請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/9538完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 莊裕澤 | |
| dc.contributor.author | Hsiao-Mei Huang | en |
| dc.contributor.author | 黃曉梅 | zh_TW |
| dc.date.accessioned | 2021-05-20T20:27:32Z | - |
| dc.date.available | 2008-08-14 | |
| dc.date.available | 2021-05-20T20:27:32Z | - |
| dc.date.copyright | 2008-08-14 | |
| dc.date.issued | 2008 | |
| dc.date.submitted | 2008-08-13 | |
| dc.identifier.citation | [1] Gnutella http://www.gnutella.com.
[2] Freenet http://freenet.sourceforge.com [3] Bittorrent http://www.bittorrent.com/ [4] Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Schenker. A scalable content-addressable network. In Proceedings of the 2001 conference on appli-cations, technologies, architectures, and protocols for computer communications (SIG-COMM), pages 161–172. ACM Pres, August 2001. [5] Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM), pages 149–160. ACM Press, Auguest 2001. [6] Antony Rowstron and Peter Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceeding of IFIP/ACM International Conference on Distributed Systems Platforms, pages 329–350, November 2001. [7] C. Greg Plaxyon, R. Rajaraman, and A. W. Richa. Accessing nearby copies of replicated objects in a distributed environment. In Proceeding of the Ninth Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA 1997), pages 311~320. ACM Press, June 1997. [8] E. P. Markatos. Tracing a large-scale peer to peer system: An hour in the life of gnutella. In Proceedings of the 2nd IEEE / ACM International Symposium Cluster Computing and the GRID (CCGRID 2002), page 65-74. IEEE Computer Society, 2002. [9] C. Wang, L.Xiao, Y. Liu, and P. Zheng. Distributed caching and adaptive search in multiplayer P2P networks. In Proceeding of 24th International Conference on Distributed Computing Systems (IDCS’04), 2004 [10] S. Patro and Y. C. Hu. Transparent query caching in peer-to-peer overlay networks. In Proceedings of International Parallel and Distributed Processing Symposium (IDCS’03), 2003 [11] B. M. Duska, D. Marwood, and M. J. Freeley. The measured access characteristics of World-Wide-Web client proxy caches. In Proceedings of the USENIX Symposium on Internet Technologies and Systems (ITS’97), 1997 [12] M. Kacimi and K. Yetongnon. Evaluation study of a distributed caching based on query similarity in P2P network. In Proceedings of The 2nd International Conference on Scalable Information Systems (INFOSCALE 2007), 2007 [13] L. Fan, P. Cao, J. Almeida and A. Z. Border. Summary Cache: A scalable wide-area Web cache sharing protocal. In IEEE/ACM Transactions on networking, 8(3): 281-293, 2000 [14] D. Karger, E. Lehman, F. L. Leighton, M. Levine, D. Lewin and R. Panigrahy. Consistent hashing and random tree: Distributed caching protocals for relieving hot spots on the World Wide-Web. In Proceedings of the 29th ACM Symposium on Theory of Computing, 1997. [15] S. Iyer, A. Rowstron and P. Druschel, Squirrel: A decentralized peer-to-peer web cache. In Proceedings of the 21th ACM Symposium on Principles of Distributed Computing (PODC 2002), page 213-222, 2002 [16] P. Linga, I. Gupta and K, Birman. A churn-resistant peer-to-peer web caching system, In Proceedings of ACM workshop on Survivable and self-regenerative systems, 2003 [17] M. Roussopoulos and M. Baker. CUP: Controlled Update Propagation in Peer-to-Peer Networks. In Proceeding of International Workshop on Peer-to-Peer Systems (IPTPS’04), 2004 [18] R. P. Zhao, J. D. Kibiatowicz, and A. D. Joseph. Tapestry: An infrastructure for faul-tolerant wide-area location androuting. Technical report, University of California, Berkeley, April 04, 2001 [19] R. Bhagwan, K. Tati, Y. C. Cheng, S. Savage, and G.M. Voelker. Total Recall: System support for automated availability management. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI), 2004 [20] D. J. Watts*, S. H. Strogatz. Collective dynamics of ‘small-world’ networks. In Nature, 1998 [21] J. Kleinberg. The Small-world Phenomenon: An Algorithmic Perspective*. In Proceedings of the thirty-second annual ACM symposium on Theory of computing, 2000 [22] H. Zhang, A. Goel, R.Govindan, Using the small-world model to improve Freenet performance. In Science Direct-Computer Network 46: 555-574, 2004 [23] S. Merugu*, S. Srinivasan, E. Zegura. Adding structure to unstructured peer-to-peer networks: the use of small-world graphs. In J. Parallel Distrib. Comput. 65(2005) p.142~p.153 [24] K. Sripanidkulchai, B. Maggs, H. Zhang. Efficient content location using interest-based locality in peer-to-peer systems. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE [25] M. Berry, Z. Drmac, and E. Jessup, Matrices, Vector Spaces, and Information Retrieval, In SIAM Review, 41(2):335-362, 1999. [26] M. W. Berry, S. T. Dumais, and G. W. O'Brien, Using Linear Algebra for Intelligent Information Retrieval, In SIAM Review, 37(4):573-595, 1995. [27] BRITE. http://www.cs.bu.edu./brite/, 2003. [28] Yi-Fang Chou, Donuts: A Network-Aware and Load-Balanced System for Range Query [29] Wing Tat Wong, A Proximity-Aware and Group-based Peer to Peer System for Range Query. [30] J. Aspenes and G. Shah. Skip graphs. In Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2003), pages 384~393. Society for Industrial and Applied Mathematics, Jan. 2003. [31] S. Podlipnig, and L. Ormenyi. A Survey of Web Cache Replacement Strategies. In ACM Computing Surveys (CSUR), pages 374~398, 2003 [32] Abrams M., Standridge C. R., Abdulla G., and Williams S. Caching proxies: Limitations and potentials. In Proceedings of the 4th International World Wide Web Conference. 1995 [33] AGGARWAL,C.C.,WOLF ,J.L., AND YU, P. S. 1999. Caching on the World Wide Web. IEEE Trans. Knowl. Data Eng. 11, 1 (Jan.), 94–107. [34] ARLITT , M., FRIEDRICH, R., AND JIN, T. 1999a. Workload characterization of a Web proxy in a cable modem environment. ACM SIGMETRICS Perform. Eval. Rev. 27, 2, 25–36. [35] REDDY,M. AND FLETCHER, G. P. 1998. Intelligent Web caching using document life histories: A comparison with existing cache management techniques. In Proceedings of the 3rd International Web Caching Workshop. [36] CHANG, C.-Y., MCGREGOR,T., AND HOLMES, G. 1999. The LRU* WWW proxy cache document replacement algorithm. In Proceedings of the Asia Pacific Web Conference. [37] RIZZO,L. AND VICISANO, L. 2000. Replacement policies for a proxy cache. IEEE/ACM Trans. Netw. 8, 2 (Apr.), 158–170. [38] S. Saroiu, P. K. Gummadi, and S. D. Gribble, A Measurement Study of Peer-to-Peer File Sharing Systems. In ACM SIGCOMM Computer Communication Review, Jan. 2002. [39] A. Medina, I. Matta and John Byers. On the Origin of Power Laws in Internet Topologies*. ACM SIGCOMM Computer Communication Review, April 2000 [40] J. C. Chu, K. S. Labonte, and B. N. Levine. Availability and locality measurements of peer-to-peer file systems. In Proceedings of SPIE Vol. 4868, 2002 [41] Zhiyong Xu and Yiming Hu. Exploiting Spatial Locality to Improve Peer-to-Peer System Performance. In Proceedings of the The Third IEEE Workshop on Internet Applications (WIAPP), 2003 [42] J. Wang. A survey of web caching schemes for the internet. ACMComputer Communication Review, 29(5):36–46, 1999 [43] A. Mahanti,D. Eager and C. Williamson. Temporal locality and its impact on Web proxy cache performance. Special issue on internet performance modeling, pages: 187 - 203,2000 [44] A.R. Bharambe, M. Agrawal and S. Seshen. Mercury: supporting scalable multi-attribute range queries. In Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications. Pages 353~366, 2004 [45] Rizzo L. and Vicisano L. Replacement policy for a proxy cache. In Networking, IEEE/ACM Transactions on, April 2000. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/9538 | - |
| dc.description.abstract | 點對點系統近年來成為大規模分散式資訊系統的強大平台,搜尋系統資源是此種平台的一種十分重要的功能,並且已經有不少的研究提出改善系統搜尋效能的方法;然而,點對點平台並不是對於任何類型的查詢都能有效的支援,例如對於範圍查詢的支援仍然有限。要在點對點平台上有效的支援範圍查詢,首先我們必須解決影響效能的相關問題﹕系統內部的高通訊成本、點與點之間的負載不平衡以及維持系統裡物件的有效性。Donuts是滿足上述效能要求的點對點範圍查詢系統,它可以維持物件的有效性及有效地支援範圍查詢,利用群組化的概念來解決地域鄰近性與負載平衡之間的衝突;然而Donuts提供的搜尋演算法-“先搜尋鄰居列表與群組成員鄰居列表、再利用繞路表搜尋”的方式所花費的搜尋成本過於昂貴,且模擬的搜尋樣式與真實點對點系統的情形並不相符。
在本篇論文裡我們提出與實際搜尋行為較相似的搜尋樣式-“考量地域性與物件受歡迎程度的搜尋樣式”,並以之為基礎研究搭配Donuts特性的搜尋與快取策略。我們的實驗結果證明了Chordal Ring是適合Donuts的系統資料結構,並且比較了傳統快取方法-本地端快取與沿路快取的搜尋效能;最後比較搭配Donuts特性的合作式鄰居搜尋的快取方式與傳統快取的效能,深入討論最適合的搜尋與快取策略。 | zh_TW |
| dc.description.abstract | Peer-to-peer systems have emerged as a powerful platform for large-scale distributed information systems in recent years; important functionalities, such as searching, have been added to improve the system's lookup capability. The efficient support of range queries in a P2P system is still a challenging problem. To resolve this problem, some other related issues must first be addressed, such as high communication overheads, load imbalance among peers and preservation of object availability. Donuts satisfies above requirement and maintain object availability and effectively range queries. Within a grouping environment, peers are divided into several groups to provide the flexibility of proximity and feasibility of load balance in a range queries system. However, Donuts' search algorithm with cooperative search is not efficient. The search cost is tremendous. Also the query pattern in Donuts is not similar to real word.
This thesis provide more factual query pattern to simulate search behavior. Considering locality and popularity, we try to find the best search and cache strategy. The result of experiment prove that chordal ring is the better system data structure. We also compare the performance of local cache with the one of cache by path. Finally, we compare cooperative neighbor cache with traditional cache and make a conclusion for best search and cache method. | en |
| dc.description.provenance | Made available in DSpace on 2021-05-20T20:27:32Z (GMT). No. of bitstreams: 1 ntu-97-R95725028-1.pdf: 1216107 bytes, checksum: 9c353c3bb8045b0dffdd14fa6214e928 (MD5) Previous issue date: 2008 | en |
| dc.description.tableofcontents | 第一章 簡介 - 9 -
1.1背景介紹 - 9 - 1.2 動機 - 12 - 1.3 研究目標 - 14 - 第二章 文獻探討 - 15 - 2.1結構化點對點系統 - 15 - 2.1.1 CAN - 15 - 2.1.2 Chord - 16 - 2.1.3 Pastry - 17 - 2.1.4 Skip graph - 18 - 2.1.5 總結 - 19 - 2.2 搜尋樣式的相關議題 - 20 - 2.3 快取 - 20 - 2.3.1本地端快取 - 21 - 2.3.2 合作式快取 - 22 - 2.3.3 快取取代策略 - 23 - 第三章 系統模型 - 25 - 3.1系統概述 - 25 - 3.2基礎環狀結構 - 26 - 3.3鄰近性 - 27 - 3.4錯誤容忍機制 - 29 - 3.4.1 鄰居列表 - 29 - 3.4.2 繞路表 - 30 - 3.5物件的可利用性 - 31 - 3.6負載平衡機制 - 31 - 3.6.1鄰居平衡(NB) - 31 - 3.6.2節點重排(PR) - 32 - 3.7搜尋 - 32 - 3.7.1鄰近表(Proximity Table) - 33 - 3.7.2 快捷表(Express Table) - 34 - 3.7.3 搜尋與快取 - 34 - 第四章 實驗結果 - 42 - 4.1模擬方法 - 42 - 4.1.1實體網路 - 42 - 4.1.2動態環境模擬 - 43 - 4.2衡量指標 - 46 - 4.3 搜尋與快取的效能 - 47 - 4.3.1 系統資料結構的影響 - 51 - 4.3.2 快取空間對搜尋效能的影響 - 54 - 4.3.3 傳統快取對搜尋鄰近表的影響 - 55 - 4.3.3 本地端快取對鄰居搜尋加鄰近表繞路的影響 - 59 - 4.3.4 合作式快取加沿路快取與傳統快取的比較 - 62 - 4.4總結 - 64 - 第五章 結論 - 66 - 參考目錄 - 67 - | |
| dc.language.iso | zh-TW | |
| dc.title | 在考慮地域鄰近性與群組化的點對點範圍查詢系統的搜尋與快取機制 | zh_TW |
| dc.title | Search and Cache Mechanism in A Proximity-Aware and Group-Based Peer-to-Peer System for Range Queries | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 96-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 林永松,羅乃維,邱舉明 | |
| dc.subject.keyword | 點對點網路,範圍查詢,鄰近性,群組化,負載平衡,快取, | zh_TW |
| dc.subject.keyword | P2P network,range query,proximity,grouping,load balance,cache, | en |
| dc.relation.page | 62 | |
| dc.rights.note | 同意授權(全球公開) | |
| dc.date.accepted | 2008-08-14 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
| 顯示於系所單位: | 資訊管理學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-97-1.pdf | 1.19 MB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
