用户名: 密码: 验证码:
基于P2P多播发现的FTP SERVER及FTP调度优化
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
FTP协议是目前互联网应用中最重要的协议之一,自70年代产生以来得到了广泛的应用,现在已经与HTTP协议等一起成为互连网上最通用的标准之一,得到了几乎所有浏览器软件和操作系统的支持,并被广大用户所使用。P2P(Peer-to-Peer,中文译为对等网),是近年来迅速发展的一种网络体系结构。这种网络结构的主要思想就是使不同地域的个人终端直接相连,进行信息的共享和交互,满足了人们日益增长的自由共享资源的要求,近年来发展极为迅速。
     基于P2P多播发现的FTP SERVER将P2P的多播发现技术引入到FTP SERVER软件的设计中,具体地说也就是多个FTP SERVER通过一定的规则组成一个SERVERGROUP,在这个内实现自动发现、资源共享,用户通过任意一台FTP SERVER就可以访问该SERVER所在的SERVERGROUP内所有的FTP SERVER对该用户开放的资源,从而较好地满足了多个FTP SERVER联合提供FTP服务的需求,方便了用户的访问。
     另外,本文还提出了一种新的FTP调度策略——响应比优先动态调度。由于以前的FTP服务器大部分是专用服务器,文件传输任务并不繁重,所以FTP SERVER软件很少考虑FTP调度问题。但近年来随着影视、音乐等文件大量传输的情况出现,FTP SERVER的效率问题逐渐开始引起人们的关注。为此,我们提出了这种新的调度策略,主要思想是“小文件传输优先、兼顾公平”,对于一个等待任务队列通过计算响应比来确定服务顺序,从而提高了FTP SERVER的效率。
As one of the most important protocols in web applications, FTP has been widely used since it was first proposed in the 1970s. P2P has seen rapid development in recent years and has gained its own advantages on internet resource sharing.
    FTP server software was originally designed for special servers and personal FTP servers have not been given enough consideration. But as computer hardware and software developing, more and more small scaled enterprises and personal FTP servers are set up. This paper introduces the technology of IP Multicase Discovery into the design of FTP servers which enables the automatic discovery and resource sharing and thus meets the requirement of combining multiple FTP servers for FTP service.
    In addition, previously designed FTP servers rarely considered, the problem of FTP Scheduling. This paper proposes a new FTP scheduling technique-Highest Response Ratio Next Dynamic Scheduling. The essence of this proposition is to "give higher prioritie to smaller file-transefer, while considering the equity principle", so that FTP servers can be utilized more efficiently.
引文
[1] A. Bhushan, "A FILE. TRANSFER PROTOCOL", RFC114, 1971.4
    [2] Alfarcz Abdul-rahman, Stephen Hailes, A Distributed Trust Model, 2001
    [3] Andrei Broder, Ravi Kumar, Farzin Maghoul, Prabhakar Raghavan, Sridhar Rajagopalan, Raymie Stata, Andrew Tomkins, and Janet Wiener, "Graph structures in the web", Computer Networks, 2000,33(1-6):309-320
    [4] Andrew S. Tanenbaum. Computer Networks. Prentice Hall,Inc. 1996
    [5] Andy Oram, "Peer-to-Peer Makes the Internet Interesting Again", http://linux.orcillynct.com/lpt/a/401
    [6] Bellovin. S., "Firewall-Friendly FTP", RFC 1579, 1994.2
    [7] Dan Brick. lin, Thoughts on Peer-to-Peer, http://www.bricklin.com/p2p.htm
    [8] Dreamtech group,《对等网络编程源代码解析》,吴文辉、陈建荣、肖国尊等译,电子工业出版社,2002-8
    [9] Etcee LLC,对等计算实践:基于IP多播的发现2002-04
    [10] Etcee LLC,对等网络中的信任与安全,2001.7
    [11] Focus,Etcee LLC,对等计算实践:发现,2001.11
    [12] M. Horowitz, S. Lunt, "FTP Security Extensions", RFC 2228, 1997.10
    [13] J. J. Pansiot, D. Grad, On routes and multicast trees in the internet, 1998.
    [14] J. Postel, J. Reynolds, "FILE TRANSFER PROTOCOL(FTP)", RFC 959, 1985.9
    [15] J. Postel, "Transmission Control Protocol", RFC 793, 1981.9
    [16] Mark Allman, "FTP Security Considerations", RFC 2577, 1999.5
    [17] Mark Allman, Shawn Ostermann, Craig Metz, "FTP Extensions for IPv6 and NATs", RFC 2428, 1998.9
    [18] Mihajlo A, Jovanovic Modeling Large-scale Peer-to-Peer Networks and a Case Study of Gnutella http://www.ececs.uc.edu/mjovanov/thesis/thesis.pdf 2001-04
    [19] Mark Eggleston, "A peer-to-peer revolution", http://www.nwfusion.com/newsletters/techexec/2000/0828techexecl.html
    [20] Nelson Minar, "Distributed Systems Topologies: Part 2",
    
    http://www.openp2p.com/pub/a/p2p/2002/01/08/p2p_topologies_pt2.html
    [21]R.Rivest, "The MD5 Message-Digest Algorithm", 1992.4
    [22]W. Richard Stevens, TCP/IP Illustrated, Volume 1: The Protocols, 1994
    [23]丁力,FTP的安全问题,http://www.fanqiang.com/a5/b1/20010508/130158.html
    [24]范训礼,景广军,陈力军,基于Petri网描述的FTP代理服务器设计
    [25]高传善、钱松荣、毛迪林编著,《数据通信与计算机网络》,高等教育出版社2000-07
    [26]何韶军,王清贤,对抗FTP Bounce Attack攻击
    [27]刘辉,张明武,改进OTP技术在FTP代理认证中的分析与实现,2002.2
    [28]陈姝,方滨兴,周勇林,P2P技术的研究与应用
    [29]鲁士文编著,《计算机网络协议和实现技术》,清华大学出版社,2000-07
    [30]单国栋,戴英侠,王航,P2P网络系统中的安全问题,2002.1
    [31]王可,MD5算法研究,http://www.5xsoft.com/data/200203/2914345701.htm,2002.3,
    [32]燕辉,叶震,董泽浩,高柯俊,报文摘要算法MD5分析,2002年2月
    [33]周功业,黎书生,新一代网络计算模型——P2P及其JXTA体系结构的设计与实现2002.3

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700