期刊文献+

非结构化对等网信息缓存资源查找算法 被引量:2

Information Catch Routing Algorithm in Unstructured Peer to Peer Network
下载PDF
导出
摘要 泛洪式路由(Flooding)是在非结构化对等网络中进行有效资源查找的主要方式,但其路由过程将产生大量冗余消息,因而严重制约了其可扩展性.随节点数增多,泛洪式路由的网络带宽消耗也变得异常严重.为此,本文提出了改善非结构化对等网络路由和查找效率的LHC(LookaHead with Catch)算法,该算法利用缓存邻居节点的邻居列表和邻居节点的资源索引表,达到优化路由的目的.仿真实验表明,在保证维护和查询的带宽开销与现有算法基本一致的基础上,LHC算法不仅更有效的减少了查询过程中产生的冗余消息,而且在网络容量一定的情况下,资源命中率更高. Flooding which is used in unstructured Peer to Peer Network for searching and locating information is a primary routing algorithm. But the routing produces a large number of redundant messages so that it restricts the P2P networks' expansibility. Moreover,with the increment of the number of nodes, the consumption of network bandwidth in unstructured P2P network has become a serious problem. This paper proposes the LHC(lookahead with catch) algorithm which optimizes the routing by catching neighbor's neighbor and neighbor's resource information. In addition,the simulation results show that LHC algorithm not only can reduce redundant information resulting from the query process effectively in the same situation of bandwidth cost, but also find more resources than flooding routing algorithm does.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第9期1657-1663,共7页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(6047309060573129)资助
关键词 非结构化P2P 资源查询 路由算法 信息缓存 unstructured P2P systems resource searching routing algorithm information catching
  • 相关文献

参考文献19

  • 1Napster[EB/OL]. At http ://www. napster, com,1999.
  • 2Gnutella[EB/OL]. At http://gnutella. wego. com, 1999.
  • 3Gurmeet Singh Manku, Moni Naor, Wieder U. Know thy neighbor's neighbor: the power of lookahead in randomized P2P networksorks[C]. In ACM Symposium on Theory of Computing (STOC) ,2004.
  • 4Milena Mihail, Amin Saberi, Tetali P. Random walks with lookahead in power law random graphs [EB/OL]. 2004cited; Availablefrom: http://www. cc. gatech.edu/fac/Milena. Mihail/lookahead, pdf.
  • 5Yang B,Garcia-Molina H. Efficient search in peer-to-peer networks[C]. In Proc. of the ICDCS,2002.
  • 6Lu Q, Cao P,Cohen E,et al. Search and replication in unstructured peer-to-peer netWorks[C]. In Proc. of the ACM ICS, 2002.
  • 7Yang B,Garcia-molina H. Improving search in peer-to-peer networks[C]. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS). 2002. Vienna,Autria.
  • 8Kalogeraki V,Gunopoulos D,Zeinalipouryazti D. A local search mechanism for peer-to-peer networks[C]. In Proceedings of the llth International Conference on Information andKnowledge Management (CIKM). 2002. McLean,VA.
  • 9Crespo A, Garcia-Molina H. Routing indices for peer-to-peer systems [C]. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS). 2002. Vienna, Autria.
  • 10Zhuang Zhen-yun, Liu Yun-hao, Ni L M. Hybrid periodical flooding in unstructured peer-to-peer netWorks[C]. In Proc. of the ICPP. 2003.

同被引文献13

  • 1王健.数据链在指控系统中的应用研究[J].现代电子工程,2005(2):30-33. 被引量:7
  • 2YANG B, GARCIA-MOLINA H. Improving search in peer-to-peer networks[ C]//Proceedings of the 22nd International Conference on Distributed Computing Systems. Washington, DC: IEEE Computer Society, 2002:5 - 14.
  • 3KALOGERAKI V, GUNOPULOS D, ZEINALIPOUR-YAZTI D. A local search mechanism for peer-to-peer networks[ C]// Proceedings of the llth International Conference on Information and Knowledge Management. New York: ACM, 2002:300-307.
  • 4SHEN D R, LV L, YUE K, et al. IBFS-HDI: An effective resource searching model in database grid under pure unstructured P2P framework[ C]// Proceedings of the Sixth International Conference on Grid and Cooperative Computing. Washington, DG: IEEE Computer Society, 2007:173 - 180.
  • 5LV Q, CAO P, COHEN F, et al. Search and replication in unstructured peer-to-peer networks [C]// Proceedings of the 16th Intemational Conference on Supereomputing. New York: ACM, 2002:84 - 95.
  • 6SAROIU S, GUMMADI K. An analysis of Intemet content delivery systems[ J]. ACM SIGOPS Operating Systems Review, 2002, 12 (4) : 315 -327.
  • 7JIANG S, GUO L, ZHANG X, et al. HghtFlood : Minimizing redundant messages and maximizing the scope of peer-to-peer search [J]. IEEE Transactions on Parallel and Distributed Systems, 2008, 19(5) : 601 -614.
  • 8MANKU G S, NAOR M, WIEDER U. Know thy neighbor' s neighbor: The power of lookahead in randomized P2P network sorks [C]// Proceedings of the Thirty-sixth Annual ACM Symposium on Theory of Computing. New York: ACM, 2004:54 -63.
  • 9RIPEANU M, IAMNITCHI A, FOSTER I. Mapping the Gnutella network[J]. IEEE Internet Computing, 2002, 6(1) : 50 -57.
  • 10李云茹.战术数据链及其应用技术[J].中国电子科学研究院学报,2007,2(2):211-217. 被引量:27

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部