location, then the nodes...
Epidemic-style diffusion schemes have been previously proposed for achieving peer-to-peer live streaming. Their performance trade-offs have been extensively studied for homogeneous systems, where all peers have the same upload capacity. However, epidemic schemes designed for heterogeneous systems have not been completely understood yet. In this paper we focus on the peer selection process and propose...
In order to reduce the maintenance cost of resource index table of the mobile nodes in the MP2P network, use the edge resource of network enough, and parallel process the mobile task of network, we propose the resource interactive technology based on genetic algorithm to make sure that the mobile node could adapt the change of routing actively during the resource interaction. The simulation experiments...
Due to technology or policy constraints, communications across network domains usually require the intervention of gateways, and their proper deployment is crucial to the overall performance. In this paper, we study the problem of placing static gateways in mobile DTNs consisting of multiple domains. Given a limited gateway budget, the problem is to select deployment locations to optimize certain...
The dominant IP traffic is moving from Web to peer-to-peer (P2P) these days. As a result, elephant flows consume bandwidth and unfairness in resources allocation occurs. The main packet-scheduling mechanism currently employed is first-in first-out (FIFO) where the available bandwidth of short flows is limited by elephant flows. Least attained service (LAS), which decides transfer priority of packets...
We consider a simple ad-hoc cognitive scenario with two data up-links, one licensed to use the spectral resource (primary) and the other unlicensed (secondary or cognitive). It is assumed that the cognitive link accesses the channel only when the channel is sensed idle. An ON-OFF channel model is used for the primary link, where traffic statistical characteristics are taken into account. A closed-form...
Structured P2P system doesn't consider the actual physical topology when building the logical overlay, which would cause a serious mismatching between logical overlay network and physical network and affect the routing performance of the system. An advanced algorithm of K-bucket updating strategy base on structured Kademlia system was proposed. Using Landmark Binning algorithm and RTT detection will...
The hybrid application layer multicast (ALM) has been shown its efficiency by leveraging the conventionally main structures of application layer multicast, tree-based and mesh-based. However, how to select the proper node to construct the overlay and how to establish the connection between any two nodes are still unsolved. Therefore, this paper is to design a novel construction algorithm for the hybrid...
A load balancing algorithm functioning as an extension to the topological routing scheme is proposed. The algorithm is designed to evenly distribute the traffic load in a 4-regular grid network. This is done by letting each node calculate how loaded it is with regular intervals and feed this information to its neighboring nodes, which then use it to derive link probabilities applied in probabilistic...
To address the problems of resource sharing and utilization in the distributed environment, the paper aims to establish a resource overlay for the distributed system monitoring. The resource overlay can construct a logical space, and the type of the nodes in the space can be classified as host node and resource node. The host node and resource node are mapped into the logical space of network by the...
Analyzing the network coding and its application in mobile P2P network, a novel network coding dynamic node selection method in mobile peer-to-peer (P2P) network is proposed, which the hierarchical network structure divides the nodes into super node (SN) and ordinary node (ON). Considering the heterogeneous and dynamic characteristics, part coding node (CN) selection program is adopted, which overcomes...
DHT-based peer-to-peer systems have been proposed in the past few years. Scalability, fault tolerance and searching speed of the DHT based P2P systems have been greatly improved in contrast to the unstructured P2P systems. These DHT-base systems have the problem of load imbalance. We present a load balancing method taking into account Zipf-like requests distribution and the impact of physical networks...
The statistical approaches of resource allocation require that input traffic is Gaussian. The Gaussian hypothesis is guaranteed by the central limit theorem (CLT), that is verified when several hundreds of independent flows are multiplexed. In realistic scenarios few flows and long range dependent video traces can be multiplexed, in this case the input traffic can't be considered Gaussian. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.