Responsive image
博碩士論文 etd-0717106-154503 詳細資訊
Title page for etd-0717106-154503
論文名稱
Title
一個以九方區域樹來回答P2P系統中空間完全符合查詢的方法
An NA-tree Approach to Answering the Spatial Exact Match Query in P2P Systems
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
77
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2006-06-02
繳交日期
Date of Submission
2006-07-17
關鍵字
Keywords
空間區域資料、搜尋、完全符合搜尋
Searching, Spatial Region Data, Exact Match Query
統計
Statistics
本論文已被瀏覽 5653 次,被下載 0
The thesis/dissertation has been browsed 5653 times, has been downloaded 0 times.
中文摘要
在P2P (peer to peer) 系統中,空間資料 (spatial data) 發生在許多重要且不同的應用上,例如: P2P 虛擬城市 (virtual city),地理資訊系統 (GIS),土地發展計畫等。在P2P環境中,對於回答空間區域資料完全符合搜尋的問題,以 R-tree 為基礎的架構,也許是個不錯的選擇。然而,因為peer系統是動態的,因此,在 R-tree中,對於資料增減時會全域 (global) 更改的特色,使得無法在P2P系統中有效的作業。再者,R-tree中overlap的問題,造成大量的磁碟存取次數(在P2P系統中,則是被考慮成大量的訊息 (message) 傳遞次數)。因此,對於P2P系統來說,一個以P2PR-tree為索引基礎的方法被提出,當資料增減時,它只有區域 (local) 的索引架構被更改。對於資料增減時,雖然,P2PR-tree能達成區域性的更改目標,但是 overlapping 的現象仍然難以解決。近年來,對於空間資料的存取,一個勝過以R-tree為基礎的方法,NA-tree,已經被提出。再者,它沒有R-tree可能會發生overlap的問題。基本上,一個NA-tree並不對空間區域做分割,但是,它只是藉由某些規則對空間資料做分類。另一方面,Chord系統是一個著名的結構化 (structured) P2P系統。在Chord中,是以雜湊函數來對資料做搜尋,來取代在大部分非結構化 (unstructured) P2P系統中flooding的方式。因為,Chord是一個雜湊的方法,它能夠容易地處理資料增減時只做區域性的更改。然而,目前的Chord系統無法有效的處理區域資料,因為,它只處理單一key值。因此,在此篇論文中,我們提出在Chord系統中,使用在雜湊函數上,資料key值的部份,利用NA-tree對空間區域資料做編碼的方式做資料的搜尋。也就是說,我們仍然使用Chord中的一個雜湊函數來把節點配置給 peer,並且使用另一個雜湊函數,藉由 NA-tree對空間區域資料編碼的資料key值來配置資料。首先,我們用三個 bit來表示NA-tree中八種情況。接著,我們提出兩種方法來產生key值中剩餘的bit數。我們第一個提出的方法,是藉由加0的方式來產生剩餘的 bit數。這個方法簡單,是適用在P2P系統裡物件數量很少時。為了避免一個 peer 擁有太多物件,第二個方法把區域的中心點考慮進來。這個方法適用在P2P系統中有很多物件存在的情況。最後,我們把前三個 bit 和剩餘的 bit連接在一起,得到物件的key值。因此,我們結合了NA-tree和Chord系統,並解決P2PR-tree無法解決的overlapping問題。在我們模擬的研究中,我們使用六種不同的資料分佈來比較我們的方法以及P2PR-tree。從我們模擬的結果顯示出,在資料搜尋上,在我們的方法裡比P2PR-tree需要走訪較少的peer次數。
Abstract
Spatial data occurs in several important and diverse applications in P2P systems, for example, P2P virtual cities, GIS, development planning, etc. For the problem of answering exact queries for spatial region data in the P2P environment, an R–tree based structure probably is a good choice. However, since a peer system is dynamic, the global update characteristics of data insertion/deletion in an R–tree can not work well in a P2P system. Moreover, the problem of overlaps in an R–tree results in large number of the disk accesses (which will be considered as large number of messages in P2P systems). Therefore, a P2PR–tree based indexing method for P2P systems has been proposed which has only local update to the proposed index structure when data insertion/deletion occurs. Although the P2PR–tree can achieve the goal of the local update for data insertion/deletion, the overlapping phenomenon is still hard to solve. Recently, for region data access, an NA–tree has been proposed which outperforms R–tree–like data structures. Moreover, it does not have the problem of overlaps which may occur in an R–tree. Basically, an NA–tree does not split the spatial space, but it just classifies the spatial data objects by some rules. On the other hand, the Chord system is a well–known structured P2P system in which the data search is performed by a hash function, instead of flooding used in most of the unstructured P2P system. Since the Chord system is a hash approach, it is easy to deal with data insertion/deletion with only local update. However, the current Chord system can not work well with the region data, since it only works well with a single key value. Therefore, in this thesis, we propose to apply an NA-tree in the Chord system to encode spatial region data in the data key part used in the hash function to data search. That is, we still use one hash function of Chord to assign nodes to peers, and use another hash function to do data assignment by applying an NA–tree to encode the spatial region data to data keys. First, we use three bits to present the first eight children in the NA–tree. Next, we propose two methods to generate the key value of the remaining bits. For our first proposed method, it generates the remaining bits by adding 0’s. This method is simple and applicable to the case that there are few objects in P2P systems. To avoid the case that a peer may own too many objects, the second method takes the central points of regions into consideration. This method is applicable to the case that there are too many objects in the P2P system. Finally, we concatenate the first three and the remaining bits to get the key values of objects. Thus, we combine the NA–tree with the Chord system to solve the overlapping problem which the P2PR–tree can not deal with. In our simulation study, we use six different data distributions to compare our method with the P2PR–tree. From our simulation results, we show that the number of visited peers in our approach is less than that in the P2PR–tree.
目次 Table of Contents
ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Peer–to–Peer Systems . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Searching Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Multi–Dimensional Queries . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.5 Organization of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . 13
2. A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.1 Unstructured P2P Systems . . . . . . . . . . . . . . . . . . . . . . . . 15
2.1.1 Napster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.1.2 Gnutella . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.2 Structured P2P Systems . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.3 The Feature–Based Signature . . . . . . . . . . . . . . . . . . . . . . 19
2.4 The Multi–Dimensional Query . . . . . . . . . . . . . . . . . . . . . . 21
2.5 Queries Based on the Space Filling Curve . . . . . . . . . . . . . . . . 25
3. An NA–Tree Approach . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.1 Data Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.2 The Insertion Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.3 Answering the Spatial Exact Match Query . . . . . . . . . . . . . . . 44
4. Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
4.1 Simulation Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
4.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
5. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.2 Future Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
參考文獻 References
[1] Gnutella website. http://freenet.sourceforge.net/

[2] Groove website. http://www.groove.net/

[3] Kazaa website. http://www.kazaa.com/

[4] SETI@HOME website. http://setiathome.ssl.berkeley.edu/

[5] JXTA website. http://www.jxta.org/

[6] K. Aberer, “P–Grid: A Self–Organizing Access Structure for P2P Information Systems,” Proc. of the Cooperative Information Systems, pp. 179–194, 2001.

[7] J. Aspnes and G. Shah,“Skip Graphs,” Proc. of the 17th Annual ACM Symp. on Parallelism in Algorithms and Architectures, pp. 384–393, January 2003.

[8] S. Androutsellis–Theotokis and D. Spinellis,“A Survey of Peer–to–Peer Content Distribution Technologies,” ACM Computing Survey, Vol. 36, No. 4, pp. 335–371, Dec. 2004.

[9] J. L. Bentley, “Multidimensional Binary Search Trees Used for Associative Searching,” Communications of the ACM, Vol. 18, No. 9 pp. 509–517, Sept. 1975.

[10] N. Beckmann, H. P. Kriegel, R. Schneider and B. Seeger, “The R_–tree: An Efficient and Robust Access Method for Points and Rectangles,” Proc. of ACM SIGMOD Int. Conf. on Management of Data, pp. 322–331, May 1990.

[11] C. Bohm, G. Klump and H. Kriegel, “XZ–Ordering: A Space–Filling Curve for Objects with Spatial Extension,” Lecture Notes in Computer Science, Vol. 1651, pp. 75–90, July 1999.

[12] Ye–In Chang, Cheng–Huang Liao and Hue–Ling Chen, “NA-Trees: A Dynamic Index for Spatial Data,” Journal of Information Science and Engineering (SCI), Vol. 19, No. 1, pp. 103–139, 2003.

[13] I. Clarke, O. Sandberg, B. Wiley and T. W. Hong, “Freenet: A Distributed Anonymous Information Storage and Retrieval System,” Proc. of Int. Workshop on Design Issues in Anonymity and Unobservability, pp. 46–66, 2001.

[14] A. Crespo and H. Garcia-Molina, “Routing Indices for Peer–to–Peer Systems,” Proc. of the 22nd Int. Conf. on Distributed Computing, pp. 23–32, July 2002.

[15] R. Dingledine, M. Freedman and D. Andmolnar, “The FreeHaven Project: Distributed Anonymous Storage Service,” Proc. of Int. Workshop on Design Issues in Anonymity and Unobservability, pp. 67–95, 2000.

[16] P. Druschel and A. Rowstron, “Past: A Large–Scale, Persistent Peer–to–Peer Storage Utility,” Proc. of the 8th Workshop on Hot Topics in Operating Systems, pp. 75–80, 2001.

[17] C. Faloutsos, “Signature Files: Design and Performance Comparison of Some Signature Extraction Methods,” Proc. of ACM SIGMOD Int. Conf. on Management of Data, pp. 63–82, May 1985.

[18] P. Ganesan, B. Yang and H. G. Molina,“One Torus to Rule Them All: Multi– Dimensional Queries in P2P Systems,” Proc. of the 7th Int. Workshop on the Web and Databases, pp. 19–24, June 2004.

[19] P. Ganesan and H. G. Molina,“Efficient Queries in Peer–to–Peer Systems,” IEEE Data Eng. Bulletin, Vol. 28, No. 1, pp. 48–54, March 2005.

[20] K. Hildrum, J. D. Kubiatowicz, S. Rao, and B. Y. Zhao,“Distributed Object Location in a Dynamic Network,” Proc. of the 14th ACM Symp. on Parallel Algorithms and Architectures, pp. 41–52, 2002.

[21] N. J. A. Harvey, M. B. Jones, S. Saroiu, M. Theimer, and A. Wolman,“SkipNet: A Scalable Overlay Network with Practical Locality Properties,” Proc. of the 4th USENIX Symp. on Internet Technologies and Systems, pp. 113–126, March 2003.

[22] H. Jagadish, “Linear Clustering of Objects with Multiple Attributes,” Proc. of ACM SIGMOD Int. Conf. on Management of Data, pp. 332–342, June 1990.

[23] I. Jawhar and J. Wu, “A Two–Level Random Walk Search Protocol for Peer–to–Peer Networks,” Proc. of the 8th World Multi–Conf. on Systemics, Cybernetics and Informatics, 2004.

[24] D. Karger, E. Lehman, F. Leighton, M. Levine, D. Lewin and R. Panigrahy, “Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web,” Proc. of the 29th ACM Symp. on Theory of Computing, pp. 654–663, May 1997.

[25] V. Kalogeraki, D. Gunopulos and D. Zeinalipour–Yazti, “A Local Search Mechanism for Peer–to–Peer Networks,” Proc. of the 11th ACM Conf. on Information and Knowledge Management, pp. 300–307, 2002.

[26] O. Kwon, J. W. Moon and K. J. Li, “DisTIN – A Distributed Spatial Index for P2P Environment,” Proc. of Data Engineering Workshop, pp. 11–17, 2006.

[27] Z. Lin and C. Faloutsos, “Frame-Sliced Signature Files,” IEEE Trans. on Knowledge and Data Eng., Vol. 4, No. 3, pp. 281–289, June 1992.

[28] Q. Lv, S. Ratnasamy and S. Shenker,“Can Heterogeneity Make Gnutella Scalable?,” Proc. of the 1st Int. Workshop on Peer–to–Peer Systems, pp. 94–103, March 2002.

[29] Q. Lv, P. Cao, E. Cohen, K. Li and S. Shenker,“Search and Replication in Unstructured Peer–to–Peer Networks,” Proc. of the 16th ACM Int. Conf. on Supercomputing, pp. 84–95, June 2002.

[30] X. Li and J. Wu,“Searching Techniques in Peer–to–Peer Networks,” Master Thesis, Department of Computer Science and Engineering, Florida Atlantic University, 2004.

[31] D. S. Milojicic, V. Kalogeraki, R. Lukose, K. Nagaraja, J. Pruyne, B. Richard, S. Rollins and Z. Xu,“Peer–to–Peer Computing,” Technical Report, HP Laboratories, March 2002.

[32] R. Matsushita, H. Kitagawa and Y. Ishikawa,“Feature–Based Distributed Object Search Using Signatures in Peer–to–Peer Environments,” Proc. of 2004 ACM Symp. on Applied Computing, pp. 729–734, March 2004.

[33] A. Mondal, Yilifu and M. Kitsuregawa,“P2PR–tree: An R–Tree–Based Spatial Index for Peer–to–Peer Environments,” Proc. of Int. Workshop on Peer–to–Peer Computing and Databases, March 2004.

[34] J. A. Orenstein and T. H. Merrett, “A Class of Data Structures for Associative Searching,” Proc. of ACM PODS Symp. on Principles of Database Systems, pp. 181–190, April 1984.

[35] Yutaka Ohsawa and Masao Sakauchi, “A New Tree Type Structure with Homogeneous Nodes Suitable for a Very Large Spatial Database,” Proc. of IEEE Int. Conf. on Data Eng., pp. 296–303, 1990.

[36] V. Papadimos, D. Maier and K. Tufte, “Distributed Query Processing and Catalogs for Peer–to–Peer Systems,” Proc. of Int. Conf. on Innovative Data Systems Research, 2003.

[37] S. Ratnasamy, P. Francis, M. Handley, R. Karp and S. Shenker, “A Scalable Content–Addressable Network,” ACM SIGCOMM Computer Communication Review, Vol. 31, No. 4, pp. 161–172, 2001.

[38] S. C. Rhea and J. Kubiatowicz, “Probabilistic Location and Routing,” Proc. of the 21st Annual Joint Conf. of the IEEE Computer and Communications Societies, Vol. 3, pp. 1248–1257, June 2002.

[39] J. Risson and T. Moors, “Survey of Research Towards Robust Peer–to–Peer Networks: Search Methods,” Technical Report UNSW–EE–P2P–1–1, University of New South Wales, Sydney, Australia, Sept. 2004.

[40] T. K. Sellis, N. Roussopoulos and C. Faloutsos, “The R+–tree: A Dynamic Index for Multi–Dimensional Objects,” Proc. of Int. Conf. on Very Large Data Bases, pp. 507–518, Aug. 1987.

[41] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek and H. Balakrishnan, “Chord: A Scalable Peer–to–Peer Lookup Service for Internet Applications,” Proc. of ACM SIGCOMM Conf., pp. 149–160, 2001.

[42] C. Schmidt and M. Parashar, “Enabling Flexible Queries with Guarantees in P2P Systems,” Internet Computing Journal, Vol. 8, No. 3 pp. 19–26, May–June 2004.

[43] Y. Shu, B. C. Ooi, K. Tan and A. Zhou, “Supporting Multi–Dimensional Range Queries in Peer–to–Peer Systems,” Proc. of the 5th IEEE Int. Conf. on Peer–to–Peer Computing, 2005.

[44] D. Tsoumakos and N. Roussopoulos, “Adaptive Probabilistic Search in Peer–to–Peer Networks,” Proc. of the 2nd Int. Workshop on Peer–to–Peer Systems, 2003.

[45] M. Waldman, A. D. Faloutsos and L. F. Cranor “Publius: A Robust, Tamper–Evident, Censorship–Resistant Web Publishing System,” Proc. of the 9th USENIX Security Symp., pp. 59–72, 2000.

[46] B. Yang and H. Garcia–Molina “Improving Search in Peer–to–Peer Networks,” Proc. of the 22nd IEEE Int. Conf. on Distributed Computing, pp. 5–14, July 2002.

[47] C. Yang and J. Wu “A Dominating–Set–Based Routing in Peer–to–Peer Networks,” Proc. of the 2nd Int. Workshop on Grid and Cooperative Computing Workshop, pp. 332–339, 2003.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內校外均不公開 not available
開放時間 Available:
校內 Campus:永不公開 not available
校外 Off-campus:永不公開 not available

您的 IP(校外) 位址是 3.135.209.249
論文開放下載的時間是 校外不公開

Your IP address is 3.135.209.249
This thesis will be available to you on Indicate off-campus access is not available.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code