The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Application-layer overlay networks are receiving considerable popularity due to its flexibility and readily deployable nature thereby providing support for a plethora of Peer-to-Peer (P2P) applications. Currently, the real-world deployment of Internet-scale P2P media streaming systems involve the usage of tracker server for content discovery in on-demand model with asynchronous interactivity. The...
The virtual network (VN) embedding problem is concerned with mapping the nodes and links of a VN request to a shared substrate network while maximizing some objective function such as maximizing profit or resource utilization. This mapping must satisfy specific node capacity and link bandwidth requirements. This paper presents a novel hierarchical approach for scalable VN embedding that achieves a...
We propose a novel content-based Publish-Subscribe system over structured P2P networks, namely Marshmallow, to provide efficient, scalable and adaptable event dissemination service. Marshmallow introduces a subscription merging strategy to reduce the subscription cost and frequency of event matching, meanwhile, it smartly exploits the embedded trees of Pastry overlay to deliver event with high event...
Though resource discovery is a fundamental requirement in collaborative peer-to-peer, grid, and cloud computing, very little is known about resource/query characteristics and their impact on resource discovery. Fundamental design choices for distributed resource advertising and querying are evaluated in the context of existing practical systems. First, a generic model for cost of resource discovery...
Web caching is one of many applications argued to benefit from a switch from a client-server to a peer-to-peer architecture. Several projects suggested the use of a network of peers to provide cached web content in order to help sites survive a burst of user requests. We present a new system that targets web sites with dynamic content and allows them to use a group of a variable number of volunteer...
With the increasing scale of applications and the number of users, we design a Self-organizing Cloud (SoC) which aims to make use of the distributed volunteer computers or dedicated machines to provide powerful computing ability. These resources are provisioned elastically according to user's specific demand, by leveraging virtual machine (VM) resource isolation technology. Based on such a framework,...
As the dominant Internet application, peer-to-peer (P2P) file sharing systems account for the major portion of Internet traffic, posing significant burden on ISPs. Many ISPs have attempted to discriminate against P2P traffic, making it important to alleviate such severe conflict. In this paper, we propose a novel architecture called iDTT that aims to use the underutilized off-peak time network capacity...
A bandwidth puzzle was recently proposed to defend against colluding adversaries in peer-to-peer networks. The colluding adversaries do not do actual work but claim to have uploaded contents for each other to gain free credits from the system. The bandwidth puzzle guarantees that if the adversaries can solve the puzzles, they must have spent substantial bandwidth, the size of which is comparable to...
Video on Demand (VoD) service has become an increasingly popular service in recent years as a result of the rapid deployment of Fiber-to-the-Home networks. Due to its enormous bandwidth and stringent quality of service requirements, deploying an efficient and scalable VoD service still remains a challenge. In this paper, we propose a peer-to peer (P2P) VoD distribution scheme for PONs in which the...
In recent years, wireless mesh networks (WMNs) have attracted considerable interest from both academia and industry. WMNs offer attractive advantages such as easy installation, fast deployment, and low operating expense. For this reason, many cities and network operators have built WMNs to provide wireless Internet access in metropolitan areas. Despite their advantages, WMNs face numerous challenges...
As a new optical WDM network architecture that can be built with currently available devices and can achieve bandwidth allocation with granularity finer than a wavelength, a light trail architecture attracts attention. Because a light trail is a shared medium, we need a medium access control (MAC) protocol to avoid collisions. Although MAC protocols using token passing can avoid collisions, bandwidths...
in P2P video-on-demand (VoD) streaming system, aggregate download bandwidth of users fluctuates significantly because of peer departure, bandwidth heterogeneity and network delay. The playback rate of videos also fluctuates in order to attain constant image quality. These two kinds of dynamics cause playback interruptions. Prefetching some video content before playback is an effective method to offset...
Peer-to-Peer (P2P) technology has been successfully used in various applications in the last few years. However it is also regarded as being disruptive for traditional fixed and mobile operators because of the large bandwidth consumption and disordered data exchange. To solve the P2P issues for operators, we utilize the important feature, data exchange, in P2P application to design a novel P2P-multicast...
Network coding has been applied successfully in peer-to-peer systems to shorten the distribution time, particularly in extreme conditions where peers in the network are clustered and separated by physical links with limited bandwidth. In this paper, we focus more closely on the use of source coding, i.e. encoding is done only at the source, as an alternative to network coding to facilitate content...
Fast Spanning Tree Reconnection (FSTR) is a newly proposed restoration method by us to handle single link failures in Metro Ethernet networks. Compared with other methods existing in the literature, FSTR has the advantages of lower signalling overhead, faster recovery and lesser rerouted traffic. In this work, we propose to use partial spatial protection (PSP) mechanism to provision differentiated...
This paper presents the analysis and design of proportional response incentive mechanism for layered P2P live streaming systems. It is shown that, under the proportional response mechanism, high contribution peers are guaranteed to get a better streaming quality. Furthermore, the sensitivity parameter of the mechanism can be used to achieve the tradeoff between fairness and efficiency. It is also...
The asymptotic signal bandwidth of various kinds of large-scale asynchronous Time Hopping Impulse Radio Ultra-Wide Band (TH-IR UWB) communication networks such that multiple access interference can be negligible with respect to output noise with high probability is derived. The asynchronous TH-IR UWB communication networks consist of n nodes distributed in a cube (three-dimension) or on a square (two-dimension)...
In this paper, we propose the use of network decomposition under an optimal resource allocation framework. We develop a methodology where recursive formulas can be utilized for calculating the desired end-to-end performance bounds (i.e., backlog bound violation probability) of flows traversing tandem, acyclic queueing networks. We use those performance metrics in an optimization framework that allocates...
In this paper, we investigate the problem of channel bounding in wireless local area networks (WLANs). We propose a MAC protection mechanism to combat the hidden node problem on non-primary channels of a basic service set (BSS). Simulation results show that the proposed MAC protection mechanism is effective in combating hidden nodes and improving throughput of 80MHz stations. The proposed scheme has...
This work presents an adaptive sanctioning mechanism that can be applied in open multi-agent systems that are regulated through norms. This mechanism tries to identify the attributes of the environment that have some influence on agents decision making and uses such attributes to define sanctions that may prevent norm violations. Our approach adapts sanctions to particular agents and particular environmental...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.