The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increasingly development of P2P in recent years, the operational mechanism of P2P application has varied, it's very difficult to distinguish P2P traffic from normal traffic by using single traffic characteristics. The paper put forward a method of P2P traffic identification based on multi-dimension characteristics. Extracting multi-dimension characteristics of P2P application such as ratio...
Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. In this paper,...
The Vivaldi algorithm is known to be one of the most interesting approaches for the calculation of Internet coordinates. It is a fully distributed, light-weight and adaptive algorithm. Recent studies show that host coordinates in the Vivaldi system are not stable and are drifting rapidly even when the network delays do not change. In this paper we observe that, despite the instability of Vivaldi coordinates...
Web content plays an important role in the contemporary information economy. Even though web content is used to generate advertising revenues for authors, and serves as an important reference and knowledge discovery resource for readers, proving original authorship and preventing plagiarism are not easy on the Internet. This paper presents the design and analysis of an automatic cryptography based...
In peer-to-peer file sharing systems, file replication technology is widely used to reduce hot spots and improve file query efficiency. Most current file replication methods replicate files in all nodes or two end points on a client-server query path. However, these methods either have low effectiveness or come at a cost of high overhead. File replication in server side enhances replica hit rate,...
Resource discovery in structured and unstructured peer-to-peer (P2P) systems have been extensively studied. However, most of such systems are not designed to take advantage of node heterogeneity. Previous researchers have obtained the result that, to keep system performance high, the resources of nodes should serve queries in different ranges according to their different characters. Based on the above...
The BitTorrent protocol is by far the most popular protocol for offline peer-to-peer video distribution on the Internet. BitTorrent has previously been extended to support the streaming of recorded video, that is, Video-on-Demand (VoD). In this paper, we take this support for video streaming a step further by presenting extensions to BitTorrent for supporting live video streaming, which we have implemented...
A grid system connects a huge number of computers in the Internet. It integrates the distributed computational resources and data resources. A complex grid system needs to have a characteristic of self-managing. Autonomic computing aims to overcome the rapidly growing complexity of computing system management. It can be implemented to manage complex computing resources in grid systems. We present...
The amount of text data on the Internet is growing at a very fast rate. Online text repositories for news agencies, digital libraries and other organizations currently store giga and tera-bytes of data. Large amounts of unstructured text poses a serious challenge for data mining and knowledge extraction. End user participation coupled with distributed computation can play a crucial role in meeting...
Massive multiuser virtual environments (MMVEs) and the idea of a global scale 3D Web have grown popular in recent years. While commercial precursors of such environments for the most part rely on centralized client/server architectures, it is commonly accepted that a global scale virtual online world can only be realized in a distributed fashion. Within the HyperVerse project, we have developed and...
Peer-to-peer technology has become an extremely popular Internet application technology. This technology opens enormous business opportunities to the Internet and also seriously interferes with the quality of the Internet service. The traditional single deep flow inspection or deep packet inspection detection systems have owns merits and demerits. This paper describes a new peer-to-peer traffic identification...
BitTorrent has emerged as an effective peer-to-peer application for digital content distribution in the Internet. However, selecting peers in BitTorrent for efficient content distribution still poses a number of challenges due to high heterogeneities of peers with varied rates of uploading bandwidth and dynamic content. This paper presents GA-BT, a genetic algorithm based peer selection optimization...
With the advancement of peer-to-peer technology, media streaming applications become more and more popular in the Internet. However, the traditional development methods for this kind of applications need developers not only to consider the application logic but also to manage the dynamics of Internet resources, thus increasing the difficulty of development and limiting the deployment of personal video...
As demand for high fidelity multimedia content has soared, content distribution has emerged as a critical application. Large multimedia files require effective content distribution services such as content distribution networks (CDNs). A recent trend in CDN development is the use of peer-to-peer (P2P) techniques to enhance scalability, fault resilience, and cost-effectiveness. Unfortunately, P2P-based...
This paper imports the concept of domain to design a resource locating model with local domain first based on Kademlia protocol, which is abbreviated to LDF-KAD, to refer the small world phenomenon and the characteristic of localized dataflow first on the Internet. The LDF-KAD model includes two layers structure that are super node layer and general layer. And super node layer consists of all super...
For the flooding problem in Gnutella, a text retrieval method is proposed in unstructured P2P networks based on small world models. Each node in the P2P networks maintains several long-link neighbors and short-link neighbors to build a small world P2P networks. Neighbors update is processed during the query and response. And after each query, weights of the words in documents of neighbor nodes will...
Load balancing among application layer peer-to-peer (P2P) networks is critical for its effectiveness but, are considered to be the most important development for next-generation Internet infrastructure. Most structured P2P systems rely on ID-space partitioning schemes to solve the load imbalance problem and have been known to result in an imbalance factor of ?? (log N) in the zone sizes. Two important...
With the development of P2P technology, research on flexibility of P2P system will be the leading direction in the P2P technology research. Through in-depth analysis the "platform/plug-in" architecture, this paper puts forward a design of P2P system based on "JXTA/Plug-in", it not only solutes the interoperability problem of heterogeneous P2P system, and implement the function...
Reduction of overhead is essential in increasing the scalability and power efficiency of peer-to-peer (P2P) file sharing systems for mobile ad hoc networks (MANET). Previously researchers mainly focused on reducing overhead of query process, and paid little attention to file transfer process. This paper presents a cluster-based P2P file sharing protocol for MANET, focusing on file transfer process...
Caching can improve the browser's efficiency, this paper proposes one distributed sharing model of the browser cache: each end-host's address and the Web site URL address are mapped to the identical key space, the storing information of the shared cache mapped to key k is saved on the same key k mapped end-host; it also presents a distributed lookup protocol with a constant O(1) hop per lookup request,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.