Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2008-03
Add to Favorite Get Latest Update

Torrent File Optimization Strategy Based on Merkle Tree in Bittorrent System

LIANG Cheng-ren, LI Jian-yong, HUANG Dao-ying, LI Jian-chun, GAO Xian-cen (Institute of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002)  
Bittorrent is the P2P system which works on central index server. The peer must get an expansion named torrent index file from the central index server before downloading. The index server becomes the bottleneck of the system. A torrent file optimization strategy based on Merkle tree is proposed, which makes the torrent file size smaller than before and lightens the overhead of the index server, improves the scalability of BT.
【Fund】: 河南省杰出青年科学基金资助项目(0612000600);; 河南省科技攻关基金资助项目(524220039)
【CateGory Index】: TP393.093
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 WANG Jue,ZHOU Li(School of Information Engineering,East China Jiaotong University,Nanchang 330013,China);An Analysis on Model Principle of BitTorrent[J];Journal of East China Jiaotong University;2009-01
2 XING Xiaoyun;The Legislation on the Privacy Protection of Patients’ Medical Information in USA and Its Implications[J];Journal of Nursing Science;2007-10
3 Tan Yunmeng Lang Weimin Yang ZongkaiTan Yunmeng Lect.; Dept. of Electronic & Information Eng., Huazhong Univ. of Sci. & Tech., Wuhan 430074, China.;Micropayment scheme based on Merkle tree[J];Journal of Huazhong University of Science and Technology;2004-06
4 Qiu Gang1 Liu Zhidu2 Zhou Lihua1(1 The CNIS Key Laboratory of the Education Ministry,Xidian University,Xi′an 710071,China;2 College of Computer and Information Technology,Nanyang Normal University,Nanyang 473061,Henan China);Remote attestation scheme based on Merkle tree[J];Journal of Huazhong University of Science and Technology(Nature Science Edition);2010-04
5 Zeng Hongbo1,2,Hu Mingchang1,Li Wen1,Cai Fei1,2,and Tang Zhimin1 1(Key Laboratory of Computer System and Architecture,Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100080)2(Graduate University of the Chinese Academy of Sciences,Beijing 100049);Design Implementation and Performance Analysis of a High Performance Northbridge[J];Journal of Computer Research and Development;2007-09
6 Zhang Lianfeng 1 Liu Nai'an 1 Qian Xiubin 2 Zhang Yuqing 21 (MCN Laboratory in ISN State Key Laboratory,Xidian University,Xi'an710071) 2 (National Computer Network Intrusion Protection Center,GSCAS,Beijing100039);Survey of Peer-to-Peer(P2P)Network Technology[J];Computer Engineering and Applications;2003-12
7 ZHANG Wei-Wei SHI Wen-Chang(Institute of Software,Chinese Academy of Sciences,Beijing 100080)1(Graduate University,Chinese Academy of Sciences,Beijing 100039)2(Key Lab of Data Engineering and Knowledge Engineering,Renmin University of China,Beijing 100872)3;Research and Implementation of a Trusted File System CIVFS Based on TPM[J];Computer Science;2008-02
8 HU Da sha,LI Bing fa (School of Computer Science & Engineering, Sichuan University,Chengdu Sichuan 610064,China);Research and Design of RAID Based on IEEE 1394[J];Application Research of Computers;2005-04
9 ZHANG Long,LI Wei,LI Yun-chun(Key Laboratory of Network Technology of Beijing City,School of Computer Science & Engineering,Beihang University,Beijing 100083,China);Distributed resource discovery model based on modified DHT[J];Application Research of Computers;2007-12
10 WANG Jing(Tsinghua National Lab.for Infor.Sci.and Technol.;Inst.of Microelec.,Tsinghua Univ.,Beijing 100084,P.R.China);Strained Silicon—A Technology to Extend Moore's Law[J];Microelectronics;2008-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved