The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web service technology becomes popular in a growing number of applications. The field of application reaches from smart home over factory automation up to smart cities. One of the main aspects of this technology is a dynamic device and service discovery. For this purpose, the WS-Discovery standard is used. WS-Discovery supports two modes: an infrastructure-based and an ad hoc mode. The infrastructure-based...
MANETs are a group of wireless computers which do not have pre-existing infrastructure in the form of communication network. Administration of these kinds of networks are not dependent on any special user. There are many problems in the creation of MANETs. such as routing in wireless media, power consumption, transportability and efficiency. Here we have concentrated mainly on the importance of efficiency...
Mobile Ad Hoc networks (MANET) are essential in situations where no communications infrastructure exists and the communicating entities are mobile. Design of such MANETs face serious challenges due to the dynamic topologies resulting in frequent route breaks and failed medium access attempts as nodes move and in some cases due to lack of scalable solutions as the number of communicating nodes increase...
This paper proposes Peer-to-Peer (P2P) Communication to share the resources in fast manner with the help of large area communication between the nodes in the network. The big size and good stability properties of P2P files in network give rise to the use of highly effective capacity planning and topology matching techniques as a promising solution to manage P2P communications in shared area network...
Wireless Sensor Networks (WSNs) consist of multiple, distributed nodes each with limited resources. With their strict resource constraints and application-specific characteristics, WSNs contain many challenging trade-offs. This paper proposes a bio-inspired load balancing approach, based on pheromone signalling mechanisms, to solve the trade-off between service availability and energy consumption...
Mobile ad-hoc network (MANET) is an energy constraint multi-hop network and its nodes have routing capability with limited battery power. In such a network, establishing a correct and efficient route is a crucial design issue. But a more challenging goal is to provide an energy-efficient multi-hop route between source-destination pair. Thus, the routing protocols should setup an energy-efficient route...
As the most crucial Inter-domain protocol in the Internet, BGP undertakes indispensable responsibility in exchanging routing information across multi-domain networks, consequently it becomes one of the focuses for network attackers. Though there has been existed various schemes to solve the troublesome thing, no one can indeed become the final solution used in real life. As the earliest and comprehensive...
Communities, and the critical infrastructure that they rely upon, are becoming ever increasingly integrated into cyberspace. At the same time, communities are experiencing increasing activity and sophistication from a variety of threat agents. The effect of cyber attacks on communities has been observed, and the frequency and devastation of these attacks can only increase in the foreseeable future...
The P2P data integration system aims to combine the advantages of P2P technologies and data integration to overcome centralized data integration systems' shortcomings. Kademlia, as a widely used and efficient network protocol for P2P files sharing system, has a very clear logical structure, and with its unique identifying pattern of nodes and XOR metric for distance, it can provide O(logn) lookup...
The consistent performance, energy efficiency, and reliability are important factors for real-time monitoring of a patient's data, especially in a hospital environment. In this paper a routing protocol is proposed by considering the Quality of Service requirements of the body area network data packets. A mechanism for handling delay-sensitive packets is provided by this protocol. Extensive simulations...
Botnets denote collections of compromised computers under adversary control and, although early botnets using centralized command and control (C&C) structures were fairly easily defeated, botnets remain a serious global security threat. in part, this is due to the evolution within the adversarial communities using highly diffuse decentralized peer-to-peer (P2P) based C&C...
We propose and present a framework for enabling policy-based routing in mobile ad hoc networks (MANETs) by applying policy rules associated with the security and reliability (of connection) to peer-to-peer security associations (SA) that are established on (multi-link) routes. In this proposal, we leverage and integrate the concept of dispersity routing with the management and maintenance of an existing...
Although the Internet achieved tremendous success in the recent decades, several limitations have emerged from recent technical advancement and challenging requirements of diverse applications. For overcoming these limitations, the future Internet can be redesigned in the “clean slate” basis. This paper proposes a novel architecture that considers both horizontal and vertical separations called, Domain-Insulated...
In recent years, Peer to Peer system has shown tremendous growth enabling millions of concurrent users exchange information seamlessly. Kad is a Kademlia-based Distributed Hash Table implementation in real P2P applications which has millions of simultaneous users as to date. However, it comes with several vulnerable features which allow attacks, especially DDoS attacks. In this paper, we proposed...
A peer-to-peer (P2P) file sharing system provides a platform that enables users to share their files. Retrieving files efficiently and trustworthily in such a large and jumbled system is critically important. However, the issues of efficient searching and trustworthy searching have only been studied separately. Simply combining two separate strategies dealing with each issue doubles system overhead...
Internet Service Providers (ISPs) need to balance multiple opposing objectives. On one hand, they strive to offer innovative services to obtain competitive advantages; on the other, they have to interconnect with potentially competing ISPs to achieve reachability, and coordinate with them for certain services. The complexity of balancing these objectives is reflected in the diversity of policies of...
Lately, access loads on servers and network traffic are increasing due to larger content-size and higher request-frequency in content distribution networks. Breadcrumbs (an architecture with guidance information for locating a content cache) is designed to reduce server-loads and to form content oriented network autonomously in cooperation with cached contents. We also proposed Breadcrumbs+ which...
In order to improve the searching efficiency of the classical Chord algorithm which is applied to the second generation of P2P network, we studied the Chord algorithm based on the polycyclic structure. Combining the multi-ring structure with group structure, polycyclic Chord algorithm links the whole nodes into multiple rings with recursive algorithm and uses active node in one group to record all...
This paper analyzes the applicability of existing communication technology on the Smart Grid. In particular it evaluates how networks, e.g. Peer-to-Peer (P2P) and decentralized Virtual Private Network (VPN) can help set up an agent-based system. It is expected that applications on Smart Grid devices will become more powerful and be able to operate without a central control instance. We analyze which...
In Chord protocol of P2P network, distances between entries in routing table are too long and only half of the identifier space can be covered. To solve this problem, a higher order Chord routing algorithm is proposed. The algorithm presents a new structure formula for routing table, increases distribution density of routing table entries, and extends routing searching coverage areas to the entire...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.