Peer-to-Peer Corporate Resource Sharing and Distribution with Mesh

Author(s):  
Ramesh Subramanian ◽  
Brian Goodman

Peer-to-peer (or “P2P”) computing has aggressively moved to the center-stage of the computing field in recent years. “P2P computing” emphasizes the shift away from centralized and client/server models of computing to a fully decentralized, distributed model of computing and content distribution. In the P2P mode of thinking, a “peer” system can be almost any computing device connected to a network – whether it is a computer, a printer, a facsimile machine, a video camera or an e-mail server. This idea has great ramifications in the way people work, learn, collaborate and share resources in organizations. In this chapter we present the design and architecture of Mesh, which is a centrally enhanced peer-to-peer resource sharing grid. Mesh is a prototype hybrid resource sharing system. It encompasses and advances the currently available solutions in the areas of “pure” P2P computing. The chapter describes a complete implementation of Mesh with directions for future work.

2021 ◽  
Vol 21 (4) ◽  
pp. 1-22
Author(s):  
Ismaeel Al Ridhawi ◽  
Moayad Aloqaily ◽  
Yaser Jararweh

The rise of fast communication media both at the core and at the edge has resulted in unprecedented numbers of sophisticated and intelligent wireless IoT devices. Tactile Internet has enabled the interaction between humans and machines within their environment to achieve revolutionized solutions both on the move and in real-time. Many applications such as intelligent autonomous self-driving, smart agriculture and industrial solutions, and self-learning multimedia content filtering and sharing have become attainable through cooperative, distributed, and decentralized systems, namely, volunteer computing. This article introduces a blockchain-enabled resource sharing and service composition solution through volunteer computing. Device resource, computing, and intelligence capabilities are advertised in the environment to be made discoverable and available for sharing with the aid of blockchain technology. Incentives in the form of on-demand service availability are given to resource and service providers to ensure fair and balanced cooperative resource usage. Blockchains are formed whenever a service request is initiated with the aid of fog and mobile edge computing (MEC) devices to ensure secure communication and service delivery for the participants. Using both volunteer computing techniques and tactile internet architectures, we devise a fast and reliable service provisioning framework that relies on a reinforcement learning technique. Simulation results show that the proposed solution can achieve high reward distribution, increased number of blockchain formations, reduced delays, and balanced resource usage among participants, under the premise of high IoT device availability.


2020 ◽  
Vol 10 (1) ◽  
pp. 8
Author(s):  
Sultan Alamri

In many developing cities, the improvement of transport infrastructure is usually accompanied by major road construction and maintenance. This paper presents approaches and opportunities using peer-to-peer updating to improve spatial road networks undergoing construction and maintenance, which in turn will improve traffic flow and benefit cities overall. In many cities, the spatial road network requires maintenance, and these works often require traffic detours. With the current GPS (Global Positioning System) services, there is a noticeable delay in the updating of many spatial road networks. Thus, when a driver plans a trip to a certain location (such as Starbucks), his/her usual route may have changed, but the spatial road network in the GPS has not been updated. This can affect the user in many ways. For example, a trip that usually takes five minutes might now take half an hour, taking into account the additional time required to find alternative roads and possibly encountering more unexpected road closures, until the driver reaches his/her destination. This paper addresses this issue by proposing solutions that offer several advantages including a new peer-to-peer updating mechanism that helps to direct the driver to another route when road changes occur. Moreover, the peer-to-peer updating mechanism can enable the independent monitoring of road conditions and the updating of maps for newly-constructed roads, as well as the analysis of road congestions, traffic density, and people movements at certain times. Note that this work focuses on the conceptual ideas and approaches intended to improve independent maps, and the detailed algorithms have been left for future work.


2021 ◽  
pp. 8-17
Author(s):  
Amer Ramadan ◽  

This paper reports on an in-depth examination of the impact of the backing filesystems to Docker performance in the context of Linux container-based virtualization. The experimental design was a 3x3x4 arrangement, i.e., we considered three different numbers of Docker containers, three filesystems (Ext4, XFS and Btrfs), and four application workloads related to Web server I/O activity, e-mail server I/O activity, file server I/O activity and random file access I/O activity, respectively. The experimental results indicate that Ext4 is the most optimal filesystem, among the considered filesystems, for the considered experimental settings. In addition, the XFS filesystem is not suitable for workloads that are dominated by synchronous random write components (e.g., characteristical for mail workload), while the Btrfs filesystem is not suitable for workloads dominated by random write and sequential write components (e.g., file server workload).


E-mail system is one of the critical infrastructures of any organization. It is necessary to ensure that the mail servers in use should be secured in such a way that no security properties like confidentiality, integrity, and authenticity are compromised. To achieve these security properties we have setup a secure e-mail server testbed that provides security against malware and spam, and guaranties secure e-mail delivery. This paper proposes a secure methodology for filtering spam and malware in the e-mail system, comprising standard layers of protocols and policies. An experimental testbed is established to evaluate the effectiveness of our methodology and was tested with spam and malware e-mails. Our results showed an accuracy of 95 percent, against a typical configuration of an e-mail system.


2011 ◽  
pp. 278-295
Author(s):  
Irwin Boutboul ◽  
Dikran S. Meliksetian

n this chapter, we propose a new approach for content delivery services by meshing together the best of grid computing and peer-to-peer (P2P) computing. The goal is to design a secure, reliable, and scalable system for efficient and fast delivery of content. The system consists of a combination of nondedicated servers and peers to provide the proposed service. We describe the challenges of designing such a system and discuss possible solutions and trade-offs. We detail the necessary interlacing of grid and P2P feature to achieve the goal. We present a prototype that is built based on the proposed approach.


2011 ◽  
pp. 265-277
Author(s):  
Xin Li ◽  
Aryya Gangopadhyay

This chapter introduces applications of Web services in bioinformatics as a specialized application of peer-to-peer (P2P) computing. It explains the relationship between P2P and applications of Web service in bioinformatics, states some problems faced in current bioinformatics tools, and describes the mechanism of Web services framework. It then argues that Web services framework can help to address those problems, and gives a methodology to solve the problems in terms of composition, integration, automation, and discovery.


2020 ◽  
Vol 10 (1) ◽  
pp. 25-32
Author(s):  
Harun Mukhtar ◽  
Daniel Adi Putra Sitorus ◽  
Yulia Fatma

Mail server is one of the most widely used server functions in the company. This discusses e-mail itself which can reduce mailing costs, is more efficient than manual communication and can be used as attachments that are useful as a supplement and additional documents related to the contents of e-mail. Zimbra is a mail server application that provides complete features and also makes it easy to install mail server management, also mail server security issues are a factor that must be considered by the system administrator. The security design for e-mail servers addresses the importance of being able to prevent spam e-mail attacks that can fill e-mail servers and make mail server performance faster. Because a good mail server security can optimize the performance of the mail server itself. In this final project, the work and implementation of the zimbra mail server security will be carried out specifically for handling email spam. The zimbra email server will analyze its security against spam email attacks, so that it can function as an email server on the company.


Author(s):  
Indranil Bose

Phishing is a new form of online crime where the unsuspecting user is tricked into revealing his/her personal information. It is usually conducted using social engineering or technical deceit–based methods. The various ways in which phishing can take place are described in this chapter. This is followed by a description of key strategies that can be adopted for protection of end users and organizations. The end user protection strategies include desktop protection agents, password management tools, secure e-mail, simple and trusted browser setting, and digital signature. Among corporate protection strategies are such measures as e-mail personalization, mail server authentication, monitoring transaction logs, detecting unusual downloading activities, token based and multifactor authentication, domain monitoring, and Web poisoning. Some of the commercially available and popular anti-phishing products are also described in this chapter.


Author(s):  
S. H. Kwok ◽  
Y. M. Cheung ◽  
K. Y. Chan

A recent survey revealed that 18 millions American Internet users, or approximately 14% of total American Internet population have peer-to-peer (P2P) file-sharing applications running on their computers (Rainie & Madden, 2004). Not surprisingly, P2P applications have become common tools for information sharing and distribution since the appearance of Napster (Napster, 2003) in 1999. P2P systems are the distributed systems in which all nodes are equal in terms of functionality and able to directly communicate with each other without the coordination of a powerful server. Anonymity, scalability, fault resilience, decentralization and self-organization are the distinct characteristics of P2P computing (Milojicic et al., 2002) compared with the traditional client-server computing. P2P computing is believed to be capable of overcoming limitations of the computing environment placed by the client-server computing model. Milojicic et al. (2002), for example, suggested that P2P computing is capable of providing improved scalability by eliminating the limiting factor, the centralized server existing in the client-server computing. In the past few years, P2P computing and its promised characteristics have caught the attention of researchers who have studied the existing P2P networks, and the advantages and disadvantage of P2P systems. Important findings include the excessive network traffic caused by flooding-based searching mechanism that must be tackled in order to fully utilize the improved scalability of P2P systems (Matei, Iamnitchi, & Foster, 2002; Portmann & Seneviratne, 2002). There were proposed efficient searching techniques targeted for both structured and unstructured P2P systems. Other research projects were conducted to study, and were intended to complement, the drawbacks brought by distinct characteristics of P2P systems. For example, the P2P users’ free-riding behavior is generally attributed to the anonymity of such form of communication (Adar & Huberman, 2000). Recent research projects have shifted to a new line of investigation of P2P networks from the economic perspective and applications of P2P systems in workplaces (Kwok & Gao, 2004; Tiwana, 2003).


Sign in / Sign up

Export Citation Format

Share Document