首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 187 毫秒
1.
The common characteristics of peer-to-peer (P2P) overlay networks and wireless multi-hop network, such as self-organization, decentralization, hop-by-hop message transmission mode and high degree of dynamicity, lead to research of operating wired P2P applications on wireless multi-hop networks. Wireless mesh network (WMN) as a relative static multi-hop wireless network which is extended from Ad-Hoc networks, has become one of the key technologies for providing increased network coverage of Internet infrastructures. This paper investigates the problem of enabling P2P file sharing in WMNs. A special chord algorithm-spiralchord is proposed to address the major problem in wireless file sharing system-how to efficiently find resources currently available. Spiralchord put forward an identifier (ID) assignment technique based on spiral space-filling curve to integrate location-awareness with cross-layering. Location awareness aims at alleviating the mismatch of physical network topology and overlay network topology, and requires close-by IDs in logical ring of neighboring peers, while cross-layering aims at speeding up resource lookup operations, requires faraway IDs of neighboring peers. Spiralchord uses spiral curve to assign peers’ IDs which meet the contradictory requirements of location-awareness and cross-layering. The simulation results show spiralchord is effective in reducing message overhead, and increasing lookup performance with respect to basic chord.  相似文献   

2.
Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which reflect not the "unique" abnormalities of P2P botnets but the "common" abnormalities of them.It regards network traffic as the signal,and synthetically considers the macroscopic characteristics of network under different time scales with the fractal theory,including the self-similarity and the local singularity,which don’t vary with the topology structures,the protocols and the attack types of P2P botnet.At first detect traffic abnormalities of the above characteristics with the nonparametric CUSUM algorithm,and achieve the final result by fusing the above detection results with the Dempster-Shafer evidence theory.Moreover,the side effect on detecting P2P botnet which web applications generated is considered.The experiments show that DMFIF can detect P2P botnet with a higher degree of precision.  相似文献   

3.
4.
Improving Resilience against DDoS Attack in Unstructured P2P Networks   总被引:4,自引:0,他引:4  
In unstructured peer-to-peer (P2P) systems such as Gnutella, a general routing search algorithm is used to blindly flood a query through network among peers. But unfortunately, malicious nodes could easily make use of the search approach launching distributed denial of service (DDoS) attack which aims at the whole network. In order to alleviate or minimize the bad effect due to behavior of malicious nodes using the flooding search mechanism, the paper proposes a Markov-based evaluation model which exerts the trust and reputation mechanism to computing the level of trustworthy of nodes having the information requested by evaluation of the nodes' history behavior. Moreover, it can differentiate malicious nodes as early as possible for isolating and controlling the ones' message transmitted. The simulation results of the algorithm proposed show that it could effectively isolate malicious nodes, and hold back the transmission of vicious messages so that it could enhance tolerance of DDoS based on flooding in Guutella-like P2P network.  相似文献   

5.
The virtual network embedding/ mapping problem is an important issue in network virtualization in Software-Defined Networking (SDN). It is mainly concerned with mapping virtual network requests, which could be a set of SDN flows, onto a shared substrate network automatically and efficiently. Previous researches mainly focus on developing heuristic algorithms for general topology virtual network. In practice however, the virtual network is usually generated with specific topology for specific purpose. Thus, it is a challenge to optimize the heuristic algorithms with these topology information. In order to deal with this problem, we propose a topology-cognitive algorithm framework, which is composed of a guiding principle for topology algorithm developing and a compound algorithm. The compound algorithm is composed of several sub- algorithms, which are optimized for specific topologies. We develop star, tree, and ring topology algorithms as examples, other sub- algorithms can be easily achieved following the same framework. The simulation results show that the topology-cognitive algorithm framework is effective in developing new topology algorithms, and the developed compound algorithm greatly enhances the performance of the Revenue/Cost (R/C) ratio and the Runtime than traditional heuristic algorithms for multi-topology virtual network embedding problem.  相似文献   

6.
Moiré superlattices are formed when overlaying two materials with a slight mismatch in twist angle or lattice constant. They provide a novel platform for the study of strong electronic correlations and non-trivial band topology, where emergent phenomena such as correlated insulating states, unconventional superconductivity, and quantum anomalous Hall effect are discovered. In this review, we focus on the semiconducting transition metal dichalcogenides(TMDs) based moiré systems that host intrigui...  相似文献   

7.
This article focuses on identifying file-sharing peer-to-peer (P2P) (such as BitTorrent (BT)) traffic at the borders of a stub network. By analyzing protocols and traffic of applications, it is found that file-sharing P2P traffic of a single user differs greatly from traditional and other P2P (such as QQ) applications' traffic in the distribution of involved remote hosts and remote ports. Therefore, a method based on discreteness of remote hosts (RHD) and discreteness of remote ports (RPD) is proposed to identify BT-like traffic. This method only relies on flow information of each user host in a stub network, and no packet payload needs to be monitored. At intervals, instant RHD for concurrent transmission control protocol and user datagram protocol flows for each host are calculated respectively through grouping flows by the stub network that the remote host of each flow belongs to. On given conditions, instant RPD are calculated through grouping flows by the remote port to amend instant RHD. Whether a host has been using a BT-like application or not can be deduced from instant RHD or average RHD for a period of time. The proposed method based on traffic characteristics is more suitable for identifying protean file-sharing P2P traffic than content-based methods Experimental results show that this method is effective with high accuracy.  相似文献   

8.
P2P网络流媒体关键技术   总被引:9,自引:0,他引:9       下载免费PDF全文
秦丰林  刘琚 《电子学报》2011,39(4):919-927
P2P网络流媒体技术一直是学术界和产业界的研究热点.本文围绕覆盖网络拓扑结构,对现有的P2P流媒体系统作了全面的归类总结,深入介绍和分析了覆盖网络构建、数据块调度策略等P2P流媒体核心技术,并概要讨论视频编码、网络编码、覆盖网络拓扑优化、安全与激励机制等P2P流媒体相关增强技术.对典型P2P流媒体系统的性能进行了比较,...  相似文献   

9.
P2P搜索技术是P2P研究中的一个重要的领域.文中介绍了一个基于P2P结构化覆盖网络的分布式搜索引擎的架构和实现.该搜索引擎采用了三层架构,良好的层次架构减少了搜索引擎核心算法与P2P覆盖网络协议和具体应用间的依赖,使得搜索引擎可以移植到不同的P2P结构化覆盖网络之上.由于P2P搜索过程中会消耗大量的网络带宽,所以该搜索引擎使用了一些优化算法,它们不仅减少搜索过程带来的带宽消耗,而且保证了系统的可伸缩性.  相似文献   

10.
陈陆颖  丛蓉  杨洁  于华 《中国通信》2011,8(5):70-78
The growing P2P streaming traffic brings a variety of problems and challenges to ISP networks and service providers.A P2P streaming traffic classification method based on sampling technology is presented in this paper.By analyzing traffic statistical features and network behavior of P2P streaming,a group of flow characteristics were found,which can make P2P streaming more recognizable among other applications.Attributes from Netflow and those proposed by us are compared in terms of classification accuracy,a...  相似文献   

11.
殷嘉乐 《国外电子元器件》2013,(24):124-126,130
在非结构化P2P网络中,降低消息冗余,提高搜索的效率,一直是资源搜索的关键问题.目前非结构化P2P网络均采用生存时间(Time-To-Live)机制控制搜索算法的深度,但是同时产生了大量的冗余消息,严重影响了网络的利用率.为了能够在保持高搜索效率的前提下减少冗余消息的数量,提出了一种基于预算机制的非结构化P2P网络分段搜索策略DBudgetSearch.DBudgetSearch将搜索过程分为两个阶段,并在每个阶段中使用预算机制来控制消息转发的数量和导向,根据邻居节点的连接度大小来选择消息的转发对象.分析和试验结果表明,DBudgetSearch导向性好,算法搜索效率高,能够有效减少冗余消息.  相似文献   

12.
Search efficiency and accuracy of resource are important considerations for search algorithm in peer-to-peer(P2P)network.Most search algorithms use flooding among neighbor nodes to search relevant resource.However,this usually causes great amount of redundant messages,which results in high search costs and low search precision.In this paper,we use vector space model(VSM)and relevance ranking algorithms to construct overlay network,and a novel search mechanism search with K-iteration preference(SKIP)based on semantic group for P2P networks is proposed to efficiently solve these problems.The key idea of SKIP is to reorder the semantic neighbors of nodes according to relevant scores and to utilize preference selection during the process of query.We analysis and implement the scheme and reveal that the SKIP provides a low overhead on topology maintenance,which can be effectively used in P2P searching and verify it outperformanee in higher precision and lower search cost by comparing with current semantic-based searching mechanism gnutella-like efficient searching system(GES).  相似文献   

13.
为了提高非结构化P2P中资源查找的效率,针对查找请求的关键字重复出现以及资源共享不平均的现象,提出了基于响应追踪的资源查找机制RTRSM (Response Tracing based Resource Searching Mechanism),对请求响应的内容以及响应的来源进行追踪,并记录历史信息,以此构建提示型资源查找。在查找请求转发阶段,依据查找请求与历史记录的相关程度,自适应地调整转发策略,在保证较高查找成功率的同时,降低查找代价,提高查找效率。仿真实验表明,基于响应追踪的资源查找机制RTRSM可扩展性较好,能以较小的开销扩展到较大规模的系统中去。仿真实验还表明,RTRSM能保证90%以上的查找成功率。与洪泛法相比,RTRSM能减少54.2%的平均消息数,减少56.4%的平均跳数;与SQR (Scalble Query Routing)相比能减少28.9%的平均消息数,减少6.4%的平均跳数。  相似文献   

14.
对等语义覆盖网络构建主要采用索引和超级节点的方法,不可避免地存在瓶颈问题,同时忽略了覆盖网络与实际网络拓扑一致性问题对语义覆盖网络性能的重要影响。该文提出的对等语义覆盖网络结构TPPH充分结合了结构化P2P网络高效的定位和非结构化P2P网络的复杂检索功能,采用分布式哈希表机制将相同主题节点组织成主题区域,在同一主题区域内通过物理位置相近原则进行群的划分,从而在物理网络拓扑基础上建立语义P2P覆盖网络结构。性能分析和仿真实验表明,该结构显著提高了查全率并缩短了平均查询时延,是一种支持复杂查询、高性能的语义覆盖网络结构。  相似文献   

15.
赵佩章  张同光 《电信科学》2012,28(3):110-115
在众多P2P资源搜索技术中,基于语义相关的搜索被重点关注。本文在基于语义分组的P2P网络拓扑下,提出了一种新颖高效的搜索方式SKIP(search with K-Iteration preference),即K-层迭代优先选择算法。查询定位到目标节点后,SKIP系统使用K-层迭代优先选择算法进行搜索。实验表明,SKIP算法具有高效的搜索效率和较低的搜索开销,与现有的基于语义的搜索策略相比,具有更高的查准率和更低的查询开销。  相似文献   

16.
本文针对非结构F2P网络中利用洪泛搜索机制来进行资源搜索的盲目性问题,提出一种利用节点经验积累和cache技术相结合来指导资源搜索的算法。在访搜索算法中,节点记录收到的查询主题和满足该主题的邻居节点,建立主题与邻居节点的对应关系表,当再次收到该主题时,节点就利用该表来指导资源搜索。为了加快搜索速度,将常见查询主题的记录放到cache中。该算法利用一个相似度函数来判断本地文档是否满足查询主题。仿真实验表明,该算法有效地改进了资源搜索的盲目性。减少查询带来的网络流量,提高了查询成功率。  相似文献   

17.
在众多P2P资源搜索技术中,基于热点资源复制的搜索被重点关注。本文在考虑节点语义的情况下,基于ARIMA预测模型提出了自适应热点资源复制方法(semantic-aware replication based on ARIMA,SARA)。SARA充分考虑了无结构P2P网络中语义拓扑结构的特性,引入ARIMA预测模型,对于可能出现的热点资源提前进行副本复制。实验表明,SARA有效地避免了不必要的副本复制浪费,减小了复制开销,同时保证了较高的副本查询效率。  相似文献   

18.
凌燕  蓝善祯  徐品  潘丽 《电视技术》2012,36(3):58-61,69
主要从资源定位和数据传输两个方面概述P2P流媒体系统的关键技术。资源定位主要介绍结构化和非结构化资源索引及节点选择方法,节点选择则从节点物理位置和节点异构性讨论。数据传输主要讨论数据拓扑结构、数据调度模式、数据片选择策略及与SVC、MDC视频编码的结合。  相似文献   

19.
基于分簇P2P的多跳无线mesh网络资源检索与分发算法   总被引:1,自引:0,他引:1  
针对多跳无线mesh网络中拓扑结构和不同类型节点的特征,将多跳无线mesh网络建模成分簇P2P结构.为了降低资源发布的开销,在进行资源共享设计时,利用布鲁姆过滤器作为资源表示和消息在网络中传输.以布鲁姆过滤器为基础,提出了一种基于资源密度敏感的多跳无线 mesh 网络资源检索和分发算法,将移动客户端的资源下载请求转发到拥有资源副本最多的P2P分簇,利用该分簇的多个资源副本备份提供资源下载服务,最大化降低节点移动性产生的资源下载中断.仿真结果表明所提出的资源检索和分发算法能有效提升资源的下载性能.  相似文献   

20.
对低移动性、频繁搜索文件的无线Ad-Hoc网络,提出一种新型P2P文件共享系统,介绍一种将文件查找和路由功能统一起来形成跨层的方案。所有共享文件采用全分布哈希表,在无线网络拓扑结构建立的同时存储和保留位置信息以及路由信息.通过节点间的树形逻辑结构解决共享文件的定位查询和下载问题。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号