scholarly journals Peer-To-Peer Multimedia And Information Sharing In Social Networking Web Sites

Author(s):  
Shahin Talaei

This thesis examines the performance for multimedia distribution and information sharing of social-networking web sites, with a focus on user networks in Facebook. We used real user network data from Facebook together with a synthetic Facebook network in the performance-testing experiments. We tested performance for multimedia distribution and information sharing using three different types of overlay networks: Facebook; structured peer-to-peer (ring topology); and unstructured peer-to-peer (mesh topology). The experiments used Network Simulator 2 (Ns-2) to simulate the network topologies. The results show that structured Peer-to-Peer has the best performance in terms of information transfer, and Facebook has the best performance in regards to average throughput. This thesis shows the strengths and weaknesses of online social networking while sharing information and multimedia content.

2021 ◽  
Author(s):  
Shahin Talaei

This thesis examines the performance for multimedia distribution and information sharing of social-networking web sites, with a focus on user networks in Facebook. We used real user network data from Facebook together with a synthetic Facebook network in the performance-testing experiments. We tested performance for multimedia distribution and information sharing using three different types of overlay networks: Facebook; structured peer-to-peer (ring topology); and unstructured peer-to-peer (mesh topology). The experiments used Network Simulator 2 (Ns-2) to simulate the network topologies. The results show that structured Peer-to-Peer has the best performance in terms of information transfer, and Facebook has the best performance in regards to average throughput. This thesis shows the strengths and weaknesses of online social networking while sharing information and multimedia content.


Author(s):  
Bart De Vleeschauwer ◽  
Filip De Turck ◽  
Bart Dhoedt ◽  
Piet Demeester

This chapter discusses the use of peer-to-peer overlay networks to route around failures and congestion points in the Internet. The motivation for this type of overlay network is that often the network layer takes considerable time to react to link failure and is typically not capable of avoiding congestion. For instance, it has been reported that link failure may take the BGP system more than fifteen minutes to react. As a result, the services going over these links suffer from lost connectivity or severe quality degradation in the case of congestion. One technique to solve this problem is to use overlay routing techniques to detect these problems and to route around the problematic link(s). In this chapter we elaborate on the overall architecture of such a system. The concept is introduced and the architecture and implementation of prototype components implementing the behavior is discussed. Subsequently it is described how the overlay topology can be managed dynamically to achieve the same performance as a full mesh topology with a number of overlay edges that scales linearly with the number of nodes in the network.


2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


2021 ◽  
pp. 002218562110319
Author(s):  
Michael Walker

E-voice is now a common form of worker voice. Existing scholarship has focused on e-voice’s potential for grievance-airing and resistance; however, much work-oriented online discussion is not change oriented but more in the nature of information sharing and mutual aid. Even when not deliberately intended to be, mutual aid discussion can be an exercise of worker voice because it identifies and highlights pain points in the workplace, spreads awareness of these through online communities and constitutes an attempt to improve an objectionable state of affairs. As otherwise voiceless workers discover and act on these shared ideas en masse, they create an emergent form of collective action.


2009 ◽  
Vol 13 (1) ◽  
pp. 2156759X0901300
Author(s):  
Sheri Bauman ◽  
Tanisha Tatum

Traffic on Web sites for young children (ages 3-12) has increased exponentially in recent years. Advocates proclaim that they are safe introductions to the Internet and online social networking and teach essential 21st-century skills. Critics note developmental concerns. In this article, we provide basic information about Web sites for young children, discuss developmental issues, and make recommendations for school counselors to be proactive and aware of the advantages and dangers inherent in these sites.


Sign in / Sign up

Export Citation Format

Share Document