نتایج جستجو برای: gnutella
تعداد نتایج: 408 فیلتر نتایج به سال:
The objective of this project is to simulate a Peer-to-Peer type of environment with the JADE multi-agent system platform to investigate the use of social networks to optimize the speed of search and to improve quality of service in the Peer-to-Peer environment. Our project uses the Gnutella protocol as a starting point. The Gnutella protocol broadcasts messages for searching files. This messag...
Anonymity is considered as a valuable property as far as everyday transactions in the Internet are concerned. Users care about their privacy and they seek for new ways to keep secret as much as of their personal information from third parties. Anonymizing systems exist nowadays that provide users with the technology, which is able to hide their origin when they use applications such as the Worl...
Abstract. Overlay applications are popular as they provide high-level functionality by masking the intrinsic complexity of the underlay network. However, overlays rely on the underlay to provide them with basic connectivity. Therefore, the intrinsic features of the underlay network determine the efficiency of the overlay. Accordingly, studying the interdependency of the overlay and underlay net...
Although peer-to-peer networking applications continue to increase in popularity, there have been few measurement studies of their performance. We present the first study of the popularity of files stored and transferred among peers in Napster and Gnutella over month-long periods. Our analysis indicates that the popularity of files is skewed in all four cases and fits well to a log-quadratic di...
Without assuming any knowledge of the underlying physical topology, the conventional P2P mechanisms are designed to randomly choose logical neighbors, causing a serious topology mismatch problem between the P2P overlay network and the underlying physical network. This mismatch problem incurs a great stress in the Internet infrastructure and adversely restraints the performance gains from the va...
We propose a P2P cooperation policy to increase the effectiveness of the flooding-based approach used to retrieve information over pure P2P networks. Flooding consists in propagating the original query from the source peer to “known” peers, and, in turn, to other peers, producing, in the general case, an exponential grow of the search traffic in the network. According to our policy, each peer i...
Last lecture, we discussed the broken incentives in Gnutella, where a Prisoner’s Dilemmatype scenario gives users a strong incentive to free ride. This is one version of a broader issue, that of incentivizing participation. (In Gnutella, we can equate uploading with participating.) As you can imagine, incentivizing high levels of participation is a first-order concern for many systems and busin...
The peer-to-peer (P2P) paradigm for building distributed applications has recently gained renewed attention, partly due to the enormous success of systems like Napster and Gnutella. Subsequently, a multitude of projects focusing on anonymity, security, routing and reliability aspects of P2P have been initiated. A framework that supports the design, evaluation and implementation phases of P2P ap...
Many distributed systems built on peer-to-peer principles organize nodes in an overlay network, in order to enable communication between nodes. In general, this overlay network may have nothing to do with the location of nodes on the physical network. We propose a generic mechanism called Apocrypha to make any P2P overlay “network-aware”, and thus optimize internode communication. We show how A...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید