Spelling suggestions: "subject:"peer network"" "subject:"meer network""
1 |
A Study of Traffic Locality and Reliability in Peer-to-Peer Video Streaming ApplicationsZHANG, XIANGYANG 27 April 2012 (has links)
The past decade has witnessed tremendous growth of peer-to-peer (P2P) video
streaming applications on the Internet. For these applications, playback
smoothness and timeliness are the two most important aspects of users' viewing
experiences, whereas the amount of traffic is Internet service providers' main
concern. According to the playback delay, video streaming can be classified into
on-demand streaming, live streaming, and interactive streaming. P2P live
streaming applications typically have an arbitrary number of users, tens of
seconds of playback delay, and a high packet delivery rate, but their heavy
traffic incurs great financial expenditure and threatens the quality of other
services. Interactive streaming applications usually have a small group size,
several hundreds of milliseconds of playback delay, and reasonable traffic
volume, but cannot achieve a high packet delivery rate. The goal of this thesis
is to study traffic locality and reliable delivery of packets in large-scale
live streaming and small-scale interactive streaming applications, while keeping
the playback delay well below the targeted applications' limits.
For P2P live streaming applications, we first identify "typical" schemes from
existing P2P live streaming schemes, investigate packet propagation behavior and
the impact of neighboring strategies on system performance, and then propose
innovative schemes that take both users' viewing experience and traffic locality
into consideration. We show that the network-driven tree-based schemes with the
swarming technique as a re-transmission error-correction mechanism are superior
to the data-driven swarm-based or tree-based schemes, and a properly designed
tree-based scheme can localize the traffic while maintaining a high packet
delivery rate.
For interactive streaming applications, we analyze the efficacy of systematic
forward error-correction (FEC) codes against the bursty errors of Internet links
when using peers to provide multiple one-hop paths between two communication
parties. We find that although using peers for path diversity often results in
a lower post-FEC packet loss ratio, some conditions do apply. The interplay of
a number of factors, such as the Internet links' error ratio and burst length
and the coding parameters, determines the performance of FEC. We provide
guidelines and computation methods to determine whether the use of peers for
path diversity can be justified. / Thesis (Ph.D, Computing) -- Queen's University, 2012-04-26 15:20:35.555
|
2 |
Information Diffusion in Complex Networks : Measurement-Based Analysis Applied to ModellingFaria Bernardes, Daniel 21 March 2014 (has links) (PDF)
Understanding information diffusion on complex networks is a key issue from a theoretical and applied perspective. Epidemiology-inspired SIR models have been proposed to model information diffusion. Recent papers have analyzed this question from a data-driven perspective. We complement these findings investigating if epidemic models calibrate with a systematic procedure are capable of reproducing key spreading cascade properties. We first identify a large-scale, rich dataset from which we can reconstruct the diffusion trail and the underlying network. Secondly, we examine the simple SIR model as a baseline model and conclude that it was unable to generate structurally realistic spreading cascades. We found the same result examining model extensions to which take into account heterogeneities observed in the data. In contrast, other models which take into account time patterns available in the data generate qualitatively more similar cascades. Although one key property was not reproduced in any model, this result highlights the importance of taking time patterns into account. We have also analyzed the impact of the underlying network structure on the models examined. In our data the observed cascades were constrained in time, so we could not rely on the theoretical results relating the asymptotic behavior of the epidemic and network topological features. Performing simulations we assessed the impact of these common topological properties in time-bounded epidemic and identified that the distribution of neighbors of seed nodes had the most impact among the investigated properties in our context. We conclude discussing identifying perspectives opened by this work.
|
3 |
Návrh využití technologie Blockchain ve firemním prostředí / Implementation of Blockchain technologyDzurdzíková, Kristína January 2020 (has links)
This diploma thesis deals with the creation of a design for the utilization of blockchain technology in a corporate environment. The main goal of this work is to create a proposal for a business process and its implementation in a specific blockchain platform. The analysis of the current state of the process describes current process and company’s requirements for the functionality of new technology. In the design part of the work, I compared specific blockchain platforms. As a result of this part I chose the most suitable solution for the implementation of my proposal. This chapter further includes the design of a methodology for verifying whether the process is suitable for the implementation of a blockchain technology or not. Moreover, it describes how to proceed when choosing a suitable solution and highlights its key factors.
|
4 |
SCHOOL RACIAL AND ETHNIC COMPOSITION EFFECT ON ACADEMIC ACHIEVEMENT OF LATINO ADOLESCENTSRyabov, Igor 23 August 2005 (has links)
No description available.
|
5 |
Peer to peer systém pro vzdálené ovládání počítačeLEJTNAR, Michal January 2017 (has links)
This thesis deals with creating of decentralized peer to peer system designed for remote control of computers. P2P network and single nodes in this network is inspired by hybrid peer-to-peer network architecture used by Skype application. The application uses terminal services available in operation system Windows for remote control of computers. Namely, MS Remote Desktop and MS Remote Assistance is used. The entire application is created in programing language C#.
|
6 |
Facteurs de pérennisation d'un réseau de formation par les pairs : le cas des Réseaux d'Echanges Réciproques de Savoirs / Long-term factors of a peer learning network : the case of reciprocal knowledge exchanges networksLe Boucher, Caroline 14 December 2015 (has links)
L’innovation sociale résiste mal à l'épreuve du temps. Quand la plupart des expériences s’épuisent et disparaissent rapidement, certaines parviennent à se pérenniser. Le cas des réseaux de formation entre pairs pose encore d’autres questions. Qu’il s’agisse de réseaux d'apprentissage, de communautés de pratiques, de dispositifs collaboratifs, de Massives Open Online Courses (MOOCs), de groupes d'entraide mutuelle ou de formations par les pairs, ils sont particulièrement soumis à des transformations en fonction des besoins, des actualisations de contenu ou des engagements : quelles sont les caractéristiques particulières de ces dispositifs ? Quelles logiques les acteurs mettent-ils en oeuvre pour les inscrire dans la durée ? Peut-on dégager de leur analyse des facteurs de pérennisation ?C'est principalement à ces questions que cette thèse apporte des éléments de réponse, en prenant appuis sur le cas des Réseaux d’Echanges Réciproques de Savoirs (RERS). Elle présente successivement : une approche sociohistorique des différentes formes de coformation depuis le 19ème siècle ; une revue de la littérature dans le domaine ; un cadre théorique principalement appuyé sur la sociologie des organisations et l’approche sociotechnique ; la méthodologie principalement inspirée de la théorie ancrée ; les résultats les plus pertinents.Ce que cette recherche montre est l’importance des convergences de valeurs, conceptions, récits, aspirations, types d'organisation et outils qui fondent identité du collectif d’acteur engagés qui combinent ces éléments dans des formes locales d’appropriation qui permettent une réinvention du sens des actions et des pratiques. / Social innovation stands up with difficulty to the test of time. While most experiments run down and disappear quickly, some of them perpetuate. The case of knowledge exchanges networks between peers raises other questions. Whether in the case of learning networks, of communities of practice, of collaborative devices, of Massive Open Online Courses (MOOCs), of mutual help groups or fo training by peers, these networks are particularly subject to change according to needs, according to content updating or to commitments. How are these devices characterized? What are their actors’ logics in order to make them perpetuate? Can we bring to light, from their analysis, some factors of perpetuation? Our doctoral thesis tries to provides some answers to these questions, through the example of knowledge exchanges networks. We present research studies about peer training after having described their different forms since the 19th century, in a socio-historical perspective. Based on a methodology inspired from grounded theory, this thesis articulates research studies from the organisational sociology with the socio-technical approach of training. The case of knowledge exchanges networks brings to light the role of shared values, of conceptions, of narratives, of expectations, of types of organisation and of tools that forge a national identity, combined with local forms of appropriation of these components that allow to reinvent the sense of actions and practices.
|
7 |
Information Diffusion in Complex Networks : Measurement-Based Analysis Applied to Modelling / Phénomènes de diffusion sur les grands réseaux : mesure et analyse pour la modélisationFaria Bernardes, Daniel 21 March 2014 (has links)
Dans cette thèse nous avons étudié la diffusion de l'information dans les grands graphes de terrain, en se focalisant sur les patterns structurels de la propagation. Sur le plan empirique, il s'est avéré difficile de capturer la structure des cascades de diffusion en termes de mesures simples. Sur le plan théorique, l'approche classique consiste à étudier des modèles stochastiques de contagion. Néanmoins, l'analyse formelle de ces modèles reste limité, car les graphes de terrain ont généralement une topologie complexe et le processus de diffusion se produit dans une fenêtre de temps limitée. Par conséquent, une meilleure compréhension des données empiriques, des modèles théoriques et du lien entre les deux est également cruciale pour la caractérisation de la diffusion dans les grands graphes de terrain. Après un état de l'art sur les graphes de terrain et la diffusion dans ce contexte au premier chapitre, nous décrivons notre jeu de données et discutons sa pertinence au chapitre 2. Ensuite, dans le chapitre 3, nous évaluons la pertinence du modèle SIR simple et de deux extensions qui prennent en compte des hétérogénéités de notre jeu de données. Dans le chapitre 4, nous explorons la prise en compte du temps dans l'évolution du réseau sous-jacent et dans le modèle de diffusion. Dans le chapitre 5, nous évaluons l'impacte de la structure du graphe sous-jacent sur la structure des cascades de diffusion générées avec les modèles étudiés dans les chapitres précédents. Nous terminons la thèse par un bilan des résultats et des perspectives ouvertes par les travaux menés dans cette thèse. / Understanding information diffusion on complex networks is a key issue from a theoretical and applied perspective. Epidemiology-inspired SIR models have been proposed to model information diffusion. Recent papers have analyzed this question from a data-driven perspective. We complement these findings investigating if epidemic models calibrate with a systematic procedure are capable of reproducing key spreading cascade properties. We first identify a large-scale, rich dataset from which we can reconstruct the diffusion trail and the underlying network. Secondly, we examine the simple SIR model as a baseline model and conclude that it was unable to generate structurally realistic spreading cascades. We found the same result examining model extensions to which take into account heterogeneities observed in the data. In contrast, other models which take into account time patterns available in the data generate qualitatively more similar cascades. Although one key property was not reproduced in any model, this result highlights the importance of taking time patterns into account. We have also analyzed the impact of the underlying network structure on the models examined. In our data the observed cascades were constrained in time, so we could not rely on the theoretical results relating the asymptotic behavior of the epidemic and network topological features. Performing simulations we assessed the impact of these common topological properties in time-bounded epidemic and identified that the distribution of neighbors of seed nodes had the most impact among the investigated properties in our context. We conclude discussing identifying perspectives opened by this work.
|
8 |
A Machine-Checked Proof of Correctness of Pastry / Une preuve certifiée par la machine de la correction du protocole PastryAzmy, Noran 24 November 2016 (has links)
Les réseaux pair-à-pair (P2P) constituent un modèle de plus en plus populaire pour la programmation d’applications Internet car ils favorisent la décentralisation, le passage à l’échelle, la tolérance aux pannes et l’auto-organisation. à la différence du modèle traditionnel client-serveur, un réseau P2P est un système réparti décentralisé dans lequel tous les nœuds interagissent directement entre eux et jouent à la fois les rôles de fournisseur et d’utilisateur de services et de ressources. Une table de hachage distribuée (DHT) est réalisée par un réseauP2P et offre les mêmes services qu’une table de hachage classique, hormis le fait que les différents couples (clef, valeur) sont stockés dans différents nœuds du réseau. La fonction principale d’une DHT est la recherche d’une valeur associée à une clef donnée. Parmi les protocoles réalisant une DHT on peut nommer Chord, Pastry, Kademlia et Tapestry. Ces protocoles promettent de garantir certaines propriétés de correction et de performance ; or, les tentatives de démontrer formellement de telles propriétés se heurtent invariablement à des cas limites dans lesquels certaines propriétés sont violées. Tian-xiang Lu a ainsi décrit des problèmes de correction dans des versions publiées de Pastry. Il a conçu un modèle, appelé LuPastry, pour lequel il a fourni une preuve partielle, mécanisée dans l’assistant à la preuve TLA+ Proof System, démontrant que les messages de recherche de clef sont acheminés au bon nœud du réseau dans le cas sans départ de nœuds. En analysant la preuve de Lu j’ai découvert qu’elle contenait beaucoup d’hypothèses pour lesquelles aucune preuve n’avait été fournie, et j’ai pu trouver des contre-exemples à plusieurs de ces hypothèses. La présente thèse apporte trois contributions. Premièrement, je présente LuPastry+, une spécification TLA+ revue de LuPastry. Au-delà des corrections nécessaires d’erreurs, LuPastry+ améliore LuPastry en introduisant de nouveaux opérateurs et définitions, conduisant à une spécification plus modulaire et isolant la complexité de raisonnement à des parties circonscrites de la preuve, contribuant ainsi à automatiser davantage la preuve. Deuxièmement, je présente une preuve TLA+ complète de l’acheminement correct dans LuPastry+. Enfin, je démontre que l’étape finale du processus d’intégration de nœuds dans LuPastry (et LuPastry+) n’est pas nécessaire pour garantir la cohérence du protocole. Concrètement, j’exhibe une nouvelle spécification avec un processus simplifié d’intégration de nœuds, que j’appelle Simplified LuPastry+, et je démontre qu’elle garantit le bon acheminement de messages de recherche de clefs. La preuve de correction pour Simplified LuPastry+ est obtenue en réutilisant la preuve pour LuPastry+, et ceci représente un bon succès pour la réutilisation de preuves, en particulier considérant la taille de ces preuves. Chacune des deux preuves requiert plus de 30000 étapes interactives ; à ma connaissance, ces preuves constituent les preuves les plus longues écrites dans le langage TLA+ à ce jour, et les seuls exemples d’application de preuves mécanisées de théorèmes pour la vérification de protocoles DHT / A distributed hash table (DHT) is a peer-to-peer network that offers the function of a classic hash table, but where different key-value pairs are stored at different nodes on the network. Like a classic hash table, the main function provided by a DHT is key lookup, which retrieves the value stored at a given key. Examples of DHT protocols include Chord, Pastry, Kademlia and Tapestry. Such DHT protocols certain correctness and performance guarantees, but formal verification typically discovers border cases that violate those guarantees. In his PhD thesis, Tianxiang Lu reported correctness problems in published versions of Pastry and developed a model called {\LP}, for which he provided a partial proof of correct delivery of lookup messages assuming no node failure, mechanized in the {\TLA} Proof System. In analyzing Lu's proof, I discovered that it contained unproven assumptions, and found counterexamples to several of these assumptions. The contribution of this thesis is threefold. First, I present {\LPP}, a revised {\TLA} specification of {\LP}. Aside from needed bug fixes, {\LPP} contains new definitions that make the specification more modular and significantly improve proof automation. Second, I present a complete {\TLA} proof of correct delivery for {\LPP}. Third, I prove that the final step of the node join process of {\LP}/{\LPP} is not necessary to achieve consistency. In particular, I develop a new specification with a simpler node join process, which I denote by {\SLP}, and prove correct delivery of lookup messages for this new specification. The proof of correctness of {\SLP} is written by reusing the proof for {\LPP}, which represents a success story in proof reuse, especially for proofs of this size. Each of the two proofs amounts to over 32,000 proof steps; to my knowledge, they are currently the largest proofs written in the {\TLA} language, and---together with Lu's proof---the only examples of applying full theorem proving for the verification of DHT protocols
|
9 |
On the Design of Socially-Aware Distributed SystemsKourtellis, Nicolas 01 January 2012 (has links)
Social media services and applications enable billions of users to share an unprecedented amount of social information, which is further augmented by location and collocation information from mobile phones, and can be aggregated to provide an accurate digital representation of the social world. This dissertation argues that extracted social knowledge from this wealth of information can be embedded in the design of novel distributed, socially-aware applications and services, consequently improving system response time, availability and resilience to attacks, and reducing system overhead. To support this thesis, two research avenues are explored.
First, this dissertation presents Prometheus, a socially-aware peer-to-peer service that collects social information from multiple sources, maintains it in a decentralized fashion on user-contributed nodes, and exposes it to applications through an interface that implements non-trivial social inferences. The system's socially-aware design leads to multiple system improvements: 1) it increases service availability by allowing users to manage their social information via socially-trusted peers, 2) it improves social inference performance and reduces message overhead by exploiting naturally-formed social groups, and 3) it reduces the opportunity of attackers to influence application requests. These performance improvements are assessed via simulations and a prototype deployment on a local cluster and on a worldwide testbed (PlanetLab) under emulated application workloads.
Second, this dissertation defines the projection graph, the result of decentralizing a social graph onto a peer-to-peer system such as Prometheus, and studies the system's network properties and how they can be used to design more efficient socially-aware distributed applications and services. In particular: 1) it analytically formulates the relation between centrality metrics such as degree centrality, node betweenness centrality, and edge betweenness centrality in the social graph and in the emerging projection graph, 2) it experimentally demonstrates on real networks that for small groups of users mapped on peers, there is high association of social and projection graph properties, 3) it shows how these properties of the (dynamic) projection graph can be accurately inferred from the properties of the (slower changing) social graph, and 4) it demonstrates with two search application scenarios the usability of the projection graph in designing social search applications and unstructured P2P overlays.
These research results lead to the formulation of lessons applicable to the design of socially-aware applications and distributed systems for improved application performance such as social search, data dissemination, data placement and caching, as well as for reduced system communication overhead and increased system resilience to attacks.
|
10 |
Detection of malicious user communities in data networksMoghaddam, Amir 04 April 2011 (has links)
Malicious users in data networks may form social interactions to create communities in abnormal fashions that deviate from the communication standards of a network. As a community, these users may perform many illegal tasks such as spamming, denial-of-service attacks, spreading confidential information, or sharing illegal contents. They may use different methods to evade existing security systems such as session splicing, polymorphic shell code, changing port numbers, and basic string manipulation. One way to masquerade the traffic is by changing the data rate patterns or use very low (trickle) data rates for communication purposes, the latter is focus of this research. Network administrators consider these communities of users as a serious threat.
In this research, we propose a framework that not only detects the abnormal data rate patterns in a stream of traffic by
using a type of neural network, Self-organizing Maps (SOM), but also
detect and reveal the community structure of these users for further
decisions. Through a set of comprehensive simulations, it is shown in this research that the suggested framework is able to detect these malicious user communities with a low false negative rate and false positive rate.
We further discuss ways of improving the performance of the neural network by studying the size of SOM's.
|
Page generated in 0.0602 seconds