The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer to Peer (P2P) computer networks rely on direct connections between participants instead of conventional centralized resources. These networks are useful for many purposes, but the killer application nowadays is file sharing. BitTorrent is a very popular protocol for this matter. In this paper, we use a multi-agent model of a BitTorrent network. In it, each BitTorrent client is an agent that interacts...
Ultra-wideband (UWB) transmission is an emerging wireless communication technology that is gaining significant interest for future broadband wireless access. This transmission technique based mainly on the Impulse-Radio (IR) paradigm, has the potential to deliver high-speed wireless connectivity at low power and low proximity, characteristics that makes it an ideal choice for wireless sensor networks...
BitTorrent is the most widely used Peer-to-Peer (P2P) protocol and it comprises the largest share of traffic in Europe. To make BitTorrent more Internet Service Provider (ISP) friendly, BitTorrent Inc. invented the Micro Transport Protocol (uTP). It is based on UDP with a novel congestion control called Low Extra Delay Background Transport (LEDBAT). This protocol assumes that the receiver always gives...
This paper describes the iTrust over SMS decentralized search and retrieval system for mobile networks. Any mobile device in the iTrust network can communicate with any other mobile device in the iTrust network to distribute, search for, and retrieve information. Third-party developers can use the iTrust over SMS API on the Android platform to add this search and retrieval functionality to existing...
This paper presents a network circuit for wearable low-power BAN (Body Area Networks) applications, geared towards mesh network topologies with conductive yarns as transmission channels. The design and implementation of the physical and MAC layers is described. The resulting circuit sends and receives data simultaneously, and experimental results indicate that the proposed system works with variable...
An important aspect of any network simulation that models wireless networks is the design and implementation of the Propagation Loss Model. The propagation loss model is used to determine the wireless signal strength at the set of receivers for any packet being transmitted by a single transmitter. There are a number of different ways to model this phenomenon, and these vary both in terms of computational...
In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast with few receivers and as flooding protocol, similar to Simplified Multicast Forwarding (SMF), with many receivers. MCOM utilizes the forwarding structure Multipoint relay (MPR)...
Traditional Infrastructure-as-a-Service offerings provide customers with large numbers of fixed-size virtual machine (VM) instances with resource allocations that are designed to meet application demands. With application demands varying over time, cloud providers gain efficiencies through resource consolidation and over-commitment. For cloud customers, however, this leads to inefficient use of the...
Peer-to-Peer (P2P) technology can be utilized to combine remote resources and build distributed, high performance database systems, called data grids, which help to handle the rapidly increasing volumes of data produced by disciplines like astrophysics, biology, or geology. One major challenge of data grids are skewed query patterns which cause load imbalances and heavily diminish performance and...
Accelerator awareness has become a pressing issue in data movement models, such as MPI, because of the rapid deployment of systems that utilize accelerators. In our previous work, we developed techniques to enhance MPI with accelerator awareness, thus allowing applications to easily and efficiently communicate data between accelerator memories. In this paper, we extend this work with techniques to...
The Session-based IP Mobility Support [1] is a general purpose socket-based API designed to create mobility-aware applications that do not break with transmission disruptions or delays. In this paper, we present and discuss the security support provided in order to deal with threats in the phases of closed session opening and suspended session reopening. The performance of these phases were assessed...
This paper deals with mm Wave MIMO link design strategy for wireless data center applications where the MIMO degrees of freedom is taken into account in multi-node packet networking environments. The problem is treated differently from the coordinated multiuser MIMO situation and the link design is optimized independently in each node with meeting control and data plane requirements for contention-based...
This paper proposes LBA, a lifetime balanced data aggregation scheme for asynchronous and duty cycle sensor networks under an application-specific requirement of end-to-end data delivery delay bound. In contrast to existing aggregation schemes that focus on reducing the energy consumption and extending the operational lifetime of each individual node, LBA has a unique design goal to balance the nodal...
Traditional low-latency anonymization techniques apply non-standardized, complex, and often even proprietary protocols. Apart from poor performance, the high development effort leads to the existence of at most one single implementation. This in turn increases the risk of creating so-called software monocultures, where failures in the single implementation can compromise the overall security. In this...
It is to select and configure the appropriate constituent components when designing an effective dynamic load balancing algorithm for distributed systems, since the performance of a dynamic load balancing algorithm heavily depends on these components. The main concern of this paper is to analyze and explore the various components for designing dynamic load balancing algorithms and to propose new information...
In this paper, we present the design of Social BitTorrent Agent (SBTA). Through SBTA, BitTorrent users can be organized into a friend group in which as one member start downloading files, it will multicast the corresponding torrent files to other members who are also interested. In this manner, torrent files can be quickly spread to a large number of BitTorrent clients, and BitTorrent Swarm will form...
The broadcasting protocols for transmission from peer to peer ad-hoc networks are currently a topic of enormous interest. There are several traditional algorithms which deal with the transmission of information from one source to another in the wireless ad-hoc networks. However, these conventional algorithms are not capable of eliminating the data redundancy completely. This study proposes a new technique...
In this paper, we have designed and developed a testbed for proof-of-concept demonstration and performance assessment of cooperative spectrum sharing (CSS) protocols. The performance of the testbed has been validated by obtaining both quantitative as well as qualitative results. Quantitative results are obtained by measuring the packet error rates for both primary and secondary systems during different...
Reactive jamming nodes are the nodes of the network that get compromised and become the source of jamming attacks. They assume to know any shared secrets and protocols used in the networks. Thus, they can jam very effectively and are very stealthy. We propose a novel framework for identifying the reactive jamming nodes in wireless LAN (WLAN). We rely on the half-duplex nature of nodes: they cannot...
This paper develops a detection scheme based on implicit pilot-symbol-assisted architecture for non-coherent amplify-and-forward (AF) relay networks. The networks use M-ary frequency-shift-keying (FSK) modulation and multiple relays to assist communication from a source to a destination. Built on the fact that every transmitted symbol from the source to the destination can be considered as a pilot...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.