The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multicast has been being developed as a very promising technique to data delivery to a group of destinations simultaneously. Except of first implementation for multicasting in the Internet aka IP Multicast, for past few years some systems defined for end-hosts overlay network have been successfully designed and implemented. Additionally, overlay multicast defined for end-host based networks has been...
The traditional client-server architecture widely adopted on the Internet is not adequate to meet the increasing user loads and bandwidth demands in live streaming systems especially for multimedia content delivery. Peer-to-peer P2P) overlay networks provide excellent system scalability and high resource utilization, which make it an attractive solution to this problem. This paper considers a hybrid...
In the past few years, P2P file distribution applications (e.g., Bit Torrent) are becoming so popular that they are the dominating source of Internet traffic. This brings significant problems not only because the increasing P2P traffic costs most of network bandwidth, but also the overmuch P2P connections increase the burden on the end-users. In this paper we present a peers' popularity model that...
Mobile robot communication technology is one of the important research domains of multiple mobile robot cooperation technologies. It includes communication of the master to the slavers in which wireless mode is widely adopted and the slavers to slavers. This paper discusses the present situation of the key technologies in multiple mobile robot communication, include communication, topology structure,...
In order to achieve the self-adaptive architecture-centric services' selection, this paper put forward the design principle of topology routing about service nodes, a network structure is built that agent is viewed as the basic Internetware granularity unit; By virtue of P2P environment such as open, dynamic, varied and more controllable evolution character, it is done to expand the self-adaptive...
The unstructured P2P network become more and more popular with the easily global deployment and supporting fuzzy key match, but the unstructured P2P network has poor scalability because of the flood broadcasting. This paper put forward a balanced binary tree as the unstructured P2P network topology structure based on the existing problems of the unstructured P2P network topology structure, design...
Peer-to-peer (P2P) software as major Internet applications bring convenience and pleasure to users, while it becomes a nightmare for Internet service providers (ISPs) because they produce huge traffic on the network. The enormous traffic come from the fact that when P2P systems construct overlay networks, they ignore the underlying network topology, so most of the connections are between remote peers...
Monitoring traffic pattern is always an important approach to improve the performance of computer networks. In recent years, peer-to-peer (P2P) service gradually dominates the Internet traffic against traditional client-server (C-S) service such as Web. The changed situation of networks is mainly in two aspects. One is that popular P2P file-sharing applications require both board downstream and upstream...
Internet connected wireless multi-hop networks are an interesting alternative for providing broadband wireless access. In order for the network to be transparent, the same services need to be available as in standard infrastructure wireless deployments. However, there is a significant challenge in providing services such as authentication, name resolution, VoIP over multi-hop mesh networks as dedicated...
Rich information from various data sources has been recognized for enabling people to perform an efficient decision-making and problem-solving. According to thousands of data sources and numerous information types available at the edge of the Internet, the discovery of all potential data sources are needed to facilitate the procurement of rich information. However, current P2P approaches are limited...
Both Peer-To-Peer (P2P) and mobile ad-hoc networks (MANETs) aim to provide seamless connectivity and services in a dynamic and decentralised environment. These two technologies, if unified, may be able to realise MANETs as a viable commercial technology and will enable the development of widespread distributed applications for MANETs. The push towards wireless ubiquitous computing means that service...
One of the main disadvantages of monitoring systems based on smart Web sensors is the difficulty to have a complete access to all data. In fact, nearly everyone of the actual available systems use proprietary embedded software to perform measurements, because only the manufacturer knows the internal hardware architecture and as servers exchange information. Moreover, those systems are not able to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.