• Title/Summary/Keyword: Peer-to-peer networks

Search Result 188, Processing Time 0.028 seconds

A Game theoretic analysis of public goods allocation in p2p networks

  • Zhang, Qingfeng;Wang, Sheng;Liao, Dan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2854-2874
    • /
    • 2015
  • This paper presents a game theoretic approach to analyze the public goods (PGs) allocation in peer-to-peer (p2p) networks. In order to reduce the free-riders and promote the cooperation among peers, we propose an incentive mechanism with cooperation-based game theory. In this paper, we regarded the contributed resources by cooperators as public goods (PGs). We also build the PGs allocation in P2P networks to be the optimization problem, and the optimal solution of PGs allocation satisfies the Bowen-Lindahl-Samuelson equilibrium. Firstly, based on the subscriber mechanism, we analyze the feasibility and prove the validity, which can achieve Nash equilibrium. However, this strategy cannot meet to Bowen-Lindahl-Samuelson equilibrium as the free-riders do not pay with their private goods for consuming the PGs. Secondly, based on the Walker mechanism, we analyze the feasibility and prove the validity for the same allocation problem, which meets to Bowen-Lindahl-Samuelson equilibrium and achieves Pareto efficiency within cooperative game. Simulations show that the proposed walker mechanism can significantly improve the network performance of throughout, and effectively alleviate free-riding problem in P2P networks.

DiffServ QoS Support in DSL Broadband Access Networks (DSL 광대역 접속망에서 DiffServ QoS 지원 방안)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.613-620
    • /
    • 2006
  • From both techlical and economic viewpoints, DiffServ IP QoS architecture is accepted as a more practical solution because of the complexity Problem of the other IntServ architecture. In this paper, we propose several models to support DiffServ QoS in DSL broadband access networks and discuss about migration path from current best-effort DSL networks to DiffServ-enabled ones. Since DSL networks are recently and widely deployed in the world amount ot new investment, compatibility with existing QoS-unaware DSL systems, and compatibility with existing charging systems as well as effective support of various QoS services must be carefully considered when we design DiffServ QoS support models in DSL networks. The DiffServ models proposed in this paper are divided into static DiffServ models and dynamic DiffServ models which are near-term solutions and long-term solutions repecitively. The static DiffServ models include Flat DiffServ which suworts per-subscriber DiffServ QoS and Structured DiffServ which supports per-subscriber and per-service DiffServ QoS. And the dynamic DiffServ models include Direct DiffServ for P2P(Peer to Peer) applications and Indirect DiffServ for ASP(Application Service Provider) applications.

Study on the Characteristics of Fashion Leaders in College Clubs' Fashion Networks

  • Yun, So Jung;Jung, Hye In;Choo, Ho Jung;Jeong, So Won
    • International Journal of Costume and Fashion
    • /
    • v.14 no.1
    • /
    • pp.1-15
    • /
    • 2014
  • Fashion leadership is divided into visual influence, linguistic influence, and dual leadership. We refer to people exercising such influential power as fashion innovators, fashion opinion leaders, and fashion double leaders, respectively. Scholars and marketers have raised continuous questions on this issue: who are these fashion leaders and what characteristics do they have? In this study, social network analysis is applied to grasp the existence of three types of fashion leaders in college clubs, examine their positions in fashion process networks and investigate their individual and social characteristics. For this study, three college clubs were recruited through convenience sampling and surveyed online. Peer nomination questions for structuring fashion process networks and self-evaluation questions for measuring personal characteristics are included. Two fashion networks, an opinion leadership network and an innovativeness network, embrace four to six leaders and illustrate similar structure patterns in the three groups, which indicates that dual leaders enjoyed the lion's share in college clubs. The number of fashion innovators tends to be fewer compared to that of fashion opinion leaders, and we infer that peer relationship appears to intervene with fashion opinion leadership. Other personal characteristics supporting results from previous studies are also confirmed in this study.

Hierarchical Message Forwarding Scheme for Efficient Data Distribution in P2P Messaging System (P2P 출판-구독 메시징 시스템에서 효율적인 정보 전파를 위한 계층적 메시지 전송 기법)

  • Jung, Jin Sun;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.209-216
    • /
    • 2019
  • Publish-subscribe communication model is popular for various type of distributed applications because of its loosely coupled style connections. Among the various architecture style for publish-subscribe system, peer-to-peer architecture has been used for the mission critical application domain since it provides high scalability and real-timeness. On the other hand, to utilize the bandwidth of given networks, message filtering is frequently used to reduce the number of messages on the system. Even if P2P provides superior scalability, it is hard to apply filtering to the its messaging system because the filtering process should be done on the peer-side in P2P architecture that are usually done on the broker server in conventional pub/sub architecture. In this paper, we propose a hierarchical subscription management structure as well as message forwarding scheme for efficient data dissemination. Our proposed scheme reduces the number of received messages by filter-out un-wanted messages and offloading the message dissemination work to other subscribers to enhance the messaging throughput.

Advertisement Dissemination Scheme Using User Preferences in Mobile P2P Environments (모바일 P2P 환경에서 사용자 선호도를 이용한 광고 전송 기법)

  • Jeong, Jiwon;Lee, Suji;Yun, Jinkyoung;Lim, Jongtae;Shin, Jaeryong;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.12
    • /
    • pp.35-49
    • /
    • 2015
  • Recently, with the development of wireless communication technologies and mobile equipments, various studies on mobile P2P networks have been conducted. In this paper, we propose an advertisement dissemination method considering peer's mobilities and preferences in mobile P2P networks. The proposed scheme generates a peer's preference through the analysis of users' activities to disseminate advertisements with user preferences. To reduce duplicated advertising messages and improve reception ratio, the priority of advertisement re-dissemination is determined according to peer's preferences, mobilities, and advertisement reception ratio. We improve the participation rate of the advertisement dissemination of mobile peers using the incentive mechanism in mobile P2P networks. To show the superiority of the proposed scheme, we compare it with the existing scheme in terms of the number of messages and accuracy.

An Anomaly Detection Method for the Security of VANETs (VANETs의 보안을 위한 비정상 행위 탐지 방법)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.77-83
    • /
    • 2010
  • Vehicular Ad Hoc Networks are self-organizing Peer-to-Peer networks that typically have highly mobile vehicle nodes, moving at high speeds, very short-lasting and unstable communication links. VANETs are formed without fixed infrastructure, central administration, and dedicated routing equipment, and network nodes are mobile, joining and leaving the network over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connect, without centralized control. In this paper, we propose a rough set based anomaly detection method that efficiently identify malicious behavior of vehicle node activities in these VANETs, and the performance of a proposed scheme is evaluated by a simulation in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

Joint Buying P2P System for User Convenient Social Network (사용자 편의적 소셜 네트워크 공동구매 P2P 시스템)

  • Kim, Boon-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.915-920
    • /
    • 2011
  • P2P technology is the concept to share resources efficiently in distributed environments that a lot of research is underway. a lot. In these P2P systems, the server to support the contents-information have less overloads than the composed system as the server to have resources generally. In this paper, we suggest a P2P system to support conveniences to choice time for users that were connected with the information of joint-buying based on social network. Social networks based on co-purchasing information and price alerts using the P2P system is provided by the peer, this relay information is provided by the P2P server.

TAILWIND: Mobility information based Routing for Delay Tolerant Network (이동 방향 정보를 이용한 DTN 라우팅: TAILWIND)

  • Cho, Seoik;Kim, Sunhyun;Moon, Soohoon;Han, Seungjae
    • Journal of KIISE
    • /
    • v.42 no.3
    • /
    • pp.408-412
    • /
    • 2015
  • In base station based networks, traffic overload at the base station is inevitable. Peer-to-peer DTN which disperses the traffic overhead to each node can relieve the traffic overload at the base station. To increase the message delivery ratio and reduce the message overhead, we present novel routing using mobility information which can be obtained from each node, unlike the existing flooding based routings. In the proposed routing scheme, the routing decision metric, which is defined based on the node mobility information, is computed by using the expected distance between each node to the destination. The message is copied to other nodes that have lower expected distance to the destination than the value for the node willing to copy the message. We conducted simulations by using both a random mobility model and a real mobility trace to compare the performance of the proposed routing scheme to the existing routing scheme that does not utilize the mobility information. The performance evaluation showed the proposed routing successfully delivers messages with 10% to 30% less copies compared to previously proposed routing schemes.

Performance Impact of Large File Transfer on Web Proxy Caching: A Case Study in a High Bandwidth Campus Network Environment

  • Kim, Hyun-Chul;Lee, Dong-Man;Chon, Kil-Nam;Jang, Beak-Cheol;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • Journal of Communications and Networks
    • /
    • v.12 no.1
    • /
    • pp.52-66
    • /
    • 2010
  • Since large objects consume substantial resources, web proxy caching incurs a fundamental trade-off between performance (i.e., hit-ratio and latency) and overhead (i.e., resource usage), in terms of caching and relaying large objects to users. This paper investigates how and to what extent the current dedicated-server based web proxy caching scheme is affected by large file transfers in a high bandwidth campus network environment. We use a series of trace-based performance analyses and profiling of various resource components in our experimental squid proxy cache server. Large file transfers often overwhelm our cache server. This causes a bottleneck in a web network, by saturating the network bandwidth of the cache server. Due to the requests for large objects, response times required for delivery of concurrently requested small objects increase, by a factor as high as a few million, in the worst cases. We argue that this cache bandwidth bottleneck problem is due to the fundamental limitations of the current centralized web proxy caching model that scales poorly when there are a limited amount of dedicated resources. This is a serious threat to the viability of the current web proxy caching model, particularly in a high bandwidth access network, since it leads to sporadic disconnections of the downstream access network from the global web network. We propose a peer-to-peer cooperative web caching scheme to address the cache bandwidth bottleneck problem. We show that it performs the task of caching and delivery of large objects in an efficient and cost-effective manner, without generating significant overheads for participating peers.

Practical Password-Authenticated Three-Party Key Exchange

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.312-332
    • /
    • 2008
  • Password-based authentication key exchange (PAKE) protocols in the literature typically assume a password that is shared between a client and a server. PAKE has been applied in various environments, especially in the “client-server” applications of remotely accessed systems, such as e-banking. With the rapid developments in modern communication environments, such as ad-hoc networks and ubiquitous computing, it is customary to construct a secure peer-to-peer channel, which is quite a different paradigm from existing paradigms. In such a peer-to-peer channel, it would be much more common for users to not share a password with others. In this paper, we consider password-based authentication key exchange in the three-party setting, where two users do not share a password between themselves but only with one server. The users make a session-key by using their different passwords with the help of the server. We propose an efficient password-based authentication key exchange protocol with different passwords that achieves forward secrecy in the standard model. The protocol requires parties to only memorize human-memorable passwords; all other information that is necessary to run the protocol is made public. The protocol is also light-weighted, i.e., it requires only three rounds and four modular exponentiations per user. In fact, this amount of computation and the number of rounds are comparable to the most efficient password-based authentication key exchange protocol in the random-oracle model. The dispensation of random oracles in the protocol does not require the security of any expensive signature schemes or zero-knowlegde proofs.