• Title/Summary/Keyword: Peer-to-peer networks

Search Result 188, Processing Time 0.028 seconds

Dynamic Network routing -an Agent Based Approach

  • Gupha, Akash;Zutshi, Aditya
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.50-58
    • /
    • 2001
  • Modern day networks are increasingly moving towards peer to peer architecture where routing tasks will not be limited to some dedicated routers, but instead all computers in a network will take part in some routing task. Since there are no specialized routers, each node performs some routing tasks and information passes from one neighbouring node to another, not in the form of dumb data, but as intelligent virtual agents or active code that performs some tasks by executing at intermediate nodes in its itinerary. The mobile agents can run, and they are free to d other tasks as the agent will take care of the routing tasks. The mobile agents because of their inherent 'intelligence'are better able to execute complex routing tasks and handle unexpected situations as compared to traditional routing techniques. In a modern day dynamic network users get connected frequently, change neighbours and disconnect at a rapid pace. There can be unexpected link failure as well. The mobile agent based routing system should be able to react to these situations in a fact and efficient manner so that information regarding change in topology propagates quickly and at the same time the network should not get burdened with traffic. We intend to build such a system.

  • PDF

Specific Device Discovery Method for D2D Communication as an Underlay to LTE-Advanced Networks (LTE-Advanced 네트워크에서 D2D 통신을 위한 특정 디바이스 탐색 기법)

  • Kim, Hyang-Mi;Lee, Han-Na;Kim, SangKyung
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.125-134
    • /
    • 2014
  • Device discovery for D2D (device-to-device) communication enables a device to discover other devices in order to initiate communication with them. Devices should perform the discovery phase using a small quantity of radio resource in a short time and be able to reduce the load of the base station. Legacy device discovery schemes have focused on discovering as many target devices as possible. However, it is not appropriate for peer-to-peer D2D communication scenario. Further, synchronization problems are an important issue for discovery signal transmission. This paper proposes a discovery method that one requesting device discovers a specific target for communication. Multiple antenna beamforming is employed for the synchronization between the base station and a target device. The proposal can reduce the load of the base station using the information that it already maintains and improve the reliability of the device discovery because two times of synchronizations using beamforming among the base station and devices can make the exact discovery of a target device with mobility possible.

A Study on Share Group Configuration Technique for Improving Data Transmission Performance (데이터 전달 성능 향상을 위한 공유 그룹 구성 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.89-96
    • /
    • 2015
  • The various services applied internet have been provided by the rapid development of wireless networks and providing multimedia contents are also increasing. It is caused a number of problems such as increasing of network traffic rapidly. P2P technique is gaining popularity for solving these problems. In particular, P2P technique in a wireless network environment has gained much popularity. Among them, MANET-based P2P techniques has been studied actively. It is not easy to be applied the existing technique as it is due to the dynamic topology and low bandwidth by moving nodes in MANET that is consisted of only mobile nodes. In this paper, we proposed sharing group construction technique for providing a stable connection between mobile nodes and reducing the load of network traffic and overhead of sharing group reconfiguration in order to improve data transmission performance between mobile nodes. The sharing group member nodes applied virtual sharing group generation technique with neighboring nodes of 1-hop distance in order to reduce traffic for file sharing. We performed comparative experiments with DHT technique to evaluate the performance of the proposed technique in this paper and the excellent performance is confirmed through experiments.

TCP-ROME: A Transport-Layer Parallel Streaming Protocol for Real-Time Online Multimedia Environments

  • Park, Ju-Won;Karrer, Roger P.;Kim, Jong-Won
    • Journal of Communications and Networks
    • /
    • v.13 no.3
    • /
    • pp.277-285
    • /
    • 2011
  • Real-time multimedia streaming over the Internet is rapidly increasing with the popularity of user-created contents, Web 2.0 trends, and P2P (peer-to-peer) delivery support. While many homes today are broadband-enabled, the quality of experience (QoE) of a user is still limited due to frequent interruption of media playout. The vulnerability of TCP (transmission control protocol), the popular transport-layer protocol for streaming in practice, to the packet losses, retransmissions, and timeouts makes it hard to deliver a timely and persistent flow of packets for online multimedia contents. This paper presents TCP-real-time online multimedia environment (ROME), a novel transport-layer framework that allows the establishment and coordination of multiple many-to-one TCP connections. Between one client with multiple home addresses and multiple co-located or distributed servers, TCP-ROME increases the total throughput by aggregating the resources of multiple TCP connections. It also overcomes the bandwidth fluctuations of network bottlenecks by dynamically coordinating the streams of contents from multiple servers and by adapting the streaming rate of all connections to match the bandwidth requirement of the target video.

Maternal Support Networks, Perceptions of Parenting Difficulty, and Children's Development (어머니의 사회적 관계망, 자녀양육에 대한 난이도 지각과 아동의 발달)

  • 이은해
    • Journal of the Korean Home Economics Association
    • /
    • v.35 no.3
    • /
    • pp.31-45
    • /
    • 1997
  • The main purpose of the study was to examine relationships of child development with maternal social networks and maternal perceptions of parenting difficulty. Subjects were 90 children, ages 4 and 5, with their mothers. Child development was measured by School Readiness Test, peer nomination, and social competency ratings by teachers. Mothers responded to a questionnaire regarding social networks and parenting difficulty. The major findings of the study include: 1) Employed mothers reported receiving less emotional support and listed more in-laws and work colleagues in their social network than unemloyed mothers. 2) Mothers who perceived receiving more emotional support from networks reported less difficulty in parenting, especially in providing cognitive stimulation and daily routine care to their children. 3) Children's age and maternal perceptions of easiness in providing cognitive stimulation were the most contributing factors for predicting children's learning readiness and social competency.

  • PDF

TIM: A Trapdoor Hash Function-based Authentication Mechanism for Streaming Applications

  • Seo, Seog Chung;Youn, Taek-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2922-2945
    • /
    • 2018
  • Achieving efficient authentication is a crucial issue for stream data commonly seen in content delivery, peer-to-peer, and multicast/broadcast networks. Stream authentication mechanisms need to be operated efficiently at both sender-side and receiver-side at the same time because of the properties of stream data such as real-time and delay-sensitivity. Until now, many stream authentication mechanisms have been proposed, but they are not efficient enough to be used in stream applications where the efficiency for sender and receiver sides are required simultaneously since most of them could achieve one of either sender-side and receiver-side efficiency. In this paper, we propose an efficient stream authentication mechanism, so called TIM, by integrating Trapdoor Hash Function and Merkle Hash Tree. Our construction can support efficient streaming data processing at both sender-side and receiver-side at the same time differently from previously proposed other schemes. Through theoretical and experimental analysis, we show that TIM can provide enhanced performance at both sender and receiver sides compared with existing mechanisms. Furthermore, TIM provides an important feature for streaming authentication, the resilience against transmission loss, since each data block can be verified with authentication information contained in itself.

Context-based classification for harmful web documents and comparison of feature selecting algorithms

  • Kim, Young-Soo;Park, Nam-Je;Hong, Do-Won;Won, Dong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.6
    • /
    • pp.867-875
    • /
    • 2009
  • More and richer information sources and services are available on the web everyday. However, harmful information, such as adult content, is not appropriate for all users, notably children. Since internet is a worldwide open network, it has a limit to regulate users providing harmful contents through each countrie's national laws or systems. Additionally it is not a desirable way of developing a certain system-specific classification technology for harmful contents, because internet users can contact with them in diverse ways, for example, porn sites, harmful spams, or peer-to-peer networks, etc. Therefore, it is being emphasized to research and develop context-based core technologies for classifying harmful contents. In this paper, we propose an efficient text filter for blocking harmful texts of web documents using context-based technologies and examine which algorithms for feature selection, the process that select content terms, as features, can be useful for text categorization in all content term occurs in documents, are suitable for classifying harmful contents through implementation and experiment.

  • PDF

A Study on Cheating Patterns in Online FPS Games and their Countermeasures : By the Case of Point Blank in Indonesia (온라인 FPS 게임의 치팅 유형과 대응 방안에 관한 연구 : 인도네시아 포인트 블랭크 사례를 중심으로)

  • Im, Sung-Jin;Lee, Dae-Hyun
    • Journal of Korea Game Society
    • /
    • v.11 no.2
    • /
    • pp.81-91
    • /
    • 2011
  • Hacking tools are evolving along the growth of on-line game industry. Those tools allow users with no programming knowledge to hack the game, which causes a lot of problems in on-line game services. Specifically, FPS games based on peer-to-peer networks are vulnerable to hacks. This paper analyzes cheating patterns by the case of Point Blank in Indonesia and prioritize countermeasures, which helps game companies handle hacks efficiently.

Self-Reputation System in P2P Networks (P2P환경의 자기 평판 관리 시스템)

  • 조남수;김우환;윤효진;이인석;천정희;김태성;진승헌;추경균
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.35-47
    • /
    • 2004
  • Though P2P network systems are widely used, not so much research has been done on security issues. One of the serious problem in P2P network is the authentication problem. To resolve this problem, we introduce a new concept, a "self-reputation system" in which a user manages her own reputation. We define self-reputation systems by presenting several requirements. We also give one instance of self-reputation system. The proposed instance satisfies the requirement including the prevention of erasing and the platform independence.ependence.

Proximity-based Overlay Network Routing for Service Discovery in Mobile Ad-Hoc Network (이동 애드혹 망에서의 서비스 검색을 위한 근접성 기반 오버레이 네트워크 라우팅)

  • Yoon Hyeon-Ju;Lee Eunju;Jeong Hyunku;Kim Jin-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.643-658
    • /
    • 2004
  • Mobile ad hoc networks(MANET) have recently attrarted a lot of attention in the research community as well as in industry. Although the previous research mainly focused on the various problems of MANET in data link and network layers, we consider, in this paper, how to efficiently support applications such as service discovery on top of MANET. Peer-to-Peer(P2P) overlay network can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both arc instances of self-organizing decentralized systems. Especially, distributed hash table(DHT) systems used for r2r overlay network can be effective in reducing the communication overhead in service discovery. However, since overlay network is independent of physical network topology and existing topology-aware mechanisms are based on the wired network, they are inefficient in MANET. We propose a proximity-based overlay network routing to overcome the inefficiency of routing in overlay network. In the proximity-based overlay network routing, each node collects information of physically close nodes by using one hop broadcast and routes messages to the logically closest node to destination. In a detailed ns-2 simulation study, we show that the proximity-based overlay network routing reduces the number of physical hops comparable to the flooding-based mechanism with low communication overhead. We also find that the proposed scheme works well in the mobile environment.