The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Low latency is critical for delay-sensitive applications such as video surveillance, live streaming, and online data analytics. Fog computing enables the emergence of the latency-sensitive internet of things (IoT) network to support real-time applications. While the distance between sensing and processing is minimized in the fog network, the cross-fog latency is yet to be determined. In this paper,...
Network Function Virtualization (NFV) enables flexible implementation and provisioning of network functions as virtual machines running on commodity servers. Due to the availability of multiple hosting servers, such network functions (also called Virtual Network Functions (VNFs)) can be placed where they are actually needed, dynamically migrated, duplicated, or deleted according to the current network...
The proliferation of web services and the wide choice of Web technologies has resulted in the increasing use of web browsers by service-oriented applications. To decrease the overloading of websites and thus make them more attractive for SOA applications, various solutions to deliver content and resources through web browsers are considered. Among existing approaches, WebRTC is used for the P2P content...
This paper presents the summary prefix tree (SPT), a trie data structure that supports efficient superset searches over DHT. Each document is summarized by a Bloom filter which is then used by SPT to index this document. SPT implements an hybrid lookup procedure that is well-adapted to sparse indexing keys such as Bloom filters. It also proposes a mapping function that permits to mitigate the impact...
The current Internet architecture follows a hostcentric communication model, intended for machine to machine connection and message passing. Modern Internet users are mainly interested in accessing information by name, irrespective of physical location. Information centric networking (ICN) was developed to rethink Internet foundations. Innetwork caching is one of the main features of ICN. Studying...
Advanced Metering Infrastructure (AMI) forms a communication network for the collection of power data from smart meters in Smart Grid. As the communication within an AMI needs to be secure, key management becomes an issue due to overhead and limited resources. While using public-keys eliminate some of the overhead of key management, there is still challenges regarding certificates that store and certify...
P2P media streaming is the most renowned application on the web. In live media streaming nearest neighbor should discover as quick as possible. It is the most time constrained application to find nearest peer over the internet. Scalability, QoS and low latency are the objectives of media streaming. To achieve these objectives a system is needed which speedily and perfectly finds the nearby peer by...
Blockchain is the basic technology of bitcoin. With the value appreciation and stable operation of bitcoin, blockchain is attracting more and more attention in many areas. Blockchain has the characteristics of decentralization, stability, security, and non-modifiability. It has the potential to change the network architecture. The consensus algorithm plays a crucial role in maintaining the safety...
Docker has been widely adopted in enterprise-level container environment. As an important part of Docker-based container ecosystem, Docker Registry provides the service of storing, distributing and managing Docker images, which is crucial to run Docker containers. In large-scale container platforms, deploying applications is prone to overburdening Docker Registry with flooding network traffic, and...
Recently, blockchains have been gathering a lot of interest. Many applications can benefit from the advantages of blockchains. Nevertheless, applications with more restricted privacy or participation requirements cannot rely on public blockchains. First, the whole blockchain can be downloaded at any time, thus making the data available to the public. Second, anyone can deploy a node, join the blockchain...
Centralized e-Learning technology has dominated the learning ecosystem that brings a lot of potential usage on media rich learning materials. However, the centralized architecture has their own constraint to support large number of users for accessing large size of learning contents. On the other hand, Content Delivery Network (CDN) solution which relies on distributed architecture provides an alternative...
Thespis is a middleware that innovatively leverages the Actor model to implement causal consistency over an industry-standard database, whilst abstracting complexities for application developers behind a REST open-protocol interface. Our evaluation considers correctness, performance and scalability aspects. We also run empirical experiments using YCSB to show the efficacy of the approach for a variety...
Since, the evolution of distributed operating system, distributed file system is come out to be important part in operating system. P2P is a reliable way in Distributed Operating System for file sharing. It was introduced in 1999, later it became a high research interest topic. Peer to Peer network is a type of network, where peers share network workload and other load related tasks. A P2P network...
To address the risk of location privacy disclosure in location-based services (LBSs), existing solutions generally introduce a single trusted anonymizer between the users and the location service provider (LSP). However, a single anonymizer offers limited privacy guarantees and incurs high communication overhead in continuous LBSs. Once the anonymizer is compromised, it may put the user information...
In this paper, we propose an OpenFlow-assisted framework for P2P (peer-to-peer) live streaming, which incorporates an OpenFlow-assisted architecture and an OpenFlow-assisted algorithm. The architecture combines the characteristics and advantages of both BitTorrent system and OpenFlow network. The algorithm can dynamically calculate the path and corresponding available bandwidth for each flow according...
Applications requiring strict access control, such as medical record query, often require auditing of the query. The current typical design relies on server side logging. However, logging on server-side do not provide strict means of auditing, since the server can be tampered with attackers, and also anybody who has permission to write can modify the log. We propose a scheme using blockchain technology,...
Video streaming now amounts to the majority of traffic in the Internet. Media streaming relies on large-scale content distribution networks (CDNs), that incur significant costs to build or use. P2P distribution of video content reduce reliance on CDNs and costs. Unfortunately, P2P distribution is fraught with QoE problems, specially during flash crowds or in scenarios where users have limited bandwidth...
The advances in computational techniques both from a software and hardware viewpoint lead to the development of projects whose complexity could be quite challenging, e.g., biomedical simulations. In order to deal with the increased demand of computational power many collaborative approaches have been proposed in order apply proper partitioning strategy able to assign pieces of execution to a crowd...
Named Data Networking (NDN) is a promising Future Internet architecture to support efficient content distribution. Specifically, P2P may gain benefits from NDN, as NDN inherently provides a flexible forwarding plane for multi-source and multi-path communications. Existing studies in this area have proposed solutions, but these are adversely affected by link latency. This leads to illogical resource...
To address the challenges raised by the Internet usage evolution over the last years, the Content-Centric Networking (CCN) has been proposed. One key feature provided by CCN to improve the efficiency of content delivery is the in-network caching, which has major impact on the system performance. In order to improve caching effectiveness in such systems, studying the functioning of CCN in-network storage...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.