نتایج جستجو برای: overnet

تعداد نتایج: 10  

2005
Kendy Kutzner Thomas Fuhrmann

Peer-to-peer overlay networks have grown significantly in size and sophistication over the last years. Meanwhile, distributed hash tables (DHT) provide efficient means to create global scale overlay networks on top of which various applications can be built. Although filesharing still is the most prominent example, other applications are well conceivable. In order to rationally design such appl...

2008
Carlton R. Davis Stephen Neville José M. Fernandez Jean-Marc Robert John McHugh

Botnets, in particular the Storm botnet, have been garnering much attention as vehicles for Internet crime. Storm uses a modified version of Overnet, a structured peer-to-peer (P2P) overlay network protocol, to build its command and control (C&C) infrastructure. In this study, we use simulation to determine whether there are any significant advantages or disadvantages to employing structured P2...

2007
Ramsés Morales Brian Cho Indranil Gupta

Monitoring and management operations that query nodes based on their availability can be extremely useful in a variety of largescale distributed systems containing hundreds to thousands of hosts, e.g., p2p systems, Grids, and PlanetLab. This paper presents decentralized and scalable solutions to a subset of such availability-based management tasks. Specifically, we propose AVMEM, which is the f...

2012
Riccardo Leoncini Francesco Rentocchini

Background: data on cocaine market appear to be inconsistent, as they tend to show declining prices vis a vis a steady or increasing demand and a declining supply. This paper proposes an explanation by providing evidence of an under-estimation of the supply of cocaine. Methods: we put forwa d a conservative estimate of cocaine production in Colombia for year 2008 by means of reported seizures o...

Journal: :journal of computer and robotics 0
hamid farhadi school of science and eng., sharif university of technology (international campus), kish, iran behzad akbari department of electrical and computer eng., tarbiat modares university, tehran, iran shahab rajaee school of science and eng., sharif university of technology (international campus), kish, iran mohammad farahani school of science and eng., sharif university of technology (international campus), kish, iran

recently, peer-to-peer (p2p) networks contribute to a large fraction of the internet backbone traffic. consequently, misusing such networks for malicious purposes is a potential side effect. in this review article, we investigate different techniques of misusing p2p overlay networks to launch large-scale next-generation distributed denial of service (ddos) attacks. in particular, we investigate...

2004
Andreas Binzenhöfer Phuoc Tran-Gia

In recent years emerging file sharing systems like Gnutella, eDonkey, Overnet, and Kazaa strongly influenced the behaviour of Internet traffic. These platforms employ different peer-to-peer mechanisms, where the application areas are just beginning to shift from undemanding content sharing towards new business case services. Those new requirements brought out new Peer-to-Peer overlay architectu...

2010
Thomas Locher David Mysicka Stefan Schmid Roger Wattenhofer

Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer-to-peer system based on a distributed hash table. It is likely that its user base will continue to grow in numbers over the next few years as, unlike the eDonkey network, it does not depend on central servers, which increases scalability and reliability. Moreover, the...

2007
David Mysicka Roger Wattenhofer

Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer-to-peer system based on a distributed hash table. It is likely that its user base will continue to grow in numbers over the next few years as, unlike the eDonkey network, it does not rely on central servers, which tremendously increases scalability, and it is more eff...

Journal: :Fundam. Inform. 2011
Thomas Locher Stefan Schmid Roger Wattenhofer

This article reports on the results of our measurement study of the Kad network. Although several fully decentralized peer-to-peer systems have been proposed in the literature, most existing systems still employ a centralized architecture. The Kad network is a notable exception. Since the demise of the Overnet network, the Kad network has become the most popular peer-topeer system based on a di...

2006
Rita Hanna Wouhaybi

Algorithms for Reliable Peer-to-Peer Networks Rita Hanna Wouhaybi Over the past several years, peer-to-peer systems have generated many headlines across several application domains. The increased popularity of these systems has led researchers to study their overall performance and their impact on the underlying Internet. The unanticipated growth in popularity of peer-to-peer systems has raised...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید