Araştırma Makalesi
BibTex RIS Kaynak Göster

Mobil Peer-To-Peer Ağlarda Bluetooth Üzerinden Anlık Mesajlaşma Protokolü: IMOB

Yıl 2018, Cilt: 3 Sayı: 1, 7 - 13, 30.06.2018

Öz

Servis tabanlı yazılım geliştirmede servis
sağlayıcılar servislerini servis istemcilerinin kullanımına sunarlar. Bu, servis
istemcilerinin kaynakların yetmemesi durumunda bir avantaj sağlar. Bu çalışmada
servis tabanlı yazılım geliştirme ve mobil peer-to-peer ağlar incelenip anlık
mesajlaşma protokolü olan IMOB geliştirilmiştir. Bu protokol açıklanıp örnek
olarak servis sağlayıcı rolü modellenmiştir.

Kaynakça

  • [1] M. P. Singh, “Pering at peer-to-peer computing”, IEEE Internet Computing, 05(1):4–5, 2001.
  • [2] G. Gehlen, and L. Pham, “Mobile Web Services for Peer-to-Peer Applications”, Consumer Communications and Networking Conference, 2005.
  • [3] G. Kortuem, J. Schneider, D. P. Thaddeus, G. C. Thompson, S. Fickas, and Z. Segall, “When Peer-toPeer comes Face-to-Face: Collaborative Peer-toPeer Computing in Mobile Ad hoc Networks”, First International Conference on Peer-to-Peer Computing, Link¨oping, Sweden, 27-29 August 2001.
  • [4] N. Maibaum, and T. Mundt, “JXTA: A Technology Facilitating Mobile Peer-To-Peer Networks”, International Mobility and Wireless Access Workshop (MobiWac’02), pp. 7-13, Fort Worth, Texas, USA, 12 October 2002.
  • [5] B. A. Miller, and C. Bisdikian, Bluetooth Revealed, Addison-Wesley, 2 edition, 2002.
  • [6] M. Wiberg, and A. Grönlund, “Exploring Mobile CSCW: Five areas of questions for further research”, Proceedings of IRIS23 (Information Research in Scandinavia), Trollhattan, Sweden, 2000.
  • [7] A. I. Wang, T. Bjørnsgård, and K. Saxlund, “Peer2Me - Rapid Application Framework for Mobile Peer-to-Peer Applications”, 2007 International Symposium on Collaborative Technologies and Systems (CTS 2007), page 10, Orlando, Florida, USA, May 21-25, 2007.
  • [8] Wikipedia, https://en.wikipedia.org/, 2018.
  • [9] V. Shmatikov and J. C. Mitchell, “Analysis of a Fair Exchange Protocol”, http://www.isoc.org/isoc/conferences/ndss/2000/proceedings/001.pdf, 2000.
  • [10] P. H. Drielsma and S. Mödersheim, “The ASW Protocol Revisited: A Unified View”, http://www.avispa-project.org/papers/asw-arspa04-entcs05.pdf, 2003.
  • [11] J. A. Onieva, J. Zhou and J. Lopez, “Analysis of an Asynchronous Multi-Party Contract Signing Protocol”, http://jerry.c-lab.de/ubisec/publications/indocrypt05.pdf, 2005.
  • [12] K. Ogata and K. Futatsugi, “Formal Analysis of the NetBill Electronic Commerce Protocol”, http://www.yonezaki.cs.titech.ac.jp/Workshop/isss2003/slides/Ogata.pdf, 2003.
  • [13] M. Carbone, K. Honda and N. Yoshida, “Structured Communication-Centred Programming for Web Services”, http://www.dcs.qmul.ac.uk/~carbonem/cdlpaper/submission.pdf, 2007.
  • [14] G. Kovan, “SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions”, http://etd.uwaterloo.ca/etd/gkovan2005.pdf, 2005.
  • [15] L. Buttyan and J. P. Hubaux, “Rational Exchange”, www.hit.bme.hu/~buttyan/courses/ BMEVIHI9367/June12_rex.ppt.
  • [16] A. D. Rubin and P. Honeyman, “Formal Methods for the Analysis of Authentication Protocols”, http://www.citi.umich.edu/techreports/reports/citi-tr-93-7.pdf, 1993.
  • [17] S. Islam and M. A. Zaid, “Probabilistic Analysis and Verification of the ASW Protocol using PRISM”, http://ijns.femto.com.tw/contents/ijns-v7-n3/ijns-2008-v7-n3-p388-396.pdf, 2008.
  • [18] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker., “A scalable content-addressable network”, In Proc. of SIGCOMM, pp. 161–172, San Diego, CA, USA, August 2001.
  • [19] A. Rowstron and P. Druschel., “Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems”, In Proc. of the IFIP/ACM Middleware, Heidelberg, Germany, November 2001.
  • [20] I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan., “Chord: A scalable peer-to-peer lookup service for internet applications”, In Proc. of SIGCOMM, pp. 149–160, San Diego, CA, USA, August 2001.
  • [21]B. Y. Zhao, J. Kubiatowicz, and A. D. Joseph., “Tapestry: An infrastructure for fault-tolerant wide-area location and routing”, Technical Report UCV/CSD-01-1141, Computer Science Division, University of California, Berkeley, CA, USA, April 2001.
  • [22] F. E. Bustamante, Y. Qiao, “Friendships that Last: Peer Lifespan and its Role in P2P Protocols”, In: Douglis F., Davison B.D. (eds) Web Content Caching and Distribution. Springer, Dordrecht, 2004.
  • [23] I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong., “Freenet: A distributed anonymous information storage and retrieval system”, In Proc. ICSI Workshop on Design Issues in Anonymity and Unobservability, pp. 43–58, Berkeley, CA, USA, July 2000.
  • [24] Kazaa, http://www.kazaa.com, 2001.
  • [25] T. Klingberg and R. Manfredi., “Gnutella 0.6. RFC”, The Gnutella RFC, June 2002.
  • [26] Clip2, “The Gnutella protocol specification v0.4. RFC”, The Gnutella RFC, 2000.
Yıl 2018, Cilt: 3 Sayı: 1, 7 - 13, 30.06.2018

Öz

Kaynakça

  • [1] M. P. Singh, “Pering at peer-to-peer computing”, IEEE Internet Computing, 05(1):4–5, 2001.
  • [2] G. Gehlen, and L. Pham, “Mobile Web Services for Peer-to-Peer Applications”, Consumer Communications and Networking Conference, 2005.
  • [3] G. Kortuem, J. Schneider, D. P. Thaddeus, G. C. Thompson, S. Fickas, and Z. Segall, “When Peer-toPeer comes Face-to-Face: Collaborative Peer-toPeer Computing in Mobile Ad hoc Networks”, First International Conference on Peer-to-Peer Computing, Link¨oping, Sweden, 27-29 August 2001.
  • [4] N. Maibaum, and T. Mundt, “JXTA: A Technology Facilitating Mobile Peer-To-Peer Networks”, International Mobility and Wireless Access Workshop (MobiWac’02), pp. 7-13, Fort Worth, Texas, USA, 12 October 2002.
  • [5] B. A. Miller, and C. Bisdikian, Bluetooth Revealed, Addison-Wesley, 2 edition, 2002.
  • [6] M. Wiberg, and A. Grönlund, “Exploring Mobile CSCW: Five areas of questions for further research”, Proceedings of IRIS23 (Information Research in Scandinavia), Trollhattan, Sweden, 2000.
  • [7] A. I. Wang, T. Bjørnsgård, and K. Saxlund, “Peer2Me - Rapid Application Framework for Mobile Peer-to-Peer Applications”, 2007 International Symposium on Collaborative Technologies and Systems (CTS 2007), page 10, Orlando, Florida, USA, May 21-25, 2007.
  • [8] Wikipedia, https://en.wikipedia.org/, 2018.
  • [9] V. Shmatikov and J. C. Mitchell, “Analysis of a Fair Exchange Protocol”, http://www.isoc.org/isoc/conferences/ndss/2000/proceedings/001.pdf, 2000.
  • [10] P. H. Drielsma and S. Mödersheim, “The ASW Protocol Revisited: A Unified View”, http://www.avispa-project.org/papers/asw-arspa04-entcs05.pdf, 2003.
  • [11] J. A. Onieva, J. Zhou and J. Lopez, “Analysis of an Asynchronous Multi-Party Contract Signing Protocol”, http://jerry.c-lab.de/ubisec/publications/indocrypt05.pdf, 2005.
  • [12] K. Ogata and K. Futatsugi, “Formal Analysis of the NetBill Electronic Commerce Protocol”, http://www.yonezaki.cs.titech.ac.jp/Workshop/isss2003/slides/Ogata.pdf, 2003.
  • [13] M. Carbone, K. Honda and N. Yoshida, “Structured Communication-Centred Programming for Web Services”, http://www.dcs.qmul.ac.uk/~carbonem/cdlpaper/submission.pdf, 2007.
  • [14] G. Kovan, “SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions”, http://etd.uwaterloo.ca/etd/gkovan2005.pdf, 2005.
  • [15] L. Buttyan and J. P. Hubaux, “Rational Exchange”, www.hit.bme.hu/~buttyan/courses/ BMEVIHI9367/June12_rex.ppt.
  • [16] A. D. Rubin and P. Honeyman, “Formal Methods for the Analysis of Authentication Protocols”, http://www.citi.umich.edu/techreports/reports/citi-tr-93-7.pdf, 1993.
  • [17] S. Islam and M. A. Zaid, “Probabilistic Analysis and Verification of the ASW Protocol using PRISM”, http://ijns.femto.com.tw/contents/ijns-v7-n3/ijns-2008-v7-n3-p388-396.pdf, 2008.
  • [18] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker., “A scalable content-addressable network”, In Proc. of SIGCOMM, pp. 161–172, San Diego, CA, USA, August 2001.
  • [19] A. Rowstron and P. Druschel., “Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems”, In Proc. of the IFIP/ACM Middleware, Heidelberg, Germany, November 2001.
  • [20] I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan., “Chord: A scalable peer-to-peer lookup service for internet applications”, In Proc. of SIGCOMM, pp. 149–160, San Diego, CA, USA, August 2001.
  • [21]B. Y. Zhao, J. Kubiatowicz, and A. D. Joseph., “Tapestry: An infrastructure for fault-tolerant wide-area location and routing”, Technical Report UCV/CSD-01-1141, Computer Science Division, University of California, Berkeley, CA, USA, April 2001.
  • [22] F. E. Bustamante, Y. Qiao, “Friendships that Last: Peer Lifespan and its Role in P2P Protocols”, In: Douglis F., Davison B.D. (eds) Web Content Caching and Distribution. Springer, Dordrecht, 2004.
  • [23] I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong., “Freenet: A distributed anonymous information storage and retrieval system”, In Proc. ICSI Workshop on Design Issues in Anonymity and Unobservability, pp. 43–58, Berkeley, CA, USA, July 2000.
  • [24] Kazaa, http://www.kazaa.com, 2001.
  • [25] T. Klingberg and R. Manfredi., “Gnutella 0.6. RFC”, The Gnutella RFC, June 2002.
  • [26] Clip2, “The Gnutella protocol specification v0.4. RFC”, The Gnutella RFC, 2000.
Toplam 26 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Bölüm PAPERS
Yazarlar

Oğuz Dönmez

Yayımlanma Tarihi 30 Haziran 2018
Gönderilme Tarihi 10 Nisan 2018
Kabul Tarihi 5 Haziran 2018
Yayımlandığı Sayı Yıl 2018 Cilt: 3 Sayı: 1

Kaynak Göster

APA Dönmez, O. (2018). Mobil Peer-To-Peer Ağlarda Bluetooth Üzerinden Anlık Mesajlaşma Protokolü: IMOB. Computer Science, 3(1), 7-13.

The Creative Commons Attribution 4.0 International License 88x31.png  is applied to all research papers published by JCS and

a Digital Object Identifier (DOI)     Logo_TM.png  is assigned for each published paper.