The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Named Data Networking (NDN) is a promising Future Internet architecture to support efficient content distribution. Specifically, P2P may gain benefits from NDN, as NDN inherently provides a flexible forwarding plane for multi-source and multi-path communications. Existing studies in this area have proposed solutions, but these are adversely affected by link latency. This leads to illogical resource...
In this paper, we propose a hybrid Peer-to-Peer (P2P) architecture for Content Delivery Networks (CDNs). The basic idea of the proposed method is to prepare a P2P overlay for each Autonomous System (AS) and to map nodes to the P2P overlays by referring to the information maintained by the DNS server deployed by the system. The performance of the proposed scheme is evaluated by simulation. The result...
New advanced techniques must be developed to support the growth of IPTV services and to boost quality delivered to the consumers. Optimization technique is proposed for the way users access video content delivered via wide area networks. The perceived quality of service will increase because the user accesses video content temporarily stored in nearby geographic locations. Temporary storage for content...
In this paper we propose new strategies for computing virtual geometric node coordinates in peer-to-peer overlays. The main goal is to obtain a decentralized network where each peer has a set of (multidimensional) coordinates and the distance between two peers is proportional to the round-trip time (RTT) between the peers. We consider methods based on the Euclidean distance and the Linfinity norm...
The peer-to-peer networking concept has revolutionized the cost structure of Internet data dissemination by making large scale content delivery with low server cost feasible. In a peer-to-peer network, the total upload capacity increases with the number of down loaders instead of staying constant as in a client-server architecture, making it highly scalable. Despite of its importance, the problem...
When moving towards fully Peer-to-Peer Virtual Environments (P2P-VE), the amount of network traffic generated at each peer remains a significant concern. Multiplayer Online Games (MOG) are the largest application subset of VEs and have been shown to require high frequency of update messages and minimal network latencies. Yet, this demanding criteria must be balanced with the need to also limit the...
Balancing communication workloads is a perennial performance issue in the area of Distributed Virtual Environments (DVE). The stringent time constraints of Multiplayer Online Games (MOG) complicate efforts to effectively distribute the networking load amongst servers. This issue becomes ever more exacting, when we move towards a fully Peer-to-peer virtual world (P2P-VE). We are consequently forced...
Applications based on peer-to-peer (P2P) protocols have become tremendously popular over the last few years, now accounting for a significant share of the total network traffic. To avoid restrictions imposed by network administrators for various reasons, the P2P protocols have become more sophisticated and employ various techniques to avoid detection and recognition with standard measurement tools...
As one of the most popular applications in China, Xunlei's excellent performance attracts us to pay more attentions to its system mechanism. The issue of bandwidth theft in Xunlei is one of our focuses. Although its proprietary nature and its use of data encryption hinder our studies of Xunlei to some extent, we analyze and evaluate behaviors of bandwidth theft in Xunlei based on our measurements...
Collecting information about user activity in peer-to-peer systems is a key but challenging task. We describe here a distributed platform for doing so on the eDonkey network, relying on a group of honeypot peers which claim to have certain files and log queries they receive for these files. We then conduct some measurements with typical scenarios and use the obtained data to analyze the impact of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.