| 研究生: |
陳炳誠 Chen, Ping-Cheng |
|---|---|
| 論文名稱: |
利用完全差距網路建構之拓樸提升P2P網路資源搜尋效率 Increase P2P Resource Search Efficiency by Topology Construction Using Perfect Difference Networks |
| 指導教授: |
李忠憲
Li, Jung-Shian |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2007 |
| 畢業學年度: | 95 |
| 語文別: | 中文 |
| 論文頁數: | 50 |
| 中文關鍵詞: | 點對點網路 、類神經網路 、完全差距網路 、非結構化點對點網路 、疊加網路 |
| 外文關鍵詞: | Perfect Difference Networks, unstructured P2P networks, Neural Networks, resource searching |
| 相關次數: | 點閱:139 下載:3 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
點對點網路系統是繼主從架構後新興的網路應用模式,在點對點網路中,使用者能同時扮演用戶端及伺服端等多重角色,任兩個使用者之間不需要透過伺服器而直接連結,進行有效率的資訊分享或內容交換。另外,由於使用者能自我組織並動態重組,使得點對點網路系統具有極高的擴充性與容錯性。此易於資源分享且分散式的系統本質,也引起學術界與產業界的重視。
查詢是點對點網路系統中,使用者搜尋網路資源最基本的核心功能,各節點以自我組織的方式形成疊加網路,利用類似廣播或路由的方式來進行查詢訊息的傳遞。目前使用最為廣泛的點對點網路系統是屬於非結構化的點對點網路系統,包括Gnutella、KaZaA、BitTorrent、eDonkey2000等應用系統。然而,在非結構化點對點網路系統中,存在著無法很有效率進行網路資源搜尋的問題。
因此,我們提出利用完全差距網路控制點對點網路系統拓樸的方法,並且提出一個基於類神經網路的搜尋方法,來改善非結構化點對點網路的搜尋效率,並且分析完全差距網路對於不同搜尋方法所產生的效能影響。
In recent years, peer-to-peer applications emerge as a new massively distributed computing system. Peers participating in the system can directly distribute tasks, exchange or share resources. There are currently several peer-to-peer systems in operation and many more are under development.
Resource searching has played an essential algorithm in this kind of network system. Unstructured P2P networks are the mostly popular in a variety of P2P network systems. However, it often suffers from resource searching inefficiency in an unstructured P2P network.
Therefore, we propose a topology control algorithm and novel searching method which is based on Neural Networks to improve the searching efficiency. We will also analyze the searching efficiency for different searching methods on the Perfect Difference Networks.
[1] 葉怡成,類神經網路模式應用與實作,儒林圖書有限公司,1994三版。
[2] B. Parhami and M. Rakov, “Perfect Difference Networks and Related Interconnection Structures for Parallel and Distributed Systems,” IEEE Trans. Parallel and Distrib-uted Systems, vol. 16, no. 8,pp. 714-724, Aug. 2005.
[3] B. Parhami and M. Rakov, “Performance, Algo-rithmic, and Robustness Attributes of Perfect Difference Net-works,” IEEE. Trans. Parallel and Distributed Systems, vol. 16, no. 8, pp. 725-736, 2005.
[4] N. Biggs, Algebraic Graph Theory. Cambridge Univ. Press, 1993.
[5] Leonard D. Baumert, “Cyclic Difference Sets”, Lecture Notes in Mathematics. Springer-Verlag, volume 182, 1971.
[6] T.P. Kirkman, “On the Perfect r-Partitions of ,” Trans. Historical Soc. of Lancashire and Cheshire, vol. 9, pp. 127-142, 1857.
[7] Guy, R. K., Unsolved Problems in Number Theory, 2nd ed. New York: Springer-Verlag, pp. 118-121, 1994.
[8] I. Stoica, R. Morris et al., “Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications,” IEEE/ACM Trans. Net., vol. 11, no. 1, pp. 17–32, 2003.
[9] S. Ratnasamy et al., “A Scalable Content Addressable Network,” Proc. ACM SIGCOMM, pp. 161–72, 2001.
[10] A. Rowstron and P. Druschel, “Pastry: Scalable, Distributed Object Location and Routing for Large-scale Peer-to-peer Systems,” Proc. Middleware, 2001.
[11] B. Y. Zhao et al., “Tapestry: A Resilient Global-Scale Overlay for Service Deployment,” IEEE JSAC, vol. 22, no. 1, pp. 41-53, Jan. 2004.
[12] P. Maymounkov and D. Mazieres, “Kademlia: A Peer-to-Peer Information System Based on the XOR Metric,” Proc. IPTPS, Cambridge, MA, USA, pp. 53–65, Feb. 2002.
[13] Gnutella development forum, the Gnutella v0.6 protocol, available at http://groups.yahoo.com/group/the gdf/files/, 2001.
[14] Kazaa Media Desktop, available at http://www.kazaa.com/,2001.
[15] Bittorrent, available at http://bitconjurer.org/BitTorrent/, 2003.
[16] The Overnet File-sharing Network, available at http://www.overnet.com/, 2002.
[17] Overnet/edonkey2000, available at http://www. edonkey2000.com/, 2000.
[18] K Lua, J Crowcroft, M Pias, R Sharma, S Lim - Communications Surveys & Tutorials, IEEE, A survey and comparison of peer-to-peer overlay network schemes, 2005.
[19] Gnutella website: http://gnutella.wego.com.
[20] V. Kalogeraki, D. Gunopulos, and D. Zeinalipour-Yazti, “A Local Search Mechanism for Peer-to-Peer Networks”, In CIKM, 2002.
[21] C. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker. “Search and Replication in Unstructured Peer-to-Peer Networks.” In ICS, 2002.
[22] D. Tsoumakos and N. Roussopoulos. “Adaptive Probabilistic Search for Peer-to-Peer Networks. ”, 3rd IEEE Intl Conference on P2P Computing, 2003.
[23] L Mathy, N Blundell, V Roca, A El-Sayed,“Impact of simple cheating in application-level multicast”,INFOCOM 2004. vol.2 pp1318- 1328, 2005.
[24] M. Vapa, N. Kotilainen, A. Auvinen, H. Kainulainen, and J. Vuori., “Resource discovery in P2P networks using evolutionary neural networks”, AISTA 2004, November 2004.
[25] J. Chu, K. Labonte, and B. Levine. Availability and Locality Measurements of Peer-to-Peer File Systems. In SPIE, 2002.