Description: 本软件要在网络中实现点对点的实时对话,主要的工作大约有: A).软件界面的实现。 B).两台主机通过Socket进行通信的实现。 C).如何从本机接收到要发送给对方的消息与如何接收到从对方来的消息并显示的过程。 D).进行异常处理。-the software in peer-to-peer networks to achieve real-time dialogue, the main work around : A). Software interface is achieved. B). Two mainframe through Socket communication is achieved. C). How receive from the machine to be sent to the other party and how to receive news from the other side of the news and display process. D). For Exception Handling. Platform: |
Size: 145659 |
Author:邓春燕 |
Hits:
Description: 本软件要在网络中实现点对点的实时对话,主要的工作大约有: A).软件界面的实现。 B).两台主机通过Socket进行通信的实现。 C).如何从本机接收到要发送给对方的消息与如何接收到从对方来的消息并显示的过程。 D).进行异常处理。-the software in peer-to-peer networks to achieve real-time dialogue, the main work around : A). Software interface is achieved. B). Two mainframe through Socket communication is achieved. C). How receive from the machine to be sent to the other party and how to receive news from the other side of the news and display process. D). For Exception Handling. Platform: |
Size: 145408 |
Author:邓春燕 |
Hits:
Description: p2p技术已经是主流,而这些p2p技术方面的读物想必可以给你点提示-p2p technology has been the mainstream, which p2p technical aspects of the books definitely can give you clues Platform: |
Size: 3365888 |
Author:小蔡 |
Hits:
Description: Shareaza2.1.0.0
Shareaza is the most luxurious and sophisticated file sharing system you ll find. It can harness the power of up to four separate peer-to-peer (P2P) networks, including EDonkey2000, Gnutella, BitTorrent and Shareaza s native network, Gnutella2 (G2).-Shareaza2.1.0.0 Shareaza is the most luxu rious and sophisticated file sharing system yo u'll find. It can harness the power of up to four se parate peer-to-peer (P2P) networks, including EDonkey2000, Gnutella, BitTorrent and Shareaza's native network, Gnutella2 (G2). Platform: |
Size: 2348032 |
Author:lococo |
Hits:
Description: 聊天室的实现,网络间点对点的传输文件,监听IP地址的端口.-The realization of chat rooms, peer-to-peer networks to transfer files, monitor port IP address. Platform: |
Size: 2189312 |
Author:byf |
Hits:
Description: 对等网络的研究与应用 对等网络的研究与应用-Peer-to-peer networks research and application of peer-to-peer research and application Platform: |
Size: 207872 |
Author:田家雨 |
Hits:
Description: One of the major weaknesses of existing peer-to-peer
networks is that their overlay structures do not reflect
the underlying Internet topology, resulting in
unnecessary consumption of network resources. We
propose a Geographical Longest Prefix Matching (Geo-
LPM) scheme to self-organise nodes into clusters using
IP prefixes and network metric measurements. Geo-
LPM efficiently locates nodes to produce superior
overlays while optimising the usage of network
resources. It is simple, scalable and self-organising. Platform: |
Size: 254976 |
Author:hanh |
Hits:
Description: One of the major weakness of existing peer-to-peer
networks is that their overlay structures do not match
well with the physical underlying network topology. In
this paper, we present a Geographical Longest Prefix
Matching (Geo-LPM) scheme whereby nodes selforganise
themselves into clusters such that nodes in the
same cluster are close to each other in terms of network
latency and membership. Geo-LPM combines IP
prefixes and network metric measurements to quickly
and easily locate nodes in the geographical space. It is
simple, scalable, self-organising and distributed with no
form of global knowledge Platform: |
Size: 132096 |
Author:hanh |
Hits:
Description: 设计一种激励机制鼓励节点分享它们所拥有的资源是p2p网络中一个关键的挑战,这里搜集了很多关于p2p激励机制的英文文献,-One of the key challenges in peer-to-peer networks is the design of incentives to encourage peers to share their resources.There are many essays about incentives in p2p network Platform: |
Size: 6404096 |
Author:jing |
Hits:
Description: Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and is
gradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with each
other in a peer-to-peer manner and form a network on-the-fly, carrying out
basic Platform: |
Size: 201728 |
Author:badraac |
Hits:
Description: Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and isgradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with eachother in a peer-to-peer manner and form a network on-the-fly, carrying outbasic Platform: |
Size: 201728 |
Author:movePr |
Hits:
Description: This book is now in its fifth edition. Each edition has corresponded to a dif
ferent phase in the way computer networks were used. When the first edition ap
peared in 1980, networks were an academic curiosity. When the second edition
appeared in 1988, networks were used by universities and large businesses. When
the third edition appeared in 1996, computer networks, especially the Internet, had
become a daily reality for millions of people. By the fourth edition, in 2003, wire
less networks and mobile computers had become commonplace for accessing the
Web and the Internet. Now, in the fifth edition, networks are about content dis
tribution (especially videos using CDNs and peer-to-peer networks) and mobile
phones are small computers on the Internet.
New in the Fifth Edition
Among the many changes in this book, the most important one is the addition
of Prof. David J. Wetherall as a co-author. David brings a rich background in net
working, having cut his teeth designing metropolitan-area networks more than 20
years ago. He has worked with the Internet and wireless networks ever since and
is a professor at the University of Washington, where he has been teaching and
doing research on computer networks and related topics for the past decade.
Of course, the book also has many changes to keep up with the: ever-changing
world of computer networks. Among these are revised and new material on
Wireless networks (802.12 and 802.16)
The 3G networks used by smart phones
RFID and sensor networks
Content distribution using CDNs
Peer-to-peer networks
Real-time media (from stored, streaming, and live sources)
Internet telephony (voice over IP)
Delay-tolerant networks Platform: |
Size: 6765433 |
Author:tareqemeish@gmail.com |
Hits: