首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Peer‐to‐peer (P2P) overlay networks were developed initially for file sharing such as Napster and Gnutella; but later, they have become popular for content sharing, media streaming, telephony applications, etc. Underlay‐unawareness in P2P systems can result in suboptimal peer selection for overlay routing and hence poor performance. In this paper, we present a comprehensive survey of the research work carried out to solve the overlay‐underlay mapping problems up till now. The majority of underlay‐aware proposals for peer selection focus on finding the shortest overlay routes by selecting nearest nodes according to proximity information. Another class of approaches is based on passive or active probing for provision of underlay information to P2P applications. Some other optimizations propose use of P2P middleware to extract, process, and refine underlay information and provide it to P2P overlay applications. Another class of approaches strive to use ISPs or third parties to provide underlay information to P2P overlay applications according to their requirements. We have made a state‐of‐the‐art review and comparison for addressing the overlay‐underlay mismatch in terms of their operation, merits, limitations, and future directions.  相似文献   

2.
With the recent development of LTE‐A/5G technologies, data sharing among mobile devices offer an attractive opportunity to reduce Internet access. However, it requires smart strategies to share the data with low trade‐offs in time, cost, and energy. Several existing schemes offer a super‐peer‐based two‐tier model using a distributed hash table (DHT) organization for smart devices having device‐to‐device (D2D)/Bluetooth/WiFi capabilities. The primary focus of these schemes has been to reduce Internet usage by increased D2D content sharing. However, the real challenge is not in creating a two‐tier model, but evolving an efficient overlay that offers enhanced opportunities for D2D content sharing over the existing model. In this paper, we formulated a P‐median‐based selection of tier‐1 devices in a distribution network and solved it using the Lagrangian relaxation method. The tier‐2 devices become clients seeking content sharing services from tier‐1 devices. A strong motivation in this work is to raise a user's perception of the grade of service known as quality of experience (QoE). We analyzed the challenge for QoE assessment in resource‐constrained smartphones under the proposed model of enhanced D2D communication. Our focus is to establish a framework to evaluate QoE for applications and services over LTE‐A/5G networks with an improved D2D communication level. The simulation and the experimental results validate the claim that substantial improvements in QoE are possible with the proposed mathematical model for selecting and placing tier‐1 mobile devices and maintaining a DHT for D2D communication.  相似文献   

3.
Cognitive peer‐to‐peer networks are obtained from a combination of cognitive networking concepts and peer‐to‐peer networks. These networks are able to improve their performance while operating under dynamic and unknown environments. A cognitive peer‐to‐peer network tries to learn an appropriate configuration for itself considering the unknown physical properties of peers. Cognitive mobile peer‐to‐peer networks refer to cognitive peer‐to‐peer networks which are built over mobile ad hoc networks. In these networks, heterogeneity of the mobility of peers and resource limitation in wireless networks create challenges for network management algorithms. Because of the dynamicity of these networks, the management algorithms should be designated in self‐adaptive manner. In one type of these networks, some peers, called super‐peers, undertake to perform network managerial tasks. The mobility of peers leads to connection failure among peers and reselection of new super‐peers. Therefore, the selection of super‐peers, due to their influential role, requires an algorithm that considers the peers' mobility. Up to now, no self‐adaptive algorithm has been designated for super‐peer selection considering the mobility of peers in a self‐adaptive manner. This paper proposes M‐SSBLA, a self‐adaptive algorithm for super‐peer selection considering the mobility of peers based on learning automata. The proposed algorithm is obtained from cooperation between a learning automata‐based cognitive engine and MIS. MIS is a well‐known super‐peer selection algorithm in mobile peer‐to‐peer networks. We compared the proposed algorithm with recently reported algorithms, especially for a network with high mobility. Simulation results show that the proposed algorithm can cover maximum ordinary‐peer with a few super‐peer and improve robustness against super‐peer failures while decreasing maintenance overhead.  相似文献   

4.
This paper proposes iPTT, a peer‐to‐peer (P2P) Push‐to‐Talk (PTT) service for Voice over IP (VoIP). In iPTT, a distributed and mobile‐operator independent network architecture is presented to accelerate the deployment of the PTT service. Based on the serverless architecture, we develop two mechanisms, that is, flooding‐based floor control mechanism (FFC) and tree‐based floor control mechanism (TFC), for real‐time talk‐burst determination. The determination algorithms and the corresponding message flows for these two mechanisms are designed to show the feasibility of FFC and TFC. The performance of FFC and TFC is investigated through our analytical and simulation models in terms of the determination latency and the number of floor‐control message exchanges. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

5.
Wireless mesh networks (WMNs) have emerged as a promising technology that provides low‐cost broadband access to the Internet for fixed and mobile wireless end users. An orthogonal evolution in computer networking has been the rise of peer‐to‐peer (P2P) applications such as P2P data sharing. It is of interest to enable effective P2P data sharing in this type of networks. Conventional P2P data sharing systems are not cognizant of the underlying network topology and therefore suffer from inefficiency. We argue for dual‐layer mesh network architecture with support from wireless mesh routers for P2P applications. The main contribution of this paper is P2PMesh: a topology‐aware system that provides combined architecture and efficient schemes for enabling efficient P2P data sharing in WMNs. The P2PMesh architecture utilizes three schemes: (i) an efficient content lookup that mitigates traffic load imbalance at mesh routers; (ii) an efficient establishment of download paths; and (iii) a data transfer protocol for multi‐hop wireless networks with limited capacity. We note here that the path establishment and data transfer schemes are specific to P2P traffic and that other traffic would use routes determined by the default routing protocol in the WMN. Simulation results suggest that P2PMesh has the potential to improve the performance of P2P applications in a wireless multi‐hop setting; specifically, we focused on data sharing, but other P2P applications can also be supported by this approach. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

6.
Because video streaming over mobile handheld devices has been of great interest, the necessity of introducing new methods with low implementation cost and scalable infrastructures is a strong demand of the service. In particular, these requirements are present in popular wireless networks such as wireless mesh networks (WMN). Peer‐to‐peer (P2P) networks promise an efficient scalable network infrastructure for video streaming over wired and wireless networks. Limited resources of the peers in P2P networks and high error rate in wireless channels make it more challenging to run P2P streaming applications over WMNs. Therefore, it is necessary to design efficient and improved error protection methods in P2P video streaming applications over WMNs. In this paper, we propose a new adaptive unequal video protection method specially intended for large scale P2P video streaming over mobile WMNs. Using this method, different frames have different priorities in receivers along the recovery process. Moreover, we precisely and completely evaluate different aspects related to frame protection in these networks using five important performance metrics including video distortion, late arrival distortion, end‐to‐end delay, overhead and initial start‐up delay. The results obtained from a precise simulation in OMNeT++ show that the proposed adaptive method significantly outperforms other solutions by providing better video quality on mobile wireless nodes. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

7.
Peer‐to‐peer (P2P) network is a distributed network in which nodes with similar capabilities exchange information with each other. Due to the nature of the P2P network distribution, numerous network message transformation is required to exchange the data between nodes over the network, which may increase access latency. Because of the high amount of the stored data in the P2P networks, the replication of data is very important. A large amount of data is handled using data replication to increase data access, reduce access latency, and increase data availability. This issue has an important role in the P2P networks, but there is no complete and systematic research in this field. Therefore, this paper aims to provide a comprehensive study of data replication mechanisms in the P2P networks. The 1027 papers have been identified and have been reduced to 213 main studies using the paper selection process. Moreover, in this paper, the major advances are reviewed in four main groups (structured, unstructured, super‐peer, and hybrid networks), and the new challenges are also highlighted. Moreover, the open issues and guidelines for future studies are presented.  相似文献   

8.
Peer‐to‐peer networks are overlay networks that are built on top of communication networks that are called underlay networks. In these networks, peers are unaware of the underlying networks, so the peers choose their neighbors without considering the underlay positions, and therefore, the resultant overlay network may have mismatches with its underlying network, causing redundant end‐to‐end delay. Landmark clustering algorithms, such as mOverlay , are used to solve topology mismatch problem. In the mOverlay algorithm, the overlay network is formed by clusters in which each cluster has a landmark peer. One of the drawbacks of mOverlay is that the selected landmark peer for each cluster is fixed during the operation of the network. Because of the dynamic nature of peer‐to‐peer networks, using a non‐adaptive landmark selection algorithm may not be appropriate. In this paper, an adaptive landmark clustering algorithm obtained from the combination of mOverlay and learning automata is proposed. Learning automata are used to adaptively select appropriate landmark peers for the clusters in such a way that the total communication delay will be minimized. Simulation results have shown that the proposed algorithm outperforms the existing algorithms with respect to communication delay and average round‐trip time between peers within clusters. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

9.
This paper presents a peer‐to‐peer cooperative positioning technique together with its performance assessment. The cooperation between the two GPS receivers is realized by means of a wireless LAN connection and is significantly influenced by the accurateness of the synchronization between the two terminals. Both the outdoor‐to‐indoor and outdoor‐to‐outdoor scenarios are considered. For each scenario, we assess the satellite signal acquisition and its computational load and the performance in terms of position accuracy and time‐to‐first‐fix of the positioning procedure. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

10.
A super peer is a peer that has the highest capacity in comparison with other peers in the network. It is trying to reduce the load of the rest of the peers and improve network performance. Selecting a super peer in a peer‐to‐peer–based network is a very crucial challenge. As the ability of peers are very different, by considering capacity of each peer and selecting a proper role, we can use network components much more efficiently. Because of the dynamicity of these networks, comparative methods of selecting super peers is of special importance. Comparative selection is continuously trying to select proper super peer. In recent studies, learning automata was introduced as a powerful learning model to solve this issue. In most of the studies, learning automata with an S model is employed. In this article, another selection method of learning automata with a P model environment is presented and its capability for super peer selection is shown. Moreover, simulation results show that removing some of the super peers would result in better performance in terms of inversion time in the high level of super‐peer capacity, required time for selecting proper super peer, and super peer tolerance.  相似文献   

11.
陈善雄  李莉  张林 《通信学报》2011,32(7):22-28
在DHT基础上建立一种快速的自组织路由模型(FSRM),设计了该模型的路由查找方法,节点加入与离开机制。同时,针对扰动环境下临近节点选择问题,提出稳定性阈值度量的方法,保证了对等网的快速路由和快速收敛。并在仿真测试中对该模型的性能进行了分析,证明该模型在收敛时间,节点查询速度,和对扰动的适应性方面优于传统的模型。  相似文献   

12.
Topology discovery is a prerequisite when investigating the network properties; with the enormous number of Bitcoin users and performance issues, it becomes critical to analyse the network in a fashion that makes it possible to detect all Bitcoin's nodes and understand their behaviour. In massive, dynamic, and distributed peer‐to‐peer (P2P) networks like Bitcoin, where thousands of updates occur per second, it is hard to obtain an accurate topology representing the structure of the network as a graph with nodes and links by using the traditional local measurement approaches based on batches, offline data, or on the discovery of the topology around a small set of nodes and then combine them to discover an approximate network topology. All of which present some limitation when applying them on blockchain‐based networks. In this paper, we propose a topology discovery system that performs a real‐time data collection and analysis for Bitcoin P2P links, which assembles incoming nodes information for deeper graph analysis processing. The topology discovery system allows us to gain knowledge on the Bitcoin network size, the network stability in terms of reachable, churn, and well‐connected nodes, as well as some data regarding the effects of some countries' Internet infrastructure on Bitcoin traffic.  相似文献   

13.
In this paper, we propose an optimization of MAC protocol design for wireless sensor networks, that accounts for cross‐layering information, in terms of location accuracy for nodes and residual energy levels. In our proposed solution we encode this cross‐layer information within a decreasing backoff function in the MAC. The protocol is optimized by appropriately selecting priority window lengths, and we have shown that accurate cross‐layer information plays a crucial role in achieving an optimal performance at the MAC layer level. The estimation accuracy can be characterized spatially using a location reliability probability distribution function. We show that this distribution function greatly influences the design of the optimal backoff window parameters, and the overall throughput performance of the MAC protocol. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

14.
In this paper we present a unified solution to identify peer‐to‐peer (P2P) communities operating in the network. We propose an algorithm that is able to progressively discover nodes cooperating in a P2P network and to identify that P2P network. Starting from a single known node, we can easily identify other nodes in the P2P network, through the analysis of widely available and standardized IPFIX (NetFlow) data. Instead of relying on the analysis of content characteristics or packet properties, we monitor connections of known nodes in the network and then progressively discover other nodes through the analysis of their mutual contacts. We show that our method is able to discover cooperating nodes in many P2P networks and present the real computational requirements of the algorithm on a large network. The use of standardized input data allows for easy deployment onto real networks. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

15.
Interactive multimedia applications such as peer‐to‐peer (P2P) video services over the Internet have gained increasing popularity during the past few years. However, the adopted Internet‐based P2P overlay network architecture hides the underlying network topology, assuming that channel quality is always in perfect condition. Because of the time‐varying nature of wireless channels, this hardly meets the user‐perceived video quality requirement when used in wireless environments. Considering the tightly coupled relationship between P2P overlay networks and the underlying networks, we propose a distributed utility‐based scheduling algorithm on the basis of a quality‐driven cross‐layer design framework to jointly optimize the parameters of different network layers to achieve highly improved video quality for P2P video streaming services in wireless networks. In this paper, the quality‐driven P2P scheduling algorithm is formulated into a distributed utility‐based distortion‐delay optimization problem, where the expected video distortion is minimized under the constraint of a given packet playback deadline to select the optimal combination of system parameters residing in different network layers. Specifically, encoding behaviors, network congestion, Automatic Repeat Request/Query (ARQ), and modulation and coding are jointly considered. Then, we provide the algorithmic solution to the formulated problem. The distributed optimization running on each peer node adopted in the proposed scheduling algorithm greatly reduces the computational intensity. Extensive experimental results also demonstrate 4–14 dB quality enhancement in terms of peak signal‐to‐noise ratio by using the proposed scheduling algorithm. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

16.
Wireless infrastructureless networks demand high resource availability with respect to the progressively decreasing energy consumption. A variety of new applications with different service requirements demand fairness to the service provision and classification, and reliability in an end‐to‐end manner. High‐priority packets are delivered within a hard time delay bound whereas improper power management in wireless networks can substantially degrade the throughput and increase the overall energy consumed. In this work a new scheme is being proposed and evaluated in real time using a state‐based layered oriented architecture for energy conservation (EC). The proposed scheme uses the node's self‐tuning scheme, where each node is assigned with a dissimilar sleep and wake time, based on traffic that is destined for each node. This approach is based on stream's characteristics with respect to different caching behavioral and storage‐capacity characteristics, and considers a model concerning the layered connectivity characteristics for enabling the EC mechanism. EC characteristics are modeled and through the designed tiered architecture the estimated metrics of the scheme can be bounded and tuned into certain regulated values. The real‐time evaluation results were extracted by using dynamically moving and statically located sensor nodes. A performance comparison is done with respect to different data traffic priority classifications following a real‐time asymmetrical transmission channel. Results have shown the scheme's efficiency in conserving energy while the topology configuration changes with time. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

17.
While enjoying various LBS (location‐based services), users also face the threats of location privacy disclosure. This is because even if the communications between users and LBS providers can be encrypted and anonymized, the sensitive information inside LBS queries may disclose the exact location or even the identity of a user. The existing research on location privacy preservation in mobile peer‐to‐peer (P2P) networks assumed that users trust each other and directly share location information with each other. Nonetheless, this assumption is not practical for most of the mobile P2P scenarios, for example, an adversary can pretend to be a normal user and collect the locations of other users. Aiming at this issue, this paper presents x‐region as a solution to preserve the location privacy in a mobile P2P environment where no trust relationships are assumed amongst mobile users. The main idea is to allow users to share a blurred region known as x‐region instead of their exact locations so that one cannot distinguish any user from others inside the region. We propose a theoretical metric for measuring the anonymity property of x‐region, together with three algorithms for generating an x‐region, namely, benchmark algorithm, weighted expanding algorithm, and aggressive weighted expanding algorithm. These algorithms achieve the anonymity and QoS requirements with different strategies. Our experiments verify the performance of the algorithms against three key metrics. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

18.
Many mobile devices (e.g., smart phones, PDAs, portable computers) and wireless routers (e.g., WiFi access points) nowadays are equipped with ad hoc transmission mode. In a dense environment such as a college/office campus, this creates the possibility of forming a wireless mesh network (WMN) in which mobile users communicate with each other through multiple wireless hops. This allows mobile users to exchange (share) files over the free access WMN rather than a carrier frequency such as 3G and WiMax. We consider a peer‐to‐peer (P2P) content sharing setting in a WMN, wherein the mesh network operator over‐provision a number of mesh routers in the network with additional storage capacity and P2P‐aware devices that are programmed to cache and store P2P content. Those mesh routers act as caches and participants in P2P content sharing. The aim of this setting is to both reduce the cost of communications between peers within the WMN (i.e., reduce bandwidth and energy that P2P traffic consumes in the network), and enhance the performance of P2P content sharing (i.e., reduce the average P2P content download delay). Our main contribution in this paper is an optimum P2P content replication strategy at the participating mesh routers. In particular, we determine the optimum number of replicas for every P2P file such that the average access cost of all files in the network is minimized. We propose a centralized algorithm that enables the participating mesh routers to implement the optimal strategy. We further propose a distributed (low cost) algorithm for P2P content replication at the participating mesh routers, and show that the distributed algorithm mimics the optimal strategy very well. The analytical and simulation results show that our replication strategy significantly reduces the average overall cost of accessing P2P files in the WMN as compared with other commonly used replication strategies. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

19.
Traffic‐aware routing protocols have recently received considerable attention. This has been motivated by the role that it could play in extending the network's lifetime (or operational time) as it target the reservation of node's power and better utilisation of channel bandwidth, which could lead to performance improvement in terms of important performance metrics including throughput and end‐to‐end delay. Traffic‐aware techniques can be classified into two categories, namely end‐to‐end and on‐the‐spot, based on the way of establishing and maintaining routes between any source and destination. Although there has been much work on both categories, there has been no comparative performance study of the two approaches. To the best of our knowledge, this is the first work that carries out such a performance comparison. To this end, we have adapted our traffic‐aware technique namely load density to suggest a new ‘on‐the‐spot’ traffic‐aware technique. The main reason for doing this adaptation is to ensure that the comparison between the two approaches is fair and realistic. The study will reveal the main performance characteristics of the two approaches under various traffic and network conditions. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

20.
This paper presents a new type of network simulator for simulating the call‐level operations of telecom networks and especially ATM networks. The simulator is a pure time‐true type as opposed to a call‐by‐call type simulator. It is also characterized as a batch‐type simulator. The entire simulation duration is divided into short time intervals of equal duration, t. During t, a batch processing of call origination or termination events is executed and the time‐points of these events are sorted. The number of sorting executions is drastically reduced compared to a call‐by‐call simulator, resulting in considerable timesaving. The proposed data structures of the simulator can be implemented by a general‐purpose programming language and are well fitted to parallel processing techniques for implementation on parallel computers, for further savings of execution time. We have first implemented the simulator in a sequential computer and then we have applied parallelization techniques to achieve its implementation on a parallel computer. In order to simplify the parallelization procedure, we dissociate the core simulation from the built‐in call‐level functions (e.g. bandwidth control or dynamic routing) of the network. The key point for a parallel implementation is to organize data by virtual paths (VPs) and distribute them among processors, which all execute the same set of instructions on this data. The performance of the proposed batch‐type, time‐true, ATM‐network simulator is compared with that of a call‐by‐call simulator to reveal its superiority in terms of sequential execution time (when both simulators run on conventional computers). Finally, a measure of the accuracy of the simulation results is given. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号