期刊文献+

P2P网络节点随机行为对文件规模的影响 被引量:1

Impact of peers' stochastic behaviors on file population in peer-to-peer network
下载PDF
导出
摘要 基于随机过程理论建立文件共享P2P网络模型,利用该模型系统地分析节点下载、合作、欺骗以及加入/退出等多种动态行为对文件规模及相关的平均负载率、下载成功率、平均下载次数等性能的影响.得出文件规模对下载率和退出率较敏感,存在平稳极限分布;合作率显著影响平均负载率,而欺骗率严重影响下载成功率及平均下载次数.以上结论可作为相应系统调控机制的优化目标及评价参考.该模型为进一步研究P2P系统性能提供一种简单有效的理论方法. A stochastic model of file sharing P2P (peer-to-peer) network is established. Based on the model, the impact of peers' dynamic behaviors ( download, cooperation, cheating, joining and departing) on file population and other relative system performances are systematically analyzed. It is concluded that file population is sensitive to download rate and departing ratio but has a balanced limit distribution. In addition, cooperation ratio remarkably influences mean load ratio while cheating ratio has distinct impact on success download probability and mean download times. These conclusions can be used to guide and evaluate optimizing system management mechanism. The truth that results of experiment coincide with theoretical results proves that the stochastic model is simple and effective.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第5期782-786,共5页 Journal of Southeast University:Natural Science Edition
基金 安徽省高校青年基金资助项目(2007jq1061)
关键词 P2P 文件共享 动态行为 生灭过程 peer-to-peer file sharing dynamic behavior birth-death process
  • 相关文献

参考文献8

  • 1Adar E,Huberman B A.Free riding on Gnutella[J/OL].First Monday,2000,5(10).http://firstmonday.org/issues/issue5-10/adar/index.html.
  • 2Ge Zhihui,Figueiredo D R,Jaiswal S,et al.Modeling peer-to-peer file sharing systems[C]//Proc of 22nd Annual Joint Conference on the IEEE Computer and Communications Societies.San Francisco,CA,USA,2003:2188-2198.
  • 3HAN Li LEI Zhen-ming.Modeling structured peer-to-peer systems[J].The Journal of China Universities of Posts and Telecommunications,2006,13(3):76-80. 被引量:1
  • 4郭洪杰,郁美玲.Ad Hoc网络马氏模型路由维护的性能分析[J].应用数学与计算数学学报,2005,19(1):46-52. 被引量:1
  • 5杜可亮,张轩,李星,李崇荣.IP组播行为的生灭模型[J].清华大学学报(自然科学版),2004,44(1):134-137. 被引量:5
  • 6Stutzbach D,Rejaie R.Understanding churn in peer-to-peer networks[C]//Proceedings of the 6th ACM SIGCOMM on Internet Measurement.Rio de Janeriro,Brazil,2006:189-202.
  • 7Feller W.An introduction to probability theory and its applications:vol 2[M].2nd ed.John Wiley & Sons,1971.
  • 8Tran H,Hitchens M,Varadharajan V,et al.A trust based access control framework for P2P file-sharing systems[C]//Proceedings of the 38th Hawaii International Conference on System Sciences.Hawaii,USA,2005:302.

二级参考文献19

  • 1P. Jacquet and A.Laouiti. Analysis of mobile ad hoc network routing protocols in random graph mobiles. Institut national de Recherche en Informatique et en Automatique, 1999, Rapport de Recherche No. 3835.
  • 2D.B.Johuson and D.A. Maltz. Dynamia source routing in ad hoc wireless networks. In mobile Computing, edited by Tomasz Imielinski and hank Korth, Chapter 5, 153~181, Kluwer Academic Publisher, 1996.
  • 3Wang Z K, Yang X Q. Birth and death processes and Markov chai. SpringerVerlag, New York.Science Press, Beijing, 1992.
  • 4Kevin Almeroth. A long-term analysis of growth and usage patterns in the multicast backbone (MBone) [A]. Proc of IEEE INFOCOM'00 [C]. Tel Aviv, Israel: IEEE Press, 2000. 824-833.
  • 5Sanjeev Setia, Samir Koussih, Sushil Jajodia. Kronos: a scalable group re-keying approach for secure multicast [A]. Proc of IEEE Symposium on Security and Privacy'00 [C]. Berkeley, California: IEEE Press, 2000. 215-228.
  • 6Li Steve, Yang Richard, Mohamed Gouda, et al. Batch rekeying for secure group communications [A]. Proc of 10th International World Wide Web Conference [C]. Hong Kong: IEEE Press, 2001. 525-534.
  • 7Peter Dinsmore, David Balenson, Michael Heyman, et al. Policy-based security management for large dynamic groups: An overview of the DCCM project [A]. DARPA Information Survivability Conference & Exposition [C]. Hilton Head, South Carolina: IEEE Press, 2000. 56-98.
  • 8Michael Macedonia. MBone provides audio and video across the internet [J]. IEEE Computer, 1994, 27(4): 30-36.
  • 9Stoica I,Morris R,Karger D.Chord:a scalable peer-to-peer lookup service for Internet applications.Proceedings of ACM SIGCOMM 2001,August,San Deigo,CA,149-160
  • 10Ratnasamy S,Francis P,Handley M.A scalable contentaddressable network,Proceedings of ACM SIGCOMM 2001,August,San Deigo,CA,161-172

共引文献4

同被引文献7

  • 1刘琼,徐鹏,杨海涛,彭芸.Peer-to-Peer文件共享系统的测量研究[J].软件学报,2006,17(10):2131-2140. 被引量:36
  • 2Christin N, Weigend A S, Chuang J. Content availability, pollution and poisoning in peer to peer file sharing networks [ C/OL ]//Proc of ACM E-Commerce Conference. 2005. http://p2pecon, berkeley, edu/pub/CWCEC05. pdf.
  • 3Dumitriu D, Knightly E, Stoica I, et al. Denial of service resilience in peer to peer file sharing systems [ J ]. ACM Sigmetrics Performance Evaluation Review, 2005, 33(1) :38 -49.
  • 4Thommes R, Coates M. Epidemiological modeling of peer-to-peer viruses and pollution [ C ]//Proc of INFOCOM'06. Barcelona, Spain, 2006 - 1 - 12.
  • 5Liang Jian, Kumar Rakesh, Xi Yongjian, et al. Pollution in P2P file sharing systems [ C ]//Proc of INFOCOM'05. Miami, FL, USA, 2005 : 1174 - 1185.
  • 6Stutzbach D, Rejaie R. Understanding churn in peer-to-peer networks [ C ]//Proc of Internet Measurement Conference. Rio de Janeiro, Brazil, 2006:189-202.
  • 7Lee U, Choi M, Cho J, et al. Understanding pollution dynamics in P2P file sharing[ C/OL]//Proc of the 5th International Workshop on Peer-to-Peer Systems. Santa Babara, 2006. http://iptps06, cs. ucsb. edu/papers/ Lee-pollution 06. pdf.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部