期刊文献+

Peer-to-Peer对等网络可信性的分析和比较 被引量:1

Analysis and comparison of dependability of P2P networks
下载PDF
导出
摘要 对等网络(peer-to-peer,P2P)技术是目前新一代网络技术研究的活跃领域。随着基于对等网的应用越来越广泛,对P2P网络的可信性的研究具有现实意义。首先介绍了P2P网络的基本特征以及P2P网络的分类,提出了P2P网络可靠性评估方法,并从可靠性、可扩展性、适应性及完整性等几方面对各类不同类型的P2P网络的可信性进行了分析和比较,最后展望了P2P未来的发展方向。 Peer-to-peer (P2P) network technology is a currently emerging technology in the network research domain. With application based on peer-to-peer network the more and more widely, the research on dependability of P2P is real significance. The P2P's charactertics and classes are described, and a method is presented to evaluate peer-to-peer network's dependability. And then dependability of P2P networks is analyzed and compared, at the end, the peer-to-peer development prospect in the future is forecasted.
作者 郭玉堂 徐涛
出处 《计算机工程与设计》 CSCD 北大核心 2006年第24期4749-4752,共4页 Computer Engineering and Design
关键词 对等网络 可信性 单崩溃点 搜索算法 聚集对等点 peer-to-peer dependability single point of failure search algorithm rendezvous peer
  • 相关文献

参考文献11

  • 1Melville L,Walkerdine J,Sommerville I.Dependability properties of P2P architectures[C].Sweden:Proceedings of IEEE P2P,2002.
  • 2Clay Shirky.What is P2P and what isn't[C].O'Reilly's Emerging Technology Conference,2002.
  • 3The napster homepage[EB/OL].http://www.napster.com/.
  • 4The gnutella homepage[EB/OL].http://gnutella.wego.com/.
  • 5The chord project[EB/OL].2004.http://www.pdos.lcs.mit.edu/chord.
  • 6Sylvia Ratnasamy,Paul Francis,Mark Handley,et al.A scalable content-addressable network[C].Proc ACM SIGCOMM,2001.
  • 7The kazaa homepage[EB/OL].http://www.kazaa.com/.
  • 8Liang J,Kumar R,Ross K W.Umderstanding kazaa[EB/OL].http://cis.poly.edu/ross/.
  • 9Li Gong.Techoverview of JXTA[R].Sun Microsystems Inc,2001.
  • 10Steve Waterhouse.JXTA search:Distributed search for distributed networks[R].Sun Microsystems Inc,2001.

同被引文献9

  • 1汪燕,柳斌.BitTorrent协议分析及控制策略[J].实验技术与管理,2006,23(1):54-56. 被引量:9
  • 2周文莉,吴晓非.P2P技术综述[J].计算机工程与设计,2006,27(1):76-79. 被引量:111
  • 3程磊,陈鸣,周骏.对BitTorrent通信协议的分析与检测[J].电信科学,2006,22(12):46-50. 被引量:6
  • 4Karagiannis T, Broido A,Faloutsos M,et al.Transport layer identification of P2P traffic [C]. Taormina: Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference.ACM Press, 2004:121-134.
  • 5Sen S, Wang J.Analyzing peer-to-peer traffic across large networks [J]. IEEE/ACM Transaction on Networking, 2004,12 (2): 219-232.
  • 6Viano P. 关于 Windump [EB/OL] .http://www.winpcap.org/windump/default.htm/.
  • 7Roesch M.关于 Snort [EB/OL].http://www.snort.org/.
  • 8Ramirez G.关于 Ethereal[EB/OL].http://www.ethereal.com/.
  • 9Spognardi A, Lucarelli A, Pietro R D. A methodology for P2P file-sharing traffic detection [J]. Proceedings-Second International Workshop on Hot Topics in Peer-to-Peer Systems,HOTP2P,2005:52-61.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部