The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When a content provider (CP) provides peer-to-peer live streaming service, routing decisions based on the knowledge of underlay traffic could lead to much better performance (such as user delay). On the other hand, if the Internet Service Providers (ISPs) provide underlay traffic information to the CP, their overall network cost due to routing inefficiencies could be reduced. There is hence incentive...
Internet Service Providers (ISPs) have failed to independently reduce the cost peer-to-peer (P2P) traffic. Traffic- throttling devices increase user download times, and caches store content that may infringe copyright. We propose ISP-Managed P2P (IMP): a transparent peer-discovery service that returns peers favorable to ISPs. Unlike similar services, IMP does not require the direct support of developers...
In Peer-to-Peer (P2P) networks a malicious peer can control the direction of the traffic after it controls lots of bots. This paper focus on defending Distributed Denial of Service (DDoS) attack in P2P networks by selecting the most active peer with its credit values which is recorded in a period of Credit Construction time. The Credit values can be updated in the lest period. We propose Scheduler...
The IEEE 802.15.4 standard was developed for the purpose of media access control of low power wireless personal area networks. Wireless sensor network devices have the general characteristics of low power capabilities and operation. From this point of view, it makes technical sense to use the IEEE 802.15.4 standard for the MAC layer of wireless sensor networks. There are several modes of operation...
P2P application has accounted a large proportion of the total Internet traffic. However, existing P2P topology formation protocols always assume a homogeneous environment or neglect the underlying Internet topology. These methods will increase inter-domain traffic so that ISPs always restrict the P2P traffic and current neighbor selection procedure always randomly chooses a peer as its neighbor probably...
Clustering is a useful mechanism in wireless sensor networks that helps to cope with scalability problems and, if combined with in-network data aggregation, may increase the energy efficiency of the network. At the same time, by assigning a special role to the cluster head nodes, clustering makes the network more vulnerable to attacks. In particular, disabling a cluster head by physical destruction...
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of conference participants using multicast algorithms that minimize the amount of traffic sent over the network. This is far more effective than systems that maintain a separate link between each participant. On the other hand Peer-to-Peer...
Certificate validation based on PKIX protocols does not work well under the particular conditions found in a MANET: Episodic connectivity and low bandwidth. We propose an overlay network of validation proxy servers which exploit cooperative caching of recent validation results. The proxy overlay improves the availability of the validation service and reduces the network traffic. The design employs...
Today, most P2P applications do not consider locality on the underlying network topology when choosing their neighbors on the P2P routing layer. As a result, participating peers may experience long delays and peers' ISPs suffer from a large amount of (costly) inter-ISP traffic. One potential solution to mitigate these problems is to have ISPs or third parties convey information regarding the underlying...
The challenges of optimal flooding of network control messages in mobile ad-hoc network (MANET) have been well studied in the literature [2]-[10] and [12]-[19]. A particular case of this problem is encountered in MANET routing protocols, which need to distribute routing control information to all member nodes as efficiently as possible. While both proactive and reactive MANET routing protocols exist,...
Peer-to-peer (P2P) systems, which are realized as overlays on top of the underlying Internet routing architecture, contribute a significant portion of today's Internet traffic. They have recently absorbed a lot of attention from the Internet users and the research community. Regarding the difficulty and cost for a large scale living deployment, many proposed P2P protocols were evaluated by a simulator...
This article presented landmark overlays for urban vehicular routing environments (LOUVRE), a density-based landmark overlay routing protocol for urban vehicular environments. We described the concept and the protocol as well as a novel distributed traffic density estimation scheme. We implemented the protocol in Qualnet and evaluated the feasibility of LOUVRE by comparing it with the benchmarks GPSR...
In Peer-to-Peer (P2P) networks if adversaries such as Sybil attackers have got most identities in the network, they will control routing table or traffic. In this paper, we propose a framework based on two complementary techniques to defense malicious node after they transmit data to other malicious peers instead of honest peers. The first approach, based on behaviors of destination nodes, is used...
Link-state routing with hop-by-hop forwarding is widely used in the Internet today. The current versions of these protocols, like OSPF, split traffic evenly over shortest paths based on link weights. However, optimizing the link weights for OSPF to the offered traffic is an NP-hard problem, and even the best setting of the weights can deviate significantly from an optimal distribution of the traffic...
In this paper, we perform an extensive measurement study on a multi-tier mesh network serving 4,000 users. Such dense mesh deployments have high levels of interaction across heterogeneous wireless links. We find that this heterogeneous backhaul consisting of data-carrying (forwarding) links and non- data-carrying (non-forwarding) links creates two key effects on performance. First, we show that low-rate...
Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over multi- hop wireless networks. Despite these advances, however, no prior work identified severe throughput imbalances in the basic scenario of mesh networks, in which one-hop flows contend with two-hop flows for gateway access. In this paper, we demonstrate via real network measurements, test-bed...
In a broadcasting problem, a message is sent from a source to all the other nodes in the network. Blind flooding is a classical mechanism for broadcasting, where each node retransmits received message to all its neighbors. Despite its important advantages, an increase in the number of requests or the size of the routing area produces communication overheads that limit the scalability of blind flooding,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.