The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, Peer to Peer system has shown tremendous growth enabling millions of concurrent users exchange information seamlessly. Kad is a Kademlia-based Distributed Hash Table implementation in real P2P applications which has millions of simultaneous users as to date. However, it comes with several vulnerable features which allow attacks, especially DDoS attacks. In this paper, we proposed...
Traditional text retrieval techniques greatly consume system resources. Although some file-sharing software realizes file positioning and high-speed downloads, they have no enough capacity to analysis variety format Chinese documents and to extract keywords. At the same time, during the operation of system, it exist hot issues in network routing. This paper proposes an intelligent distributed text...
One major issue in web service discovery is retrieving the desired services. Currently P2P architectures are used as a replacement of UDDI for registering and discovering web services. But P2P network structures lack semantic based query routing and have scalability issues when they are scaled to larger network. In this paper we introduce the concept of Domain ontology in CHORD based Super Peer network...
ZigBee is an industrial standard for low rate and low power wireless personal area networks. It is based on IEEE 802.15.4 physical and MAC layers. ZigBee defines the network layer to support multi-hop communication and routing between nodes. In ZigBee, tree routing is the simplest routing protocol with low-overhead in which parent-child links will be used for data transfer. In spite of this fact,...
Co-operative peer-to-peer systems have lot of relevance due to their desirable properties like lack of centralized control and transparency. But in certain applications, the stability of peer-to-peer systems is affected when concentrated load spikes occur. In this work, we explore the case for cloud-assisted peer-to-peer systems to handle spikes using peer-to-peer search as a case study. We identify...
When dealing with multimedia delivery, scalability, efficiency and Quality of Service (QoS) are challenging features for today's networks. Overlay networks can compensate for the lack of control over the network routers, but for real-world applications overlay network performance is an issue. This paper presents an efficient solution for software implementation of overlay network nodes. A new, advanced...
Peer-to-peer systems have recently achieved a remarkable success in the social, academic and commercial communities. In P2P systems, a very large number of autonomous computing peers pool together their resources and rely on each other for any request. A fundamental problem in Peer-to-Peer networks is how to locate efficiently appropriate peers to answer a specific query (Query routing). A lot of...
We propose a random-walk-based file search for unstructured P2P networks. In the proposal, each node keeps two pieces of information, one is the hop-limited routing tables, storing the route information to nodes within a small number (say n) hops from each node. The hop-limited routing table is substantially equivalent to the hop-limited shortest path tree, which is made of nodes within limited hop...
The design of Content Centric Network is one of the significant directions of Future Internet research. A wide range of issues have to be addressed including the Naming and Routing scheme. The naming and routing scheme builds the foundation for a scalable content-centric network infrastructure. In this paper, we first analyzed the evaluation criteria of naming in a Content Centric Network. Then we...
Considering heterogeneity of mobile grid, structured routing protocol (HASR) is presented. Firstly it takes heterogeneity into account from point of coarse-grained view. All nodes are divided into general nodes and agent nodes. Agent nodes constitute kernel overlay network which performs routing function. Secondly HASR takes heterogeneity of agent nodes into account from point of fine-grained view...
Distributed solutions for the storage and retrieval of large amounts of data are necessary to handle the growing amounts of knowledge expected from future applications. The support for range queries provides much-needed expressivity, for example for queries on data annotated with location and time. We present a novel and scalable way for range query evaluation in our distributed storage system based...
Volunteer computing which benefit from idle cycles of desktop PCs over the Internet can integrate power of hundreds to thousands desktop systems to achieve high computing power. Centralized volunteer computing system has dedicated servers to maintain information about the resources. However, in the decentralized system resource information is distributed in the system. Resource discovery architecture...
P2P technology provides new views for data integration purposes. In P2P systems, there is no global knowledge, neither a global schema nor information of data distribution or indices. An important issue in the context of schema-based P2P systems is efficient query processing. Because of the lack of global knowledge, query planning is much more difficult than in centralized systems. In this paper,...
In current research Peer-to-Peer (p2p) based Semantic Web systems mainly use distributed hash table (DHT) based networks. These networks provide good load balancing by applying uniform hash functions with the drawback that they destroy possible semantic relations between data elements. But mapping the data semantics on the network structure could improve the routing time in the network and consequently...
Small-World paradigm was adopted by many peer-to-peer (P2P) systems such as Freenet in order to improve performance of the P2P system. To adopt Small world as part of the architecture of a P2P system, the overlay network must achieve high cluster coefficient and low average hop between any two randomly chosen peers. In this research, we propose to enhance the overlay network by incorporating the concept...
Recently, the OFDM-based Spectrum-sliced Elastic Optical Path (SLICE) network attracts significant interests due to its elastic band-width allocation. The OFDM technology, on one hand, enables both sub-wavelength and super-wavelength traffic accommodation by allocating appropriate number of sub-carriers. On the other hand, it can provide high signal quality by overcoming various impairments. In SLICE...
This paper proposes a scheme to find k disjoint paths in multi-cost networks. This scheme, called the k-penalty scheme with initial arc cost matrix (KPI), penalizes the use of conflicting arcs found in previously set paths and increases the costs of these arcs in accordance with the initially given arc cost matrix. Simulations show that the KPI scheme is able to find k disjoint paths faster than the...
Simplicity is the major advantage of implementing hardware IP lookup engine using multi-level index tables. However, the memory efficiency of the conventional multi-level indexing approach is relatively low. In this paper we shall show that by restructuring the binary-trie using a method called bit-shuffling, highly efficient index tables to support the IP lookup operation can be built. The proposed...
Next generation networks with the intention of converging service and control layer, with the aim of “Equal service presentation in integrated networks”, have provided a new approach to telecom operators. IMS provides a suitable opportunity for third party operators that they can participate in providing services for NGN. Some services like file sharing needs to P2P network. The existing P2P networks...
BitTorrent is a widely deployed P2P file sharing protocol, extensively used to distribute digital content and soft- ware updates, among others. Recent actions against torrent and tracker repositories have fostered the move towards a fully distributed solution based on a distributed hash table to support both torrent search and tracker implementation. In this paper we present a security study of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.