The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article aims to discuss the replication principle that underlies correlations between peer-network conditions and video quality impacts over unstructured peer-to-peer (P2P) video-on-demand (VoD) overlay networks. In particular, the conditions of a network path among peers, such as communication latencies, packet buffer status, and upload bandwidth, can be used to develop failover mechanisms that...
Many Internet users use P2P live streaming services which deliver live video contents to many users. In the services, the video content is sliced into small pieces called chunks. The peers not only receive but also send the chunks to watch the video contents. Source's load for delivering is reduced. In an Offer Select method, each peer offers sendable chunks to it's neighbors. The neighbors select...
Based on the in-depth research of the P2P technology, we propose an implementation scheme of the P2P communication system for the wireless network environment, design a new hybrid structure model and describe the query mechanism, which can be used in the two-level domain of the distribution structure, in addition, we also design the P2P transmission protocols, which are quite fit for the wireless...
In P2P live streaming services, a video streaming data is divided into chunks and peers collect the chunks to watch the live video. Peers receive chunks from a video server or other peers, and also send chunks to other peers. Generally, a peer cannot communicate with all of other peers and a peer can communicate with only a part of peers, which is called neighbors. How to select the neighbors has...
Peers search contents with information of contents such as keywords in many peer-to-peer contents sharing systems. In many peer-to-peer contents search architectures, queries are forwarded to peers which belong to clusters related with the keywords. Since clusters are basically constructed regardless of physical network topology, a peer receives contents from peers that are located far from the peer...
In peer-to-peer (P2P) overlay networks, a group of multiple peers have to cooperate with each other. P2P systems are in nature scalable, distributed systems, where there is no centralized coordinator. Hence, a group of peers is required to be scalable in P2P overlay networks. Each peer sends a message to every peer and every other peer receives the message in a group. In group communication, each...
Peer-to-peer based (P2P) VoD systems have proven to be an effective solution for scalable video distribution. In P2P VoD, each peer contributes storage to replicate videos and assist video delivery. A fundamental question is how to optimally replicatevideo content across the peers so as to maximize their upload capacity. We study this question within thecontext of a large-scale P2P network where peers...
Process algebra for quantitative evaluation are based on either of the two following mechanisms for communication: binary, where a channel is shared by exactly two agents, or multiway, where all agents sharing a channel must synchronise. In this paper we consider an intermediate form which we call generalised communication, where only m agents out of n potentially available are involved in the communication...
The combined effect of Moore's law and the failure of Den nard scaling have led to multi-core mobile devices with immense computation capabilities. The biggest limitation of the computation capability for any mobile device is its battery. Mobile cloud computing is used to offload compute intensive tasks that affect a mobile device's battery. Mobile ad-hoc computing can be used as an alternative to...
In peer-to-peer networks (P2Ps), many autonomous nodes without preexisting trust relationships share resources (e.g., files) between each other. Due to their open environment, P2Ps usually employ reputation systems to provide guidance in selecting trustworthy resource providers for high system reliability and security. A reputation system computes and publishes reputation score for each node based...
File-sharing is the major application of P2P Network, it is the resource sharing demand that directly led to the generation of P2P technology and development boom. Worldwide, BT and eMule has always been the mainstream system in the field. But in China, P2SP service providers with thunder as the representative rise rapidly, and open up the market with a so-called intelligent resource selection technology,...
In order to improve the sufficiency of software test, the concept of exception test case is put forward and analyzed by examples firstly in this paper, Secondly, since the obtaining method of exception test cases differs greatly to traditional security test cases, a distributed-storage method is proposed to store and share exception test cases on a P2P network. To realize sharing and reusing of exception...
with the rapid development of the network, P2P technology is widely used in the Internet, P2P application is facing the trust threat of the network. This paper first describes P2P trust problem, then proposes a P2P game trust model based on an unknown node type, and describes the modeling conditions and modeling process in detail. Use the simulation tool Gambit to verify the feasibility of the proposed...
Peer-to-Peer (P2P) network structure is widely employed for video streaming applications due to its high stability, flexible extensibility and ability to share data stream loading among different peer nodes. This paper proposes an interleaved video frame distribution (IVFD) scheme to resourcefully support full VCR functionalities in P2P environment without searching new source. Instead of acquiring...
n this paper, we analyze the detailed problems in current P2P based 3DGIS including the interoperability of P2P architecture, the initial speed of P2P download and the adaptability. Then we propose a peer location and interest data integrated group based hybrid P2P network to identify peer activities and via web-service based transmission to enhance the application communication designed as a plug-in...
This paper presents the Content Aware Network designed as one of the Parallel Internets developed on Virtual Infrastructure. The CAN is a post-IP network designed to facilitate access to multimedia content in large scale environment. We introduce the proposed CAN network architecture and discuss mechanisms and algorithms required to assure ubiquitous content access and efficient content delivery....
Along with the rapid development of peer-to-peer network technology and the fast increasing number of users, the problems of security in peer-to-peer network is becoming more and more important. By researching the previous trust model of peer-to-peer network, we propose a trust model(PTM) for peer-to-peer networks based on punish mechanism. Firstly, we use the method of social grouping nodes in the...
Data request task scheduling is one of the important issues for P2P VoD systems. However the existing data scheduling strategies in P2P VoD system is not fair enough. They make many nodes, which upload data actively, bear very heavy load, while those selfish nodes providing no resource sit idle. This paper presents an admission control strategy on serving nodes combining with the incentive mechanism...
Today, the main usage of the Internet has become increasingly about content generation, sharing, retrieval and massive distribution. Widely used P2P applications, UserGenerated Content (UGC) (e.g., Youtube, Flickr) and increasingly popular Social Networks make the Internet service model become more content-oriented than host-oriented as it has been this far. To match the Internet infrastructure to...
Today, the data exchanged over online social networks (OSNs) represents a significant fraction of Internet traffic. However, OSN content is different from more traditional web content, as it is more likely to be generated at the edge of the network, to be exchanged within a local geographic region, and to possess a more even popularity distribution with fewer popular objects. Unfortunately, most OSNs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.