P2P P2P Winny 3 P2P P2P 1 P2P, i
|
|
|
- かんじ はやしもと
- 9 years ago
- Views:
Transcription
1 26 P2P Reduction of search packets by sharing peer information in P2P communication
2 P2P P2P Winny 3 P2P P2P 1 P2P, i
3 Abstract Reduction of search packets by sharing peer information in P2P communication KIMURA Norio In recent years, the traffic on the Internet have been increasing rapidly and have caused several problems. The number of users, who use the three major peer-to-peer file sharing applications such as Winny, reaches 150, ,000, in the reports by research companies. Overlay networks are built to achieve efficient communication by P2P applications. However, when peers use more than one P2P application, each P2P application has to manage its overlay networks. Specifically, the P2P application has to renew overlay networks depending on peers behaviors such as participation to a network. In my proposal method, one overlay network is built and it is used by multiple P2P applications. By sharing this information of overlay network, it is possible to omit duplicated network participation processes of peers and it is possible to decrease traffic depending on network management. key words P2P, Overlay network ii
4 1 1 2 P2P P2P Gnutella Winny BitTorrent P2P P4P ALTO iii
5 22 iv
6 Winny BitTorrent ALTO P2P v
7 1 Cisco [1] P2P NetAgent [2] WinnySharePerfect Dark 3 P2P 1520 P2P P2P P2P P2P ISP 1
8 ISP ISP ISP 2
9 2 P2P P2PPeer to Peer 2.1 P2P P2P P2P 3
10 2.1 P2P P2P 2 P2P 2.1 P2P P2P GnutellaWinnyBitTorrent P2P [3][4][5] Gnutella Gnutella P2P
11 2.1 P2P TTLTime to Live) Web Gnutella Winny Winny Gnutella P2P Winny 2.3 Winny 5
12 2.1 P2P 2.3 Winny BitTorrent BitTorrent Gnutella Winny P2P BitTorrent Tracker 2.4 torrent torrent Tracker URL URL Tracker Tracker Tracker 6
13 2.2 P2P 2.4 BitTorrent BitTorrent swarm 2.2 P2P P2P ISP P2P 7
14 2.2 P2P P4P P4P Provider Portal for ApplicationsISP P2P ISP [6] ISP P2P P4P ISP itrackers itrackers P2P apptracker itrackers itrackers ISP ISP ALTO ALTO Application-Layer Traffic Optimization IETFInternet Engineering Task Force [7]P4P P4P ISP P2P ISP ALTO P2P ALTO AppTracker ISP ALTO AppTracker ISP ISP 8
15 2.2 P2P ALTO ISP P2P $%& '()&*+! "!#, ALTO 9
16 3 P2P P2P P2P 1 1 P2P 3.1 P2P P2P P2P 10
17 3.1 P2P P2P ALTO P4P ISP ISP 3.1 P2P! "# 3.1 P2P 3.2 P2P 3.2 A A E C B B D C 3.2 A, B C
18 3.2 %!&#"#$! #"#$ 3.2 C 3.2 RTTRound-Trip Time P2P 12
19 P2P 13
20 [8] IP RTT A B E F 4.1 A B E F
21 RTT
22 % 100% 10% ID A B A A α 500 B β α β
23 % 100% 10% %10%
24 4.4 "!$#% '&)(+*,.-!$#% /&)(* ! #"%$& ('*),+ -/. "%$& ('*),
25 4.4 "!$#&%' )(+*-,.0/ #&%' 1(+*2,
26 5 P2P 3 P2P 1520 P2P
27 21
28 [1] Cisco, Cisco Visual Networking IndexVNI , paper_c html, [2] NetAgent, 2014 P2P, product/p2p/report/201401/01.html, [3], P2P, R&D,, [4], Winny,,, [5] B. Cohen, Incentives Build Robustness in BitTorrent, First Workshop on Economics of Peer to Peer Systems, [6] H.Xie,Y.R Yang, A Krishnamurthy, Y Liu, A Silberschatz, P4P: Provider Portal for Applications, ACM SIGCOMM Comput. Commun. Review 38(Issue 4), , [7] R. Alimi, R. Penno, and Y. Yang, ALTO Protocol, Internet draft, draft-ietfalto-protocol-10.txt, Oct [8],,,, P2P,, vol47, No.4, pp , Apr
WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i
26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution
WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i
28 WebRTC Design of multi-platform file sharing system using WebRTC 1170336 2017 2 28 WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i Abstract Design of multi-platform file sharing system using WebRTC Harumi
i
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
Web Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: [email protected], {ide,murase,hirayama}@is.nagoya-u.ac.jp,
, IT.,.,..,.. i
25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge
soturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
A Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)
untitled
Studies in Human Geography 32 Geoenvironmental Sciences, Graduate School of Life and Environmental Sciences, University of Tsukuba, Japan ArcGIS Geography Network ArcGIS ArcGIS ArcGIS Geography Network
HTTP
2008 P2P 2009 2 6 5107B024-5 1 5 1.1...................................... 5 1.2...................................... 6 1.3..................................... 7 2 HTTP 8 2.1.............................
Web Basic Web SAS-2 Web SAS-2 i
19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE
20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow
20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 1115084 2009 3 5 3.,,,.., HCI(Human Computer Interaction),.,,.,,.,.,,..,. i Abstract Method for Recognizing Expression Considering
3_23.dvi
Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems
( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D
P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:
29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking
23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual
IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
28 TCG SURF Card recognition using SURF in TCG play video
28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka
17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki
untitled
SUMMARY This paper presents current situations, issues, and several practical use scenarios of anonymous communication which provides sender anonymity and receiver anonymity in a communication. As methods
21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
840 Geographical Review of Japan 73A-12 835-854 2000 The Mechanism of Household Reproduction in the Fishing Community on Oro Island Masakazu YAMAUCHI (Graduate Student, Tokyo University) This
,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i
23 Experimental investigation of Natural Use Profiles of Pen Pressure, Tilt and Azimuth 1120230 2012 3 1 ,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i Abstract Experimental investigation of Natural Use
March IT PR March March p p p PR March Vol. March p p p SN March SN PR PR March Potential Needs of Specialized Foster Parents for Abused Children: Analyzinga questionnaire survey on foster parents needs
スライド 1
JANOG 14 2004.07.23 NTT [email protected] 1 Peer-to-Peer ISP P2P AS / Copyright 2004 NTT Corporation, All Rights Reserved 2 Peer-to-Peer ISP P2P AS Copyright 2004 NTT Corporation, All Rights
58 10
57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have
SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i
20 SOM Development of Syllabus Vsualization System using Spherical Self-Organizing Maps 1090366 2009 3 5 SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i Abstract Development of Syllabus Vsualization
2017 (413812)
2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has
2 The Bulletin of Meiji University of Integrative Medicine 3, Yamashita 10 11
1-122013 1 2 1 2 20 2,000 2009 12 1 2 1,362 68.1 2009 1 1 9.5 1 2.2 3.6 0.82.9 1.0 0.2 2 4 3 1 2 4 3 Key words acupuncture and moxibustion Treatment with acupuncture, moxibustion and Anma-Massage-Shiatsu
provider_020524_2.PDF
1 1 1 2 2 3 (1) 3 (2) 4 (3) 6 7 7 (1) 8 (2) 21 26 27 27 27 28 31 32 32 36 1 1 2 2 (1) 3 3 4 45 (2) 6 7 5 (3) 6 7 8 (1) ii iii iv 8 * 9 10 11 9 12 10 13 14 15 11 16 17 12 13 18 19 20 (2) 14 21 22 23 24
ISSN NII Technical Report Patent application and industry-university cooperation: Analysis of joint applications for patent in the Universit
ISSN 1346-5597 NII Technical Report Patent application and industry-university cooperation: Analysis of joint applications for patent in the University of Tokyo Morio SHIBAYAMA, Masaharu YANO, Kiminori
IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [
1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) [email protected] Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)
#"
!" #" !!! $" x %" 2011.3.11 3.12 3.1 4.02 4.17 4.24 4.28 4.29 5.8 5.14 6.4 7.3 8.1 8.10 8.23 8.28 9.10 9.30 11.13 11.21 12.23 12.28 2012.2.24 3.18 3.20 3.24 &" ! '" (" )" *" !+" !!" !#" !$" !%" !& !'"
08-特集04.indd
5 2 Journal of Multimedia Aided Education Research 2008, Vol. 5, No. 2, 3543 ICT ICT ICT 2 ICT ICT 1100 2008 ICT ICT 2007 ICT ICT ICT ICT IPtalk2008 2006 LAN TCP/IP 1 35 5 22008 1 Enter 1 IPtalk 2 2 2IPtalk
2.1 2.2 2.3 / 2.4 2.5 2.6 2.7 2.1 2.2 2.3 / 2.4 2.5 2.6 2.7 Web Web Web Web Web Web Web 2.1 2.2 2.3 / 2.4 2.5 2.6 2.7 2.1 2.2 2.3 / 2.4 2.5 2.6 2.7 Winny Winny Winny Winny Winny Winny Winny 2.1 2.2 2.3
MRI | 所報 | 分権経営の進展下におけるグループ・マネジメント
JOURNAL OF MITSUBISHI RESEARCH INSTITUTE No. 35 1999 (03)3277-0003 FAX (03)3277-0520 [email protected] 76 Research Paper Group Management in the Development of Decentralized Management Satoshi Komatsubara,
44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2)
(1) I 44 II 45 III 47 IV 52 44 4 I (1) ( ) 1945 8 9 (10 15 ) ( 17 ) ( 3 1 ) (2) 45 II 1 (3) 511 ( 451 1 ) ( ) 365 1 2 512 1 2 365 1 2 363 2 ( ) 3 ( ) ( 451 2 ( 314 1 ) ( 339 1 4 ) 337 2 3 ) 363 (4) 46
i ii i iii iv 1 3 3 10 14 17 17 18 22 23 28 29 31 36 37 39 40 43 48 59 70 75 75 77 90 95 102 107 109 110 118 125 128 130 132 134 48 43 43 51 52 61 61 64 62 124 70 58 3 10 17 29 78 82 85 102 95 109 iii
’ÓŠ¹/‰´„û
Core Ethics Vol. transition from school to work [][] [] Core Ethics Vol. [], pp.- [], p. [a], p.ojt OJT. [] OJT [] [] [], p. OJTOffJTp. [] p. [], pp.- [] [] [] [] [a] [], p. Core Ethics Vol. [], p. []
評論・社会科学 87号(よこ)(P)/1.小林
! 1 2 1978 1984 3 1984 1992 4 1992 5 1 2007 1 25 2006 GDP 10.7 20 9407 2005 0.3 2006 11 13 2007 9.6 " 1 10 1000 2! 2002 " 3 1 1 1970 1949 1978 4 1978 1984 5 1984 1992 1992 1 1 2 1978 1984 2 1 1978 1984
Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004
The Journal of the Japan Academy of Nursing Administration and Policies Vol 8, No 1, pp 43 _ 57, 2004 The Literature Review of the Japanese Nurses Job Satisfaction Research Which the Stamps-Ozaki Scale
ron.dvi
12 Effect of occlusion and perception of shadow in depth perception caused by moving shadow. 1010361 2001 2 5 (Occlusion), i Abstract Effect of occlusion and perception of shadow in depth perception caused
22 1,936, ,115, , , , , , ,
21 * 2 3 1 1991 1945 200 60 1944 No. 41 2016 22 1,936,843 1945 1,115,594 1946 647,006 1947 598,507 1 60 2014 501,230 354,503 5 2009 405,571 5 1 2 2009 2014 5 37,285 1 2 1965 10 1975 66 1985 43 10 3 1990
Sport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship be
Sport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship between broadcasting and sport (major sport and professional
17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System
1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of
220 28;29) 30 35) 26;27) % 8.0% 9 36) 8) 14) 37) O O 13 2 E S % % 2 6 1fl 2fl 3fl 3 4
Vol. 12 No. 2 2002 219 239 Λ1 Λ1 729 1 2 29 4 3 4 5 1) 2) 3) 4 6) 7 27) Λ1 701-0193 288 219 220 28;29) 30 35) 26;27) 0 6 7 12 13 18 59.9% 8.0% 9 36) 8) 14) 37) 1 1 1 13 6 7 O O 13 2 E S 1 1 17 0 6 1 585
卒業論文はMS-Word により作成して下さい
() 2007 2006 KO-MA KO-MA 2006 6 2007 6 KO-MA KO-MA 256 :117:139 8 40 i 23 50 2008 3 8 NPO 7 KO-MA( KO-MA ) 1) (1945-) KO-MA KO-MA AD 2007 1 29 2007 6 13 20 KO-MA 2006 6 KO-MA KO-MA ii KJ 11 KO-MA iii KO-MA
総セク報告書(印刷発出版_.PDF
- 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - IP 110 110 IP 110 110 - 12-110 2 IP 3 1 110 2 IP 3 1 - 13 - - 14 - IP - 15 - 17 11-16 - - 17 - - 18 - FAX (*1) http://www.kantei.go.jp/jp/singi/titeki2/kettei/040527f.html
Financing through Stadium Securitization \ Case Study of Professional Football Clubs in England \ õ Yoshiaki IIDA * Abstract The purpose of this study was to clarify the way in which the stadium securitization
屋内ロケーション管理技術
Technology to Manage Indoor Locations 奥山敏 森信一郎 小川晃弘 あらまし ICT GPS GPS Abstract Smart devices and wireless networks have become widespread and an environment is gradually being put in place in which information
A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi
A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,
IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
NINJAL Research Papers No.8
(NINJAL Research Papers) 8: 177 196 (2014) ISSN: 2186-134X print/2186-1358 online 177 3 3 3 1940 3 late adoption real time 3 apparent time * 1. 1 2 3 1.1 3 1 1953 * 2014 3 18 2014 5 13 109 NINJAL 2012
<30372D985F95B62D8E52967B8C4F8E7190E690B62E706466>
312013 95 Changes and Restructuring of Social Issues of the Urban Underclass Area with Increasing Welfare Needs in Kotobuki, Yokohama Kahoruko YAMAMOTO This paper explains social changes and restructuring
& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us
1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo
