The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Opportunistic networks (OppNet) enable users to connect each other via wireless communication without connecting to the Internet. These networks have fragile structures and the topology of the network is changed frequently, so it is impossible to have a Trust Third Party as a certificate authority. There are many different attacks against these networks and one of them is Sybil Attack. In this paper,...
Decentralized systems, such as overlay networks or content delivery networks, form a virtual network on top of a physical network leading to inefficiencies in handling network traffic as physical locations are not considered. Therefore, this work investigates, analyzes, and evaluates two feasible network locality metrics for decentralized systems to overcome such inefficiencies. Furthermore, those...
Connectivity of network is the premise of service quality for P2P network. In order to ensure each node has connected to the P2P network, this paper proposes an algorithm for Peer-to-Peer Overlay Network Topology Automatic-Restoration. When a node detects an abnormal connection of its neighbor node, it connects the neighbor node's standby node to ensure the correctness and connectivity of the network...
Finding a document or resource in an unstructured peer-to-peer network can be an exceedingly difficult problem. In this paper we propose a query routing approach that accounts for arbitrary overlay topologies, nodes with heterogeneous processing capacity, e.g., reflecting their degree of altruism, and heterogenous class-based likelihoods of query resolution at nodes which may reflect query loads and...
To pave the way towards using adapted wide scale telco technologies within dedicated networks environment, there is a dire need to increase the reliability of the end-to-end communication beyond what is currently offered to individual subscribers towards the levels previously available in operations technology. This can be achieved by adding a new dynamic Software Defined Networks (SDN) routing overlay...
Information-centric networking (ICN) promises to improve content-oriented services by enabling in-network caching and supporting optimal content request forwarding. To achieve this goal, different content caching and request forwarding schemes are proposed in multiple ICN architectures. However, they differ from each other in whether pervasive caching is adopted, and whether nearest-replica routing...
Flooding Peer-to-Peer (P2P) networks form the basis of services such as the electronic currency system Bitcoin. The decentralized architecture enables robustness against failure. However, knowledge of the network's topology can allow adversaries to attack specific peers in order to, e.g., isolate certain peers or even partition the network. Knowledge of the topology might be gained by observing the...
Multimedia streaming in P2P networks where participants are involved in real-time multimedia sessions is a challenge. A key issue for the management of large-scale media streaming is the provision of application layer multicast. In existing works, scalability and QoS are the main critical issues and ALM optimization represents a real challenge when considering physical parameters or constraints such...
The plug-in of nodes in already synchronized Wireless Sensor Network (WSN) can perturb the synchronization accuracy. In the case of the plug-in of one node, the consensus based synchronization algorithm permits to deploy the local interactions among nodes, and, as a consequence, to detect and ignore the Non Synchronized Node (NSN). In the case of multiple nodes, the detection of NSNs can be misstated...
Recent studies show that an increasing number of over-the-top live streams is delivered over the Internet. For the delivery of those streams, the dynamically changing and potentially large number of users imposes a major challenge. Flash crowds, where the number of users multiplies or significantly drops in a very small time frame, can cause serious degradations in the streaming performance. Due to...
Centralized and offline network management functionality, traditionally deployed by operators, cannot easily deal with the traffic patterns of emerging services, which are becoming more dynamic and unpredictable. As such, decentralized solutions that are flexible and adaptive to traffic and network dynamics are of paramount importance. To this end, we have been developing an in-network management...
As inter-domain routing on today's Internet does not and basically cannot consider traffic load when determining best traffic forwarding paths, it is not always optimal for a router to forward packets along its default path, especially when the router's default output port incurs a long queuing delay. In this paper, we design a new approach called TED in which border routers of autonomous systems...
This paper proposes FDCP as a random access MAC protocol which utilizes the propagation delay in UWAN and proposes three innovational mechanisms to improve reliability and throughput: Fixed time handshake, two-phased transmission and time-stamp based conflict-resolution. FDCP can be used in various static AD-HOC multi-hop UWAN scenarios. Simulation results show that FDCP outperforms both handshake...
With the recent surge of Internet enabled portable devices, such as smart phones and tablets, it has resulted in a much faster growth of the global Internet usage. Most of the usage is due to the use of social media platforms where streaming media is used heavily. Most of the researches conducted were to address the issues related to overall delivered quality in a resource-constraint streaming environment...
Security problem in MANET has been prevailing even after several researches by the various authors. Since application of security mechanism affects the system performance very much therefore there is always scope for further research in this area. Another major cause is fast technology growth in the area of MANET. Recent researches are focusing on another mechanism of security which involves trust...
The area of study and work presented in this paper is on a method of routing in sensor networks that is a part of Geographic Routing protocol known as Greedy Forwarding. This is an much more efficient version of methods that are applicable in GR. This works on the principle of progressing in the process of forwarding by selecting a peer that is nearer to the final node where the packets are destined...
P2P live streaming systems have been widely adopted nowadays. In such systems, flash crowds still remains a big challenge, which often occur when an enormous number of users suddenly arrive to view a newly released program. In a flash crowd scenario, users often suffer from a long startup delay and a high failure rate. In this paper, we propose a topology-construction-based algorithm to alleviate...
Wireless Sensor Network consists of large number of sensor nodes with limited battery power, which are randomly deployed over certain area for several applications. Wireless Sensor Network (WSN) has a great potential to be deployed in wide range of applications like consumer, industrial and defense sectors. WSN s are susceptible to various attacks, in which Blackhole a kind of Denial of Service (DoS)...
Chord is a popular and successful topology for Peer-to-Peer (P2P) data sharing. However, the conventional chord is challenged by two main drawbacks. First, it fails to consider the physical topology of the P2P network for designing the lookup solution, which may bring tremendous delay to network routing. Second, its performance of is usually limited by the high space complexity of data storage and...
To improve the efficiency and the topology mismatch problem of P2P overlay network, a new method of topology construction, CLSP2P, was introduced. The topology construction of CLSP2P not only consideration the physical location of nodes, but also consideration the semantic information of nodes: Nodes in CLSP2P were first organized as autonomous domain based on their physical location, then the nodes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.