On The Study Of File Transmit Strategy In High Privacy P2P System

碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 96 === P2P file transfer, one of the most popular transfer architecture in recent network, has many advantages. The transfer power is no longer limited by a single server’s bandwidth, and every peer’s resource such as storage, bandwidth, computing power can be fully ut...

Full description

Bibliographic Details
Main Authors: YI-TING TSO, 左一廷
Other Authors: Kuo-Hui Tsai
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/96943528163802271429
Description
Summary:碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 96 === P2P file transfer, one of the most popular transfer architecture in recent network, has many advantages. The transfer power is no longer limited by a single server’s bandwidth, and every peer’s resource such as storage, bandwidth, computing power can be fully utilized in an organized manner. Its operation doesn’t count on a highly stable network, and also provides a great scalability. After wide deployments, the issues of privacy protection and anti-interference have being emerged, and many frameworks have been proposed by different P2P community to improve its performance. Among those proposals, Winny is a remarkable one. Winny, a Japanese p2p file sharing system, designed for high degree of anonymity and performance. But as the price, Winny’s performance was not good enough. The operation of key exchange consumes lots of bandwidth, it’s file sharing depends on an instable search mechanism, together with some strict restrictions on the connection, resulting in a poor transfer performance. Here we propose a regional exchange pattern to enhance its transfer utility, and reduce the number of key to get better search efficiency. We will assess the effectiveness of using this technology, and the impact of privacy. Our experiment shows that the trade off between performance and privacy is positive.