Expression #1 of SELECT list is not in GROUP BY clause and contains nonaggregated column 'n.id' which is not functionally dependent on columns in GROUP BY clause; this is incompatible with sql_mode=only_full_group_by
Expression #1 of SELECT list is not in GROUP BY clause and contains nonaggregated column 'n.id' which is not functionally dependent on columns in GROUP BY clause; this is incompatible with sql_mode=only_full_group_by EFFICIENT LOOKUP WITHIN SCALABLE UBIQUITOUS COMPUTING NETWORKS (eng.) - İTP Jurnalı
AZERBAIJAN NATIONAL ACADEMY OF SCIENCES
EFFICIENT LOOKUP WITHIN SCALABLE UBIQUITOUS COMPUTING NETWORKS (eng.)
Behnam B. Bazli, David Llewellyn-Jones, Madjid M. Merabti

Traditional client-server arrangements within centralized systems using low-level protocols have now been replaced by mobile hosts and dynamic protocols over ubiquitous decentralized systems. Rising costs of data traffic and the need for efficient communication and improved management of systems has created a pressure to roll-out efficient and effective communication methods and address dynamic change of members and resources within ubiquitous P2P networks.  This work uses novel allocation and smart lookup technique to initiate efficient routing based on the global availability of the destination node state. Considering the high cost of failed queries within scalable networks, this will improve network efficiency and reduce latency. (pp. 10-20)

Keywords:Ubiquitous Computing, Scalability; P2P, Overlay Networks, Security, lookup
References
  • Li Y., Tian C., Diggavi S., Chiang M., Calderbank A. Network resource allocation for competing multiple description transmissions // IEEE Trans. Commun., vol. 58, no. 5, pp. 1493–1504, May 2010.
  • Papers R., Meng J. Paper Communications and Networking, vol. 2, no. 1, 2008.
  • Panda G. K., Tripathy B. K., Jha S. K., Security Aspects in Mobile Cloud Social Network Services, Int. J., vol. 2, no. 1, 2011.
  • Dixon C., Uppal H., Brajkovic V., Brandon D. ETTM : A Scalable Fault Tolerant Network Manager, Network.
  • Greenberg B. A., Hamilton J. R., Kandula S., Kim C., Lahiri P., Maltz A., Patel P., Sengupta S. VL2 : A Scalable and Flexible Data Center Network, Access Yournal vol. 09, pp. 95–104, 2009.
  • Edwards W.K., Grinter R. E. At Home with Ubiquitous Computing : Seven Challenges 2 The Seven Challenges, Seven., year.
  • Wei T., Wang C.-H., Chu Y.-H., Chang R.-I. A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services // Int. J. Digit. Multimed. Broadcast., vol. 2012, no. i, pp. 1–12.
  • Chung Y. Distributed denial of service is a scalability problem // ACM SIGCOMM Comput. Commun. Rev., 2012, vol. 42, no. 1, p. 69, Jan.
  • Nguyen D. T., Nguyen B. L., Vu D. L. Improving Freenet’s Performance by Adaptive Clustering Cache Replacement / 2009 IEEE-RIVF Int. Conf. Comput. Commun. Technol., 2009, pp. 1–7.
  • Rasti A. H., Stutzbach D., Rejaie R. On the Long-term Evolution of the Two-Tier Gnutella Overlay / Proc. 25TH IEEE Int. Conf. Comput. Commun., 2006, pp. 1–6.
  • Ritter J. Why Gnutella Can’t Scale. No, Really, 2001, 13 p., http://www.cs.rice.edu
  • Sen S., Wang J. Analyzing Peer-To-Peer Traffic Yournal, vol. 12, no. 2, pp. 219–232, 2004.
  • Rowstron A., Druschel P. Pastry : Scalable, distributed object location and routing for large-scale peer-to-peer systems / Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, London, Springer-Verlag, 2001, pp. 329-350.
  • Stoica I., Morris R., Liben-Nowell D., Karger D. R., Kaashoek M. F., Dabek F., Balakrishnan H. Chord: a scalable peer-to-peer lookup protocol for internet applications // IEEE/ACM Trans. Netw., Feb. 2003, vol. 11, no. 1, pp. 17–32.
  • Kempf J., Pierre R. St., Pierre P. St. Service Location Protocol for Enterprise Networks: Implementing and Deploying a Dynamic Service Finder. John Wiley & Sons, year.