期刊文献+

分布式系统中节点扰动抑制策略研究

Research on the Strategies to Restrain the Churn Problem in the Distributed System
下载PDF
导出
摘要 分布式系统随着终端设备能力的不断提升得到了广泛的应用。作为分布式系统与生俱来的特性,节点扰动对系统的性能有很大的影响。在大量节点频繁加入或离开网络的情况下,如何保障系统的性能是研究的重点。本文通过对现有的节点扰动的相关研究的总结,从节点扰动的定义和刻画出发,总结了节点扰动的研究方式和具体影响。进一步,在不同的网络拓扑结构下,分别从网络拓扑构建,数据冗余和查询请求3个方面总结和分析了现有的抑制节点扰动影响的策略。 The distributed system has been widely used with the capacity of terminals increasing.As an inherent feature of the distributed system,the churn of terminals has a large impact on the performance of system.How to ensure the performance of the system with the large number of terminals joining or leaving the network(churn)is a crucial issue.Based on the summary of the existing researches on the churn of terminals,we introduce the definition and model of churn firstly.Furthermore,we summarize the method of research on the churn.The effect of churn on the system is also analyzed.Most importantly,under different topologies,we summarize the strategies about the resilience of churn from three aspects:the construction of network topology,the redundancy of data and the strategies of querying.
作者 薛寒星 尤佳莉 王劲林 XUE Hanxing;YOU Jiali;WANG Jinlin(National Network New Media Engineering Research Center,Institute of Acoustics,Chinese Academy of Science,Beijing,100190,China;University of Chinese Academy of Science,Beijing,100190,China)
出处 《网络新媒体技术》 2019年第5期1-10,26,共11页 Network New Media Technology
基金 中国科学院先导专项课题:SEANET技术标准化研究与系统研制(XDC02010701) 中国科学院青年创新促进会项目(Y529111601)
关键词 分布式网络 节点扰动 抑制策略 性能评估 distributed network churn restrain strategies performance evaluation
  • 相关文献

参考文献3

二级参考文献37

  • 1章淼,徐明伟,吴建平.应用层组播研究综述[J].电子学报,2004,32(F12):22-25. 被引量:52
  • 2马建刚,黄涛,汪锦岭,徐罡,叶丹.面向大规模分布式计算发布订阅系统核心技术[J].软件学报,2006,17(1):134-147. 被引量:128
  • 3朱鸿宇,刘瑰,唐福华,陈左宁.一种自适应的数据预取与缓冲算法[J].计算机工程与应用,2006,42(24):13-15. 被引量:6
  • 4Saroiu S, Gummadi PK, Gribble SD. A measurement study of peer-to-peer file sharing systems. In: Proc. of the Multimedia Computing and Networking 2002 (MMCN 2002). 2002. 156-170. http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf
  • 5Liang J, Kumar R, Ross KW. The KaZaA overlay: A measurement study. In: Proc. of the 19th IEEE Annual Computer Communications Workshop. 2004. http://cis.poly.edu/-ross/papers/KazaaOverlay.pdf
  • 6Liang J, Kumar R, Ross KW. Understanding KaZaA. 2004. http://cis.poly.edu/-ross/papers/UnderstandingKaZaA.pdf.
  • 7Liang J, Kumar R, Xi Y, Ross KW. Pollution in file sharing systems. In: Proc. of the IEEE Infocom 2005. 2005. http://cis.poly.edu/-ross/papers/pollution.pdf
  • 8Sen S, Wang J. Analyzing peer-to-peer traffic across large networks. In: Proc. of the 2nd ACM SIGCOMM Workshop on Internet Measurement Workshop. 2002. http://citeseer.ist.psu.edu/sen02analyzing.html
  • 9Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M. Is P2P dying or just hiding. In: Proc. of the IEEE Globecom 2004. 2004. 1532-1538. http://www.caida.org/outreach/papers/2004/p2p-dying/p2p-dying.pdf
  • 10Soldani C. Peer-to-Peer behavior detection by tcp flows analysis (End-of-Study Dissertation). University of Liege, 2004. http://www.run.montefiore.ulg.ac.be/-soldani/P2P_Behaviour_Detection.pdf

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部