The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In comparison to Random Overlay Networks, Semantic Overlay Networks are very efficient for category based content searches. However, problem arises when geographical locality is of interest in search ranking. We propose suitable measures to adapt SONs for spatial locality ranking of a search. We evolve GeoSONs that exploit the SON hierarchy in the search domain and are capable of different types of...
Current video on demand system requires a large number of users and a huge number of video files, then mounts of concurrent address on media server will burst the bandwidth requirements and content provider will pay more and more cost on it. Accordingly, new schemes to offload burden from media server becomes a crucial item. In this paper, we introduce a new topology based on two hierarchical DHT...
Today, peer-to-peer networks are become more popular among internet users and more than millions peers share high volume of data from anywhere. Sending and receiving these data increase the network traffics terribly. By improving the performance of these networks not only the efficiency of these networks increase but also the overall performance of the internet augments. To achieve high performance...
Peer-to-Peer (P2P) networks are widely used in today's Internet. Researchers claim that churn could bring down the performance in p2p networks. AS churn is an inherent character. Researchers want to find some ways to keep down. We investigate this in another point of view, from the searching aspect, churn can bring up search efficiency for repeated search. In this paper, we build a novel peer to peer...
Today, peer-to-peer networks are become more popular among internet users and more than millions peers share high volume of data from anywhere. Sending and receiving these data increase the network traffics terribly. By improving the performance of these networks not only the efficiency of these networks increase but also the overall performance of the internet augments. To achieve high performance...
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of conference participants using multicast algorithms that minimize the amount of traffic sent over the network. This is far more effective than systems that maintain a separate link between each participant. On the other hand Peer-to-Peer...
Locality promotion in P2P content distribution networks is currently a major research topic. One of the goals of all discussed approaches is to reduce the interdomain traffic that causes high costs for ISPs. However, the focus of the work in this field is generally on the type of locality information that is provided to the overlay and on the entities that exchange this information. An aspect that...
The Gnutella protocol of peer-to-peer (P2P) networks has undergone several changes since its inception in the beginning of this century. However, despite the large number of revisions to the original version of the protocol, Gnutella suffers from serious problems of dead searches, complexity in study of network topology and network overloading. In this paper, we report the development of a new P2P...
In Peer-to-Peer (P2P) networks if adversaries such as Sybil attackers have got most identities in the network, they will control routing table or traffic. In this paper, we propose a framework based on two complementary techniques to defense malicious node after they transmit data to other malicious peers instead of honest peers. The first approach, based on behaviors of destination nodes, is used...
Network coding is a promising enhancement of routing to improve network throughput and provide high reliability. It allows a node to generate output messages by encoding its received messages. Peer-to-peer networks are a perfect place to apply network coding due to two reasons: the topology of a peer-to-peer network is constructed arbitrarily, thus it is easy to tailor the topology to facilitate network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.