基于用户需求的内容分发点对点网络系统研究
作者:
基金项目:

国家自然科学基金(60872051,61001118);北京市教育委员会共建项目专项资助


Research on CDN-P2P System over User Requirements
Author:
  • ZHANG Yu-Jie

    ZHANG Yu-Jie

    Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia (Beijing University of Posts and Telecommunications), Beijing 100876, China;School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
    在期刊界中查找
    在百度中查找
    在本站中查找
  • HE Ming

    HE Ming

    Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia (Beijing University of Posts and Telecommunications), Beijing 100876, China;School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
    在期刊界中查找
    在百度中查找
    在本站中查找
  • MENG Xiang-Wu

    MENG Xiang-Wu

    Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia (Beijing University of Posts and Telecommunications), Beijing 100876, China;School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
    在期刊界中查找
    在百度中查找
    在本站中查找
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [87]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    点对点内容分发网络技术已成为近年来研究热点领域之一.为用户推荐有价值的资源,提高用户资源定位的准确率和分发效率,是CDN-P2P技术面临的巨大挑战.从用户需求的角度出发,综述了近年来CDN-P2P领域的研究状况:讨论了用户需求并介绍了需求获取方法;对基于用户需求的CDN-P2P系统模型、节点特征及用户相似性、用户之间的相互关系、节点安全性和搜索机制等进行了对比讨论和概括总结;对基于用户需求CDN-P2P领域存在的难点和热点问题作了深入的剖析;最后给出了基于用户需求的CDN-P2P系统的发展趋势及其展望.

    Abstract:

    CDN-P2P technology has recently become one of the hottest research fields. Recommending the valuable resources and improving accuracy of resource location and efficiency of content distribution for users, are CDN-P2P's challenges. This paper presents an overview of the field of CDN-P2P research in recent years from user requirements' perspective. It discusses user requirements and introduces ways of requirements acquirement. Based on CDN-P2P system over user requirements, this paper provides a comprehensive discussion on node characteristics and user similarity, relationships between nodes, nodes security and search mechanism. The difficult and hot issues about CDN-P2P system over user requirements are analyzed in depth. The future development trend and prospects for CDN-P2P system over user requirements are also discussed.

    参考文献
    [1] Liu J, Zhang L, Fan SH, Guo C, He S, Chang GK. A novel architecture for peer-to-peer interconnect in millimeter-ware radio- over-fiber access network. Progress in Electromagnetics Research, 2012,126(4):139-148.
    [2] Pakkala D, Latvakoski J. Towards a peer-to-peer extended content delivery network. VTT Electronic, 2012,38(7):145-156.
    [3] Parameswaran M, Susaria A, Whinston AB. P2P networking: An information-sharing alternative. IEEE Computer Society, 2001, 34(7):31-38. [doi: 10.1109/2.933501]
    [4] Stavrou A, Rubenstein D, Sahu S. A lightweight, robust P2P system to handle flash crowds. IEEE Journal on Selected Areas in Communications, 2012,22(1):6-17. [doi: 10.1109/JSAC.2003.818778]
    [5] Stamos K, Pallis G, Vakali A, Dikaiakos MD. Evaluating the utility of content delivery networks. In: Proc. of the 4th Edithion of the UPGRADE-CN Workshop on Use of P2P, GRID and Agents for the Development of Content Netw, UPGRADE-CN, Colocated Int''l Symp. High Perform. Distrib. Comput. Conf. (HPDC 2009). New York: ACM Press, 2009. 734-745. [doi: 10.1145/1552486.1552509]
    [6] Hawa M, Rahhal JS, Abu-Al-Nadi DI. File size models for shared content over the BitTorrent peer-to-peer network. Peer-to-Peer Networking and Applications, 2012,5(3):279-291. [doi: 10.1007/s12083-011-0122-6]
    [7] Wang Z, Jiang H, Sun Y, Li J, Liu J, Dutkiewicz E. A k-coordinated decentralized replica placement algorithm for the ring-based CDN-P2P architecture. In: Proc. of the IEEE Symp. on Computers and Communications (ISCC). IEEE Computer Society, 2010. 811-816. [doi: 10.1109/ISCC.2010.5546711]
    [8] Gopalakrishnan V, Silaghi B, Bhattacharjee B, Keleher P. Adaptive replication in peer-to-peer systems. In: Proc. of the Int''l Conf. on Distributed Computing Systems. Tokyo: IEEE Computer Society, 2004. 360-369. [doi: 10.1109/ICDCS.2004.1281601]
    [9] Manku GS. Balanced binary trees for ID management and load balance in distributed Hash tables. In: Proc. of the 23rd Annual ACM Symp. on Principles of Distributed Computing. New York: ACM Press, 2004. 197-205. [doi: 10.1145/1011767.1011797]
    [10] Zhu YW, Hu YM. Efficient, proximity-aware load balancing for DHT-based P2P systems. IEEE Trans. on Parallel and Distributed Systems, 2005,16(4):349-361. [doi: 10.1109/TPDS.2005.46]
    [11] Jin H, Guo XZ, Zhang C, Yuan Q. A new layered P2P architecture with efficient resource location strategy. In: Proc. of the IEEE Int''l Conf. on E-Commerce Technology for Dynamic E-Business (CEC-East 2004). Beijing: IEEE Computer Society, 2004. 298-301. [doi: 10.1109/CEC-EAST.2004.5]
    [12] Shen YG, Liu J, Shen J. The further development of weka base on positive and negative association rules. In: Proc. of the Intelligent Computation Technology and Automation (ICICTA 2010). IEEE Computer Society, 2010. 811-814. [doi: 10.1109/ICICTA.2010.676]
    [13] Sulthana AR, Murugeswari B. ARIPSO: Association rule interactive postmining using schemas and ontologies. In: Proc. of the 2011 Int''l Conf. on Emerging Trends in Electrical and Computer Technology (ICETECT 2011). IEEE Computer Society, 2011. 941-946. [doi: 10.1109/ICETECT.2011.5760255]
    [14] Meng QL, Jiang XJ. A method for rating customer requirments'' final importance in QFD based on quantitative KANO model. In: Proc. of the 8th Int''l Conf. on Service Systems and Service Management (ICSSSM 2011). Tianjin: IEEE Computer Society, 2011. 1-6. [doi: 10.1109/ICSSSM.2011.5959396]
    [15] Hong L, Wang W, Zhao HQ. A service quality management approach based on QFD. In: Proc. of the Service Systems and Service Management (ICSSSM). West Sussex: John Wiley and Sons Ltd., 2012. 11-14. [doi: 10.1109/ICSSSM.2012.6252179]
    [16] Yuan F. Performance evaluation of technological innovation for aeronautical enterprise based on QFD. In: Proc. of the 2011 4th Int''l Conf. on Information Management, Innovation Management and Industrial Engineering (ICIII 2011). Shenzhen: IEEE Computer Society, 2011. 31-34. [doi: 10.1109/ICIII.2011.15]
    [17] Chen CL, Shi WH, Yan HG. Equipment quality monitoring analysis based on QFD. In: Proc. of the Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQ2MSE). Beijing: IEEE Computer Society, 2012. 1329-1332. [doi: 10.1109/ICQR2MSE. 2012.6246466]
    [18] Liu YX. Study on application of apriori algorithm in data mining. In: Proc. of the 2010 2nd Int''l Conf. on Computer Modeling and Simulation. Taiyuan: IEEE Computer Society, 2010. 111-114. [doi: 10.1109/ICCMS.2010.398]
    [19] Liu D, Lung CH. P2P traffic identification and optimization using fuzzy c-means clustering. In: Proc. of the 2011 IEEE Int''l Conf. on Fuzzy Systems. Institute of Electrical and Electronics Engineers Inc., 2011. 2245-2252. [doi: 10.1109/FUZZY.2011.6007613]
    [20] Hu JL,Wu QY, Zhou B, Liu JH. Robust feedback credibility-based distributed P2P trust model. Ruan Jian Xue Bao/Journal of Software, 2009,20(10):2885-2898 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3554.htm [doi: 10.3724/SP.J.1001.2009.03554]
    [21] Xu G, Tang RC, Song YJ. A stability based streaming media scheme over CDN and P2P hybrid network. Journal of Ocean University of China, 2012,42(1-2):163-168 (in Chinese with English abstract).
    [22] Pakkaia D, Koivukoski A, Paaso T, Latvakoski J. P2P middleware for extending the reach, scale and functionality of content delivery networks. In: Proc. of the 2nd Int''l Conf. on Internet and Web Applications and Services (ICIW 2007). IEEE Computer Society, 2007. 1-8. [doi: 10.1109/ICIW.2007.46]
    [23] Ma L, Zhang WM. Synthesize trust degree evaluting motel for an information grid environment. Journal of Tsinghua University (Sci. & Tech.), 2009,49(4):599-603 (in Chinese with English abstract). http://qhxbw.chinajournal.net.cn
    [24] Yin H, Liu XN, Zhan TY, Sekar V, Qiu F, Lin C, Zhang H, Li B. Design and deployment of a hybrid CDN-P2P system for live video streaming: Experiences with LiveSky. In: Proc. of the 2009 ACM Multimedia Conf., with Co-located Workshops and Symp. Beijing: ACM Press, 2009. 25-34. [doi: 10.1145/1631272.1631279]
    [25] Tong JJ, Xu K, Pi RJ. A new Web service structure of combining P2P and CDN technologies. In: Proc. of the 2010 IEEE 2nd Symp. on Web Society (SWS 2010). New York: ACM Press, 2010. 475-479. [doi: 10.1109/SWS.2010.5607404]
    [26] Li JT. The research on trust model and replication scheme in P2P environments [Ph.D. Thesis]. Shanghai: Fudan University, 2006 (in Chinese with English abstract).
    [27] Wu YY, Lei Q, Chen DS. YokoTa H. A method of discovering relation information from XML data. Ruan Jian Xue Bao/Journal of Software, 2008,19(6):1422-1427 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/19/1422.htm [doi: 10.3724/SP.J.1001.2008.01422]
    [28] Shi PC, Wang HM, Yin H, Ding B, Wang TZ, Wang M. CDN scalability improvement using a moderate peer-assisted method. Korean Society for Internet Information, 2012,3(6):954-972. [doi: 10.3837/tiis.2012.03.011]
    [29] Kamiyama N, Mori T, Kawahara R, Hasegawa H. Optimally designing ISP-operated CDN. IEICE Trans. on Communications, 2013, 3(E96-B):790-801. [doi: 10.1587/transcom.E96.B.790]
    [30] Afergan MM, Leighton FT. Parikn JG. Hybrid content delivery network (CDN) and peer-to-peer (P2P) network. In: Proc. of the United States Patent Application. Assignee: Akamai, 2008. http://www.freepatentsonline.com/y2008/0155061.html
    [31] Zheng CY, Wang X, Zhao J, Xue XY, P2P video-on-demand content distribution schemes. Ruan Jian Xue Bao/Journal of Software, 2007,18(11):2942-2954 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/18/2942.htm [doi: 10.1360/jos 182942]
    [32] Guo Y, Sun K, Kurose J, Towsley D. A peer-to-peer on-demand streaming service and its performance evaluation. In: Proc. of the IEEE ICME 2003. IEEE Computer Society, 2003. 649-652. [doi: 10.1109/ICME.2003.1221700]
    [33] Xu LJ, Gao GH, Li XY, Lv JN. A content distribution mechanism based on P2P for video-on-demand service in IPTV. In: Proc. of the 2010 2nd Int''l Conf. on Communication Systems, Networks and Applications (ICCSNA 2010). Hong Kong: IEEE Computer Society, 2010. 228-231. [doi: 10.1109/ICCSNA.2010.5588876]
    [34] Jiang XX, Dong Y, Xu DY, Bhargava B. GnuStream: A P2P media streaming system prototype. In: Proc. of the IEEE Int''l Conf. on Multimedia and Expo, Vol.2. Los Alamitos: IEEE Computer Society, 2003. 325-328. [doi: 10.1109/ICME.2003.1221619]
    [35] Luo XZ, Qian PD, Zhu YQ, Liu JW. Secure computation against convert adversaries based on game theory. Nanjing Hangkong Hangtian Daxue Xuebao/Journal of Nanjing University of Aeronautics and Astronautics, 2012,44(1):70-74 (in Chinese with English abstract).
    [36] Kleinberg J, Liben-Nowell D. The syntenic diameter of the space of N-chromosome genomes. In: Sankoff D, ed. Proc. of the Comparative Genomics: Empirical and Analytical Approaches to Gene Order Dynamic, Map Alignment, and the Evolution of Gene Families. New York: Kluwer Academic Press, 2000. 185-197. [doi: 10.1007/978-94-011-4309-7_17]
    [37] De A, Desarkar MS, Ganguly N, Mitra P. Local learning of item dissimilarity using content and link structure. In: Proc. of the 2010 5th Int''l Conf. on Ubiquitous Information Technologies and Applications (CUTE 2010). Dublin: ACM Press, 2010. 833-845. [doi: 10.1145/2365952.2365999]
    [38] Zhou T, Lü LY, Zhang YC. Predicting missing links via local information. The European Physical Journal, 2009,71(4):63-69. [doi: 10.1140/epjb/e2009-00335-8]
    [39] Akcora CG, Carminati B. Network and profile based measures for user similarities on social networks. In: Proc. of the 4th ACM Int''l Conf. on Web Search and Data Mining. Las Vegas: IEEE Computer Society, 2011. 292-298. [doi: 10.1109/IRI.2011.6009562]
    [40] Krishnamuthy B, Wills CE. On the leakage of personally identifiable information via online social networks. ACM SIGCOMM, 2010,40(1):112-117.
    [41] Lindamood J, Heatherly R, Kantarcioglu M, Thuraisingham B. Infering private information using social network data. In: Proc. of the 18th WWW. New York: ACM Press, 2009. 1145-1146. [doi: 10.1145/1526709.1526899]
    [42] Tasi CS, Huang YM, Liu CH, Huang YM. Applying VSM and LCS to develop an integrated text retrieval mechanism. Expert Systems with Application, 2012,39(4):3974-3982. [doi: 10.1016/j.eswa.2011.09.039]
    [43] Kim TK, Lee TH. Reliability-Based design optimization using enhanced Pearson system. Trans. of the Korean Society of Mechanical Engineers, 2011,35(2):125-130. [doi: 10.3795/KSME-A.2011.35.2.125]
    [44] Li K, Wang Y. Similarity based ranging method in wireless sensor networks. Ruan Jian Xue Bao/Journal of Software, 2009,20: 95-103 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/09012.htm
    [45] Shen L, Zhou YM. A new user similarity measure for collaborative filtering algorithm. In: Proc. of the 2010 Int''l Conf. on Computer Modeling and Simulation (ICCMS 2010). Sanya: IEEE Computer Society, 2010. 375-379. [doi: 10.1109/ICCMS. 2010.67]
    [46] Huang YS, Meng XW, Zhang YJ. Strategy of content location of P2P based on the social network. Ruan Jian Xue Bao/Journal of Software, 2010,21(10):2622-2630 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3647.htm [doi: 10.3724/SP.J.1001.2010.03647]
    [47] Louis MP, Thomas LC. Synchronization in chaotic systems. Physical Review Letters, 1990,64(8):821-825.
    [48] Anand D, Bharadwaj KK. Adaptive user similarity measures for recommender systems: A genetic programming approach. In: Proc. of the 2010 3rd IEEE Int''l Conf. on Computer Science and Information Technology (ICCSIT 2010). Chengdu: IEEE Computer Society, 2010. 121-125. [doi: 10.1109/ICCSIT.2010.5563737]
    [49] Ming L, Zhao G, Xie GH, Wang CL. Research on smart space oriented location awareness method. Ruan Jian Xue Bao/Journal of Software, 2009,20(3):671-681 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3228.htm [doi: 10.3724/SP.J. 1001.2009.03228]
    [50] Yuan SH, Chen WB, Fu SK. User behavior similarity analysis of location based social network. Journal of Computer Applications, 2012,32(2):322-325 (in Chinese with English abstract).
    [51] Wang Y, Shu H, Fang DY. A geographic surface routing algorithm in 3D ad hoc networks. Ruan Jian Xue Bao/Journal of Software, 2010,21:318-329 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/10033.htm
    [52] Rakesh A, Evfimievski A, Srikant R. Information sharing across private databases. In: Proc. of the ACM SIGMOD Int''l Conf. on Management of Data. San Diego: ACM SIGMOD, 2003. 86-97. [doi: 10.1145/872757.872771]
    [53] Malaga RA. Information System Technology. Beijing: Tsinghua University Press, 2006.
    [54] Chen YF, He YX, Cao JN, Wu J. A greedy algorithm for capacity-constrained surrogate placement in CDNs. Ruan Jian Xue Bao/Journal of Software, 2007,18(1):146-156 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/18/146.htm [doi: 10.1360/jos180146]
    [55] Zachara J, Lesiuk M, Balawender R. Higher order alchemical derivatives from coupled perturbed self-consistent field theory. Journal of Chemical Physics, 2012,136(3):478-496. [doi: 10.1063/1.3674163]
    [56] Zucker LG. Production of trust: Institutional sources of economic structure. In: Cummings LL, ed. Proc. of the Research in Organizational Behavior. Greenwich CT: JAI Press, 1986. 53-111. [doi: 10.1504/IJBT.2008.018356]
    [57] Liu W, Duan HX, Zhang H, Wu JP. Trust based user behavior analysis and security management. Periodical of Ocean University of China, 2008,29(11):12-16 (in Chinese with English abstract).
    [58] Xu X, Tan J. Efficient secure message routing for structured peer to peer systems. In: Proc. of the Int''l Conf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). IEEE Computer Society, 2009. 354-357. [doi: 10.1109/NSWCTC.2009.124]
    [59] Rafaeli S, Hutchison D. A survey of key management for secure group communication. ACM Computing Surveys, 2003,35(3): 309-329. [doi: 10.1145/937503.937506]
    [60] Zhang PW, Jiao XJ, Zhou RJ. Network security technology in P2P. In: Proc. of the 2011 Communications in Computer and Information Science. Springer-Verlag, 2011. 145-149. [doi: 10.1007/978-3-642-21411-0_23]
    [61] Li ZT, Yu WN, Liu G. DPFSL: Decreasing probability flooding algorithm in P2P network. Tongxin Xuebao/Journal on Communications, 2006,27(11A):246-250 (in Chinese with English abstract). [doi: CNKI:CDMD:2.2009.035436]
    [62] Liu YH, Zhu LQ, Gao JJ, Li YL. A segment strategy based on flooding search in unstructured P2P network. In: Proc. of the 2008 2nd Int''l Conf. on Future Generation Communication and Networking (FGCN 2008). IEEE Computer Society, 2008. 252-255. [doi: 10.1109/FGCN.2008.201]
    [63] Jung J, Cho Y, Kim Y, Kim I. An adaptive, efficient, and reliable flooding mechanism for MANET. In: Proc. of the 2010 ACM Symp. on Applied Computing. Sierre: Association for Computing Machinery, 2010. 731-732. [doi: 10.1145/1774088.1774239]
    [64] Barjini H, Othman M, Ibrahim H, Udzir NI. Shortcoming, problems and analytical comparison for flooding-based search techniques in unstructured P2P networks. Peer-to-Peer Networking and Applications, 2012,5(1):1-13. [doi: 10.1007/s12083-011-0101-y]
    [65] Ma WM, Meng XW, Zhang YJ. Bidirectional random walk search mechanism for unstrucured P2P network. Ruan Jian Xue Bao/Journal of Software, 2012,23(4):894-911 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4086.htm [doi: 10.3724/SP.J.1001.2012.04086]
    [66] Cheng MM, Zhang GX. Connectedness of random walk segmentation. IEEE Trans. on Pattern Analysis and Machine Intelligence, 2011,33(1):200-202. [doi: 10.1109/TPAMI.2010.138]
    [67] Yu I, Newman R. A topology-aware random walk. IEICE Trans. on Communications, 2012,E95-B(3):995-998. [doi: 10.1587/transcom.E95.B.995]
    [68] Zhang CH, Qiu XF, Ji Y. Comprehensive Analysis of P2P Technology. Beijing: Posts & Telecom Press, 2010 (in Chinese).
    [69] Chen JZ, Xu TY, Li WZ, Lu SL, Chen DX, Chan E. P2P interactive streaming system based on derivative tree. Ruan Jian Xue Bao/Journal of Software, 2010,21(5):1138-1152 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3599.htm [doi: 10.3724/SP.J.1001.2010.03599]
    [70] Zhang ZM, Zhou J, Chen Z, Li J. Modeling and algorithm for network coding based P2P streaming. Ruan Jian Xue Bao/Journal of Software, 2010,23(3):648-661 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3991.htm [doi: 10.3724/SP.J. 1001.2012.03991]
    [71] Liu YJ, Dou WH. A video-on-demand streaming service architecture in P2P environment. Ruan Jian Xue Bao/Journal of Software, 2006,17(4):876-884 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/17/876.htm [doi: 10.1360/jos170876]
    [72] Huang LC, Nie JF. Using Pareto principle to improve efficiency for selection of QoS Web services. In: Proc. of the 2010 7th IEEE Consumer Communications and Networking Conf. (CCNC 2010). IEEE Computer Society, 2010. 546-553. [doi: 10.1109/CCNC. 2010.5421583]
    [73] Park DG, Park YS, Kim YI, Cheol W, Kyu W. Implementation of IPTV set-top for distance education services using grid-CDN. In: Proc. of the 2010 5th Int''l Conf. on Ubiquitous Information Technologies and Applications (CUTE 2010). IEEE Computer Society, 2010. 13-24. [doi: 10.1109/ICUT.2010.5677638]
    [74] Wählisch M, Schmidt TC, Wittehburg G. On predictable large-scale data delivery in prefix-based virtualized content networks. Computer Networks, 2011,55(18):4086-4100. [doi: 10.1016/j.comnet.2011.07.020]
    [75] Lu ZH, Wu J, Chen LJ, Huang SJ, Huang Y. CPH-VoD: A novel CDN-P2P-hybrid architecture based VoD scheme. In: Proc. of the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Heidelberg: Springer-Verlag, 2011. 578-586. [doi: 10.1007/978-3-642-17616-6_50]
    [76] Garmeni M, Analoui M. An economical mechanism for multicasting of content among servers of hybrid CDN-P2P networks. In: Proc. of the 2011 Int''l Conf. for Internet Technology and Secured Transactions (ICITST 2011). IEEE Computer Society, 2011. 566-571. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6148400
    [77] Sheu ST, Huang CH. Mixed P2P-CDN system for media steeaming in mobile environment. In: Proc. of the 2011 7th Int''l Wireless Communications and Mobile Computing Conf. (IWCMC 2011). IEEE Computer Society, 2011. 657-660. [doi: 10.1109/IWCMC. 2011.5982624]
    [78] Wang HT, Song LH. Applications and challenges of mobile P2P systems in ad hoc network. In: Proc. of the Advanced Materials Research 2011. Clausthal-Zellerfeld: Trans. on Tech. Publications, 2011. 575-579. [doi: 10.4028/www.scientific.net/AMR.171-172. 575]
    [79] Wichtlhuber M, Rüchert J, Stingl D, Schulz M, Hausheer D. Enery-Efficient mobile P2P video streaming. In: Proc. of the 2012 IEEE 12th Int''l Conf. on Peer-to-Peer Computing (P2P 2012). Washington, 2012. 63-64. [doi: 10.1109/P2P.2012.6335812]
    [80] Xu LJ, Gao GH, Li XY, Lü JN. A content distribution mechanism based on P2P for video-on-demand service in IPTV. In: Proc. of the 2010 2nd Int''l Conf. on Communication Systems, Networks and Applications (ICCSNA 2010). IEEE Computer Society, 2010. 228-231. [doi: 10.1109/ICCSNA.2010.5588876]
    [81] Yang HG, Hsieh MY, Yu HF, Tseng LM. A replication-aware CDN-P2P architecture based on two-step server selection and network coding. In: Proc. of the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Heidelberg: Springer-Verlag, 2008. 738-747. [doi: 10.1007/978-3-540-89796-5_76]
    [82] Hsieh MY, Yang HC, Tseng LM. Finding nearest neighbors in replication-aware CDN-P2P architecture. Journal of Internet Technology, 2005,6(2):133-140. http://jit.ndhu.edu.tw/jitcontent.php?getserial=223
    [83] Lu ZH, Wang Y, Yang YR. An analysis and comparison of CDN-P2P hybrid content delivery system and model. Journal of Communications, 2012,7(3):232-245. [doi: 10.4304/jcm.7.3.232-245]
    [84] Kim TN, Jeon S, Kim Y. A CDN-P2P hybrid architecture with content/location awareness for live streaming service networks. In: Proc. of the Int''l Symp. on Consumer Electronics (ISCE). Institute of Electrical and Electronics Engineers Inc, 2011. 438-441. [doi: 10.1109/ISCE.2011.5973865]
    [85] Yin H, Liu XN, Zhan TY, Sekar V, Qiu F, Lin C, Zhang H, Li B. LiveSky: Enhancing CDN with P2P. In: Proc. of the ACM Trans. on Multimedia Computing, Communications and Applications. New York: ACM Press, 2010. [doi: 10.1145/1823746.1823750]
    [86] Korn R, Kuntze N, Repp J. Performance evaluation in trust enhanced decentralised content distribution networks. In: Proc. of the Expert Systems with Applications. Florida: IEEE Computer Society, 2011. 368-375. [doi: 10.1109/CQR.2011.5996084]
    [87] Preston JA, Prasad SK. P2P document tree management in a real-time collaborative editing system. In: Proc. of the Lecture Notes in Computer Science. Springer-Verlag, 2007. 418-431. [doi: 10.1007/978-3-540-77220-0_39]
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

张玉洁,何明,孟祥武.基于用户需求的内容分发点对点网络系统研究.软件学报,2014,25(1):98-117

复制
分享
文章指标
  • 点击次数:8328
  • 下载次数: 10416
  • HTML阅读次数: 3355
  • 引用次数: 0
历史
  • 收稿日期:2012-09-28
  • 最后修改日期:2013-06-26
  • 在线发布日期: 2013-07-25
文章二维码
您是第19732593位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号