A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment
|
|
|
- Mitchell Blair
- 10 years ago
- Views:
Transcription
1 A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment Weisong Chen, Cho-Li Wang, and Francis C.M. Lau Department of Computer Science, The University of Hong Kong {wschen, clwang, Abstract. One fundamental task to realize the envisioned ubiquitous computing paradigm is the proper management of the data generated in this environment. The special characteristics of high distribution, heterogeneity, mobility, and autonomy of the ubiquitous computing environment introduce great difficulties in data management, which cannot be easily overcome using existing solutions. We propose a collaborative and semantic data management framework that is incentive-based. The incentives encourage contribution from and foster cooperation among different devices in the environment. Devices that contribute more to the successful information accesses of other devices will gain more routing knowledge, which in turn improves the service of their own queries. We suggest using ontology-based metadata to explicitly and formally describe data semantics. Our routing scheme would redirect queries to make full use of cached data available in the environment. Experiment results show that our system can serve information accesses in the ubiquitous environment with less communication costs than other similar systems. 1 Introduction Ubiquitous computing is an emerging computing paradigm that promises continuous and seamless access to information anytime, anywhere, via any device [1]. Constant and rapid advances in hardware and communication technologies are bringing us closer to this envisioned paradigm. We are starting to experience some flavor of ubiquitous computing, though the complete realization is still not completely within reach. One fundamental task to make ubiquitous computing a reality is the proper handling of the data generated in this environment. In order to support continuous and seamless information access, the underlying data should be carefully stored, distributed, and indexed. The special characteristics of ubiquitous computing, namely, high distribution, heterogeneity, mobility, and autonomy [2], introduce tremendous data management challenges, which cannot be easily overcome by existing solutions. This research is partly supported by HKU Large Equipment Grant and Hong Kong RGC Grant HKU-7519/03E.
2 In this paper, we present a data management framework for ubiquitous computing environment. One guiding principle behind our design is to encourage contribution from and foster cooperation among devices owned by different users in the environment. The people joining the environment are expected to agree to share their devices and contribute to the networked community in which they reside. In addition to serving their owners, user devices share their data, as well as knowledge about their data, with other users devices. Devices that contribute to the success of others information accesses will benefit through acquiring useful routing knowledge in the process, which can enhance their ability to serve subsequent queries. Routing refers to a query traveling from node to node until finding an answer, and also the ensuing process of locating the desired data. The more contribution a device makes, the more knowledge it will gain. Hence, we have an incentive scheme for devices to participate in the activities of others. We use the following techniques to address the data management challenges in ubiquitous computing environment. - Ontology-based Metadata An ontology is an explicit specification of a conceptualization [3]. We suggest using ontology-based metadata to explicitly and formally describe data semantics, which should be an effective approach to dealing with data diversity in the ubiquitous environment. - Incentive-based Routing Protocol We propose a routing protocol which provides incentives for devices to contribute to others information accesses. The more contribution is made, the more knowledge will be gained. Devices interact in a collaborative manner that generates many mutual benefits. - Cooperative Caching User devices maintain local cached copies of the downloaded data and share them with others. Popular data will be widely cached and unused data will fade away eventually. No explicit distribution control on the data sources is required. The rest of the paper is organized as follows. In Section 2 we present the design of our system. Section 3 discusses the experiments, which are used to evaluate the performance of our system. We briefly discuss related work in Section 4. Section 5 concludes the paper. 2 System Design This section discusses the essential aspects of our design, including system overview, ontology-based metadata, metadata similarity function, and incentive-based routing protocol. 2.1 System Overview In the ubiquitous computing environment, there are two types of devices, shared devices providing public access and private user devices owned by particular users. Shared devices, such as sensors and server systems, generate or/and store data that can be accessed by different users in the environment. Traditionally,
3 when two nearby user devices issue queries for similar data, two searches will occur independently; and the search result in one user device cannot be shared and reused by the other device. In our model, people joining the environment will agree to share their devices and contribute to the infrastructure. Whenever possible, devices would contribute to information accesses of other devices, and thereby gain routing knowledge to their own advantage. As such, the devices of different users form a peer-to-peer community based on mutual benefits. Devices in the community share not just data but also knowledge. Ontology-based metadata are used to explicitly describe data semantics. Metadata can be widely propagated. Through metadata propagation, a device advertises its knowledge about certain data. By receiving metadata, a device incrementally builds up its routing knowledge. Devices request information independently. Queries are forwarded to the nodes that have the closest matching metadata using a similarity function. Once results are found, the corresponding metadata are sent to the device that initiated the query, following the query path in reverse direction. The intermediate nodes along the query path are benefited too they copy the metadata to their own store and update their routing knowledge accordingly. The initiating device, based on the received metadata, then makes a direct request to the data source for the desired data and maintains a cached copy. Future similar queries received by the intermediate nodes will be directly forwarded to the initiating node, where the cached data has been stored. 2.2 Ontology, Metadata, and Query Ontology is the formal and explicit conceptualization of a particular domain. It includes a set of concepts and their inter-relationships. Based on [4], we define ontology structure as O = {C, P, H C, R}. Using the example ontology in Fig.1, we explain each component of the ontology structure. Concepts (C): well-defined terms referring to classes (or types) of objects in a particular domain. In the sample ontology, C = {Publication, Staff, Institute, Report,... }. Relations (P ): properties of concepts defining the concept semantics. In the sample ontology, P = {Publish, Author, Work, Graduate,... }. Concept Hierarchy (H C ): a hierarchy of concepts that are linked together through relations of specialization and generalization. H C (Report, Publication) means that Report is a sub-concept of Publication. R: a function that relates two concepts non-taxonomically, using the relations in P. R(P ) = (C 1, C 2 ) is usually written as P (C 1, C 2 ). For example, R(Publish)= (Staff, Publication), is written as Publish(Staff, Publication). There are other terms relating to the usage of ontology, defined as follows. Concept Instance: An object is an instance of a concept if it is a member of the class denoted by the concept.
4 Relation Instance: relations relating two concepts in the ontology can be used to relate concept instances of these two concepts. Instances of these relations are called relation instances. Ontology Instance: comprising concept instances and relation instances. Publish Publication Work Relation Staff Institue Author Graduate Concept Hierarchy Concept Is-a Is-a Is-a Is-a Author Work Is-a Ontology Report Book Professor Associate University Relation Instance Concept Instance Ontology Instance JAVA Prof. Smith Dr. Black HKU Author Work Metadata Metadata Data - Metadata Data Data Fig. 1. Ontology, Metadata and Data In our system, we use ontology instances as metadata to describe data semantics. A metadata structure is a 6-tuple M = {O, I, C, P I, I C, I R }, where O is the referenced ontology, I the set of concept instances, C the set of concepts (a subset of the concepts in the ontology), P I the set of relation instances, I C : I C the function that relates concept instances to the corresponding concepts, and function I R : P I I I the function to relate concept instances using relation instances; I R (P I) = (I 1, I 2 ) is usually written as P I(I 1, I 2 ). For each piece of metadata, there is one concept instance that serves as the identifier of the described data. This concept instance is called the central concept instance of the metadata, denoted as M I. The corresponding concept of the central concept instance is called the central concept, denoted as M C. The central concept identifies the class of objects that the described data belong to. Other concept instances, together with the relation instances, describe the properties of the central concept instance. The properties are also called attributes of the central concept instance. While metadata describe data semantics, queries state the desired properties of the requested information. The query structure and the meaning of each element in this structure are the same as those of the metadata. They can be used in the operations where metadata are applicable. The only difference is that query allows wildcard instance (denoted as I ), i.e., any instance of a particular concept.
5 2.3 Metadata Similarity To determine the degree that metadata M 2 is similar to metadata M 1, we first independently calculate the degree that the concept instances in M 2 is similar to their corresponding concept instances in M 1. The following formula is to determine the corresponding concept instances between two metadata. If the corresponding concept instance does not exist, we denote it as I NIL. Suppose the concept instance set in M 2 is I M2 and relation set is P M2 respectively, the central concept instances in M 1 and M 2 are M1 I and M2 I respectively, for any concept instance I 1 in M 1, whose relation with M1 I is P, M2 I if I 1 = M1 I CP (I 1 ) = I 2, s.t. I 2 I M2 and P (M2 I, I 2 ) if P P M2 otherwise I NIL Other ontology research projects [5] have defined a numerical function to measure the similarity level between two concepts in a concept hierarchy. The basic principle is to exploit the shared concepts that are super-concepts for both concepts. A concept s super-concepts (SC) in the ontology can be determined using the following formula, SC(C i ) = {C j C j C, H C (C i, C j )} {C i } The degree that concept C j is similar to concept C i, denoted as C Sim (C i, C j ), is given by the following formula, where ρ is a tuning parameter with a range of [0,1]. C sim (C i, C j ) = ρ SC(C i) SC(C j SC(C i ) + (1 ρ) SC(C i) SC(C j SC(C j ) The similarity level between two concept instances is given by the following formula, 0 if I 1 = I NIL or I 2 = I NIL 1 if I 1 = I 2 I sim (I 1, I 2 ) = C sim (I C (I 1 ), I C (I 2 )) if I 1 = I and I 2 I C sim(i C (I 1), I C (I 2)) 2 otherwise The degree that metadata M 2 is similar to M 1 is given by the following formula, where I M2 denotes the concept instance set of M 2, excluding the central concept instance M2 I. M sim (M 1, M 2 ) = I sim (M1 I, M2 I Isim (I i, I j ), I j I M2 and I j = CP (I i ) ) I M1 2.4 Incentive-based Routing Protocol As nodes participate in routing processes, they continuously receive metadata from other nodes. The received metadata are classified according to their central
6 concepts (C 1, C 2,..., C n ). A list (L i ) will be used to store the metadata with the same central concept. The lists are indexed by the central concepts of the stored metadata. Associations between the metadata and the nodes providing the metadata are created and the metadata are inserted into the corresponding lists. Newly received metadata will be inserted at the head of the lists. When receiving a query (Q), the node searches the routing table to find the list (L i ) that is indexed by the central concept of the query. For each metadata (M i ) in (L i ), we compute the metadata similarity using the formula M sim (Q, M i ). The query is forwarded to the node that has the most similar metadata. In our model, nodes that help forward queries will obtain more knowledge about data and their locations in the network, thus enhancing the ability of these nodes to serve future queries. When forwarding queries, nodes record the nodes that initiated the queries. When passing the query results to the initiating nodes, the nodes record the nodes providing the results. This way, nodes obtain knowledge about the cached data in the network, and knowledge of the actual data sources. This knowledge will prove to be useful in serving subsequent queries. The nodes that participate more in forwarding queries will have more knowledge, and incentive scheme attracting participation from nodes. 3 Performance Evaluation We modified the NeuroGrid [7] system to support ontology-based metadata and incorporate our proposed routing protocol. The parameter settings of our simulation system are based on the observation provided by [12]. Table 1 shows the detailed meanings and default values of the key parameters used in our simulation system. We evaluate our proposed framework based on the performance metrics hit ratio and average path length. Hit ratio measures the percentage of the queries got served within bounded time-to-live (TTL), and average path length estimates the cost of finding the data. Table 1. Parameter Settings Parameter Base Value Total number of concepts in the ontology 150 The number of shared devices 50 The number of user devices 50 Total number of data objects 3000 The size of the cache memory 1 MB The size of the routing table 100 KB Staring TTL of the queries 7 Total number of queries by all user devices Disconnection probability of shared devices 20%
7 3.1 Ontology Vs. Keyword Searching Our first experiment is to show the performance of our system, using two test cases. One uses ontology-based searching. The other uses keyword-based searching. The performance results are shown in Fig.2. We can see that, in both cases, as more queries are issued, the cached data contribute more to the overall hit ratio. However, the ontology-based searching has far superior performance, compared with keyword-based searching. 1 Ontology-based Metadata 0.3 Keyword-based Metadata Hit Ratio Overall Hit Ratio Hit by Cached Data Hit by Original Sources Hit Ratio Overall Hit Ratio Hit by Cached Data Hit by Original Sources Fig. 2. Overall Performance 3.2 Effect of Cache Replacement Policies and Query Patterns In the second experiment, we adopt three cache replacement policies, namely, First In First Out (FIFO), Least Recently Used (LRU), and Least Frequently Used (LFU). Cache replacement occurs when a cache is full and there are new data coming in to be cached. We study their effect on the system performance by running simulation for each policy. The results are shown in the left part of Fig. 3. We can see that when the number of searches is small, the hit ratio monotonically increases and there is no major difference among these three policies. This is because the caches in the user devices are not full. Then, after around 4000 iterations, the caches become full. New data will start to push away other data, and different cache replacement policies start to show different effects on the system performance. We found that FIFO has the worst performance, due to the fact that it indiscriminately replaces cached data solely based on the time of caching, which may swap out popular data needed by other devices. We also want to know how different query patterns might affect the performance of our system. We test three different query patterns, namely, Random Query Pattern, Interest-based Query Pattern, and Popularity-based Query Pattern. As their names suggest, the random query pattern will generate queries
8 randomly without any predefined pattern. The interest-based query pattern will generate queries only for some limited number of concepts that are of interest to each device. The popularity-based query pattern will generate queries according to what are popular in the network. The effect of these three query patterns are shown in the right part of Fig. 3. As expected, the popularity-based query pattern has the best performance, as most of the queries can be served by the cached copies in the network. 0.6 Effect of Cache Replacement Algorithms Effect of Query Patterns Cache Hit Ratio LFU LRU FIFO Overall Hit Ratio Random Query Pattern Interest-based Query Pattern Popularity-base Query Pattern Fig. 3. Effect of Cache Replacement Policies and Query Patterns 3.3 Comparison with FreeNet, NeuroGrid, and Gnutella Our third experiment is to evaluate the efficiency of our proposed routing protocol against some well-known protocols. We compared our system with FreeNet, NeuroGrid, and Gnutella, using the same values for the parameters listed in the above table. Our incentive-based routing protocol has very similar performance with FreeNet system, in terms of overall hit ratio and the number of messages transferred. Both systems have much better performance than NeuroGrid and Gnutella. FreeNet only supports exact ID matching; our proposed framework allows users formulate semantic descriptions of the queried data, which is more flexible. In addition, we can achieve higher hit rate and less messages when the number of iterations is getting larger. This is because we store routing knowledge, instead of caching the data themselves. Routing knowledge is much smaller compared with the data themselves and our system can accommodate much more knowledge for locating data.
9 Hit Ratio Our Protocol FreeNet NeuroGrid Gnutella Comparison of Hit Ratio Number of Messages Our Protocol FreeNet NeuroGrid Gnutella Comparison of Messages Transferred Fig. 4. Comparison with FreeNet, NeuroGrid, and Gnutella 4 Related Work and Discussion There are some existing research work that have motivated us. In NeuroGrid [7], each node maintains routing knowledge by incrementally building up a list of queries together with which other nodes have been good at answering these queries in the past. In their implementation, keyword strings are used to index local resources and routing knowledge. MoGATU [2] is a project explicitly designed to deal with data management in the ubiquitous computing environment. Profile and context information are used to guide the interactions among different devices. Caching and replication are deployed at the devices, according to profile and context information. MoGATU considers each device individually to serve their users information accesses. Their results can be used to complement our system. HyperCuP [6] organizes the peer nodes in the P2P network into a hypercube topology. It guarantees that each peer node receives exactly one message in any broadcasting request. HyperCuP was among the early research that adopted ontology. Peers with similar resources or interests are grouped into concept clusters. The concept clusters are organized into a hypercube topology. Concept clusters themselves are hypercubes or star graphs. Queries in the network are first propagated to the intended concept clusters, which in turn optimally broadcast the queries within the clusters. 5 Conclusion and Future Work In the paper, we propose a collaborative and semantic data management framework to address the challenges of data access in the emerging ubiquitous computing environment. Experiment results have shown that our system can make efficient use of cached data in the network, and therefore it will not easily succumb to disconnection of original data sources. We studied the effect of different
10 cache replacement policies and query patterns on the performance of our system. We also compared our system with some similar projects. We have proved the efficacy of our proposed framework in providing effective and efficient information access to device users. In this paper, we have assumed that complete ontology knowledge is available at each device, which is not always possible in the ubiquitous computing environment. We did not explicitly deal with ontology variations either. In the next stage, we will incorporate ontology management into our infrastructure to bring the system closer to the reality. References 1. M. Satyanarayanan, Pervasive Computing: Vision and challenges, IEEE Personal Communications, pp , August F. Perich, A. Joshi, T. Finin, and Y. Yesha. On Data Management in Pervasive Computing Environments, IEEE Transactions on Knowledge and Data Engineering, May T. Gruber. A Translation Approach to Portable Ontology Specifications, Knowledge Acquisition, pp , A. Maedche, and V. Zacharias. Clustering Ontology-based Metadata in the Semantic Web, in Proceedings of 6th European Conference, PKDD 2002, Helsinki, Finland, August 19-23, T. Andreasen, H. Bulskov, and R. Knappe. From Ontology over Similarity to Query Evaluation, 2nd CoLogNET-ElsNET Symposium, Questions and Answers: Theoretical and Applied Perspectives, M. Schlosser, M. Sintek, S. Decker, and W. Nejdl. HyperCuP Hypercubes, Ontologies and Efficient Search on P2P Networks, International Workshop on Agents and Peer-to-Peer Computing, Bologna, Italy, July S. Joseph, NeuroGrid: Semantically routing queries in peer-to- peer networks, In Proceedings of the International Workshop on Peer-to-Peer Computing, A. Crespo and H. Garcia-Molina. Semantic overlay networks for p2p systems, Technical Report, Computer Science Department, Stanford University, October I. Clarke, O. Sandberg, B. Wiley and T.W. Hong, Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Designing Privacy Enhancing Technologies: Lecture Notes in Computer Science F.M. Cca-Acuna, C. Peery, R.P. Martin, and T.D. Nguyen. PlanetP: Using Gossiping to Build Content Addressable Peer-to-Peer Information Sharing, International Workshop on Peer-to-Peer Computing, Pisa, M.J. Franklin. Challenges in Ubiquitous Data Management, Informatics 10 Years Back, 10 Years Ahead, M.T. Schlosser, T.E. Condie, and S.D. Kamvar, Simulating a File-Sharing P2P Network. First Workshop on Semantics in P2P and Grid Computing, December, 2002.
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System
A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System Sashi Tarun Assistant Professor, Arni School of Computer Science and Application ARNI University, Kathgarh,
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
Semantic Search in Portals using Ontologies
Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University
WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks
WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks K. D. Cho et al., IEEE INFOCOM 2012 Workshop, pp. 316-321, March 2012. January 17, 2013 Byeong-Gi Kim Park Laboratory,
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
ICP. Cache Hierarchies. Squid. Squid Cache ICP Use. Squid. Squid
Caching & CDN s 15-44: Computer Networking L-21: Caching and CDNs HTTP APIs Assigned reading [FCAB9] Summary Cache: A Scalable Wide- Area Cache Sharing Protocol [Cla00] Freenet: A Distributed Anonymous
A Measurement Study of Peer-to-Peer File Sharing Systems
CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University
Using Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
Peer-to-Peer: an Enabling Technology for Next-Generation E-learning
Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Aleksander Bu lkowski 1, Edward Nawarecki 1, and Andrzej Duda 2 1 AGH University of Science and Technology, Dept. Of Computer Science,
PEER-TO-PEER (P2P) systems have emerged as an appealing
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 4, APRIL 2009 595 Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems Quang Hieu Vu, Member, IEEE, Beng Chin Ooi,
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Tornado: A Capability-Aware Peer-to-Peer Storage Network
Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao [email protected] Chung-Ta King* [email protected] Department of Computer Science National Tsing Hua University Hsinchu,
Load Balancing in Distributed Web Server Systems With Partial Document Replication
Load Balancing in Distributed Web Server Systems With Partial Document Replication Ling Zhuo, Cho-Li Wang and Francis C. M. Lau Department of Computer Science and Information Systems The University of
Concept of Cache in web proxies
Concept of Cache in web proxies Chan Kit Wai and Somasundaram Meiyappan 1. Introduction Caching is an effective performance enhancing technique that has been used in computer systems for decades. However,
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Enhance UDDI and Design Peer-to-Peer Network for UDDI to Realize Decentralized Web Service Discovery
Enhance UDDI and Design Peer-to-Peer Network for UDDI to Realize Decentralized Web Service Discovery De-Ke Guo 1, Hong-Hui Chen 1, Xian-Gang Luo 2,Xue-Shan Luo 1, Wei-Ming Zhang 1 1 School of Information
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes [email protected] University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
Evolution of Peer-to-Peer Systems
EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
Locality Based Protocol for MultiWriter Replication systems
Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin [email protected] One of the challenging problems in building replication
Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS
White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves
A Reputation Management System in Structured Peer-to-Peer Networks
A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology
Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing
Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing (Research Proposal) Abhishek Agrawal ([email protected]) Abstract This proposal discusses details about Peer-VM which is a peer-to-peer
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected]
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks
: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks Liangzhong Yin and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 16802
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,
A SIMULATOR FOR LOAD BALANCING ANALYSIS IN DISTRIBUTED SYSTEMS
Mihai Horia Zaharia, Florin Leon, Dan Galea (3) A Simulator for Load Balancing Analysis in Distributed Systems in A. Valachi, D. Galea, A. M. Florea, M. Craus (eds.) - Tehnologii informationale, Editura
Peer to peer networks: sharing between peers. Trond Aspelund
Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
SuperViz: An Interactive Visualization of Super-Peer P2P Network
SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu [email protected] Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes
Ontology for Home Energy Management Domain
Ontology for Home Energy Management Domain Nazaraf Shah 1,, Kuo-Ming Chao 1, 1 Faculty of Engineering and Computing Coventry University, Coventry, UK {nazaraf.shah, k.chao}@coventry.ac.uk Abstract. This
A Cloud Portal with a Cloud Service Search Engine
2011 International Conference on Information and Intelligent Computing IPCSIT vol.18 (2011) (2011) IACSIT Press, Singapore A Cloud Portal with a Cloud Service Search Engine Jaeyong Kang and Kwang Mong
A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks
1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: [email protected] # K.Meena 2, Assistant Professor
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
Peer-to-Peer Computing
Quang Hieu Vu Mihai Lupu Beng Chin Ooi Peer-to-Peer Computing Principles and Applications Springer 1 Introduction 1 1.1 Peer-to-Peer Computing 1 1.2 Potential, Benefits, and Applications 3 1.3 Challenges
Cloud Based E-Learning Platform Using Dynamic Chunk Size
Cloud Based E-Learning Platform Using Dynamic Chunk Size Dinoop M.S #1, Durga.S*2 PG Scholar, Karunya University Assistant Professor, Karunya University Abstract: E-learning is a tool which has the potential
Peer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology [email protected] Abstract In the last few years, the success of the Napster online music sharing program
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,
Load Balancing in Peer-to-Peer Data Networks
Load Balancing in Peer-to-Peer Data Networks David Novák Masaryk University, Brno, Czech Republic [email protected] Abstract. One of the issues considered in all Peer-to-Peer Data Networks, or Structured
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea [email protected], [email protected],
Counteracting free riding in Peer-to-Peer networks q
Available online at www.sciencedirect.com Computer Networks 52 (2008) 675 694 www.elsevier.com/locate/comnet Counteracting free riding in Peer-to-Peer networks q Murat Karakaya *, _ Ibrahim Körpeoğlu,
A reputation-based trust management in peer-to-peer network systems
A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science Iowa State University Ames, Iowa 50011 USA {
PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries
PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries Jyoti Ahuja, Jun-Hong Cui, Shigang Chen, Li Lao [email protected], [email protected], [email protected], [email protected]
Data Integration Hub for a Hybrid Paper Search
Data Integration Hub for a Hybrid Paper Search Jungkee Kim 1,2, Geoffrey Fox 2, and Seong-Joon Yoo 3 1 Department of Computer Science, Florida State University, Tallahassee FL 32306, U.S.A., [email protected],
I. INTRODUCTION NOESIS ONTOLOGIES SEMANTICS AND ANNOTATION
Noesis: A Semantic Search Engine and Resource Aggregator for Atmospheric Science Sunil Movva, Rahul Ramachandran, Xiang Li, Phani Cherukuri, Sara Graves Information Technology and Systems Center University
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Internet Content Distribution
Internet Content Distribution Chapter 4: Content Distribution Networks (TUD Student Use Only) Chapter Outline Basics of content distribution networks (CDN) Why CDN? How do they work? Client redirection
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Kunwadee Sripanidkulchai Bruce Maggs Hui Zhang Carnegie Mellon University, Pittsburgh, PA 15213 {kunwadee,bmm,hzhang}@cs.cmu.edu
SWAP: ONTOLOGY-BASED KNOWLEDGE MANAGEMENT WITH PEER-TO-PEER TECHNOLOGY
SWAP: ONTOLOGY-BASED KNOWLEDGE MANAGEMENT WITH PEER-TO-PEER TECHNOLOGY M. EHRIG, C. TEMPICH AND S. STAAB Institute AIFB University of Karlsruhe 76128 Karlsruhe, Germany E-mail: {meh,cte,sst}@aifb.uni-karlsruhe.de
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
ADVANCED GEOGRAPHIC INFORMATION SYSTEMS Vol. II - Using Ontologies for Geographic Information Intergration Frederico Torres Fonseca
USING ONTOLOGIES FOR GEOGRAPHIC INFORMATION INTEGRATION Frederico Torres Fonseca The Pennsylvania State University, USA Keywords: ontologies, GIS, geographic information integration, interoperability Contents
Dynamic Reputation Based Trust Management Using Neural Network Approach
www.ijcsi.org 161 Dynamic Reputation Based Trust Management Using Neural Network Approach Reza Azmi 1 Mahdieh Hakimi 2, and Zahra Bahmani 3 1 College of Engineering, Alzahra University 2 College of Engineering,
Information Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
Fault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
How To Balance A Web Server With Remaining Capacity
Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer
Research Topics on Information-Centric Networking: Caching, Routing and Virtualization
Research Topics on Information-Centric Networking: Caching, Routing and Virtualization Thomas Silverston JFLI, Japanese-French Laboratory for Informatics (CNRS UMI3527) The University of Tokyo May, 21
ADAPTIVE DISTRIBUTED CACHING WITH MINIMAL MEMORY USAGE
ADAPTIVE DISTRIBUTED CACHING WITH MINIMAL MEMORY USAGE Markus J. Kaiser, Kwok Ching Tsui and Jiming Liu Department of Computer Science Hong Kong Baptist University Kowloon Tong, Kowloon, Hong Kong ABSTRACT
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Towards a Peer-to-Peer Extended Content Delivery Network
Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
Bayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary [email protected] http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure
Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure O. Ardaiz, F. Freitag, L. Navarro Computer Architecture Department, Polytechnic University of Catalonia,
File sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: [email protected] Abstract: File sharing systems cause a huge portion
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
How To Balance Network Load In A Wireless Sensor Network
Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : [email protected],
Dynamic Resource Pricing on Federated Clouds
Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
A Review on Efficient File Sharing in Clustered P2P System
A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,
