It is important to identify P2P traffic accurately for effective network planning and design, security insuring, network management, network behavior understanding and so on. Firstly, some different techniques for ide...
详细信息
ISBN:
(纸本)9781424436927
It is important to identify P2P traffic accurately for effective network planning and design, security insuring, network management, network behavior understanding and so on. Firstly, some different techniques for identifying P2P application traffic are analyzed, advantages and disadvantages among them are compared and then difficulties are discussed. Secondly, a distributed method for identifying P2P traffic (DPTIM) is presented, modules and their relationship for implementing this method is introduced. P2P traffic identification and statistic are separated in DPTIM and Netflow is used to process flow aggregation, which improves efficiency for identification and reduces complexity for implementation in distributed environment. Finally, one prototype system based on DPTIM is proposed, which establishes foundation for P2P traffic identifying and controlling in cosmically environment.
Mobile Ad Hoc Networks (MANETs) can be used to provide mobile users temporary infrastructure to use services such as database retrieval service when traditional infrastructure-based networks are unavailable in infrast...
详细信息
ISBN:
(纸本)9781424453337
Mobile Ad Hoc Networks (MANETs) can be used to provide mobile users temporary infrastructure to use services such as database retrieval service when traditional infrastructure-based networks are unavailable in infrastructure-less situations (e.g. after a destructive disaster like an earthquake). The challenging task in such dynamic environments is how we can improve the service availability. An effective strategy is replicating a service at some nodes distributed across the network. However, service replication can considerably impact the system energy consumption. Since mobile devices have a limited amount of battery, a dynamic and efficient service replication is necessary to support such environments. In this paper, we propose a distributed service replication scheme for achieving high service availability with reasonable energy consumption for MANETs. The proposed method called distributed Adaptive Service Replication (DAR) divides the whole network into disjoint zones of at most 2-hops in diameter and builds a dynamic replication mechanism which puts replicas only in zones with high service demand. Through simulations, we have confirmed that our approach can achieve higher service availability and lower energy consumption than an existing method.
Topology control algorithms in mobile ad-hoc networks aim to reduce the power consumption while keeping the topology connected. These algorithms can preserve network resources and increase network capacity. However, f...
详细信息
ISBN:
(纸本)9781424453337
Topology control algorithms in mobile ad-hoc networks aim to reduce the power consumption while keeping the topology connected. These algorithms can preserve network resources and increase network capacity. However, few efforts have focused on the issue of topology control in presence of node mobility. One of the notable mobility aware topology control protocols is the "Mobility Aware distributed Topology Control Protocol". The main drawback of this protocol is on its mobility prediction method. This prediction method assumes linear movements and is unable to cope with sudden changes in the mobile node movements. In this paper, we propose a pattern matching based mobility prediction method in which every mobile node predicts its future location through finding similar patterns in its history of movements. Simulation results show significant improvements in terms of prediction accuracy and power consumption compared to the other known algotithms.
In distributed side-by-side software development, a pair of distributed team members are assigned a single task and allowed to (a) work concurrently on two different computers and (b) see each others' displays. Th...
详细信息
ISBN:
(纸本)9789639799769
In distributed side-by-side software development, a pair of distributed team members are assigned a single task and allowed to (a) work concurrently on two different computers and (b) see each others' displays. They can control when they communicate with each other, view each others' actions, and input concurrently. To understand how this control is exerted in practice, we have performed experiments at two different organizations, Microsoft Research and Tata Consultancy Services, which involved about forty six person hours of distributed side-by-side development. The experimental tasks were typical of the kind carried out at these organizations. A mix of qualitative, quantitative, and visualization analysis shows that (a) distribution and conflicting changes are not an issue;(b) developers use the unique capabilities provided by distributed side-by-side software development;and (c) the exact usage depends on several factors such as the collaboration task, developers, and software-development abstraction and environment.
A service composition method for mobile environment is put forward to build new application system based on existing mobile services and service composition technologies. This method accomplishes semi-automatic servic...
详细信息
ISBN:
(纸本)9781424436927
A service composition method for mobile environment is put forward to build new application system based on existing mobile services and service composition technologies. This method accomplishes semi-automatic service composition based on service composition template. Service component technology is used to manage heterogeneous services in mobile environment. By integrating distributed, dynamic service discovery mechanism, and service management/replacement mechanism based on QoS, this method will efficiently support service composition process in mobile environment.
distributed space-time coding (DSTC) cooperation for wireless relay network has been widely analyzed. In this paper, we first investigate an uplink DSTC cooperative system based on amplify-and-forward (AF) cooperation...
详细信息
ISBN:
(纸本)9781424436927
distributed space-time coding (DSTC) cooperation for wireless relay network has been widely analyzed. In this paper, we first investigate an uplink DSTC cooperative system based on amplify-and-forward (AF) cooperation protocol with multiple antennas deployed at the destination while source and relay nodes have only one antenna each. Then, by, exploiting partial channel state information from the source to relay nodes, we propose a phase compensation algorithm which can achieve linear detection at the receiver. Furthermore, the complexity analysis is provided to compare with nolinear optimal ML detection. Finally, computer simulations are carried out to evaluate the validity of the proposed approach. The results show that the phase compensation algorithm can approximately achieve the same performance with nolinear NIL algorithm. On the other hand, it can significantly simply the heavy complexity of the optimal ML detection into simple linear detection with very low complexity. With near optimal performance and low complexity, the proposed algorithm is particularly, suitable for the practical scenarios.
it is important to identify P2P traffic accurately for effective network planning and design, security insuring, network management, network behavior understanding and so on. Firstly, some different techniques for ide...
详细信息
The question of whether intelligence can be attributed to groups or not has been raised in many scientific disciplines. In the field of computer-supported collaborative learning, this question has been examined to und...
详细信息
ISBN:
(纸本)9781424451654
The question of whether intelligence can be attributed to groups or not has been raised in many scientific disciplines. In the field of computer-supported collaborative learning, this question has been examined to understand how computer-mediated environments can augment human cognition and learning on a group level. The era of social computing which represents the emergence of Web 2.0 collaborative technologies and social media has stimulated a wide discussion about collective intelligence and the global brain. This paper reviews the theory of distributed cognition in the light of these concepts in an attempt to analyze and understand the emergence process of intelligence that takes place in the context of computer-mediated collaborative and social media environments. It concludes by showing that the cognitive organization, which occurs within social interactions serves as a catalyst for intelligence to emerge on a group level. Also a process model has been developed to show the process of collaborative knowledge construction in Wikipedia that characterizes such cognitive organization.
Data movement within high performance environments can be a large bottleneck to the overall performance of programs. With the addition of continuous storage and usage of older data, the back end storage is becoming a ...
详细信息
ISBN:
(纸本)9789639799769
Data movement within high performance environments can be a large bottleneck to the overall performance of programs. With the addition of continuous storage and usage of older data, the back end storage is becoming a larger problem than the improving network and computational nodes. This has led us to develop a distributed Shared Disk Cache, DiSK, to reduce the dependence on these back end storage systems. With DiSK requested files will be distributed across nodes in order to reduce the amount of requests directed to the archives. DiSK has two key components. One is a distributed Metadata Management, DIMM, scheme that allows a centralized manager to access what data is available in the system. This is accomplished through the use of a counter-based bloomfilter with locality checks in order to reduce false positives and false negatives. The second component is a method of replication called Differentiable Replication, DiR. The novelty of DiR is that the requirements of the files and capabilities of underlying nodes are taken into consideration for replication. This allows for a varying degree of replication depending on the file. This customization of DiSK yields better performance than the conventional archive system.
Virtual network is an important approach to support multiple legacy applications running unmodified in distributed virtual computing environments. A virtual networking approach called VirNet is proposed in this paper....
详细信息
暂无评论