• No results found

P2P/Overlay Networks

Decentralized Clustering in Pure P2P Overlay Networks Using Schelling's Model

Decentralized Clustering in Pure P2P Overlay Networks Using Schelling's Model

... a P2P overlay net- work’s topology so that peers having certain characteristics are grouped together as ...a P2P overlay network so that requests are routed more ...the overlay ...

7

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING

... peer-to-peer overlay networks provide a solution for the construction of large scale, decentralized applications, including distributed storage, group communication, and content ...network overlay. ...

5

A Review of Peer-to-Peer Networking on the Internet

A Review of Peer-to-Peer Networking on the Internet

... resulting overlay networks are inherently decentralized, self-organizing, and ...Well-designed P2P systems should be adaptive to peer arrivals and departures, resilient to failures, tolerant to ...

6

Network service registration based on role-goal-process-service meta-model in a P2P network

Network service registration based on role-goal-process-service meta-model in a P2P network

... Service-Oriented Overlay NETworks (SOONET), a non-structural P2P service-discovery prototype system for Beijing municipal ...non-structural P2P network among these servers to realize service ...

25

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... Unstructured P2P networks are formed when the overlay links are established ...The networks here can be easily constructed by copying existing links of another node and then form its own links ...

6

Survey based Comparison of Chord Overlay Networks

Survey based Comparison of Chord Overlay Networks

... Chord is a structured peer-to-peer (P2P) overlay network in which participating peers share resources as equals. To find a specific data item within the network, Chord system provide a lookup mechanism that ...

8

Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multicast Routing Techniques

Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multicast Routing Techniques

... The overlay multicasting being a broad concept but is very efficient and gained attention as one of the mechanisms to overcome the barriers of deployment to the router level solutions for various networks ...

9

Peer selection technique for efficient searching and streaming in P2P network

Peer selection technique for efficient searching and streaming in P2P network

... VII. M ULTIMEDIA STREAMING ON P 2 P NETWORK Streaming refer to the delivery method. Numbers of digital video being streamed over the Internet each day are all growing exponentially. This obviously is placing an intense ...

5

A Dynamic Algorithm for Loop Detection Software-Defined Networking Using Open Flow in Hop by Hop Multipath Links

A Dynamic Algorithm for Loop Detection Software-Defined Networking Using Open Flow in Hop by Hop Multipath Links

... Delivery Networks (CDN), Peer-to-Peer networks (P2P), cloud computing are based on resource ...and P2P networks utilize resource pooling to ensure efficient network ...operations. ...

6

Secure Multicast Transmission Scheme for Overlay Networks

Secure Multicast Transmission Scheme for Overlay Networks

... In the proposed system the secure multicast group communication is designed with key revocation and storage management mechanism. The storage space is allocated with reference to the lifetime values. The key values are ...

6

GRIDKIT: Pluggable overlay networks for Grid computing

GRIDKIT: Pluggable overlay networks for Grid computing

... DHT-based peer-to-peer overlays are primarily used to provide reliable resource discovery in large-scale distributed systems. Prime examples are Pastry [19], Chord [18], CAN [20] and Tapestry [21]. In these systems, ...

18

SIP protocol over IP networks. The serial device

SIP protocol over IP networks. The serial device

... the P2P module from the serial device using “ATD ...threads P2P module has to maps the phone number to an appropriate IP address in the Phone book entry, after which connection to the destination has been ...

5

On the Penetration of Business Networks by P2P File Sharing

On the Penetration of Business Networks by P2P File Sharing

... business networks distributing QUERYHIT messages jumped five-fold following its release, as can be seen in figure ...business networks that we observed for the first time distributing this file on April 7 ...

6

Peer-to-Peer File Sharing and the Market for Digital Information Goods

Peer-to-Peer File Sharing and the Market for Digital Information Goods

... open p2p networks, a rival and nonexcludable ...large p2p networks where thousands of individuals interact anonymously is ...peer-to-peer networks such as Gnutella exhibit sharing is ...

46

Services Based On Trustworthiness in P2p Networks

Services Based On Trustworthiness in P2p Networks

... In the proposed system, we introduce a Self- Organizing Trust model (SORT) that aims to decrease malicious activity in a P2P system by establishing trust relations among peers in their proximity. No a priori ...

12

Equivalent Servants over P2P Networks

Equivalent Servants over P2P Networks

... Concerning the lookup overhead, studied at the reasonable service request rate of 100 requests/min (i.e., ρT = 0.6) and for a network size N = 5000, we observed a maximum average service request rate at a single node of ...

11

Packet switched on chip FPGA overlay networks

Packet switched on chip FPGA overlay networks

... The most commonly used topology for NoCs is the bus [3, 28, 60]. With no segementation, a bus can only handle a single network send and receive per cycle. Applications with large numbers of PEs will become quickly ...

91

Time-multiplexed FPGA overlay networks on chip

Time-multiplexed FPGA overlay networks on chip

... multiplexed networks (2048 PEs), where latency limits performance enough for packet-switching to close the performance ...packet-switched networks require more area than the largest time-multiplexed ...

106

SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification

SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification

... A peer who wants to join a group needs to use the zero knowledge interactive proof to verify its secret group information with the exterior peer of this group. The group information is assigned by the authority of the ...

9

SOBIE:A Novel Super-node P2P Overlay Based on Information Exchange

SOBIE:A Novel Super-node P2P Overlay Based on Information Exchange

... the P2P network. Since the P2P network is a heterogeneous and loose couple structure without centralized controller, nodes being adjacent in logical network may be far in physical ...

9

Show all 10000 documents...

Related subjects