2,100 research outputs found

    A Peer-to-Peer Architecture for e-Science

    Get PDF

    A Peer-to-Peer Architecture for Distributed Knowledge Management.

    Get PDF
    Most of the knowledge management systems of complex organizations are based on technological architectures that are in contradiction with the social processes of knowledge creation. In particular, centralized architectures are adopted to manage a process that is intrinsically distributed. In this paper, assuming a Distributed approach to Knowledge Management (DKM), is proposed that technological and social architectures must be reciprocally consistent. Moreover, in the domain of Knowledge Management, technological architectures should be designed in order to support the interplay between two qualitatively different processes: the autonomous management of knowledge of individuals and groups - here called Knowledge Nodes (KNs) -, and the coordination required in order to exchange knowledge among them. Finally a peer to peer architecture to support knowledge exchange across distributed and autonomous KNs is presented

    NAT Traversal in Peer-to-Peer Architecture

    Get PDF
    Peer-to-peer networks are well known for file sharing between multiple computers. They establish virtual tunnels between computers to transfer data, but NATs makes it harder. A NAT, Network Address Translation, is a process which transforms private IP addresses, such as 192.168.2.1, into public addresses, such as 203.0.113.40. The idea is that multiple private addresses can hide behind a single public address and thus virtually enlarge the number of allocable public IP addresses. When an application in the local network establishes a connection to Internet, the packet passes through the NAT which adjusts the IP header and maps an external port to the computer which sent the request. When packets are received from the Internet by the NAT, they are forwarded to the internal host which is mapped to the port on which the packet was received, or dropped if no mapping exists. In this paper, we will introduce you to NAT and P2P, we will discuss the numerous ways NATs use to translate private IP addresses into public ones, we will discuss known techniques used to fix the problem and we will also present how popular peer-to-peer programs bypass NATs. This paper is written so anybody with a reasonable knowledge of networking would grasp the essentials. It is important to keep in mind that the traversal methods presented in this document work for UDP and TCP and require no manual configuration of the Network Address Translator itself

    A User-Oriented Contents Recommendation System in Peer-to-Peer Architecture

    Get PDF
    Recommender system is a popular technique for reducing information overload and finding digital contents that is most valuable to users. However, most recommender systems are based on a centralized client-server architecture in which servers and clients represents contents providers and users respectively. The existing recommender systems depend on contents providers and give a number of disadvantages to users. Therefore, we propose a recommender system based on a distributed P2P architecture that has originated with user-oriented principle rather than business itself. The proposed system consists of fully functioning personal recommender agents that automatically select neighbors and recommend contents. The agents learn user preference from users’ content usage without requiring users’ explicit ratings. We believe that the suggested P2P based recommender system should provide the users with more qualified recommendations, while it reduces the effort and time of users

    Issues in implementing a scientific data grid based on peer-to-peer architecture

    Get PDF
    Grid and peer-to-peer (P2P) networks enable the sharing and aggregation of geographically distributed resources. Grids mostly deal with large computational problems and provide geographically distributed resources for large-scale data-intensive applications that generate large data sets, whereas P2P provides a way for sharing huge volumes of data. In a modern scientific computing, the communities of researchers involves in organizing, moving, visualizing, and analyzing massive amounts of a very large data collections in a geographically distributed environment. Research in the area of grid and P2P computing; have given us various ideas and solutions to address the problems. One of the most challenging issues in grid computing that address above requirements is locating and sharing remote data. In this paper, we illustrate the idea of using P2P approach for locating and sharing data in scientific data grid environment through our P2P scientific data grid framework

    Secure web services using two-way authentication and three-party key establishment for service delivery

    Get PDF
    With the advance of web technologies, a large quantity of transactions have been processed through web services. Service Provider needs encryption via public communication channel in order that web services can be delivered to Service Requester. Such encryptions can be realized using secure session keys. Traditional approaches which can enable such transactions are based on peer-to-peer architecture or hierarchical group architecture. The former method resides on two-party communications while the latter resides on hierarchical group communications. In this paper, we will use three-party key establishment to enable secure communications for Service Requester and Service Provider. The proposed protocol supports Service Requester, Service Broker, and Service Provider with a shared secret key established among them. Compared with peer-to-peer architecture and hierarchical group architecture, our method aims at reducing communication and computation overheads

    Development of Campus Video-Conference System Based on Peer-To-Peer Architecture

    Get PDF
    Peer to Peer (P2P) systems inherently have high scalability, robustness and fault tolerance because there is no centralized server and the network self-organizes itself. This is achieved at the cost of higher latency for locating the resources of interest in the P2P overlay network. This paper describes the design and implementation of campus video conference system based on P2P architecture that was tested within premises of Ladoke Akintola University of Technology, Ogbomoso, Nigeria. The proposed Campus video conference system is made up of five modules which are the media stream engine, the conferencing control protocol, transmission module, TCP/UDP module and the user interface module. The media stream engine is responsible for audio/video capture and playback, the conferencing control protocol defines a set of conventions governing the structure and behavior of communication messages, the transmission module consists of a peer and a distribution network constituting of the peers also the delivery and exchange of streaming data while the audio manager and video manager use TCP/UDP to broadcast to other peer. The proposed system will offer smooth video conferencing with low delay and seldom and short freezes. It is believed that this videoconference system will bring video telephony to a new level of quality and will lead to a new trend in everyday communications in the university community

    Context and time dependent risk based decision making

    Get PDF
    As there is a lack of central management in an ecommerce interaction carried out based on peer-to-peer architecture, it is obvious for the trusting peer to analyze the Risk beforehand that could be involved in dealing with a trusted peer in these types of interactions. Another characteristic of peer-to-peer architecture interactions is that the trusting peer might have to choose a peer to interact with, from a set of possible trusted peers. It can ease its decision making process of choosing a peer to interact with by analyzing the Risk that could be involved in dealing with each of the possible trusted peers. In this paper we highlight and propose a solution to this problem by which the trusting peer can decide with which peer to interact with after analyzing the Risk that could be associated in dealing with each of them

    Active architecture for pervasive contextual services

    Get PDF
    Pervasive services may be defined as services that are available to any client (anytime, anywhere). Here we focus on the software and network infrastructure required to support pervasive contextual services operating over a wide area. One of the key requirements is a matching service capable of assimilating and filtering information from various sources and determining matches relevant to those services. We consider some of the challenges in engineering a globally distributed matching service that is scalable, manageable, and able to evolve incrementally as usage patterns, data formats, services, network topologies and deployment technologies change. We outline an approach based on the use of a peer-to-peer architecture to distribute user events and data, and to support the deployment and evolution of the infrastructure itself
    corecore