نتایج جستجو برای: gnutella

تعداد نتایج: 408  

2009
Gerhard Goos Juris Hartmanis Jan van Leeuwen David Hutchison Josef Kittler Jon M. Kleinberg John C. Mitchell Gerhard Weikum Arvind Krishnamurthy Bernhard Plattner

This paper examines the problem of characterizing and assessing the global impact of the load imposed by a Peer-to-Peer (P2P) overlay on the AS-level underlay. In particular, we capture Gnutella snapshots for four consecutive years, obtain the corresponding AS-level topology snapshots of the Internet and infer the AS-paths associated with each overlay connection. Assuming a simple model of over...

2005
Selim Ciraci Ibrahim Korpeoglu Özgür Ulusoy

A P2P network that is overlayed over Internet can consist of thousands, or even millions of nodes. To analyze the performance of a P2P network, or an algorithm or protocol designed for a P2P network, simulation studies have to be performed quite often, and simulation studies require the use of appropriate models for various components and parameters of a P2P network simulated. Therefore it is i...

2007
Rubén Cuevas Carmen Guerrero Carlos Navarro Isaı́as Martinez-Yelmo

In this paper we propose a new protocol for unstructured and semantic-searching based p2p networks: Bittella. It forms a three level overlay network: the lower level is the unstructured p2p network (e.g. Gnutella). The medium level is formed by clusters per content, we call the resulting structure Small World per Content structure. This level allows the utilization of Bittorrent-like download t...

Journal: :journal of computer and robotics 0
hamid farhadi school of science and eng., sharif university of technology (international campus), kish, iran behzad akbari department of electrical and computer eng., tarbiat modares university, tehran, iran shahab rajaee school of science and eng., sharif university of technology (international campus), kish, iran mohammad farahani school of science and eng., sharif university of technology (international campus), kish, iran

recently, peer-to-peer (p2p) networks contribute to a large fraction of the internet backbone traffic. consequently, misusing such networks for malicious purposes is a potential side effect. in this review article, we investigate different techniques of misusing p2p overlay networks to launch large-scale next-generation distributed denial of service (ddos) attacks. in particular, we investigate...

Journal: :CoRR 2014
Mansoor Ebrahim Shujaat Khan UmerBin Khalid

— P2P networking has become a promising technology and has achieved popularity as a mechanism for users to share files without the need for centralized servers. The rapid growth of P2P networks beginning with Kaza, Lime wire, Napsters, E-donkey, Gnutella etc makes them an attractive target to the creators of viruses and other security threats. This paper describes the major security issues on P...

2006
Hanhua Chen Hai Jin

The research community has turned to create Semantic Overlay Networks for information retrieval in large scale peer-to-peer networks. Much research work in semantic overlay protocols and searching algorithms is done and their results indicate that semantic overlay is powerful for content searching in peer-to-peer network. However, very limited work has been done in analyzing and evaluating char...

2003
Guangtao Xue Jinyuan You Xiaojian He

Intuitively, the peers who share similar interests tend to have a high probability of connecting to each other and sharing the resources. In this paper, we use ontology model represent user’s interests instead of using the conventional Vector Space Model. Each interest concept hierarchy is then interpreted within the Information Theory framework as a probabilistic decision tree. The interest-ma...

2011
Anis Zarrad

Many protocols have been proposed to improve persistency and data availability in Collaborative Virtual Environments (CVEs). Two approaches have been proposed in the literature. Structured peer-to-peer network such as a distributed hash table (DHT) while the other approach uses an unstructured peer-to-peer network. With the rapidly increasing use of personal mobile devices, we are facing new op...

2012
Farzad Salehi Stefan D. Bruda Yasir Malik Bessam Abdulrazak

Service discovery is very important in realizing the concept of pervasive computing. Consequently, service discovery protocols must be able to work in the heterogeneous environment offered by pervasive computing. Remote service discovery in particular has not been properly achieved so far. In an attempt to remedy this we propose a new architecture for enabling typical (local) service discovery ...

Journal: :JNW 2012
Dandan Han Jing Zhang

For nodes’ mobility in mobile P2P networks and the consistency of overlay network, an unstructured Modified Gnutella-like P2P protocol (M-GIA) is proposed in this paper. The advantage of GIA protocol is presented fully, while the physical location information of nodes and the distance between nodes as parameters are added into the GIA protocol. The distance between two nodes can decide logical ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید