Browsing by Subject "peer-to-peer"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Addressing the Consensus Problem in Real-time Using Lightweight Middleware on Distributed Devices(2012-10-19) Hall, Keith AntonWith the advent of the modern technological age, a plethora of electronic tools and devices are available in numbers as never before. While beneficial and ex-ceedingly useful, these electronic devices require users to operate them. When designing systems capable of observing and acting upon an environment, the number of devices can become unmanageable. Previously, middleware sys-tems were designed for large-scale computational systems. However, by apply-ing similar concepts and distributing logic to autonomous agents residing on the devices, a new paradigm in distributed systems research on lightweight de-vices is conceivable. Therefore, this research focuses upon the development of a lightweight middleware that can reside on small devices enabling the capabil-ity for these devices to act autonomously. In this research, analyses determined the most advantageous methods for solving this problem. Defining a set of requirements for the necessary middle-ware as well as assumptions for the environment and system in which it would operate achieved a proper research focus. By utilizing concepts already in ex-istence such as peer-to-peer networking and distributed hash tables, devices in this system could communicate effectively and efficiently. Furthermore, creat-ing custom algorithms for communicating with other devices, and collaborating on task assignments achieved an approach to solving the consensus problem in real time. The resulting middleware solution allowed a demonstration to prove the effi-cacy. Using three devices capable of observing the environment and acting up-on it, two tests highlighted the capabilities of the consensus-finding mechanism as well as the ability of the devices to respond to changes in the environment autonomously.Item Covert Communication Networks(2013-08-02) Nix, Timothy GlenA covert communications network (CCN) is a connected, overlay peer-to-peer network used to support communications within a group in which the survival of the group depends on the confidentiality and anonymity of communications, on concealment of participation in the network to both other members of the group and external eavesdroppers, and finally on resilience against disconnection. In this dissertation, we describe the challenges and requirements for such a system. We consider the topologies of resilient covert communications networks that: (1) minimize the impact on the network in the event of a subverted node; and (2) maximize the connectivity of the survivor network with the removal of the subverted node and its closed neighborhood. We analyze the properties of resilient covert networks, propose measurements for determining the suitability of a topology for use in a covert communication network, and determine the properties of an optimal covert network topology. We analyze multiple topologies and identify two constructions that are capable of generating optimal topologies. We then extend these constructions to produce near-optimal topologies that can ?grow? as new nodes join the network. We also address protocols for membership management and routing. Finally, we describe the architecture of a prototype system for instantiating a CCN.Item Dynamic resource location in peer-to-peer networks(Texas A&M University, 2004-09-30) Nathuji, Ripal BabubhaiResource location is a necessary operation for computer applications. In large scale peer-to-peer systems, random search is a scalable approach for locating dynamic resources. Current peer-to-peer systems can be partitioned into those which rely upon the Internet for message routing and those which utilize an overlay network. These two approaches result in different connectivity topologies. This thesis analyzes the effect of topological differences on the effectiveness of random search. After demonstrating the benefits of an overlay network, we propose a hybrid approach for resource location. Our proposed protocol provides deterministic searching capabilities which can help prevent request failures for sensitive applications.