Investigation on software‐defined networks’ reactive routing against BitTorrent
نویسندگان
چکیده
منابع مشابه
Evaluating the Impact of Software-defined Networks' Reactive Routing on BitTorrent Performance
Software-Defined Networks’ technologies introduce programmatic ways to reorganize the network logical topology. To achieve this, the switches in the network interact with a set of controllers, these controllers can dynamically update the switches configuration based in received events. A possible practical field of use of Software-Defined Networks’ is the one called Reactive Routing. On Reactiv...
متن کاملDefending BitTorrent against Strategic Attacks
BitTorrent has shown to be efficient for bulk file transfer, however, it is susceptible to free riding by strategic clients like BitTyrant. Strategic peers configure the client software such that for very less or no contribution, they can obtain good download speeds. Such strategic nodes exploit the altruism in the swarm and consume resources at the expense of other honest nodes and create an u...
متن کاملMultiple Identities in BitTorrent Networks
Peer-to-peer (P2P) file sharing systems have become ubiquitous and at present the BitTorrent (BT) based P2P systems are very popular and successful. It has been argued that this is mostly due to the Tit-For-Tat (TFT) strategy used in BT [1] that discourages free-ride behavior. However, Hale and Patarin [2] identify the weakness of TFT and hypothesize that it is possible to use multiple identiti...
متن کاملA Survey on Multicast Routing Approaches in Wireless Mesh Networks
Wireless mesh networks (WMNs) which mediates the broadband Internet access, have been recently received many attentions by the researchers. In order to increase capacity in these networks, nodes are equipped with multiple radios tuned on multiple channels emerging multi radio multi-channel WMNs (MRMC WMNs). Therefore, a vital challenge that poses in MRMC WMNs is how to properly assign channels ...
متن کاملInherent Robustness of Reactive Routing Protocols against Selfish Attacks
Mobile ad-hoc wireless networks generally comprise nodes having meagre computation and communication resources. To perform multi-hop communication in a dynamic topology, these nodes execute special routing protocols. Each node performs the function of a a mobile router and directs packets to other nodes in the network. For accurate functioning of the network it is imperative that all nodes exec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IET Networks
سال: 2015
ISSN: 2047-4954,2047-4962
DOI: 10.1049/iet-net.2014.0105