期刊文献+

基于结构化P2P模式的数据网格副本定位方法

A Method of Locating Data Grid Replica Based on the Structured P2P Scheme
下载PDF
导出
摘要 副本定位技术是数据网格的关键技术。本文采用改进的Chord算法,同时借鉴了结构化P2P技术,提出了一种基于结构化P2P模式的副本定位方法。该方法能在一定程度上解决局域网间的"绕路"问题,提高了定位效率,节省了传输时间和带宽,优化了数据网格的性能。 Replica locating is one of the most important key techniques in data grids. This paper adopts an improved chord algorithm and refers to the structured P2P technology, and then proposes a method of replica locating in data grids based on the structured P2P scheme. In this way, it can solve the "detour" problem to a certain extent, improve the efficiency of locating, save the transfer time and bandwidth, and consequentally optimize the performance of data grids.
作者 罗兰花 刘波
出处 《计算机工程与科学》 CSCD 2008年第9期96-98,110,共4页 Computer Engineering & Science
关键词 数据网格 P2P DHT CHORD 副本定位 data grid peer-to- peer distributed hash table chord replica locating
  • 相关文献

参考文献7

二级参考文献28

  • 1Gnutella[EB/OL].http://gnutella.wego.com/,2002.
  • 2STOICA I,MORRIS R,KARGER D,et al.Chord:A Scalable Peer-to-peer Lookup Service for Internet Applications[A].ACM SIGCOMM'01[C].San Diego,California,USA,2001.
  • 3ROWSTRON A,DRUSCHEL P.Pastry:Scalable,Distributed Object Location and Routing for Large-scale Peer-to-peer Systems[A].Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms[C].2001.
  • 4FU XD,SHI WS,AKKERMAN A.CANS:Composable,Adaptive Network Services Infrastructure[A].Proceedings of 3rd USENIX Symposium Internet Technologies and Systems[C].2001.
  • 5ZHAO BY,KUBIATOWICZ JD,JOSEPH AD.Tapestry:An Infrastructure for Fault-tolerant Wide-area Location and Routing[R].UC Berkeley Technical Report UCB//CSD-01-1141,2000.
  • 6GANESAN P,MANKU GS.Optimal Routing in Chord[D].Stanford University,SODA 2004.
  • 7DABEK F,KAASHOEK MF,KARGER D,et al.Wide-area cooperative storage with CFS[A].ACM SOSP'01[C].Banff,Canada,2001.
  • 8DABEK F.A Cooperative File System[D].Master's Thesis,MIT,2001.
  • 9STANDARD SH.National Institute of Standards and Technology,FIPS PUB 180-1[S].1995.
  • 10CANNY J.Secure Hash Algorithms[EB/OL].www.cs.berkeley.edu/~jfc/cs174/lecs/lec22/lec22.pdf,2005.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部