版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、畢業(yè)論文(設(shè)計(jì))外文翻譯題 目: 基于c+局域網(wǎng)聊天系統(tǒng) 學(xué) 院: 數(shù)理與信息學(xué)院 學(xué)生姓名: 陳霆 專 業(yè): 計(jì)算機(jī)科學(xué)與技術(shù) 班 級(jí): a07計(jì)算機(jī) 指導(dǎo)教師: 管林挺 起止日期: 2011.3.29至2011.6.18 2011年4月6日paper1p2p trust modelsummary of the p2p network problems are analyzed, described the establishment of p2p network trust model needs.p2p network on the existing trust models are s
2、ummarized, pointing out the direction of future research.introductionwith the internets widespread popularity, the rich end users system resources, as well as the rapid increase in network bandwidth, the traditional client / server network application mode server performance bottlenecks and single p
3、oint of failure issue is not only limited the full use of end system resources,also increasingly unable to meet the new distributed applications.the p2p networks to work together, distributed information sharing, large-scale parallel computing such as showing the unique advantages of the new develop
4、ment to make it hot.p2p networks are willing to share resources on the node the basic assumption that each node share its own resources and from other nodes where the resources for their own needs.however, such individuals to provide resources for the public, and node behavior result in unconstraine
5、d mode of p2p network there are three problems.(1) ride (free-riding) problemfree-rriding consumption of other nodes that node only contribution to the resources without sharing their own resources.to gnutella p2p file sharing system, for example, 70% of the nodes is the free-rider.the latest monito
6、ring also shows that in the edonkey file-sharing network, about 80% of the nodes is the free-rider.(2) public goods and sorrow (the tragedy of the commons) problempublic goods and sorrow means the network resources as a non-exclusive public resources are most uncontrolled use of p2p nodes, according
7、 to statistics, p2p traffic accounted for 60% of internet zong traffic flow, and the user is not the total number of significant growthcases, p2p traffic is still growing rapidly.in fact, p2p network users of its fundamental purpose is rational to maximize their utility, but does not consider the ne
8、tworks overall effectiveness.(3) not reliable services, and fraudp2p network, there are a large number of unreliable service quality, and fraud.to the many file-sharing application, for example, 25% of the documents were forged documents (faked files).this is similar to ebay in e-commerce, this is n
9、ot a reliable service and fraud to the user impact is more serious.therefore, effective mechanisms must be designed to regulate the behavior of nodes in p2p networks to address these three issues, to improve the availability of p2p services to promote effective collaboration node and the rational us
10、e of network resources.why is the trust modelnodes that have their own rights, self-organizing p2p network, how to regulate the behavior of the node? in fact, p2p networks provide real-world network environment of human communication, human-centered networks, and social networks with the same config
11、urationsex.the trust as an integral part of social existence, is the social network in the core of relations between people.human society, reputation-based trust relationship with the incentive mechanism to restrict peoples daily behavior.trust-based p2p network and the similarity of human social ne
12、tworks embodied in the p2p network between individuals interact with each other for each other left sporadic credit information; individual objects on the interaction with the full right to choose; individuals are often not the absolute valuereliability or quality of service that individuals can tol
13、erate a small amount of damage caused by the wrong choice, such as file-sharing application; individual obligation to the network to provide recommended information to other individuals.therefore, we can describe p2p networks using the trust relationship between nodes, and to take trust-based incent
14、ive mechanisms to address these issues.(1) to provide differentiated services based on trust valuesin file sharing p2p network, nodes on the network resources according to the contribution level, to provide differentiated services.for example, kazaa nodes provide the resources and the ratio of consu
15、mption of resources into the system as a node in the level of participation and access to services as a priority of the node.bittorrent nodes upload rate under each other to determine their own upload rate.edonkey network node in accordance with the request of local trust values to set the node in t
16、he download queue priority.malicious use of network resources on the node to punish.for example, proposed incentives rtbma focus on the gnutella network file transfer type when the bandwidth allocation problem, according to the contribution of the node on the network for distribution of bandwidth re
17、sources.when a node share data, contribute to stimulate nodes to increase share value.when the node from the node overload to download a file, contribution to reducing the value of the node to suppress the consumption of public resources.differentiated services based incentives to encourage cooperat
18、ion between nodes, and the rational use of network resources, in order to address free-riding and the tragedy of public goods problem.(2) according to the trust value of node selection service providernode can be based on trust values to choose to trade with each other.for example, in the ebay netwo
19、rk, high trust value to buy the products business, which encourage businesses to maintain good sales practices and improve reliability of products.effectively inhibit the p2p network is not reliable services, and fraud.the concept of trusttrust is a multidisciplinary concept, describes specific situ
20、ations, an individual may have adverse consequences in the circumstances, want to believe that another individual has some ability to complete a task or a subjective belief.close contact with the concept of trust the credibility of credit from the individuals social network, is based on observed pas
21、t behavior or past behavior of individual information and expectations on individual behavior.the difference between reputation and trust can i trust you because you have good credit or i trust you despite your credit is not good to show.this shows that the credibility of the stress that a group of
22、individuals or groups to a common level of reliability and trust more to emphasize that trust in the individuals subjective trust trusted party.mentioned in this article refers to the trust the trust side of the trusted partys subjective trust, that trust in parties according to their own experience
23、 or to both the trusted partys reputation and resulting reliability of trusted parties.in resource sharing in p2p networks, reflecting the extent of not only the reliable nodes such as computing nodes, storage, network bandwidth and other aspects of the objective ability, and participate in p2p netw
24、orks with nodes in the behavior traits, such as duration of the node-line, friendly, and so on.p2p networks in e-commerce category, the sellers trustworthiness and product description, communication with the buyer, delivery time, delivery and related charges.in practical applications, the nodes will
25、 affect the credibility of all the factors that quantify the confidence and credibility of integrated reached node is not feasible.therefore, under normal circumstances, the trust model in p2p networks, according to the node between satisfaction with the transaction to determine credibility.credibil
26、ity, trust and mutually beneficial relationshipshown in figure 1, if node a has a reciprocal behavior of other nodes, then a will have a good reputation, so node a will be other nodes in the trust, and transaction reciprocal behavior by other nodes.the plan involves a trusted network of reciprocity,
27、 or you can call it incentive mechanism.as the social field, only when the behavior of the past affect the future (for sociology as the future of the shadow (shadow of future) phenomenon), people have incentive to build mutual trust.therefore, the trust model and the incentive mechanism of interacti
28、on between the good, p2p networks can effectively promote the cooperation between nodes.figure 1 credit, trust and mutually beneficial relationship between a simple modeltrust model classificationin p2p network, there are all kinds of attack models, including: fraud, counterfeiting, defamation, frau
29、d combined with a front-end node (head-end node generally provide reliable service, the cooperative nodes give a fair evaluation. however, these front-end nodetrying to give a high internal malicious nodes to disguise malicious node positive behavior) of the joint fraud, change the id to re-enter th
30、e network node and the nodes intermittently to provide credible information and services, or the accumulation of credit to a certain height, the use ofits high trust value, fraud, slander or joint fraud attacks.most of the current trust model focused on solving the problem of certain types of attack
31、s, according to the method to establish trust relationships can be broadly divided into the trust model based on trusted third parties, and based on the feedback / evaluation of two types of trust model.trust model based on trusted third partysuch trust model in the traditional pki security system t
32、echnology, a small number of leaders through the network node to monitor the operation of the whole network, and regularly circular nodes or to punish violations.the legitimacy of these leaders node certificates issued by ca to be guaranteed.such systems often rely on a small central node, so there
33、is a single point of failure, and scalability issues.based on feedback / evaluation of the trust modeltrust model for p2p networks generally fall into this category, according to the different objects to be trusted, there is as resources to build the credibility and the credibility of the transactio
34、n nodes in two categories.the former focuses on p2p networks can access the informations credibility, and credibility of information providers do not establish direct contact.in this type of trust model, the nodes determine the reliability of the information, and gives a positive or negative feedbac
35、k rating, and further calculate the trust value.for example, in file-sharing application kazaa, only consider the positive feedback to the data signature way to build credibility, that is, if the user accepted the authenticity of the information, then the signature, the information obtained more sig
36、natures, the authenticity of the morehigh.such as resources, limited trust model to establish the credibility of information sharing applications, does not have broad applicability.below the node for the transaction to establish the credibility of the trust model are explained.(1) global trust model
37、trust model of such a network analysis and feedback of all transactions for each node to establish a unique credibility.the worlds largest auction site ebay by the end of trading, trading parties are given a positive, negative or neutral feedback rating, and use the number of positive minus the numb
38、er of negative rating reached a certain individuals credibility.the method is simple and easy to understand, but can not deal with the unfair trader is given feedback.s. kamvar global trust model eigentrust proposed transaction history according to the node to calculate the local trust, and trust in
39、formation to consider the recommendation of the node, through the iterative trust between nodes to achieve the spread of the trust, thus calculated for each node in the globalcredibility.w. dou and eigentrust similar to the proposed global trust model, to solve the eigentrust credibility in solving
40、global problems when the existence of solutions.a. yamamoto proposed a distributed trust model for p2p networks of trust between the nodes are modeled as web page links, pagerank algorithm using a distributed approach to calculating the trust value of nodes.but this model neglects the nodes and rela
41、tions of trust between the different nodes differ, their rationality is questionable.l. xiong proposed peertrust to more effectively assess the trustworthiness of peers and describes a variety of malicious acts p2p community will not only deal satisfaction feedback for evaluating the parameters of t
42、he trust, taking the total number of transactions, feedbackcredibility, the transaction context factor, the community context factor.simulation results show that the trust model can effectively inhibit the malicious node attacks.l. mekouar made part of the distributed p2p network (such as kazaa) the
43、 credibility of the management mechanism rms_pdn.super nodes in rms_pdn passed between nodes in the trust evaluation, so that each super-node to its leaf node record of effective contribution to the system and the credibility as a leaf node.however, all the nodes directly rms_pdn feedback vulnerable
44、 to malicious nodes of joint fraud attacks.global trust model ignores the private trust of features for a particular node, other nodes on the trust of his values are the same.simple global trust model vulnerable to malicious nodes joint fraud attacks.and complex needs of global trust model of cooper
45、ation between the processing nodes trust the information, computing and communication costs are higher.in addition, large-scale p2p network, each node in the global trust value computing the necessity and feasibility of further study.(2) the local trust modelon p2p networks have mostly focused on th
46、e trust model provides a mechanism which nodes can share information for a given node, the local trust value calculation.y. wang proposed a p2p environment based on bayesian network trust model.the trust model describes the main focus on different aspects of trust, which nodes can be based on differ
47、ent scenarios for on-demand access to different aspects of the performance of the node.the trust model can be adapted to smaller scale gnutella network, or nodes of the gnutella network interactive focus.s. lee proposed a fully distributed way to store the users credit information.and other trust sy
48、stem is different in the nice system, the node i trust information stored in other nodes of the services provided i satisfied with feedback, so trust in the information storage node motivated.l-xiong peertrust proposed mechanism allows nodes to provide feedback according to the node with its own ind
49、ividual choices similar feedback to calculate a given node of the subjective reliability of this method to prevent fraud attacks the joint node, but in largescale p2p networks because of the sparsity of the transaction, there is not necessarily sufficient similarity with the individual nodes.share i
50、nformation based on local trust model, shared access to information in two ways: first, to the other nodes by flooding a request for trust, poor scalability of the method; the other is the mechanism through the use of p2p dht storage systems such aschord and other access, this method is not suitable
51、 for frequent node join and leave the system p2p system.moreover, such sharing of information based on local trust model is not suitable for management information between nodes can not directly interact with some of the distributed p2p network.conclusionin the absence of an effective management mec
52、hanism in p2p networks, the establishment can suppress all the attack patterns of the trust model is very difficult, apart from the node to be able to suppress the attacks, the time of the establishment of trust model, trust model to fully consider whether the scale can be extendednature of trust in
53、 the trusted computing and information storage scalability, and trust in the process of information transmission bandwidth overhead problems.in addition, dynamic access to the network node frequent cases, the trust model of fault tolerance or robustness also needs to be stressed.in fact, in the p2p
54、network trust model, the community should be fully learn the true reputation management system, different scenarios for the transaction to establish credibility for the node, and nodes into a particular group to restrict and regulate the nodes xing wei.therefore, based on group reputation mechanism
55、is the direction of future research, research work has been useful in the exploration of aspects, but still not mature.in addition, the model of incentive mechanisms based on trust, not only to consider the p2p networks of cooperation between the internal nodes should also be considered p2p applicat
56、ions and networks of cooperation between other applications.for example, in p2p file sharing applications, when the network bandwidth utilization reaches a certain threshold, still predatory on the node using the network resources to punish.p2p applications and networks in harmony with other applica
57、tions, p2p applications is the development of long-term solution.journal of harbin institute of technologypaper2object landscapes and lifetimestechnically, oop is just about abstract data typing, inheritance, and polymorphism, but other issues can be at least as important. the remainder of this sect
58、ion will cover these issues. one of the most important factors is the way objects are created and destroyed. where is the data for an object and how is the lifetime of the object controlled? there are different philosophies at work here. c+ takes the approach that control of efficiency is the most i
59、mportant issue, so it gives the programmer a choice. for maximum run-time speed, the storage and lifetime can be determined while the program is being written, by placing the objects on the stack (these are sometimes called automatic or scoped variables) or in the static storage area. this places a priority on the speed of storage allocation and release, and control of
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 二零二五版環(huán)保項(xiàng)目貸款合同中的物權(quán)擔(dān)保與環(huán)保要求3篇
- 二零二五年度臨時(shí)炊事員雇傭合同標(biāo)準(zhǔn)版
- 2025年度廠房施工臨時(shí)用電合同4篇
- 2025年消防報(bào)警系統(tǒng)安裝與調(diào)試合同協(xié)議3篇
- 二零二五年度交通樞紐車位劃線與旅客引導(dǎo)合同4篇
- 二零二五年度鏟車租賃與施工成本控制合同3篇
- 2025年度新型環(huán)保煤泥資源化利用購(gòu)銷合同范本3篇
- 二零二五年度老舊小區(qū)改造民房租賃服務(wù)協(xié)議4篇
- 2025年牙科診所醫(yī)療廢物運(yùn)輸及處置服務(wù)合同4篇
- 2025年度綠色環(huán)保承臺(tái)施工合同范本4篇
- 巖土工程勘察課件0巖土工程勘察
- 《腎上腺腫瘤》課件
- 2024-2030年中國(guó)典當(dāng)行業(yè)發(fā)展前景預(yù)測(cè)及融資策略分析報(bào)告
- 《乘用車越野性能主觀評(píng)價(jià)方法》
- 幼師個(gè)人成長(zhǎng)發(fā)展規(guī)劃
- 2024-2025學(xué)年北師大版高二上學(xué)期期末英語試題及解答參考
- 動(dòng)物醫(yī)學(xué)類專業(yè)生涯發(fā)展展示
- 批發(fā)面包采購(gòu)合同范本
- 乘風(fēng)化麟 蛇我其誰 2025XX集團(tuán)年終總結(jié)暨頒獎(jiǎng)盛典
- 2024年大數(shù)據(jù)分析公司與中國(guó)政府合作協(xié)議
- 一年級(jí)數(shù)學(xué)(上)計(jì)算題專項(xiàng)練習(xí)匯編
評(píng)論
0/150
提交評(píng)論