共查询到20条相似文献,搜索用时 109 毫秒
1.
P2P(Peer-to-Peer)系统在内容共享、即时通信、流媒体等领域获得了广泛应用。然而,P2P流量消耗了大部分网络带宽,造成网络拥堵,实现对P2P流量的有效识别和管理成为了一个十分热门的话题。针对BT的信令协议,分析了从Tracker服务器、DHT网络及通过PEX协议,获取节点列表的过程,提出通过相应报文中节点列表的解析,来达到BT流量预识别的方法。该方法能准确预知BT数据流的发生,较准确地对BT流量进行识别,并且有效减少系统开销。 相似文献
2.
为解决日益增长的数据流量给蜂窝网络造成的严重流量负载和网络拥塞问题,提出一种在机会网络下基于节点自私性和中心性的移动数据分流算法(SCDO)。蜂窝网络将数据直接传递给种子节点,种子节点利用节点移动带来的接触,将数据传递给其他请求该数据的节点。当某个节点到达延迟容忍时间仍未收到数据时,该节点可直接从蜂窝网络下载数据。通过对无分流时的蜂窝网络流量负载(cellular scenario)、随机选取10%的节点作为种子节点时的蜂窝网络流量负载(random scenario)以及SCDO选取10%的种子节点时的蜂窝网络流量负载3种方法进行对比,结果表明,SCDO相比cellular scenario和random scenario,时间延迟分别降低约48%和30%,数据分流量分别提高约20%和12%。 相似文献
3.
当前P2P业务占据了大量的互联网流量,在一定程度上对其他网络业务造成了巨大的冲击,该文主要以P2P典型软件Bit-Torrent下载为例设计一个改进的节点选择算法,有效降低节点对出口下载带宽占用率。 相似文献
4.
5.
6.
以Bittorrent应用为背景,对P2P网络中传统的节点选择策略进行了研究分析,指出了传统节点选择策略中存在的随机选择节点连接与交互以及交互过程中节点带宽利用率偏低的问题.对Tracker以外的节点来源如DHT、PEX节点来源的情况进行分析,以自身上传带宽利用率和网络中各节点的空闲带宽为参考,以减少带宽资源浪费、提高带宽利用率为目的.针对节点选择各阶段特点,设计并实现自适应节点选择机制,实验表明在对原系统的公平性影响很小的情况下,自适应机制能有效的减少网络中带宽资源浪费并将自身上传节点带宽利用率提高8.45%.小规模节点环境下(100节点)平均缩短节点下载完成时间6.7%,大规模下载环境下(500节点)平均缩短下载完成时间36.3%.有效的提高了系统中文件的获得和分发效力. 相似文献
7.
P2P节点智能选择机制的研究与实现 总被引:1,自引:0,他引:1
对对等网络(P2P)的流量问题进行了分析,指出P2P流量问题产生的原因。融合网络运营商、地理位置等信息,提出了一种节点智能选择机制。该机制优先选择属于相同运营商和地理位置接近的节点作为数据交换对象,最大限度地将数据流量控制在本地网络和同一运营商的网络中,从而减少骨干网和网络出口的负载,同时提高了数据传输性能。在Bit Torrent (BT)系统中融合智能选择机制后,Tracker智能选择的节点在往返时延、路由跳数上均得到优化,实验数据表明该机制能有效减少“流量旅行”,提高P2P传输效率。 相似文献
8.
9.
BT(BitTorrent,变态下载)的出现让许多上网用户在下载各种软件、电影等大块头数据时,体验到了飞一样的速度。然而,对于企业网络来说,这种基于P2P技术的文件共享对运行在其中的企业级应用,如ERP、CRM、VoIP等等,却造成巨大的冲击。无疑,对于企业网络的管理者来说,监视和控制网络中间的BT流量成了一个紧迫且必须正视的问题。一、什么是P2P下载技术“Peer to Peer”(简写P2P)是一种崭新的网络技术思想。不同于以往的有服务器和客户机结构区别的主从网络,它是一种对等网络技术。在某些场合,这种技术也称为“点对点”技术。P2P技术被认… 相似文献
10.
BT(BitTorrent,变态下载)的出现让许多上网用户在下载各种软件、电影等大块头数据时,体验到了飞一样的速度.然而,对于企业网络来说,这种基于P2P技术的文件共享对运行在其中的企业级应用,如ERP、CRM、VolP等等,却造成巨大的冲击.无疑,对于企业网络的管理者来说,监视和控制网络中间的BT流量成了一个紧迫且必须正视的问题. 相似文献
11.
12.
13.
Recent studies have applied Grottfredson and Hirschi’s General Theory of Crime to investigate whether college students’ inclinations toward internet software piracy is related to low self-control and opportunity (i.e., computer ownership). Given the widespread use of the internet to illegally obtain copies of music and movies, it is important to understand the factors in this form of piracy as well. This study applied the self-control perspective to examine the attitudes of high school students toward the internet piracy of music and movies. Attitudes toward the internet piracy of music and movies were related to self-control, biological sex, internet experience, affiliation with deviant peers, and grade level in this study of high school students. This information is important because studies of internet piracy had not yet confirmed the presence and predictability of internet piracy in high school students. This study also suggests that piracy prevention efforts may be most appropriately focused on high school age individuals and directed toward increasing self-control. 相似文献
14.
SUN Mei 《数字社区&智能家居》2008,(36)
该文利用门限算法设计了一个基于P2P网络的分布式签名系统,在本方案中,群公钥和分密钥是由P2P网络中的可信任节点共同决定的,保证了安全性。系统同时采用可验证密钥分享技术确保了密钥的安全性。 相似文献
15.
一种基于结构化P2P网络的拓扑匹配算法* 总被引:1,自引:0,他引:1
基于结构化的P2P系统在构建覆盖网络时未考虑到与实际物理网络层的结合,导致逻辑拓扑结构与物理拓扑结构严重不匹配问题,提出一种协议无关的拓扑匹配算法,通过事件触发的方式触发网络调整逻辑层的网络拓扑结构。模拟实验表明,本算法在一定程度上提高了网络的拓扑匹配度,降低了网络开销。 相似文献
16.
This study investigates the most important predictors of computer science students’ online help-seeking behaviors. 203 computer science students from a large university in southeastern United States participated in the study. Online help-seeking behaviors explored in this study include online searching, asking teachers online for help, and asking peers online for help. Ten-fold cross validation was used to select the most significant predictors from eight potential factors, including prior knowledge of the learning subject, learning proficiency level, academic performance, epistemological belief, interests, problem difficulty, age and gender. Problem difficulty was selected as the most important predictor for all three types of online help seeking, while learning proficiency level, academic performance, and epistemological belief were selected as the most important predictors for both online searching and asking teachers online for help. Based on the selected factors and their relationships with online help seeking, the study provides guidance on targeted training for online help seeking in an era of mass higher education. 相似文献
17.
18.
网络信誉系统是一个用于综合运算、记录并发布各个客户端以往行为表现的系统。在P2P开放网络资源共享系统中,网络信誉系统起到了两个重要的作用:向用户提供信息以决定对方是否可信,激励交易双方在交易中保持良好的表现以提高自身的信誉度。该文介绍了P2P开放网络与信誉管理系统的概念,分析了现有的信誉系统、模型及其算法。在此基础上设计了新的模型,该模型以信任链方式查询节点信誉度,提出把信誉度分层的方法,通过Java实现了该系统,展望了网络信誉系统的发展方向。 相似文献
19.
20.
Abstract The potential of emotional interaction between human and computer has recently interested researchers in human–computer interaction. The instructional impact of this interaction in learning environments has not been established, however. This study examined the impact of emotion and gender of a pedagogical agent as a learning companion (PAL) on social judgements, interest, self-efficacy, and learning. Two experiments investigated separately the effects of a PAL's emotional expression and empathetic response. Experiment 1 focused on emotional expression (positive vs. negative vs. neutral) and gender (male vs. female) with a sample of 142 male and female college students in a computer literacy course. Experiment 2 investigated the impact of empathetic response (responsive vs. non-responsive) and gender with 56 pre-service teachers. Overall, the results yielded main and interaction effects of PAL emotion and gender on the dependent variables. In particular, the PAL's empathetic response had a positive impact on learner interest and self-efficacy; PAL gender had a positive impact on recall. The findings imply that the emotion and the gender of the digital learning companion could be utilized to optimize college students' motivation and learning. 相似文献