Results 1 -
6 of
6
Churn Resistant de Bruijn Networks for Wireless on Demand Systems
"... Abstract — Wireless on demand systems typically need au-thentication, authorization and accounting (AAA) services. In a peer-to-peer (P2P) environment these AAA-services need to be provided in a fully decentralized manner. This excludes many cryptographic approaches since they need and rely on a cen ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Abstract — Wireless on demand systems typically need au-thentication, authorization and accounting (AAA) services. In a peer-to-peer (P2P) environment these AAA-services need to be provided in a fully decentralized manner. This excludes many cryptographic approaches since they need and rely on a central trusted instance. One way to accomplish AAA in a P2P manner are de Bruijn-networks, since there data can be routed over multiple non-overlapping paths, thereby hampering malicious nodes from manipulation that data. Originally, de Bruijn-networks required a rather fixed network structure which made them unsuitable for wireless networks. In this paper we generalize de Bruijn-networks to an arbitrary number of nodes while keeping all their desired properties. This is achieved by decoupling link degree and character set of the native de Bruijn graph. Furthermore we describe how this makes the resulting network resistant against node churn. I.
Peer to Peer Networks Management Survey
"... Peer-to-Peer systems are based on the concept of resources localization and mutualisation in dynamic context. In specific environment such as mobile networks, characterized by high variability and dynamicity of network conditions and performances, where nodes can join and leave the network dynamical ..."
Abstract
- Add to MetaCart
(Show Context)
Peer-to-Peer systems are based on the concept of resources localization and mutualisation in dynamic context. In specific environment such as mobile networks, characterized by high variability and dynamicity of network conditions and performances, where nodes can join and leave the network dynamically, resources reliability and availability constitute a critical issue. The resource discovery problem arises in the context of peer to peer (P2P) networks, where at any point of time a peer may be placed at or removed from any location over a general purpose network. Locating a resource or service efficiently is one of the most important issues related to peer-topeer networks. The objective of a search mechanism is to successfully locate resources while incurring low overhead and low delay. This paper presents a survey on P2P networks management: classification, applications, platforms, simulators and security.
Churn Resistant de Bruijn Networks for Wireless on Demand Systems
"... Abstract — Wireless on demand systems typically need authentication, authorization and accounting (AAA) services. In a peer-to-peer (P2P) environment these AAA-services need to be provided in a fully decentralized manner. This excludes many cryptographic approaches since they need and rely on a cent ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract — Wireless on demand systems typically need authentication, authorization and accounting (AAA) services. In a peer-to-peer (P2P) environment these AAA-services need to be provided in a fully decentralized manner. This excludes many cryptographic approaches since they need and rely on a central trusted instance. One way to accomplish AAA in a P2P manner are de Bruijn-networks, since there data can be routed over multiple non-overlapping paths, thereby hampering malicious nodes from manipulation that data. Originally, de Bruijn-networks required a rather fixed network structure which made them unsuitable for wireless networks. In this paper we generalize de Bruijn-networks to an arbitrary number of nodes while keeping all their desired properties. This is achieved by decoupling link degree and character set of the native de Bruijn graph. Furthermore we describe how this makes the resulting network resistant against node churn. I.
Supernode-BasedMultiring P2P Middleware for the Global Contentifier
, 2007
"... I, the undersigned, declare that this work has not previously been submitted as an exercise for a degree at this, or any other University, and that unless otherwise stated, is my own work. ..."
Abstract
- Add to MetaCart
(Show Context)
I, the undersigned, declare that this work has not previously been submitted as an exercise for a degree at this, or any other University, and that unless otherwise stated, is my own work.
Proyecto de investigación básica o aplicada PEC3 — Tercera Prueba de evaluación continua
, 2012
"... Para dudas y aclaraciones sobre el enunciado, debéis dirigiros al consultor responsable de vuestra aula. Hay que entregar la solución en un fichero OpenDocument o PDF utilizando una de las plantillas entregadas conjuntamente con este enunciado. Adjuntad el fichero a un mensaje dirigido al espacio ..."
Abstract
- Add to MetaCart
(Show Context)
Para dudas y aclaraciones sobre el enunciado, debéis dirigiros al consultor responsable de vuestra aula. Hay que entregar la solución en un fichero OpenDocument o PDF utilizando una de las plantillas entregadas conjuntamente con este enunciado. Adjuntad el fichero a un mensaje dirigido al espacio de evaluación del aula virtual. El fichero debe tener la extensión.odt (OpenDocument) o.pdf (PDF) según el formato en que hagáis la entrega. La fecha límite de entrega es el 19 de junio (a las 24 horas).