The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Function Virtualization (NFV) enables flexible implementation and provisioning of network functions as virtual machines running on commodity servers. Due to the availability of multiple hosting servers, such network functions (also called Virtual Network Functions (VNFs)) can be placed where they are actually needed, dynamically migrated, duplicated, or deleted according to the current network...
The advances in computational techniques both from a software and hardware viewpoint lead to the development of projects whose complexity could be quite challenging, e.g., biomedical simulations. In order to deal with the increased demand of computational power many collaborative approaches have been proposed in order apply proper partitioning strategy able to assign pieces of execution to a crowd...
Video on Demand (VoD) streaming makes up an increasing portion of global IP traffic. Traditionally, data is served by content providers directly, putting a huge network load on the servers. We propose using our WebRTC-based protocols WebPeer and CodedWebPeer to create a P2P-assisted VoD streaming system with network coding. We introduce two metrics: network health to measure overall data saturation...
Operating systems and web browsers have their own local storage of certificate authorities. Import of certificate authority to this storage is simple operation carried out in a few seconds. If unauthorized person is able to import unverified certificate authority into our computer, consequences might be severe. The utility described in this paper enable user to flexibly administrate the way of maintaining...
The ever-increasing number of IoT devices necessitates a secure and scalable infrastructure to store and process generated data. Blockchain is an ideal choice with its decentralized, trustless architecture. However, low-power IoT end-devices do not possess enough horsepower to run a software client for intensive blockchain calculations. The purpose of this paper is to create a proof of concept to...
As citizens debate the morality of using global surveillance to enforce cyber security, software technologies that can proliferate illegal distribution of copyright material are evolving rapidly. One such technology is Peer-to-Peer networking which, through well-known implementations such as Napster, Bittorrent and eMule, has enabled users to share files at optimal speeds and at near infinite scale...
Disruption/Delay tolerant networking (DTN) is a promising solution to mitigate the effects of periodic link outages that last seconds to minutes, which are prevalent in high capacity airborne tactical networks that are directional in nature and highly affected by aircraft body blockage. There are several considerations for applying the DTN Bundle Protocol (RFC 5050) in tactical edge networks which...
Recent years, data transfer via www is one of the most popular application and web traffic on the Internet consumes much network resources. We have proposed a peer-to-peer cache distribution system to reduce consumption of network resources so far. Systems based on our proposal enable peers to receive a part of the data while the peers are downloading data from a server. In this paper, we report further...
Distributed systems are largely present and deployed in recent applications. Several systems have common basic requirements, which motivates to adapt reusable solutions for each family of systems. In this paper, we focus on distributed systems designed for large-scale applications requiring a high degree of Reliability and Dynamicity (ReDy distributed systems). We propose a basic architecture for...
Software Defined Networking (SDN) is an emerging networking paradigm which intends to merge networks into the age of the cloud, providing fine-grained control, simplified configurations, unprecedented flexibility and seamless scalability. However, due to the large set of unresolved challenges as well as the deployment cost, network evolution to fully SDN systems will take a long time. In fact, SDN...
Generic Enablers are a specialism of software engineering. They are components used for providing reusable building blocks that enable the construction of applications for future internet technology. The Generic Enablers satisfy requirements of application domains including big data processing, cloud infrastructure and internet-of-things. This overview paper introduces a description for defining them...
This paper shows the network solutions proposed and implemented in the framework of the project ARES. The strategic objective of ARES is to create an advanced CDN, accessible through a cloud interface, supporting medical and research systems making a large use of genomic data. The expected achievements consist of identifying suitable management policies of genomic contents in a cloud environment,...
Massive Multi-user Virtual Environment (MMVE) research is typically evaluated using traces obtained in emulated environments. Evaluation results obtained using commercially successful MMVEs, such as Minecraft, could aid industry when considering the adoption of newly published MMVE techniques or alternate architectures. In this paper we present our ongoing work in extending Minecraft to become a research...
Malicious codes can propagate rapidly by exploiting software vulnerabilities. In order to prevent the explosion of malicious codes in P2P networks, an automatic patching mechanism based on social computing is proposed. The security server generates automatic patches, and then selects the vulnerable nodes to push automatic patches. Automatic patches propagate rapidly along social network, so that the...
Recently, peer-to-peer has been becoming a promising architecture for developing video streaming services because it can reduce the bottlenecks and the load at the server side. However, P2P systems implement their own routing protocols on overlay networks, which are largely independent of the Internet routing. As a result, the traffic generated by P2P systems is immense and unpredictable. Controlling...
In the peer-to-peer based video-on-demand systems, when the number of users online reaches a certain scale, It will greatly influence the bandwidth and the speed of response server when the number of online users reaches a certain scale. At the same time, there are so many video resources and sometimes the base number of users can not fully meet the number of P2P users that a lot of video resources...
In this work we introduce a peer-to-peer approach for in-flight entertainment video on-demand systems. Such applications are traditional ways for the airline to improve profit from its operation and attract customers. We outline how a peer-to-peer system should be organized to address this specific application and reduce direct operational costs by reducing weight of the system. Furthermore, we discuss...
The homogeneity and the heterogeneity among peers in P2P networks can be utilized to counter P2P worms. The heterogeneity among peers can slow down the spread of worms, and the homogeneity can make the corresponding alert propagate faster than a worm. The distance between peers is defined to represent the heterogeneity. We proposed a worm containment scheme based on double-neighbor lists in P2P overlay...
With Java runtime-based application has been widely used in our enterprise application and mobile computing.We must maintain many machines in different types, like web server cluster,distributed database,virtual machines,hosting machines and so on.Cloud computing technology has been designed to manage those resources in efficiently way. Client agent can be installed in those host machines or virtual...
Traffic locality is a promising way for P2P systems to reduce cross-network traffic and improve performance. For the specific application, eMule, there are few reports on traffic locality in eMule to date. In this paper, we study how to integrate traffic locality mechanism into the eMule system. The eMule protocol is summarized and the source code of the eMule software is analyzed. Then traffic locality...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.