The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite much recent research on peer-to-peer (P2P) protocols for the Internet, there have been relatively few practical protocols designed to explicitly account for Network Address Translation gateways (NATs). Those P2P protocols that do handle NATs circumvent them using relaying and hole-punching techniques to route packets to nodes residing behind NATs. In this paper, we present Croupier, a peer...
The Multimedia Information Retrieval (MIR) in the P2P networks has been widely studied. In this paper, we propose a new comprehensive similarity function to calculate the similarity of peers in the P2P networks so as to classify these peers. We also apply the relevance feedback in the process of retrieval in order to improve the speed and accuracy of retrieval. In simulation, we compare our algorithm...
Over the years, peer-to-peer networks have emerged as one of the most popular file sharing medium over The Internet, capable of providing user anonymity to the clients if desired. However, modern P2P networks suffer from the bane of malicious entities we refer to as Sybils, which forge multiple identities to negatively influence or even control the entire network. This paper suggests a novel solution...
Traffic engineering and an economical provisioning of bandwidth is crucial for network providers in times of high competition in broadband access networks. We investigate the efficiency of caching as an option to shorten end-to-end paths and delays while at the same time reducing traffic loads. The portion of HTTP based distribution of cacheable content on the Internet is increasing in recent time...
Peer-to-Peer (P2P) networks are widely used in today's Internet. Researchers claim that churn could bring down the performance in p2p networks. AS churn is an inherent character. Researchers want to find some ways to keep down. We investigate this in another point of view, from the searching aspect, churn can bring up search efficiency for repeated search. In this paper, we build a novel peer to peer...
The Minimum Spanning Tree (MST) problem is one of the most popular and important problems in the research area of distributed computing and networks. Contrary to the theoretical models where we usually have a global knowledge of all nodes and the corresponding distances for MST construction, in a realistic network (e.g., Internet) a node always has to rely on local knowledge only, that is it neither...
Over the last years many technological advances were introduced in Internet television to meet user needs and expectations. However due to an overwhelming bandwidth requirements traditional IP-based television service based on simple client-server approach remains restricted to small group of clients. In such situation the use of the peer-to-peer overlay paradigm to deliver live television on the...
Educational resources is very rich, but the utilization rate is very low. There is a lot of redundancy and waste., To the whole education it would be a big step forward if We can integrate educational resources with the Internet to achieve the sharing of resources. peer-to-peer technology to share resources solves the problem. But some of the shortcomings of its own bring a number of other issues...
Network security problems emerge in an endless stream and cause the inestimable damage. To solve network security problems efficiently, it is not enough to make good protection at nodes or protect networks from outside attacks. Many network security problems should be solved efficiently in collaborative approaches which can integrate various resources over internet to defense network security. In...
Despite the popularity of streaming applications over Internet, little is known about its practical properties which could be potentially exploited to guide the system design of next generation peer-to-peer (P2P) networks. In this paper, we hence investigate the problem of understanding and supporting the two types of dominant streaming services - live broadcasting and on-demand streaming - with high...
IP address shortage over IPv4 is a big problem now, therefore the more massive deployment of NAT equipments is coming. One of the urgent problems for P2P is that how can each peer behind NAT find others and can establish direct connection to others. This paper discusses a TCP-based traversal model on the foundation of existing traversal methods having been analyzed, designs and presents the details...
File sharing is among the most important features of the today's Internet-based applications. Most of such applications are server-based approaches inheriting thus the disadvantages of centralized systems. Advances in P2P systems are allowing to share huge quantities of data and files in a distributed way. In this paper, we present extensions of JXTA protocols to support file sharing in P2P systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.