The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A low-cost collaboration architecture for web content distribution, that aims to improve all stakeholder's interests, is presented. A peer-to-peer (P2P) contribution among the end users layer is suggested, in order to increase download rates and reduce server traffic and resource usage. In addition, the Internet Service Providers (ISPs) concerns are also considered, with an ISP-aware connection strategy...
Rapid OS deployment has always been a challenging task in enterprise data center environments. In particular, deploying hundreds of thousands of systems is necessary to automate the installation process. This paper describes BitTorrent-based OS provisioning method to afford large-scale data centers. It can save the time necessary for installing and deploying operating systems and software.
Contention among multiple nearby WLANs in urban areas may cause severe TCP unfairness, where some TCP flows can achieve very high throughput at the expense of starving others. This unfairness results from the fact that different physical nodes conveying TCP flows at a wireless bottleneck may have different channel observations and consequently they may provide inconsistent feedbacks to the TCP sources...
Peer-to-Peer overlay networks are an attractive foundation for video streaming. However, live Peer-to-Peer media streaming systems face many challenges such as bandwidth heterogeneity, node churn, and selfish nodes. Although many tree based and mesh based streaming protocols have been proposed, each has its own drawbacks such as unreliability and unfairness in tree based and long startup delay and...
With the extensive using P2P networks, P2P data stream occupied more and more bandwidth, it will affect the performance of the entire Internet. This paper studies the P2P nodes which exchange traffic disorder, through introducing XCP congestion control protocol, designs network region-based exchange unit and flow control strategy to achieve flow control. The simulation results show that the flow control...
With the development of space science and technologies the exploration of the deep space has become the most important and direct way of exploring the unidentified planets or space resources. The data gathered by the equipment of deep space exploration need to be sent back to the Earth exactly, and the network is in a reliable manner. The transmission protocol of the deep space communication network...
In recent years, the video streaming service has become one of the most important applications. The rapid growth of users raises a big challenge to the traditional client-server VoD service. In order to provide large scale VoD service with lower server bandwidth cost, P2P technology has been introduced to VoD service. P2P based VoD service provides the same user experience as the client-server mode...
Wireless LANs have been widely deployed as edge access networks in home/office/commercial buildings, providing connection to the Internet. Therefore, performance of end-to-end connections to/from such WLANs is of great importance to network applications and end-users. The advent of Dynamic Spectrum Access (DSA) technology is expected to play a major role in improving wireless communication. With DSA...
Cloud services attract some attention in recent years, the information connection devices of organizations or enterprises with one another distributed around the world using networking systems. Cloud services also provide variety services for users, including virtual hosting services, storage services and web application services, etc. Because of the rise of cloud computing, users can directly enjoy...
The cognitive radio networks or CogNets poses several new challenges to the transport layer protocols, because of many unique features of cognitive radio based devices used to build them. CogNets not only have inherited all features of wireless networks, but also their link connections are intermittent and discontinuous. Exiting transport layer protocols are too slow to respond quickly for utilizing...
Layered streaming can be used to adapt to the available download capacity of an end-user, and such adaptation is very much required in real world HTTP media streaming. The multiple layer codec has become more refined, as SVC (the scalable extension of the H.264/AVC standard) has been standardized with a bit rate overhead of around 10% and an indistinguishable visual quality, compared to the state...
This paper presents a novel transport protocol, CUSP, specifically designed with complex and dynamic network applications in mind. Peer-to-peer applications benefit in particular, as their requirements are met by neither UDP nor TCP. While other modern transports like SCTP or SST have also tried to combine the advantages of TCP and UDP, CUSP overcomes their technical and conceptual shortcomings. CUSP...
In this paper we propose and evaluate a combined SVC-MDC (Scalable Video Coding & Multiple Description Video Coding) video coding scheme for P2P video multicast. The proposed scheme is based on a full cooperation established between the peer sites, which contribute their upload capacity during video distribution. The source site splits the video content into many small blocks and assigns each...
Tor is currently the most popular low latency anonymizing overlay network for TCP-based applications. However, it is well understood that Tor's path selection algorithm is vulnerable to end-to-end traffic correlation attacks since it chooses Tor routers in proportion to their perceived bandwidth capabilities. Prior work has shown that the fraction of malicious routers and the amount of adversary-controlled...
Available bandwidth in important performance criterion for performance. In this paper, we propose a new algorithm called Single Burst (SB) for measuring the available bandwidth between end hosts. Additionally, we provide mathematical analysis to derive approximate upper bounds on amount of exchanged data and measurement latency for SB. Finally, we present a comparison of measurement latency, accuracy,...
Incentives play an important role in BitTorrent-like P2P networks, motivating users to contribute to others to achieve faster average download time for all peers. Recent related studies reveal that two problems remain unresolved in most popular incentive mechanisms for BitTorrent-like systems: (1) incompleteness: contributions are not entirely considered, and (2) unfairness: accumulated contributions...
Peer-to-peer (P2P) multimedia sharing is widely envisioned as one of the major applications of wireless communication network in the future, and wireless bandwidth constraint is its principal obstacle. Aiming to save bandwidth, a novel P2P lookup protocol named BF-chord is proposed, in which the finger table in chord is changed, shared files' information is compressed into Bloom filters (BFs) before...
Although Transmission Control Protocol (TCP) is a widely deployed and successful protocol, it shows some limitations in present-day environments. In particular, it is unable to exploit multiple (physical or logical) paths between two hosts. This paper presents PATTHEL, a session-layer solution designed for parallelizing stream data transfers. Parallelization is achieved by striping the data flow among...
In the past years, the ALM (application layer multicast) has led the rapid development of the real-time streaming data transmission technology. However, as focusing on the global performance and control, the individual efficiency in the ALM structure could not be guaranteed. Furthermore, according to the complex environment of the existing networks, the available bandwidth is often made full use of...
SEACAST is a peer-to-peer live streaming protocol developed at Politecnico di Torino, which aims at improving current systems in two key areas. The first is the use of fullfledged flow control using RTP/UDP and session signaling. The second is the use of multiple description coding to handle error resilience and user heterogeneity. In this paper we overview SEACAST, highlighting its main innovations,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.