The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For a scalable Massively Multiplayer Online Game (MMOG), interest management (IM) is an essential component to reduce unnecessary network traffic. As Area-Of-Interest (AOI) defines each player's interests, an entity normally maintains a subscriber list of players whose AOIs cover the position of the entity. To maintain the subscriber list, players are required to send AOI updates. Unfortunately, AOI...
A Hierarchical Automatic Number Allocation (HANA) protocol, which allocates locators to ASes hierarchically, is one solution for the problem of BGP table increase. We describe hierarchical inter-AS locator allocation by HANA and emulate locator allocation on a huge-scale network consisting of 10,000 ASes, which are extracted from the actual Internet topology. We prove that locator allocation was accomplished...
Vast amounts of access/service requests toward particular websites may occur in a short period of time, triggered by specific events, such as natural disasters and breaking news. These HTTP requests can occur unexpectedly and can disable the website when the quantity exceeds capacity. In order to address the problem, we propose a Distributed Hash Tables (DHT) based HTTP access control system using...
In this paper, we make an in-depth investigation on the issue of distributing link stress. It is a fundamental problem in popular Internet TV systems because the service quality at the receiving side is determined by network congestion and bandwidth usage of the links. Less congestion level and balanced bandwidth usage enable IPTV systems to accommodate more subscribers and service channels, which...
This paper presents the development of a secure file sharing mechanism in JXTA, a universal platform independent Peer to Peer (P2P) environment. Digital Signatures are chosen as the tool for ensuring authenticity and integrity of shared files in a hybrid P2P environment. The application developed is based on JXSE, the Java implementation of JXTA and reuses CMS as an early realization of Content Management...
Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, this study is aimed at reconstructing scenarios of attacks performed by bot net on the Testbed@TWISC platform in such a way that the behavior of the...
Caching consistency in a MANET environment is an important issue as it is directly related to MANET connectivity. However, existing cooperative caching schemes mostly focus on delta and/or weak consistency. Recently, RPCC was proposed, but it cannot overcome traditional PUSH and PULL methods in terms of ensuring a strong consistency. In this paper, we propose three algorithms that are based on the...
In this paper we discuss the issues relating to architecture formation in MMOGs and the two principal design choices that must be made when constructing a Peer-to-Peer (P2P) MMOG: the Area of Interest Management (AoIM) scheme and the distribution and communication mechanism. We introduce an updated survey of the state-of-the-art of AoIM in P2P Online Games. We identify key issues in the development...
In conventional security mechanism, security services based on symmetric key cryptography assume keys to be distributed prior to secure communications. The core function of exchanging and sharing a secret key between two endpoints are the secure key management methodology which is one of the most critical elements need to be more concerned when integrating cryptographic functions into the system....
Current Internet architecture is challenged by the overwhelming multiplication of available content and the increasing requirements of the content delivery applications. Content Delivery Networks have been playing a catalytic role in content delivery solutions, replicating (caching) content at the edges of the network. In this paper, we investigate the role and the benefits of a more flexible and...
User Domains gathers and combines resources from multiple sources to create a per-user geographically distributed heterogeneous virtualization platform where user-provided virtual machines can be executed in user mode. To address the challenge of building a global computing infrastructure it is necessary to provide a communication overlay able to deal with the existence of computing facilities located...
Distributed Virtual Environments (DVEs), like Massively Multiplayer Online Games(MMOG) are attracting millions of users from all over the world. However, as the number of simultaneous users keeps growing, the current used Client/Server infrastructure technologies are showing their limits on the side of the practicality and applicability. As a consequence, novel solutions based on Cloud and P2P architectures...
One of the key research items of Content-Centric Networking is how to develop more efficient cache replacement policies, and most of the existing approaches have their foundations with dated web environments while considering little of the dynamicity of user interests. In this paper, we propose a new cache replacement policy, named as the “Recent Usage Frequency (RUF).” In order to deal with dynamic...
Distributed Denial of Service attacks of today present a difficult challenge to the network administrators as well as to the users of the Internet. Distributed Denial of Service war field launched by hackers using malicious botnets are evolving day by day. As new countermeasures are developed or mitigate Distributed Denial of Service attacks, attackers are constantly developing new methods to circumvent...
Active learning or working by means of online laboratories is especially valuable for distance working or education. Users in the workplace can access remote laboratories without having to travel. This flexibility is important for teleworking, education and lifelong learning. The implementation and maintenance of online labs is expensive and partially associated with high administrative efforts. These...
With the proliferation of location awareness in smartphones, location-based services (LBSs), such as finding nearby Sushi restaurants, have become popular. In traditional LBS applications, the user's location is sent from her smartphone to an LBS server over the Internet and the LBS server then serves the information from its database. We observe that people who share space-time context may have overlapping...
Most home computers have upload bandwidths that do not allow them to stream good quality video. As a result, they cannot fully participate in peer-to-peer video streaming solutions. We propose to address that issue by letting these clients use the storage space they have on one or more remote servers. Each time a client plays a streaming video, it will upload a copy of that video to one of these servers...
Using Peer-to-Peer (P2P) overlay networks have become a progressively popular approach for streaming live media over the Internet due to their deployment simplicity and scalability. In this paper, we propose a new hybrid push-pull live P2P video streaming protocol called PPM that combines the benefits of pull and push mechanisms for video delivery. Our main goal is to minimize the network end-to-end...
Vehicular network is different from wired network due to its network environment changes rapidly. The connection lifetime between vehicles is usually short because vehicles move in high speeds. Hence, deploy peer-to-peer (p2p) applications over vehicular network is a challenging research issue. There are many problems confronted in p2p file sharing, e.g. how to search files effectively, how to share...
Among different emerging disruptive technologies, P2P computing has shown its usefulness in designing decentralized and scalable online learning systems. One important feature of P2P systems explored in this context is that of direct peer-to-peer communication. It has been shown in several recent research works that the direct communication between peers increases the interaction among peers and eventually...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.