The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new streaming media network-architecture based on the fusion of P2P and CDN is proposed in this paper. It uses P2P network as the backbone, selects nodes of high-performance, high-bandwidth, and stable online time as CDN edge servers, and provides non-P2P users with streaming media services under the schedule of the load-balancing servers. Since P2P has the inherent drawback of flow disorder, an...
Virtualization is being widely used in large-scale computing environments, such as clouds, data centers, and grids, to provide application portability and facilitate resource multiplexing while retaining application isolation. In many existing virtualized platforms, it has been found that the network bandwidth often becomes the bottleneck resource, causing both high network contention and reduced...
Peer-to-peer (P2P) video-on-demand (VoD) is a popular Internet service for a large number of concurrent users. Streaming capacity in a P2P VoD system is defined as the maximum streaming rate that can be received by every user. In this letter, we study the streaming capacity problem in P2P VoD systems. We formulate the streaming capacity problem into an optimization problem which maximizes the streaming...
Peer-to-peer (P2P) networks are in the spotlight due to the wide-spreading file-sharing applications. Many file-distributing algorithms have been suggested and implemented. The various solutions need to cope with a heterogeneous and unstable environment, where peers can arrive and depart at a high rate (churn). Sometimes cooperation cannot be assumed. These issues make the structured attitude less...
The increasingly popular online hosting systems are designed to provide versatile and convenient platforms for content hosting and sharing. To guarantee adequate levels of service quality while conserving prohibitive server costs, such systems are often designed to integrate peer bandwidth contributions with strategic server resource provisioning in a complementary and transparent manner. This paper...
Traffic engineering (TE) is an interesting application in IP-based networks. TE main objective is to optimize the performance of a network through an efficient utilization of network resources. We study a load balancing in optical networks based on measured link loads. As a result, WDM has become a technology of choice for meeting the tremendous bandwidth demand in the communications infrastructure...
As communication networking becomes vital to people's digital life. Also, various communication protocols are evolved in e-service for e-business models. The main push factor behind this network evolution is the real time transfer of multimedia information, such as, audio, image and video. Several protocols, such as RTP (real time protocol) and RTCP (real time control protocol), are developed to facilitate...
Distributed content delivering network (DCDN) will make use of the existing resources of the common Internet users in terms of storage space, bandwidth and Internet connectivity to create it. However, DCDN has some limitations that are inefficient using of storage space, reliability and having special load balancing (LB) algorithm. So, this paper proposes re-distribution based CDN (RDCDN) that overcomes...
Content delivery network (CDN) and peer-to-peer (P2P) are two well-known techniques for the efficient distribution of video streams. We have designed and implemented a large-scale live streaming system by integrating the advantages of CDN and P2P technologies to overcome their own limitations. The system was commercially deployed by ChinaCache, one of the largest CDN companies in China. To the best...
The current Internet is vulnerable to attacks and failures. The past events have illustrated the Internet's vulnerability to distributed denial of service (DDoS) attacks. This paper proposes a general, and not attack specific, defense strategy through pushback and resource regulation to mitigate the effect of such attacks. Routers cooperate with victim in implementing the defense strategy. Pushback...
The current Internet servers are susceptible to network attacks. The DDoS attacks consume the network bandwidth and degrade the services provided by the servers. This paper proposed a mechanism to provide security and quality of service (QoS) for a server pool with the support at the edge router. It focuses on the protection of the services based on the priority of different traffic flows and the...
In this paper, we present a method for providing quality of service using bandwidth limitation. In practical demonstration of the idea, we have used an algorithm for packet queuing, a technique applicable in a setup where the systems are connected to the Internet through a server and the server receives and distributes all the packets requested from the all the users in the network. The idea basically...
We present a new method for managing bandwidth which is allocated among several services. In implementation of the idea, we have used a queuing algorithm, a packet queuing technique applicable in a setup where the systems are connected to the Internet through a server (running our module) and the server receives all the packets requested from the all the services. The technique basically involves...
Our proposed design, which we refer to as re-traffic pricing (RTP), aims to defense against application-level distributed denial-of-service (App-DDoS) attacks which is a rapidly growing problem. RTP prevents the server form overloading and encourages all the users to spend re-traffic which the legitimate users are assumed to have more of than the attackers to bid for the service resources. We apply...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.