Science topic

Peer-To-Peer Networks - Science topic

Explore the latest questions and answers in Peer-To-Peer Networks, and find Peer-To-Peer Networks experts.
Questions related to Peer-To-Peer Networks
  • asked a question related to Peer-To-Peer Networks
Question
4 answers
Dear fellows,
with two of my coauthors, we are preparing a paper on P2P solutions to misuses and abuses of cryptocurrencies. I am wondering if you are aware of any model or paradigm? Best
Relevant answer
Answer
Dear Yashar,
Cryptocurrencies have become increasingly popular in recent years, but with this popularity come a number of misuses and abuses. Some of the major misuses and abuses of cryptocurrencies include:
  1. Money Laundering: Cryptocurrencies provide a level of anonymity, making them an attractive means of laundering money. Criminals can use them to transfer large amounts of money across borders with ease, making it difficult to track the source of the funds.
  2. Scams and Ponzi Schemes: Cryptocurrencies are often used to perpetuate scams and Ponzi schemes, as they allow for fast and easy transfers with no paper trail.
  3. Ransomware: Cryptocurrencies have been used as the preferred payment method for ransomware attacks, as they provide a way for the attacker to receive payment without the risk of the funds being traced back to them.
  4. Price Manipulation: Cryptocurrencies are still relatively new and their prices can be easily manipulated by large players with significant holdings.
  5. Illicit Activity: Cryptocurrencies have been used to facilitate illegal activities such as the sale of illegal drugs, weapons, and other illegal goods and services.
To mitigate these misuses and abuses, researchers and experts have proposed various P2P solutions, including the implementation of stricter regulations and increased transparency in the cryptocurrency markets, and the development of blockchain-based systems that can enhance transparency and accountability. Additionally, some have proposed the use of decentralized exchanges and multi-party computation to increase security and reduce the risk of fraud.
Best regards,
Mahmud Hasan
  • asked a question related to Peer-To-Peer Networks
Question
12 answers
On August 18, 2022, a blog post by Clarivate indicated that Publons has been fused into Web of Science (WoS): "Publons™ has joined the Web of Science™"
Access to the Publons website now redirects to a WoS page, so that:
is now
Clarivate claims that all information (and supposedly data) has been integrated into WoS, but is that true if the public can no longer access the "publons.com" URL?
I have some questions for debate:
1) Will the Publons URL cease to exist?
2) Will WoS introduce paid services or paid access to access what was previously freely and publicly available information at Publons?
3) How will Clarivate reward reviewers?
4) Will the Publons brand be phased out, including things like the Publons Academy, Publons Peer Reviewer Award, etc?
Relevant answer
Answer
You are right to worry, what I initially read at the time as a “nothing will change for you and things will only improve” turns out to be vastly different. They (Clarivate) follow the same pattern as Elsevier’s Scopus. The free version is well, nothing but a cut-down-to-the-bone version of the paid version:
-Only the first 10 ten publications can be viewed (in some detail), same happened with Scopus (ID)
-Additional features like author impact beam plot (whatever that may be) are hidden behind a paywall (premium version), a bit like the SciVal service that is only available with a Scopus license
In other words, indeed as you said, “introduce paid services or paid access to access what was previously freely and publicly available information at Publons”. It is matter of wait and see for how long and to what extent the Publon peer review system (what was basically their main objective) will remain unaltered. I’m not optimistic, ultimately Clarivate (like Elsevier) is ‘just’ a company and is not out there for the greater good but to make some money.
Best regards.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
  • Application / Services LayerSide Chain Smart contract Cryptocurrency Digital Copy
  • Blockchain Consensus LayerProof of Stake (PoS) Delegated Proof of Stake (DPoS) Proof of Work (PoW)
  • Data LayerData Storage Merkle tree Block
  • Network LayerCommunication Mechanism Peer-to-Peer (P2P) Network
Relevant answer
Answer
Dear Ahmed,
Following are my observations regarding the topics you proposed research on blockchain
(i) Application / Services Layer Side Chain Smart contract Cryptocurrency Digital Copy
It is quite easy to explore and implement the incremental research done in Application/Services layer. Tools/Frameworks are easily available for realizing the proposed solution in the research work.
(ii) Blockchain Consensus Layer Proof of Stake (PoS) Delegated Proof of Stake (DPoS) Proof of Work (PoW)
This is the most challenging blockchain layer to research upon. To implement and test the improvements one has proposed to consensus is quite difficult and requires lot of brain storming with experts in Distributed Systems and Computing. There are three options available to prove the consensus algorithm developed a) Open up existing blockchain Ethereum, Hyperledger and integrate new consensus and test (Not suggested) b) Go for Simulation environment(Highly Suggested) c) Develop blockchain from scratch with new consensus algorithm(Suggested). Research on consensus algorithm draws lot of time and energy. Besides this math knowledge on probability, graph theory and algorithm complexity computation are required for proofs you provide for consensus.
If you have more than 8 months time then go for consensus layer research.
(iii) Data Layer Data Storage Merkle tree Block
This layer is interesting to research as it deals with the cryptographic primitive like integrity and availability. Go for it you have basics on cryptography and number theory.
(iv) Network Layer Communication Mechanism Peer-to-Peer (P2P) Network
Here network layer follows under the category of distributed networks. Interesting topics for research how to build fault tolerant mechanisms, protocols for synchronous or asynchronous communication. Knowledge on queueing theory, finite state machines may be required. Simulations are the best way to prove the results in academic setup.
  • asked a question related to Peer-To-Peer Networks
Question
5 answers
I am looking for a network simulation tool for large scale structured P2P networks. I need to simulate Chord and Kademlia as a minimum and would like a GUI front end and graphical results output.
Most of the tools that I have found so far are very old, out of date, no longer available, completely undocumented and/or not functional due to version problems with Linux, Windows and Java.
I am currently using a very old version of Oversim / OMNet++
Thanks for any suggestions
Relevant answer
Answer
Dear James Hardy,
Here below is some additional info:
What is types of network simulation tools?
Different Network Simulations
  • Network Simulator version 2 (NS-2)
  • Ns3.
  • Netkit.
  • Marionnet.
  • JSIM (Java-based Simulation)
  • OPNET.
  • QualNet.
  • The open-source simulators are Marrionet, Netkit, NS2, JSIM.
What is network simulation software?
In network simulation, a software replica of the network, or 'network model', is used to analyze how different components of the network (network devices such as routers and access points, smart phones, radios, satellites, wireless channels, etc.)
The State of Peer-to-Peer Network Simulators ANIRBAN BASU, Tokai University and University of Sussex SIMON FLEMING, JAMES STANIER, STEPHEN NAICKEN, and IAN WAKEMAN, University of Sussex VIJAY K. GURBANI, Bell Laboratories, Alcatel-Lucent and Illinois Institute of Technology Networking research often relies on simulation in order to test and evaluate new ideas. An important requirement of this process is that results must be reproducible so that other researchers can replicate, validate, and extend existing work. We look at the landscape of simulators for research in peer-to-peer (P2P) networks by conducting a survey of a combined total of over 280 papers from before and after 2007 (the year of the last survey in this area), and comment on the large quantity of research using bespoke, closedsource simulators. We propose a set of criteria that P2P simulators should meet, and poll the P2P research community for their agreement. We aim to drive the community towards performing their experiments on simulators that allow for others to validate their results. Categories and Subject Descriptors: I.6.7 [Simulation and Modelling]: Simulation Support Systems General Terms: Design, Experimentation, Measurement, Performance, Standardization Additional Key Words and Phrases: Peer-to-peer, P2P, simulator evaluation, simulator usage ACM Reference Format: Basu, A., Fleming, S., Stanier, J., Naicken, S., Wakeman, I., and Gurbani, V. K. 2013. The state of peer-to-peer network simulators. ACM Comput. Surv. 45, 4, Article 46 (August 2013), 25 pages. DOI: http://dx.doi.org/10.1145/2501654.2501660 1. INTRODUCTION Peer-to-peer (P2P) is a distributed computer architecture that facilitates the direct exchange of information and services between individual nodes (called peers) rather than relying on a centralized server. In P2P networks, users (i.e., human beings) participate only through their representative agents, that is, software agents running on networked devices. P2P forms the basis of many distributed computer systems, permitting each peer node to act as both a client and a server, consuming services from other available peers while providing its own service to the rest of the network. Peers within a P2P network engage in direct exchanges with their known neighbors, in order to submit requests and serve responses. The definition of what specifically constitutes a P2P system is broad. For example, in theory, a P2P system is thought of as having no centralized authority, when in reality many existing P2P applications rely on one. For example, early versions of the Authors’ addresses: A. Basu, Rm. 1603, Tokai University, 2-3-23 Takanawa, Minato-ku, Tokyo 108-8619, Japan; S. Fleming (corresponding author), J. Stanier, S. Naicken, and I. Wakeman, School of Informatics, University of Sussex, Chichester Building, Falmer, Brighton BN1 9QJ, UK; email: Sf58@sussex.ac.uk; V. K. Gurbani, Bell Laboratories and Alcatel-Lucent, 1960 Lucent Lane, Rm. 9C-533 Naperville, IL 60566. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies show this notice on the first page or initial screen of a display along with the full citation. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works requires prior specific permission and/or a fee. Permissions may be requested from Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1 (212) 869-0481, or permissions@acm.org. c 2013 ACM 0360-0300/2013/08-ART46 $15.00 DOI: http://dx.doi.org/10.1145/2501654.2501660 ACM Computing Surveys, Vol. 45, No. 4, Article 46, Publication date: August 2013. 46:2 A. Basu et al. BitTorrent1 protocol required a “tracker” in order to rendezvous the peers and perform membership management of the swarm (a swarm is a collection of peers that are interested in distributing the same content). We find that the following definition by Risson and Moors [2006] is well-suited to classifying P2P systems: Peer-to-peer systems are distributed systems consisting of interconnected nodes able to self-organize into network topologies.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
Can we prove data analysis
in peer to peer computation system, you can analyze scientific data such as weather prediction using resources such as CPU storage and memory, is there an approach to prove computation power?
Relevant answer
Answer
you can refer to this
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
I am familiar with a fact that in P2P storage distributed systems reliability is provided with redundancy using erasure code or simple file replication. I am interested if there are some other techniques that I have not heard of. Thank you.
Relevant answer
Answer
Many researchers agree that file replication could be identify as erasure code with one redundant block.... but if we know how redudancy block is created and used for data reconstruction (recalculate) I can t agree with this . So basicly we could do simple file replication, we could split file and distribute this file blocks (as some RAID implementation) and erasure code (reed soloman is the most accsapted one). Any other approach to provideing file realibility that you know?
  • asked a question related to Peer-To-Peer Networks
  • asked a question related to Peer-To-Peer Networks
Question
4 answers
dApps use the web3.0 for the P2P network. does mobile devices support this ?
How efficiently can dApps be used on smart devices, like mobile phones
Relevant answer
Answer
Likitha Soorea ere is an article on dApps: Wei et al. (2018). "Decentralized Applications: The Blockchain-Empowered Software System". IEEE Access. 6: 53019–53033. doi:10.1109/ACCESS.2018.2870644
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
I am really confused now which simulation i can use to analyze.
Relevant answer
Answer
Arash Mostafavi Hello Sir
I appreciate your kind response, what know PVsyst is a system design software
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
I have researched for many years on P2P activities on the Internet. Many call this type of acativities Collaborative Economy, Sharing Economy or even Platform economy.
I beleive the P2P platforms show a particular case which is not covered by the reference and so valued theories of asymetric information and adverse choice.
I would like to write about this. Do you know any model which can inspire me for preparing a paper for the good ranked acadmeic journals?
Best
Relevant answer
Answer
This is the outline I recommend for a conceptual paper:
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
Is that correct?
Could you give a list of pros and cons when compared to a plethora of options?
For instance, IR-UWB is simpler (hardware mainly) than narrowband options, although it works with low data rates.
I know that the market has opted for Bluetooth as a viable business solution. But in the first decade of this century, there was a lot of research on IR-UWB, but then it cooled.
Relevant answer
Answer
when it comes to energy consumption in low powered embedded devices such as low end IoT devices the radio subsystem requires magnitudes of order more energy than other computational operations. For example, the crypto subsystem (which is usually considered computationally intensive) may consume pJ/bit while the radio for a typical WiFi may consume nJ/bit. So you can see the huge difference. So to reduce the energy consumption low range technologies such as BLE are preferred for these devices.
  • asked a question related to Peer-To-Peer Networks
Question
1 answer
P2P Networks reducing traffic any new technology or Idea?
Relevant answer
Answer
P2P is the communication mode, which is the branch of IoT, so according to my knowledge they can only share the information, data and communicate with other cars, regarding traffic congestion, traffic density. traffic congestion can only be overcome with Sustainable transport Modeling, such as to increase public transport mode share, encourage people to adopt push and pull concept and Launch TOD with mixed land use.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
I am trying to finish my project titled "The Improvement of Multi Layer Live Video Streaming in Peer to Peer Networks". unfortunately there is few researches in this area. To do so I need to run a software called: " ??? " to simulate the project outputs. I appreciate any kind of help including introducing resources, instructions, links, websites or cooperation to come up with the problem. any other advise is appreciated. thank you in advance.
Relevant answer
Answer
The Improvement of Multi Layer Live Video Streaming in Peer to Peer Networks" - In order to improve the video quality even for a lesser advantageous end user (namely, users with lower bandwidth speed/bit rates), we propose a new solution that combines the features of all the above solutions. Hence, we achieved the user-perceived video, without quality deterrent from media server by proposing a new Quality Preserving Multivariate Video Model (QPMVM) for heterogeneous peer group. The term “multivariate” in this work means usage of either multilayered video streams or multiversioned video streamsor integrated video streams for optimal solution tosatisfy heterogeneous users.
Multiversion systems encode a video sequence into several independent streams at different rates. This requires dropping of frames of the higher bit rates to satisfy the lower bit rates. Moreover it helps to store multiple versions of the same video file with different bit rate as per the user requirement. It also streams the particular bit rate versioned file of the same video to requester. Though it increases the storage cost, the quality provided is improved, and streaming latency is reduced. During transmission, the server switches among different versions to achieve the desired sending rate. Here, we have used multiple versions for providing better quality by storing minimal number of versions, which is as low as three versions permanently for the uploaded video by a client.
Multilayer systems encode a video sequence into several nonoverlapped, dependent streams. Multilayer systems work in par with the Scalable Video Encoding (SVC) with the difference that here the server provides input to the dropping of layers of frames on the fly to satisfy the requestor’s bit rate. This is necessary because the contributions of Fine Grained (FG) layers to the overall video quality are different which are handled by the server using the transcoder module of QPMVM. Quality Preserving Multivariate Video Model (QPMVM) -
As mentioned earlier both multiversioning and multilayering systems have both advantages as well as disadvantages. The choice depends on various factors that arise from the exact user profile details known to the server at the start of a streaming request. Moreover, the packet receiving details from the network side which are received at the server via probing the network to know about the congestion and slow delivery helps to analyze the reasons for congestion and delay. This challenge is addressed in this work by introducing the QPMVM at the server as one of the modules in order to manage the server by providing consistent throughput without overloading the server even during peak number of requests. the architecture of the proposed QPMVM model at the server. We do not make any assumption about the format of layered video. Any scalable or layered video coding scheme can be incorporated into our framework. This can work on lower-end codec such as MPEG-2, MPEG-4, MPEG-21 as well as higher end codec such as MPEG-4 Part 10/H.264 AVC (Advanced Video Coding). As H.264 SVC (Scalable Video Coding) is delay intense with respect to computational complexity than the other codec forms, this work is better off with H.264 AVC with single-base layer. Hence, in this work, we have considered all MPEG video formats with the intent that most of the videos used in the Internet fall into this category. QPMVM has the advantage of identifying through the seed estimator, a way of holding lesser number of multiple versions for a video which is encoded by the transcoder. From the stored multiversions, the multilayering is done on the fly through the Decider module.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
Could anyone help me finding related research papers regarding p2p lending industry especially the portal algorithms of different p2p portals such as prosper, lending club, zopa etc...
Relevant answer
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
Need a authentic data-set related to malicious peer in peer-to-peer network.
Where I can find it?
Relevant answer
Answer
Your question is not clear. Pl specify the purpose of the data.
  • asked a question related to Peer-To-Peer Networks
Question
2 answers
While number of P2P protocols have been developed in OverSim, is there any support for social overlay networks in same simulator?
I have gone through number of research papers of P2P technology using OverSim but didn't found anything related to social networks using oversim. I was trying to create social graph (normal graph in oversim). To make it a social network, I tried connecting edges by adding social interest. But i'm getting confused about how to apply P2P protocol such as chord (structured P2P) or Gia (unstructured P2P) to the social network created.
Relevant answer
Answer
Thank you very much sir for your reply.
Currently I'm working on two separate simulation for social overlay networks using OverSim tool. In my first simulation, I have used 8 churn generators, *.churnGenerator[0-7] of the following types ( 1 Lifetime Churn, 2 PareTo Churn and remaining 5 NoChurn):
**.churnGeneratorTypes = "oversim.common.NoChurn oversim.common.NoChurn oversim.common.LifetimeChurn oversim.common.ParetoChurn oversim.common.ParetoChurn oversim.common.NoChurn oversim.common.NoChurn oversim.common.NoChurn".
What I observed in simulation is that, network partitions simply gets increased on increasing number of churn generators.And it follows Chord ring structure (re.png attached below). However, there are not any social interest added to the peers. As you mentioned sir,
"The different churn generators simulate different user behaviour and can be configured individually" : Does this act similar to adding social behaviour to peer nodes?
In my second simulation, (image random.png below), i created file (.ned) for random topology with 1000 nodes and 1183 edges.And to make it social network, I'm trying to create separate files i.e. .cc, .h. In those files, I'm trying to create a compound module with various social interest and specifying user as submodule, as given below:
i.e. module social_interest_1
{//
}
module Social_interest_2
{//
}
network Network
{
submodules:
user0: social_interest_1;
user1: social_interest_2;
.
.
.
}
But in second simulation, random.png, the network is not using any overlay (application layer) protocol like chord.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
The peer-to-peer (P2P) is common architecture to share wide range of media on the Internet. P2P traffic represents about 50% of the total Internet traffic, subject to geographical location. The high volume of P2P traffic is due to file sharing, video streaming, on-line gaming. Dynamic increase in P2P traffic volume often causes poorer network performance and higher congestion rates, triggered by P2P high bandwidth demand.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
GBA is the seen to be the most secure architecture to perform authentication in cellular networks. What are the limitations of GBA or are there any know security threats imposed due the use of such an architecture in cellular authentication.
Relevant answer
Answer
Hi Munish,
We highlight in our paper the main limitation of GBA and propose a new method to overcome this limitation by adding another layer of authentication.
Regards,
Elie.
  • asked a question related to Peer-To-Peer Networks
Question
2 answers
In the real world, how is a node mapped to the position on the ring, I have the following questions -
  • Each nodes's IP address is hashed using SHA-1 hashing algorithm which will produce this hash - 73.128.154.69 hashed into 60CBFB98C9052A425D684A2C3D8D8D38424129A3
  • This should have been in the range of 0 to (2^m) - 1 where m is the number of bits
  • How should I convert this hashed value into a number
  • Will the IP address after leaving and re-joining the ring get the same placeholder position?
  • Are placeholders or node positions ordered numbers at all?
Relevant answer
Answer
Dear Shintu Joseph,
Enclosed two sources of literature describing the peer-to-peer system Chord. There you will find the answers to your questions.
The Chord P2P Network
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications
Best regards
Anatol Badach
  • asked a question related to Peer-To-Peer Networks
Question
11 answers
Dr. Shu-Hsiang "Ava" Chen and I are exploring the perceptions of international students about threaded discussions with peers in online and hybrid courses.
We are currently conducting survey responses (https://goo.gl/forms/KD97ID93LuPHrUjv2), though we are interested in anecdotal or more informal thoughts in this kind of forum in addition to any formal research or literature reviews conducted by others.
Thank you in advance for any formal or informal observations you might share.
Relevant answer
Dear Barbara:
As once an international student, I know that sometimes the online facilitators are not always attuned to the cultural norms of international students, especially their communication customs. As such, sometimes we may experience cultural insensitivity on this platform. For example, you may be told that there is no "z" in the word "organization" because local students use American English with an "s". These articles give more insight into the challenges that international students face in the classroom that can be helpful for you:
Best regards,
Debra
  • asked a question related to Peer-To-Peer Networks
Question
10 answers
How can we differentiate message-oriented protocols and stream-oriented protocols?
Explanation with examples would be highly appreciated.
Relevant answer
Answer
TCP is a stream oriented protocol and UDP is a message-oriented protocol.
TCP receives the stream of bytes from application layer protocols and divide it in to segments and pass it to IP. But UDP receives already divided or grouped bytes of data from application protocols and add UDP headers which will become datagram and send it to IP, then application layers has the burden of dividing the streams of data in to messages when they run on top of UDP .
  • asked a question related to Peer-To-Peer Networks
Question
6 answers
Dear Professors,
I have developed a new algorithm for P2P networks routing. And before I assume that it is a good one, I need first to simulate it then compare it to the existing ones.
While I was looking for a simulation tool for my algorithm, I found the Riverbed 17.5 Academic solution.
The problem is, I don't know how to implement the algorithm in Riverbed. I implemented a Peer-to-Peer file sharing application in it, but I am still not able to implement the algorithm.
Any help is welcome,
Kind regards,
Relevant answer
Answer
There are various learning videos on you-tube.Try to install commercial version to fully utilize opnet. 
  • asked a question related to Peer-To-Peer Networks
Question
28 answers
Kindly guide me about choosing best simulator for dynamic routing in Adhoc networks.
Can we use Opnet simulation for high level work?
Thanks
Relevant answer
Answer
NS2 is no longer used and active development stopped 7 years ago. So its best you use NS3 or NetSim or OPNET. And like you say you need to have lots of time and be very good at programming (in multiple languages) for Ns3.
  • asked a question related to Peer-To-Peer Networks
Question
4 answers
Blockchain is the world's leading software platform for digital assets. A blockchain  is a distributed database that is used to maintain a continuously growing list of records, called blocks. Each block contains a timestamp and a link to a previous block. A blockchain is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks.
Relevant answer
Answer
Security Starts with Network Architecture and Another security concern in the establishment of network architecture is how to treat uncommunicative or intermittently active nodes. Nodes may go offline for innocuous reasons, but the network must be structured to function (to obtain consensus on previously verified transactions and to correctly verify new transactions) without the offline nodes, and it must be able to quickly bring these nodes back up to speed if they return.
This is my reference link:
  • asked a question related to Peer-To-Peer Networks
Question
5 answers
I want to develop an auction based multi-agent communication among multiple processes. I am aware of multi-agent frameworks but my scenario is completely different so i am forced to develop my own. Here, I need your expert Advice. Which language will be best suited for this? Which mechanism do i follow for sending bids from bidder process to auctioneer and vice versa for winner bid? In here, How to enforce synchronization among processes because the whole system is supposed to be synchronized? Thanks in Advance for your Help
Relevant answer
Answer
JADE framework is best for multi agent communication. You can use multi agent communication API "Aglet" for multi agents in Mobile communication environment. A light weight API MadKit can also be used, please check at
  • asked a question related to Peer-To-Peer Networks
Question
5 answers
I am working on user-oriented, security-based service broker policies for Cloud/Fog computing environment. To let the user decide the required security level for the Datacentre that would be processing his/her request, we need to measure and quantize the security. Security being a multi-dimensional entity, including several aspects like confidentiality, integrity etc., is difficult to measure. I am looking for a tool/simulator that can provide a way for the same.
For example: Given a Datacentre that uses algorithm "A" for encryption, algorithm "B" for integrity check, algorithm "C" for authentication,...and so on. Is there any tool to rate the security strength of this Datacentre?
Relevant answer
Answer
 Respective tool or service for all Cloud Computing Field:
Cloud Application, Server and Network Security — Resources about tools and services used to protect applications, servers or networks facilitated by cloud computing.Dome9 — Resources about Dome 9, a solution that provides network security policy management and automation services for entire cloud environments, and a set of tools including visualization, firewall management, file integrity monitoring, dynamic access leases, configuration monitoring, and more.
Qualys — Resources about Qualys, a cloud security platform that offers a suite of compliance and IT security solutions such as asset discovery, network security, compliance monitoring, and more.
ZScaler — Resources about ZScaler, a cloud security platform built as a security stack enabling secure transformation to the cloud. Services include: advanced threat protection, branch transformation, mobile security, and more.
Netskope — Resources about Netskope, a cloud services company offering solutions such as a Cloud Access Security Broker (CASB), cloud malware and threat protection, cloud storage security, DLP, encryption, and more.
Akamai Cloud Security Solutions — Resources about Akamai Cloud Security Solutions, a set of tools aimed at protecting websites/applications from data theft and downtime, and at stopping major DDos and web application attacks. The solutions are build on the Akamai Intelligent Platform™ and include infrastructure and website protection.
Check Point Cloud Security — Resources about Check Point cloud security, a set of security services and solutions for the public and private cloud that can be easily extended to any cloud environment. Solutions include: threat protection, mobile security, endpoint security, next generation firewalls, and security management.
TripWire PureCloud Enterprise — Resources about TripWire PureCloud Enterprise, a cloud security platform that provides a solution to help discover and assess areas of a network that are hard to reach. The solution includes assurance for third parties, network perimeter scanning, and unified reporting.
Alert Logic Cloud Defender — Resources about Alert Logic Cloud Defender, a managed cloud security solution for IT infrastructure. The solution allows network/system/application security monitoring for the infrastructure, and offers centralized security management, threat detection, rapid deployment, and more.
BetterCloud — Resources about BetterCloud, a suite of cloud security solutions and tools for IT organizations. Solutions are built specificallty for SaaS applications and include: user lifecycle management, IT/security automation, data discovery, and more.
IBM Cloud Security Enforcer — Resources about IBM Cloud Security Enforcer, a SaaS cloud security solution designed to help organizations deploy new services on the cloud. The solution includes cloud discovery, Identity/access management, user analytics, and more.
iSheriff Cloud Security — Resources about iSheriff Cloud Security, a SaaS security platform offering web, endpoint, and email security solutions, including malware protection, data leakage prevention, archiving, multi-platform support, and compliance enforcement solutions.
Cisco Cloud Web Security — Resources about Cisco Cloud Web Security, a proxy-based cloud security solution for distributed enterprise organizations. The solution offers user protection and protection against web attacks using Cisco's threat intelligence and threat defense services.
Cloud Antivirus and Threats Prevention — Resources about cloud antivirus, a solution in which antivirus processes are conducted on cloud servers instead of a user's PC, and threat prevention, the practice of preventing systems (mainly in IT organizations) from being infected by viruses or protecting the systems from cyber attacks.McAfee Cloud Secure — Resources about MCAfee Cloud Secure, a set of security solutions that help organizations to move services to the cloud. These solutions allow the organization to use their security and access policies, without needing to adopt each vendor's practices. Solutions include: data protection, web security, database/data center security, and more.
Panda Cloud Security — Resources about Panda cloud security, an antivirus cloud-based solution for enterprise organizations. The solution offers endpoint protection, meaning all workstations (Windows/Mac/Linux) and all devices and systems are protected.
Cloud Identity and Access Management Tools — Resources about cloud identity and access management tools, which are tools used for facilitating the management of electronic identities.Centrify — Resources about Centrify, an identity platform that offers protection from compromised credentials scenarios and simple and secure access to cloud applications. Solutions include: Identity as a Service (IDaaS), cloud application user provisioning, identity service automation, and more.
SkyHigh Cloud Access Security — Resources about SkyHigh, a security platform for cloud services, offering a Cloud Access Security Broker (CASB). Solutions/features include: visibility into cloud usage and risk, threat protection, compliance enforcement, and data security.
Cloud Data and CDN Security Tools — Resources about cloud data and Content Delivery Network (CDN) security tools, which are tools used to protect data stored on cloud servers, and user-related data used for CDN functions (such as geolocation or content delivery server data).Proofpoint — Resources about Proofpoint, a security-as-a-service platform that uses technologies like machine learning and Big Data analytics to protect against cyber attacks. Additional solutions include: email security/encryption, data loss prevention, electronic discovery, and more.
Vaultive — Resources about Vaultive, a cloud security platform used to protect organizations' sensitive data that is offered as a software-as-a-service. Solutions include: cloud data security, data residency and industry compliance, and unauthorized disclosure protection.
CipherCloud — Resources about CipherCloud, a full-scale enterprise cloud security platform that offers a Cloud Access Security Broker (CASB) and solutions such as encryption, malware detection, key management, monitoring, and compliance.
Vormetric — Resources about Vormetric, a cloud/data security platform for the enterprise used for compliance and for streamlining migration to a cloud environment.
Intralinks — Resources about Intralinks, an enterprise collaboration software used to protect virtual data rooms and document sharing. Solutions include: SharePoint and ECM externalization, removable media and USB replacement, secure collaboration, and more.
MobileIron Cloud — Resources about MobileIron Cloud, a scalable cloud-based enterprise mobility management (EMM) solution that offers mobile application and device security. Features include a cloud-based management console, policy distribution, secure file access, and more.
SafeNet (Gemalto) — Resources about Gemalto SafeNet, a suite of cloud security solutions that allow organizations to control virtual environments and to perform cloud deployment securely. Solutions include: cloud/virtual data center migration, securing cloud-based applications, encryption, securing cryptographic keys, secure data transmission, and more.
CDNetworks — Resources about CDNetworks cloud security solutions, which offer website and application protection together with optimal performance. Solutions/features include: secure application access, cloud DDoS protection, regulatory compliance, and more.
Cloud Monitoring — Resources about cloud monitoring, a process that includes monitoring, management and review of workflows or processes of an IT asset or infrastructure that is cloud-based. Cloud monitoring aims to make sure that the relevant cloud platform is performing properly.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
Hi.I’m planning to investigate the robustness of complex network and read some papers about the subject.Then I find the definition of the robustness have different meanings after the paper, namely,controlliability of complex network published. I’m really looking to know how to define the robustness of complex network when talking about the cascade failure in your subject?
Relevant answer
Answer
Hi Li,
I would like to suggest the following reference:
Zio, E., 2016. Challenges in the vulnerability and risk analysis of critical infrastructures, Reliability Engineering and System Safety, 152: 137-150
 Moreover, I would like to recommend a few more references (see below).
Regards,
Dragan
ISO Guide 73 : Risk management — Vocabulary (2009)
Vulnerability
Intrinsic properties of something resulting in susceptibility to a risk source that can lead to an event with a consequence 
Resilience
Adaptive capacity of an organization in a complex and changing environment
Merriam-Webster dictionary defines resilience as “the ability to recover from or adjust easily to misfortune  or change”.
International Energy Agency (IEA)
Reference: “Making the energy sector more resilient to climate change”
Resilience of the energy sector refers to the capacity of the energy system or its components to cope with a hazardous event or trend, responding in ways that maintain their essential function, identity and structure while also maintaining the capacity for adaptation, learning and transformation.
Because climate change can create conditions that will negatively impact the energy sector, resilience becomes increasingly important.
The resilience “value chain” integrates robustness, resourcefulness and recovery.
Robustness: the ability of an energy system to withstand extreme weather events as well as gradual changes (e.g. sea level rise) and continue operating.
Resourcefulness: the ability to effectively manage operations during extreme weather events.
Recovery: the ability to restore operations to desired performance levels following a disruption.
Society for Risk Analysis (SRA):
Resilience  is the ability of the system to sustain or restore its basic functionality following a risk source or an event (even unknown), the sustainment of system operation and associated uncertainties, following a risk source or an event (even unknown)
Sandia National Laboratories, NISAC;
  • asked a question related to Peer-To-Peer Networks
Question
4 answers
Hi there.
Kindly require a multiagent simulator to simulate in wireless communication environment. Please recommend any. 
Thanks.
Relevant answer
Answer
Dear Anam,
I recommend MASON for you,that is is very good multi-agent simulation environment developed in Java.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
Hi everyone,
My interest is to develop an efficient mechanism to ensure exactly-once tuple processing guarantee. But to understand the domain well enough, I did not find much related resources over internet.
Please guide me about some resources (article, web links, tutorials etc)  to highlight significance and challenges related to Guaranteeing Message Processing for Real time data flows.
Thanks in anticipation
Relevant answer
Answer
The following PPT will give you details :-
Big Data Open Source Software and ProjectsABDS in Summary XIX: Layer 14B
Geoffrey Fox
gcf@indiana.edu           
School of Informatics and Computing
Digital Science Center
Indiana University Bloomington
  • asked a question related to Peer-To-Peer Networks
Question
4 answers
I've noticed a revival in papers that use clustering as part of the network design of a vehciular ad-hoc network. To me it seems intuitively obvious, both from a security and a network management perspective, that performing clustering is an expensive and risky task with unclear gains. I'm wondering whether there is any work that addresses this more general question, rather than trying to show the feasibility of a specific clustering scheme for a specific application. More specifically, I'd like to see some discussion on these questions to either confirm or revise my intuitive standpoint:
 - Is real-world traffic really stable enough to have clusters?
 - How significant is the overhead needed for cluster management compared to a simple broadcast network?
 - Is it really possible to design a clustering scheme that is secure against compromised cluster heads/leaders?
Relevant answer
Answer
That clustering survey compares different clustering algorithms. I'm somewhat familiar with those already -- I'm more interested in comparisons between clustering and non-clustering approaches. For most applications that I'm aware of, clustering is not necessary, potentially even detrimental (especially at cluster borders, if the spatial re-use is really used; similarly, it would be detrimental for security). Employing clustering without any gains, with its' inherent disadvantages, seems like a bad idea. Are the benefits for individual "edge case" applications (routing, perhaps also some forms of aggregation) really sufficient to warrant a complete re-work of the communication architecture? Or would clustering be deployed on top of existing applications in an overlay network style (and will that keep the benefits of clustering intact)?
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
Vickery auctions have a reputation for being a mechanism that is DSIC by ensuring the players are truthful. Are there any other mechanisms (especially in sequential move games with private information) which can ensure DSIC (which can make the players reveal their private information). I'm a bit new to this area. So a good reference would be helpful.  
Relevant answer
Answer
Thank you. The text was helpful.
  • asked a question related to Peer-To-Peer Networks
Question
4 answers
I see that in several documents, a DNS Amplification Attack might result in a UDP Fragmentation Attack. But in the case of an NTP Amplification Attack, I cannot find such a specific mention.
Relevant answer
Answer
Thank Albert for your answer having helpful resources,
As found in your first link (https://www.us-cert.gov/ncas/alerts/TA14-017A), NTP could be used for UDP-based amplification attacks. The article at https://www.us-cert.gov/ncas/alerts/TA14-013A explains that “the attack relies on the exploitation of the 'monlist' feature of NTP, as described in CVE-2013-5211, which is enabled by default on older NTP-capable devices. This command causes a list of the last 600 IP addresses which connected to the NTP server to be sent to the victim.”
But as you pointed out, I believe that the vulnerability came from not the protocol itself but its daemon implementation or the daemon's extended services/functions (http://support.ntp.org/bin/view/Main/SecurityNotice#April_2010_DRDoS_Amplification_A).
I also found that “While NTP accounted for 41% of the reflection sources, a limited number of these responded in a manner that makes the monlist query a viable amplification source. The number of NTP reflectors that met that criteria was less than the total for CHARGEN. This means while the number of NTP hosts used in attacks increased, the overall attack volume did not increase significantly since there was little-to-no amplification occurring from many NTP hosts” on pp. 38 in Akamai’s state of the internet / security Q4 2015 report.
So I could say that an NTP amplification attack resulting in UDP fragments might not be possible in practice because NTP daemons with the related vulnerability are rare.
Thank you again and have a great weekend!
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
i m making a p2p file transfer in xmlrpc server but it is unable to transfer heavy files for that i think to use simple http server to transfer file but don't know how to use http inside xmlrpc.
Relevant answer
Answer
XML-RPC works on top of HTTP, so you cannot use http inside XML-RPC.
What you could do: A make a file available on a WebServer (via HTTP), B makes an XML-RPC request to A to get the URL of the file, then B uses urllib to download the file using the URL it obtained through the XML-RPC.
Authentication and Confidentiality need to be handled on top of this. Furthermore you would need to implement Content-Range-Requests on the client side so you can split the download among servers.
Another way would be using libtorrent: https://stackoverflow.com/questions/5400828/how-to-write-a-simple-bittorrent-application or, if you you could build upon magic wormhole: https://github.com/warner/magic-wormhole
  • asked a question related to Peer-To-Peer Networks
Question
5 answers
Hi all,
We are doing a study about the time spent in the WebRTC signaling process.
If you want to help us, please, visit this web page (It will only take you a minute): http://experiments.p2psp.org/signalingprocess/
Thanks for your time!
Relevant answer
Answer
Hello Dr. Cristobal,
Connecting..., only and nothing appeared.
Regards and good luck.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
This is with regard to peer to peer communication in decentralized network.
I found the notes on this interaction trust value in the Paper named- Self Organizing Trust Model.. written by Ahmet B Can and Bharath Bhargava
Relevant answer
Answer
Please CMIIW. Did you mean to say that you'd like new peers to have higher chance of gaining trust from existing peers?
If that is the case, sure it is possible. However, you need to consider the risks. For example, malicious peers can leave the network and rejoin as new peers.
  • asked a question related to Peer-To-Peer Networks
Question
14 answers
More than half of world's population does not have reliable access to the Internet. At the same time, educational resources are more multimedia-based than ever (bandwidth) and often hosted on centralised cloud-based platforms requiring a good Internet connection.
Inability to use online education in underconnected regions is particularly prominent in the case of MOOCs, where some researchers argue it may lead to even further global digital divide.
Are you aware of research or cases of making online educational materials/courses (e.g. MOOCs) available in underconnected areas?
Relevant answer
Answer
Most of the MOOC application replied on the stable internet access, it was designed to retrieve, interact and digest in that way. I wonder if we consider the infrastructure limitation, this may closer to the traditional e-learning research with a medium that people can bring home and launch standalone.
This idea sounds a little bit old fashion, but it may provide an insight to re-invent the MOOC for internet limited region, or even more, a more localize style MOOC, when I read this news: https://www.theguardian.com/world/2014/dec/23/cuba-offline-internet-weekly-packet-external-hard-drives
This is the most vitality news to see how people interact with the information technology, in their own way. Sorry, not provide too many useful research resources, hope this helps to gain you some new ideas. :)
  • asked a question related to Peer-To-Peer Networks
Question
4 answers
In my PhD I am studying and simulating differente types of incentive mechanisms to assess peers' performance in a P2P community. 
I am focusing in the context of decentralized cloud federations and I've already performed some simulations but with hypothetical workloads.
I would like to use workloads from a real case scenario in order to see how would peers perform if they were using my proposed incentive mechanism for cooperation.
Relevant answer
Answer
I want cloud workloads with requests to VMs. The exact scenario is clouds that belongs to a cloud federation.
  • asked a question related to Peer-To-Peer Networks
Question
4 answers
Several techniques can be applied in Peer-to-Peer networks to handle the presence of malicious nodes (Reputation Systems, Accountability, Distributed Consensus, etc...).
Which one do you think has the best trade off between the capability to discriminate malicious nodes from honest ones, and the cost of the technique (in term of the number of messages for example). Obviously, knowing that none of the previous systems can fully decide (with a 100% accuracy) whether a node is malicious or not .
Relevant answer
Answer
In summary: for very very large p2p systems (file-sharing), I would go with a reputation system / shared history; for small ones, I would go with accounting, bilateral interactions (private history).
  • asked a question related to Peer-To-Peer Networks
Question
6 answers
I'm trying to simulate p2p video streaming to evaluate the scalability of a network
Relevant answer
Answer
There are various open source projects for video streaming over P2P network. For example, qsopcast: http://sourceforge.net/projects/qsopcast/ or peerstreamer: http://peerstreamer.org/ 
  • asked a question related to Peer-To-Peer Networks
Question
1 answer
The standard of IEEE 1588-2008 introduced P2P (peer to peer) mechanism to measure communication delay,what is the advance compared to request response mechanism in IEEE 1588-2002.
Relevant answer
Answer
This answers your question precisely. In short, the original mechanization, which uses four separate timestamps, does not require that each switch in the path be IEEE 1588 compliant. This same algorithm is used in NTP.
The peer to peer option's advantage is that it reduces the number of timestamps needed, but each switch has to be an IEEE 1588 switch. In this case, the switch already knows the delay introduced by the network.
Both options assume the delay in both directions is the same. In the peer to peer method, where there's only a single link involved, that assumption is fairly accurate!
One last comment I might have is that in order to achieve the nanosecond accuracies often touted for IEEE 1588, you cannot have many non-IEEE 1588 switches in the path. Even with the end to end scheme.
  • asked a question related to Peer-To-Peer Networks
Question
6 answers
Please I need a help in emergency,
I would like to ask if anyone has a benchmark, or workload data on Grid/Cloud or Peer to peer systems, or any client/server applications, to provide me with these data and to allow me to use them for academic purposes, to make some experiments on these data. 
Any help will be acknowledged, or even best, if some one is interesting by sharing the data in a collaboration form...
I will be very very grateful..
Regards.
Relevant answer
Answer
Thank you Joan Navarro, these are interesting benchmark generator, hoiwever I need a real benchmar or data set.
  • asked a question related to Peer-To-Peer Networks
Question
4 answers
In layman terms what is the difference? How is decentralised (as with Grokster ?) more advantageous than centralised (Napster) in relation to file sharing. I understand to an extent that the central index server plays a key part of this answer.
Relevant answer
Answer
Hi Anthony,
P2P is never "pure" centralized (represented by a traditional client-server architecture) - if you talk about centralized P2P approaches, it means hybrid systems, where several meta information about the data and peers are stored on multiple "centralized" / well-known server entities. These information sets may include parameters like the file availability, bandwitdth, IP-addresses, latency value, etc. The data transmission (for the payload) is still organized in a decentralized process, directly from peer to peer.
In a pure decentralized approach, the data exchange of these meta information has to be managed without such well-defined server systems. Accordingly, each communication handshake process between the peers incluses an information exchange these meta data. By finishing the handshake process, each peer has knowledge about its "neighborhood".
Kind regards,
Matthias
  • asked a question related to Peer-To-Peer Networks
Question
6 answers
There is some initial evidence from Millennials in the U.S. but would be interesting to know whether this is a trend that is structural in nature instead of a passing fad.
The initial evidence is the preference for sharing rather than owning, renting rather than buying etc.
The economic consequences of such a structural shift? For instance ownership tends to lead to commitment and therefore savings and investment. The abandonment of ownership for accessibility may change the preference structure as indicated by indifference maps?
Relevant answer
Answer
This has nothing to do with capatalism but with greed, which appears, alaas, to be nature for some of our species. Part of our kind just wants to own more then the people arround them. You can only own more if you have somekind of ownership (be it perminent or temperary) over goods your neigbour does not have.
But this is, again, not capatalism, it has also occured in socialism, pre-capatialist societies and then like. Societies were this greed has not occured are few if any.
"Unlimited greed for gain" writes Max Weber, "is not in the least identical with capitalism, and is still less its spirit. Capitalism may even be identical with the restraint, or at least a rational tempering, of this irrational impulse."
  • asked a question related to Peer-To-Peer Networks
Question
15 answers
I try to find some research papers for securing Peer to peer network, 
Thanks
Relevant answer
Answer
P2P is always tricky as SSL and other technologies might prove to be not fit for the task. May I offer you to have a look at "Trust in Peer-to-Peer content distribution protocols" by Kuntze, Rudolph and Fuchs as well as "Reliable Identities using off-the-shelf hardware security in MANETs" by Kuntze and Rudolph. I have also some more publications on the MANET topic and also BitTorrent extension. Let me know if that is a direction fit for you.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
Is there any available works on cloud resource discovery that use an hybrid architecture, specially master-slave or super-peer architectures?
I mean, is this a feasible idea since the network performance and resource
availability can be the tightest bottleneck for any cloud.
In fact I need some references on this subject.
Relevant answer
Answer
As I understand the concept of super-peer architecture, it is completely feasible. I did work with resource assignment in cloud-computing and the concept I manage to complete this idea was using routing tables. Instead of having routes you can add resources to your tables and keep them updated.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
Thanks in advance for your replies.
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
I want to simulate Peer to Peer Network architecture (Node >500) in Qualnet Simulator. I did the simulation but now I have to analysis the result. So anyone can suggest what parameter should I consider for better results? Thanks in advance.
Relevant answer
Answer
Hi, I also had an experience conducted on P2P simulation based on QualNet simulator. Actually, I have no idea what you gonna see and analyze. So, depending on your stressed proposal points, it could be varied. FYI, I'd suggest you check my former following publication as proposed for a real-time P2P scheme, based on QualNet simulator.
  • asked a question related to Peer-To-Peer Networks
Question
10 answers
I want to know which one is more suitable for peer to peer network, so I can get more feasible results. Thanks in advance
Relevant answer
Answer
If you want to tests P2P applications i would suggest PeerSim which provides a lot of features, and implements various P2P protocols.
  • asked a question related to Peer-To-Peer Networks
Question
8 answers
I want to simulate VOIP over P2P in Integrated WiFi/WiMAX network in OPNET Modeler. What is the procedure of setting P2P application in an application profile and what things I have to consider?
Relevant answer
Answer
In OPNET you have pre-defined voice application. Please take a look at the page 22 of the attached report.
  • asked a question related to Peer-To-Peer Networks
Question
1 answer
The simulator should have the capability to integrate both technologies.
Relevant answer
Answer
I think Peersim is a well-known good candidate: http://peersim.sourceforge.net/
You can have a look to the Aggregation package.
  • asked a question related to Peer-To-Peer Networks
Question
4 answers
Energy consumption in p2p.
Relevant answer
Answer
I think that this is ea very difficult task in P2P networks. The first problem is that at the contrary of clusters or grids, the nodes are very heterogeneous in P2P systems. Computing the sum of the energy consumed on each node is theoretically possible but practically unfeasible as it would requires to go through all the nodes to get the results, which is impossible in a real system as it requires a kind of flooding algorithm that has a very high cost.
I think it would require to make a statistical study of the consumption with a significant set of nodes, and extrapolate the results to the whole system. The way to do this will be very different if we considered a unstructured network like Gnutella, or a structured one like Pastry, Chord or Kademlia. In any case, this will be an estimation, and not an exact computation.
The goo questions are then:
- How to build a significant set of nodes?
- Does this set really represent the load of the system?
- What processes on this nodes are related to the P2P application, and which are not?
And there are much more...
  • asked a question related to Peer-To-Peer Networks
Question
4 answers
Peer-to-peer systems often adopt decentralized organization, and each client serves as a server as well. Can we say all nodes play equal roles from a system that is decentralized? Or can we say a system is decentralized if all nodes work as a server?
Please explain the differences and give me some examples. It would be better if the example is a system in the real world.
Relevant answer
Answer
I think it hardly depends on what we think about when we talk about decentralization. You can decentralize some role and give some specific task to a set fo servers in a distributed system, compared to a fully centralized solutions. This is a kind of decentralization. P2P systems are more than this. They are of course decentralized, but none of the node should have a specific role. They are self-organized, and do not require central administration.
So to my point of view, P2P does not have the same meaning than decentralization, it includes decentralization, but it is more than that.
  • asked a question related to Peer-To-Peer Networks
Question
5 answers
For writing review paper data is not currently available.
Relevant answer
Answer
That time formal ( key availability of related research papers
  • asked a question related to Peer-To-Peer Networks
Question
3 answers
I am not getting the exact location(i.e. Class) in CloudSim for VM Migration policy
Relevant answer
Answer
VM migrations are triggered inside the data center, by an internal data center event. Therefore, triggering a migration means receiving and processing a VM_MIGRATION event:
send(this.getId(),delay,CloudSimTags.VM_MIGRATE,vm);
The delay field contains the estimated migration completion time. Therefore, when using it, the method that starts the migration process has to provide estimated completion time. After the delay, the event is received by the data center, which is interpreted as migration completed: therefore, from this time on the VM is available in the destination host.
  • asked a question related to Peer-To-Peer Networks
Question
36 answers
Wikipedia, formally launched on January 15, 2001, is a collaboratively edited, multilingual, free Internet encyclopedia that contains over 30 million articles written in 287 languages written by volunteers around the world.
Given its wealth of information, has Wikipedia become an acceptable source of information to be used in Research & Development?
Relevant answer
Answer
Dear all,
Kamal is right, we had a long and significant discussion in an earlier thread.
My answer is as well "no", but I like wikepedia and I´m promoting member of it.
  • asked a question related to Peer-To-Peer Networks
Question
1 answer
I run BitTorrent over Peersim simulator.
Relevant answer
Answer
This is a difficult question. Usually, the energy consumption is directly related to the CPU load and I/O load (especially hard disk accesses). It is difficult to simulated all this in Peersim, but you can try to evaluate the participation of each node your simulating in order to have a simple model of the load of each node, and therefore be able to make an estimation of the global load.
Its obviously very difficult to have an estimation of the energy consumption in a real world, as it is hardly depends on the type of host that are particiatng in the network (CPU, disks, etc...).
Regards
  • asked a question related to Peer-To-Peer Networks
Question
19 answers
A botnet is a collection of Internet-connected programs communicating with other similar programs in order to perform tasks. This can be as mundane as keeping control of an Internet Relay Chat (IRC) channel, or it could be used to send spam email or participate in distributed denial-of-service attacks. The word botnet is a portmanteau of robot and network.
Relevant answer
Answer
In a network using a hub you will be able to see all the traffic being send to every machine connected to the hub, in a switched network - only traffic to and from your PC
  • asked a question related to Peer-To-Peer Networks
Question
7 answers
some peer to peer networks/protocols such as Tor, Torrent address application of anonymity and storage in an infrastructureless and distributed framework. However I wonder if such a P2P network/protocol is available for distributed cloud computing such that people share their computer processing power ( CPU and/or GPU) to let other people enjoy parallel and distributed processing?
Relevant answer
Answer
Yes. People may share their computer processing power (CPU or GPU) to let other people enjoy parallel and distributed processing. Around ten years back, such a technique had a fancy name called Grid Computing. It was the task Grid Middleware such as Globus, gLite, UNICORE, etc. Examples of fastest virtual super computers are Folding, Bonic, etc.
I suggest to have a look at the following link at wikipedia. http://en.wikipedia.org/wiki/Grid_computing
Similar kinds of things are possible in case of P2P networks or protocols applied to distributed cloud computing.
  • asked a question related to Peer-To-Peer Networks
Question
5 answers
I want to implement network coding for p2p network but facing problem in interfacing of opnet with matlab. Is there any solution? Can I implement network coding through opnet without any interfacing with matlab? Is it possible with omnet++ also?
Relevant answer
Answer
why dont you implement all you NC for P2P network just in matlab and m file? what has motivated you to look for opnet or any DES in conjucation with matlan?
  • asked a question related to Peer-To-Peer Networks
Question
2 answers
BitTorrent is classified as unstructured P2P network. How it could be implemented over structured P2P network? Can DHT be used in other unstructured P2P?
Relevant answer
Answer
There are many ways to implement a p2p network structured, unstructured or hybrid. In structured architecture there are logfiles or nada(nano data centers) or supernodes generally and all these in order to know where to find the information. In DHT plan there is a key and a value pair hushed together. Hashing info must have the information e.x. query, response, error. Query belongs ping, find node, get peers, announce peer. The ID may contain information as 12304 that means the 123 piece of 4th block.
  • asked a question related to Peer-To-Peer Networks
Question
6 answers
Wikipedia article about Peer-to-Peer computing says - "Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or work loads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes."
While Wikipedia article for Multi-agent systems says- "A multi-agent system (M.A.S.) is a computerized system composed of multiple interacting intelligent agents within an environment. Multi-agent systems can be used to solve problems that are difficult or impossible for an individual agent or a monolithic system to solve. Intelligence may include some methodic, functional, procedural or algorithmic search, find and processing approach."
Although having difference in definition, both architectures involve cooperation between distributed entities.
How does one define the suitability of having a P2P system based architecture or a MAS architecture for a research problem?
Relevant answer
Answer
I agree witj Ingo Timm. P2P could be used as an environment infrastructure for MAS such as a lower level of communication and support life. The agents could be developed as peer entities in this environment and, with a reasonable use of clustering development, its possible to deliver some low levels agent tasks for P2P platform and focusing agents on more intelligent issues.
  • asked a question related to Peer-To-Peer Networks
Question
11 answers
At this time, Peer-to-Peer has always be considered as a synonym of piracy by the industry. Do you think this can change in a near future?
Relevant answer
Answer
I think the answer to this really depends on the industry you're talking to. If you speak to the media industry, I think this will remain for quite some time (either in positive or negative sense). However, if you speak to industries that work with distributed applications or web applications, I don't think this synonym exists anymore. There are a lot of success-stories where applying P2P technologies has provided added value, such as Blizzard (World of Warcraft updates) and Microsoft (which recently bought skype). In addition, projects like BOINC (seti@home, folding@home, etc) have been quite successful. Finally, although I have no citation, I expect that people working at organizations like Facebook and Twitter also owe a lot to distributed and peer-to-peer technologies too.
  • asked a question related to Peer-To-Peer Networks
Question
1 answer
what is type of incentives mechanism in Bittorrent networks?
Relevant answer
Answer
Basically, the more a user gives to the system, the more he receives. Concretly, the best upload rate you have the best download rate you will get. This incentives the users to give resources to the system, typically bandwidth to upload. This makes, in addition with the idea of trying to first upload the less available part of a file to increase its availability, a powerful incentive mechanism.
However, when a user gets the entire file and becomes a seeder, he does not have any incitations to be still a good uploader. This may be a major problem, as the presence of seeders is essential for Bitorrent to have good performance.
You may have a look to the following link.