共查询到20条相似文献,搜索用时 15 毫秒
1.
P2P打破了传统C/S模式服务器对网络资源的集中化管理和提供,解放了服务器响应的压力和降低了带宽负载,应用于IPTV系统。然而P2P技术为IPTV业务实现带来灵活和高效率等优点的同时也带来一些问题,比如时延、网络不可控等。本文就P2P技术在IPTV中的应用及相关问题进行了分析。 相似文献
2.
《Multimedia, IEEE Transactions on》2009,11(3):509-522
3.
方群 《数字社区&智能家居》2006,(20)
P2P技术是目前计算网络领域的研究热点,JXTA是开发P2P应用程序的流行平台,使用JXTA开发的P2P程序具有很好的开放性和可移植性。本文介绍了基于JXTA的P2P应用程序的开发方法和过程,并给出一个应用实例。 相似文献
4.
方群 《数字社区&智能家居》2006,(7):58-59
P2P技术是目前计算网络领域的研究热点。JXTA是开发P2P应用程序的流行平台,使用JXTA开发的P2P程序具有很好的开放性和可移植性。本文介绍了基于JXTA的P2P应用程序的开发方法和过程,并给出一个应用实例。 相似文献
5.
Marcin Czenko Ha Tran Jeroen Doumen Sandro Etalle Pieter Hartel Jerry den Hartog 《Electronic Notes in Theoretical Computer Science》2006,157(3):113-130
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT). To solve this problem we propose RT, which adds a restricted form of negation to the standard RT language, thus admitting a controlled form of non-monotonicity. The semantics of RT is discussed and presented in terms of the well-founded semantics for Logic Programs. Finally we discuss how chain discovery can be accomplished for RT. 相似文献
6.
7.
姚彦翔 《计算机光盘软件与应用》2011,(14)
随着网络与信息资源的飞速发展,P2P文件共享系统等分布式网络应用已经成为人们获取网络资源信息的重要途径本文围绕P2P技术的结构模式及其特点进行了分析,并举例说明P2P网络应用。 相似文献
8.
《Information Security Journal: A Global Perspective》2013,22(4):191-203
ABSTRACT P2P networks and the computations they enable hold great potential in creating the next generation of large-scale distributed applications. However, the P2P phenomenon has largely left untouched large organizations and businesses that have stringent security requirements and are uncomfortable with the anonymity and lack of centralized control/censorship which are the features of P2P systems. Hence, there is an urgent need to address the security concerns in deploying P2P systems which can leverage the underutilized compute resources in organizations across the world. This article proposes a containment-based security model (CBSM) for cycle-stealing P2P applications, based on the Secure Linux (SE Linux) Operating System, which alleviates existing security concerns, allowing peers to host untrusted or even hostile applications. Our approach is suitable for pure P2P applications and requires no message exchanges or trust computations in ensuring security. Testing via deployment of potentially malicious remote code proves the effectiveness of the proposed system. 相似文献
9.
Yifeng He Guobin Shen Yongqiang Xiong Ling Guan 《Multimedia, IEEE Transactions on》2009,11(1):138-151
Most existing peer-to-peer (P2P) video-on-demand (VoD) systems have been designed and optimized for the sequential playback. In practice, users often want to seek to the positions they are interested in. Such frequent seeks raise greater challenges to the design of the prefetching scheme. In this work, we first propose the concept of guided seeks. With the guidance, users can perform more efficient seeks to the desired positions. The guidance can be obtained from collective seeking statistics of other peers who have watched the same title in the previous and/or concurrent sessions. However, it is very challenging to aggregate the statistics efficiently, timely and in a completely distributed way. We design the hybrid sketches that not only capture the seeking statistics at significantly reduced space and time complexity, but also adapt to the popularity of the video. From the collected seeking statistics, we estimate the segment access probability, based on which we further develop an optimal prefetching scheme and an optimal cache replacement policy to minimize the expected seeking delay at every viewing position. Through extensive simulations, we demonstrate that the proposed prefetching framework significantly reduces the seeking delay compared to the sequential prefetching scheme. 相似文献
10.
P2P流量逐渐成为了互联网流量的重要组成部分,在对Internet 起巨大推动作用的同时,也带来了因资源过度占用而引起的网络拥塞以及安全隐患等问题,妨碍了正常的网络业务的开展.文中提出了基于机器学习的P2P流量识别方案,并运用FCBF(Fast Correlation-Based Filter)特征选择算法形成了流量特征子集,构建了机器学习P2P流量识别模型并对比了几种常见的机器学习算法在流量识别方面的性能.测试实验结果表明,C4.5算法和贝叶斯网络算法都适合于P2P流量检测,其个别模型达到了90%以上的识别率. 相似文献
11.
P2P网络通信技术作为信息社会时代出现的一种新媒体技术,在社会生活的方方面面都得到了广泛应用。本文旨在通过寻找可能的应用模式,探究P2P即时网络通信技术与检验数据传递融合的办法。 相似文献
12.
Ciullo D. Garcia M.A. Horvath A. Leonardi E. Mellia M. Rossi D. Telek M. Veglia P. 《Multimedia, IEEE Transactions on》2010,12(1):54-63
Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about how these systems work, due to their closed and proprietary design. In this paper, we present large scale experiments to compare three of the most successful P2P-TV systems, namely PPLive, SopCast and TVAnts. Our goal is to assess what level of "network awareness" has been embedded in the applications. We first define a general framework to quantify which network layer parameters leverage application choices, i.e., what parameters mainly drive the peer selection and data exchange. We then apply the methodology to a large dataset, collected during a number of experiments where we deployed about 40 peers in several European countries. From analysis of the dataset, we observe that TVAnts and PPLive exhibit a mild preference to exchange data among peers in the same autonomous system the peer belongs to, while this clustering effect is less intense in SopCast. However, no preference versus country, subnet or hop count is shown. Therefore, we believe that next-generation P2P live streaming applications definitively need to improve the level of network-awareness, so to better localize the traffic in the network and thus increase their network-friendliness as well. 相似文献
13.
基于模糊逻辑的资源感知P2P重叠网及其应用研究 总被引:2,自引:0,他引:2
P2P重叠网以其系统高效性和有效性被广泛应用于分布式网络管理系统中。但是,传统P2P重叠网络的设计往往只关注其P2P特性,忽略了重叠网自身的管理问题;另外,P2P网络强调的是参与者的平等性,忽略了各参与节点自身性能的差异,从而极大影响了系统的整体性能。本文提出一种基于模糊逻辑的资源感知P2P重叠网,系统中的每个参与节点负责管理一部分网元设备,并充分考虑各节点所管理资源的可用性及其所处环境的时变特性,同时利用基于策略的网络管理方式,构建了一种动态和自主的P2P重叠网网络管理系统。仿真结果证明了该方案在网络管理中的可行性和有效性。 相似文献
14.
依赖结构化对等网传播的P2P僵尸是未来互联网面临的重要威胁.详细分析了两种典型的结构化P2P协议Chord和Kademlia的工作原理,在此基础上,使用数学建模的方法建立了结构化P2P僵尸网络的传播模型.该模型将Kademlia,Chord协议与双因子免疫机制、主机在线率等因素相结合,较为全面地研究了两种典型的结构化P2P网络中僵尸的传播机理,并使用软件仿真的方法模拟了节点超过百万时,结构化P2P网络中僵尸的传播行为,通过软件仿真得出的数据与理论数据进行对比,验证了模型的正确性.从实验结果可以看出:对于Kademlia和Chord两种结构化P2P网络,僵尸传播无论是双因子免疫模型还是结合双因子与主机在线率的模型,理论模型与仿真结果都非常吻合,体现了模型的准确性,为僵尸的检测与防御提供了理论依据. 相似文献
15.
《Parallel and Distributed Systems, IEEE Transactions on》2008,19(7):954-966
BitTorrent has emerged as a very popular peer-to-peer file sharing system, which uses an embedded set of incentive mechanisms to encourage contribution and prevent free-riding. However, the capability BitTorrent has of preventing free-riding needs further study. In this paper, we present a fluid model with two different classes of peers to capture the effect of free-riding on BitTorrent-like systems. With the model, we find that BitTorrent's incentive mechanism is successful in preventing free-riding in a system without seeds, but may not succeed in producing a disincentive for free-riding in a system with a high number of seeds. The reason for this is that BitTorrent does not employ any effective mechanisms for seeds to effectively guard against freeriding. Therefore, we propose a seed bandwidth allocation strategy for the BitTorrent system to reduce the effect of seeds on free-riding. Finally, simulation results are given, which validate what we have found in our analysis and demonstrate the effectiveness of the proposed strategy. 相似文献
16.
P2P的对等结构是互联网本质的回归,以P2P技术为支撑的网络应用目前席卷了整个网络产业。诸如BitTorrent、Thunder、Skype,P2P应用已成为当前网络技术领域的一颗明星。本文介绍了P2P技术基本原理和基于P2P技术的主流软件。 相似文献
17.
From P2P to reliable semantic P2P systems 总被引:1,自引:0,他引:1
Abdul-Rahman Mawlood-Yunis Michael Weiss Nicola Santoro 《Peer-to-Peer Networking and Applications》2010,3(4):363-381
Current research to harness the power of P2P networks involves building reliable Semantic Peer-to-Peer (SP2P) systems. SP2P
systems combine two complementary technologies: P2P networking and ontologies. There are several types of SP2P systems with
applications to knowledge management systems, databases, the Semantic Web, emergent semantics, web services, and information
systems. Correct semantic mapping is fundamental for success of SP2P systems where semantic mapping refers to semantic relationship between concepts from different
ontologies. Current research on SP2P systems has emphasized semantics at the cost of dealing with the traditional issues of
P2P networks of reliability and scalability. As a result of their lack of resilience to temporary mapping faults, SP2P systems
can suffer from disconnection failures. Disconnection failures arise when SP2P systems that use adaptive query routing methods
treat temporary mapping faults as permanent mapping faults. This paper identifies the disconnection failure problem due to
temporary semantic mapping faults and proposes an algorithm to resolve it. To identify the problem, we will use a simulation model of SP2P systems. The Fault-Tolerant
Adaptive Query Routing (FTAQR) algorithm proposed to resolve the problem is an adaptation of the generous tit-for-tat method
originally developed in evolutionary game theory. The paper demonstrates that the reliability of an SP2P system increases
by using the algorithm. 相似文献
18.
P2P的对等结构是互联网本质的回归,以P2P技术为支撑的网络应用目前席卷了整个网络产业。诸如BitTorrent、Thunder、Skype,P2P应用已成为当前网络技术领域的一颗明星。本文介绍了P2P社术基本原理和基于P2P技术的主流软件。 相似文献
19.
StegoP2P:一种基于P2P网络的隐蔽通信方法 总被引:1,自引:0,他引:1
随着互联网的发展,隐私保护问题越来越突出,现有的匿名通信系统如Tor,Freenet等能够隐藏用户的身份,但是不能够隐藏通信的事实.以BitTorrent,emule为代表的P2P文件分享软件已经成互联网的主要应用,而且其用户规模庞大,分布在全球各地.在此基础之上提出一种新的隐蔽通信方法——StegoP2P,该方法不依赖于任何单一的系统或者接入点,而是利用P2P协议的隐蔽通道;并设计一个有效的隐蔽握手协议,让P2P网络中互为好友(合谋)但素未谋面的节点隐蔽握手,秘密交换信息,从而绕过网络审查.实验结果和安全性分析表明我们的系统具有较高的性能和健壮性,并能够抵御常见的流量审查. 相似文献