This work proposes a communication protocol and its reference implementation for an Internet telephony service based on a distributed architecture. The service provides a secure peer to peer voice streaming network be...
详细信息
This work proposes a communication protocol and its reference implementation for an Internet telephony service based on a distributed architecture. The service provides a secure peer to peer voice streaming network between its clients. The implementation focuses on support of embedded devices.
Provisioning video-on-demand (VoD) streaming services in peer to peer environments is a significant challenging task. In this paper, we propose a new Time-Driven Mesh (TDM) overlay network for peer-to-peer video-on-de...
详细信息
Provisioning video-on-demand (VoD) streaming services in peer to peer environments is a significant challenging task. In this paper, we propose a new Time-Driven Mesh (TDM) overlay network for peer-to-peer video-on-demand systems. In our TDM, all of the peers construct a mesh network connected among them in chronological order of their playback starting times. In order to efficiently search multiple streaming suppliers, we manage the playback starting time and the network location information for all of the peers using a distributed hash table. Our TDM provides both time and space localities while locating suppliers, and the failure peers can be quickly replaced with other suitable peers. As a result, we can construct a bandwidth efficient and robust overlay network for P2P VoD systems. In simulation experiments, we show that our scheme achieves lower startup and jumping latency compared with the existing P2VoD. Our TDM also have better playback continuity under peer random joins and leaves for providing efficient interactive VoD streaming in P2P environment.
To realize huge-scale information services, many distributed hash table (DHT) based systems have been proposed. For example, there are some proposals to manage item-level product traceability information with DHTs. In...
详细信息
To realize huge-scale information services, many distributed hash table (DHT) based systems have been proposed. For example, there are some proposals to manage item-level product traceability information with DHTs. In such an application, each entry of a huge number of item-level IDs need to be available on a DHT To ensure data availability, the soft-state approach has been employed in previous works. However, this does not scale well against the number of entries on it DHT. As we expect 1010 products in the traceability case, the soft-state approach is unacceptable. In this paper, we propose distributed-to-distributed Data Copy (D3C). With D3C, users can reconstruct the data as they detect data loss, or even migrate to another DHT system. We show why it scales well against the number of entries on a DHT. We have confirmed our approach with a prototype, Evaluation shows our approach fits. well on a DHT with a low rate of failure and a huge number of data entries.
Increasing need for people to remain connected while they are mobile poses several interesting challenges for today's Wireless Networks. Information sharing among vehicles can be considered as one of the most popu...
详细信息
Increasing need for people to remain connected while they are mobile poses several interesting challenges for today's Wireless Networks. Information sharing among vehicles can be considered as one of the most popular medium for exchanging safety and entertainment messages between mobile users. Recently data sharing has also started receiving increased attention from researchers. This paper proposes a distributed hash table based File Sharing Scheme for Vehicular Ad hoc Networks using multipath routing protocol. The scheme guarantees multi-path forwarding due to its underlying property of reactiveness and its application of proactive routing protocol. The packets are transferred to distant nodes with assistance of created distributed hash tables which store information about identities of sender's as well as receiver nodes. By using Multi-path Dynamic Address Routing the algorithm utilizes the best available path until it fails to switch to the next best available route in the network. Simulation results show that the proposed scheme achieves realistic performance of file delivery and also has comparative performance with the existing protocols.
During the past years, anywhere, anytime access to large and reliable storage has become increasingly important in both enterprise and home computer environments. In this paper we present the design and implementation...
详细信息
ISBN:
(纸本)9781424442447
During the past years, anywhere, anytime access to large and reliable storage has become increasingly important in both enterprise and home computer environments. In this paper we present the design and implementation of a distributed storage infrastructure, which combines the benefits emanating by the usage of a distributed hash table as the core storage layer with the transparency provided by a low level operating system storage interface. The results of the experimental evaluation are very promising.
It generally utilized either peer-to-peer overlay network or server clusters to offer wide area network storage service. These network storage systems suffered from performance penalties or single-point failure. This ...
详细信息
ISBN:
(纸本)9780769538594
It generally utilized either peer-to-peer overlay network or server clusters to offer wide area network storage service. These network storage systems suffered from performance penalties or single-point failure. This paper proposed a network storage structure which combines regular graph with distributed hash table, and presented corresponding data accessing methods. The results of simulation demonstrated the improvement of the proposal in both accessing delay and searching hops compared to distributed hash table.
Corresponding to the storing and fast searching needs of an extra-large scale of energy monitoring and statistics data, we propose a multi-level-indexed distributed hash table (mDHT) algorithm and complete a MapReduce...
详细信息
Corresponding to the storing and fast searching needs of an extra-large scale of energy monitoring and statistics data, we propose a multi-level-indexed distributed hash table (mDHT) algorithm and complete a MapReduce implementation of the algorithm on the open-standard HDFS/Hbase platform. Such an approach uses a columnar storage structure for energy consumption data storage and creates a hashed index table to provide a quick search and retrieval method for extra-large-scale data processing systems. Such a hashed indexing scheme is implemented on a 3-node Hadoop cluster, and the simulation experiments at a scale up to 48 million data records indicate that, when the data volume reaches the scale of 12 million to 48 millions, the proposed mDHT algorithm presents an outstanding performance in data writing operation, compared to that of traditional SQL Server implementation. Even compared to the single-indexed DHT (sDHT) application, the mDHT solution outperforms by reducing the data retrieval time by 24.5-48.6 %. The multi-level-indexed DHT algorithm presented in this paper contributes a key technique to developing a fast search engine to the extra-large scale of data on the cloud storage architecture.
Using new wireless capabilities in vehicles, various applications have appeared in Vehicular Ad Hoc Networks (VANETs). Multimedia data sharing is one of these applications, which has recently been given so much attent...
详细信息
Using new wireless capabilities in vehicles, various applications have appeared in Vehicular Ad Hoc Networks (VANETs). Multimedia data sharing is one of these applications, which has recently been given so much attention. Most of presented schemes in this field have focused on direct opportunistic meetings between vehicles or request/response broadcast in the whole network, which are inefficient and un-scalable due to VANET characteristics. In this paper, we propose an ID-based Scalable and EFficient distributed File sharing technique that increases efficiency and scalability via taking advantages of BitTorrent protocol and consistent hashing technique. The results of simulations show that our approach increases the received file ratio, reduces total download time of files and message overhead. Consequently, it can enhance efficiency and performance.
An ID/locator separation architecture is one of the most recognized technologies that enable the Future Internet. In ID/locator separation architecture, an ID/locator mapping system is indispensable to provide locatio...
详细信息
An ID/locator separation architecture is one of the most recognized technologies that enable the Future Internet. In ID/locator separation architecture, an ID/locator mapping system is indispensable to provide location management in mobile environments. This paper conducts a comparative study on two different ID/locator mapping approaches: centralized and distributed ID/locator mapping systems. We develop analytical models on the signaling cost incurred in location update and location query procedures of the centralized and distributed ID/locator mapping systems. Numerical results demonstrate that the distributed ID/locator mapping system with enhanced distributed hash table (DHT) has comparable signaling cost to the centralized ID/locator mapping system while providing higher scalability and robustness. (C) 2013 Elsevier Ltd. All rights reserved.
Peer-to-peer (P2P) networks can offer benefits to distributed content-based publish/subscribe data dissemination systems. In particular, since a P2P network's aggregate resources grow as the number of participants...
详细信息
Peer-to-peer (P2P) networks can offer benefits to distributed content-based publish/subscribe data dissemination systems. In particular, since a P2P network's aggregate resources grow as the number of participants increases, scalability can be achieved using no infrastructure other than the participants' own resources. This paper proposes algorithms for supporting content-based publish/subscribe in which subscriptions can specify a range of interest and publications a range of values. The algorithms are built over a distributed hash table abstraction and are completely decentralized. Load balance is addressed by subscription delegation away from overloaded peers and a bottom-up tree search technique that avoids root hotspots. Furthermore, fault tolerance is achieved with a lightweight replication scheme that quickly detects and recovers from faults. Experimental results support the scalability and fault-tolerance properties of the algorithms: For example, doubling the number of subscriptions does not double internal system messages, and even the simultaneous failure of 20% of the peers in the system requires less than 2 min to fully recover.
暂无评论