期刊文献+

基于P2P的SIP研究与实现 被引量:4

SIP Research & Development based on P2P
下载PDF
导出
摘要 使用SIP协议的P2P互联网技术构架支持基本的用户注册和呼叫建立,Chord算法保证了DHT节点能被有效查找和更新,目的是构建一个基于SIP信令的纯P2P架构的IP电话系统。 The architecture tot peer-to peer Internet tchcphony using the Session Initiation Protocol (SIP) supports basic user registration and call setup. The P2P-SIP client adaptor uses distributed, robust and sealable key lookup of Distributed Hash Table (DHT)-based structured P2P algorithms such as Chord.
出处 《现代计算机》 2006年第1期30-34,共5页 Modern Computer
关键词 P2P SIP CHORD算法 DHT节点 P2P SIP Chont Algorithms DHT node
  • 相关文献

参考文献5

  • 1S. Kamvar, M. Schtosser, and H. Garcia-Molina. The Eigentrust Algorithm for Reputation Management in P2P Networks.
  • 2R. Mahy. Connection Reuse in the Session Initialion Protocol (SIP). Internet Draft Draft-Ieff-Sip-Connect-Reuse-00, Internet Engineering Task Force, Aug. 2003, Work in progress.
  • 3J. Rosenberg. Traversal Using Relay NAT (TURN). Internet Draft Draft Rosenberg-midcom-tum-03, Internet Engineering Task Force, Oct, 2003. Work in progress.
  • 4J. Rosenberg. A Session Initiation Protocol (sip) Event Package for Registrations. RFC 3680, Internet Engineering Task Force, Mar. 2004.
  • 5J. Rosenberg, H. Schulzrinne, and P. Kyzivat. Caller Preferences for the Session Initiation Protoeol (sip). RFC 3841,Internet Engineering Task Force, Aug, 2004.

同被引文献15

  • 1梁彬,孙玉芳,石文昌,孙波.一种改进的以基于角色的访问控制实施BLP模型及其变种的方法[J].计算机学报,2004,27(5):636-644. 被引量:30
  • 2王丹,于戈.P2P系统模型研究[J].计算机工程,2005,31(4):128-130. 被引量:29
  • 3刘益和,沈昌祥.基于角色管理的安全模型[J].计算机应用研究,2007,24(5):119-121. 被引量:10
  • 4Bryan DA, Lowekamp BB. SOSIMPLE:A SIP/SIMPLE Based P2P VolP and IM System. : Williamsburg, Computer Science Department, College of William and Mary, 2004:4 - 5.
  • 5Waterhouse SR, Doolin DM, Kan G, Faybishenko Y. JXTA Search: a distributed search framework for peer-to-peer networks. IEEE Intemet Computing, 2002,6(2): 68 - 73.
  • 6Stoica I, Morris R, Karger D, Kaashoek F, Balakrishnan H. Chord: A scalable peer-to-peer lookup service for internet applications. Proceedings of conference in ACM Special Interest Group on Data Communication. San Diego:ACM press. 2001:4 - 5.
  • 7Foschini G J, Gans M J. On limits of wireless communications in a fading environment when using multiple antennas [J]. Wireless Pers Commun,1998,10(2) :315 - 335.
  • 8Proakis J. Digital Communication [ M ]. 4th edition. New York : McGraw Hill ,2001 : 102 - 111.
  • 9Sandhu R,Coyne E. Role - based Access Control Models [ J ]. IEEE Computer, 1996,29(2) :38 -47.
  • 10Princy Mehta and Sanjay Udani. Voice over IP. IEEE POTENTIALS, 2001,20(4):36-40

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部