The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, the main usage of the Internet has become increasingly about content generation, sharing, retrieval and massive distribution. Widely used P2P applications, UserGenerated Content (UGC) (e.g., Youtube, Flickr) and increasingly popular Social Networks make the Internet service model become more content-oriented than host-oriented as it has been this far. To match the Internet infrastructure to...
New advanced techniques must be developed to support the growth of IPTV services and to boost quality delivered to the consumers. Optimization technique is proposed for the way users access video content delivered via wide area networks. The perceived quality of service will increase because the user accesses video content temporarily stored in nearby geographic locations. Temporary storage for content...
Peer-to-Peer live video streaming systems are becoming increasingly popular. Nevertheless, in spite of various studies of client behavior aspects and system optimizations, the current knowledge about the dynamic properties of the system, particularly how the P2P overlay network changes over time during a live transmission, is still superficial. In this paper, we provide a characterization of the dynamic...
With the memorable start and massive adoption of cloud concepts, infrastructures and platforms, there is a paradigm shift in the IT landscape. That is, IT solutions and services are being developed, debugged, deployed and delivered from clouds to be conveniently consumed by global users via the open and public web. The point is that the web and the cloud resources are smartly combined and leveraged...
The peer-to-peer networking technologies and systems provide a rapid and scalable content distribution mechanism for the increasing client population to access an explosive volume of media files on the Internet. Whereas the BitTorrent protocol and its derivatives are the most popular peer-to-peer file sharing applications, this paper proposes the performance measurement and analysis of BitTorrent...
This document describes the architecture of a distributed Content Delivery Network (CDN) monitoring system and its deployment in a research environment in one of the biggest telecommunication company in Poland and involves about fifty nodes distributed in the country and database system located on dedicated storage cluster working in RD center in Warsaw.
In this paper we propose new strategies for computing virtual geometric node coordinates in peer-to-peer overlays. The main goal is to obtain a decentralized network where each peer has a set of (multidimensional) coordinates and the distance between two peers is proportional to the round-trip time (RTT) between the peers. We consider methods based on the Euclidean distance and the Linfinity norm...
As the rapid development of P2P application, many applications based on P2P technology are produced and applied over the Internet. Therefore, searching efficiency, bandwidth utilization rate, average download time and throughput become the key issues of P2P. In order to improve the performance of P2P applications, we propose an integration of search and incentive strategy (ISI) in this paper, which...
In this paper we address the problem of shared backup path protection (SBPP) against random failures of single links in connection-oriented communication networks. Most of recent works has been concentrated on protecting the unicast traffic. Our paper is also focused on shared protection of anycast (i.e. one-to-one-out-of-many) flows. Anycasting is frequently met in practice (e.g. in Content Delivery...
The peer-to-peer networking concept has revolutionized the cost structure of Internet data dissemination by making large scale content delivery with low server cost feasible. In a peer-to-peer network, the total upload capacity increases with the number of down loaders instead of staying constant as in a client-server architecture, making it highly scalable. Despite of its importance, the problem...
The goal of this paper is to minimize service disruption, a unique phenomenon in peer-to-peer (P2P) streaming system and the major contributing factor to degrade user experience. In order to improve its streaming quality and stability, a P2P system should select peers with abundant bandwidth resource and prospect longevity as the parents of other peers. Towards this end, we propose PRW (peer resilient...
Multiplayer Online Game has been extremely popular, in which peer-to-peer technology has been introduced to help with the scaling. This paper presents a measurement study on a P2P-based MOG supporting system, called PKTown, which has been fully deployed over the CERNET. By leveraging a large set of traces obtained recently over a 4-month period, we study the benefit of P2P architecture applying to...
When moving towards fully Peer-to-Peer Virtual Environments (P2P-VE), the amount of network traffic generated at each peer remains a significant concern. Multiplayer Online Games (MOG) are the largest application subset of VEs and have been shown to require high frequency of update messages and minimal network latencies. Yet, this demanding criteria must be balanced with the need to also limit the...
Balancing communication workloads is a perennial performance issue in the area of Distributed Virtual Environments (DVE). The stringent time constraints of Multiplayer Online Games (MOG) complicate efforts to effectively distribute the networking load amongst servers. This issue becomes ever more exacting, when we move towards a fully Peer-to-peer virtual world (P2P-VE). We are consequently forced...
Energy consumption is responsible for a large fraction of costs in today's content distribution networks. In upcoming decentralized architectures based on set-top boxes (STB), acting as tiny servers, idle times can dominate distribution costs, since no cooling costs occurs and the Internet access is often paid in a flat-rate manner. The often assumed always-on property of STBs provides high availability...
Most of previous research on survivable networks has been focused on protecting the unicast traffic against random failures. In this paper we propose a new approach, called RA (resistant-to-attack), to provide protection of anycast and unicast communications against attacks on irregular (e.g. scale-free) networks. We use the single backup path approach to provide protection against a single node failure...
Applications based on peer-to-peer (P2P) protocols have become tremendously popular over the last few years, now accounting for a significant share of the total network traffic. To avoid restrictions imposed by network administrators for various reasons, the P2P protocols have become more sophisticated and employ various techniques to avoid detection and recognition with standard measurement tools...
In this paper, we propose a clustering scheme for unstructured P2Ps based on the notion of ``tit-for-tat'' strategy. The proposed scheme is a combination of an identification of critical links, local reconfiguration of incident links, and a retaliation rule. By adopting such a tit-for-tat strategy in selecting incident links to be disconnected while reconfiguring the underlying P2P overlay, it emerges...
Peer-to-peer (P2P) computing may trigger a revolution in the near future because of its ease of use, huge choice and low price. Its chief features are anonymous, independent, dynamic, and absent of centralized server. Due to these features, on the other hand, P2P networks are often insecure and easily suffer from the malicious attacks. Besides, the peers in the system should cooperate in order for...
Services that offer users the possibility of transmitting their own live streaming video content, using Web 2.0-based platforms, are increasing in popularity. In this context, we propose and evaluate solutions that contribute to improve the scalability of this type of system. This work encompasses two major steps. First, we collected data from a popular online live video sharing service, and provide...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.