• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 461
  • 91
  • 43
  • 34
  • 29
  • 28
  • 27
  • 24
  • 16
  • 13
  • 10
  • 9
  • 9
  • 8
  • 2
  • Tagged with
  • 859
  • 859
  • 317
  • 310
  • 197
  • 143
  • 142
  • 137
  • 137
  • 102
  • 87
  • 82
  • 80
  • 78
  • 72
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Peer-to-peer som företagslösning / Peer-to-peer as an enterprise solution

Waller, Michael, Salleke, Emelie January 2002 (has links)
Problemområde: Idag är användandet av peer-to-peer (P2P) - applikationer såsom KaZaa, ICQ och Seti@home utbrett bland privatpersoner. Användningen inom företag är dock ännu i sin linda. Vi kommer därför i den här uppsatsen utreda om ett eventuellt införande av P2P- teknik i ett företagsnätverk ger några fördelar jämfört med en klassisk Client/Server-lösning. Hypotes: Arbetet bygger på hypotesen: ?En P2P-lösning ger fördelar för företaget jämfört med en Client/Server-lösning? Genomförande: För jämförelsen mellan P2P och Client/Server definierades och jämfördes fem områden: Säkerhet, Användbarhet, Tillgänglighet, Bandbredd samt Utrustningskrav. Slutsats: Inom områdena Användbarhet och Tillgänglighet ger en P2P-lösning klara fördelar, däremot inom områdena Säkerhet och Bandbredd visar Client/Server- lösningen istället klara fördelar. Området Utrustningskrav är oavgjort då det inte finns någon märkbar skillnad på lösningarna. Säkerhetsproblemen är P2P-teknologins akilleshäl och det problem som är mest troligt att stoppa stora investeringar i framtiden om det inte löses. Slutsatsen av vår jämförelse blir sålunda: För ett företag som redan har ett existerande Client/Server-nätverk är det inte någon idé att helt byta system, däremot kan det vara av intresse att introducera en applikation som möjliggör skapandet av så kallade Virtuella Nätverk. För ett helt nytt företag kan skapandet av ett P2P-nätverk vara ett väl så intressant alternativ till Client/Server. Detta förutsätter dock att säkerheten inte är så viktig för företaget eller att säkerhetsproblemen lösts.
202

Investigating Spyware in Peer-to-Peer Tools

Boldt, Martin, Wieslander, Johan January 2003 (has links)
Peer-to-Peer (P2P) tools are used exclusively when their users are connected to the Internet, thus constituting a good foundation for online commercials to help finance further tool development. Although software that displays ads (adware) is very common, activity monitoring or information collecting software that spies on the users (spyware) may be installed together with the P2P tool. This paper will present a method for examining P2P tool installations and present test results from a few of the most common P2P tools. It will also discuss whether these tools, with their bundled software, make any privacy intrusions. Finally, the method itself will be evaluated and suggestions of refinements will be proposed.
203

Reducing the Download Time in Stochastic P2P Content Delivery Networks by Improving Peer Selection

Hays, Nicholas 01 January 2017 (has links)
Peer-to-peer (P2P) applications have become a popular method for obtaining digital content. Recent research has shown that the amount of time spent downloading from a poor performing peer effects the total download duration. Current peer selection strategies attempt to limit the amount of time spent downloading from a poor performing peer, but they do not use both advanced knowledge and service capacity after the connection has been made to aid in peer selection. Advanced knowledge has traditionally been obtained from methods that add additional overhead to the P2P network, such as polling peers for service capacity information, using round trip time techniques to calculate the distance between peers, and by using tracker peers. This work investigated the creation of a new download strategy that replaced the random selection of peers with a method that selects server peers based on historic service capacity and ISP in order to further reduce the amount of time needed to complete a download session. Peer-to-peer (P2P) applications have become a popular method for obtaining digital content. Recent research has shown that the amount of time spent downloading from a poor performing peer effects the total download duration. Current peer selection strategies attempt to limit the amount of time spent downloading from a poor performing peer, but they do not use both advanced knowledge and service capacity after the connection has been made to aid in peer selection. Advanced knowledge has traditionally been obtained from methods that add additional overhead to the P2P network, such as polling peers for service capacity information, using round trip time techniques to calculate the distance between peers, and by using tracker peers. This work investigated the creation of a new download strategy that replaced the random selection of peers with a method that selects server peers based on historic service capacity and ISP in order to further reduce the amount of time needed to complete a download session. The results of this new historic based peer selection strategy have shown that there are benefits in using advanced knowledge to select peers and only replacing the worst performing peers. This new approach showed an average download duration improvement of 16.6% in the single client simulation and an average cross ISP traffic reduction of 55.17% when ISPs were participating in cross ISP throttling. In the multiple clients simulation the new approach showed an average download duration improvement of 53.31% and an average cross ISP traffic reduction of 88.83% when ISPs were participating in cross ISP throttling. This new approach also significantly improved the consistency of the download duration between download sessions allowing for the more accurate prediction of download times.
204

Resource sharing in distributed peer-to-peer internet applications

Danzfuss, Theodor Louis Ferdinand 25 April 2005 (has links)
A dissertation presented on distributed Peer-to-Peer (P2P) Internet applications, focusing on distributed resource sharing as a P2P application. The history of Internet applications is researched to point out the roots of P2P applications as well as the dependency between modern technology and legacy technology. P2P applications are compared with traditional client/server applications. A classification system for categorizing P2P applications according to functionality and computing model is devised. The classification system is used to group applications with similar attributes and behavior. Five main mechanisms utilized by all content sharing P2P applications are identified. These mechanisms are node discovery, content discovery, content retrieval, content publishing and content storage. Napster, Gnutella and Freenet are discussed in detail as examples of distributed P2P resource sharing applications which utilize these mechanisms. These applications are then compared to point out similarities and differences. Other P2P initiatives known to the author are briefly presented. Challenges that need to be overcome if P2Papplications are to be widely adopted are identified and discussed. A typical content sharing P2P application is implemented for constraint mobile devices such as cell phones. The unique characteristics, possibilities and challenges of P2P on mobile devices are explored. / Dissertation (MSc)--University of Pretoria, 2005. / Computer Science / unrestricted
205

The Resounding Impact of Napster, Inc. An Analysis of A & M Records, Inc. v. Napster, Inc.

Kelly, Isabella 01 January 2017 (has links)
When Napster was first launched on the Internet in August of 1999 by young programmer, Shawn Fanning, the intension was that the platform would easily link Internet users with the free MP3 downloads they sought out on the web. By the time an injunction against the platform was granted and upheld by a state then federal court, Napster had made a far bigger impact than simply linking music listeners with free downloads. The proceedings of A & M Records, Inc. v. Napster, Inc. through the District Court Northern District of California then the United States Court of Appeals for the Ninth Circuit acted to test the applicability of copyright protections that had been legislatively heightened throughout the 1990’s and built the framework for specifications for copyright protection on the Internet. Even after fifteen years of being offline, the peer-to-peer platform still remains a household name due to the influence Napster had on shaping music consumers’ expectations of access to digital music as well as distributors’ practices. Through a review of A & M Records, Inc. v. Napster, Inc. in the district and appellate courts I will explore the workings of the Napster platform and the legal issues surrounding it - with an emphasis on vicarious copyright infringement, contributory copyright infringement, the application of the DMCA, and the application of the substantial non-infringing use doctrine to software technologies, as established by Sony Corporation of America v. Universal City Studios, Inc. I conclude that Napster has had a resounding legal, psychological, and technical impact on both the distribution and consumption of music in the digital space.
206

Architecture for a Fully Decentralized Peer-to-Peer Collaborative Computing Platform

Wilson, Dany January 2015 (has links)
We present an architecture for a fully decentralized peer-to-peer collaborative computing platform, offering services similar to Cloud Service Provider’s Platform-as-a-Service (PaaS) model, using volunteered resources rather than dedicated resources. This thesis is motivated by three research questions: (1) Is it possible to build a peer-to-peer col- laborative system using a fully decentralized infrastructure relying only on volunteered resources?, (2) How can light virtualization be used to mitigate the complexity inherent to the volunteered resources?, and (3) What are the minimal requirements for a computing platform similar to the PaaS cloud computing platform? We propose an architecture composed of three layers: the Network layer, the Virtual layer, and the Application layer. We also propose to use light virtualization technologies, or containers, to provide a uniform abstraction of the contributing resources and to isolate the host environment from the contributed environment. Then, we propose a minimal API specification for this computing platform, which is also applicable to PaaS computing platforms. The findings of this thesis corroborate the hypothesis that peer-to-peer collaborative systems can be used as a basis for developing volunteer cloud computing infrastructures. We outline the implications of using light virtualization as an integral virtualization primitive in public distributed computing platform. Finally, this thesis lays out a starting point for most volunteer cloud computing infrastructure development effort, because it circumscribes the essential requirements and presents solutions to mitigate the complexities inherent to this paradigm.
207

Peer-to-Peer File Transfer in Wireless Mesh Networks

ElRakabawy, Sherif M., Lindemann, Christoph 17 December 2018 (has links)
In this paper, we consider the peer-to-peer transfer of popular files between devices in a wireless mesh network. We address the problem that occurs when multiple nodes try to access the same file simultaneously, resulting in increased contention on the shared wireless channel. To counteract this problem, we propose a cooperative file transfer protocol which splits a file into fixed-sized pieces and allows simultaneous downloads of such pieces from multiple peers. Opposed to previous approaches, the proposed protocol selects the potential download peers such that the corresponding download paths possess minimum interference among each other. In a performance study where we compare our approach with other download schemes proposed in the literature, we show that our cooperative protocol roughly halves the time required for downloading a file.
208

IP Telephony : Peer-to-peer versus SIP

Marco Arranz, Carlos Aurello January 2005 (has links)
In recent years dramatic technology developments have exploited the development of better transmission media and allowed for broad internet penetration. This in turn has fostered the growth of IP telephony calls, i.e., Voice over IP (VoIP). New VoIP products are introduced almost daily, each seeking an opportunity in the market. Some of these products are free - thus putting pressure on other vendors. A good example of a commercial VoIP product is Skype. It is possibly the most important one as it has gained more than 3 millions users in approximately 2 years time. In contrast, Minisip is a non-commercial implementation of SIP developed by students at KTH. These programs are based on different architectures. While Skype is said to be based on a peer-to-peer protocol, Minisip utilized the Session Initiation Protocol (SIP) protocol. The aim of this thesis was to evaluate these two VoIP programs not only in terms of development, but also in terms of the quality of service and user perceived voice quality. The study of efficiency, usability, and installation of both are also in the scope of this thesis. The devices used for the evaluation included a HP iPAQ 5550, two PCs running in RedHat Linux 9, and a laptop running Microsoft Windows XP. / På senare år har den dramatiska teknikutvecklingen exploaterat utvecklingen av bättre överföringsmedia samt möjliggjort för en bred Internetpenetrering. Det i sin tur har gynnat ökningen av telefonsamtal med IP-telefoner, d.v.s. Voice over IP (VoIP). Nya VoIP produkter introduceras nästan dagligen och varje produkt söker sin möjlighet på marknaden. Vissa av dessa produkter är gratis och sätter alltså press på andra försäljarna. Ett bra exempel på en VoIP produkt är Skype. Det är möjligtvis den viktigaste produkten då den har fått tre miljoner användare på ungefär två års tid. I kontrast till detta finns Minisip som är en icke kommersiell implementation av SIP, utvecklad av studenter från KTH. Dessa program är baserade på olika arkitekturer. Medan Skype är baserat på ett peer-to-peer protokoll, utnyttjar Minisip protokollet Session Initiation Protocol (SIP) Protocol. Syftet med denna avhandling var att evaluera dessa två VoIP program, inte bara i termer av utveckling utan också i termer av ”quality of service” och hur användaren uppfattar röstkvaliteten. Studien innefattar också effektivitet, användarvänlighet och installation av de båda programmen. Enheterna som användes under denna evaluering var en HP iPAQ 5550, två pc:s med Linux Red Hat 9 samt en bärbar pc med Windows XP.
209

Daedalus: A media agnostic peer-to-peer architecture for IPTV distribution

Makris, Athanasios, Strikos, Andreas January 2008 (has links)
IPTV is gaining increasing attention. It is an expanding field where a lot of people are working hard to solve the problems that delay its wide-spread use. One major problem is that the existing IPTV distribution mechanisms do not seem to work well when applied on a large scale. Especially, IP multicast does not seem to meet the requirements of highly demanding IPTV services. In contrast, peer-to-peer architectures for distributing content have been available for a number of years (since the late 1990’s), and their success suggests that this is a promising alternative means of distributing content. Although peer-to-peer architectures are well known for file transfer, this kind of architecture has been used in this thesis for distributing streaming video flows. We combine results from two different approaches - IPTV and peer-to-peer systems - as part of our design and implementation of a new solution for distributing IPTV. Our proposal aims to avoid any weaknesses that the existing solutions have, whilst offering a viable solution for distributing live content. / Intresset kring IPTV ökar hela tiden, och många människor arbetar på att lösa de problem som hindrar området från att växa snabbt. Ett av huvudproblemen är att den existerande IPTV-distributionstekniken inte fungerar bra då den appliceras på stora lösningar. Bland de största problemen är att IP-Multicast inte möter de krav som marknaden ställer på global distribution av material. I motsats till detta har peer-to-peer teknik, som funnits sedan 90-talet, visat sin styrka för fil distribution på en mycket global skala på existerande infrastruktur. I denna uppstats kombinerar vi dessa två områden för att utröna vilka möjligheterna som finns för att optimera kostnaden för distrubition av live-tv samtidigt som vi försöker att undvika de svagheter som normalt associeras med de olika arkitekturerna. Vårt mål är att utnyttja de bästa egenskaperna från de olika teknikerna för att skapa en livsduglig och långsiktig lösning för TV-distribution.
210

DESIGNING A NEOTERIC ARCHITECTURE & COMMUNICATION PROTOCOLS FOR CHINESE REMAINDER THEOREM BASED STRUCTURED PEER-TO-PEER NETWORKS WITH COMMON INTERESTS

Maddali Vigneswara, Iswarya 01 December 2021 (has links)
The core motive of this research is to construct a new hierarchical non-DHT based architecture for Peer-to-Peer (P2P) networks that facilitate common interests clustering. DHT based network maintenance is on the high end and it churning management is a complex task here. Providing efficient data querying performance and ensuring minimal churn management effort has interested us to pursue non-DHT route of P2P networking. And at each level of the proposed architecture hierarchy, existing networks are all structured and each such network has the diameter of 1 overlay hop. Such low diameters have immense importance in designing very efficient data lookup algorithms. We shall use a mathematical model based on the Chinese Remainder Theorem (CRT), generally used in cryptography, to define the neighborhood relations among peers to obtain the above-mentioned diameters. To the best of our knowledge, use of CRT in P2P network design is a completely new idea; it does not exist in the literature so far. It is worth mentioning its most important advantage from the viewpoint of speed of communication, that is its diameter, which is only 3 overlay hops. The protocol is not restricted to a single data source, and it incorporates peer heterogeneity as well.

Page generated in 0.038 seconds