The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Monitoring the evolution of user-system interactions is of high importance for complex systems and for information systems in particular, especially to raise alerts automatically when abnormal behaviors occur. However current methods fail at capturing the intrinsic dynamics of the system, and focus on evolution due to exogenous factors like day-night patterns. In order to capture the intrinsic dynamics...
This paper presents the technical assessment of the Economic Traffic Management (ETM) mechanisms that have been specified and implemented in the EU FP7 SmoothIT (Simple Economic Management Approaches of Overlay Traffic in Heterogeneous Internet Topologies) project. The proposal inter-relates traditional mechanisms of network management with economic incentives. The most relevant ETM mechanisms are...
Based on the currently P2P(Peer to Peer) traffic identification, this paper established a initiative monitoring model to monitor specific information based on hybrid P2P network, which detects the existed specific information on hybrid P2P network by positive monitoring method, to get the audience information related to specific information. By mathematic analysis to the audience information to monitor...
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and study address-misconfigured P2P traffic, a major class of such misconfiguration. P2P address misconfiguration is a phenomenon in which a large number of peers send P2P file downloading requests to a ``random'' target on the...
Today's Internet traffic is dominated by users' demand for exchanging content. In particular, multi-media content, i. e., photos, music, and video, as well as software downloads and updates contribute substantially to today's Internet traffic. One option for reducing network costs is to use caches-exploiting the observation that content popularity is consistent with Zipf's law. Yet, Web caching became...
Peer-to-peer (P2P) applications are voracious bandwidth consumers, and ISPs have no effective options for curbing their bandwidth consumption. The Transparent Network Tracker (TnT) is a network device that fills this void: it identifies and monitors P2P traffic on the wire to support applications that control it. In this paper, we describe our TnT prototype and an associated ISP tracker application.
P2P activity has been a significant and growing component of Internet traffic. With the increasing number of P2P application users, the P2P applications are consuming most of the Internet bandwidth; otherwise they have a negative effect on traditional Internet applications. In order to solve this problem, researchers proposed various technologies to manage P2P traffic, such as P2P traffic control,...
Future ubiquitous environments will be emerged over many of the computers that are dynamically networked. The personalized data collected by ubiquitous environment provide important information for ubiquitous applications. This type of application will form a peer to peer system over the Internet to offer common services. Providing architecture for large-scale personalized peer to peer information...
Several proposals on P2P-ISP cooperation have recently been developed using information sharing for locality-based peering. Their benefits in terms of P2P efficiency, ISP cost, and traffic localization have been demonstrated in the single ISP case. However, potential risks associated with such cooperation have not been well examined. This paper develops a taxonomy and a mathematical model to explore...
Abstract-Peer-to-peer (P2P) technology for TV broadcasting over the Internet is becoming more and more popular in the very last years. This paper introduces a network-wide metric to assess the efficiency of P2P streaming systems and develops a mathematical model to explain: (i) the scalability of such architectures with the number of peers, as evidenced by recent measurements; (ii) the initial decrement...
This paper presents a prototype of a new application development framework for development of telephony services. Besides the first party call control, the framework provides support for third party call control, monitoring and presence service, which is based on publish/subscribe mechanism. The programming interface that framework provides maps successfully to mechanisms of SIP protocol and its extensions...
This paper proposes HELP://, a simple light-weight protocol that runs over HTTP and is used to disseminate information from a server(s) to its clients during the time of a crisis. HELP runs on an architecture that is a hybrid mix between a pure client/server architecture and a peer-to-peer architecture. Its resemblance to one versus the other is dynamically decided based on load. In particular, under...
Tycho was conceived in 2003 in response to a need by the GridRM [1] resource-monitoring project for a ldquolight-weightrdquo, scalable and easy to use wide-area distributed registry and messaging system. Since Tycho's first release in 2006 a number of modifications have been made to the system to make it easier to use and more flexible. Since its inception, Tycho has been utilised across a number...
Userspsila character analysis and control are important for enterprise network management and security. In this paper, we propose a novel method to classify the userspsila behaviors into different security levels and control their behaviors with corresponding strategies. Firstly, Dflow model and several traffic features, including the number of packets, number of flows, flow durations, etc., are proposed...
As P2P applications and the amount of users continue to increase rapidly, the problems which the Internet faces, such as network congestion and the difficulty in ensuring Qos etc, become more and more serious. This paper design a model of distributed multi-granularity P2P traffic identifying and controlling in the light of large-scale and high-speed network environment, under the premise that it basically...
This paper presents the design and implementation of a P2P-based personal broadcasting system for consumer electronics. This system enables each user of a device to broadcast its local contents to other devices or play the contents broadcasted by other device using a P2P live streaming technology without any content server.
Due to the overload problem of the server, the Web server has become the bottleneck to implement the P2P QoS to some extent. It has become a big problem that how to implement the QoS control in the Web system. We describe a QoS control for Web system based on dynamic monitoring and parameters regulating. It enables web site operators to optimize the usage of their Web sites by prioritizing among requests...
People are using P2P (peer to peer) network for sharing and transferring digital content containing video, audio, or any other data file over the Internet from different part of the globe. All general P2P file sharing protocols were designed to work optimally in the case that all the peers have an end node on the Internet i.e. they are connectible. But due to the huge number of computers behind NAT...
The value of instant message in computer-supported cooperative work is presented, and the disadvantage of instant message is analyzed when using the client/server, peer-to-peer or hybrid mode. The IMR (independent meeting room) mode is brought forward. This model divides into three levels, which are CSCW center, IMR and collaborative partner. The exchange and the data transmission between the partners...
Monitoring traffic pattern is always an important approach to improve the performance of computer networks. In recent years, peer-to-peer (P2P) service gradually dominates the Internet traffic against traditional client-server (C-S) service such as Web. The changed situation of networks is mainly in two aspects. One is that popular P2P file-sharing applications require both board downstream and upstream...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.