期刊文献+

P2P网络可用性关键技术研究进展 被引量:3

Research and Evolvement of Key Technologies Enhancing Practicability of P2P Network
下载PDF
导出
摘要 P2P网络是典型的由应用需求推动学术研究的网络技术,提高可用性是P2P网络的一个研究主线。在概括P2P网络应用的类型,总结P2P网络的性质模型的基础上分析了影响P2P网络可用性的若干因素,包括结构化P2P网络拓扑参数优化、覆盖网络拓扑感知和优化、网络异构和负载均衡、抗波动性能优化、容错路由以及激励机制。对各个关键技术问题的解决方案进行分类对比,并根据比较的结果对今后的发展趋势进行了展望。 P2P network is a new technology specially promoted by needs of application. Enhancing practicability is a main thread of P2P research. Surveys types of P2P application, summarizes the property model of P2P network and analyzes key technologies affecting practicability of P2P network including topology parameter optimizing of structured P2P,topology awareness of overly, heterogeneous and load balancing, enhancing churn resistibility, fault tolerance and incentive mechanism. Classifies and compares solutions of key problems and discusses directions of research based on the comparing result.
出处 《计算机科学》 CSCD 北大核心 2008年第9期34-38,71,共6页 Computer Science
基金 国家863计划(编号2007AA01Z422) 国家自然科学基金重大研究计划项目 高可用的新一代网络服务体系结构及其关键技术的研究(编号90604003) 安徽省教育厅自然科学研究项目(编号2005kj088) 安徽省高校教师青年基金(编号2007jq1061)
关键词 对等网络 拓扑参数 可扩展性 拓扑感知 波动 容错 负载均衡 Peer-to-peer, Topology parameters, Scalability, Topology awareness, Chum, Fault tolerance, Load balancing
  • 相关文献

参考文献51

  • 1Melville L, Walkerdine J, Sommerville I. Method definition for dependability specification for P2P systems. TR0306F03_Method Def. 2003
  • 2王怀民,唐扬斌,尹刚,李磊.互联网软件的可信机理[J].中国科学(E辑),2006,36(10):1156-1169. 被引量:59
  • 3Clark D D,Wroelawski J ,Sollins K R. Tussle in Cyberspaee, Defining Tomorrow's Intemet // Proe. ACM SIGCOMM. 2002: 347-356
  • 4纽约时报.http://www.nytimes.com/2007/10/03/business/worldbusiness/03broadband.html,2007
  • 5BitTorrent. http://bitconjurer. org/BitTorrent/
  • 6Karnvar S D. The eigenTrust algorithm for reputation management in P2P networks//Proceedings of the Twelfth International WWW Conference. Budapest, Hungary, May 2003
  • 7Comelli F, Damiani E. Choosing reputable servents in a P2P network//Proc, of the Eleventh International WWW Conference. Honolulu, Hawaii, May 2002
  • 8Aberer K,Despotovic Z. Managing trust in a peer-to-peer information system// Proceedings the 10th international Conference on Information and Knowledge Management. Atlanta, Georgia, USA, 2002
  • 9Prashant D, Partha D. Securing reputation data in peer-to-peer networks//PDCS 2004. MIT Cambridge, USA, 2004
  • 10Felegyhazi M, Buttydn L, Hubaux J-P. Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoe Networks - The Static Case. PWC,2003

二级参考文献35

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 2闵应骅.容错计算二十五年[J].计算机学报,1995,18(12):930-943. 被引量:16
  • 3Anderson J P.Computer Security Technology Planning Study.ESD-TR-73-51,Vol.I,AD-758 206,ESD/AFSC,Hanscom AFB,Bedford MA,October 1972
  • 4ISO/IEC,Information technology-security Techniques-Evaluation Criteria for IT Security.Part 1:Introduction and General Model.2nd ed.2005.(Available at URL:http://standards.iso.org/ittf/PubliclyAvailableStandards/c040612_ISO_IEC_15408-1_2005(E).zip,accessed on April 14,2006)
  • 5Trusted Computing Group,TCG Architecture Overview,v1.2,28 April 2004.(Available at URL:https://www.trustedcomputinggroup.org/specs/IWG/TCG 1 0 Architecture_Overview.pdf,accessed on April 14,2006)
  • 6Gates B.Trustworthy Computing.Wired News,Jan.17,2002.(Available at URL:http://www.wired.com/news/business/0,1367,49826,00.html,accessed on April 14,2006)
  • 7Algirdas A,Jean-Claude L,Brian R,et al.Basic concepts and taxonomy of dependable and secure computting.IEEE Trans Dependable Secure,2004,1(1):11-33
  • 8Friedman B,Kahn P H Jr,Howe D C.Trust online.Comm of the ACM,2000,43(12):34-40
  • 9Lazowska E D,Patterson D A.Distributed computing.Science,2005,308(6),May (Available at URL:http://www.sciencemag.org/sciext/computers/,accessed on April 14,2006)
  • 10Beruardo E A,Huberman A,Free Riding on Gnutella.Tech Rept:SSL-00-63,XeroxPARC,2000.8

共引文献58

同被引文献12

  • 1刘会永,尹培生,孟洛明.基于业务的传送网故障测度新方法[J].电子学报,2007,35(1):185-189. 被引量:2
  • 2邓歆,孟洛明.一种新的SDH传送网的业务可用性分析方法[J].计算机工程,2007,33(3):108-110. 被引量:9
  • 3Roellgen C B. Polymorphic Cipher Theory [OL]. http://www. pmc-ciphers.com/technology/roellgen02generalizedPMCmodel.pdf.
  • 4Bucci M, Luzzi R. Design of Testable Random Bit Generators in Cryptographic Hardware and Embedded Systems[C]//CHES 2005. Springer-Verlag,2005:147-156.
  • 5Yin Yifeng, Li Xinshe, Hu Yupu. Fast S-box security mechanism research based on the polymorphic cipher[J]. Information Sciences, 2008,178(6):603-1610.
  • 6Ripeanu M , Foster I. Mapping the Gnutella Network ; Macro - scopic Properties of Large-scale Peer-to-Peer Systems [C]// IPTPS ' 02. MIT Faculty Club, Cambridge, MA, USA, March 2002.
  • 7Viega J. Practical Random Number Generation in Software[C] //Proc. 19th Annual Computer Security Applications Conference. Dec. 2003.
  • 8Goldreich O. Foundations of Cryptography Basic Tools [ M ] . Press Syndicate of the University of Cambridge, 2001:75-89.
  • 9Menezes A, Oorschot P, Vanstone S. Handbook of Applied Cryptography [M]. CRC, 1996 : 169-190.
  • 10Molina M, Niccolini S, Duffield N G. A Comparative Experimental Study of Hash Functions Applied to Packet Sampling[C]//Proceedings of ITC-19. Beijing, China, 2005.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部