請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/32013完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 蔡益坤(Yih-Kuen Tsay) | |
| dc.contributor.author | Zi-Hau Yang | en |
| dc.contributor.author | 楊智皓 | zh_TW |
| dc.date.accessioned | 2021-06-13T03:28:01Z | - |
| dc.date.available | 2006-07-31 | |
| dc.date.copyright | 2006-07-31 | |
| dc.date.issued | 2006 | |
| dc.date.submitted | 2006-07-27 | |
| dc.identifier.citation | [1] Gnutella. http://gnutella.wego.com.
[2] Napster. http://www.napster.com. [3] Po-An Chen and Yih-Kuen Tsay. Emulating Small-World Networks on Content-Addressable Networks. 2004. [4] Po-Hung Chen. E±cient peer-to-peer keyword search using adaptive space partition. Master's thesis, National Taiwan University, 2004. [5] Meng-Jue Chiang. Improving the e±ciency of content-addressable networks using small-world models. Master's thesis, National Taiwan University, 2005. [6] K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica. The impact of dht routing geometry on resilience and proximity. In SIGCOMM '03:Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pages 381{394, New York, NY, USA, 2003. ACM Press. [7] C. Jin, Q. Chen, and S. Jamin. Inet: Internet Topology Generator. Technical Report CSE-TR443-00, Department of EECS, University of Michigan, 2000. [8] M. Kaashoek and D. Karger. Koorde: A simple degree-optimal distributed hash table. In Proc. 2nd IPTPS, Berkeley, CA, Feb 2003. [9] J. Kleinberg. The small-world phenomenon: an algorithm perspective. In STOC '00:Proceedings of the thirty-second annual ACM symposium on Theory of computing, pages 163{170, New York, NY, USA, 2000. ACM Press. [10] J. Kleinberg. Small-world phenomena and the dynamics of information. 2001. [11] D. Malkhi, M. Naor, and D. Ratajczak. Viceroy: A scalable and dynamic emulation of the butter°y. In Proceedings of the 21st annual ACM symposium on Principles of distributed computing. ACM Press, 2002. [12] G. Manku, M. Bawa, and P. Raghavan. Symphony: Distributed hashing in a small world. In Proc. 4th USENIX Symposium on Internet Technologies and Systems (USITS) 2003, 2003. [13] G. S. Manku. Routing networks for Distributed Hash Tables. In In proceedings of the 23nd ACM Symposium on Principles of Distributed Computing(PODC'03), 2003. [14] G. S. Manku, M. Naor, and U. Wieder. Know thy neighbor's neighbor: the power of lookahead in randomized p2p networks. In STOC '04: Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, pages 54{63, New York, NY, USA, 2004. ACM Press. [15] M. Naor and U. Wieder. Know thy neighbor's neighbor: Better routing for skip-graphs and small worlds. In The Third International Workshop on Peer-to-Peer Systems (IPTPS), pages 269{277, 2004. [16] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker. A scalable content-addressable network. In Proceedings of the 2001 conference on applications, technolo-gies, architectures, and protocols for computer communications, pages 161{172. ACM Press, 2001. [17] S. Ratnasamy, M. Handley, RM. Karp, and S. Shenker. Using the Small-World Model to Improve Freenet Performance. In INFOCOM, 2002. [18] S. Ratnasamy, S. Shenker, and I. Stoica. Routing Algorithms for DHTs: Some Open Questions. In Proc. 1st International Workshop on Peer-to-Peer Systems, March 2002. [19] A. Rowstron and P. Druschel. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. Lecture Notes in Computer Science, 2218, 2001. [20] I. Stoica, R. Morris, D. Karger, M. F. Kaashoekand, and H. Balakrishnan. Chord:A Scalable Peer-to-Peer Lookup Service for Internet Applications. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pages 149{160, San Diego, California, United States, 2001. ACM Press. [21] D. Watts and S. Milgram. Collective dynamics of small-world networks. Nature, 393, 1998. [22] H. Zhang, A. Goel, and R. Govindan. Using the small-world model to improve freenet performance. SIGCOMM Comput. Commun. Rev., 32(1):79{79, 2002. [23] B. Y. Zhao, J. Kubiatowicz, and A. D. Joseph. Tapestry: a fault-tolerant wide-area application infrastructure. Computer Communication Review, 32(1):81, 2002. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/32013 | - |
| dc.description.abstract | Distributed Hash Tables (DHTs) are a popular model for the object location problem in peer-to-peer overlay networks. Many DHT schemes have been proposed that achieve a short routing latency with a small per-node state space. However, most of these schemes are complicated and are difficult to maintain in dynamic environments where nodes join and leave frequently. Content-Addressable Networks (CANs), proposed by Ratnasamy et al., employs a virtual address space constructed as a d-dimension torus and are relatively easy to maintain.However, the CAN scheme is not very efficient when d is small. Meanwhile, small-world networks, proposed by Kleinberg, are a family of random graphs allowing an average path length of O(log^2n) with only O(1) links per node using greedy routing.
The idea of embedding a small-world graph into a CAN-like network has been proposed. We consider and embed the small-world model into a 2-dimension network, referred to as the ``small-world CAN'. The small-world CAN constructs the network as a 2-dimension torus and enjoys the advantages of both CAN and the small-world model. However, the small-world CAN's underlying network topology does not match that of the physical Internet. We propose a new scheme by modifying the small-world CAN. We change the model's virtual network space into a 2-dimensional cylindrical space to improve the routing stretch. Although we have changed the virtual network topology, it still keeps the advantages of the two schemes. Each node in the overlay network is equipped with a constant number of links, connecting to the immediate neighbors and to a long-distant node chosen randomly according to a probability distribution function randomly. Based on the modified small-world CAN scheme, we have implemented a prototype system that also supports keyword search. Typical DHT schemes only support a simple map from keys to values, but not keyword search. In order to support keyword search on a network scheme, some distributed inverted index is needed. We choose a keyword search scheme that has been designed to work on top of CAN. The scheme has a good load balancing and incur little network traffic overhead. The implementation could be seen as a beginning of combining the DHT scheme with upper layer applications. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-13T03:28:01Z (GMT). No. of bitstreams: 1 ntu-95-R93725032-1.pdf: 618858 bytes, checksum: 259979086dd9961a126df245ac3bc309 (MD5) Previous issue date: 2006 | en |
| dc.description.tableofcontents | 1 Introduction 1
1.1 Background and Motivation . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Thesis Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Related Work and Preliminaries 5 2.1 Viceroy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Koorde . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.3 Content-Addressable Networks . . . . . . . . . . . . . . . . . . . . . . . . 6 2.3.1 Routing in CAN . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.3.2 Network Construction in CAN . . . . . . . . . . . . . . . . . . . . 7 2.3.3 Finding a Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.3.4 Topologically-sensitive CAN . . . . . . . . . . . . . . . . . . . . . 9 2.4 The Small-World Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.5 Symphony . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.5.1 Probability density function. . . . . . . . . . . . . . . . . . . . . . 13 2.5.2 Routing Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.5.3 Estimation Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.6 Small-World on CAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2.6.1 Chiang's Approach . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2.6.2 Point-based Naive Approach . . . . . . . . . . . . . . . . . . . . . 17 2.6.3 Node-based Approximation Approach . . . . . . . . . . . . . . . . 17 2.6.4 Cluster-based Approximation Approach . . . . . . . . . . . . . . . 18 2.7 Lookahead - NoN-greedy Algorithm . . . . . . . . . . . . . . . . . . . . . 19 2.8 Keyword Search in CAN . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.8.1 Basic Idea . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.8.2 Region Assignment . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.8.3 Object Insertion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 2.8.4 Lookup Function . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 3 The Modi‾ed Small-World CAN Scheme 25 3.1 Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 3.2 Construction of Long Distance Links . . . . . . . . . . . . . . . . . . . . 26 3.3 Routing Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 3.4 Estimation Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 3.5 Dynamic Maintenance and Recovery . . . . . . . . . . . . . . . . . . . . 29 3.5.1 Node Joins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3.5.2 Node Failure and Departure . . . . . . . . . . . . . . . . . . . . . 29 3.5.3 Maintenance of Long-distance links . . . . . . . . . . . . . . . . . 30 4 Simulation Results 32 4.1 Simulation Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 4.2 Routing e±ciency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 4.3 Routing Stretch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 4.4 Load Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 4.5 Resilience to failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 4.6 Estimation Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 4.7 Compare with other Protocols . . . . . . . . . . . . . . . . . . . . . . . . 39 4.7.1 Compare with Random Long-Distance Links . . . . . . . . . . . . 39 4.7.2 Compare with Symphony . . . . . . . . . . . . . . . . . . . . . . 39 5 A Prototype Implementation 44 5.1 Prototype Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 5.2 Dynamic Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 5.3 User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 5.3.1 Network Connecting Setting . . . . . . . . . . . . . . . . . . . . . 45 5.3.2 Object Searching . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 6 Conclusion 49 6.1 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 6.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 | |
| dc.language.iso | en | |
| dc.subject | 小世界模型 | zh_TW |
| dc.subject | 內容可定址網路 | zh_TW |
| dc.subject | CAN | en |
| dc.subject | routing stretch | en |
| dc.subject | small-world | en |
| dc.title | 改良式內容可定址網路之設計與實作 | zh_TW |
| dc.title | The Design and Implementation of an Improved Content-Addressable Network | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 94-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 莊裕澤(Yuh-Jzer Joung),林宗男(Tsung-Nan Lin) | |
| dc.subject.keyword | 內容可定址網路,小世界模型, | zh_TW |
| dc.subject.keyword | CAN,small-world,routing stretch, | en |
| dc.relation.page | 54 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2006-07-28 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
| 顯示於系所單位: | 資訊管理學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-95-1.pdf 未授權公開取用 | 604.35 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
