期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Cooperative Approach between ISP and P2P Users to Reduce Inter-AS Traffic
1
作者 Zhen Qin,Le-Min Li,the School of Communication and Information Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China.Fan Zhou,the School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu610054,China 《Journal of Electronic Science and Technology》 CAS 2012年第1期47-50,共4页
A peer-to-peer (P2P) network is a distributed application architecture which provides many attractive features, such as availability, self-organization, load-balancing, and anonymity. However, P2P network has create... A peer-to-peer (P2P) network is a distributed application architecture which provides many attractive features, such as availability, self-organization, load-balancing, and anonymity. However, P2P network has created significant problems to network operators by generating large volumes of inter autonomous system (inter-AS) traffic. Focusing on the BitTorrent swarming protocol, this paper proposes an approach which aims to reduce P2P generated inter-AS traffic. In particular, the approach can reduce inter-AS traffic by 50% to 70%. Moreover, it can improve the downloading speed by 60% for the popular torrents. The evaluation shows that controlled regional-based contents replication can effectively achieve this goal. Furthermore, the approach is incrementally deployable. Network regions in which the system gets deployed can solve their P2P generated inter-AS traffic problems autonomously, i.e., without any Internet service providers-collaboration and any requirement, the system can be deployed in the entire Internet. 展开更多
关键词 BITTORRENT contents replication inter-as traffic peer-to-peer.
在线阅读 下载PDF
RISP: An RPKI-Based Inter-AS Source Protection Mechanism 被引量:3
2
作者 Yihao Jia Ying Liu +1 位作者 Gang Ren Lin He 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第1期1-12,共12页
IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion, especially a Distributed Denial-of-Service (DDoS) attack. Although Source Address Validations (S... IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion, especially a Distributed Denial-of-Service (DDoS) attack. Although Source Address Validations (SAVs) at the access network level are standardized by the Internet Engineering Task Force (iETF), SAV at the inter-Autonomous System (AS) level still remains an important issue. To prevent routing hijacking, the IETF is constructing a Resource Public Key Infrastructure (RPKI) as a united trust anchor to secure interdomain routing, in this study, we creatively use the RPKI to support inter-AS SAV and propose an RPKI-based Inter-AS Source Protection (RISP) mechanism. According to the trust basis provided by the RPKI, RISP offers ASes a more credible source-oriented protection for the IP addresses they own and remains independent of the RPKI. Based on the experiments with real Internet topology, RISP not only provides better incentives, but also improves efficacy and economizes bandwidth with a modest resource consumption. 展开更多
关键词 IP spoofing source address validation inter-as RPKI DDOS
原文传递
高速长波长星间光通信中掺铒光纤放大器应用的理论研究
3
作者 盛立 汤伟中 周文 《光通信技术》 CSCD 北大核心 2000年第1期69-74,共6页
提出了一个增益自动控制的级联 EDFA系统 ,通过对掺铒光纤光放大理论模型的数值模拟 ,论证了它在高速长波长星间光通信系统中应用的可行性。同时进一步分析了在大信号、高泵浦功率条件下高速光脉冲信号放大过程中的各种畸变特性以及放... 提出了一个增益自动控制的级联 EDFA系统 ,通过对掺铒光纤光放大理论模型的数值模拟 ,论证了它在高速长波长星间光通信系统中应用的可行性。同时进一步分析了在大信号、高泵浦功率条件下高速光脉冲信号放大过程中的各种畸变特性以及放大的自发辐射对系统信噪比增益的影响。 展开更多
关键词 星间光通信 级联 掺铒光纤放大器 脉冲畸变
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部