研究生: |
楊耀欽 Yang, Yao-Chin |
---|---|
論文名稱: |
Efficiently Disseminate Informatoin and Fault-Tolerant Routing in Peer-to-Peer overlays based on Forward Feedback Protocol Peer-to-Peer網路之有效率地傳播資訊及路徑容錯使用轉發反饋協定 |
指導教授: |
張適宇
Chang, Shih-Yu |
口試委員: |
丁邦安
翁詠祿 |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2011 |
畢業學年度: | 99 |
語文別: | 英文 |
論文頁數: | 48 |
中文關鍵詞: | peer-to-peer 、fault-tolerance |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
點對點網路(Peer-to-Peer)之穩定性常被高度動態變化所影響,網路內的點高頻率的進出使得建立此分散式系統遭受挑戰。具體上來說,在大型的覆蓋性網路常發生訊息的遺失或延遲,如此對網路的信賴度將大受影響。目前存在之解決方法大多依靠冗餘的訊息來減少遺失或延遲,而卻造成大量頻寬的花費。
我們提出一個模型來分析並改進轉發反饋協議(Forward Feedback Protocol),轉發反饋協議其傳輸訊息使用單一路徑且可以在傳輸路徑上偵測是否有點是故障或延遲。當完成一次服務傳輸(lookup),反饋值將會被依照此次路徑再次傳輸以更新每個點之反饋值,如此一來,每個點可以獨立地學習並避免再次走到故障之點,降低下一次傳輸服務的錯誤率。經由此協議,網路上之所有點可以自組織地形成穩定狀態的網路,並適時地改變傳輸路徑。
我們將此協議放入Chord演算法當中並加以評估。並由實驗結果得知,其頻寬利用度比現今存在方法之利用冗餘訊息少約二到四倍,儘管頻寬利用度的減少可能導致容錯能力下降,但使用此協議下卻可高於25%的成功率。此協議是富有可擴充性且適用於其他遞迴式之路由網路。
herobustnessofPeer-to-Peersystemsischallengedbyitshighlydynamicnature.Highfre-quentpeerfailureanddepartureeventscauseuncertaintyforwhichisconsideredexceptionalintraditionaldistributedsystems.Specically,insucientlylargeheterogeneousoverlaysmessagelossanddelaysarelikelytooccur.Thishasaseriouslyimpactonoverlayrouting,especiallyonlongerpaths.Mostoftheexistingsolutionstothisproblemrelyonmessageredundancytodecreasethelossanddelays.Thisincursalargebandwidthcost.WeproposeamodeltoestimateandimprovetheForwardFeedbackProtocol(FFP).FFPusessinglepathtoroutemessageanddetectsthemessagelossandexcessivedelayswhilerouting.Afterpeersendsaservice,theoutcomeissignalledalongtheroutingpath.Basedonlyonthebinary(positiveandnegative)signals,eachoverlaypeerlocallyandindependentlylearnstoroutetoavoidfailures.Whentheoutcomeoflookupisfailure,theacknowledgementoffeedbackhelpspeertocheckthepositionofthefailedpeerthenbroadcastsawarninginformationtopeerswhicharoundthefailedpeerandavoidstomeetitinfuture.Thelocalpeerinteractionsleadtotheemergenceoffastreliableoverlayroutes.Thisisacontinuousprocess,thesystemconstantlyself-organizesinresponsetochangingdelayandlossconditions.WeevaluatetheprotocolandsimulateinChordPeer-to-Peersystem.Thebandwidthisused2-4timeslessinoursystemthantheexistingoverlayroutingapproachesthatdependentonhighmessageredundancyforfault-tolerance.Despitethelessbandwidthmighttocause owreliability,FFPachievesuptoa25%higherdeliverysuccessrateincomparisontotheexistingsolutions.TheprotocolisscalablewithlocalstatesizeofO(log2N)intermsoftheoverlaynetworksizeandisuniversallyapplicabletoallrecursivelyroutingoverlays.
[1] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, "A scalable content-addressable network," in Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, 2001, pp. 161-172.
[2] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, "Chord: A scalable peer-to-peer lookup service for internet applications," ACM SIGCOMM Computer
Communication Review, vol. 31, no. 4, pp. 149-160, 2001.
[3] A. Rowstron and P. Druschel, "Pastry: Scalable, distributed object location and routing
for large-scale peer-to-peer systems," 2001.
[4] B. Y. Zhao, J. Kubiatowicz, and A. D. Joseph, "Tapestry: An infrastructure for fault-tolerant wide-area location and routing," Computer, vol. 74, no. 11-20, p. 46, 2001.
[5] S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz, \Handling churn in a dht," in Proceedings of the annual conference on USENIX Annual Technical Conference. USENIX
Association, 2004, pp. 10-10.
[6] J. Li, J. Stribling, T. M. Gil, R. Morris, and M. F. Kaashoek, "Comparing the performance of distributed hash tables under churn," Peer-to-Peer Systems III, pp. 87-99,
2005.
[7] R. Mahajan, M. Castro, and A. Rowstron, "Controlling the cost of reliability in peer-to-peer overlays," Peer-to-Peer Systems II, pp. 21-32, 2003.
[8] S. Saroiu, P. K. Gummadi, S. D. Gribble et al., "A measurement study of peer-to-peerfile sharing systems," in proceedings of Multimedia Computing and Networking, vol.
2002. Citeseer, 2002, p. 152.
[9] S. Sen and J. Wang, "Analyzing peer-to-peer trafficacross large networks," in Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment. ACM, 2002, pp.
137-150.
[10] D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, "Denial-of-service resilience in peer-to-peer le sharing systems," in ACM SIGMETRICS Perfor-
mance Evaluation Review, vol. 33, no. 1. ACM, 2005, pp. 38-49.
[11] M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S.Wallach, "Secure routing for structured peer-to-peer overlay networks," ACM SIGOPS Operating Systems Review,
vol. 36, no. SI, pp. 299-314, 2002.
[12] P. Maymounkov and D. Mazieres, "Kademlia: A peer-to-peer information system based on the xor metric," Peer-to-Peer Systems, pp. 53-65, 2002.
[13] K. Aberer, P. Cudre-Mauroux, A. Datta, Z. Despotovic, M. Hauswirth, M. Punceva,
and R. Schmidt, "P-grid: a self-organizing structured p2p system," ACM SIGMOD
Record, vol. 32, no. 3, pp. 29-33, 2003.
[14] M. S. Artigas, P. G. Lopez, and A. F. G. Skarmeta, "A novel methodology for constructing secure multipath overlays," Internet Computing, IEEE, vol. 9, no. 6, pp. 50-57, 2005.
[15] D. G. Andersen, A. C. Snoeren, and H. Balakrishnan, "Best-path vs. multi-path overlay
routing," in Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement. ACM, 2003, pp. 91-100.
[16] W. Galuba, K. Aberer, Z. Despotovic, and W. Kellerer, "Self-organized fault-tolerant
routing in peer-to-peer overlays," in Self-Adaptive and Self-Organizing Systems, 2009. SASO'09. Third IEEE International Conference on. IEEE, 2009, pp. 30-39.
[17] M. J. Freedman, E. Freudenthal, and D. Mazieres, "Democratizing content publication
with coral," in Proceedings of the 1st conference on Symposium on Networked Systems
Design and Implementation-Volume 1. USENIX Association, 2004, pp. 18-18.
[18] F. Dabek, J. Li, E. Sit, J. Robertson, M. F. Kaashoek, and R. Morris, "Designing
a dht for low latency and high throughput," in Proceedings of the 1st conference on
Symposium on Networked Systems Design and Implementation-Volume 1. USENIX
Association, 2004, pp. 7-7.
[19] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The eigentrust algorithm for
reputation management in p2p networks," in Proceedings of the 12th international conference on World Wide Web. ACM, 2003, pp. 640-651.
[20] K. Aberer and Z. Despotovic, "Managing trust in a peer-2-peer information system," in
Proceedings of the tenth international conference on Information and knowledge management. ACM, 2001, pp. 310-317.
[21] L. Xiong and L. Liu, "Peertrust: Supporting reputation-based trust for peer-to-peer
electronic communities," Knowledge and Data Engineering, IEEE Transactions on,
vol. 16, no. 7, pp. 843-857, 2004.
[22] G. D. Caro and M. Dorigo, "Antnet: Distributed stigmergetic control for communications networks," Journal of Articial Intelligence Research, vol. 9, no. 1, pp. 317-365,
1998.
[23] W. Galuba, K. Aberer, Z. Despotovic, and W. Kellerer, "Authentication-free fault-tolerant peer-to-peer service provisioning," DBISP2P 2007.
[24] J. H. Burrows, "Secure hash standard," DTIC Document, Tech. Rep., 1995.
[25] S. Bianchi, S. Serbu, P. Felber, and P. Kropf, "Adaptive load balancing for dht lookups,"
in Proc. 15th International Conference on Computer Communications and Networks
(ICCCN 2006). Citeseer, 2006.