期刊文献+

BitTorrent种子覆盖网络模型

原文传递
导出
摘要 本文分析了BitTorrent文件系统的工作流程,指出了系统在路由方式上的缺点。介绍了覆盖技术,详细分析了弹性网络覆盖技术,说明了其路由选择的灵活性。提出了一种BitTorrent种子覆盖网络模型,将弹性网络覆盖技术引入BitTorrent文件系统,使得BitTorrent文件系统能够依据端用户和应用程序的需求灵活选择路由,有效改善了BitTorrent网络性能。
作者 匡巧艳
出处 《网络安全技术与应用》 2008年第12期27-29,共3页 Network Security Technology & Application
  • 相关文献

参考文献3

二级参考文献13

  • 1李江涛,姜永玲.P2P流量识别与管理技术[J].电信科学,2005,21(3):57-61. 被引量:43
  • 2Karagiannis T, Broido A, Faloutsos M, et al. Transport Layer Identification of P2P Traffic[C]. Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, Taormina, Italy, 2004.
  • 3P-Cube Inc. Approaches to Controlling Peer-to-Peer Traffic: A Technical Analysis[EB/OL]. http://www.pcube.com/doc_root/products/Engage/WP_Approaches_Controlling_P2P_Traffic_31403,pdf,2004.
  • 4Pouwelse J,Garbacki P,Epema D,et al.A Measurement Study of the Bittorrent Peer-to-peer File-sharing System[R].TR:PDS-2004-007,Delft University of Technology,2004-04.
  • 5de Veciana G,Yang X.Fairness,Incentives and Performance in Peer-to-peer Networks[C].Forty-first Annual Allerton Conference on Communication,Control and Computing,Onticello,IL,2003-10.
  • 6Qiu D,Srikant R.Modeling and Performance Analysis of Bit Torrent-like Peer-to-peer Networks[C].ACM SIGCOMM,Portland,OR,USA,2004-08.
  • 7Field Security Operations Defense Information Systems Agency.Voice Over Internet Protocol(VOIP)Security Technical Implementation Guide[]..
  • 8Robert Stone,UUNET Technologies,Inc.CenterTrack:An IP Overlay Network for Tracking DoS Floods[]..
  • 9Zhenhai Duan_,Zhi-Li Zhang,Dept.of Computer Science&Engineering,University of Minnesota,Yiwei Thomas Hou,Bradley Dept.of Electrical&Computer Engineering.Virginia Tech.Service Overlay Networks:SLAs,QoS and Bandwidth Provisioning[]..
  • 10David Andersen,Hari Balakrishnan,Frans Kaashoek,and Robert Morris.MIT Laboratory for Computer Science[].Resilient Overlay Networks.

共引文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部