The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There is risk when doing experiments on real world systems and making real world measurements. In a theoretical system, a simulation, or a test bed, we can make assumptions about real world behaviors and gloss over potential problems. In a real world system, however, we have to solve those problems to get science done. Sometimes these are technical problems, like making sure a tool chain is consistent...
For a successful communication in a LAN network Internet Protocol version 4 (IPv4) has to identify Machine Code Address (MAC) of the target host which was possible via using Address Resolution Protocol (ARP). This is improved in IPv6 in which nodes uses Neighbor Discovery Protocol (NDP) to access MAC address of other nodes. In addition to this it enables accessibility to routers and reachability of...
Computing technology consists of four elements: user devices, computer networks, servers and software. Change in any of the elements can cause the computing technology to move from one phase to another. So far computing technology has undergone five phases starting from centralized computing to ubiquitous computing. We are moving into the sixth phase of computing technology, namely the advanced ubiquitous...
One important feature of Content-centric Networking (CCN) is to utilize built-in network caches to improve the transmission efficiency of content dissemination. In CCN, all nodes have the function of caching contents. Consequently, caches are ubiquitous and diverse. How to make full use of these caches to reduce the network load and the transmission delay has become a hot research topic in recent...
In this paper, we study the approach of user classification and service optimization for the file sharing application to P2P network. The user classification model is proposed which is based on user interest similarity and time feature similarity, and the method for determining user similarity is given. By analyzing the component features of user classification model, the results show that the model...
Live streaming (a.k.a. Internet Protocol Television (IPTV)) services have been popularly deployed on the Internet. Traditionally, IPTV service provider adopted client-server architecture. However, when the client population grows up to a certain amount, it usually faces the scalability and cost-effective problems. Fortunately, the development of Peer to Peer (P2P) content sharing application has proved...
Anyone can publish various kinds of information on the Internet almost freely, but in some cases such information distribution is inhibited by the authorities. In order to resist such censorship, there have been developed many anonymous information distribution systems such as Free net and Tor, but some people argue that such a system may also be a hotbed of crime since scrupulous anonymity disturbs...
This paper addresses the problem of cache pollution in P2P (Peer-to-peer) systems. P2P traffic has a significant impact on ISPs as it accounts for more than half of the all traffic. This will cause some negative impact on the Internet like network congestion, high latency. P2P caching is an efficient method for handling this problem. Most of the P2P cache systems suffer from Cache Pollution. This...
Traffic patterns in the Internet are changing, with video and user generated content (UGC) taking an increasing share of the volume, and P2P traffic decreases. The widespread appearing of content providers and content peering has been shown to decrease profit for ISPs. To reduce expenses, the use of P2P caches for UGC has been suggested. In this work, we look at the problem of UGC content sharing...
Large-scale Internet VoD services often adopt a hybrid overlay approach using both P2P and CDN to stream video content. When the underlay ISP network interconnection is weak, as the situation is found in China, it is important to provision the CDN bandwidth carefully in different ISP networks. Through measurement studies using real world data (from Tencent Video), it is found that users in large ISP...
Content downloading from vehicles is becoming increasingly popular, but it also meets challenges due to the limited number of road-side units (RSUs) and the expensive cost of 3G/LTE downloads. Cooperative LTE + vehicle-to-vehicle (V2V) downloading schemes can significantly improve the efficiency and reduce costs. However, selfish users are motivated to minimize their own LTE downloading costs, so...
In this paper we present a software system that is being developed at the University of Leeds for simulating and optimizing energy efficient optical core networks. The system is called CORNETO, an acronym for CORe NETwork Optimization. The software implements many of the energy saving concepts, methods and computational heuristics that have been produced by the ongoing INTERNET, INTelligent Energy...
People expect some technologies to help access, share and enjoy the human knowledge and resources via the Internet as the deepening of Internet globalization. Deep packet inspection is a packet sniffing technology on the network traffic, enabling operators to monitor what is happening in real time. It could be applied to management bandwidth, lawful surveillance, copyright enforcement, network security...
Nowadays, the Peer-to-Peer (P2P) Video-on-Demand (VOD) systems knows a huge success for several reasons: a) each peer is both server and client leading to scalable system, b) it is not necessary to build and maintain infrastructures. BitTorrent is the most popular P2P file sharing protocols due to its effectiveness in the delivery of content. Thus, many VoD protocols have been proposed based on it...
Name resolution is at the heart of Information-Centric Networking (ICN), where names are used to both identify information and/or services, and to guide routing and forwarding inside the network. The ICN focus on information, rather than hosts, raises significant concerns regarding the scalability of the required Name Resolution System (NRS), especially when considering global scale, inter-domain...
Accounting mechanisms based on credit are used in peer-to-peer systems to track the contribution of peers to the community for the purpose of deterring freeriding and rewarding good behavior. Most often, peers earn credit for uploading files, but other activities might be rewarded in the future as well, such as making useful comments or reporting spam. Credit earned can be used for accessing new content,...
Internet of Things in which object, animal, people is identified uniquely according to their identifier in the network and data transfer over Network without having directly human to human or human to machine interaction. IoT is used in education to improve E-Learning. It is available in different formats. Propose a system combining the different applications of e-learning with the help of Internet...
Adaptive video streaming over HTTP (DASH) is a recent technology adopted as the choice for delivering videos to smart phones, TV's, portable data units. Therefore, many services providers tend to adopt it as the basis for their services. In this paper, we focus on the problem of the typical behaviour of DASH, which runs over Client/Server network architecture causing limitations in its performance...
Due to the spread of unreliable online information on social network services (SNS), the users are faced with a difficult problem for determining if the information is trustworthy or not. At present, the users should make a decision overall by themselves for trustworthiness of information. Therefore, we need a way to systematically evaluate trustworthiness of information on SNS. In this paper, we...
The sharing of durable goods in a dynamic ownership economy is attractive, since it has the potential to realize gains from trade via short-term transfers of usage rights. We develop a model in which a set of agents, who are heterogeneous in their likely need of a durable good, make purchase decisions and then have the option to participate in a sharing market contingent on a realized need. The agents'...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.