共查询到20条相似文献,搜索用时 0 毫秒
1.
Chi‐Jen Wu De‐Kai Liu Ren‐Hung Hwang 《International Journal of Communication Systems》2007,20(1):83-102
This work describes a novel location‐aware, self‐organizing, fault‐tolerant peer‐to‐peer (P2P) overlay network, referred to as Laptop. Network locality‐aware considerations are a very important metric for designing a P2P overlay network. Several network proximity schemes have been proposed to enhance the routing efficiency of existing DHT‐based overlay networks. However, these schemes have some drawbacks such as high overlay network and routing table maintenance overhead, or not being completely self‐organizing. As a result, they may result in poor scalability as the number of nodes in the system grows. Laptop constructs a location‐aware overlay network without pre‐determined landmarks and adopts a routing cache scheme to avoid maintaining the routing table periodically. In addition, Laptop significantly reduces the overlay maintenance overhead by making each node maintain only the connectivity between parent and itself. Mathematical analysis and simulations are conducted to evaluate the efficiency, scalability, and robustness of Laptop. Our mathematical analysis shows that the routing path length is bounded by logd N, and the joining and leaving overhead is bounded by d logd N, where N is the number of nodes in the system, and d is the maximum degree of each node on the overlay tree. Our simulation results show that the average latency stretch is 1.6 and the average routing path length is only about three in 10 000 Laptop nodes, and the maximum degree of a node is bounded by 32. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
2.
3.
4.
5.
Traditional traffic identification methods based on well‐known port numbers are not appropriate for the identification of new types of Internet applications. This paper proposes a new method to identify current Internet traffic, which is a preliminary but essential step toward traffic characterization. We categorized most current network‐based applications into several classes according to their traffic patterns. Then, using this categorization, we developed a flow grouping method that determines the application name of traffic flows. We have incorporated our method into NG‐MON, a traffic analysis system, to analyze Internet traffic between our enterprise network and the Internet, and characterized all the traffic according to their application types. 相似文献
6.
Kunwar Pal Mahesh Chandra Govil Mushtaq Ahmed 《International Journal of Communication Systems》2018,31(2)
Nowadays, peer‐to‐peer network plays a significant role in data transfer and communication. The past few years have witnessed considerable growth in this area because of its inherent advantages. Peer‐to‐peer live streaming has a significant impact on video transmission over the Internet. Major factors that influence the performance of P2P live streaming are overlay construction and scheduling strategies. Although, a large number of scheduling schemes are developed but none of them is comprehensive enough to provide solutions to live streaming issues. These suffer from substantial delay and low video quality at the receiver side. In this paper, a new start‐up–based selection procedure and slack time–based scheduling scheme is proposed. The start‐up selection procedure defines the start‐up buffer location for new peer, and the scheduling scheme selects both the chunk and peers. The proposed scheduling scheme uses both push and pull priority–based strategies. The simulation results of the proposed approach demonstrates significant improvement in both the network performance and video quality at the receiver side. It is observed that playback delay, startup delay, and end‐to‐end delay in the network are reduced and quality of the video at receiver side is improved as the distortion and frame loss ratio is decreased. 相似文献
7.
8.
9.
10.
现有的服务组合方法多是获取候选服务节点的信息,在集中式组合引擎上搜索路径.这种集中式方法不仅具有单点失效、可扩展性差等缺点,而且候选服务的QoS没有保证,服务搜索空间过大,组合效率较低.文章提出了一种分布式的服务组合方法(BDDSC),将分散在网络中性能有保证的服务节点构建成服务覆盖网络,使各个节点协作执行进行动态服务... 相似文献
11.
12.
Hamidreza Mahini Mehdi Dehghan Amir Masoud Rahmani 《International Journal of Communication Systems》2016,29(6):1187-1203
GaMe‐PLive is a game theoretical framework for peer‐to‐peer live video streaming. Prevention of free‐riding and minimization of loss rate in video data transmission are the important objectives of the proposed framework. GaMe‐PLive is also extremely evasive about overhead of extra control messages exchange. At first, a static game with complete information between peers is described, which models the peer's interactive decision process for acceptance/rejection of a video chunk request. All peers repeatedly play this game during video playback periodically. Afterwards, the proposed game is analyzed to obtain a Nash equilibrium, which determines a peer's best strategic response for participation in the video chunk distribution. It will be proved that by applying some simple and feasible conditions, the desired objectives can be reached. The experimental results reveal that the proposed system has been successful in detecting free‐riders with negligible false negative and false positive rate. Also, tolerable loss chunk percentage has been satisfied in all performed tests. Besides, an interesting social norm emerges in GaMe‐PLive: Less participation leads to more missing chunks. GaMe‐PLive will be proven to be quite resistant against cheating peers. The proposed framework displays high performance even if there is not a video server with high upload bandwidth. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
13.
Jinsuk Baek Paul S. Fisher Minho Jo Hsiao‐Hwa Chen 《International Journal of Communication Systems》2012,25(5):553-570
A new video transport protocol for multicast agents in wireless mesh networks (WMNs) is proposed in this paper. The proposed protocol enables a significant reduction in the transmission overhead, while providing reliable communication for its use in multicast applications. This proposed reliable protocol provides a practical approach for an overlay peer‐to‐peer multicast facility supported within the application layer. This obviates the need to give upgraded routers capable of handling multicast broadcasting or modify the existing protocol stack. The protocol tolerates partial losses in multimedia transmissions, while supporting control of the delay sensitivity of such transmissions in WMNs. The key issue in this protocol is the ability to detect packet loss, anticipate retransmission requests, and use the anticipated retransmission requests to transmit the lost packets prior to requests from other receiving agents. The proposed protocol allows for the receiver to determine if retransmission of lost packets is required, ensuring the greatest flexibility needed for a reliable multicast protocol. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
14.
Hamid Reza Ghaeini Behzad Akbari Behrang Barekatain Alicia Trivino‐Cabrera 《International Journal of Communication Systems》2016,29(18):2580-2603
Because video streaming over mobile handheld devices has been of great interest, the necessity of introducing new methods with low implementation cost and scalable infrastructures is a strong demand of the service. In particular, these requirements are present in popular wireless networks such as wireless mesh networks (WMN). Peer‐to‐peer (P2P) networks promise an efficient scalable network infrastructure for video streaming over wired and wireless networks. Limited resources of the peers in P2P networks and high error rate in wireless channels make it more challenging to run P2P streaming applications over WMNs. Therefore, it is necessary to design efficient and improved error protection methods in P2P video streaming applications over WMNs. In this paper, we propose a new adaptive unequal video protection method specially intended for large scale P2P video streaming over mobile WMNs. Using this method, different frames have different priorities in receivers along the recovery process. Moreover, we precisely and completely evaluate different aspects related to frame protection in these networks using five important performance metrics including video distortion, late arrival distortion, end‐to‐end delay, overhead and initial start‐up delay. The results obtained from a precise simulation in OMNeT++ show that the proposed adaptive method significantly outperforms other solutions by providing better video quality on mobile wireless nodes. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
15.
NGN(下一代网络)采用集中控制的统一的承载网提供综合业务,解决了QoS(服务质量)、安全性和可管理问题,但这种集中管理模式部分削弱和丧失了互联网无所不在的性能,不能有效地支持以P2P为代表的互联网新应用和机-机业务.此外,NGN按服务质量和使用量收费的业务模型,不适应目前消费类宽带业务的发展,以宽带接入包月为代表的互联网运营模式强烈冲击传统电信业务模式,动摇了NGN业务模型的基础.NGN需要并行发展具有分布管理能力的下一代互联网,利用互联网作为基层承载网,在其上应用层建立重叠网支持P2P应用和提供分布式管理,面向广大消费者提供固定和移动宽带互联网业务,支持机-机的各种应用,充分发挥互联网无所不在的优势. 相似文献
16.
17.
18.
针对目前网络音频传输存在的问题,通过计算机控制系统、音频流数据传输、多路音频网络实时广播系统三个部分对网络音频流数据传输问题进行了详细探讨,并将流媒体技术成功应用于多路音频网络实时广播系统。 相似文献
19.
Luca Caviglione 《International Journal of Communication Systems》2006,19(9):1045-1062
This paper aims at introducing some emerging technologies and illustrating how they could be ported on both tactical and civil protection networks, allowing both functional and structural improvement. In the past years, ‘ordinary’ networking technologies have made dramatic progress in topics that were previously assumed as marginal, such as anonymity and data persistence. In this evolutionary perspective, an effort could be made to port this subset of civil technologies to more challenging networking environments. The peer‐to‐peer (p2p) networking paradigm offers interesting solutions for organizing both the application‐level interaction and the signalling/resource reservation phase, as well as the effective delivery of a service. Due to its intrinsic delocalization characteristic, it also offers a set of solutions for anonymous data exchange, and helps hiding the routing phase. In another respect, but even more consistent, zero configuration networks allow keeping up and running the infrastructure, by reducing the needs of skilled technicians or network administrators to the minimum. This technology allows performing configuration and maintenance in a semi‐automatic way, avoiding waste of time during tactical operations and preventing the occurrence of mistakes in panic situations. The paper highlights the main aspects and discusses a specific example in the deployment of application‐level service quality over an ad hoc network scenario. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
20.