簡易檢索 / 詳目顯示

研究生: 楊耀欽
Yang, Yao-Chin
論文名稱: Efficiently Disseminate Informatoin and Fault-Tolerant Routing in Peer-to-Peer overlays based on Forward Feedback Protocol
Peer-to-Peer網路之有效率地傳播資訊及路徑容錯使用轉發反饋協定
指導教授: 張適宇
Chang, Shih-Yu
口試委員: 丁邦安
翁詠祿
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2011
畢業學年度: 99
語文別: 英文
論文頁數: 48
中文關鍵詞: peer-to-peerfault-tolerance
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 點對點網路(Peer-to-Peer)之穩定性常被高度動態變化所影響,網路內的點高頻率的進出使得建立此分散式系統遭受挑戰。具體上來說,在大型的覆蓋性網路常發生訊息的遺失或延遲,如此對網路的信賴度將大受影響。目前存在之解決方法大多依靠冗餘的訊息來減少遺失或延遲,而卻造成大量頻寬的花費。
    我們提出一個模型來分析並改進轉發反饋協議(Forward Feedback Protocol),轉發反饋協議其傳輸訊息使用單一路徑且可以在傳輸路徑上偵測是否有點是故障或延遲。當完成一次服務傳輸(lookup),反饋值將會被依照此次路徑再次傳輸以更新每個點之反饋值,如此一來,每個點可以獨立地學習並避免再次走到故障之點,降低下一次傳輸服務的錯誤率。經由此協議,網路上之所有點可以自組織地形成穩定狀態的網路,並適時地改變傳輸路徑。
    我們將此協議放入Chord演算法當中並加以評估。並由實驗結果得知,其頻寬利用度比現今存在方法之利用冗餘訊息少約二到四倍,儘管頻寬利用度的減少可能導致容錯能力下降,但使用此協議下卻可高於25%的成功率。此協議是富有可擴充性且適用於其他遞迴式之路由網路。


    herobustnessofPeer-to-Peersystemsischallengedbyitshighlydynamicnature.Highfre-quentpeerfailureanddepartureeventscauseuncertaintyforwhichisconsideredexceptionalintraditionaldistributedsystems.Speci cally,insucientlylargeheterogeneousoverlaysmessagelossanddelaysarelikelytooccur.Thishasaseriouslyimpactonoverlayrouting,especiallyonlongerpaths.Mostoftheexistingsolutionstothisproblemrelyonmessageredundancytodecreasethelossanddelays.Thisincursalargebandwidthcost.WeproposeamodeltoestimateandimprovetheForwardFeedbackProtocol(FFP).FFPusessinglepathtoroutemessageanddetectsthemessagelossandexcessivedelayswhilerouting.Afterpeersendsaservice,theoutcomeissignalledalongtheroutingpath.Basedonlyonthebinary(positiveandnegative)signals,eachoverlaypeerlocallyandindependentlylearnstoroutetoavoidfailures.Whentheoutcomeoflookupisfailure,theacknowledgementoffeedbackhelpspeertocheckthepositionofthefailedpeerthenbroadcastsawarninginformationtopeerswhicharoundthefailedpeerandavoidstomeetitinfuture.Thelocalpeerinteractionsleadtotheemergenceoffastreliableoverlayroutes.Thisisacontinuousprocess,thesystemconstantlyself-organizesinresponsetochangingdelayandlossconditions.WeevaluatetheprotocolandsimulateinChordPeer-to-Peersystem.Thebandwidthisused2-4timeslessinoursystemthantheexistingoverlayroutingapproachesthatdependentonhighmessageredundancyforfault-tolerance.Despitethelessbandwidthmighttocause owreliability,FFPachievesuptoa25%higherdeliverysuccessrateincomparisontotheexistingsolutions.TheprotocolisscalablewithlocalstatesizeofO(log2N)intermsoftheoverlaynetworksizeandisuniversallyapplicabletoallrecursivelyroutingoverlays.

    1 Introduction 1 2 Related Work 5 3 The System Model and P2P Protocol 8 3.1 The Chord System 8 3.2 Service Provision 11 3.3 Forward Feedback Protocol(FFP) 13 3.4 Fault-tolerant routing 15 4 Estimate the delay time of a lookup 19 4.1 Peer Failure Estimation 19 4.2 A Model of Expected Delay Time for a Lookup 21 4.3 Decrease the Waiting Time of Message Response 26 4.4 Disseminate Information Around the Failed Peer 28 5 Performance Evaluation 32 5.1 Message Loss and Bandwidth Usage 34 5.2 Tolerance to Message Delays and Lookup Latency 37 6 Conclusions 41 A Proof of Property 1 44

    [1] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, "A scalable content-addressable network," in Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, 2001, pp. 161-172.
    [2] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, "Chord: A scalable peer-to-peer lookup service for internet applications," ACM SIGCOMM Computer
    Communication Review, vol. 31, no. 4, pp. 149-160, 2001.
    [3] A. Rowstron and P. Druschel, "Pastry: Scalable, distributed object location and routing
    for large-scale peer-to-peer systems," 2001.
    [4] B. Y. Zhao, J. Kubiatowicz, and A. D. Joseph, "Tapestry: An infrastructure for fault-tolerant wide-area location and routing," Computer, vol. 74, no. 11-20, p. 46, 2001.
    [5] S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz, \Handling churn in a dht," in Proceedings of the annual conference on USENIX Annual Technical Conference. USENIX
    Association, 2004, pp. 10-10.
    [6] J. Li, J. Stribling, T. M. Gil, R. Morris, and M. F. Kaashoek, "Comparing the performance of distributed hash tables under churn," Peer-to-Peer Systems III, pp. 87-99,
    2005.
    [7] R. Mahajan, M. Castro, and A. Rowstron, "Controlling the cost of reliability in peer-to-peer overlays," Peer-to-Peer Systems II, pp. 21-32, 2003.
    [8] S. Saroiu, P. K. Gummadi, S. D. Gribble et al., "A measurement study of peer-to-peer file sharing systems," in proceedings of Multimedia Computing and Networking, vol.
    2002. Citeseer, 2002, p. 152.
    [9] S. Sen and J. Wang, "Analyzing peer-to-peer trafficacross large networks," in Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment. ACM, 2002, pp.
    137-150.
    [10] D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, "Denial-of-service resilience in peer-to-peer le sharing systems," in ACM SIGMETRICS Perfor-
    mance Evaluation Review, vol. 33, no. 1. ACM, 2005, pp. 38-49.
    [11] M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S.Wallach, "Secure routing for structured peer-to-peer overlay networks," ACM SIGOPS Operating Systems Review,
    vol. 36, no. SI, pp. 299-314, 2002.
    [12] P. Maymounkov and D. Mazieres, "Kademlia: A peer-to-peer information system based on the xor metric," Peer-to-Peer Systems, pp. 53-65, 2002.
    [13] K. Aberer, P. Cudre-Mauroux, A. Datta, Z. Despotovic, M. Hauswirth, M. Punceva,
    and R. Schmidt, "P-grid: a self-organizing structured p2p system," ACM SIGMOD
    Record, vol. 32, no. 3, pp. 29-33, 2003.
    [14] M. S. Artigas, P. G. Lopez, and A. F. G. Skarmeta, "A novel methodology for constructing secure multipath overlays," Internet Computing, IEEE, vol. 9, no. 6, pp. 50-57, 2005.
    [15] D. G. Andersen, A. C. Snoeren, and H. Balakrishnan, "Best-path vs. multi-path overlay
    routing," in Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement. ACM, 2003, pp. 91-100.
    [16] W. Galuba, K. Aberer, Z. Despotovic, and W. Kellerer, "Self-organized fault-tolerant
    routing in peer-to-peer overlays," in Self-Adaptive and Self-Organizing Systems, 2009. SASO'09. Third IEEE International Conference on. IEEE, 2009, pp. 30-39.
    [17] M. J. Freedman, E. Freudenthal, and D. Mazieres, "Democratizing content publication
    with coral," in Proceedings of the 1st conference on Symposium on Networked Systems
    Design and Implementation-Volume 1. USENIX Association, 2004, pp. 18-18.
    [18] F. Dabek, J. Li, E. Sit, J. Robertson, M. F. Kaashoek, and R. Morris, "Designing
    a dht for low latency and high throughput," in Proceedings of the 1st conference on
    Symposium on Networked Systems Design and Implementation-Volume 1. USENIX
    Association, 2004, pp. 7-7.
    [19] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The eigentrust algorithm for
    reputation management in p2p networks," in Proceedings of the 12th international conference on World Wide Web. ACM, 2003, pp. 640-651.
    [20] K. Aberer and Z. Despotovic, "Managing trust in a peer-2-peer information system," in
    Proceedings of the tenth international conference on Information and knowledge management. ACM, 2001, pp. 310-317.
    [21] L. Xiong and L. Liu, "Peertrust: Supporting reputation-based trust for peer-to-peer
    electronic communities," Knowledge and Data Engineering, IEEE Transactions on,
    vol. 16, no. 7, pp. 843-857, 2004.
    [22] G. D. Caro and M. Dorigo, "Antnet: Distributed stigmergetic control for communications networks," Journal of Arti cial Intelligence Research, vol. 9, no. 1, pp. 317-365,
    1998.
    [23] W. Galuba, K. Aberer, Z. Despotovic, and W. Kellerer, "Authentication-free fault-tolerant peer-to-peer service provisioning," DBISP2P 2007.
    [24] J. H. Burrows, "Secure hash standard," DTIC Document, Tech. Rep., 1995.
    [25] S. Bianchi, S. Serbu, P. Felber, and P. Kropf, "Adaptive load balancing for dht lookups,"
    in Proc. 15th International Conference on Computer Communications and Networks
    (ICCCN 2006). Citeseer, 2006.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE