| 研究生: |
曾敬嘉 Zseng, Jing-Jia |
|---|---|
| 論文名稱: |
應用統計式搜尋節點篩選於改進非結構化點對點網路系統架構之研究 Choosing Powerful Neighbors in Unstructured Peer-to-Peer Systems by Statistical Matrix Form |
| 指導教授: |
謝孫源
Hsieh, Sun-Yuan |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2010 |
| 畢業學年度: | 98 |
| 語文別: | 英文 |
| 論文頁數: | 61 |
| 中文關鍵詞: | 非結構式網路 、洪水搜尋演算法 、網路頻寬 、應用統計矩陣 |
| 外文關鍵詞: | Unstructured peer to peer systems, flooding search, traffic cost, statistical matrix form |
| 相關次數: | 點閱:83 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
點對點(Peer-to-Peer)網路系統可區分為結構化(Structured)與非結構化(Unstructured)架構,其特點在於突破傳統的主從式(Client/Server)網路系統結構,本研究主要針對非結構化網路系統之搜尋方式進行探討與改良,從而發展出一套更有效率的搜尋演算法。在非結構化點對點網路系統中,傳統的資源搜尋機制為洪水搜尋演算法(Flooding),該方法是將每個節點(Node)所發出或接收到的查詢訊息(Query Message)轉送給所有跟自己相連接的節點,直到TTL(Time-to-Live)的值等於零為止。然而,在這個無任何查詢策略的盲目搜尋演算法中,在大規模點對點網路系統裏將造成大量的頻寬浪費。在本研究中,藉著我們設計的統計式矩陣計算機制(Statistical Matrix Form, SMF)去辨別鄰近節點的相關能力,包括資源查詢、服務轉發、分享及暫存功能以及搜尋路徑挑選等隱含統計資訊計算,從中挑選出能力較強的節點來傳送及轉發查詢訊息,進而改善其搜尋效能。在廣大的網路系統中,每個節點在不同性質包括分享數量、分享品質、服務意願以及傳輸時間等方面皆各有差異。因此針對此觀點,我們將這些性質導入我們提出的數學統計資訊運算架構裡,進而演化成SMF;透過此搜尋機制,我們將可以大量的改善搜尋效能。無論在理論以及實驗的分析方面,皆証明出我們所提出的方法是有效且實用的。
Flooding is a traditional file search mechanism in unstructured Peer-to-Peer (P2P) systems in which a peer broadcasts a query to its neighbors until the time-to-live (TTL) decreases to zero. However, this blind choice strategy usually creates enormous traffic costs within a large network. In this paper, we seek to improve search performance in un- structured P2P networks by choosing neighbors' abilities through power-theoretic pattern we named Statistical Matrix Form (SMF). In networks, peers are different from each other in many aspects, such as sharing numbers, content quality, query service and transport efficiency between neighbors. We designed SMF to measure these features in our math- ematic model to compute neighbors' abilities so higher capabilities can be determined in order to significantly reduce traffic costs. Both theoretical and experimental analyzes have been demonstrated to be effective and efficient in our proposed method.
[1] Gnutella, http://gnutella.wego.com, 2003.
[2] KaZaA, http://www.kazaa.comn, 2003.
[3] BitTorrent, http://www.bittorrent.com, 2007.
[4] E. Adar and B. Huberman, “Free Riding on Gnutella,” First Monday, 5(10), October 2000.
[5] G. Chen, C.P Low, and Z. Yang, “Enhancing Search Performance in Unstructured P2P Networks Based on Users' Common Interest,” IEEE Transactions Parallel andDistributed System, vol. 19, 2008.
[6] Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker, “Making Gnutella-like P2P Systems Scalable,” in Proceedings of ACM SIGCOMM, 2003.
[7] S.S. Dhillon and P.V. Mieghem, “Searching with Multiple Random Walk Queries,” IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2007.
[8] C. Gkantsidis, M. Mihail, and A. Saberi, Random Walks in Peer-to-Peer Networks,” IEEE International Conference on Computer Communications, 2004.
[9] Daniel Hughes, Geoff Coulson, and James Walkerdine, “Free Riding on Gnutella Revisited: the Bell Tolls?” IEEE Computer Society, vol. 6, 2005.
[10] H.C. Hsiao, C.H. He, “A Tree-Based Peer-to-Peer Network with Quality Guarantees,” IEEE Transactions Parallel and Distributed System, vol. 19, 2008.
[11] H.C. Hsiao, H. Liao, and C.C Hung, “Resolving the Topology Mismatch Problem in Unstructured Peer-to-Peer Networks,” IEEE Transactions Parallel and Distributed System, vol. 20, 2009.
[12] S. Jiang, L. Guo, X. Zhang, and Haodong Wang, “LightFlood: Minimizing Redundant Messages and Maximizing the Scope of Peer-to-Peer Search,” IEEE Transactions Parallel and Distributed System, vol. 19, 2008.
[13] A. Kumar, J. Jim, X. Ellen, and W. Zegura, “Efficient and Scalable Query Routing for Unstructured Peer-to-Peer Networks,” IEEE International Conference on Computer Communications, 2005.
[14] Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker, “Search and Replication in Unstructured Peer- to-Peer Networks,” Proceedings of the 16th international conference on Supercomputing, 2002.
[15] X. Liu, Y. Liu, L. Xiao, “Improving Query Response Delivery Quality in Peer-to-Peer Systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 17, 2006.
[16] s Y. Liu, L. Xiao, X. Liu, L.M. Ni, and X. Zhang, “Location Awareness in Unstructured Peer-to-Peer Systems,” IEEE Transactions Parallel and Distributed Systems, vol. 16, 2005.
[17] Y. Liu, L. Xiao, L.M. Ni, “Building a Scalable Bipartite P2P Overlay Network,” IEEE Transactions Parallel and Distributed System, vol. 18, 2007.
[18] Y. Liu, Z. Zhuang, L. Xiao, and L.M. Ni, “AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems,” Proceedings of IEEE GLOBECOM, 2003.
[19] S. Patro and Y.C. Hu, “Transparent Query Caching in Peer-to-Peer Overlay Networks,” in Proceedings of the 17th International Parallel and Distributed Processing Symposium, 2003.
[20] A. Rowstron and P. Druschel, “Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems,” in Proceedings of the 18th IFIP/ACMInternational Conference on Distributed Systems Platforms, 2001.
[21] M. Ripeanu, I. Foster, and A. Iamnitchi, “Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design,” IEEE Internet Computing Journal, vol. 6, 2002.
[22] S.C. Rhea, and J. Kubiatowicz, “Probabilistic Location and Routing,” IEEE International Conference on Computer Communications , 2002.
[23] H. Stark and Jovan G. Brankov, “Estimating the Standard Deviation From Extreme Gaussian Values,” IEEE Signal Processing Letters, vol. 11, 2004.
[24] S. Saroiu, P. Gummadi, and S. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems,” in Processing of Multimedia Computing and Networking, 2002.
[25] R.M. Stoica, D. Karger, M.F. Kaashoek, and H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications,” in Proceedings of ACMSIGCOMM, 2001.
[26] K. Scipanidkulchai, B. Maggs, and H. Zhang, “Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems,” in Proceedings of ACM SIGCOMM, 2003.
[27] Ch. Theoharatos, G. Economou, and S. Fotopoulos, “Color Edge Detection Using the Minimal Spanning Tree,” Pattern Recognition, vol. 38, 2005.
[28] D. Tsoumakos and N. Roussopoulos, “Analysis and Comparison of P2P Search Methods,” ACM International Conference Proceeding Series, 2003.
[29] Y.Takahasi, T. Izumi, H. Kakugawa, and T. Masuzawa, “An Efficient Index Dissemination in Unstructured Peer-to-Peer Networks,” IEICE - Transactions on Information and Systems, 2008.
[30] S. Tewari and L. Kleinrock, “Optimal Search Performance in Unstructured Peer-to-Peer Networks With Clustered Demands,” IEEE Journal On Selceted Areas InCommunications, vol. 25, 2007.
[31] C. Wang and L. Xiao, “An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity,” IEEE Transactions Parallel and Distributed Systems, vol.18, 2007.
[32] C. Wang, L. Xiao, Y. Liu, and P. Zheng, “DiCAS: An Efficient Distributed Caching Mechanism for P2P Systems,” IEEE Transactions Parallel and Distributed System,vol. 17, 2006.
[33] H. Wang' and T. Lin , “On Efficiency in Searching Networks,” IEEE International Conference on Computer Communications, 2005.
[34] L. Xiao, Y. Liu, and L.M. Ni, “Improving Unstructured Peer-to-Peer Systems by Adaptive Connection Establishment,” IEEE Transactions on Computers, 2005.
[35] B. Yang and H. Garcia-Molina, “Efficient Search in Peer-to-Peer Networks,” ACM Symposium on Parallel Algorithms and Architectures, 2002.
[36] Z. Zhu, P. Kalnis, and S.Bakiras, “DCMP: A Distributed Cycle Minimization Protocol for Peer-to-Peer Networks,” IEEE Transactions on Parallel and DistributedSystems, 2008.
[37] Y.B. Zhao, J.D. Kubiatowicz, and A.D. Joseph, “Tapestry: An Infrastructure forFault-Resilient Wide-Area Location and Routing,” Technical Report UCB//CSD-01-1141, Univ. of Calif. Berkeley, 2001.
校內:2012-08-04公開