The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Source code compiling is a non-trivial task that requires many computing resources. As a software project grows, its build time increases and debugging on a single computer becomes more and more time consuming task. An obvious solution would be a dedicated cluster acting as a build farm, where developers can send their requests. But in most cases, this solution has a very low utilization of available...
Three stakeholders come into play in peer-to-peer (P2P) video-on-demand (VoD), namely peers/viewers, content providers and ISPs. Different design choices have been proposed to improve quality of user experience, to bring down content server bandwidth cost and to reduce ISP-unfriendly traffic. However, it is unclear whether the ability of these design choices to meet interests of one stakeholder comes...
Conventional distributed system courses follow a syllabus in which a list of topics is discussed independently and at different levels of abstractions. We propose to use a wireless sensor network environment to pin all topics down to concrete applications and to maintain issues such as fault tolerance and coordination continuously present. We describe a syllabus with eight conceptual modules, each...
The emerging trends of designing commodity based supercomputing systems have a severe detrimental impact on the Mean-Time-Between-Failures (MTBF). The MTBF for typical HEC installations is currently estimated to be between eight hours and fifteen days. Failures in the interconnect fabric account for a fair share of the total failures occurring in such systems. This will continue to degrade as system...
Today almost all organizations have improved their performance through allowing more information exchange within their organization as well as between their distributers, suppliers, and customers using web support. Databases are central to the modern websites as they provide necessary data as well as stores critical information such as user credentials, financial and payment information, company statistics...
The traditional database is designed for the structured data and the complex query. In the environment of the cloud, the scale of data is very large, the data is non-structured, the request of the data is dynamic, these characteristics raise new challenges for the data's storage and administration, in this context, the NoSQL database comes into being. The article compares and analyzes the general...
Very often, network users expect to access services relevant to their locations, whilst preserve their privacy without disclose their exact locations. The well-known privacy preserving method is the spatial cloaking technique where exact user locations are blurred into a cloaked region to meet the privacy requirement, e.g. k-anonymity. Most of current solutions are designed with a centralized architecture...
The novelty of the peer-to-peer (P2P) paradigm relies on two main concepts: cooperation among users and resource sharing. There are many applications based on peer-to-peer paradigm, but the most popular one is the file sharing. We can classify the file sharing application into centralized systems, (having a central server), and decentralized systems. Another classification would be structured and...
Video multicast is an important application for P2P networks, which can benefit from the load repartitioning and large scale distribution properties they offer. In this context, the Orchard algorithm was developed in 2007, with an aim to build a P2P system meeting video multicast requirements. However, Orchard suffers from a slow overlay construction and a potentially high end-to-end delay. In this...
Unlike peer-to-peer (P2P) file sharing, P2P live streaming systems have to meet real-time playback constraints, which makes it very challenging yet crucial to maximize the peer uplink bandwidth utilization so as to deliver content pieces in time. In general, this is achieved by adopting tailor-made piece selection and request-peer selection algorithms. The design philosophy is to regulate the network...
The corporate network is often used for sharing information among the participating companies and facilitating collaboration in a certain industry sector where companies share a common interest. It can effectively help the companies to reduce their operational costs and increase the revenues. However, the inter-company data sharing and processing poses unique challenges to such a data management system...
Measurement studies of YouTube show that there are some distinctive properties regarding to video sharing service, e.g., small clip size, suggestion links between related clips. This observation motivates us to explore the possibility to use peerassisted approach to offload content providers. Specifically, we want to leverage the suggestion links between video clips to construct cooperative caching...
In this paper, we propose a new kind of P2P traffic control technique, called Netpherd exploiting the peer selection adaptation (i.e., preferring peers who are likely to provide better performance). Netpherd tries to enable the peers to communicate with the peers of the local domain by manipulating network performance (i.e., adding an artificial delay to the inter-domain traffic) at network device...
The Object Naming System (ONS) is a central lookup service used in the EPCglobal network for retrieving location information about a specific Electronic Product Code (EPC). This centralized solution lacks scalability and fault tolerance and encounters some political issues. We present the design principles of a fully-distributed multi-root solution for ONS lookup service. In distributed systems, the...
Current ubiquitous computing technologies provide access to customized, contextual, and location-based services. Device mobility, however, is frequently associated with communication delays, link disruptions due to signal loss, and changes in IP address. As a result, connection-oriented applications may fail and node location strategies should not rely on node addresses. In this paper, we propose...
Recently there has been an emergence of large, indefinite length data (video) streams as used in many computer vision problems. There is now a requirement to transmit these streams between remote locations where post-processing may occur and the results of this may be released to further remote locations for additional post-processing. Using two main networking theories, Chord and the Publish/Subscribe...
In current Internet, the most significant and the growing promotion rate of the network resources usage is due to the Peer to Peer(P2P) applications. These studies show us that the main traffic type, that Internet Service Providers (ISPs) should route, is P2P traffics. Since P2P overlay network model is networkoblivious, due to its nature, it causes inefficient network utilization, and low quality...
Content Distribution currently accounts for the vast majority of Internet traffic. Peer-to-Peer represents a scalable and inexpensive strategy to deliver content to end-customers; unfortunately, it poses a sever strain on the network core and generates high costs for service providers. Locality-aware policies have been proposed to tackle these issues, but their effectiveness is limited by the low...
More that 70% of all Internet hosts are behind network address translation (NAT) devices. In this paper, we study the impact of the NAT devices on application layer traffic optimization (ALTO) schemes. NAT brings forth difficulty if not impossible for peers to connect to one another, which may lead sever performance penalty of P2P applications. Most locality-aware P2P systems only consider network...
Recently peer-to-peer (P2P) live streaming has become a promising approach for delivering videos on massive scale on the Internet. The popularity of various P2P streaming systems have now driven Internet Service Providers (ISPs) to carry huge intra/inter-domain video traffic. To reduce costs, ISPs have attempted to deploy traffic shaping measures while P2P streaming systems have attempted to apply...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.