Search results for "Peer-to-peer"

showing 10 items of 54 documents

P2PStudio - Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research

2006

Peer-to-Peer Studio has been developed as a monitoring, controlling and visualization tool for peer-to-peer networks. It uses a centralized architecture to gather events from a peer-to-peer network and can be used to visualize network topology and to send different commands to individual peer-to-peer nodes. The tool has been used with Chedar Peer-to-Peer network to study the behavior of different peer-to-peer resource discovery and topology management algorithms and for visualizing the results of NeuroSearch resource discovery algorithm produced by the Peer-to-Peer Realm network simulator. This paper presents the features, the architecture and the protocols of Peer-to-Peer Studio and the ex…

Computer sciencebusiness.industryP2PStudioDistributed computingPeer-to-peerNetwork topologycomputer.software_genreNetwork simulationVisualizationResource (project management)vertaisverkkoArchitecturebusinesscomputervalvontatyökaluStudioNetwork management stationComputer network
researchProduct

Advertising Peer-To-Peer Networks over the Internet

2002

Weber, Matthieu Advertising Peer-to-Peer Networks over the Internet Jyvaskyla: University of Jyvaskyla, 2006, 120 p. (Jyvaskyla Licentiate Theses in Computing ISSN 1795-9713; 7) ISBN 951-39-2329-0 Finnish summary Most peer-to-peer networks nowadays are decentralized or even fully distributed, meaning that they do not require a central authority for proper operation. Joining such networks is however often performed by using a central directory of its members, thus breaking their decentralized characteristic. This work proposes an advertisement system for peer-to-peer networks that does not rely on a central service, nor requires any dedicated infrastructure to be setup, using only already ex…

Service (systems architecture)business.industryComputer scienceContextual advertisingAdvertisingDirectoryPeer-to-peercomputer.software_genreOnline advertisingAdvertising researchAdvertising campaignThe InternetElectrical and Electronic EngineeringbusinesscomputerTelecommunications and Radio Engineering
researchProduct

Iterative altitude-aiding algorithm for improved GNSS positioning

2011

The system proposed in this study relies on a WAVE P2P network, which is a proper standard to fit the vehicular environment wireless communications requests. Starting from the chance to exchange information given by this infrastructure, the possibility to improve the performance of a global navigation satellite system (GNSS) receiver based on a Kalman filter is considered. This improvement is obtained exploiting the external altitude measurements provided by other peers in the network, equipped with GNSS receivers. The topic of an altitude-aided system has been described in a previous work, that highlighted the need for a parameter that points out the effectiveness and the consistency of th…

GNSS augmentationKalman filters; iterative methods; peer-to-peer computing; satellite navigationsatellite navigationComputer sciencebusiness.industryIterative methodReal-time computingSatellite systemKalman filterGNSS applicationspeer-to-peer computingPhysics::Space PhysicsWirelessiterative methodsSatellite navigationElectrical and Electronic EngineeringbusinessKalman filtersReliability (statistics)Simulation
researchProduct

Providing Full Awareness to Distributed Virtual Environments Based on Peer-to-Peer Architectures

2006

In recent years, large scale distributed virtual environments (DVEs) have become a major trend in distributed applications, mainly due to the enormous popularity of multiplayer online games in the entertainment industry. Since architectures based on networked servers seems to be not scalable enough to support massively multiplayer applications, peer-to-peer (P2P) architectures have been proposed as an efficient and truly scalable solution for this kind of systems. However, the main challenge of P2P architectures consists of providing each avatar with updated information about which other avatars are its neighbors. We have denoted this problem as the awareness problem. Although some proposal…

MultimediaComputer scienceScale (chemistry)ServerScalabilityEntertainment industryPeer-to-peerUnicastcomputer.software_genrecomputerPopularity
researchProduct

The Design of Secure and Efficient P2PSIP Communication Systems

2010

Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information among participating peers without help of the central servers. The concept of self-configuration, self-establishment greatly improves the robustness of the network system compared with the traditional Client/Server based systems. In this paper, we propose a system architecture for constructing efficient and secure P2PSIP communication systems. The proposed approach includes three-layer hierarchical overlay division, peer identifier assignment, cache based efficiency enhancement, proxy…

IdentifierRobustness (computer science)Computer sciencebusiness.industryServerDistributed computingSystems architectureCacheSubjective logicCommunications systembusinessChord (peer-to-peer)Computer network
researchProduct

An Adaptive Routing Mechanism for Efficient Resource Discovery in Unstructured P2P Networks

2005

The widespread adoption of large-scale decentralized peer-to-peer (P2P) systems imposes huge challenges on distributed search and routing. Decentralized and unstructured P2P networks are very attractive because they require neither centralized directories, nor precise control over network topology or data placement. However their search mechanisms are extremely unscalable, generating large loads on the network participants. In this paper, to address this major limitation, we propose and evaluate the adoption of an innovative algorithm for routing user queries. The proposed approach aims at dynamically adapting the network topology to peer interests, on the basis of query interactions among …

Resource (project management)Computer scienceMechanism (biology)Distributed computingControl (management)Resource managementTopology (electrical circuits)Peer-to-peerAdaptive routingRouting (electronic design automation)computer.software_genreNetwork topologycomputer
researchProduct

Storm

2003

We present Storm, a storage system which unifies the desktop and the public network, making Web links between desktop documents more practical. Storm assigns each document a permanent unique URI when it is created. Using peer-to-peer technology, we can locate documents even though our URIs do not include location information. Links continue to work unchanged when documents are emailed or published on the network. We have extended KDE to understand Storm URIs. Other systems such as GNU Emacs are able to use Storm through an HTTP gateway.

DatabaseComputer sciencebusiness.industryComputerApplications_COMPUTERSINOTHERSYSTEMSStormGateway (computer program)Peer-to-peercomputer.software_genrePublic networkWorld Wide WebComputer data storageComputingMethodologies_DOCUMENTANDTEXTPROCESSINGbusinesscomputerProceedings of the fourteenth ACM conference on Hypertext and hypermedia
researchProduct

Security Enhancement of Peer-to-Peer Session Initiation

2012

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advanta…

Computer sciencebusiness.industryInternet privacySecurity enhancementSession (computer science)Peer-to-peercomputer.software_genrebusinesscomputer
researchProduct

DSMAV: An improved solution for multi-attribute search based on load capacities

2016

DHT (Distributed Hash Table) such as CHORD or PARTRY facilitates information searching in scalable systems. Two popular DHT-based approaches for range or multi-attribute search are to rely on attribute-value tree and a combination of attributes and values. However, tradeoff between a load balancing mechanism and query efficiency is a challenging task for such information searching systems. In this paper, we propose improved algorithms for a system called DSMAV in which information resources are distributed fairly among nodes and found based on multi-attribute queries in a small number of hop counts. Our system creates identifiers from resource names, each of which is a combination of attrib…

Computer sciencebusiness.industryDistributed computingScalability0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processing02 engineering and technologyLoad balancing (computing)Chord (peer-to-peer)businessComputer networkDistributed hash table2016 IEEE Sixth International Conference on Communications and Electronics (ICCE)
researchProduct

A secure architecture for P2PSIP-based communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…

PastryComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer securitycomputer.software_genreCommunications systemEncryptionDistributed hash tableContent addressable networkDistributed System Security ArchitectureSystems architecturebusinessChord (peer-to-peer)computerComputer networkProceedings of the 2nd international conference on Security of information and networks - SIN '09
researchProduct