Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/134083
|
Title: | 改良Kademlia在高度網路擾動下的搜尋成功率 Improving search success rate of Kademlia under high churn |
Authors: | 簡豪廷 Jian, Hao-Ting |
Contributors: | 蔡子傑 Tsai, Tzu-Chieh 簡豪廷 Jian, Hao-Ting |
Keywords: | Kademlia 點對點 網路擾動 分散式雜湊表 Kademlia P2P churn distributed hash table |
Date: | 2021 |
Issue Date: | 2021-03-02 14:31:46 (UTC+8) |
Abstract: | Kademlia是一種被廣泛使用的P2P分散式雜湊表技術,在高度網路擾動環境中仍存在資料搜尋失敗的問題。本文以模擬的方式對以Kademlia運作的P2P系統進行分析,整理出在Kademlia技術下資料搜尋失敗的原因,並提出改良方法以少量成本增長提升資料搜尋成功率。 高度網路擾動會造成部分節點的路由表失效,同時使部份節點無法有效認識周遭節點。前者會導致儲存資料後資料難以被搜尋,或者搜尋資料時無法取得資料;後者會使資料儲存者與搜尋者找到的節點不一致,導致搜尋失敗。本文提出以紀錄長時間上線的節點,在路由表失效時向其連線以處理路由表失效的問題;及以向遠距離的節點詢問資料處理節點無法有效認識周遭節點的問題。實驗結果證實實施兩者後能使得資料搜尋成功率提升。 相較於傳統上以超級節點支援的P2P網路,我們的方法能以較低的通訊成本達到相當的資料搜尋成功率。 Kademlia is a widely deployed P2P-Distributed Hash Table network, however there exists some search failure issue under high churn. This thesis analyzes the reasons for Kademlia search failure by simulating the Kademlia-based P2P system and proposed some methods to improve Kademlia search success rate with little extra cost. High churn causes Kademlia Routing Table to be invalid, and in such case, nodes would have insufficient acknowledge of surrounding nodes. Invalid Routing Tables not only make data hard to be found but also directly lead to search failure. Insufficient acknowledge of surrounding nodes would make the traversing nodes and data nodes different and cause search failure. To this end, we suggest that nodes can connect with long-stay nodes to handle the invalid Routing Table invalid problem, and nodes can ask the far nodes for information to avoid the problem for insufficient acknowledge of surrounding nodes. Simulation experiments confirm that the search success rate of Kademlia increases when the above two enhancements are implemented. Furthermore, we also compare the performance with traditional supernode supported P2P network. Simulation results also show that our method maintains the comparable search success rate but with less overhead. |
Reference: | [1] aMule, Retrieved January 2021, from: amule.org [2] Bittorrent, Retrieved January 2021, from: https://www.bittorrent.com/ [3] D.Stutzbach and R.Rejaie. (2006). Improving Lookup Performance Over a Widely-Deployed DHT. Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. doi:10.1109/INFOCOM.2006.329 [4] D. Stutzbach and R. Rejaie. (2006). Understanding Churn in Peer-to-Peer Networks. IMC `06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 189~202. doi:10.1145/1177080.1177105 [5] Gnutella, Retrieved January 2021, from: https://en.wikipedia.org/wiki/Gnutella [6] J. Falkner, M. Piatek, J. John, A. Krishnamurthy, and T. Anderson. (2007). Profiling a Million User DHT. IMC `07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. doi: 10.1145/1298306.1298325 [7] Kad network, Retrieved January 2021, from: https://en.wikipedia.org/wiki/Kad_network [8] Kang H, Chan-Tin E, Hopper N, Kim Y. (2009). Why kad lookup fails. 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 121–130. doi: 10.1109/P2P.2009.5284547 [9] Liu B, Wei T, Zhang J, Li J, Zou W, Zhou M. (2012). Revisiting why kad lookup fails. 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), 37–42. doi: 10.1109/P2P.2012.6335808 [10] Liu Z, Yuan R, Li Z, Li H, Chen G. (2006). Survive under high churn in structured P2P systems: Evaluation and strategy. Computational Science – ICCS 2006, 404−411. doi: 10.1007/11758549_58 [11] M. Steiner, E. W. Biersack, and T. En-Najjary. (2007). Actively Monitoring Peers in KAD. IPTPS 2007. [12] Maymounkov P, Mazières D. (2002). Kademlia: a peer-to-peer information system based on the xor metric. IPTPS `01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp 53–65. [13] O. Herrera and T. Znati. (2007). Modeling Churn in P2P Networks. 40th Annual Simulation Symposium (ANSS`07). doi: 10.1109/ANSS.2007.28 [14] Official eMule-Board, Retrieved January 2021, from: forum.emule-project.net |
Description: | 碩士 國立政治大學 資訊科學系 107753026 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0107753026 |
Data Type: | thesis |
DOI: | 10.6814/NCCU202100314 |
Appears in Collections: | [資訊科學系] 學位論文
|
Files in This Item:
File |
Description |
Size | Format | |
302601.pdf | | 2028Kb | Adobe PDF2 | 0 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|