The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer to Peer (P2P) computer networks rely on direct connections between participants instead of conventional centralized resources. These networks are useful for many purposes, but the killer application nowadays is file sharing. BitTorrent is a very popular protocol for this matter. In this paper, we use a multi-agent model of a BitTorrent network. In it, each BitTorrent client is an agent that interacts...
BitTorrent is the most widely used Peer-to-Peer (P2P) protocol and it comprises the largest share of traffic in Europe. To make BitTorrent more Internet Service Provider (ISP) friendly, BitTorrent Inc. invented the Micro Transport Protocol (uTP). It is based on UDP with a novel congestion control called Low Extra Delay Background Transport (LEDBAT). This protocol assumes that the receiver always gives...
Traditional Infrastructure-as-a-Service offerings provide customers with large numbers of fixed-size virtual machine (VM) instances with resource allocations that are designed to meet application demands. With application demands varying over time, cloud providers gain efficiencies through resource consolidation and over-commitment. For cloud customers, however, this leads to inefficient use of the...
Traditional low-latency anonymization techniques apply non-standardized, complex, and often even proprietary protocols. Apart from poor performance, the high development effort leads to the existence of at most one single implementation. This in turn increases the risk of creating so-called software monocultures, where failures in the single implementation can compromise the overall security. In this...
In this paper, we present the design of Social BitTorrent Agent (SBTA). Through SBTA, BitTorrent users can be organized into a friend group in which as one member start downloading files, it will multicast the corresponding torrent files to other members who are also interested. In this manner, torrent files can be quickly spread to a large number of BitTorrent clients, and BitTorrent Swarm will form...
Two-way relay transmission (TWRT) is more spectral efficient than direct transmission (DT) and one-way relay transmission (OWRT). In this paper, we try to find out if TWRT is also more energy efficient in practice. To this end, we first derive and compare the energy efficiency of DT, OWRT and TWRT systems, when either the receiver processing power consumption is taken into account or not. We then...
Multipacket reception (MPR) capability provides the opportunity to improve bandwidth utilization while reducing complexity of the medium access control layer. Specifically, it has been shown that ALOHA random access tends to become asymptotically optimal as the receiver's joint decoding capability of the receiver grows to infinity. However, the average traffic offered to the medium is required to...
The asymptotic signal bandwidth of various kinds of large-scale asynchronous Time Hopping Impulse Radio Ultra-Wide Band (TH-IR UWB) communication networks such that multiple access interference can be negligible with respect to output noise with high probability is derived. The asynchronous TH-IR UWB communication networks consist of n nodes distributed in a cube (three-dimension) or on a square (two-dimension)...
Existing mesh-push approaches for peer-to-peer live streaming systems have been reported to significantly reduce diffusion latency, overlay- construction difficulty, maintenance complication, and churning impact. However, those approaches incur excessive duplicate data and result in bandwidth inefficiency due to stale information as well as chunk synchronicity problems. In this paper, we propose a...
We develop and evaluate a rate-allocation multipath algorithm for delivery of video in a Video-on-Demand (VoD) system built upon an overlay network. To evaluate how well the rate-allocation algorithms approach the optimum, we have earlier built a benchmarking system that provides the optimal solution for assigning available bandwidth to delivery paths. This solution is also proportionally-fair. We...
In the recent years, video and audio streaming have been very popular in the Internet and accounts for excessive traffic not only in the Internet, but also in many private networks. Transferring this amount of traffic needs both reliable and high performance infrastructure as well as efficient approaches to increase bandwidth utilization. Real-time playback deadline and robustness under high peer...
Parallel download protocols that establish multiple TCP connections to distributed replica servers have the potential to reduce file download time and to achieve a server-side load balancing. Unfortunately, parallel download protocols are also inherently unfair towards single-flow downloads and may even starve them. This paper presents TCP-ROME, a parallel download protocol that allows a dynamic mitigation...
Due to the unique characteristics of long signal propagation, high error rate and low bandwidth in the underwater environment, the design of the medium access control (MAC) protocol for underwater acoustic networks poses significant challenges. The previous MAC protocols designed for flexible communication models have limited achievements in performance. In this paper, we consider a practical application...
Online games and social networks are cross-pollinating rapidly in today's Internet: Online social network sites are deploying more and more games in their systems, while online game providers are leveraging social networks to power their games. An intriguing development as it is, the operational challenge in the previous game persists, i.e., the large server operational cost remains a non-negligible...
In wireless networks a packet can be lost due to numerous reasons, such as congestion, medium related errors, routing and mobility. In these scenarios, the real congestion status of the network is crucial to develop accurate and efficient congestion control protocols. Some of the most known and recent protocols developed to provide faster and lighter congestion control are the eXplicit Control Protocol...
Thanks to recent advances in hierarchical video coding and overlay network, layered overlay multicast has emerged as an important solution for video streaming over heterogeneous network. In this paper, we formulate it into a joint network flow control and performance optimization problem where adaptive layer rates are determined through a greedy algorithm close to optimal. The overlay network is constrained...
Nowadays, Peer-to-Peer (P2P) live streaming applications have attracted great interest. Despite the fact that numerous systems have been proposed in the past, there are still problems concerning delay and quality requirements of live video distribution. In this paper, we consider a pull-based P2P live video streaming system where the video is disseminated over an overlay network. We propose a mesh-based...
We consider the problem of distributing k blocks from a source to N nodes in a peer-to-peer (P2P) network with both node upload and download capacity constraints. As k scales up, we prove for homogeneous networks that if network coding is allowed, randomly matching senders and receivers in each time slot asymptotically achieves the maximum downloading rate at each node. For heterogeneous networks...
In this paper, we explicitly consider the scenario of supporting applications with high-bandwidth and low-latency requirements in mobile social networks (MSNs), by leveraging the existing social network sites. Our solution does not assume any centralized server who coordinates the data storage, access, and group management. We address the fundamental challenge supporting such applications, namely:...
With increasing needs of a live video streaming service to mobile devices, peer-to-peer video delivery is required to provide seamless quality of video even if a user moves across heterogeneous networks. In this paper, we address technical challenges and approaches to providing users a seamless video quality in P2P-based live video streaming services over mobile heterogeneous networks by investigating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.