期刊文献+

P2P网络的实时性问题 被引量:1

Real-time performance of peer-to-peer network
下载PDF
导出
摘要 由于P2P网络的动态性、分散性和半可信性,其实时性研究和应用成为公认的难题。当前P2P多媒体应用系统和实时计算系统或多或少采用了实时保障措施,但均没有对P2P实时性进行系统研究。在总结现有P2P网络系统采用的实时技术的基础上,分析了P2P网络结构、搜索协议(算法)和任务调度对实时性的影响,提出P2P网络实时性研究存在的问题,总结出P2P实时性研究需要解决的关键技术。 However,due to the instability, decentralization and semi-trust of the peer-to-peer network,real-time research is a well-known difficult problem. Though many measures had been applied to deal with this problem, there was no systemative research of real-time performance. This paper summarized the real-time technology of P2P network in the past few years, then analyzed the relationship between real-time performance and P2P network architecture, searching protocol (algorithm) , task scheduling. In the end, put forward the remaining difficulties and key technologies of real-time performance.
出处 《计算机应用研究》 CSCD 北大核心 2011年第1期20-24,共5页 Application Research of Computers
基金 福建省自然科学基金资助项目(2008J0034) 成都大学人才引进基金资助项目(201001)
关键词 对等网络 实时性 网络结构 搜索算法 任务调度 peer-to-peer(P2P) real-time performance network architecture searching scheduling
  • 相关文献

参考文献26

  • 1RATNASAMY S,FRANCIS P,HANDLEY M.A scalable content-addressable network[C]//Proc of Conference on Applications,Techno-logies,Architectures,and Protocols for Computer Communications.New York:ACM Press,2001:161-172.
  • 2ANDERSON D P,COBB J,KORPELA E,et al.SETI@home: an experiment in public-resource computing[J].Communications of the ACM,2009,45(11):56-61.
  • 3HUANG Fai,RAVINDRAN B,JENSEN E D.RT-P2P:a scalable real-time peer-to-peer system with probabilistic timing assurances[C]//Proc of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.Washington DC:IEEE Computer Society,2008:97-103.
  • 4NapsterInc.Thenapsterhomepage[EB/OL].(2001)[2010-06-21].http://www.napster.com/.
  • 5GnutellaInc.TheGnutellahomepage[EB/OL].(2001)[2010-06-21].http://gnutella.wego.com/.
  • 6GKANTSIDIS C,MIHAIL M,SABERI A.Hybrid search schemes for unstructured peer-to-peer networks[C]//Proc of the 24th Annual Joint Conference of IEEE Computer and Communications Societies.Washington DC:IEEE Communications Society,2005:1526-1537.
  • 7YANG B,GARCIA-MOLINA H.Improving search in peer-to-peer networks[C]//Proc of the 22nd International Conference on Distributed Computing Systems.Washington DC:IEEE Computer Society,2002:5-14.
  • 8LV Qin,CAO Pei,COHEN E,et al.Search and replication in unstructured peer-to-peer networks[C]//Proc of the 16th International Conference on Supercomputing.New York:ACM Press,2002:84-95.
  • 9HAN Kai,RAVINDRAN B,JENSEN E D.RTG-L:dependably sche-duling real-time distributable threads in large-scale,unreliable networks[C]//Proc of the 13th IEEE Pacific Rim International Symposium on Dependable Computing.Washington DC:IEEE Computer Society,2007:314-321.
  • 10ZHANG Bo,HAN Kai,RAVINDRAN B,et al.RTQG:real-time quorum-based gossip protocol for unreliable networks[C]//Proc of the 3rd International Conference on Availability, Reliability and Security.Washington DC:IEEE Computer Society,2008:564-571.

二级参考文献82

共引文献39

同被引文献9

  • 1NIU X Z. Research on Key Issues of Mobile Peer-to-peer Networks[D].Chengdu: University of Electronic Science and Technology ofChina, 2008.
  • 2HAN J S, LEE K J,SONG J W, et al. Mobile peer-to-peer systemsusing super peers for mobile environments[CJ//ICOINy 08. New York,USA, c2008: 1-4.
  • 3LIU S H. Research on Peer Selection Algorithm of Mobile P2P Net-works [D].Chengdu: University of Electronic Science and Technologyof China, 2012.
  • 4XIA H L, WANG N. Neighbour peer selection scheme based on effec-tive capacity for mobile peer-to-peer streaming[J]. Digital Communi-cations, 2013,10(5):89-98.
  • 5PALOMAR E. Dealing with sporadic strangers, or the (un)suitabilityof trust for mobile P2P security[C]//The 18th International Workshopon Database and Expert Systems Applications. Piscataway, IEEE Press,c2007: 779-783.
  • 6ZHENG Y. A conceptual architecture of a trusted mobile environ-ment[C]//The Second International Workshop on Security, Privacy andTrust in Pervasive and Ubiquitous Computing. Piscataway, IEEE Press,C2006: 75-81.
  • 7PENG H. Research on Security Schemes in Complex Peer to PeerNetwork Systems [D].Shanghai: Shanghai Jiaotong University,2012.
  • 8WANG X Y,XIAO Y M. Game Theory and its Application[M]. Bei-jing: Science Press, 2008.
  • 9冯文峰,皇运才.无线传感网络中SINR模型下MIS算法的研究[J].微电子学与计算机,2014,31(6):166-170. 被引量:1

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部