The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network coding was first introduced in information theory for increasing the multicast rate in the networks with directed links. We can model many of the content distribution networks and overlay networks with such a network. Therefore, the solutions introduced in information theory can be used in these networks. In this paper, we analyze using of network coding in uncoordinated cooperative content...
The opportunistic computing paradigm is extremely valuable to modern technical and scientific endeavors, as it can support the demand for large and steady amounts of computing capacity. The applications of opportunistic computing environments often require independent and intensive processing over different data sets, characterizing themselves as BoT applications. Opportunistic computing systems,...
Resource discovery is an important aspect of many modern large-scale distributed systems. In the past, this problem has been solved using many different approaches, such as a central registry server, flooding-based protocols, and distributed hash tables. In this paper, these three widely used architectures are compared, using measurement results obtained from real implementations run on an Emulab...
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of conference participants using multicast algorithms that minimize the amount of traffic sent over the network. This is far more effective than systems that maintain a separate link between each participant. On the other hand Peer-to-Peer...
We introduce a ??bulk data transfer?? (BDT) mechanism across multi-autonomous system (AS). The mechanism performance is limited by the positions of source or replica servers and by the inter/intra AS routing strategies. Therefore, a new mechanism is proposed to enable the source peer to create several virtual replica servers to transfer the data to the destination peer together. The mechanism works...
In this paper, we evaluate the performance of peer selection algorithms: MLH (Minimum Logical Hop) and MPH (Minimum Physical Hop) to increase the number of joining peers and to decrease inter-AS traffic volume in P2P live streaming, where we assume that every peer's logical hop count (the number of providing peers between an origin streaming server and the peer) is limited by a predetermined value...
Locality promotion in P2P content distribution networks is currently a major research topic. One of the goals of all discussed approaches is to reduce the interdomain traffic that causes high costs for ISPs. However, the focus of the work in this field is generally on the type of locality information that is provided to the overlay and on the entities that exchange this information. An aspect that...
It is crucial for P2P applications to control their traffics for saving the Internet bandwidth. During the P2P communication, if peers tend to share the data with near peers, the Internet traffic can be reduced. Thus the topology of the P2P networks will be clustering. In this article, we study downloading strategies for the living P2P applications with clustering topology. First, we combine two popular...
The research provides a computational approach for dynamic allocation of geometric coordinates within a 3DP2P network topology. Deployment of Internet and mobile applications within the network will be achieved with the utilization of a 3D-XML peer node descriptor (3DP2P-XML). The 3DP2P-XML file descriptor generates and deploys enterprise beans, Web services, and mobile clients. Boundary conditions...
Live streaming systems based on application layer multicast (ALM) technology provide an effective and scalable way for content dissemination. Especially push-based systems, maintaining an explicit distribution topology, represent a promising approach. Compared to a classical client-server content distribution and in contrast to other ALM systems, they introduce only low additional transport delay...
The botnet construction mechanism (BCM) is one of the key technologies of the botnets and the most important issue to both the attackers and the defenders. To the best of our knowledge, although the BCM has been mentioned in many researching papers, it has not been systemically studied. In this paper, we attempt to discuss the BCM methodically. We first give both the definition and its formalized...
Efficient file query is important to the overall performance of peer-to-peer (P2P) file sharing systems. Clustering peers by their common interests can significantly enhance the efficiency of file query. On the other hand, clustering peers by their physical proximity can also improve file query performance. Few current works are able to cluster peers based on both peer interest and physical proximity...
Peer-to-Peer (P2P) networks are becoming very popular these days. The scattered environment in P2P networks makes it different from the traditional networks. Each member in P2P network can act as a client as well as a server, which is different from its traditional counterpart such as Internet, where a central server is required to control the network. Finding resources in P2P systems is a major issue...
The fast growing role of peer-to-peer networks in various distributed services and technologies as a well distributed, highly scalable and fault tolerant networking infrastructure together with large number of users inherent to these special networks has introduced P2P systems as a potential domain for data mining processes. Nevertheless, the distributed nature of P2P networks is in explicit contradiction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.