A PEER-TO-PEER COMMUNICATION INFRASTRUCTURE FOR GROUPWARE APPLICATIONS

2008 ◽  
Vol 17 (04) ◽  
pp. 523-554 ◽  
Author(s):  
PABLO GOTTHELF ◽  
ALEJANDRO ZUNINO ◽  
MARCELO CAMPO

Many advances have been done to allow groups of people to work together and collaborate in the Internet. Collaborative systems are characterized by the way participants interact. In many cases, equal standing members should cooperate in a non-authoritative environment, where no entity or authority is or should be in charge of regulating the group. Therefore, decentralized communication infrastructures have been hailed as promising alternatives. Recently, decentralized infrastructures based on P2P approaches have drawn the attention of the research community because of their benefits in terms of scalability, robustness, availability and potentials for leveraging computational resources distributed across the Internet. In this paper, a scalable peer-to-peer (P2P) communication Infrastructure for groupware applications is presented. It enables a large number of people to join and cooperate in a robust, decentralized and easy deployable way, without requiring high capacity servers or any other special network infrastructure. The communication infrastructure is based on a binary tree as overlay structure, which implements all groupware communication functionality, including membership management and packet forwarding, at application level, making it an inexpensive and fast deployable solution for equal standing members, such as home users with a domestic connection to the Internet. Two applications, one for synchronous groupware and the other for asynchronous collaboration, have been developed to validate the approach. Comparisons with other communication infrastructures in aspects such as end-to-end propagation delay, group latency, throughput, protocol overhead, failure recovery and link stress, show that our approach is a scalable and robust alternative.

2003 ◽  
Vol 52 (2) ◽  
pp. 139-149 ◽  
Author(s):  
A.J. Ganesh ◽  
A.-M. Kermarrec ◽  
L. Massoulie

2012 ◽  
Vol 2012 ◽  
pp. 1-11 ◽  
Author(s):  
Federica Paganelli ◽  
David Parlanti

Current trends towards the Future Internet are envisaging the conception of novel services endowed with context-aware and autonomic capabilities to improve end users’ quality of life. The Internet of Things paradigm is expected to contribute towards this ambitious vision by proposing models and mechanisms enabling the creation of networks of “smart things” on a large scale. It is widely recognized that efficient mechanisms for discovering available resources and capabilities are required to realize such vision. The contribution of this work consists in a novel discovery service for the Internet of Things. The proposed solution adopts a peer-to-peer approach for guaranteeing scalability, robustness, and easy maintenance of the overall system. While most existing peer-to-peer discovery services proposed for the IoT support solely exact match queries on a single attribute (i.e., the object identifier), our solution can handle multiattribute and range queries. We defined a layered approach by distinguishing three main aspects: multiattribute indexing, range query support, peer-to-peer routing. We chose to adopt an over-DHT indexing scheme to guarantee ease of design and implementation principles. We report on the implementation of a Proof of Concept in a dangerous goods monitoring scenario, and, finally, we discuss test results for structural properties and query performance evaluation.


2021 ◽  
Vol 39 (15_suppl) ◽  
pp. e24036-e24036
Author(s):  
Mercy Oduor ◽  
Kelvin Manyega ◽  
Therese Lotodo ◽  
Austin Okuku ◽  
Diana Namaemba ◽  
...  

e24036 Background: Multiple myeloma is a chronic progressive disease that calls for extended survivorship support post-diagnosis. Pre- COVID-19, the AMPATH Multiple Myeloma Program had created support groups for myeloma survivors and their caregivers that regularly met for health education, emotional support, and social opportunities. With the enforcement COVID-19 prevention and control protocols physical support group meetings became impossible. The program shifted to the online platform to sustain peer to peer support for myeloma patients and caregivers. We aim to describe challenges faced with online patient support group meetings as this has not been well documented in a resource-constrained setting. Methods: Myeloma patients and caregivers at Moi Teaching and Referral Hospital were contacted and a meeting date and time agreed. Participants were briefed on how to download and operate the zoom application in preparation for online meetings. A meeting link was shared with the expected attendees and a reminder sent two days before a meeting. Support group meetings were held for different groups among them myeloma survivors and caregivers. The meeting sessions were led by healthcare professionals – hematology consultants, social workers, nutritionist and psychosocial counsellors. Peer-to-peer sessions were also held. Results: Six online meeting sessions were held between June 2020 and December 2020. A total of 199 participants were expected to join the six different meetings but a low meeting turn-out of 25.6% was experienced. Participants were later contacted to unravel the reasons for a low turn-out. A total of 129 participants were contacted of which 88 responded. Out of the 88 respondents, 29% reported a tight work schedule, 25% short time meeting alerts, 20% did not have access to smartphones, and 8% had poor internet connectivity and another 8% reported no internet data bundles to connect to the internet. Conclusions: Low attendance of online meetings was observed. Participants cited scheduling and internet access as major obstacles to attending online support group meetings. Improved access to the internet through smartphones, reliable internet connection, and affordable data are needed in underserved communities to fully unlock the benefits of virtual platforms namely cost savings and effective information sharing.


2021 ◽  
Vol 10 (1) ◽  
pp. 493-500
Author(s):  
Roshidi Din ◽  
Reema Ahmed Thabit ◽  
Nur Izura Udzir ◽  
Sunariya Utama

The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.


The growth rate of the Internet is exceeding that of any previous technology. As the Internet has become the major medium for transferring sensitive information, the security of the transferred message has now become the utmost priority. To ensure the security of the transmitted data, Image steganography has emerged out as an eminent tool of information hiding. The frequency of availability of image file is high and provides high capacity. In this paper, a method of secure data hiding in image is proposed that uses knight tour positions and further 8-queen positions in 8*8 pixel blocks.The cover image is divided into 8*8 pixel blocks and pixels are selected from each block corresponding to the positions of Knight in 8*8 chessboard starting from different pixel positions. 8-pixel values are selected from alternate knight position. Selected pixels values converted to 8-bit ASCII code and result in 8* 8 bit matrix. 8-Queen’s solution on 8*8 chessboard is applied on 8*8 bit matrix. The bits selected from 8-Queens positions and compared with 8-bit ASCII code of message characters. The proposed algorithm changes the LSB of only some of the pixels based on the above comparison. Based on parameters like PSNR and MSE the efficiency of the method is checked after implementation. Then the comparison done with some already proposed techniques. This is how, image steganography showed interesting and promising results when compared with other techniques.


2014 ◽  
pp. 169-228
Author(s):  
Jânio M. Monteiro ◽  
Rui S. Cruz ◽  
Charalampos Z. Patrikakis ◽  
Nikolaos C. Papaoulakis ◽  
Carlos T. Calafate ◽  
...  

The Internet as a video distribution medium has seen a tremendous growth in recent years. Currently, the transmission of major live events and TV channels over the Internet can easily reach hundreds or millions of users trying to receive the same content using very distinct receiver terminals, placing both scalability and heterogeneity challenges to content and network providers. In private and well-managed Internet Protocol (IP) networks these types of distributions are supported by specially designed architectures, complemented with IP Multicast protocols and Quality of Service (QoS) solutions. However, the Best-Effort and Unicast nature of the Internet requires the introduction of a new set of protocols and related architectures to support the distribution of these contents. In the field of file and non-real time content distributions this has led to the creation and development of several Peer-to-Peer protocols that have experienced great success in recent years. This chapter presents the current research and developments in Peer-to-Peer video streaming over the Internet. A special focus is made on peer protocols, associated architectures and video coding techniques. The authors also review and describe current Peer-to-Peer streaming solutions.


2011 ◽  
pp. 1164-1181
Author(s):  
Marco Tortora

This chapter, recognizing that the main communication concepts are deeply geographical in their inner nature, has the intent of introducing an analysis of the connection there should be between geography, communication, organization and sustainability. The author will use the geography of information as the main framework to detect these links and to present the analysis of a regional communication infrastructure to understand how the Internet can be pivotal to communication and local development strategies. The analysis will present regional communication policies, projects and practices to understand if these are positive or negative forces for a regional sustainable development.


Author(s):  
Amin Ibrahim

The sexual exploitation of children remains a very serious problem and is rapidly increasing globally through the use of the Internet. This chapter focuses on the child pornography and IT, and the various methods to combat this problem. The ease of acquiring IT and digital equipments, the global reach of Internet and freely available peer-to-peer services have made child pornography a very complex issue to undertake. The borderless nature of the Internet and the lack of unified criminal code among nations further escalated the complexity of law enforcement against child pornography.


Author(s):  
Erkki Harjula ◽  
Jani Hautakorpi ◽  
Nicklas Beijar ◽  
Mika Ylianttila

Due to the increasing popularity of Peer-to-Peer (P2P) computing, the information technology industry and standardization organizations have started to direct their efforts on standardizing P2P algorithms and protocols. The Internet Engineering Task Force (IETF) has recently formed the Peer-to-Peer SIP (P2PSIP) working group for enabling serverless operation of Session Initiation Protocol (SIP). This chapter introduces the P2PSIP by presenting its background and purpose, operational principles, current status, and application areas. The focus is on the challenges and problem areas from the viewpoint of standardization and related research. The mobile- and heterogeneous environments are considered with special care. The authors provide a glance to the existing and emerging solutions that may be used in tackling the mentioned challenges and thus paving the way for successful deployment of P2PSIP in mobile environments.


Sign in / Sign up

Export Citation Format

Share Document