22,096 research outputs found
Reducing Cost and Contention of P2P Live Streaming through Locality and Piece Selection
The use of locality within peer-to-peer (P2P) networks is ensuring the construction of overlay networks that are
both economically viable for network operators and scalable.
However, the underlying protocols on which traditional P2P
overlays are based are rapidly having to evolve in order to
better support more time sensitive, real-time video delivery
systems. This shift places greater demand on locality mechanisms to ensure the correct balance between bandwidth savings and successful timely playback. In this paper, we investigate the impact of peer locality within live streaming P2P systems and consider the pertinent challenges when designing locality based algorithms to support efïŹcient P2P live streaming services. Based on our ïŹndings we propose an algorithm for supporting locality and harmonised play points in a live streaming P2P system. We present our results and in-depth analysis of its operation though a series of simulations which measure bandwidth consumption at network egress points, failure rates and each peerâs play point relative to the live stream
SecureCyclon: Dependable Peer Sampling
Overlay management is the cornerstone of building robust and dependable
Peer-to-Peer systems. A key component for building such overlays is the
peer-sampling service, a mechanism that continuously supplies each node with a
set of up-to-date peers randomly selected across all alive nodes. Arguably, the
most pernicious malicious action against such mechanisms is the provision of
arbitrarily created links that point at malicious nodes. This paper proposes
SecureCyclon, a peer-sampling protocol that deterministically eliminates the
ability of malicious nodes to overrepresent themselves in Peer-to-Peer
overlays. To the best of our knowledge, this is the first protocol to offer
this property, as previous works were able to only bound the proportion of
excessive links to malicious nodes, without completely eliminating them.
SecureCyclon redefines the concept of node descriptors from just being
containers of information that enable communication with specific nodes, to
being communication certificates that traverse the network and enable nodes to
provably discover malicious nodes. We evaluate our solution with the conduction
of extended simulations, and we demonstrate that it provides resilience even at
the extreme condition of 40% malicious node participation.Comment: 12 pages, 7 figures, ICDCS 202
Localising Peers in P2P Live Streaming Systems Within Resource-Constrained Networks
The use of locality within peer-to-peer (P2P) networks
is showing promise, ensuring the construction of overlay networks that are both economically viable for network operators and scalable, ensuring the successful delivery of content. However, the underlying protocols on which P2P overlays are based were originally designed as a best-effort, non-real time transfer medium which is now rapidly having to evolve in order to better support
more time sensitive, real-time video delivery systems. This shift places greater demand on locality mechanisms to ensure the correct balance between bandwidth savings and successful timely playback. In this paper, we continue our work to resolve the strong trade-off resulted from the limited network condition in order to support efficient P2P live streaming services. Based on our findings we propose an OPLoc framework for supporting locality and harmonised play points in a live streaming P2P system. We present our results and analysis of its operation through a series
of simulations which measure bandwidth consumption at network egress points, failure rates and each peersâ play point relative to the live stream
A Security Framework for JXTA-Overlay
En l'actualitat, la maduresa del camp de la investigaciĂł P2P empĂšs a travĂ©s de nous problemes, relacionats amb la seguretat. Per aquesta raĂł, la seguretat comença a convertir-se en una de les qĂŒestions clau en l'avaluaciĂł d'un sistema P2P, i Ă©s important proporcionar mecanismes de seguretat per a sistemes P2P. El projecte JXTAOverlay fa un esforç per utilitzar la tecnologia JXTA per proporcionar un conjunt genĂšric de funcions que poden ser utilitzades pels desenvolupadors per desplegar aplicacions P2P. No obstant aixĂČ, encara que el seu disseny es va centrar en qĂŒestions com ara l'escalabilitat o el rendiment general, no va tenir en compte la seguretat. Aquest treball proposa un marc de seguretat, adaptat especĂficament a la idiosincrĂ sia del JXTAOverlay.At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it is important to provide security mechanisms to P2P systems. The JXTAOverlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. However, since its design focused on issues such as scalability or overall performance, it did not take security into account. This work proposes a security framework specifically suited to JXTAOverlayÂżs idiosyncrasies.En la actualidad, la madurez del campo de la investigaciĂłn P2P empujado a travĂ©s de nuevos problemas, relacionados con la seguridad. Por esta razĂłn, la seguridad comienza a convertirse en una de las cuestiones clave en la evaluaciĂłn de un sistema P2P, y es importante proporcionar mecanismos de seguridad para sistemas P2P. El proyecto JXTAOverlay hace un esfuerzo por utilizar la tecnologĂa JXTA para proporcionar un conjunto genĂ©rico de funciones que pueden ser utilizadas por los desarrolladores para desplegar aplicaciones P2P. Sin embargo, aunque su diseño se centrĂł en cuestiones como la escalabilidad o el rendimiento general, no tuvo en cuenta la seguridad. Este trabajo propone un marco de seguridad, adaptado especĂficamente a la idiosincrasia del JXTAOverlay
Taxonomy of P2P Applications
Peer-to-peer (p2p) networks have gained immense popularity in recent years and the number of services they provide continuously rises. Where p2p-networks were formerly known as file-sharing networks, p2p is now also used for services like VoIP and IPTV. With so many different p2p applications and services the need for a taxonomy framework rises. This paper describes the available p2p applications grouped by the services they provide. A taxonomy framework is proposed to classify old and recent p2p applications based on their characteristics
A Security-aware Approach to JXTA-Overlay Primitives
The JXTA-Overlay project is an effort to use JXTA technology
to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its design mainly focuses on issues such as scalability or overall performance, it does not take security into account. However, as P2P applications have evolved to fulfill more complex scenarios, security has become a very important aspect to take into account when evaluating a P2P framework. This work proposes a security extension specifically suited to JXTA-OverlayÂżs idiosyncrasies, providing an acceptable solution to some of its current shortcomings.El proyecto JXTA-Overlay es un esfuerzo por utilizar la tecnologĂa JXTA para proporcionar un conjunto genĂ©rico de funciones que pueden ser utilizadas por los desarrolladores para desplegar aplicaciones P2P. Aunque su diseño se centra principalmente en cuestiones como la escalabilidad y el rendimiento general, no tiene en cuenta la seguridad. Sin embargo, como las aplicaciones P2P se han desarrollado para cumplir con escenarios mĂĄs complejos, la seguridad se ha convertido en un aspecto muy importante a tener en cuenta a la hora de evaluar un marco P2P. Este artĂculo propone una extensiĂłn de seguridad especĂficamente adaptada a la idiosincrasia de JXTA-Overlay, proporcionando una soluciĂłn aceptable para algunas de sus deficiencias actuales.El projecte JXTA-Overlay Ă©s un esforç per utilitzar la tecnologia JXTA per proporcionar un conjunt genĂšric de funcions que poden ser utilitzades pels desenvolupadors per desplegar aplicacions P2P. Tot i que el seu disseny se centra principalment en qĂŒestions com ara la escalabilitat i el rendiment general, no tĂ© en compte la seguretat. No obstant aixĂČ, com que les aplicacions P2P s'han desenvolupat per complir amb escenaris mĂ©s complexos, la seguretat s'ha convertit en un aspecte molt important a tenir en compte a l'hora d'avaluar un marc P2P. Aquest article proposa una extensiĂł de seguretat especĂficament adaptada a la idiosincrĂ sia de JXTA-Overlay, proporcionant una soluciĂł acceptable per a algunes de les seves deficiĂšncies actuals
- âŠ