P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i



Similar documents
P2P P2P peer peer P2P peer P2P peer P2P i

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i

Web Web Web Web i

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

i

Web Web ID Web 16 Web Web i

1 1 tf-idf tf-idf i

7,, i

IT i

Web Web Web Web Web, i

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

paper.dvi

LAN LAN LAN LAN LAN LAN,, i

23 The Study of support narrowing down goods on electronic commerce sites

WMN Wi-Fi MBCR i

, IT.,.,..,.. i

soturon.dvi

財政金融統計月報第720号


THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P

29 Short-time prediction of time series data for binary option trade


untitled

HTTP

4.1 % 7.5 %

n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i

Web Basic Web SAS-2 Web SAS-2 i

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow

3_23.dvi

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i

( )

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

IT,, i

29 jjencode JavaScript

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

21 A contents organization method for information sharing systems

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 TCG SURF Card recognition using SURF in TCG play video

DTN DTN DTN DTN i


untitled

21 Key Exchange method for portable terminal with direct input by user


76_01ver3.p65

,,,,., C Java,,.,,.,., ,,.,, i

,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i



スライド 1

!!!!!! Agenda 2012/2/6

58 10

25 About what prevent spoofing of misusing a session information

2002 ( 14 ) 1 2 P2P 3

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i

2017 (413812)

2 The Bulletin of Meiji University of Integrative Medicine 3, Yamashita 10 11

finalrep.dvi

provider_020524_2.PDF

ISSN NII Technical Report Patent application and industry-university cooperation: Analysis of joint applications for patent in the Universit

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [

#"

08-特集04.indd

(Visual Secret Sharing Scheme) VSSS VSSS 3 i


23 Study on Generation of Sudoku Problems with Fewer Clues

<836F F312E706466>

第52回日本生殖医学会総会・学術講演会

未婚者の恋愛行動分析 : なぜ適当な相手にめぐり会わないのか

MRI | 所報 | 分権経営の進展下におけるグループ・マネジメント

生活設計レジメ

44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2)

I II III 28 29


’ÓŠ¹/‰´„û

評論・社会科学 87号(よこ)(P)/1.小林

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004

ron.dvi

22 1,936, ,115, , , , , , ,

Sport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship be

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

) 2) , , ) 1 2 Q1 / Q2 Q Q4 /// Q5 Q6 3,4 Q7 5, Q8 HP Q9 Q10 13 Q11

220 28;29) 30 35) 26;27) % 8.0% 9 36) 8) 14) 37) O O 13 2 E S % % 2 6 1fl 2fl 3fl 3 4

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

Table 1 Table 2

卒業論文はMS-Word により作成して下さい

総セク報告書(印刷発出版_.PDF

Sobel Canny i


屋内ロケーション管理技術

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

NINJAL Research Papers No.8

<30372D985F95B62D8E52967B8C4F8E7190E690B62E706466>

udc-2.dvi

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us


Transcription:

26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i

Abstract Reduction of search packets by sharing peer information in P2P communication KIMURA Norio In recent years, the traffic on the Internet have been increasing rapidly and have caused several problems. The number of users, who use the three major peer-to-peer file sharing applications such as Winny, reaches 150,000-200,000, in the reports by research companies. Overlay networks are built to achieve efficient communication by P2P applications. However, when peers use more than one P2P application, each P2P application has to manage its overlay networks. Specifically, the P2P application has to renew overlay networks depending on peers behaviors such as participation to a network. In my proposal method, one overlay network is built and it is used by multiple P2P applications. By sharing this information of overlay network, it is possible to omit duplicated network participation processes of peers and it is possible to decrease traffic depending on network management. key words P2P, Overlay network ii

1 1 2 P2P 3 2.1 P2P..................... 4 2.1.1 Gnutella................................ 4 2.1.2 Winny................................. 5 2.1.3 BitTorrent............................... 6 2.2 P2P....... 7 2.2.1 P4P.................................. 8 2.2.2 ALTO................................. 8 3 10 3.1.......................... 10 3.2.......................... 12 3.3................................... 13 3.4................................... 13 4 14 4.1............................ 14 4.2....................... 16 4.3............................ 17 4.4...................................... 18 5 20 21 iii

22 iv

2.1.............................. 3 2.2................................ 4 2.3 Winny......................... 6 2.4 BitTorrent.......................... 7 2.5 ALTO............................ 9 3.1 P2P......... 11 3.2.................... 12 4.1.......................... 15 4.2 1000.................... 17 4.3 1000............ 18 4.4 2000............ 18 4.5 3000............ 19 v

1 Cisco [1] 5 5 5 3 P2P 2013 84 2018 60 NetAgent [2] WinnySharePerfect Dark 3 P2P 1520 P2P P2P P2P P2P ISP 1

ISP ISP ISP 2

2 P2P 2.1 2.1 P2PPeer to Peer 2.1 P2P P2P P2P 3

2.1 P2P P2P 2 P2P 2.1 P2P P2P GnutellaWinnyBitTorrent P2P [3][4][5] 2.1.1 Gnutella Gnutella P2P 2.2 2.2 4

2.1 P2P TTLTime to Live) Web Gnutella 2.1.2 Winny Winny Gnutella P2P Winny 2.3 Winny 5

2.1 P2P 2.3 Winny 2.1.3 BitTorrent BitTorrent Gnutella Winny P2P BitTorrent Tracker 2.4 torrent torrent Tracker URL URL Tracker Tracker Tracker 6

2.2 P2P 2.4 BitTorrent BitTorrent swarm 2.2 P2P P2P ISP P2P 7

2.2 P2P 2.2.1 P4P P4P Provider Portal for ApplicationsISP P2P ISP [6] ISP P2P P4P ISP itrackers itrackers P2P apptracker itrackers itrackers ISP ISP 2.2.2 ALTO ALTO Application-Layer Traffic Optimization IETFInternet Engineering Task Force [7]P4P P4P ISP P2P ISP ALTO P2P ALTO AppTracker ISP ALTO AppTracker ISP ISP 8

2.2 P2P ALTO ISP P2P $%& '()&*+! "!#,.- 2.5 ALTO 9

3 P2P P2P P2P 1 1 P2P 3.1 P2P P2P P2P 10

3.1 P2P P2P ALTO P4P ISP ISP 3.1 P2P! "# 3.1 P2P 3.2 P2P 3.2 A A E C B B D C 3.2 A, B C 2 2 11

3.2 %!&#"#$! #"#$ 3.2 C 3.2 RTTRound-Trip Time P2P 12

3.3 3.3 3.4 P2P 13

4 4.1 2 1 2 [8] IP RTT 4.1 4.1 A B E F 4.1 A B E F 4.1 14

4.1 4.1 RTT 1 2 15

4.2 4.2 1000 3000 1000 0% 100% 10% 4.1 4.1 ID 129.691 32.939 140.331 35.797 138.541 35.639 139.100 36.291 1000 1000 1000 1000 4.2 A B A A α 500 B β 500 2 α β 1000 16

4.3 4.2 1000 4.3 4.3 1000 4.4 2000 4.5 3000 2 0% 100% 10% 4.3 4.5 0%10% 1000 3000 17

4.4 "!$#% '&)(+*,.-!$#% /&)(* 4.3 1000! #"%$& ('*),+ -/. "%$& ('*),+ 4.4 2000 4.4 2 18

4.4 "!$#&%' )(+*-,.0/ #&%' 1(+*2, 4.5 3000 1 2 3 19

5 P2P 3 P2P 1520 P2P 1 1 1 2 20

21

[1] Cisco, Cisco Visual Networking IndexVNI 20132018,http://www.cisco.com/web/JP/solution/isp/ipngn/literature/white_ paper_c11-481360.html, 2015. [2] NetAgent, 2014 P2P, http://www.netagent.co.jp/ product/p2p/report/201401/01.html, 2015. [3], P2P, R&D,, 2008. [4], Winny,,, 2006. [5] B. Cohen, Incentives Build Robustness in BitTorrent, First Workshop on Economics of Peer to Peer Systems, 2003. [6] H.Xie,Y.R Yang, A Krishnamurthy, Y Liu, A Silberschatz, P4P: Provider Portal for Applications, ACM SIGCOMM Comput. Commun. Review 38(Issue 4), 351-362, 2008. [7] R. Alimi, R. Penno, and Y. Yang, ALTO Protocol, Internet draft, draft-ietfalto-protocol-10.txt, Oct. 2011. [8],,,, P2P,, vol47, No.4, pp.1063-1076, Apr. 2006. 22