The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article aims to discuss the replication principle that underlies correlations between peer-network conditions and video quality impacts over unstructured peer-to-peer (P2P) video-on-demand (VoD) overlay networks. In particular, the conditions of a network path among peers, such as communication latencies, packet buffer status, and upload bandwidth, can be used to develop failover mechanisms that...
Many Internet users use P2P live streaming services which deliver live video contents to many users. In the services, the video content is sliced into small pieces called chunks. The peers not only receive but also send the chunks to watch the video contents. Source's load for delivering is reduced. In an Offer Select method, each peer offers sendable chunks to it's neighbors. The neighbors select...
The emergence of high performance computing (HPC) platforms equipped with solid state drives (SSD) presents an opportunity to dramatically increase the efficiency of out-of-core numerical linear algebra computations. In this paper, we explore the advantages and challenges associated with performing sparse matrix vector multiplications (SpMV) on a small SSD test bed. Such an endeavor requires programming...
There is an increasing demand for P2P streaming in particular for layered video. In this category of applications, the stream is composed of hierarchically encoded sub-streams layers namely the base layer and enhancements layers. We consider a scenario where the receiver peer uses the pull-based approach to adjust the video quality level to their capability by subscribing to different number of layers...
Process algebra for quantitative evaluation are based on either of the two following mechanisms for communication: binary, where a channel is shared by exactly two agents, or multiway, where all agents sharing a channel must synchronise. In this paper we consider an intermediate form which we call generalised communication, where only m agents out of n potentially available are involved in the communication...
In this paper, a novel P2P network model for cloud computing is proposed to prevent the "calculation capacity" from being controlled by a few tycoons. The common users can become a part of "cloud" by joining as nodes. To solve "free-ride" and "the tragedy of commons" arising from p2p network model, "cloud" is divided into many clusters, and the incentive...
Peer-to-peer networks such as Bit Torrent swarms have gained popularity on Internet. One of the fundamental underlying mechanisms is to foster and enforce peer cooperativeness. As for fairly exchanging Bit Torrent chunks, peers may resort to encrypted chunk exchanges yet at the cost of delayed availability of plain chunks. In response, this paper presents a chunk encryption scheme for exchanging chunks...
In order to establish emergency communication networks for fire fighting in underground constructions, new Mesh network technology and its characteristics are introduced, also put forward the technical and tactical indicators of Air Mesh400 internet radio stations, simulated battle shows that the Mesh network solve communication QoS and guarantee stabile performance, meeting the needs of the fire...
In the recent years, Internet has witnessed a rapid growth in the deployment of data-driven based peer-to-peer streaming systems. The power of such system arises from the altruism of participating nodes in the system. However, as the system grows larger, the assumption of altruism breaks down since the system may include selfish nodes, which consume the resources provided by other nodes, without contributing...
Existing virtual clusters and computer clouds usually depend on small groups of (or even single) data repositories for their virtual machine and software deployments. This paper proposes a Peer-to-Peer (P2P)-based approach for publishing, querying, and deploying both virtual machine (VM) images and application-specific packages, dubbed the P2P Virtual Cluster Deployment System (PVC-DS). The approach...
Data request task scheduling is one of the important issues for P2P VoD systems. However the existing data scheduling strategies in P2P VoD system is not fair enough. They make many nodes, which upload data actively, bear very heavy load, while those selfish nodes providing no resource sit idle. This paper presents an admission control strategy on serving nodes combining with the incentive mechanism...
Packet forwarding in Vehicular Networks is gathering a booming interest in research area as cooperation of nodes becomes important for such a scenario. The presence of selfish nodes reluctant to transfer data packets are the most critical concern in packet forwarding. From explanations of game theory this is a social dilemma situation that gives a suboptimal outcome from a collective standpoint. Strategic...
With the rapid growth of wireless and mobile communication technology, P2P live streaming application is extending to mobile peers. In order to prevent Buffer Map Cheating (BMC) attacks in mobile P2P live streaming system, we model the chunks exchanging behavior between neighboring mobile peers under an infinitely repeated two-player game theoretic framework. The Nash Equilibrium is refined based...
In recent years, the data-driven streaming systems have been extensively deployed in Internet. In these systems, each node should request the streaming blocks of interest from its neighbors (.i.e. block request scheduling), meanwhile each node satisfies the requests received from its neighbors (.i.e. block delivery scheduling) given its bandwidth limitations. These two scheduling issues are critical...
In recent years, Peer-to-Peer (P2P) multimedia streaming has become an alternative to cable/satellite TV services. Many P2P streaming applications further provide users with DVD-like operations: play, pause, chapter selection, fast-forward, and rewind. Such a real-time interactive multimedia streaming is commonly referred to as the P2P Video-on-Demand (VoD). To further improve the streaming quality,...
In this paper, we present the concept design, and implementation of a novel network measurement system for the future Internet. The new protocol offers end-point applications a mechanism for utilizing internal information to maximize transport. By a cross-layer approach, we can automatically to collect information along a path while upholding a disclosure policy for the information. The protocol has...
In this paper, we make an in-depth investigation on the issue of distributing link stress. It is a fundamental problem in popular Internet TV systems because the service quality at the receiving side is determined by network congestion and bandwidth usage of the links. Less congestion level and balanced bandwidth usage enable IPTV systems to accommodate more subscribers and service channels, which...
In this paper we discuss the issues relating to architecture formation in MMOGs and the two principal design choices that must be made when constructing a Peer-to-Peer (P2P) MMOG: the Area of Interest Management (AoIM) scheme and the distribution and communication mechanism. We introduce an updated survey of the state-of-the-art of AoIM in P2P Online Games. We identify key issues in the development...
Although cellphone hardware is capable of communicating directly with the hardware of other cellphones, this is rarely done. We describe the design of a low-bandwidth peer-to-peer ad-hoc network, AllNet, to provide connectivity among smart mobile devices using established direct, ad-hoc, and delay-tolerant algorithms. AllNet can be used for secure interpersonal communication in a number of situations,...
Distributed Virtual Environments (DVEs), like Massively Multiplayer Online Games(MMOG) are attracting millions of users from all over the world. However, as the number of simultaneous users keeps growing, the current used Client/Server infrastructure technologies are showing their limits on the side of the practicality and applicability. As a consequence, novel solutions based on Cloud and P2P architectures...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.