The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The current Internet architecture follows a hostcentric communication model, intended for machine to machine connection and message passing. Modern Internet users are mainly interested in accessing information by name, irrespective of physical location. Information centric networking (ICN) was developed to rethink Internet foundations. Innetwork caching is one of the main features of ICN. Studying...
Critical networked services established between service providers and customers are expected to operate respecting Service Level Agreements (SLAs). An interesting possibility to monitor such SLAs is using active measurement mechanisms. However, these mechanisms are expensive in terms of network devices resource consumption and also increase the network load because of the injected traffic. In addition,...
During recent years, establishing proper metrics for measuring system security has received increasing attention. Security logs contain vast amounts of information which are essential for creating many security metrics. Unfortunately, security logs are known to be very large, making their analysis a difficult task. Furthermore, recent security metrics research has focused on generic concepts, and...
Researchers tend to agree that an increasing quantity of data has caused the complexity and difficulty for information discovery, management and reuse. An essential factor relates to the increasing channels for information sharing. Finding information, especially those meaningful or useful one, that meets ultimate task of user becomes harder then it is used to be. In this research, issues concerning...
BitTorrent (BT) is an extremely successful peer-to-peer (P2P) application providing efficient file sharing over the Internet. The ever-increasing traffic among the peers has also put unprecedented pressure to Internet Service Providers (ISPs). P2P locality has therefore been widely suggested, which explores finding local resources to optimize the cross-ISP/AS traffic. However, the ISPs would fail...
Gossip-based Peer-to-Peer protocols proved to be very efficient for supporting dynamic and complex information exchange among distributed peers. They are useful for building and maintaining the network topology itself as well as to support a pervasive diffusion of the information injected into the network. This is very useful in a world where there is a growing need to access and be aware of many...
Traffic caused by P2P services dominates a large part of traffic on the Internet and imposes significant loads on the Internet, so reducing P2P traffic within networks is an important issue for ISPs. In particular, a huge amount of traffic is transferred within backbone networks; therefore reducing P2P traffic is important for transit ISPs to improve the efficiency of network resource usage and reduce...
The emergence of Web 2.0 changed the way people use the Internet. Network communities enabled people to not only provide and absorb information but also share and create information. Among the various kind of network communities, online forums are the ones in which information exchange takes place most frequently. The participation of forum members differs from forum to forum. According to past literature,...
Content-centric networking is often regarded as a promising paradigm for future networks. Nevertheless current content-based networks-such as file sharing peer-to-peer (P2P) networks-have been proved to be vulnerable to content pollution attacks. A significant amount of research efforts has been launched in order to mitigate this kind of attacks. The majority of these efforts focuses on users' ranking,...
Most users retrieve and access resources in complex systems, like distributed virtual environments (DVE), or the Web by querying centralized search engines. Such systems normally compute their answers by estimating query-document similarities to rank the results, but also global ranks of the result pages by exploiting the hyperlink Web structure. User interests typically follow a sort of clustering...
The immense popularity of new-age ??Web 2.0?? applications such as YouTube, Flickr, and Facebook, and non-Web applications such as peer-to-peer (P2P) file sharing, voice over IP, online games, and media streaming have significantly altered the composition of Internet traffic with respect to what it was a few years ago. In light of these changes, this paper revisits Internet traffic characteristics...
In recent years, sensors have become smaller, more affordable, and widely used. Also, Internet spreads all over the globe, and made possible transfer large data instantly. Thereby, large scale weather sensor networks have been constructible. In this kind of sensor network, we need to consider load balancing, network redundancy, and reliability of sensor data. Using P2P technology is one of the solutions...
Because of the enormous growth in the number of peer-to-peer (P2P) applications, P2P traffic now constitutes a substantial proportion of Internet traffic. The ability to accurately identify different P2P applications from the network traffic is essential for managing a number of network traffic issues, such as service differentiation and capacity planning. However, modern P2P applications often use...
Mechanisms to extract the characteristics of network traffic play a significant role in the traffic monitoring, offering helpful information for network management and control. In this paper, a method based on random matrix theory (RMT) and principal components analysis (PCA) is proposed for monitoring and analyzing large scale traffic pattern of Internet. Besides the analysis of the largest eigenvalue...
Large-scale live peer-to-peer (P2P) streaming applications have been successfully deployed in today's Internet. While they can accommodate millions of users simultaneously with hundreds of channels of programming, there still commonly exist channels and times where and when the streaming quality is unsatisfactory. In this paper, based on more than two terabytes and one year worth of live traces from...
The peer-to-peer (P2P) networks is heavily used for content distribution applications and are becoming increasingly popular for Internet file sharing. Generally the download of a file can take from minutes up to several hours depending on the level of network congestion or the service capacity fluctuation. In this paper, we consider two major factors that have significant impact on average download...
Over the recent years, social network analysis has received renewed interest because of the significant increase in the number of users relying on applications based on them. An important criterion for the success of any social-networking based application is the efficiency of search. In this paper, we propose and analyze a method of anycast search based on correlated communities or subgroups, i.e...
This paper reviews attitudes toward acceptance and usability of file sharing for music downloading in Russia. There is a significant issue with respect to the copyright law legislation and enforcement. Since infrastructure, market conditions, social and economical situations in developing countries are different from those of developed countries, we decided to apply a well establish theory to a new...
The peer-to-peer (P2P) networks is heavily used for content distribution applications and are becoming increasingly popular for Internet file sharing. Generally the download of a file can take from minutes up to several hours depending on the level of network congestion or the service capacity fluctuation. In this paper, we consider two major factors that have significant impact on average download...
Peer-to-peer (P2P) based live video streaming system has emerged as a promising solution for the Internet video streaming applications, partly evident from commercial deployment of several large-scale P2P streaming systems. The key is to leverage the resources available at end users, which offers great potential to scale in the Internet. Flash crowd poses a unique challenge for live streaming systems,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.