摘要(英) |
With the improvement of New network technologies and network bandwidth. Compare with the traditional Client-Server framework, the Peer-to-Peer network (P2P) technology allows users to share their computing power, disk spaces, bandwidth, and file that own on the overlay network.Then every user can share their resource directly.
Bitorrent is a very popular distributed file transfer system. But in Bitorrent Peer can not know all of the other Peers, and does not know which LAN user have the same file. Partial Peer list and tit-for-tat make redundant traffic flow seriously.This thesis analysis how to reduce redundant traffic flow and increase quality of downloading.
To alleviate the problem, we use a transparent proxy to hijack a metainfo file downloaded by a user from a Web server. Then, the original tracker of the metainfo is replaced by a new tracker agent. The Peer therefore connects to the local BitTorrent tracker, then our Bittorrent Peer agent will guide Peer to get different piece first. By providing guide information to local Peers, this approach will increase local file sharing with local exchange by our Bittorrent Peer agent. |
參考文獻 |
[1] Napster, http://www.napster.com/
[2] Gnutella 0.6 protocol draft, http://rfc-gnutella.sourceforge.net/
[3] B. Cohen, “Incentives build robustness in bittorrent,” 2003. [Online]. Available: http://citeseer.nj.nec.com/cohen03incentives.html
[4] EContentMag.com, “Chasing the user: The revenue streams of 2006,” 2005. [Online].Available:http://www.econtentmag.com/Articles/ArticleReader.aspx?ArticleID=14532n&ContextSubtypeID=8
[5] CacheLogic, “Cachelogic - advanced solutions for Peer-to-Peer networks.” [Online]. Available: http://www.cachelogic.com
[6] L7-filter, http://l7-filter.sourceforge.net/protocols
[7] S. Patro and Y. C. Hu, "Transparent Query Caching in Peer-to-Peer Overlay Networks," in Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS), 2003
[8] T. Karagiannis, P. Rodriguez, and K. Papagiannaki, “Should internet service providers fear Peer-assisted content distribution,” in Proceedings of the Internet Measurement Conference 2005, 2005.
[9] 陳宜凡,白淳元,游象甫,曾黎明 “A Tansparent and Gated cache for BT-P2P communication,“ TANET 2005
[10] AsfandyarQureshi, “Exploring Proximity Based Peer Selection in a BitTorrent-like Protocol”, MIT 6.824. student project, May7,2004
[11] L. Li, J. Halpern, and Z. Haas, “Gossip-based ad hoc routing." citeseer.ist.psu.edu/haas01gossipbased.html.
[12] V. N. Padmanabhan and L. Subramanian, “An investigation of geographic mapping techniques for internet hosts," in Proceedings of SIGCOMM'2001, p. 13, 2001.
[13] C. Gkantsidis and P. R. Rodriguez, “Network coding for large scale content distribution,” in Proceedings of IEEE Infocom,2005.
[14] R. Sherwood, R. Braud, and B. Bhattacharjee, “Slurpie: A cooperative bulk data transfer protocol,” in Proceedings of IEEE INFOCOM, 2004.
[15] L. Li, J. Halpern, and Z. Haas, “Gossip-based ad hoc routing." citeseer.ist.psu.edu/haas01gossipbased.html.
[16] M. Izal, G. Urvoy-Keller, E. Biersack, P. Felber, A. Hamra, and L. Garces-Erice, “Dissecting bittorrent: Five months in a torrent’s lifetime,” 2004
[17] L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, and X. Zhang, “Measuremsnts, analysis and modeling of bittorrent-like systems,” in Proceedings of the Internet Measurement Conference, 2005
[18] Dongyu Qiu and R. Srikant, “Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks,” in Proceedings of SIGCOMM, 2004.
[19] 郭廖軒, “以網域名稱伺服器為基礎之色情網站過濾系統,” TANET 2004
[20] Bittorrent. http://bittorrent.com
[21] Bitcomet. http://www.bitcomet.com/
[22] ABC. http://pingpong-abc.sourceforge.net/
[23] Shareaza. http://www.shareaza.com/
[24] Azureus. http://azureus.sourceforge.net/ |