首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
李璠 《微计算机信息》2007,23(36):115-116,95
P2P打破了传统C/S模式服务器对网络资源的集中化管理和提供,解放了服务器响应的压力和降低了带宽负载,应用于IPTV系统。然而P2P技术为IPTV业务实现带来灵活和高效率等优点的同时也带来一些问题,比如时延、网络不可控等。本文就P2P技术在IPTV中的应用及相关问题进行了分析。  相似文献   

2.
In peer-to-peer (P2P) video-on-demand (VoD) systems, a scalable source coding is a promising solution to provide heterogeneous peers with different video quality. In this paper, we present a systematic study on the throughput maximization problem in P2P VoD applications. We apply network coding to scalable P2P systems to eliminate the delivery redundancy. Since each peer receives distinct packets, a peer with a higher throughput can reconstruct the video at a higher quality. We maximize the throughput in the existing buffer-forwarding P2P VoD systems using a fully distributed algorithm. We demonstrate in the simulations that the proposed distributed algorithm achieves a higher throughput compared to the proportional allocation scheme or the equal allocation scheme. The existing buffer-forwarding architecture has a limitation in total upload capacity. Therefore we propose a hybrid-forwarding P2P VoD architecture to improve the throughput by combining the buffer-forwarding approach with the storage-forwarding approach. The throughput maximization problem in the hybrid-forwarding architecture is also solved using a fully distributed algorithm. We demonstrate that the proposed hybrid-forwarding architecture greatly improves the throughput compared to the existing buffer-forwarding architecture. In addition, by adjusting the priority weight at each peer, we can implement the differentiated throughput among different users within a video session in the buffer-forwarding architecture, and the differentiated throughput among different video sessions in the hybrid-forwarding architecture.   相似文献   

3.
P2P技术是目前计算网络领域的研究热点,JXTA是开发P2P应用程序的流行平台,使用JXTA开发的P2P程序具有很好的开放性和可移植性。本文介绍了基于JXTA的P2P应用程序的开发方法和过程,并给出一个应用实例。  相似文献   

4.
P2P技术是目前计算网络领域的研究热点。JXTA是开发P2P应用程序的流行平台,使用JXTA开发的P2P程序具有很好的开放性和可移植性。本文介绍了基于JXTA的P2P应用程序的开发方法和过程,并给出一个应用实例。  相似文献   

5.
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT). To solve this problem we propose RT, which adds a restricted form of negation to the standard RT language, thus admitting a controlled form of non-monotonicity. The semantics of RT is discussed and presented in terms of the well-founded semantics for Logic Programs. Finally we discuss how chain discovery can be accomplished for RT.  相似文献   

6.
Peer-to-Peer典型应用安全需求分析   总被引:10,自引:2,他引:10  
在介绍P2P网络及其应用的基础上,对P2P典型应用的安全性进行具体的分析,得出了每种应用的详细安全需求,总结了P2P应用的一般安全需求,并明确了其中的核心安全需求——信任关系。  相似文献   

7.
随着网络与信息资源的飞速发展,P2P文件共享系统等分布式网络应用已经成为人们获取网络资源信息的重要途径本文围绕P2P技术的结构模式及其特点进行了分析,并举例说明P2P网络应用。  相似文献   

8.
ABSTRACT

P2P networks and the computations they enable hold great potential in creating the next generation of large-scale distributed applications. However, the P2P phenomenon has largely left untouched large organizations and businesses that have stringent security requirements and are uncomfortable with the anonymity and lack of centralized control/censorship which are the features of P2P systems. Hence, there is an urgent need to address the security concerns in deploying P2P systems which can leverage the underutilized compute resources in organizations across the world. This article proposes a containment-based security model (CBSM) for cycle-stealing P2P applications, based on the Secure Linux (SE Linux) Operating System, which alleviates existing security concerns, allowing peers to host untrusted or even hostile applications. Our approach is suitable for pure P2P applications and requires no message exchanges or trust computations in ensuring security. Testing via deployment of potentially malicious remote code proves the effectiveness of the proposed system.  相似文献   

9.
Most existing peer-to-peer (P2P) video-on-demand (VoD) systems have been designed and optimized for the sequential playback. In practice, users often want to seek to the positions they are interested in. Such frequent seeks raise greater challenges to the design of the prefetching scheme. In this work, we first propose the concept of guided seeks. With the guidance, users can perform more efficient seeks to the desired positions. The guidance can be obtained from collective seeking statistics of other peers who have watched the same title in the previous and/or concurrent sessions. However, it is very challenging to aggregate the statistics efficiently, timely and in a completely distributed way. We design the hybrid sketches that not only capture the seeking statistics at significantly reduced space and time complexity, but also adapt to the popularity of the video. From the collected seeking statistics, we estimate the segment access probability, based on which we further develop an optimal prefetching scheme and an optimal cache replacement policy to minimize the expected seeking delay at every viewing position. Through extensive simulations, we demonstrate that the proposed prefetching framework significantly reduces the seeking delay compared to the sequential prefetching scheme.  相似文献   

10.
P2P流量逐渐成为了互联网流量的重要组成部分,在对Internet 起巨大推动作用的同时,也带来了因资源过度占用而引起的网络拥塞以及安全隐患等问题,妨碍了正常的网络业务的开展.文中提出了基于机器学习的P2P流量识别方案,并运用FCBF(Fast Correlation-Based Filter)特征选择算法形成了流量特征子集,构建了机器学习P2P流量识别模型并对比了几种常见的机器学习算法在流量识别方面的性能.测试实验结果表明,C4.5算法和贝叶斯网络算法都适合于P2P流量检测,其个别模型达到了90%以上的识别率.  相似文献   

11.
P2P网络通信技术作为信息社会时代出现的一种新媒体技术,在社会生活的方方面面都得到了广泛应用。本文旨在通过寻找可能的应用模式,探究P2P即时网络通信技术与检验数据传递融合的办法。  相似文献   

12.
Network Awareness of P2P Live Streaming Applications: A Measurement Study   总被引:4,自引:0,他引:4  
Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about how these systems work, due to their closed and proprietary design. In this paper, we present large scale experiments to compare three of the most successful P2P-TV systems, namely PPLive, SopCast and TVAnts. Our goal is to assess what level of "network awareness" has been embedded in the applications. We first define a general framework to quantify which network layer parameters leverage application choices, i.e., what parameters mainly drive the peer selection and data exchange. We then apply the methodology to a large dataset, collected during a number of experiments where we deployed about 40 peers in several European countries. From analysis of the dataset, we observe that TVAnts and PPLive exhibit a mild preference to exchange data among peers in the same autonomous system the peer belongs to, while this clustering effect is less intense in SopCast. However, no preference versus country, subnet or hop count is shown. Therefore, we believe that next-generation P2P live streaming applications definitively need to improve the level of network-awareness, so to better localize the traffic in the network and thus increase their network-friendliness as well.  相似文献   

13.
基于模糊逻辑的资源感知P2P重叠网及其应用研究   总被引:2,自引:0,他引:2  
P2P重叠网以其系统高效性和有效性被广泛应用于分布式网络管理系统中。但是,传统P2P重叠网络的设计往往只关注其P2P特性,忽略了重叠网自身的管理问题;另外,P2P网络强调的是参与者的平等性,忽略了各参与节点自身性能的差异,从而极大影响了系统的整体性能。本文提出一种基于模糊逻辑的资源感知P2P重叠网,系统中的每个参与节点负责管理一部分网元设备,并充分考虑各节点所管理资源的可用性及其所处环境的时变特性,同时利用基于策略的网络管理方式,构建了一种动态和自主的P2P重叠网网络管理系统。仿真结果证明了该方案在网络管理中的可行性和有效性。  相似文献   

14.
钱权  萧超杰  张瑞 《软件学报》2012,23(12):3161-3174
依赖结构化对等网传播的P2P僵尸是未来互联网面临的重要威胁.详细分析了两种典型的结构化P2P协议Chord和Kademlia的工作原理,在此基础上,使用数学建模的方法建立了结构化P2P僵尸网络的传播模型.该模型将Kademlia,Chord协议与双因子免疫机制、主机在线率等因素相结合,较为全面地研究了两种典型的结构化P2P网络中僵尸的传播机理,并使用软件仿真的方法模拟了节点超过百万时,结构化P2P网络中僵尸的传播行为,通过软件仿真得出的数据与理论数据进行对比,验证了模型的正确性.从实验结果可以看出:对于Kademlia和Chord两种结构化P2P网络,僵尸传播无论是双因子免疫模型还是结合双因子与主机在线率的模型,理论模型与仿真结果都非常吻合,体现了模型的准确性,为僵尸的检测与防御提供了理论依据.  相似文献   

15.
BitTorrent has emerged as a very popular peer-to-peer file sharing system, which uses an embedded set of incentive mechanisms to encourage contribution and prevent free-riding. However, the capability BitTorrent has of preventing free-riding needs further study. In this paper, we present a fluid model with two different classes of peers to capture the effect of free-riding on BitTorrent-like systems. With the model, we find that BitTorrent's incentive mechanism is successful in preventing free-riding in a system without seeds, but may not succeed in producing a disincentive for free-riding in a system with a high number of seeds. The reason for this is that BitTorrent does not employ any effective mechanisms for seeds to effectively guard against freeriding. Therefore, we propose a seed bandwidth allocation strategy for the BitTorrent system to reduce the effect of seeds on free-riding. Finally, simulation results are given, which validate what we have found in our analysis and demonstrate the effectiveness of the proposed strategy.  相似文献   

16.
P2P的对等结构是互联网本质的回归,以P2P技术为支撑的网络应用目前席卷了整个网络产业。诸如BitTorrent、Thunder、Skype,P2P应用已成为当前网络技术领域的一颗明星。本文介绍了P2P技术基本原理和基于P2P技术的主流软件。  相似文献   

17.
From P2P to reliable semantic P2P systems   总被引:1,自引:0,他引:1  
Current research to harness the power of P2P networks involves building reliable Semantic Peer-to-Peer (SP2P) systems. SP2P systems combine two complementary technologies: P2P networking and ontologies. There are several types of SP2P systems with applications to knowledge management systems, databases, the Semantic Web, emergent semantics, web services, and information systems. Correct semantic mapping is fundamental for success of SP2P systems where semantic mapping refers to semantic relationship between concepts from different ontologies. Current research on SP2P systems has emphasized semantics at the cost of dealing with the traditional issues of P2P networks of reliability and scalability. As a result of their lack of resilience to temporary mapping faults, SP2P systems can suffer from disconnection failures. Disconnection failures arise when SP2P systems that use adaptive query routing methods treat temporary mapping faults as permanent mapping faults. This paper identifies the disconnection failure problem due to temporary semantic mapping faults and proposes an algorithm to resolve it. To identify the problem, we will use a simulation model of SP2P systems. The Fault-Tolerant Adaptive Query Routing (FTAQR) algorithm proposed to resolve the problem is an adaptation of the generous tit-for-tat method originally developed in evolutionary game theory. The paper demonstrates that the reliability of an SP2P system increases by using the algorithm.  相似文献   

18.
P2P的对等结构是互联网本质的回归,以P2P技术为支撑的网络应用目前席卷了整个网络产业。诸如BitTorrent、Thunder、Skype,P2P应用已成为当前网络技术领域的一颗明星。本文介绍了P2P社术基本原理和基于P2P技术的主流软件。  相似文献   

19.
StegoP2P:一种基于P2P网络的隐蔽通信方法   总被引:1,自引:0,他引:1  
随着互联网的发展,隐私保护问题越来越突出,现有的匿名通信系统如Tor,Freenet等能够隐藏用户的身份,但是不能够隐藏通信的事实.以BitTorrent,emule为代表的P2P文件分享软件已经成互联网的主要应用,而且其用户规模庞大,分布在全球各地.在此基础之上提出一种新的隐蔽通信方法——StegoP2P,该方法不依赖于任何单一的系统或者接入点,而是利用P2P协议的隐蔽通道;并设计一个有效的隐蔽握手协议,让P2P网络中互为好友(合谋)但素未谋面的节点隐蔽握手,秘密交换信息,从而绕过网络审查.实验结果和安全性分析表明我们的系统具有较高的性能和健壮性,并能够抵御常见的流量审查.  相似文献   

20.
徐毅  王家伟 《计算机工程》2010,36(14):270-272
针对P2P网络中资源共享交换效率问题,提出一种计算网络资源共享可能度的自适应策略,以决定节点对资源的共享抉择。该策略考虑了P2P网络中资源共享存在受限存储空间、下载中断和冗余下载等问题,以资源共享可能度作为资源共享抉择依据,提出资源共享可能度在单个代理的计算方法。实验结果证明自适应策略能够较好地避免资源的冗余下载,提高P2P网络资源共享效率。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号