期刊文献+

P2P文件共享系统的拓扑度分析及其仿真

Analysis and Simulation of Topology Degree of P2P File Sharing System
下载PDF
导出
摘要 在P2P系统的研究中,网络的拓扑特性分析是一个重要的研究方向。本文首先针对一个实际的P2P系统,建立了基于事件驱动的演化模型。然后在模型的基础上,通过分析网络中各种基本事件的发生对网络拓扑度的影响,导出了网络度分布方程,借助生成函数将方程转化为微分方程,并对其进行分析求解,得到了度分布的解析表达式。最后通过仿真说明了模型的有效性以及解的物理意义。 In the study of P2P system, analysis of the topological characteristics of the network is an important research direction. In this paper we first construct an evolution model based on event - driven for an actual P2P system. By analyzing the influence of each basic event to the network topology degree, we then derive a degree distribution equations based on the model. By using the generating function we transform the equation into the resulting differential equation, analytically solve it and get the analytical expression of the degree distribution. We finally show the validity of the model and the physical meaning of the solutions by simulation.
出处 《网络新媒体技术》 2012年第4期23-30,共8页 Network New Media Technology
基金 国家自然科学基金会(61174124 60935001) 国家863计划项目(2011AA01A107)资助课题
关键词 P2P文件共享系统 演化模型 度分布 仿真 P2P file - sharing system, Evolution model, Degree distribution, Sinmlation
  • 相关文献

参考文献14

  • 1Shuang Deng. Empirical Model of WWW Document Arrivals at Access Link[M].GTE Laboratories,Inc,IEEE ICC,Waltham,MA,1996.
  • 2Mihajlo Jovanovi(c). Modeling Peer-to-Peer Network Topologies Through "Small-World" Models AND Power Laws[A].University of Cincinnati,2001.
  • 3M.E.J.Newman. The Structure and Function of Complex Networks[J].Slam Review,2003,(02):167-256.
  • 4R.Albert,A.L.Barabási. Topology of Evolving Networks:Local Events and Universality[J].Physical Review Letters,2000,(24):5234-5237.doi:10.1103/PhysRevLett.85.5234.
  • 5Zihui Ge,Daniel R.Figueiredo,Sharad Jaiswal,Jim Kurose. Modeling Peer-Peer File Sharing Systems[M].Department of Computer Science,IEEE,University of Massachusetts,2003.2188-2198.
  • 6Pouwelse J.A,Garbacki P,Epema D H J. The bit torrent P2P file-sharing system:measurements and analysis[A].2005.205-216.
  • 7A.Iamnitchi,M.Ripeanu,I.Poster. Small-World File-Sharing Communities[M].Department of Computer Science,IEEE,The University of Chicago,2004.
  • 8Cristopher Moore,Gourab Ghoshal,M.E.J.Newman. Exact solutions for models of evolving networks with addition and deletion of nodes[J].Physical Review,2006,(03):036121.
  • 9Daniel Stutzbach,Reza Rejaie. Characterizing Churn in Peer-to-Peer Networks[R].University of Oregon,2005.
  • 10M.E.J.Newman. The structure and function of complex networks[J].Slam Review,2003,(02):167-256.

二级参考文献53

  • 1姚园园,张志鸿.从复杂网络角度对即时消息网络进行拓扑建模[J].微计算机信息,2006(08X):207-209. 被引量:7
  • 2王磊,周淑华,袁坚,任勇,山秀明.虚拟网络行为对互联网整体特性的影响[J].物理学报,2007,56(1):36-42. 被引量:16
  • 3Saroiu S, Gummadi PK, Gribble SD. A measurement study of peer-to-peer file sharing systems. In: Proc. of the Multimedia Computing and Networking 2002 (MMCN 2002). 2002. 156-170. http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf
  • 4Liang J, Kumar R, Ross KW. The KaZaA overlay: A measurement study. In: Proc. of the 19th IEEE Annual Computer Communications Workshop. 2004. http://cis.poly.edu/-ross/papers/KazaaOverlay.pdf
  • 5Liang J, Kumar R, Ross KW. Understanding KaZaA. 2004. http://cis.poly.edu/-ross/papers/UnderstandingKaZaA.pdf.
  • 6Liang J, Kumar R, Xi Y, Ross KW. Pollution in file sharing systems. In: Proc. of the IEEE Infocom 2005. 2005. http://cis.poly.edu/-ross/papers/pollution.pdf
  • 7Sen S, Wang J. Analyzing peer-to-peer traffic across large networks. In: Proc. of the 2nd ACM SIGCOMM Workshop on Internet Measurement Workshop. 2002. http://citeseer.ist.psu.edu/sen02analyzing.html
  • 8Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M. Is P2P dying or just hiding. In: Proc. of the IEEE Globecom 2004. 2004. 1532-1538. http://www.caida.org/outreach/papers/2004/p2p-dying/p2p-dying.pdf
  • 9Soldani C. Peer-to-Peer behavior detection by tcp flows analysis (End-of-Study Dissertation). University of Liege, 2004. http://www.run.montefiore.ulg.ac.be/-soldani/P2P_Behaviour_Detection.pdf
  • 10Sen S, Spatscheck O, Wang DM. Accurate, scalable in-network identification of P2P traffic using application signatures. In: Proc of the 13th Int'1 WWW Conf. 2004. http://www2004.org/proceedings/docs/lp512.pdf

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部