用户名: 密码: 验证码:
高性能计算环境中基于结构化覆盖网络的服务组织、发现和访问研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
高性能计算广泛应用于情报分析、武器系统模拟、气象预报等国防和国民经济建设的重要领域,对保障国家安全、促进科技进步、推动经济发展具有不可替代的重要作用。研究高性能计算服务系统的服务组织、发现和访问具有现实意义。集中式服务组织存在单点故障和性能瓶颈等问题,基于结构化P2P(Peer-to-Peer)网络的服务系统受到广泛关注。传统分布式哈希表技术不支持复杂查询,并且无法有效满足高性能计算环境下服务调度、任务分配、协同处理需求。在此背景下,本文提出一种新的结构化P2P网络模型并将其成功应用于高性能计算服务组织,对服务覆盖网络建立、支持复杂查询的两阶段服务发现算法、结构化覆盖网环境下的协同计算模式等问题进行了深入研究。主要研究内容和创新点如下:
     1.分析P2P技术在高性能计算领域的研究现状,指出了当前存在的主要问题,明确了研究范围和基本思路。
     2.将结构化P2P网络模型引入高性能计算领域,建立了以服务为结点的服务覆盖网络,设计了路由表结构、路由算法、加入算法、更新算法。
     3.将语义信息融入到服务编址、路由表和路由算法中,实现了语义聚集的服务分布和语义相关的路由过程。相对Kademlia,具有更高的路由效率和更低的带宽消耗。
     4.利用高性能计算服务丰富的语义信息,建立多重索引机制。提出两阶段服务发现算法,实现了模糊关键字检索、混合检索等多种复杂查询功能。提出语义反馈机制,进一步优化路由选择。相对Kademlia,具有更好的查询效果。
     5.在语义树中植入计算结点,通过服务聚集形成计算域,在此基础上提出结构化覆盖网环境下的并发、调度等协同计算模式,满足了高性能计算系统去中心化的需求,拓展了结构化P2P技术的应用领域。
     6.设计并实现了Soverlay原型系统。给出了Soverlay的体系结构、功能单元操作接口和路由消息格式。
The high performance computing (HPC) is widely applied in some significant fields of national defense and national economic construction (such as information analysis, weapon system simulation, weather forecast and more), playing an important role in safeguarding national security, promoting the development of science and technology and propelling economic development. The research on the service organization, discovery and access of HPC services system has important practical significance.
     Due to the problems in centralized services system such as single-point failure and single point of failure, the structured P2P-based (Peer-to-Peer) services system has received widespread attention. However, the traditional Distributed Hash Table (DHT) does not support complex query, and can not meet the demand for service dispatch, task allocation and cooperative processing in the context of HPC.
     In this context, this paper comes up with a new structured P2P network model which is applied in HPC service organization successfully and conducts a further research on the construction of service overlay network, two-stage service discovery algorithm for complex query, the collaborative computing model in the context of and structured overlay network, and other issues. The main research content and innovation points are as follows:
     1. Analyze the current research of P2P technology in HPC field, point out main existing problems, and define the research range and basic ideas.
     2. Introduce structured P2P network model to HPC field, build service overlay network with service as nodes, and design routing table structure, routing algorithm, embedding algorithm and updating algorithm.
     3. Incorporate semantic information into service addressing, routing table and routing algorithm to realize the service distribution of semantic congregation and semantically related routing processing. It has higher routing efficiency and lower bandwidth consumption than Kademlia.
     4. Use the rich semantic information of HPC service and build multiple index mechanism. The two-stage service discovery algorithm is proposed to realize many functions for complex query (such as fuzzy keyword search, mixed search and etc.). Besides, the semantic feedback mechanism is proposed to further optimize routing. It creates better query results than Kademlia.
     5. Implant semantic tree with computing nodes and form computational domain through service aggregation. The concurrence, dispatch and other cooperative computing models in the context of structured overlay network are proposed based on this to meet the demand of HPC system for decentration and expand the application fields of structured P2P technology.
     6. Design and realize Soverlay prototype system. And the structure, functional unit operation interface and routing message format of Soverlay system are provided in this paper.
引文
[1]Software&Information Industry Association. Software as a service:strategic backgrounder[J]. Washington, DC SIIA Software as a Service Strategic Backgrounder,2001.
    [2]Lightfoot H W, Baines T, Smart P. Examining the information and communication technologies enabling servitized manufacture[J]. Proceedings of the Institution of Mechanical Engineers, Part B:Journal of Engineering Manufacture,2011,225(10):1964-1968.
    [3]Baines T, Lightfoot H, Peppard J, et al. Towards an operations strategy for product-centric servitization[J]. International Journal of Operations&Production Management,2009,29(5):494-519.
    [4]Feig Ephraim. Five years of software as a service:The good, the bad and the ugly. Proceedings of IEEE International Conference on Services Computing(SCC),2005,Ⅰ:xxi.
    [5]Hugo Haas, Allen Brown. Web Services Glossary [EB/OL]. http://www.w3.org/TR/ws-gloss/,2004.
    [6]Eric Newcomer, Greg Lomow. Understanding SOA with Web Services[M]. New Jersey: Pearson Education,2005.
    [7]Web Services Computing at IC2002[EB/OL]. http://tab.computer.org/tcsc/conf-IC02.htm,2002.
    [8]Technical Committee on Service Computing [EB/OL]. http://tab.computer.org/tcsc/,2003
    [9]SCC2004[EB/OL]. http://conferences.computer.org/scc/2004/,2004
    [10]Gruman, Galen. What cloud computing really means. http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031,2008.
    [11]What is Cloud Computing?, http://aws.amazon.com/cn/what-is-cloud-computing/,2013
    [12]Vouk Mladen A. Cloud computing-Issues, research and implementations. Proceedings of the International Conference on Information Technology Interfaces (ITI),2008,31-40.
    [13]Marston S, Li Z, Bandyopadhyay S, et al. Cloud computing-The business perspective[J]. Decision Support Systems,2011,51(1):176-189.
    [14]Weinhardt C, Anandasivam D I W A, Blau B, et al. Cloud computing-a classification, business models, and research directions[J]. Business&Information Systems Engineering,2009,1(5):391-399.
    [15]Boss G, Malladi P, Quan D, et al. Cloud computing[J]. IBM white paper,2007,1369.
    [16]Google Cloud Platform [EB/OL]. https://cloud.google.com/,2013
    [17]Amazon AWS [EB/OL]. http://aws.amazon.com/cn/,2013
    [18]Microsoft Azure [EB/OL]. http://www.windowsazure.com/,2013
    [19]IBM Smart Cloud [EB/OL]. http://www.ibm.com/cloud-computing/,2013
    [20]UDDI [EB/OL]. http://uddi.org/,2013
    [21]Dooley K. Designing Large Scale Lans[M]. O'Reilly Media,2009.
    [22]UDDI Version3.0.2. http://uddi.org/pubs/uddi_v3.htm,2004
    [23]Farnoush Banaei-kashani, Ching-chien Chen, Cyrus Shahabi. WSPDS:Web Services Peer-to-Peer Discovery Service. Proceedings of the International Conference on Internet Computing (IC),2004,2:733-739.
    [24]Massimo Paolucci, Katia Sycara, Takuya Nishimura, et al. Using DAML-S for P2P Discovery. Proceedings of the International Conference on Web Services (ICWS),2003,203-207.
    [25]Andrew Harrison, Ian J Taylor. WSPeer-An interface to web service hosting and invocation. Proceedings of19th IEEE International Parallel and Distributed Processing Symposium (IPDPS),2005,2005:1420050.
    [26]Florian Forster, Hermann De Meer. Discovery of Web Services with a P2P Network. Lecture Notes in Computer Science,2004,3038:90-97.
    [27]Yuan Fuyong, Liu Jian, Yin Chunxia, et al. A novel methodology for Web Services discovery in gnutella-like networks. Proceedings of International Conference on Signal Image Technologies and Internet Based Systems (SITIS),2007,231-238.
    [28]Ozgur D Sahin, Cagdas E Gerede, Divyakant Agrawal, et al. SPiDeR:P2P-based web service discovery. Lecture Notes in Computer Science,2005,3826:157-169.
    [29]Hu Jianqiang, Guo Changguo, Jia Yan, et al. Stratus:A distributed web service discovery infrastructure based on double-overlay network. Lecture Notes in Computer Science,2005,3399:1027-1032
    [30]林权昊.基于P2P的web服务发现关键技术的研究[硕士学位论文].上海:上海交通大学计算机科学与工程系,2007.
    [31]Shuang Kai, Yang Fangchun, Su Sen. A scalable peer-to-peer overlay for semantic Web services discovery. Chinese Journal of Electronics,2008,17(2):361-366.
    [32]胡建强.Web服务发现若干关键技术研究[博士学位论文].长沙:国防科技大学计算机科学与技术专业,2005.
    [33]陈静.基于P2P的Web Sevrices发现机制[硕士学位论文].南京:河海大学计信学院,2006.
    [34]Channa Nizamuddin, Shi Wei, Li Shanping, et al. A can-based p2p infrastructure for semantic Web services. Proceedings of the ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference (DETC),2005,3B:1025-1029.
    [35]Kunal Verma, Kaarthik Sivashanmugam, Amit Sheth, et al. METEOR-S WSDI:A Scalable P2P Infrastructure of Registries for Semantic Publication and Discovery of Web Services. Information Technology and Management,2005,6(1):17-39.
    [36]Michael Pantazoglou, Aphrodite Tsalgatidou. A P2P platform for socially intelligent Web service publication and discovery. Proceedings of International Multi-Conference Computing in the Global Information Technology (ICCGI),2008,271-276.
    [37]Devis Bianchini, Valeria De Antonellis, Michele Melchiori, et al. A Semantic Overlay for Service Discovery across Web Information Systems. Lecture Notes in Computer Science,2008,5175:292-306.
    [38]Zhang Changyou, Li Wenqing, Yang Ziguang, et al. An immune-inspired web service discovery mechanism on P2P network. Proceedings of International Conference on Natural Computation (ICNC),2008,6:623-627.
    [39]Oram A. Peer-to-peer:harnessing the benefits of a disruptive technology[M]. O'Reilly Media, Inc.,2001.
    [40]Adamic L A, Lukose R M, Huberman B A.13Local search in unstructured networks[J]. Handbook of graphs and networks,2003:295.
    [41]Gnutella [EB/OL]. http://www.gnutellaforums.com/,2013
    [42]Balakrishnan H, Kaashoek M F, Karger D, et al. Looking up data in P2P systems[J]. Communications of the ACM,2003,46(2):43-48.
    [43]张一鸣,卢锡城,李东升.虚拟计算环境中的DHT拓扑构建技术研究综述[J].中国科学:信息科学,2011,41(9):1037-1053.
    [44]Zhao B Y, Kubiatowicz J, Joseph A D. Tapestry:An infrastructure for fault-tolerant wide-area location and routing[J].2001.
    [45]Rowstron A, Druschel P. Pastry:Scalable, decentralized object location, and routing for large-scale peer-to-peer systems[C]//Middleware2001. Springer Berlin Heidelberg,2001:329-350.
    [46]Stoica I, Morris R, Liben-Nowell D, et al. Chord:a scalable peer-to-peer lookup protocol for internet applications[J]. Networking, IEEE/ACM Transactions on,2003,11(1):17-32.
    [47]Maymounkov P, Mazieres D. Kademlia:A peer-to-peer information system based on the xor metric[M]//Peer-to-Peer Systems. Springer Berlin Heidelberg,2002:53-65.
    [48]陈贵海,李振华.对等网络:结构、应用与设计.北京:清华大学出版社,2007.
    [49]罗杰文.Peer to Peer综述[J]. http://www.intsci.ac.cn/users/luojw/papers/p2p.htm,2006.
    [50]Smarr L, Catlett C E. Metacomputing[J]. Communications of the ACM,1992,35(6):44-52.
    [51]Anderson D P, Cobb J, Korpela E, et al. SETI@home:an experiment in public-resource computing[J]. Communications of the ACM,2002,45(11):56-61.
    [52]Beberg A L, Ensign D L, Jayachandran G, et al. Folding@home:Lessons from eight years of volunteer distributed computing[C]//Parallel&Distributed Processing,2009. IPDPS2009. IEEE International Symposium on. IEEE,2009:1-8.
    [53]中国国家网格[EB/OL]. http://www. cngrid. org/web/guest/products
    [54]Schilit B, Adams N, Want R. Context-aware computing applications[C]//Mobile Computing Systems and Applications,1994. WMCSA1994. First Workshop on. IEEE,1994:85-90.
    [55]Dey A K. Understanding and using context[J]. Personal and ubiquitous computing,2001,5(1):4-7.
    [56]林碧英,曲俊华,吕洁,等.网络系统中的计算模式[J].现代电力,2000,11:1-5.
    [57]Floch A, Wolinski C, Kuchcinski K. Combined scheduling and instruction selection for processors with reconfigurable cell fabric[C]//Application-specific Systems Architectures and Processors (ASAP),201021st IEEE International Conference on. IEEE,2010:167-174.
    [58]张珂.面向服务发现应用的非结构化覆盖网络建模与分析[D].清华大学,2009.
    [59]Wang ZX, Zhang DL, Liu L. Study on semantic-supporting search in P2P. Computer Engineering and Applications,2007.43(3):8-11.
    [60]C. Tang and S. Dwarkadas. Hybrid global-local in-dexing for efficient peer-to-peer information retrieval. In NSDI,2004.
    [61]Joung Y J, Yang L W. KISS:A simple prefix search scheme in P2P networks[C]//Proc. of the WebDB Workshop.2006:56-61.
    [62]Perkins L, Sallis D E, Yenduri S. An Examination of Word Stemming in Latent Semantic Index Searches[M]//Global Trends in Information Systems and Software Applications. Springer Berlin Heidelberg,2012:1-4.
    [63]Ding C, Li T, Peng W. On the equivalence between non-negative matrix factorization and probabilistic latent semantic indexing[J]. Computational Statistics&Data Analysis,2008,52(8):3913-3927.
    [64]Li Y, Ahuja J, Lao L, et al. PSON:A scalable P2P file sharing system with efficient complex query support[J]. Peer-to-Peer Networking and Applications,2011,4(1):3-22.
    [65]张浩.基于结构化对等网络的高性能计算平台关键技术研究[D].华中科技大学,2009
    [66]Steve Crocker. RFCl-Host Software[EB/OL]. http://tools.ietf.org/html/rfcl,1969
    [67]方其庆,刘庆华,彭晓明,等.QoS全局最优的多目标Web服务选择算法[J].计算机应用研究,2009,26(12).
    [68]陈彦萍,李增智,郭志胜,等.Web服务组合中基于服务质量的服务选择算法[J].西安交通大学学报,2006,40(8):897-900.
    [69]周相兵,马洪江,杨兴江.一种基于云计算的语义Web服务组合模型研究[J].微电子学与计算机,2009,26(8):206-210.
    [70]Zhu XS. Research on Semantic Peer-to-peer Overlay Route Model[J]. Computer Engineering,2008.43(13):110-112.
    [71]Zhang YJ, Gu JH, Wang XZ. A Hierarchical P2P Semantic Overlay Network Architecture Based on Topic and Physical Proximity [J]. Journal of Electronics&Information Technology.2008.30(8)
    [72]A. Crespo and H. Garcia-Molina. Semantic overlay networks for p2p systems[C]. Technical report, Computer Science Department, Stanford University.2002.
    [73]Wang CZ, Yang N, Chen HW. Improving Lookup Performance Based on Kademlia[C]. In: Proc. of the Second International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC2010). Hubei:2010.446-449.
    [74]Chand R, Cosnard M., Liquori L. Powerful resource discovery for Arigatoni overlay network[J]. Future Generation Computer Systems,2008,24(1),31-38.
    [75]Stevens T, Wauters T, Develder C, De Turck F, Dhoedt B, Demeester P. Analysis of an anycast based overlay system for scalable service discovery and execution[J]. Computer Networks,2010,54(1):97-111.
    [76]Liu ZZ, Wang HM, Zhou B. A two layered P2P model for semantic service discovery[J]. Journal of Software,2007,18(8):1922-1932.
    [77]Wu WM, Wu YJ, Zhao WY. Chord-based Semantic Web Service Discovery[J]. Acta Electronica Sinica,2007,35(B12):152-155.
    [78]Zhang Y, Huang H, Yang D, Zhang H, Chao H, Huang Y. Bring QoS to P2P-based semantic service discovery for the Universal Network[J]. Personal and Ubiquitous Computing,2009,13(7):471-477.
    [79]Di Stefano A, Morana G, Zito D. A P2P strategy for QoS discovery and SLA negotiation in Grid environment[J]. Future Generation Computer Systems,2009,25(8):862-875.
    [80]Zhou J, Dou W. A QoS-Aware Service Selection Approach on P2P Network for Dynamic Cross-Organizational Workflow Development[C]. In:Proc. of the International Conference on Web Information Systems and Mining (WISM2009). Shanghai:Springer-Verlag Berlin,2009.289-298.
    [81]Xie CG, Guo DK, Chen HH. Research on Service Discovery Protocol of Global Information Grid Based on Peer-to-Peer Network[J]. Computer Engineering,2007,33(2),97-98.
    [82]Zhang, Y, Zheng, Z.&Lyu, M.R. BFTCloud:A Byzantine Fault Tolerance Framework for Voluntary-Resource Cloud Computing[C]. In:Proceeding of IEEE the4th International Conference on Cloud Computing, Washington, DC, USA,2011:444-451.
    [83]R. D. Callaway, M. Devetsikiotis. An Autonomic Service Delivery Platform for Service-Oriented Network Environments[C].2008IEEE International Conference on Communications, pp.327-331,2008.
    [84]M. C. Castro, E. Villanueva, I. Ruiz. Performance Evaluation of Structured P2P over Wireless Multi-hop Networks[C].2008Second International Conference on Sensor Technologies and Applications (sensorcomm2008), pp.796-801,2008.
    [85]E. Di Nitto, D. J. Dubois, R. Mirandola. Overlay self-organization for traffic reduction in multi-broker publish-subscribe systems[C]. Proceedings of the6th International Conference on Autonomic Computing, p.61,2009.
    [86]Z. Duan, Z. Zhang, and Y. T. Hou. Service overlay networks:slas, qos, and bandwidth provisioning[C]. IEEE/ACM Transactions on Networking, vol.11, no.6, pp.870-883, Dec.2003.
    [87]W. Allasia, F. Gallo, and M. Milanesio. Digital Rights Metadata Management and Retrieval on Structured Overlay Networks[J]. Workshop on Image,2008.
    [88]J. Gao and L. Zhang. Tradeoffs between stretch factor and load balancing ratio in routing on growth restricted graphs[C]. Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing-PODC'04, p.189,2004.
    [89]P. B. Godfrey, S. Shenker, and I. Stoica. Minimizing churn in distributed systems[C]. ACM SIGCOMM Computer Communication Review, vol.36, no.4, p.147, Aug.2006.
    [90]S. Han and Y. Xia. Network load-aware content distribution in overlay networks[C]. Computer Communications, vol.32, no.1, pp.51-61, Jan.2009.
    [91]A. Heristyo, H. Masuyama, S. Kasahara, and Y. Takahashi. User-search time analysis for hierarchical peer-to-peer overlay networks with time-dependent user-population process[C]. Proceedings of the4th International Conference on Queueing Theory and Network Applications-QTNA'09, pp.1-4,2009.
    [92]I. Houidi, W. Louati, and D. Zeghlache. A Distributed and Autonomic Virtual Network Mapping Framework[C]. Fourth International Conference on Autonomic and Autonomous Systems (ICAS'08), pp.241-247, Mar.2008.
    [93]C.-M. Hu. A Service Oriented Grid Architecture with End to End Quality of Service[J]. Journal of Software, vol.17, no.6, p.1448,2006.
    [94]Y. Hu, M. Feng, and L. N. Bhuyan. A Balanced Consistency Maintenance Protocol for Structured P2P Systems[C].2010Proceedings IEEE INFOCOM, no.2, pp.1-5, Mar.2010.
    [95]Y. Khaled, M. Tsukada, J. Santa, and T. Ernst. On the Design of Efficient Vehicular Applications[C]. VTC Spring2009-IEEE69th Vehicular Technology Conference, pp.1-5, Apr.2009.
    [96]H. Li, L. Mason, and M. Rabbat. Learning Minimum Delay Paths in Service Overlay Networks[C].2008Seventh IEEE International Symposium on Network Computing and Applications, pp.271-274, Jul.2008.
    [97]X.-Y. Li. Research on Dynamic Trust Model for Large Scale Distributed Environment[J]. Journal of Software, vol.18, no.4, p.1510,2007.
    [98]C. Luoqi and C. Kefei. Web Service Research of Trustworthy High Performance Web Service[J]. Computer Engineering, pp.227-229,2006.
    [99]I. Martinez-Yelmo, A. Bikfalvi, C. Guerrero, R. Cuevas, and A. Mauthe. Enabling Global Multimedia Distributed Services Based on Hierarchical DHT Overlay Networks[C].2008The Second International Conference on Next Generation Mobile Applications, Services, and Technologies, pp.543-549,2008.
    [100]J. Ni, H. Xie, S. Tatikonda, and Y. R. Yang. Network Routing Topology Inference from End-to-End Measurements[C].2008IEEE INFOCOM-The27th Conference on Computer Communications, pp.36-40, Apr.2008.
    [101]Y. Ohsita, S. Ata, and M. Murata. Deployable Overlay Network for Defense against Distributed SYN Flood Attacks[C]. IEICE Transactions on Communications, vol. E91-B, no.8, pp.2618-2630, Aug.2008.
    [102]D. Pompili, C. Scoglio, and L. Lopez. Multicast algorithms in service overlay networks[J]. Computer Communications, vol.31, no.3, pp.489-505, Feb.2008.
    [103]R. Price and P. Tino. Still alive:Extending keep-alive intervals in P2P overlay networks[C]. Proceedings of the5th International ICST Conference on Collaborative Computing:Networking, Applications, Worksharing,2009.
    [104]H. Qian, S. Dispensa, and D. Medhi. Optimizing request denial and latency in an agent-based VPN architecture[C]. NOMS2008-2008IEEE Network Operations and Management Symposium, no. April, pp.248-255,2008.
    [105]A. R. Razavi, S. K. Moschoyiannis, and P. J. Krause. A scale-free business network for digital ecosystems[C].20082nd IEEE International Conference on Digital Ecosystems and Technologies, pp.241-246, Feb.2008.
    [106]P. Schottle, T. Dreibholz, E. P. Rathgeb, and P. Sch. On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks[C].200833rd IEEE Conference on Local Computer Networks (LCN), pp.207-214, Oct.2008.
    [107]T. M. Shafaat, T. Schiitt, M. Moser. Key-based consistency and availability in structured overlay networks[C]. Proceedings of the17th international symposium on High performance distributed computing-HPDC'08, p.235,2008.
    [108]H. Takahashi. Context-aware Remote Healthcare Support System based on Overlay Network[J]. WSEAS Transactions on Computers, vol.7, no.9,2008.
    [109]F. Wang, Z. M. Mao, J. Wang, L. Gao, and R. Bush. A measurement study on the impact of routing events on end-to-end internet path performance. ACM SIGCOMM Computer Communication Review, vol.36, no.4, p.375, Aug.2006.
    [110]K. Birman, D. Dolev, and T. Hebrew. Extensible Architecture for reliable Publish-subscribe Eventing and Notification[J]. International Journal, vol.4, no. December, pp.18-58,2007.
    [111]R. Bolla, R. Gaeta, a. Magnetto, M. Sciuto, and M. Sereno. A measurement study supporting P2P file-sharing community models[J]. Computer Networks, vol.53, no.4, pp.485-500, Mar.2009.
    [112]J. Crowcroft, M. Pias, R. Sharma, and S. Lim. A survey and comparison of peer-to-peer overlay network schemes[J]. IEEE Communications Surveys&Tutorials, vol.7, no.2, pp.72-93,2005.
    [113]T. Dreibholz and E. Rathgeb. A Powerful Tool-Chain for Setup, Distributed Processing, Analysis and Debugging of OMNeT++Simulations[C]. Proceedings of the First International ICST Conference on Simulation Tools and Techniques for Communications, Networks and Systems,2008.
    [114]M. Jelasity, A. Montresor, and O. Babaoglu. T-Man:Gossip-based fast overlay topology construction[J]. Computer Networks, vol.53, no.13, pp.2321-2339, Aug.2009.
    [115]V. Koltun and M. Sharir. On Overlays and Minimization Diagrams[J]. Discrete&Computational Geometry, vol.41, no.3, pp.385-397, Feb.2009.
    [116]T. Koskela, O. Kassinen, J. Korhonen. Peer-to-peer community management using structured overlay networks[C]. Proceedings of the International Conference on Mobile Technology, Applications, and Systems-Mobility'08, p.1,2008.
    [117]J. Kurian and K. Sarac. A security framework for service overlay networks:Access control[C].20085th International Conference on Broadband Communications, Networks and Systems, pp.412-419, Sep.2008.
    [118]Z. Li and P. Mohapatra. QRON:QoS-Aware Routing in Overlay Networks[J]. IEEE Journal on Selected Areas in Communications, vol.22, no.1, pp.29-40, Jan.2004.
    [119]A. Popescu, D. Ilie, D. Erman, M. Fiedler An application layer architecture for seamless roaming[C].2009Sixth International Conference on Wireless On-Demand Network Systems and Services, vol.2, pp.212-220, Feb.2009.
    [120]J. Shamsi and M. Brockmeyer. QoSMap:QoS aware Mapping of Virtual Networks for Resiliency and Efficiency[C].2007IEEE Globecom Workshops, pp.1-6, Nov.2007.
    [121]S. Sioutas, E. Sakkopoulos, C. Makris, B. Vassiliadis, a. Tsakalidis, and P. Triantafillou. Dynamic Web Service discovery architecture based on a novel peer based overlay network[J]. Journal of Systems and Software, vol.82, no.5, pp.809-824, May2009.
    [122]G. Skobeltsyn, T. Luu, I. Podnar Zarko, M. Rajman, and K. Aberer. Query-Driven Indexing for Scalable Peer-to-Peer Text Retrieval[C]. Proceedings of the2nd International ICST Conference on Scalable Information Systems,2007.
    [123]D. Sontag, Y. Zhang, A. Phanishayee, D. G. Andersen, and D. Karger. Scaling all-pairs overlay routing[C]. Proceedings of the5th international conference on Emerging networking experiments and technologies-CoNEXT'09, p.145,2009.
    [124]D. Zage, and C. N. Rotaru. A Framework for Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks[C]. IEEE/ACM Transactions on Networking, vol.16, no.6, pp.1434-1446, Dec.2008.
    [125]L. Xie and S. Zhu. Message Dropping Attacks in Overlay Networks:Attack Detection and Attacker Identification[C].2006Securecomm and Workshops, pp.1-10, Aug.2006.
    [126]Y. Zhu, B. Li, and K. Q. Pu. Dynamic Multicast in Overlay Networks with Linear Capacity Constraints[C]. IEEE Transactions on Parallel and Distributed Systems, vol.20, no.7, pp.925-939, Jul.2009.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700