The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ad hoc networks are useful for providing communication support where no fixed infrastructure exists or the deployment of a fixed infrastructure is not economically profitable, and movement of communicating parties are allowed. Due to the dynamic topology, developing better routing protocol became a challenging task. The Dynamic Source Routing (DSR) protocol is a simple and efficient routing protocol...
Peer to peer based live multimedia streaming systems over the Internet have been gaining popularity these days because they can be easily deployed without router based IP multicast capabilities. However, the peers frequently join and leave the system so that some peers may experience service disruptions, which degrade the overall quality and reputation of the services. In this situation, a hybrid...
In wireless sensor networks (WSNs), sensor nodes are typically subjected to energy constraints and often prone to topology changes. While duty cycling has been widely used for energy conservation in WSNs, random walks have been popular for many delay-tolerant applications in WSNs due to their many inherent desirable properties. In this paper, we consider an opportunistic forwarding under an asynchronous...
Clock synchronization is of critical importance for several applications in wireless and mobile sensor networks; for example to determine the order and time of events. Although several protocols to achieve clock synchronization have been developed, they may not be secure. For instance, a link controlled by an attacker could delay packets it forwards in ways which would cause the nodes sharing that...
In original Chord model,the semantic property of the content in the model is not taken into account. Besides,a node's logical ID is independent of its physical location,bringing tremendous delay to network routing.Aiming at the system instability of structured P2P model which is caused by the heterogeneity of nodes in model,this paper proposes a Structure P2P network based on the Chord (TI-CHORD)...
Cognitive radio ad hoc networks (CRAHNs) solve the problem of spectrum utilization when the licensed or primary user (PU) activity changes over time. This affects not only the spectrum availability, but also the network topology, making the analysis of scaling laws very challenging. Currently, the effect of PU activity on the network scaling laws has not been theoretically analyzed, to the best of...
Cognitive Radio (CR) networks have become an important component of the modern communication infrastructure due to their capability of improving spectrum usage efficiency by exploiting channels opportunistically. In CR networks, the network topology changes very frequently because of the temporarily available channels and dynamic transmitting parameters (e.g. transmission power and transmitting frequency),...
The Data Distribution Service for Real-time Systems(DDS) mainly describes how data is dealt with in a single node, but not the mode of data-exchange among nodes. The centralized label publication subscription mechanism is used for data-exchange in this article. In the wireless network, especially low speed wireless network of battlefield, it is important to research on performance of this mechanism...
A skip graph is a valuable overlay network for searching for keys in a peer-to-peer application. A problem with the construction algorithm for skip graphs is that it does not consider the proximity of adjacent peers. Because of this, a skip graph often contains links with considerably high communication time. Another problem is that due to the random nature of the algorithm, a skip graph often exhibits...
To improve the efficiency and the topology mismatch problem of P2P overlay network, a new method of topology construction, CLSP2P, was introduced. The topology construction of CLSP2P not only consideration the physical location of nodes, but also consideration the semantic information of nodes: Nodes in CLSP2P were first organized as autonomous domain based on their physical location, then the nodes...
Network coding is known to provide increased throughput and reduced delay for communications over networks. In this paper we propose a peer-to-peer video streaming system that exploits network coding in order to achieve low start-up delay, high streaming rate, and high resiliency to peers' dynamics. In particular, we introduce the concept of random multicast trees as overlay topology. This topology...
As the infrastructure-centric model of peer-to-peer streaming, recent overlay construction schemes compose a hierarchical topology of peers by grouping them into clusters. There is a server in each cluster that receives data from the source and relays it to its cluster members. In this paper, we propose an alternative infrastructure-centric peer-to-peer framework called BAHMO that constructs a hierarchical...
Dynamic routing is very important in terms of assuring QoS in today's packet networks especially for streaming and elastic services. Existing solutions dedicated to dynamic routing are often too complicated and seem to be not usable in real time traffic scenarios where transferred traffic may vary significantly. This was the main reason for research and new routing mechanism proposal which should...
Several studies have found some properties of Internet such as Triangle Inequality Violations (TIVs). The studies have reported the existence of TIV in the Internet delay space. Triangle inequality violations that are important to peer-to-peer applications can be leveraged to build overlay routing to improve peer-to-peer performance. How to select relay nodes becomes a crucial factor to overlay routing...
This paper presents a systematic performance analysis of pull P2P video streaming systems for live applications, providing guidelines for the design of the overlay topology and the chunk scheduling algorithm. The contribution of the paper is threefold: (1) we propose a realistic simulative model of the system that represents the effects of access bandwidth heterogeneity, latencies, peculiar characteristics...
Measurement studies of the Internet topology revealed that the degree distributions of the Internet topologies follow a power law. That is, existing probability of nodes having k links is proportional to k-γ. However, only the power-law degree distribution does not determine network-level performance of networking methods. That is, the structural characteristics of topologies other than the degree...
Mobile and wireless networks have developed significantly because of improved flexibility, reduced costs and adaptability to various technologies. In portable technologies, the main factor is node mobility, which causes frequent changes in network topology. Multicast routing protocols affects the performance of network topology. Routing paths in MANETs and WSNs potentially contain multi-hop communications...
In order to improve transmission throughput of a multi-hop wireless network, many efforts have been made in recent years to reduce traffic and hence transmission collisions by constructing backbone networks with minimum size. However, many other important issues need to be considered. Instead of simply minimizing the number of backbone nodes or supporting some isolated network features, in this work,...
The features of P2P networking architecture can contribute to robustness and scalability, however, it also introduces network-oblivious traffic, which brings big pressure to the ISPs. Meanwhile, since traffic of P2P applications occupies much of bandwidth in bottleneck links, non-p2p applications may be severely harmed due to lack of bandwidth. To conquer this problem, previous works mainly focused...
In this paper we address the issue of designing multi-path routing algorithms. Multi-path routing has the potential of improving the throughput but requires buffers at the destination. Our model assumes a network with capacitated edges and a delay function associated with the network links (edges). We consider the problem of establishing a specified throughput from multiple source to destination pairs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.