The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of things wireless networking with long-range, low power and low throughput is raising as a new paradigm enabling to connect trillions of devices efficiently. In such networks with low power and bandwidth devices, localization becomes more challenging. In this work we take a closer look at the underlying aspects of received signal strength indicator (RSSI) based localization in UNB long-range...
Consider a distributed storage system where parts of the source file fragments in storage nodes are lost. We denote a storage node that lost a part of its fragments as a faulty storage node and a storage node that lost non of its fragment as a complete storage node. In a process, termed as partial repair, a set of storage nodes (among faulty and complete storage nodes) transmit repairing fragments...
In times of greatly heterogeneous devices, e.g. smart phones vs. desktop PCs, and their users participating in various types of networks new scenarios appear. These scenarios include peer-to-peer networks participants providing their capacities in order to operate this system. In case of weaker participants, which temporarily do not have enough capacities to contribute their share to the network,...
Mobile Ad Hoc Networks (MANETs) merge wireless communication with higher node mobility. Restricted wireless communication range, and node mobility requires cooperation with all others to offer networking, and with the network changing vigorously, needs are to be continually met. Routing protocols allows MANET operation. To improve the performance of the routing, various constraints such as bandwidth...
In these days, a large amount of popular peer-to-peer (also commonly known as P2P) applications, especially in the live streaming domain, are operating in Internet. One of the keys to success of such an application is the mutual cooperation among the participants (i.e., peers) in that application. However, presence of selfish peers (also commonly known as free riders) affects the performance of the...
Software Defined Network (SDN) is an emerging networking paradigm which separates the control plane from the data forwarding plane. The centralized controller provides the global view of the distributed network states for user applications. However, the scalability of SDN is subject to the delay, the capacity of the controller, the bandwidth of the control channel, and other issues. To solve this...
In recent years, video streaming services based on the client server (C/S) model have become common. When distributed through these services, video files need to be watermarked with a unique ID to identify clients, so as to deter illegal video capturing. However, the download bandwidth at servers limit the number of clients that can view video files simultaneously. With peer-to-peer (P2P) communication,...
Cluster computing in ad hoc network draws special attention from the research community due to its inherent support for group communication in varied application domains like emergency and rescue operations, etc. Context sensitive aware cluster computing yields maximum benefits and advantages than the traditional computing. The Cluster Head (CH) and the Cluster Members (CM) effectively coordinate...
Bit Torrent protocol is widely used for file sharing in peer-to-peer systems. Also, many cloud environments utilizethis protocol. Despite many advantages, among which are goodscalability and performance, BitTorrent has also limitations. Toamend them, this paper proposes TManTorrent protocol — adistributed BitTorrent protocol, which replaces a tracker serverwith a gossiping mechanism, and promotes...
P2P is an essential technology to solve the gap between server's capability and growing demand of client. In P2P system, there is a natural imbalance. Thus, Load balance is one of the main research directions. Better balance performance would lead to higher bandwidth, higher resource utilization, and better network stability. Churn is a normal phenomenon in P2P network, which often brings some awful...
The increasing popularity and ubiquity of various large graph datasets has caused renewed interest for graph partitioning. Existing graph partitioners either scale poorly against large graphs or disregard the impact of the underlying hardware topology. A few solutions have shown that the nonuniform network communication costs may affect the performance greatly. However, none of them considers the...
Ad hoc network is a networking concept, which emerged in the beginning of the 1990's. Also known as Peer to Peer (P2P) network, these types of networks have facilitated connections among computers. Currently, smartphones are connected to each other wirelessly to share information through hotspot ad hoc feature. These types of connections have led to many threats and attacks. There have been limited...
Peer-to-peer (P2P) streaming systems rely on that peers voluntarily share their bandwidth to maintain high performance. Credit-based incentive mechanisms are widely used to encourage peers to share more bandwidth. However, in credit-based mechanisms, how to set a suitable bandwidth price is a critical issue. In this paper, we propose a new dynamic bandwidth pricing mechanism based on Stackelberg game...
Although GPUs are being widely adopted in order to noticeably reduce the execution time of many applications, their use presents several side effects such as an increased acquisition cost of the cluster nodes or an increased overall energy consumption. To address these concerns, GPU virtualization frameworks could be used. These frameworks allow accelerated applications to transparently use GPUs located...
In volatile network environments, node connectivity and availability changes rapidly. This poses a challenge to efficient repair of failed nodes in distributed storage with erasure-correcting code. The commonly considered bandwidth-efficient data regenerating schemes either rely on availability of specific storage nodes in the network, or require a substantial number of repair nodes. We propose a...
The rapid deployment of cloud computing service needs a robust and efficient virtualization layer between the application and the physical hardware. Network Virtualization, which allows the co-existence of various logical networks on shared physical infrastructure, is an important technique to face this challenge. The optimal mapping of virtual resource to physical resource is a major issue in network...
In Peer-to-Peer (P2P) video streaming systems, a stream of chunks is delivered from the source to all participant peers by utilizing upload bandwidth of the participants. The given stream is generally divided into several sub-streams and those sub-streams are delivered through different spanning trees. In this paper, we consider the delivery of a sub-streams to n subscribers through a spanning trees...
A key property in tactical network environments is that the wireless network itself is typically the major limiting factor in how much information can be shared between users. In such environments, tactical operations often employ group communication protocols (one-to-many or many-to-many) to send information between users. This often results in situations where every message sent gets delivered to...
Reputation networks are an important building block of distributed systems whenever reliability of nodes is an issue. However, reputation ratings can easily be undercut: colluding nodes can spread good ratings for each other while third parties are hardly able to detect the fraud. There is strong analytical evidence that reputation networks cannot be constructed in a way to guarantee security. Consequently,...
Nowadays many IPTV services are deployed based on P2P structure for the sake of saving the cost of server equipment and bandwidth requirement. Since peers may join and leave the P2P system arbitrarily, it may cause the service quality unstable. In this paper, we compare IP addresses to find partner peers in proximity, and use specific packet pairs to probe partner peers that have larger bandwidth,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.