期刊文献+

ODBF:基于操作型衰落Bloom Filter的P2P网络弱状态路由算法 被引量:3

ODBF: A P2P Weak State Routing Scheme Based on Operative Decaying Bloom Filter
在线阅读 下载PDF
导出
摘要 在P2P网络中,基于衰落Bloom Filter的弱状态路由算法试图将每条查询消息沿着成员资格信息量最强的方向传递,并最终以较低的传输代价和传输时延确保较高的查准率.研究发现衰落Bloom Filter在传递过程中存在严重的多径叠加和噪音问题,这直接导致查询消息以很高的概率沿着错误的方向传播,甚至会退化为泛洪路由算法.为解决这一挑战性难题,文中提出了基于操作型衰落Bloom Filter的弱状态路由算法ODBF(Operative Deca-ying Bloom Filter).ODBF通过分别保存对象的衰落Bloom Filter及源节点等信息,使得ODBF能够有效解决基于衰落Bloom Filter的路由信息在P2P网络中的多径叠加和信息回流问题,有效抑制噪音的影响,进而使得基于弱状态的路由能够以很高的概率沿着正确方向进行. The current weak state routing schemes cannot facilitate in-network queries effectively.Given a query for an item at an arbitrary node,disturbance in unrelated routing entries is likely stronger than the useful information in the right routing entries.Consequently,the majority of queries are towards wrong nodes.To solve this problem,this paper presents ODBF(Operative Decaying Bloom Filter).ODBF is based on storing each decaying bloom filter and its properties such as issuing nodes separately.In this way,ODBF can store membership information received only from the shortest path,and is able to restrain effects of noise effectively.Therefore,ODBF is able to make weak state routing schemes do right decisions with high probability.
出处 《计算机学报》 EI CSCD 北大核心 2012年第5期910-917,共8页 Chinese Journal of Computers
基金 国家自然科学基金(61170284 60903206) 国家博士后科学基金(201104439) 国防科学技术大学预研项目(JC10-05-01) 国家"八六三"高技术研究发展计划项目基金(2011AA0123824001)资助
关键词 对等计算 弱状态路由 衰落Bloom FILTER 噪音 peer-to-peer computing weak state routing decaying Bloom Filter disturbance
作者简介 朱桂明,男,1981年生,博士,主要研究方向为对等计算、数据中心网络互联.E—mail:guiming.zhu@yahoo.com.cn. 郭得科,男,1980年生,博士,副研究员,主要研究方向为无线多跳网络、对等计算、BloomFilters、数据中心网络互联. 金士尧,男,1937年生,教授,博士生导师,主要研究领域为分布式计算、复杂系统仿真、实时系统、虚拟现实.
  • 相关文献

参考文献1

二级参考文献11

  • 1Lu XC, Wang HM, Wang J. Virtual computing environment (IVCE): Concept and architecture. Science in China (Series E), 2006,36(10): 1081-1099.
  • 2Matei R, Ian F, Adriana I. Mapping the Gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal, 2002,6(1):50-57.
  • 3Christos G, Milena M, Amin S. Random walks in peer-to-peer networks. In: Proc. of the IEEE INFOCOM 2004. New York: IEEE Press, 2004. 120-130.
  • 4Zheng QB, Lu XC, Zhu PD, Peng W. An efficient random walks based approach to reducing file locating delay in unstructured P2P network. In: Proc. of the IEEE GLOBECOM 2005, Vol.2. St. Louis: IEEE Press, 2005. 980-984.
  • 5Francisco MCA, Christopher P, Richard PM, Thu DN. PlanetP: Using gossiping to build content addressable peer-to-peer information sharing communities. Technical Report, DCS-TR-487, Piscataway: Rutgers University, 2002.
  • 6Yatin C, Sylvia R, Lee B, Nick L, Scott S. Making Gnutella-like P2P systems scalable. In: Proc. of the ACM SIGCOMM 2003. New York: ACM Press, 2003. 407-418.
  • 7Beverly Y, Hector GM. Efficient search in peer-to-peer networks. In: Proc. of the ICDCS 2002. Vienna: IEEE Computer Society, 2002.5-14.
  • 8Burton HB. Space/Time trade-offs in hash coding with allowable errors. Communications of the ACM, 1970,13(7):422-426.
  • 9Abhishek K, Jun (Jim) X, Ellen WZ. Efficient and scalable query routing for unstructured peer-to-peer networks. In: Proc. of the IEEE INFOCOM. 2005. 1162-1173.
  • 10http://vce.org.cn/ymzhang/PST_TR.pdf

共引文献21

同被引文献23

  • 1谢鲲,闵应骅,张大方,谢高岗,文吉刚.分档布鲁姆过滤器的查询算法[J].计算机学报,2007,30(4):597-607. 被引量:14
  • 2Mullin J K. Optimal semijoins for distributed database systems[J]. IEEE Trans. Software Eng, 1990, 16(5): 558-560.
  • 3Li J, Taylor J, Serban L, Seltzer M. Self-Organization in Peer-to-Peer systemiC]// Proc ACM SIGOPS, Sept, 2002.
  • 4Cuena-Acuna F M, Peery C, Martin R P, Nguyen T D. PlantP: using gossiping to build content addressable peer-to-peer information sharing communities[C]//Proc 12th IEEE Intymp. High performance Distributed Computing, 2003: 236-249.
  • 5Rhea S C, Kubiatowicz J. Probabilistic location and routing[C]//Proc of INFOCOM2002 NewYorK:IEEEComputer Soeiety, 2002: 1248-1257.
  • 6Whitaker A, Wetherall D. Forwarding without loops in Icarus[C]//Proc of open Architectures and Network Programming, NewYork: IEEE Computer Society, 2002: 63-75.
  • 7Peter C D, Panagiotis M. Bloom filters in probabilistie verification[C]// Proc Fifth Int'l Conf. Formal Methods in Computer-Aided Design, 2004: 367-381.
  • 8Li Fan, Pei Cao, Jussara Almeida, Andrei Z Broder. summary cache: a scalable wide-area web cache sharing protocol[J]. IEEE/ACM Trans on Networking, 2000, 8(3): 281-29.
  • 9Mitzenmaeher M. Compressed bloom filters[J]. IEEE/ACM Trans on Networking, 2002, 10(5): 604- 612.
  • 10Saar C, Yossi M. Spectral bloom filters[C]//Proc ACM SIGMOD International Conference on Man- agement of Data San Diego Califonia: ACM Press, 2003: 241-252.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部