Responsive image
博碩士論文 etd-0719112-211845 詳細資訊
Title page for etd-0719112-211845
論文名稱
Title
整合實體網路與重疊網路以改善以Kademlia為基礎的同儕網路系統
Performance Improvement of Kademlia-based Peer-to-Peer System by Integrating Physical Network into Overlay Network
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
73
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2012-05-25
繳交日期
Date of Submission
2012-07-19
關鍵字
Keywords
點對點、邏輯距離、實際距離
Ping, PRKad, Peer-to-Peer, Kademlia, XOR
統計
Statistics
本論文已被瀏覽 5680 次,被下載 459
The thesis/dissertation has been browsed 5680 times, has been downloaded 459 times.
中文摘要
  Kademlia[1]提出了以二進位數列組成的ID,搭配XOR的機制來建立邏輯距離,並用此為基礎構建一個虛擬網絡。但此虛擬網絡在搜尋上無法同時考慮實體網絡的狀況,如此將導致最後的結果,在實際網絡中可能是距離較遠的節點,其產生的延遲將降低往後操作的效率。因此本論文將使用ping值代表實際距離,使得搜尋能同時考慮ping值,在保持原Kademlia的特性下,取得較有效率的結果,稱作PRKad。
  從模擬實驗的結果看來,PRKad雖然增加較多的跳數,但可以有效的取得ping值較低,也就是實際距離較近的節點。
Abstract
  Kademlia[1] provides a concept of using XOR between ID to present logical distance. As Kademlia uses logical distance to search, it cannot take physical distance into consideration, which can lead the result to be the closest in logical, but the farthest in physical.
  In this paper, ping rate is used to represent the meaning of physical distance, and construct a physical network in Kademlia. The operations like lookup and search will take logical and physical distance into consideration at the same time, called PRKad.
  The simulation result shows that PRKad can actually automatically choose the more efficiency nodes, which means the close nodes in physical network, to decrease the time using of the following operations.
目次 Table of Contents
誌謝 i
摘要 iii
Abstract iv
目錄 v
圖次 viii
表次 x
第一章 Introduction 1
1.1 background and Motivation 1
第二章 Relate work 3
2.1 CAN 3
2.1.1 Join 4
2.1.2 Leave 4
2.1.3 Lookup 4
2.2 Chord 4
2.2.1 Finger table 5
2.2.2 Join 6
2.2.3 Leave 7
2.2.4 Lookup 8
2.3 Chord2 9
2.3.1 Super node selection 9
2.3.2 Conduct ring construction 10
2.3.3 Join 12
2.3.4 Leave 13
2.3.5 Lookup 13
2.4 Pastry 14
2.4.1 Join 16
2.4.2 Leave 16
2.4.3 Lookup 16
2.5 Tapestry 17
2.5.1 Join 17
2.5.2 Leave 17
2.5.3 Lookup 18
第三章 Kademlia 19
3.1 k-bucket 19
3.3 Kademlia tree 20
3.3.1 Join/Leave 23
3.4 Protocol 23
3.4.1 Lookup 23
3.4.2 Publish 24
3.4.3 Search 24
3.5 Problem Definition 25
3.6 Relate Work 26
第四章 PRKad 28
4.1 PR tree 28
4.1.1 Join/Leave 30
4.2 Protocol 31
4.2.1 Bootstrap 31
4.2.2 Lookup 31
4.2.3 Publish 32
4.2.4 Search 33
第五章 Simulation 34
5.1 Design 34
5.1.1 Ping/Latency 34
5.1.2 Simulation Message 35
5.1.3 Simulation Time 36
5.1.4 Simulation Set 37
5.2 Simulation Result 40
5.2.1 General Simulation 40
5.2.2 Parameter Set Simulation 44
5.2.3 Other Simulation 45
第六章 Conclusion 46
Reference 47
Appendix 55
參考文獻 References
[1] P. Maymounkov and D. Mazieres, “Kademlia: a peer-to-peer information system based on the XOR metric,” Proceeding of the First International Workshop on Peer-to-Peer Systems, March 2002, pp. 53-65.
[2] R. Schollmeier, “A Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architectures and Applications,” Proceeding of the First International Conference on Peer-to-Peer Computing, IEEE (2002), August 2001, pp. 101-102.
[3] Napster, http://www.napster.com
[4] Gnutella, http://en.wikipedia.org/wiki/Gnutella
[5] Gnutella2, http://en.wikipedia.org/wiki/Gnutella2
[6] Distributed hash table, http://en.wikipedia.org/wiki/Distributed_hash_table
[7] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, “A Scalable content-addressable network,” Proceeding of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Vol. 31, No.4, August 2001, pp. 161-172.
[8] I. Stoica, R. Morris, D.R. Karger, M.F. Kaashoek and H. Balakrishnan, “Chord: A Scalable Peer-to-peer Lookup Service for Internet,” Proceeding of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2001, pp. 149-160.
[9] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek and H. Balakrishnan, “Chord: A scalable peer-to-peer lookup service for internet applications,” Technical Report, TR-819, MIT LCS, March 2001.
[10] Y.J. Joung and J.C. Wang, “Chord2: A two-layer Chord for reducing maintenance overhead via heterogeneity,” Computer Networks and ISDN Systems, Vol. 51, No. 3, February 2007, pp. 712-731
[11] A. Rowstron and P. Druschel, “Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems,” Proceeding of the 2001 IFIP/ACM International Conference on Distributed Systems Platforms, vol. 2218 of Lecture Notes in Computer Science, Springer-Verlag, 2001, pp. 329-350.
[12] B.Y. Zhao, J. Kubiatowicz and A.D. Joseph, “Tapestry: an infrastructure for fault-tolerant wide-area location and routing,” Techical Report, UCB/CSD-01-1141, University of California, Berkeley, April 2001.
[13] M. Castro, M. Costa and A. Rowstron, “Debunking some myths about structured and unstructured overlays,” Proceeding of the 2nd Symposium on Networked Systems Design and Implementation, May 2005, Vol.2, pp. 85-98.
[14] Y. Qiao and F.E. Bustamante, “Structured and unstructured overlays under the microscope,” Proceeding of the 2006 USENIX Annual Technical Conference, June 2006, pp. 31.
[15] E.K. Lua, J. Crowcroft, M. Pias, R. Sharma and S. Lim, “A Survey and Comparison of Peer-to-Peer Overlay Network Schemes,” IEEE Communications Surveys and Tutorials, 2005, Vol. 7, No. 2, pp. 72-93.
[16] J. Chuang, N. Christin and A. Weigend, “Content availability, pollution and poisoning in peer-to-peer file sharing networks,” Proceedings of the 6th ACM Conference on Electronic Commerce, June 2005, pp. 68-77.
[17] J. Liang, R. Kumar, Y. Xi and K.W. Ross, “Pollution in p2p file sharing systems,” Proceeding of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, March 2005, Vol.2, pp.1174-1185.
[18] J. Liang, N. Naoumov and K.W. Ross, “The index poisoning attack in p2p file sharing systems,” Proceeding of 25th IEEE International Conference on Computer Communications, April 2006, pp. 1-12.
[19] J. Bryson, P. Gallagher, “FIPS PUB 180-4: Secure Hash Standard (SHS),” March 2012.
[20] Eclusive-or, http://en.wikipedia.org/wiki/Exclusive_or
[21] eMule, http://www.emule-project.net
[22] BitTorrent, http://en.wikipedia.org/wiki/BitTorrent
[23] J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao, “Oceanstore: An architecture for global-scale persistent storage,” Proceeding of ACM Architectural Support for Programming Languages and Operating Systems, November 2000, Vol. 35, No. 11, pp. 190-201.
[24] M. Waldman, A.D. Rubin and L.F. Cranor, “Publius: A robust, tamper-evident, censorship-resistant, web publishing system,” Proceeding of 9th USENIX Security Symposium, 2000, Vol. 9, pp. 5-5.
[25] D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin and R. Panigrahy, “Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web,” Proceedings of the 29th Annual ACM Symposium on Theory of Computing, May 1997, pp. 654-663.
[26] D. LEWIN, “Consistent hashing and random trees: Algorithms for caching in distributed networks,” Master thesis, Department of EECS, MIT, 1998. Available at the MIT Library, http://thesis.mit.edu/
[27] J. Aspnes and G. Shah, “Skip graphs,” Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2003, pp. 384–393.
[28] Z. Xu and Z. Zhang, “Building low-maintenance expressways for P2P systems,” Technical Report, HPL-2002-41, Hewlett-Packard Laboratories, Palo Alto, March 2002.
[29] F. Cornelli, E, Damiani, S.D.C. di Vimercati, S. Paraboschi and P. Samarati, “Choosing reputable servants in a P2P network,” Proceeding of the 11th International Conference on the World Wide Web, November 2002, pp. 376-386.
[30] S.D. Kamvar, M.T. Schlosser and H. Garcia-molina, “The EigenTrust Algorithm for Reputation Management in P2P Networks,” Proceeding of the 12th International World Wide Web Conference, 2003, pp. 640-651.
[31] L. Xiong and L. Liu, “Peertrust: supporting reputation-based trust for peer-to-peer electronic communities,” IEEE Transactions on Knowledge and Data Engineering, July 2004, Vol. 16, pp. 843-857.
[32] E. Harjula, T. Koskela and M. Ylianttila, “Comparing the Performance and Efficiency of Two Popular DHTs in Interpersonal Communication,” Proceeding of Wireless Communications and Networking Conference, March 2011, pp. 2173-2178.
[33] R. Steinmetz and K. Wehrle, “Peer-to-peer systems and applications,” Lecture Notes in Computer Science, 2005, Vol. 3485, p. 629, isbn: 978-3-540-29192-3.
[34] S. Saroiu, K.P. Gummadi and S.D. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems,” Proceeding of Multimedia Computing and Networking, January 2002.
[35] G. Huang, Y. Liang and Y. Zhou, “A Resource Locating Model Based on Local Nodes First in Overlay Network,” Proceeding of the 2011 IEEE 2nd International Conference on Software Engineering and Service Science, July 2011, pp. 344-347.
[36] Q. Xu, L. Sun and J. Liu, “Topology-aware Kademlia based on distributed clustering in self-organizing mode,” Proceeding of the 2010 2nd International Conference on Computer Engineering and Technology, April 2010, V1-267-271.
[37] C. Wang, N. Yang and H. Chen, “Improving Lookup Performance Based on Kademlia,” Proceeding of the 2010 Second International Conference on Networks Security Wireless Communications and Trusted Computing, April 2010, pp. 446-449.
[38] C. Sub-r-pa and C. Pornavalai, “Proximity neighbor selection using IP prefix matching in Kademlia-based Distributed Hash Table,” Proceeding of the 2010 International Conference on Electrical Engineering/Electronics Computer Telecommunications and Information Technology, May 2010, pp. 671-675.
[39] B. Krishnamurthy, J. Wang and Y. Xie, “Early measurements of a cluster-based architecture for P2P systems,” Proceeding of the ACM SIGCOMM Internet Measurement Workshop, November 2001, pp. 105-109, doi: 10.1145/505202.505216.
[40] Y. Liu and P. Yang, “An advanced algorithm to P2P semantic routing based on the topologically-aware clustering in self-organizing mode,” Journal of Software, 2006, Vol.17, part 2, pp. 339-348.
[41] Z. C. Xu, C. Tang and Z. Zhang, “Building topology-aware overlays using global soft-state,” Proceeding of International Conference on Distributed Computing Systems, 2006, pp. 500.
[42] D. Stingl, C. Gros, J. Ruckert, L. Nobach, A. Kovacevic and R. Steinmetz, “PeerfactSim.KOM: A Simulation Framework for Peer-to-Peer Systems,” Proceeding of the 2011 International Conference on High Performance Computing & Simulation, July 2011, pp. 577-584.
[43] KOM - Multimedia Communications Lab, Technical University of Darmstadt, “Documentation for PeerfactSim.KOM”.
[44] A. Kovacevic, S. Kaun, P. Mukherjee, N. Liebau and R. Steinmetz, “Benchmarking Platform for Peer-to-Peer Systems,” it-Information Technology, September 2007, Vol. 49, No. 5, pp. 312-319.
[45] M.M. Deza and E. Deza, “Encyclopedia of Distances,” Springer, Berlin, 2009.
[46] Encyclopedia distance, http://en.wikipedia.org/wiki/Euclidean_distance
[47] D. Stutzbach and R. Rejaie, “Improving Lookup Performance over a Widely-Deployed DHT,” Proceeding of INFOCOM 2006. 25th IEEE International Conference on Computer Communications, April 2006, pp. 1-12.
[48] M. Steiner, T. En-Najjary and E.W. Biersack, “Long Term Study of Peer Behavior in the KAD DHT,” IEEE/ACM Transactions on Networking, October 2009, Vol. 17, No. 5, pp. 1371-1384.
[49] B. Heep, “R/Kademlia: Recursive and Topology-aware Overlay Routing,” Proceeding of Conference on Telecommunication Networks and Applications, 2010, pp. 102-107.
[50] Y. Zhou, S. Liu and G. Huang, “Kad-D: An Improved Model Based on Kademlia,” Proceeding of 2011 Third International Conference on Multimedia Information Networking and Security, November 2011, pp. 123-127.
[51] C. Zhao and H. Zhang “Research on Searching Mechanism Based on Interest in Kademlia,” Proceeding of 2009 Ninth International Conference on Hybrid Intelligent Systems, August 2009, Vol. 2, pp. 54-57.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code