[1]
|
Quang, H.V., Minhai, L. and Beng, C.O. (2010) Peer to Peer Computing Principles and Applications. New York City. http://dx.doi.org/10.1007/978-3-642-03514-2
|
[2]
|
Masoud, M.Z., Hei, X.J. and Cheng, W.Q. (2012) Constructing a Locality-Aware ISP-Friendly Peer-to-Peer Live Streaming Architecture. Proceeding of International Conference on Information Science and Technology (ICIST), Hubei, 23-25 March 2012, 368-376. http://dx.doi.org/10.1109/ICIST.2012.6221670
|
[3]
|
Alhaisoni, M., Liotta, A. and Ghanbari, M. (2009) Performance Analysis and Evaluation of P2PTV Streaming Behavior. International Symposium on Computers and Communications (ISCC), Sousse, 89-94. http://dx.doi.org/10.1109/ISCC.2009.5202402
|
[4]
|
Zhang, D.Y., Zheng, C., Zhang, H.L. and Yu, H.L. (2010) Identification and Analysis of Skype Peer-to-Peer Traffic. International Conference on Internet and Web Applications and Services (ICIW), Barcelona, 200-206. http://dx.doi.org/10.1109/ICIW.2010.36
|
[5]
|
Aggarwal, V., Akonjang, O. and Feldmann, A. (2008) Improving User and ISP Experience through ISP-Aided P2P Locality. Proceedings of INFOCOM Workshops, Phoenix, 1-6. http://dx.doi.org/10.1109/INFOCOM.2008.4544640
|
[6]
|
Ren, S., Tan, E., Luo, T., Guo, L., Chen, S. and Zhang, X. (2010) TopBT: A Topology-Aware and Infrastructure-In- dependent BitTorrent Client. Proceedings of INFOCOM, San Diego, 1-9. http://dx.doi.org/10.1109/INFCOM.2010.5461969
|
[7]
|
Xia, R.L. and Muppala, J.K. (2010) A Survey of BitTorrent Performance. International Journal of Communications Surveys & Tutorials, 12, 140-158. http://dx.doi.org/10.1109/SURV.2010.021110.00036
|
[8]
|
Fras, M., Klampfer, S. and Cucej, Z. (2008) Impact of P2P Traffic on IP Communication Network Performances. Proceeding of International Conference on Systems, Signals and Image Processing, Bratislava, 205-208. http://dx.doi.org/10.1109/IWSSIP.2008.4604403
|
[9]
|
Blond, S.L., Legout, A. and Dabbous, W. (2004) Pushing BitTorrent Locality to the Limit. International Journal of Computer and Telecommunications Networking, 55, 541-557. http://dx.doi.org/10.1016/j.comnet.2010.09.014
|
[10]
|
Coffins, D.R. and Bustamante, F.E. (2008) Taming the Torrent: A Practical Approach to Reducing Cross-ISP Traffic in Peer-to-Peer Systems. Proceeding of ACM SIGCOMM Conference on Data Communication, 363-374. http://dx.doi.org/10.1145/1402958.1403000
|
[11]
|
Lewis, P.R., et al. (2011) A Survey of Self-Awareness and Its Application in Computing Systems. Proceeding of International Conference on Self-Adaptive and Self-Organizing Systems Workshops (ICSASOW), Ann Arbor, 102-107. http://dx.doi.org/10.1109/SASOW.2011.25
|
[12]
|
Agarwal, V., Feldmann, A. and Scheideler, C. (2007) Can ISPs and P2P Users Cooperate for Improved Performance. ACM SIGCOMM Computer Communication Review Journal, 37, 29-40.
|
[13]
|
Chomsiri, T. (2008) Sniffing Packets on LAN without ARP Spoofing. Proceeding of International Conference on Convergence and Hybrid Information Technology (ICCIT), 2, 472-477. http://dx.doi.org/10.1109/ICCIT.2008.318
|
[14]
|
Wang, S.Q., Xu, D.S. and Yan, S.L. (2010) Analysis and Application of Wireshark in TCP/IP Protocol Teaching. Proceeding of International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT), 2, 269-272. http://dx.doi.org/10.1109/EDT.2010.5496372
|
[15]
|
Liu, B., Cui, Y., Lu, Y.S. and Xue, Y. (2009) Locality-Awareness in BitTorrent-Like P2P Applications. IEEE Transactions on Multimedia—Special Section on Communities and Media Computing Journal, 11, 361-371. http://dx.doi.org/10.1109/TMM.2009.2012911
|
[16]
|
Aho, A.V., Kernighan, B.W. and Weinberger, P.J. (1988) The AWK Programming Language. New York.
|
[17]
|
Cymru. http://www.team-cymru.org/Services/ip-to-asn.html
|