The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An increasing number and variety of devices are connected to the Internet. Thus, it is expected that peer-to-peer (P2P) networks, which have no central servers, will solve the server overload issue in the client-server communication model. Among P2P information search schemes, we focus on Skip Graphs, because they exhibit strong churn resilience and have a range search function, which is desirable...
CCN (Content Centric Networking) is a new network architecture, which is optimized for content distribution by introducing route cache and request aggregation. However, current CCN is still similar to traditional Client/Server network architecture, with limited cache space, and the request aggregation policy is suitable for live streaming media rather than streaming media on demand. The main reason...
Opportunistic networks (OppNet) enable users to connect each other via wireless communication without connecting to the Internet. These networks have fragile structures and the topology of the network is changed frequently, so it is impossible to have a Trust Third Party as a certificate authority. There are many different attacks against these networks and one of them is Sybil Attack. In this paper,...
Through detailed analysis of scores of publicly available data sets corresponding to a wide range of large-scale networks, from communication and road networks to various forms of social networks, we explore a little-studied geometric characteristic of real-life networks, namely their hyperbolicity. We provide strong evidence that large-scale communication and social networks exhibit this fundamental...
We study decentralized searches in large-scale, self-organized peer-to-peer networks and investigate the influences of network size and degree distribution (neighborhood size) on search efficiency. Experimental results show that searches are efficient and scalable in large networks, especially with large neighborhood sizes (degrees). Analysis of the data supports a proposed scalability model, in which...
Current revision control systems are commonly used in a distributed fashion but rely on centralized stores and low-latency communication. In this work we evaluate how they would fare in fully distributed high latency networks such as delay tolerant networks (DTNs). We show that current revision control systems impose significant costs under these conditions even in moderately-sized networks. By simplifying/improving...
In the Internet of Things (IoT) scenario, the block-chain and, in general, Peer-to-Peer approaches could play an important role in the development of decentralized and dataintensive applications running on billion of devices, preserving the privacy of the users. Our research goal is to understand whether the blockchain and Peer-to-Peer approaches can be employed to foster a decentralized and private-by-design...
The growth of data at an unprecedented rate poses challenge on its storage and analysis. To cope up with this, new machines are procured on a regular basis. On the other hand, a lot of computing resources in Institute labs, government offices etc. remain underutilized, since they are used for Internet and basic utilities. The aggregation of these underutilized resources can be more than handful to...
Decentralized systems, such as overlay networks or content delivery networks, form a virtual network on top of a physical network leading to inefficiencies in handling network traffic as physical locations are not considered. Therefore, this work investigates, analyzes, and evaluates two feasible network locality metrics for decentralized systems to overcome such inefficiencies. Furthermore, those...
This paper studies the accuracy of a fully-distributed pattern recognition algorithm, namely the P2P-GN, with imbalanced datasets problem which is often neglected by most of the available distributed algorithms. A major distinction of the P2P-GN compared to the other approaches is that it forms a single global classifier, instead of building many local classifiers (one at every site). Fine-granularity...
Following the emergence of peer-to-peer (P2P) applications, millions of computer users have used P2P systems to search for desired content. P2P traffic is known to be highly redundant because of its inherent self-scaling characteristics, which means that file sharing is performed more efficiently when more users exchange the same content. To remove redundant P2P traffic, we have proposed a method...
Overlay solutions of SDN-based networks became very popular. Controller as a centralized management devices gather information about network topology and current network state. Overlay network have a lot benefits however the using of classical traffic engineering principles for traffic management in Software-Defined Network is becoming problem. The physical network does not automatically adapt to...
Due to the Internet usage evolution over these last years, the current IP-based architecture becomes heavier and less efficient for providing some Internet services. In order to face this shortcoming, “Content Centric Networking” has been proposed. One of its important features is to exploit in-network caching as a mean to improve network's performance and services' scalability. However, in most of...
file sharing applications that operate as form of peer-to-peer (P2P) networks have been popular amongst users and developers for their heterogeneity and easy deployments features. However, they have been used for illegal activities online. This brings new challenges to forensic investigations in detecting, retrieving and analysing the P2P applications. We investigate the characteristics of I2P network...
In current Internet, most of the traffic dedicated to video streaming applications. In recent years, Peer-to-Peer (P2P) streaming approach has gained more attention, due to the high cost of providing the required bandwidth for a large number of users in Client-Server model. Mesh-based peer-to-peer video streaming is a robust approach which recently employed in many multimedia networking applications...
Peer to peer networks offer an extensible framework for supporting video streaming service over the Internet. P2P networks efficiency highly depends on peers' contribution. In practice, some peers only use the service, but share few resources or do not share any resources. This phenomenon is called free riding which seriously affects the P2P networks efficiency. So, in order to encourage the peers...
Using AS-level Internet topology maps to determine accurate AS-level paths is essential for network diagnosis, performance optimization, reliability improvement, resiliency enforcement and topology-aware application development. One significant drawback that we have observed in many studies is simplifying the AS-level topology map of the Internet to an undirected graph, and then using the hop distance...
Message forwarding is an integral part of the decentralized content sharing process as the content delivery success highly depends on it. Existing literature employs spatio-temporal regularity of human movement pattern and pre-existing social relationship to take message forwarding decisions. However, such approaches are ineffectual in environments where those information are unavailable such as a...
Recently, P2PTV is a popular application to deliver video streaming data over Internet network. On the overlay network, P2PTV applications create the logical links between pairs of peers considering round trip time (RTT) without physical network consideration. P2PTV packets are shared over a network without localization awareness which is the serious problem for Internet Service Providers (ISPs)....
The Network Address Translation (NAT) is a mechanism used almost for every user on the internet, primarily to alleviate the exhaustion of IPv4 address space by allowing multiple hosts to share a public/Internet address. The NAT allow to establish TCP communications if the communication start from internal NAT, but does not allow communication if it start from the public internet, external NAT. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.