期刊文献+

ChordPlus: a scalable, decentralized object location and routing algorithm

下载PDF
导出
摘要 Object looation is a fundamental problem in distributed system such as grid computing and peer-to-peer environment. Chord is one of the typical scalable object looation algorithms for peer-to-peer network. The simplicity, provable correctness and provable performance of Chord make it an attractive option for distributed lookup. However its lookup performance is not satisfying. Based on the decentralized object looation mathematical model. This paper proposes ChordPlus, an improved Chord algorithm, by enlarging dimension size of space M ( M = 2 in Chord) and utilizing data redundancy technology. ChordPlus is a scalable, fault-tolerant, completely decentralized and self-organizing object looation and routing algorithm for overlay network. Results from theoretical analysis and simulation experiments show that increasing the dimension size of space or neighborhood set length can enhance the routing performance of ChordPlus. In a simulation network with 5 000 nodes, the average muting path length of ChordPlus is only as many as half that of Chord algorithm.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第4期772-779,787,共9页 系统工程与电子技术(英文版)
  • 相关文献

参考文献10

  • 1[1]Napster. http: //www. napster. com/.
  • 2[2]The gnutella protocol specification, 2000. http : //dss.clip2. com/GnutellaProtocol04. pdf.
  • 3[3]Rowstron A, Druschel P. Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems. http://research. microsoft. com/~antr/PAST/pestry. pdf , 2001.
  • 4[4]Zhao B Y, Kubiatowicz J D, Joseph AD. Tapestry: an infrastructure for fault-tolerant wide-area location and routing. U.C. Berkeley Technical Report UCB//CSD-01-1141, April 2001.
  • 5[5]Ratnasamy S, Francis P, Handley M, et al. A scalable content-addressable network. Computer Communication Review, 2001, 31(4): 161~172.
  • 6[6]Stoica I, Morris R, Karger D, et al. Chord: a scalable peer-to-peer lookup service for internet applications. Computer Communication Review, 2001, 31(4): 27~31.
  • 7[7]Sylvia Ratnasamy, Scott Shenker, Ion Stoica. Routing algorithms for DHTs: some open questions. http://www.cs. rice. edu/Conferences/IPTPS02/, 2002.
  • 8[8]Plaxton C G, Rajaraman R, Richa A W. Accessing nearby copies of replicated objects in a distributed environment.Theory of computing systems, 1999, 32(3): 241~280.
  • 9[9]Bai Haihuan, Wang Weinong. Mathematical model of decentralized location service. Proceeding of international workshop on grid and cooperative computing (GCC 2002 ).Beijing: publishing house of electronics industry, 2002.759~ 773.
  • 10[10]FIPS 80-1. Secure hash standard. U.S. Department of commerce/NIST, National technical information service,Springfield, VA, Apr. 1995.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部