Peer-to-Peer文件共享系统的测量研究
作者:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [31]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    Peer-to-Peer(P2P)技术的发展引发了Internet应用模式的变革.为了寻求网络运营商、内容提供商和Internet用户三方共赢的解决方案,必须从他们各自的角度出发对P2P应用进行系统的测量与分析.首先概述了P2P测量的研究内容,并将现有的P2P测量研究划分为P2P拓扑特征的测量、P2P流量特征的测量、P2P可用性的测量3类.在对P2P测量方法进行对比分析之后,详细综述了P2P测量的研究现状,对现有的各种测量方案以及研究成果进行了深入的分析,指出了其中存在的问题和缺陷.最后讨论了P2P测量未来的研究方向.

    Abstract:

    With the progress of peer-to-peer (P2P) technology, the Internet applications model is in a great reformation. In order to get an all-win solution among the Internet users, Internet service providers and content providers, it is necessary to measure and analyze the P2P applications from their perspectives. In this paper, the content of P2P measurement is introduced firstly, and then the existing research on P2P measurement is classified into 3 areas: topology measurement, traffic measurement and availability measurement. After comparing between measurement methods, the comprehensive survey on P2P measurement is given, and then the existing measurements and their results are analyzed in depth, furthermore, the shortcomings and problems are outlined. In the end, the future trend of the P2P measurement is discussed.

    参考文献
    [1]Saroiu S,Gummadi PK,Gribble SD.A measurement study of peer-to-peer file sharing systems.In:Proc.of the Multimedia Computing and Networking 2002 (MMCN 2002).2002.156-170.http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf
    [2]Liang J,Kumar R,Ross KW.The KaZaA overlay:A measurement study.In:Proc.of the 19th IEEE Annual Computer Communications Workshop.2004.http://cis.poly.edu/~ross/papers/KazaaOverlay.pdf
    [3]Liang J,Kumar R,Ross KW.Understanding KaZaA.2004.http://cis.poly.edu/~ross/papers/UnderstandingKaZaA.pdf.
    [4]Liang J,Kumar R,Xi Y,Ross KW.Pollution in file sharing systems.In:Proc.of the IEEE Infocom 2005.2005.http://cis.poly.edu/~ross/papers/pollution.pdf
    [5]Sen S,Wang J.Analyzing peer-to-peer traffic across large networks.In:Proc.of the 2nd ACM SIGCOMM Workshop on Internet Measurement Workshop.2002.http://citeseer.ist.psu.edu/sen02analyzing.html
    [6]Karagiannis T,Broido A,Brownlee N,Claffy KC,Faloutsos M.Is P2P dying or just hiding.In:Proc.of the IEEE Globecom 2004.2004.1532-1538.http://www.caida.org/outreach/papers/2004/p2p-dying/p2p-dying.pdf
    [7]Soldani C.Peer-to-Peer behavior detection by tep flows analysis (End-of-Study Dissertation).University of Liège,2004.http://www.run.montefiore.ulg.ac.be/~soldani/P2P_Behaviour_Detection.pdf
    [8]Sen S,Spatscheck O,Wang DM.Accurate,scalable in-network identification of P2P traffic using application signatures.In:Proc of the 13th Int'l WWW Conf.2004.http://www2004.org/proceedings/docs/1 p512.pdf
    [9]Karagiannis T,Broido A,Faloutsos M,Claffy KC.Transport layer identification of P2P traffic.In:Proc.of the 4th ACM SIGCOMM Conf.on Internet Measurement.2004.121-134.http://www.caida.org/outreach/papers/2004/p2p-layerid/p2p-layerid.pdf
    [10]Karagiannis T,Papagiannaki K,Faloutsos M.BLINC:Multilevel traffic classification in the dark.In:Proc.of the 2005 Conf.on Applications,Technologies,Architectures,and Protocols for Computer Communications.2005.229-240.http://www.cs.ucr.edu/~tkarag/papers/BLINC_TR.pdf
    [11]Zander S,Nguyen T,Armitage G.Automated traffic classification and application identification using machine learning.In:Proc.of the IEEE 30th Conf.on Local Computer Networks (LCN 2005).2005.250-257.http://doi.ieeecomputersociety.org/10.1109/LCN.2005.35
    [12]Saddi W,Azzouna NB,Guillemin F.IP traffic classification via blind source separation based on jacobi algorithm.In:Freire MM,Chemouil P,Lorenz P,eds.Proc.of the ECUMN 2004.LNCS 3262,Heidelberg:Springer-Verlag,2004.287-296.
    [13]Dedinski I,Meer HD,Han L,Mathy L.Cross-Layer peer-to-peer traffic identification and optimization based on active networking.In:Proc.of the 7th Int'l Working Conf.on Active and Programmable Networks.2005.http://www.dcs.gla.ac.uk/~joe/auxiliary/papers/Personal/IWAN05.pdf
    [14]Ripeanu M,Foster I,Iamnitchi A.Mapping the gnutella network:properties of large-scale peer-to-peer systems and implications for system design.IEEE Internet Computing Journal,2002,6(1):50-57.
    [15]Stutzbach D,Rejaie R,Sen S.Characterizing unstructured overlay topologies in modern P2P file-sharing systems.In:Proc.of the 5th ACM SIGCOMM Conf.on Internet Measurement.2005.http://www.imconf.net/imc-2005/papers/imc05efiles/stutzbach/stutzbach.pdf
    [16]Jovanovic M,Annexstein F,Berman K.Modeling peer-to-peer network topologies through "small-world" models and power laws.In:Proc.of the Ⅸ.Telecommunications Forum TELFOR 2001.Belgrade,2001.http://www.telfor.org.yu/telfor2001/radovi/2-14.pdf
    [17]Gummadi KP,Dunn RJ,Saroiu S,Gribble SD,Levy HM,Zahorjan J.Measurement,modeling,and analysis of a peer-to-peer file-sharing workload.In:Proc.of the 19th ACM Symp.on Operating Systems Principles (SOSP-19).2003.314-329.http://www.cs.toronto.edu/~stefan/publications/sosp/2003/p2p_cache.pdf
    [18]Chu J,Labonte K,Levine BN.Availability and locality measurements of peer-to-peer file systems.In:Proc.of the ITCom:Scalability and Traffic Control in IP Networks.2002.http://citeseer.ist.psu.edu/551697.html
    [19]Saroiu S,Gummadi PK,Gribble SD.Measuring and analyzing the characteristics of napster and gnutella hosts.Multimedia Systems Journal,2003,8(5):170-184.
    [20]Stutzbach D,Rejaie R.Characterizing churn in peer-to-peer networks.Technical Report,CIS-TR-2005-03,University of Oregon,2005.
    [21]CacheLogic Research.The true picture of P2P file sharing.2004.http://cachelogic.com/research/slidel.php
    [22]Zhang YF,Lei LH,Chen CJ.Characterizing peer-to-peer traffic across Internet.In:Li M,et al.,eds.Proc.of the GCC 2003.LNCS 3032,Heidelberg:Springer-Verlag,2004.388-395.
    [23]Plissonneau L,Costeux JL,Brown P.Analysis of peer-to-peer traffic on ADSL.In:Dovrolis C,ed.Proc.of the PAM 2005.LNCS 3431,Heidelberg:Springer-Verlag,2005.69-82.
    [24]Paxson V,Floyd S.Wide-Area traffic:The failure of Poisson modeling.IEEE/ACM Trans.on Networking,1995,3(3):226-244.
    [25]Joo SD,Lee CW,Chung YH.Analysis and modeling of traffic from residential high speed Internet subscribers.In:Kahng HK,Goto S,eds.Proc.of the ICOIN 2004.LNCS 3090,Heidelberg:Springer-Verlag,2004.410-419.
    [26]Liu G,Hu MZ,Fang BX,Zhang HL.Explaining BitTorrent traffic self-similarity.In:Liew KM,Shen H,See S,et al.,eds.Proc.of the PDCAT 2004.LNCS 3320,Heidelberg:Springer-Verlag,2004.839-843.
    [27]Rosin A.Measuring availability in peer-to-peer networks.2003.http://warhol.wiwi.hu-berlin.de/~fis/p2pe/paper_A_Rosin.pdf
    [28]Bhagwan R,Savage S,Voelker GM.Understanding availability.In:Kaashoek F,Stoica I,eds.Proc.of the IPTPS 2003.LNCS 2735,Berlin Heidelberg:Springer-Verlag,2003.256-267.
    [29]Kutzner K,Fuhrmann T.Measuring large overlay networks-The overnet example.In:Proc.of the KiVS2005.2005.http://i30www.ira.uka.de/research/documents/p2p/2005/kutzner05overnet.pdf
    [30]Christin N,Weigend AS,Chuang J.Content availability,pollution and poisoning in peer-to-peer file sharing networks.In:Proc.of the 6th ACM Conf.on Electronic Commerce (EC 2005).2005.68-77.http://www.stanford.edu/~aweigend/ChristinWeigend Chuang 2005.pdf
    [31]Andreolini M,Colajanni M,Lancellotti R.Peer-to-Peer workload characterization:techniques and open issues.In:Proc.of the Int'l Workshop on Hot Topics in Peer-to-Peer Systems (HOT-P2P 2004).2004.66-71.http://doi.ieeecomputersociety.org/10.1109/PTPSYS.2004.14
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

刘琼,徐鹏,杨海涛,彭芸. Peer-to-Peer文件共享系统的测量研究.软件学报,2006,17(10):2131-2140

复制
分享
文章指标
  • 点击次数:7635
  • 下载次数: 9820
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2006-04-08
  • 最后修改日期:2006-06-23
文章二维码
您是第19762632位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号