156 resultados para P2P


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hoje em dia, distribuições de grandes volumes de dados por redes TCP/IP corporativas trazem problemas como a alta utilização da rede e de servidores, longos períodos para conclusão e maior sensibilidade a falhas na infraestrutura de rede. Estes problemas podem ser reduzidos com utilização de redes par-a-par (P2P). O objetivo desta dissertação é analisar o desempenho do protocolo BitTorrent padrão em redes corporativas e também realizar a análise após uma modificação no comportamento padrão do protocolo BitTorrent. Nesta modificação, o rastreador identifica o endereço IP do par que está solicitando a lista de endereços IP do enxame e envia somente aqueles pertencentes à mesma rede local e ao semeador original, com o objetivo de reduzir o tráfego em redes de longa distância. Em cenários corporativos típicos, as simulações mostraram que a alteração é capaz de reduzir o consumo médio de banda e o tempo médio dos downloads, quando comparados ao BitTorrent padrão, além de conferir maior robustez à distribuição em casos de falhas em enlaces de longa distância. As simulações mostraram também que em ambientes mais complexos, com muitos clientes, e onde a restrição de banda em enlaces de longa distância provoca congestionamento e descartes, o desempenho do protocolo BitTorrent padrão pode ser semelhante a uma distribuição em arquitetura cliente-servidor. Neste último caso, a modificação proposta mostrou resultados consistentes de melhoria do desempenho da distribuição.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

经无数次的讨论和修改之后,Freenet项目组终于决定对支撑其系统的关键技术路由算法重新审视,并提出了NGRouting设计发展计划,该文根据这一计划,从P2P通用的路由定位方式出发,分析了当前的Freenet路由模式,讨论了其不足,对NGRouting进行了介绍,最后对freenet NGRouting的优势分析并总结。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

本文以动态开放的对等协作应用环境为背景,围绕实现安全协作存在的公平性、真实性和策略实施一致性安全需求,针对其中的激励机制、声誉系统、索引系统和访问控制授权管理等关键安全机制进行了深入研究,取得了如下研究成果: 第一, 针对P2P文件共享应用环境,提出一种改进的结环交换激励机制,在降低整体开销的同时,通过改变额外开销的分配关系抑制由于激励机制本身漏洞引发的自私行为和恶意攻击。 第二, 分析共享文件应用中服务真实性对声誉和索引数据的真实性的依赖关系,提出刻画服务真实性安全需求的P2P-CW完整性策略模型,用于指导P2P声誉和索引系统中相关安全机制的设计与分析。 第三, 提出在声誉管理系统层次通过保证声誉数据与计算过程的完整性,提高P2P声誉真实性;利用可信计算和虚拟机技术,设计分布式的安全声誉管理系统——可信声誉管理服务架构TRMS,提供更为可信、准确和可用的声誉数值,并兼顾系统整体的低开销、高扩展和强健壮等需求。 第四, 针对分布式结构化索引系统中的索引数据真实性保护问题,提出“安全索引验证机制”的概念;并设计基于数字签名和Bloom Filter的索引验证机制Prosiv,有效遏制索引污染攻击的同时,最小化索引系统的额外开销。 第五, 分析无仲裁者互操作环境下的远程约束实施问题,提出“约束安全互操作”的概念;提出并改进基于冲突闭包的约束冲突检测算法,由只具备局部信息的成员域协作实现职责分离约束的全局一致实施。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

面向对等计算的信任度评估提出了一种新的信任管理量化算法,该算法解决了已有算法不能很好解决的信任时间衰减特性和节点联盟等问题,系统地对目前有代表性的网络信任评估算法进行了总结和分析,并对当前相关的国内外研究热点作了分类,同时给出了信任相关的一些定义以及算法应该考虑的问题,并提出一套完整解决问题的算法.定义了信任时间矫正函数、域信任矫正函数、信任值校准函数和准确度函数,并构造了信任时间矫正算法与域矫正算法,通过推导说明本算法具有良好的时间衰减性、历史经验相关性、新入节点奖励特性和联盟特性,同时给出了一般性的信任自然衰减曲线和8种典型特征域的系数变化范围.通过实验评价了算法的正确性和有效性,并和Azzedin算法进行比较,表明提出的算法效率和准确性有了显著的提高.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

资源发现技术是根据给定的资源描述,在网络中自动找到相应资源的技 术,该技术能够智能地满足网络中应用和指挥任务执行时对资源信息的需求, 并且能够为资源的管理和监控提供一定支持。 现有的资源发现技术研究主要针对地面的网格、P2P网络和移动Ad hoc 网络等。卫星网络作为一种特殊的移动网络,其中节点的星载CPU 处理能力 和存储能力都无法与地面设备相提并论。同时,由于卫星网络具有拓扑结构 动态变化、空间无线信道时延长、误码率较高等特性,使得现有的地面网络 资源发现协议不能直接应用于卫星网络,因此设计高效的卫星网络资源发现 协议将有助于促进卫星网络的复杂应用和智能控制。 本文提出了一种针对移动卫星网络的分布式资源发现协议SatRDP, 针对 卫星网络中节点的移动性、星间链路时延和不同星座组网结构等情况,设计 了协议的体系结构以及相应的分布式资源信息存储和广告策略、需求路由和 回溯策略。经过分析,SatRDP 能够更好地适应移动卫星网络,提高资源发现 成功率,节省卫星节点的存储资源,在一定程度上降低协议开销。 最后,设计了仿真实验平台,对算法进行了初步的实验,并与传统的分 布式资源发现协议 FLOOD 进行比较。实验结果表明,SatRDP 协议更适合卫 星网络环境,有更高的发现成功率、发现效率和更小的需求包开销。最后总 结并指出了移动卫星网络资源发现技术进一步的研究方向。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

网络编码允许网络节点在传统数据转发的基础上参与数据处理,已成为提高网络吞吐量、鲁棒性和安全性的有效方法.在介绍网络编码基本原理的基础上,比较了集中式和分布式网络编码构造方法的优缺点,并对实用网络编码设计中涉及的同步、纠错、编解码速度等问题进行了评述;进而,对网络编码在无线网络、P2P系统、分布式文件存储和网络安全等领域的最新应用进行了总结;最后对网络编码的理论和应用研究的发展趋势进行了分析与展望.设计简单高效的实现机制,并与其他领域的技术如信道编码与调制、路由算法、队列调度以及流媒体技术等的结合,将是网络编码发展的一个重要趋势.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

利用同步辐射光电子能谱研究了室温下Na吸附下于P型InP(100)表面对其氮化反应的影响,通过P2p、In 4d芯能级谱的变化,对Na/InP(100)表面的氮化反应的研究表明,碱金属Na的吸附对InP(100)无明显的催化氮化作用,即使采用N_2/Na/N_2/Na/N_2/Na/InP(100)的类多层结构,在室温下也只有极少量的氮化物形成,而无明显的催化氮化反应发生.碱金属吸附层对III-V族半导体氮化反应的催化机制不同于碱金属对于元素半导体的催化反应机制,碱金属对元素半导体的催化氮化反应,吸附的碱金属与元素半导体衬底之间无需界面反应发生,而碱金属吸附层和III-V族半导体衬底之间发生界面反应而形成的表面缺陷在III-V族半导体的催化氮化反应过程中具有重要的作用.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

近年来,无线通信技术的渗透和微型嵌入式计算设备的增加加速了泛在环境的发展。现在,泛在网络开发的一个基本障碍是缺乏编程抽象。本文围绕这一前沿领域,研究网络编程逻辑抽象。主要结果有: 1.研究了定义网络全局性质的递归查询的分布式计算。一阶逻辑及不动点逻辑可以抽象地描述网络全局性质,本文阐明它们的计算可以充分且有效地分布在网络上,并且具有合理的复杂度上限。本文证明在有限度的同步网络上,一阶逻辑查询的分布式计算具有对数的节点内计算复杂度和消息长度、线性的分布式计算复杂度以及多项式的单节点消息复杂度上界。不动点查询的分布式计算具有类似的复杂度,只是它具有多项式的分布式计算复杂度。 2. 研究了定义网络节点的本地行为的网络声明式语言。本文规定了递归的规则语言Netlog的语法。Netlog被用来声明式地描述网络环境下的分布式计算,特别是通讯协议和P2P系统等。Netlog语言以Datalog语言为基础,囊括了尽可能完备的网络应用所需要的原语,包括通讯原语、聚合函数、时效声明、间歇性触发、数据更新以及非确定性选择操作。本文定义了Netlog语言的分布式不动点语义,不仅定义了节点内的计算,而且明确的纳入了节点间的通信,解决了声明式网络语义不确定的问题。同时,本文定义了良好的Netlog程序和强良好的Netlog程序,并证明当良好的程序在同步系统上计算,或者强良好的程序在异步系统上计算,它们在三种复杂度衡量标准,即分布式计算复杂度、单节点消息复杂度和节点单回合计算复杂度下都具有多项式的上限。另外,还证明了强良好的程序的计算结果不受网络有限个数的消息丢失的影响。 Netquest小组开发了Netquest系统以支持Netlog语言并实现其分布式不动点语义。Netquest系统依赖于网络节点上的嵌入式DBMS,这不仅简化了系统的开发,也增强了它在多机种的网络上的可移植性,并且支持数据密集型的应用。此外,Netlog编译器还具备优化模块,可以进一步减轻开发者的负担。一些用Netlog程序编写的经典的分布式算法和网络应用程序已经在网络模拟平台和包含多种计算设备的平台上进行了实验。 3. 进一步考虑了以上两种层面的网络编程逻辑抽象语言的纵向编译。本文阐述了如何将在全局层面表达网络性质的一阶逻辑及不动点查询翻译为在本地层面描述节点行为的Netlog程序。本文设计了普适性的算法,将集中式的Datalog否定程序翻译为分布式的Netlog程序;再加上将一阶逻辑及不动点逻辑翻译为Datalog否定语言的经典结果,从而完成了纵向编译。 4.定义了以上两种网络编程逻辑抽象语言的片段,包括局部的一阶逻辑及不动点查询、节俭的以及强节俭的Netlog程序。它们在表达能力和分布式计算复杂度之间有良好的折中。它们尽可能地保留了分布式计算的局部特性,在定义网络功能上具有丰富的表达能力,并且具有更加紧致的复杂度上限,即具有常数的或者二次的消息复杂度、线性的或者二次的分布式计算复杂度和常数的节点单回合计算复杂度。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

随着Internet技术的飞速发展,流媒体分发技术取得了长足的进步,同时,日益增加的用户、视频数据和流媒体交互式需求,也给大规模流媒体分发服务带来了新的挑战。另外一方面,随着宽带无线接入技术发展的日新月异,如何有效利用多种接入方式为用户提供更高质量的流媒体服务是当前通信技术领域迫切需要解决的问题。本文对基于应用层支持交互式的P2P流媒体分发技术及基于传输层支持Multihoming的SCTP流媒体传输技术进行了相关研究,主要贡献和创新点如下: 第一、提出了一种支持随机访问的协作式P2P流媒体分发方案。该方案采用平衡二叉树将媒体对象进行分布式分段预取缓存,用于媒体流快速定位,利用缓存重叠机制构建非结构化网络,用于节点间常规媒体流分发。分别设计了媒体预取算法及邻居节点搜索算法,给出了节点失效恢复策略及支持随机访问的协作过程。仿真试验结果表明,在随机访问及网络波动过程中,该方案能够提供高平滑质量的P2P媒体流服务。 第二、提出了一种基于数据驱动及分布式存储的P2P VoD解决方案。该方案融合了平衡多叉树与基于数据驱动的随机图网络两种拓扑。利用gossip算法构建和维护随机图网络中的邻居节点关系,采用数据驱动机制进行邻居节点间媒体流的分发,进一步降低了源服务器的负载。设计了一种基于平衡多叉树的分布式预取缓存算法,提高了随机访问的搜索效率。仿真试验结果和分析表明,两种网络拓扑的协作机制有效地解决了P2P VoD中视频传输及交互式操作问题。 第三、设计和实现了一种基于Trace驱动及SCTP的MPEG-4视频传输评估平台Evalvid-SCTP。Evalvid-SCTP提供了在仿真环境下SCTP流媒体实时传输及视频质量评估的解决方案。在Multihoming环境下,Evalvid-SCTP可以有效地分析SCTP在不同网络条件和负载下的流媒体传输行为特征和传输质量。 第四、提出了SCTP流媒体单路径传输最佳协议参数配置策略及多路径并行传输策略。评估了在单路径传输机制下快速重传策略、超时重传策略、路径故障检测门限值设置,三者配合时在多种网络条件下的流媒体传输性能,并综合以上各种发现提出了在不同的路径条件下应该采取的重传路径选择策略以及路径故障检测门限值设置方案。评估了在多路径并行传输下融合SCTP部分可靠特性的流媒体传输性能,提出了针对流媒体传输,多路径并行传输应采取的策略。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

随着网格、P2P、无线通信网等技术的普及和飞速发展,访问控制技术取得了长足的进步,同时也面临着巨大的挑战。如何构建安全、灵活、可扩展的访问控制模型是这种新型网络环境下访问控制技术迫切需要解决的问题。本文围绕该环境中的访问控制需求,从委托模型、基于位置的访问控制模型、P2P环境下的动态信任评估模型以及访问控制模型的形式分析四个方面,对访问控制模型研究领域出现的若干关键技术展开研究,取得了以下四个方面的主要成果:第一,在分析Bertino等人提出的一个基于周期时间的访问控制模型的基础之上,指出它虽然可以清晰地表达访问权限可适用的时间范围,但模型本身并没有对已经具有权限的用户如何使用和传播权限强加任何限制,难以实施权限委托这一安全策略。针对这一缺陷,我们讨论了用户到用户的委托访问权限的限制,对权限委托的临时性、时序依赖性和受限传播性这些约束特性进行形式化建模,给出了基于周期时间的自主委托模型PDACDM的形式化定义及其一致性证明。第二,在分析前人所做的各种上下文研究工作的基础上,借助数学的形式语言,给出了一种依赖于空间上下文的访问控制模型SC-RBAC。该模型采用层次式的位置模型给空间客体建模,采用逻辑位置表达不同粒度的位置,引入了空间角色和有效会话角色等概念,证明了层次化的空间角色集合在数学上可构建格模型以实施多级安全策略和中国墙策略,提出了3类空间限制,借鉴和改进了RBAC本身的安全属性,提出了一些新的安全不变量,证明了模型的基本安全定理,并给出了一个简单的应用实例。这一研究成果为解决无线移动网络中的访问控制问题奠定了理论基础。第三,指出了设计一个P2P环境下的信任评估模型需要考虑的主要因素,如时间因素、系统稳定性等。着重分析了P2P环境下的信任模型在识别不诚实反馈、防止恶意节点的策略性动态改变行为、计算节点间相似度、激励机制等方面的不足。给出了一个基于时间窗的动态信任评估模型TWTrust,统一考虑了信任、信誉与激励三者的关系。通过仿真试验结果证明,该模型在信任计算误差和事务失败率等性能指标上有较大提高,能较好处理恶意节点策略性动态改变行为、不诚实反馈对系统的攻击和相似度计算中的稀疏性问题。这一信任模型的提出有望简化P2P下访问控制的实施。第四,在深入分析和对比目前可用于规范和验证访问控制模型的形式化方法和证明工具的基础之上,选取了证明能力强的Isabelle证明系统对支持空间上下文的SC-RBAC模型进行了形式分析,总结了用Isabelle语言对SC-RBAC模型属性和规则进行形式规范的方法,并且研究了基于Isabelle系统证明模型规范内部一致性和正确性的实用方法。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A foundational issue underlying many overlay network applications ranging from routing to P2P file sharing is that of connectivity management, i.e., folding new arrivals into an existing overlay, and re-wiring to cope with changing network conditions. Previous work has considered the problem from two perspectives: devising practical heuristics for specific applications designed to work well in real deployments, and providing abstractions for the underlying problem that are analytically tractable, especially via game-theoretic analysis. In this paper, we unify these two thrusts by using insights gleaned from novel, realistic theoretic models in the design of Egoist – a prototype overlay routing system that we implemented, deployed, and evaluated on PlanetLab. Using measurements on PlanetLab and trace-based simulations, we demonstrate that Egoist's neighbor selection primitives significantly outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization. Moreover, we demonstrate that Egoist is competitive with an optimal, but unscalable full-mesh approach, remains highly effective under significant churn, is robust to cheating, and incurs minimal overhead. Finally, we discuss some of the potential benefits Egoist may offer to applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research on the construction of logical overlay networks has gained significance in recent times. This is partly due to work on peer-to-peer (P2P) systems for locating and retrieving distributed data objects, and also scalable content distribution using end-system multicast techniques. However, there are emerging applications that require the real-time transport of data from various sources to potentially many thousands of subscribers, each having their own quality-of-service (QoS) constraints. This paper primarily focuses on the properties of two popular topologies found in interconnection networks, namely k-ary n-cubes and de Bruijn graphs. The regular structure of these graph topologies makes them easier to analyze and determine possible routes for real-time data than complete or irregular graphs. We show how these overlay topologies compare in their ability to deliver data according to the QoS constraints of many subscribers, each receiving data from specific publishing hosts. Comparisons are drawn on the ability of each topology to route data in the presence of dynamic system effects, due to end-hosts joining and departing the system. Finally, experimental results show the service guarantees and physical link stress resulting from efficient multicast trees constructed over both kinds of overlay networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the appearance of potential mistreatment problems through the exposition of one node’s resources to others. We study such concerns by considering a group of independent, rational, self-aware nodes that cooperate using on-line caching algorithms, where the exposed resource is the storage of each node. Motivated by content networking applications – including web caching, CDNs, and P2P – this paper extends our previous work on the off-line version of the problem, which was limited to object replication and was conducted under a game-theoretic framework. We identify and investigate two causes of mistreatment: (1) cache state interactions (due to the cooperative servicing of requests) and (2) the adoption of a common scheme for cache replacement/redirection/admission policies. Using analytic models, numerical solutions of these models, as well as simulation experiments, we show that online cooperation schemes using caching are fairly robust to mistreatment caused by state interactions. When this becomes possible, the interaction through the exchange of miss-streams has to be very intense, making it feasible for the mistreated nodes to detect and react to the exploitation. This robustness ceases to exist when nodes fetch and store objects in response to remote requests, i.e., when they operate as Level-2 caches (or proxies) for other nodes. Regarding mistreatment due to a common scheme, we show that this can easily take place when the “outlier” characteristics of some of the nodes get overlooked. This finding underscores the importance of allowing cooperative caching nodes the flexibility of choosing from a diverse set of schemes to fit the peculiarities of individual nodes. To that end, we outline an emulation-based framework for the development of mistreatment-resilient distributed selfish caching schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the appearance of potential mistreatment problems through the exposition of one node's resources to others. We study such concerns by considering a group of independent, rational, self-aware nodes that cooperate using on-line caching algorithms, where the exposed resource is the storage at each node. Motivated by content networking applications -- including web caching, CDNs, and P2P -- this paper extends our previous work on the on-line version of the problem, which was conducted under a game-theoretic framework, and limited to object replication. We identify and investigate two causes of mistreatment: (1) cache state interactions (due to the cooperative servicing of requests) and (2) the adoption of a common scheme for cache management policies. Using analytic models, numerical solutions of these models, as well as simulation experiments, we show that on-line cooperation schemes using caching are fairly robust to mistreatment caused by state interactions. To appear in a substantial manner, the interaction through the exchange of miss-streams has to be very intense, making it feasible for the mistreated nodes to detect and react to exploitation. This robustness ceases to exist when nodes fetch and store objects in response to remote requests, i.e., when they operate as Level-2 caches (or proxies) for other nodes. Regarding mistreatment due to a common scheme, we show that this can easily take place when the "outlier" characteristics of some of the nodes get overlooked. This finding underscores the importance of allowing cooperative caching nodes the flexibility of choosing from a diverse set of schemes to fit the peculiarities of individual nodes. To that end, we outline an emulation-based framework for the development of mistreatment-resilient distributed selfish caching schemes. Our framework utilizes a simple control-theoretic approach to dynamically parameterize the cache management scheme. We show performance evaluation results that quantify the benefits from instantiating such a framework, which could be substantial under skewed demand profiles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En este texto se explica el cambio de hábitos que ha supuesto la lectura en formato digital. Se indican los factores que determinan la selección un formato u otro, al igual que la situación en la que se encuentra la lectura digital en España. Para ello, se analizan las noticias sobre este tema encontradas en los periódicos: ABC, El País y El Mundo durante el año 2011 -período relevante para la lectura digital- y se comparan con los resultados de las encuestas de AIMC, FGEE, etc., con el fin de sacar conclusiones certeras.