期刊文献+

基于带偏随机游动的复制与搜索

Biased random walk-based replication and search
下载PDF
导出
摘要 现有的对等搜索策略能够有效解决流行数据项的定位,但是在稀有数据项搜索方面所需的成本相对较高。根据无结构对等网络中节点度的幂律分布特征,提出一种新的数据项复制与搜索策略,通过基于带偏随机游动的方式定向复制数据项到系统中小部分高度节点,资源搜索采用相同的方式进行。分析和模拟结果表明,所提出的资源搜索算法能够以低消息开销和低延迟获得高的搜索成功率。 Although existing schemes could find popular items efficiently, it was very costly for retrieving rare items. According to the power-law degree distribution of unstructured P2P networks, a novel strategy was proposed to replicate and search items. Data items were replicated to some high degree nodes by way of a biased random walk. Resource search was also performed by a biased random walk. Analysis and simulations showed that the proposed algorithms could achieve high search successful rate with low latency and low message overhead.
出处 《通信学报》 EI CSCD 北大核心 2009年第12期93-98,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60473090 60873075)~~
关键词 对等网络 资源搜索 复制 随机游动 P2P network resource search replication random walk
  • 相关文献

参考文献16

  • 1CHAWATHE Y, RATNASAMY S, BRESLAU L, et al. Making Gnutella-like p2p systems scalable[A]. Proceedings of the 2003 ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2003)[C]. New York, NY, USA: ACM, 2003.407-418.
  • 2QIU D, SRIKANT R. Modeling and performance analysis of Bittorrent-like peer-to-peer networks[A]. Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2004)[C]. New York, NY, USA: ACM, 2004. 367- 378.
  • 3DARIO B, MARCO M, MICHELA M, et al. Revealing skype traffic: when randomness plays with you[J]. SIGCOMM Computer Communication Review, 2007, 37(4): 37-48.
  • 4HUANG Y, FUT Z J, CHIU D, et al. Challenges, design and analysis of a large-scale p2p-vod system[J]. SIGCOMM Computer Communication Review, 2008, 38(4): 375-388.
  • 5ZAHARIA M, KESHAV S. Gossip-based search selection in hybrid peer-to-peer networks: research articles[J]. Concurrency and Computation: Practice & Experience, 2008, 20(2): 139-153.
  • 6CHEN H, JIN H, L1U Y, et al. Difficulty-aware hybrid search in peer-to-peer networks[J]. 1EEE Transactions on Parallel and Distributed Systems (TPDS), 2008, 20(1): 1-12.
  • 7COHEN E, SHENKER S. Replication strategies in unstructured peer-to-peer networks[A]. Proceedings of the 2002 ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2002)[C]. New York, NY, USA: ACM, 2002. 177-190.
  • 8MOTWANI R, RAGHAVAN P Randomized Algorithms[M]. Cambridge: Cambridge University Press, 1995.
  • 9FERREIRA R, RAMANATHAN M, AWAN A, et al. Search with probabilistic guarantees in unstructured peer-to-peer networks[A]. Proceedings of the 2005 IEEE International Conference on Peer-to-Peer Computing (P2P 2005)[C]. Washington, DC, USA: IEEE,2005. 165-172.
  • 10TERPSTRA W, KANGASHARJU J, LENG C, et al. Bubblestorm: Resilient, probabilistic, and exhaustive peer-to-peer search[A]. Proceedings of the 2007 ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2007)[C]. New York, NY, USA: ACM, 2007.49-60.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部