IIn order to improve the performance of wireless distributed peer-to-peer(P2P)files sharing systems,a general system architecture and a novel peer selecting model based on fuzzy cognitive maps(FCM)are proposed in this...IIn order to improve the performance of wireless distributed peer-to-peer(P2P)files sharing systems,a general system architecture and a novel peer selecting model based on fuzzy cognitive maps(FCM)are proposed in this paper.The new model provides an effective approach on choosing an optimal peer from several resource discovering results for the best file transfer.Compared with the traditional min-hops scheme that uses hops as the only selecting criterion,the proposed model uses FCM to investigate the complex relationships among various relative factors in wireless environments and gives an overall evaluation score on the candidate.It also has strong scalability for being independent of specified P2P resource discovering protocols.Furthermore,a complete implementation is explained in concrete modules.The simulation results show that the proposed model is effective and feasible compared with min-hops scheme,with the success transfer rate increased by at least 20% and transfer time improved as high as 34%.展开更多
Combining the characteristics of peer-to-peer (P2P) and grid, a super-peer selection algorithm--SSABC is presented in the distributed network merging P2P and grid. The algorithm computes nodes capacities using their...Combining the characteristics of peer-to-peer (P2P) and grid, a super-peer selection algorithm--SSABC is presented in the distributed network merging P2P and grid. The algorithm computes nodes capacities using their resource properties provided by a grid monitoring and discovery system, such as available bandwidth, free CPU and idle memory, as well as the number of current connections and online time. when a new node joins the network and the super-peers are all saturated, it should select a new super-peer from the new node or joined nodes with the highest capacity. By theoretical analyses and simulation experiments, it is shown that super-peers selected by capacity can achieve higher query success rates and shorten the average hop count when compared with super-peers selected randomly, and they can also balance the network load when all super-peers are saturated. When the number of total nodes changes, the conclusion is still valid, which explains that the algorithm SSABC is feasible and stable.展开更多
One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying que...One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process.展开更多
With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as ...With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail.展开更多
Various kinds of active worms have been plunging into the network flows, which make the Internet security problem more serious. Our research on a potential propagation approach of active worms, P2P-based propagation a...Various kinds of active worms have been plunging into the network flows, which make the Internet security problem more serious. Our research on a potential propagation approach of active worms, P2P-based propagation approach, is given in this paper. To measure the propagating performance of our approach, the SEI (Susceptible-Exposed-Infected) propagation model is presented. It proves that with the idea of pure P2P architecture, worms can be hidden in the early stage of propagation, and then infect most of the hosts in a shorter period. By comparing our SEI propagation model with the Simple Epidemic Model, we observe that the size of a worm is a significant parameter which can affect the propagating performance. When the size of the worm becomes large, our approach can still show an excellent propagating performance.展开更多
The peer-to-peer(P2P) file-sharing network as a vehicle of disseminating files has become very popular. The appearance of dozens of kinds of passive worms on this network has, however, made it unsecured. This proble...The peer-to-peer(P2P) file-sharing network as a vehicle of disseminating files has become very popular. The appearance of dozens of kinds of passive worms on this network has, however, made it unsecured. This problem has been paid attention and a few of models for passive worm propagation has been presented. Unfortunately, the dynamic properties of this network are ignored in these models. Given the fact, the characteristics of both this network and the passive worm are identified, and on this basis a new mathematical model of passive worm propagation on the P2P network is presented in applying epidemiology in this paper. Note that the dynamic properties of this network are considered in the presented model. The model has been validated by large scale simulation experiments, which demonstrates that the presented model may be used for analyzing the behaviors of passive worms and predicting the trend of their propagation.展开更多
This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on...This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on the analysis on the protocols of realistic P2P systems, a software which can be used to simulate the P2P network environment and the propagation of P2P active worm is imple- mented in this paper. A large number of simulation experiments are performed using the developed simulation software. The results from these simulation experiments validate the proposed model, which means that the model can be used to analyze the spreading behaviors of the P2P active worm and predict its trend.展开更多
For Peer-to-Peer (P2P) streaming services in mobile networks, the selection of appropriate neighbour peers from candidate peers with demanding data is an important approach to improve Quality-of-Service (QoS). This pa...For Peer-to-Peer (P2P) streaming services in mobile networks, the selection of appropriate neighbour peers from candidate peers with demanding data is an important approach to improve Quality-of-Service (QoS). This paper proposes a novel Effective Capacity Peer Selection (ECPS) scheme based on effective capacity. In the ECPS scheme, the neighbour peer selection problem was modeled using the Multiple Attribute Decision Making (MADM) theory, which considered multiple factors of candidate peers, including Signal to Interference and Noise Ratio (SINR), residency time, power level, security, moving speed, and effective capacity. This model could increase the suitability of ECPS for wireless mobile environments. Then, the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) was used to solve the MADM problem and identify the preferred neighbour peers. Simulation results show that the ECPS scheme can improve the network throughput, reduce packet delay by about 82%, and almost double the packet delivery ratio of the mobile P2P streaming service.展开更多
在分析现有P2P(peer to peer)路由算法的基础上,提出了一种基于二阶矩定位、支持多维资源数据描述的高效资源路由算法——FAN(flabellate addressable network)路由算法.FAN算法将节点映射到统一的多维笛卡尔空间,并以节点相对空间原点...在分析现有P2P(peer to peer)路由算法的基础上,提出了一种基于二阶矩定位、支持多维资源数据描述的高效资源路由算法——FAN(flabellate addressable network)路由算法.FAN算法将节点映射到统一的多维笛卡尔空间,并以节点相对空间原点的二阶矩作为子空间管理和资源搜索的依据.FAN路由算法具有O(log(N/k))的高路由效率,在节点加入和退出FAN网络时,更新路由信息的代价为O(klog(N/k)).实验结果表明,FAN路由算法具有路由效率高、维护代价小的优点,是一种P2P环境中支持多维资源数据描述的高效结构化资源路由算法.而且,目前部分基于CAN(content-addressable network)网络的改进算法也可以在FAN网络中适用,并获得更好的路由效率和更低的维护代价.展开更多
基金Sponsored by the National Natural Science Foundation of China(Grant No.60672124 and 60832009)Hi-Tech Research and Development Program(National 863 Program)(Grant No.2007AA01Z221)
文摘IIn order to improve the performance of wireless distributed peer-to-peer(P2P)files sharing systems,a general system architecture and a novel peer selecting model based on fuzzy cognitive maps(FCM)are proposed in this paper.The new model provides an effective approach on choosing an optimal peer from several resource discovering results for the best file transfer.Compared with the traditional min-hops scheme that uses hops as the only selecting criterion,the proposed model uses FCM to investigate the complex relationships among various relative factors in wireless environments and gives an overall evaluation score on the candidate.It also has strong scalability for being independent of specified P2P resource discovering protocols.Furthermore,a complete implementation is explained in concrete modules.The simulation results show that the proposed model is effective and feasible compared with min-hops scheme,with the success transfer rate increased by at least 20% and transfer time improved as high as 34%.
基金The National High Technology Research and Development Program of China (863 Program) (No.2007AA01Z422)the NaturalFoundation of Anhui Provincial Education Department (No.2006KJ041B,KJ2007B073)
文摘Combining the characteristics of peer-to-peer (P2P) and grid, a super-peer selection algorithm--SSABC is presented in the distributed network merging P2P and grid. The algorithm computes nodes capacities using their resource properties provided by a grid monitoring and discovery system, such as available bandwidth, free CPU and idle memory, as well as the number of current connections and online time. when a new node joins the network and the super-peers are all saturated, it should select a new super-peer from the new node or joined nodes with the highest capacity. By theoretical analyses and simulation experiments, it is shown that super-peers selected by capacity can achieve higher query success rates and shorten the average hop count when compared with super-peers selected randomly, and they can also balance the network load when all super-peers are saturated. When the number of total nodes changes, the conclusion is still valid, which explains that the algorithm SSABC is feasible and stable.
文摘One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process.
基金supported by the National Natural Science Foundation of China under Grant No. 60873075
文摘With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail.
基金Supported by the National Natural Science Foun-dation of China (60473073)
文摘Various kinds of active worms have been plunging into the network flows, which make the Internet security problem more serious. Our research on a potential propagation approach of active worms, P2P-based propagation approach, is given in this paper. To measure the propagating performance of our approach, the SEI (Susceptible-Exposed-Infected) propagation model is presented. It proves that with the idea of pure P2P architecture, worms can be hidden in the early stage of propagation, and then infect most of the hosts in a shorter period. By comparing our SEI propagation model with the Simple Epidemic Model, we observe that the size of a worm is a significant parameter which can affect the propagating performance. When the size of the worm becomes large, our approach can still show an excellent propagating performance.
文摘The peer-to-peer(P2P) file-sharing network as a vehicle of disseminating files has become very popular. The appearance of dozens of kinds of passive worms on this network has, however, made it unsecured. This problem has been paid attention and a few of models for passive worm propagation has been presented. Unfortunately, the dynamic properties of this network are ignored in these models. Given the fact, the characteristics of both this network and the passive worm are identified, and on this basis a new mathematical model of passive worm propagation on the P2P network is presented in applying epidemiology in this paper. Note that the dynamic properties of this network are considered in the presented model. The model has been validated by large scale simulation experiments, which demonstrates that the presented model may be used for analyzing the behaviors of passive worms and predicting the trend of their propagation.
文摘This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on the analysis on the protocols of realistic P2P systems, a software which can be used to simulate the P2P network environment and the propagation of P2P active worm is imple- mented in this paper. A large number of simulation experiments are performed using the developed simulation software. The results from these simulation experiments validate the proposed model, which means that the model can be used to analyze the spreading behaviors of the P2P active worm and predict its trend.
基金supported in part by the National Natural Science Foundation of China under Grant No. 60902047the Fundamental Research Funds for the Central Universities under Grant No. BUPT2013RC0111
文摘For Peer-to-Peer (P2P) streaming services in mobile networks, the selection of appropriate neighbour peers from candidate peers with demanding data is an important approach to improve Quality-of-Service (QoS). This paper proposes a novel Effective Capacity Peer Selection (ECPS) scheme based on effective capacity. In the ECPS scheme, the neighbour peer selection problem was modeled using the Multiple Attribute Decision Making (MADM) theory, which considered multiple factors of candidate peers, including Signal to Interference and Noise Ratio (SINR), residency time, power level, security, moving speed, and effective capacity. This model could increase the suitability of ECPS for wireless mobile environments. Then, the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) was used to solve the MADM problem and identify the preferred neighbour peers. Simulation results show that the ECPS scheme can improve the network throughput, reduce packet delay by about 82%, and almost double the packet delivery ratio of the mobile P2P streaming service.
基金国家高技术研究发展计划(863)(the National High- Tech Research and Development Plan of China under Grant No.2005AA1032)中国下一代互联网示范项目(the China Next Generation Internet(CNGI) under Grant No.CNGI-04-15-2A)