期刊文献+

大规模应用P2P网络的特定资源搜索模型 被引量:3

Special Resources Searching Model of Large-Scope Application P2P Network
下载PDF
导出
摘要 Peer分布的广泛性、行为的动态性、传输的隐匿性以及P2P应用会引起网络环境的变化导致传统网络监控方法无法对P2P应用进行有效监控。针对上述问题,通过分析主流P2P应用,给出当前大规模应用的P2P网络抽象模型及其特征,针对该模型研究特定资源的搜索模型及其算法,建立P2P网络监控体系,实现网络的监控问题。 Universality of Peers' distribution, churning of Peers' behavior, anonymity of Peers' transmission and lnternet environment change caused by P2P application make traditional network monitoring method invalidly to P2P application. By analyzing the overlay structure and characteristics of Modern Large-Scope Application of P2P network(MLSA-P2P), this paper constructs MLSA-P2P model. Based on the model, it researches searching model and its algorithm of special resource, provides monitoring architecture of P2P network, and solves the problem of monitoring special resources of network.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第12期95-96,99,共3页 Computer Engineering
基金 国家发改委基金资助项目(CNGI-04-12-2A) 国家“242”信息安全计划基金资助项目(2005C47)
关键词 P2P网络 内容监控 搜索模型 P2P network content monitoring searching model
  • 相关文献

参考文献4

  • 1Kim M S, Young J W, Hong W K. Application-level Traffic Monitoring and Analysis on IP Networks[J]. ETRI Journal, 2005, 27(1): 1-22.
  • 2Stutzbach D, Rejaie R. Characterizing Unstructured Overlay Topologies in Modern P2P File-sharing Systems[C]//Proc. of Internet Measurement Conference. Berkeley, USA: [s. n.], 2005.
  • 3Guo Lei, Chen Songqing, Xiao Zhen, et al. A Performance Study of BitTorrent-like Peer-to-Peer Systems[J]. IEEE Journal on Selected Areas in Communications, 2007, 25 ( 1): 155-169.
  • 4Zhao Shanyu, Stutzbach D, Rejaie R. Characterizing Files in the Modem Gnutella Network: A Measurement Study[R]. University of Oregon, Technical Report: CIS-TR-05-05, 2006.

同被引文献25

  • 1何伟 李庆忠 郑永清 等.社区云计算环境中的一种数据分布与搜索策略.计算机研究与发展,2010,47:407-413.
  • 2Kemper A, Wiesner C. HyperQueries: Dynamic Distributed Query Processing on the Internet[ C ]//VLDB Conference. [ s. 1. ] :[s.n. ] ,2001.
  • 3Abiteboul S, Segoufin L. Active XML, Security and Access Control[ D]. [ s. 1.] :Tel Aviv University ,2001.
  • 4Huebsch R, Hellerstein J M, Lanham N, et al. Querying the in- ternet with pier[ C3//VLDB. [s. 1. ]: [s. n. ] ,2003.
  • 5Kurzyniec D, Wrzosek T, Drzewiecki D, et al. Towards self-or- ganizing distributed computing frameworks:the H20 approach [ J ]. Parallel Processing Letters ,2003,13 ( 2 ) :273-290.
  • 6Kossmann D. The state of the art in distributed query process- ing[J]. ACM Comput. Surv. ,2000,32(4) :422-469.
  • 7Mortier R, Narayanan D, Donnelly A, et al. Seaweed : distribu- ted scalable ad hoc querying[C]//ICDE Workshops. [ s. 1. ] : [ s. n. ] ,2006.
  • 8Pietzuch P R, Ledlie J, Shneidman J, et al. Network-aware op- erator placement for stream-processing systems[ C]//ICDE. [s.1.]:[s.n.l,2006.
  • 9WANG Jianyong, LI Yuling, GONG Futing. A new strategy of resource searching in unstructured P2P network [C]. Second International Conference on Communication Software and Networks, 2010: 32-36.
  • 10余一娇,金海.对等网络中的搭便车行为分析与抑制机制综述[J].计算机学报,2008,31(1):1-15. 被引量:67

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部