基于局部网络信息的贪婪式P2P资源定位技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
P2P (Peer-to-Peer)技术目前已广泛应用于资源共享和内容分发服务,在工程和理论方面都成为了最活跃的研究领域之一。随着各种P2P内容共享网络规模的逐渐增大,节点扰动现象越来越严重。单个节点难以获取和维护网络中大部分节点的信息,节点的邻居数量相对于网络规模越来越小。因此,在节点仅掌握局部网络信息的情况下,如何使用贪婪式的定位技术帮助用户快速找到所需要的资源,成为了一个具有挑战性的研究课题。
     P2P网络资源定位的性能评价标准不仅包括搜索命中率,还涵盖了网络开销、存储开销、路由维护开销、负载均衡等多个方面,而性能的影响因素也涉及到搜索算法、网络结构、复制机制、路由构造机制等多个方面。提高P2P网络的资源定位性能,需要从多种技术角度来进行研究。
     P2P网络可分为非结构化和结构化两种类型。在节点仅掌握局部网络信息的情况下,非结构化P2P网络的搜索具有严重的盲目性。贪婪式定位方法在网络扰动比较严重、资源变化比较频繁时,各种性能急剧下降。本文针对该问题,从搜索机制、网络结构和复制机制三个方面进行了研究,提出了不同的解决方法,从而使网络能够在节点扰动频繁的环境中,保持较高的资源定位性能。在节点仅掌握局部网络信息的情况下,结构化P2P网络面临的主要问题是如何构造可提高贪婪式定位性能的路由表,以及降低贪婪式多关键字搜索造成的过高的通信量。本文针对当前的主流DHT (Distributed Hash Table)型结构化P2P网络进行了研究,形式化描述了构造路由表规律,并分析其缺点,给出了改进方法。对常见的Kademlia型结构化P2P网络给出了降低多关键字搜索通信量的实现方法。本文主要研究成果如下:
     (1)在非结构化P2P网络中,贪婪式搜索通常利用节点存储的历史搜索记录作为消息转发的重要依据。在节点仅掌握局部网络信息的情况下,节点频繁的加入和退出以及资源分布变化会导致历史搜索记录失效,降低搜索命中率。本文针对该问题,形式化地分析了随机漫步搜索易转向高度数节点的特性,逆向随机漫步的性质和单独使用逆向随机漫步的缺点,并提出了一种面向非结构化P2P网络的双向随机漫步搜索机制。这种机制采用Piggybacks方式,在正向搜索转发消息的过程中同时执行逆向搜索,将资源的存储信息、请求信息、更新信息嵌入到转发包中,并与转发过程中访问过的节点进行信息交换,沿搜索路径依次传递。本文对该机制的性能进行了理论分析,实验结果表明该方法能够以较低的开销,提高各种资源包括稀有资源的搜索命中率。
     (2) Q-learning型搜索是一种应用于非结构化P2P网络的典型的贪婪式搜索机制。尽管双向随机漫步搜索机制可以有效地提高搜索命中率,但转发包中嵌入了大量的额外信息,当资源ID及其状态标志等信息占用的字节数比较多时,容易造成过高的通信量。因此,本文提出了基于节点差异化的Q-learning搜索机制。该机制根据节点的在线时长记录和所存储的资源种类,将节点分成三种类型:服务节点、稳定节点(代理节点)、普通节点。这三种类型的节点分别组成核心服务区、代理区和普通区。节点包括两种偏好:本地偏好和服务偏好。不同类型的节点按照服务偏好进行连接,相同类型的节点按照本地偏好进行连接。Q-learning模型根据资源的种类而不是资源本身来建立且仅在核心服务区内执行Q-learning搜索和模型的更新。普通节点或代理节点需要间接或直接选择合适的服务节点来执行Q-learning搜索。本文从多个方面分析了影响Q-learning搜索性能的各种因素。模拟实验结果表明,当网络扰动比较频繁时,在节点差异化的网络结构中,Q-learning型搜索仍然可以保持较高的命中率。
     (3)当资源的副本数量和资源的请求数量都比较少时,在节点仅掌握局部网络信息的情况下,对该资源副本和资源请求同时进行Flooding式主动复制是提高搜索性能的一种重要方式,然而这种方式很难控制资源副本和请求副本的数量。针对该问题,本文在对多种P2P网络拓扑结构的行为传播进行了分析,并提出了一种分布感知的协同主动复制机制。该机制执行受限的Flooding式主动复制,节点根据网络局部范围内的资源副本和请求副本分布情况,决定是否执行复制和继续进行传播。本文在模拟网络环境中实现了该方法,并对比和分析了不同网络拓扑结构中,影响副本传播范围和数量的各种因素。
     (4)在DHT型结构化P2P网络中,资源的索引通常发布到一组特殊节点上,这些节点的ID与资源Key值比较接近。使用基于局部网络信息的贪婪式定位时,每个节点寻找或发布同一个资源,最终发现的目标节点集合并不完全相同。因此,提高搜索命中率,就需要最大化相同目标节点数量,而路由表的构造机制起到了至关重要的作用。本文对该情况下的结构化P2P网络路由表构造机制进行了研究。首先假定网络节点数与ID空间大小相等,网络不存在扰动,对路由构造问题给出了形式化描述方法,并将该问题转化为等价的Change-making问题,基于Canonical原则,得出了2k系统为该假定条件下的最优的路由构造方式。然后延伸到实际的网络环境,并得出2k系统依然是合理的构造方式。最后对ID空间过大的2k路由表结构的缺点进行了分析,提出了一种ID冲突允许的路由表构造方法,并通过实验从多个角度对比和分析了这种网络与典型的Kademlia型网络之间的资源定位性能,结果表明这种方法在节点仅掌握少量网络节点信息的情况下,仍保持较高的搜索命中率。
     (5)由于寻找或发布相同资源,使用基于局部网络信息的贪婪式定位最终发现的目标节点集合不完全相同,为提高搜索命中率,相同的索引信息会分散存储在多个不同节点上。使用多个关键字寻找资源时,需要寻找每个关键字对应的资源,并将每个关键字分散存储在多个节点上的资源信息进行并集操作,然后再将不同关键字的结果信息进行交集操作。由于单个关键字对应的资源数量比较多,并集和交集操作过程会造成巨大的通信量。本文提出通过优化的布隆过滤器进行搜索结果合并,来降低Kademlia型网络多关键字搜索通信量。这种方法利用通信代价和丢失率评估模型,仅根据集合的大小就可获得优化的布隆过滤器参数。实验结果表明,该方法在允许的丢失率范围内,可以极大地降低网络通信量。
P2P (Peer-to-Peer) networks have been widely used for resource sharing and content distribution services. They have become one of the most active research areas both in the engineering and theoretical fields. In recent years, with the increase of network size, the nodes have much higher churn rate than before. A single node then cannot maintain the information of most of the others'ones in the whole network, and the number of neighbors of each node is far smaller than the network size Therefore, efficiently locating resources using greedy search becomes a challenging research topic, if nodes only know local information of networks.
     The performance metrics of P2P network resource location include not only the search hit rate, but also the network overhead, storage overhead, routing table maintenance overhead and load balancing. The impact factors of performance include the search algorithms, network structure, replication mechanism, routing table structure and so on. To improve the performance, we should study the location technologies from multiple points of view.
     The P2P network can be divided into two types:unstructured and structured ones. When nodes only know local information of networks, locating resources in unstructured P2P networks is severely blind. Traditional greedy search algorithms of the unstructured networks suffer serious performance degradation. In this thesis, we study this problem from three aspects:search mechanism, network structure and replication mechanism. Different solutions are proposed, which can keep high resource location performance under high peers'churn rate. For structured P2P networks, we focus on routing tables design and multi-keyword search. In this thesis, we mainly study on the main stream DHT (Distributed Hash Tables) structured networks. We present methods how to design routing tables for increasing the search hit rate, and how to use the optimal Bloom Filters for decreasing the communication cost of multi-keyword search in Kademlia-like networks. The main contributions of this thesis are as follows:
     (1) In unstructured P2P networks, the greedy search algorithms forward the query messages depending on the historical search records stored on each node. When nodes only know local information of networks, high peers'churn rate makes the historical search records useless, which can decrease the search hit rate. To solve this problem, we formally analyze the characteristic of the random walk search, which has a high probability of forwarding queries to the high-degree nodes. We also analyze the disadvantages of only using the reverse random walk search. And then we introduce our bidirectional random walk search mechanism (BRWS). This mechanism runs in a piggybacks way. It both uses the reverse and forward random walk. The information of the resources'locations and status, requirements is embedded in the query messages, and exchanged along the search paths. The performance of this mechanism is analyzed theoretically. The experimental results show that BRWS can actually improve the search success rate with lower overhead even for the rare resources.
     (2) Q-learning search is a typical greedy search mechanism used in unstructured P2P networks. Although BRWS can effectively improve the search hit rate, but too much information is embedded in the query message. If the information of resources occupies many bytes, BRWS will cause excessive traffic. Therefore, we present another method to improve the performance of greedy search, which differentiate the peers to construct special network structures. This method divides the nodes into three types according to their online time and resources:service nodes, stable nodes, and ordinary nodes. Different types of nodes make up different areas:core service area, agent area and the ordinary area. Stable nodes are also called agent nodes. Each node has two kinds of preference:local preference and service preference. The different types of nodes are connected according to their service preference, and nodes belonging to the same type are connected according to their local preferences. Q-learning models are established according to the type of resources, not the resources themselves. We perform the Q-learning search and update models only in the core service area. Ordinary nodes or agent nodes need to select the appropriate service nodes, directly or indirectly, to execute Q-learning search. We analyze a variety of impact factors affecting the Q-learning search performance in such a network structure from several aspects. Simulation experimental results show that, even if the networks are disturbed frequently, the Q-learning search can still keep high hit rate.
     (3) When the number of copies of a specific resource and requests for this resource are relatively small, replicating this resource and the requests using flooding is a direct way to improve the search performance. However, it is difficult to control the number of the copies. To solve this problem, we first analyze the spread behavior of the P2P networks with different topologies, and then propose the distribution aware collaborative active replication mechanism. This mechanism is designed based on limited flooding active replication. Each node decides whether to execute replicating and spreading according to the number of copies in local area, which is obtained by distribution aware methods. We compare and analyze various factors affecting the replication spread behavior in a simulated network environment with multiple different topologies.
     (4) In DHT based structured P2P network, a resource index is usually published to a special set of nodes, the IDs of which are relatively closer to this resource's key. When nodes only know local information of networks, the sets of target DHT nodes located by the queries or publications for the same resource have smaller intersection size using the greedy search. To enhance the search hit rate, we should maximum the intersection size, which is mainly determined by the routing table structure. The rules of building routing tables for structured P2P networks are explored. We first analyze a special situation that network size is equal to the ID space with no peers churn, and present formal descriptions for this situation. We transform the way of building routing tables in such a network into a Change-making problem. We find that canonical solutions systems are the best choice to construct routing tables. And then we extend to the actual network environment, and find that canonical solutions systems are still reasonable. Finally, we analyze the drawbacks of canonical solutions systems when the ID space is too large. An ID collision-allowed (ICA) DHT routing table structure is presented, and is compared with the typical Kademlia network from multiple aspects. The experimental results show that ICA DHT based networks can keep high search hit rate with low average degree.
     (5) The sets of target DHT nodes have small intersection size, when nodes only know local information of networks. To guarantee we can find the resources under high peers churn rate, we should publish the same resource on multiple different nodes. When performing multi-keyword search, we should find all the target DHT nodes responsible for each keyword, and then merge the search results. The results on the nodes responsible for the same keyword are merged by union operations, and then the union results for different keywords are merged by intersection operations. The number of the resources for a keyword, especially a common keyword, is very large. The union and intersection operations will cause huge communication cost. This thesis presents a method of performing union and intersection operations using optimal Bloom filters to reduce the Kademlia network multi-keyword search traffic. This approach optimizes the Bloom filter settings dynamically according to the communication cost and loss rate models. We can get the optimal Bloom filter settings only depending on the sizes of sets. The experimental results show that this method can greatly reduce communication cost under an acceptable loss rate.
引文
[1]Anitha A, Jayakumari J, Mini G V. A survey of P2P overlays in various networks. International Conference on Signal Processing, Communication, Computing and Networking Technologies,2011:277-281
    [2]Napster. http://www.napster.com/.2012.12.
    [3]Rhapsody. http://www.rhapsody.com/napster-freetrial/continue.html.2013.2.
    [4]http://rfc-gnutella.sourceforge.net/.2012.12.
    [5]Clarke I, Sandberg O, Wiley B, et al. Freenet:A distributed anonymous information storage and retrieval system. In Proceedings of the ICSI Workshop on Design Issues in Anonymity and Unobservability,2000:311-320.
    [6]Oliver H, Axel B. The eDonkey2000 protocol. Tech. Rep. Version 0.8, Darmstadt University of Technology, December 2002.
    [7]Kazaa. http://www.kazaa.com/.2012.12.
    [8]BitTorrent. http://www.bittorrent.com/.2012.12.
    [9]Stutzbach D, Rejaie R, Sen S. Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems. In Proc. of the ACMSIGCOMM Internet Measurement Conference, Berkeley, CA, USA,2005:267-280.
    [10]Zongming F, Mengkun Y. A segmentation-based fine-grained peer sharing technique for delivering large media files in content distribution networks. IEEE Transactions on Multimedia,2006:821-829.
    [11]Lime Company. http://www.limewire.com/.2013.2
    [12]Frost Wire. http://www.frostwire.com/.2013.2
    [13]Gnutella Forums. http://www.gnutellaforums.com/.2013.2.
    [14]张宇翔,杨冬,张宏科.P2P网络中Churn问题研究.软件学报,2009,20(5):1362-1376.
    [15]P. Maymounkov and D. Mazi eres, Kademlia:A peer-to-peer information system based on the xor metric. In Processings of the IPTPS, Cambridge, MA, USA, February 2002, pp. 53-65.
    [16]T. Isdal, M. Piatek, A. Krishnamurthy, and T. Anderson.Privacy—preserving P2P data sharing with OneSwarm. In Proc. ACM SIGCOMM, August 2010:111-122.
    [17]Sonja B, Doris S, Le H, et al. PeerSoN:P2P Social Networking—Early Experiences and Insights. In Proceedings of SocialNets 2009, The 2nd Workshop on Social Network Systems, Nuernberg, Germany, March 31,2009:46-52.
    [18]Erdos P, Renyi A. On random graphs. Publicationes Mathematicae 1959,6:290-7.
    [19]Watts D, StrogatzS. Collective dynamics of small-world networks. Nature 1998; 393:440-2.
    [20]Barabasi AL, Albert R. Emergence of scaling in random networks. Science 1999; 286: 509-12.
    [21]Zhongmin L. Effect Factors of Search Efficiency and its Optimization Methods in the Hybrid P2P Systems.In Proc. of Industrial Control and Electronics Engineering (ICICEE), 2012:1785-1788.
    [22]Sharifkhani F. A New Metric for Comparison of P2P Search Algorithms. P2P, Parallel, Grid, Cloud and Internet Computing (3PGC1C),2012:191-195.
    [23]Gross C, Stingl D, Richerzhagen B, et al.Geodemlia:A robust peer-to-peer overlay supporting location-based search. In Proc. of Peer-to-Peer Computing (P2P),2012 IEEE 12th International,2012:25-36.
    [24]Khatibi E.Mirtaheri S L, Khaneghah E M, et al. Dynamic Multilevel Feedback-Based Searching Strategy in Unstructured Peer-to-Peer Systems.In Proc. of Green Computing and Communications (GreenCom),2012:124-131.
    [25]Tsungnan L, Hsinping W, Jianming W. Search performance analysis and robust search algorithm in unstructured peer-to-peer networks.In Proc. of Cluster Computing and the Grid, 2004:346-354.
    [26]Jiang S, Guo L, Xiaodong Z, et al.LightFlood:Minimizing Redundant Messages and Maximizing Scope of Peer-to-Peer Search.Parallel and Distributed Systems,2008:601-614.
    [27]Tsuneizumi I, Aikebaier A, Enokido T, et al.Reduction of Messages Unnecessarily Ordered in Scalable Group Communication.In Proc. of Complex, Intelligent and Software Intensive Systems (CISIS),2010:299-306.
    [28]Yuhua L, Longquan Z, Jingju G, et al. A Research about Redundant Data Packet in Unstructured P2P Network. High Performance Computing and Communications,2008: 653-658
    [29]YongLiang C,TongMing L. Small World Bee:Reduce Messages Flooding and Improve Recall Rate for Unstructured P2P System.International Journal of Computer Science and Network Security,2011:88-99
    [30]Yongqiong Z,Ruimin H, Luo F. Low Latency Resource Location Algorithm for Unstructured P2P Networks.In Proc. of Computational Intelligence and Software Engineering (CiSE),2010:1-4.
    [31]Yoshida M, Ohzahata S, Nakao A, et al. Controlling file distribution in Winny network through index poisoning. In Proc. of Information Networking,2009:1-5.
    [32]Annexstein F S,Berman K. A, Jovanovic M A, et al.Indexing techniques for file sharing in scalable peer-to-peer networks.In Proc. of Computer Communications and Networks,2002: 10-15.
    [33]Jun X, Kumar A, Xingxing Y.On the fundamental tradeoffs between routing table size and network diameter in peer-to-peer networks.Selected Areas in Communications,2004: 151-163.
    [34]WenXiang L, ZhaoJun D, ZhiChao S, et al.A Proximity-Aware Technique for Distributing Replicas in DHT-Based P2P Networks.In Proc. of Computer Network and Multimedia Technology,2009:1-4.
    [35]Wei M, Xiaofeng Q, Chunhong Z. The analysis of security threats in structured P2P load balancing schemes. In Proc. of Cloud and Service Computing (CSC),2011:296-301.
    [36]Jun C.Research of Load Balancing Algorithm in DHT Based P2P Systems.Internet Technology and Applications,2010:1-4.
    [37]Song F, ChengZhong X, Haiying S. Randomized load balancing strategies with churn resilience in peer-to-peer networks.Journal of Network and Computer Applications,2011: 252-261.
    [38]Atsushi Takeda, Takuma Oide, Akiko Takahashi. Simple dynamic load balancing mechanism for structured P2P network and its evaluation.International Journal of Grid and Utility Computing,2012:126-135.
    [39]熊伟,谢冬青,焦炳旺,刘洁.一种结构化P2P协议中的自适应负载均衡方法.软件学报,2009,20(3):660-670.
    [40]Shichang S, PAjith A, Guiyong Z, PHongbo L. A Particle Swarm Optimization Algorithm for Neighbor Selection in Peer-to-Peer Networks.In Proc. of the 6th International Conference on Computer Information Systems and Industrial Management Applications,2007: 166-172
    [41]Aibo S, Jingya Z, Junzhou L. Cooperation Based P2P Topology Adaptation Scheme towards Improving Search Performance.Chinagrid Conference (ChinaGrid),2011:147-154.
    [42]Stutzbach D, Rejaie R, Sen S. Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems. IEEE/ACM Transactions on Networking,2008:267-280.
    [43]Cuihua Z, Hongcai F, Cao Y. Key-peers based topology control for unstructured P2P networks.2nd International Conference on Future Computer and Communication (ICFCC), 2010(V3):114-118.
    [44]Ohnishi K, Nagamatsu S, Okamura T, Oie Y.Autonomously Reconstructable Semi-Structured P2P Networks for File Sharin. Third International Conference on Autonomic and Autonomous Systems,2007:10。
    [45]Tao H,Ke Xu, Renjie P.A popularity-based neighbor selection model in P2P file-sharing system.IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT),2010:68-71.
    [46]Zhongmei Y, Xiaoming W, Leonard D, Loguinov D.Node Isolation Model and Age-Based Neighbor Selection in Unstructured P2P Networks. IEEE/ACM Transactions on Networking,2009:144-157.
    [47]Hujin W, Yongting L. Guangzhou Cone:A Topology-Aware Structured P2P System with Proximity Neighbor Selection.Future Generation Communication and Networking,2007: 4349.
    [48]Hancong D, Xianliang L, Hui T, et al. Proximity Neighbor Selection in Structured P2P Network.The Sixth IEEE International Conference on Computer and Information Technology, 2006:52.
    [49]Robert B, Mike A. Machine learning for efficient neighbor selection in unstructured P2P networks. In Proc. of 2nd USENIX workshop on tackling computer systems problems with machine learning techniques,2007:1-6.
    [50]ByungGon C, Ben Y Z, John D K.Impact of neighbor selection on performance and resilience of structured p2p networks.In Proc. of the 4th international conference on Peer-to-Peer Systems,2005:264-274.
    [51]周晓波,周健,卢汉成,洪佩琳.一种基于层次化兴趣的非结构化P2P拓扑形成模型.软件学报,2007,18(12):3131-3138.
    [52]Q. Lv,P. Cao,E. Cohen,K. Li,S. Shenker,Search and replication in unstructured peer-to-peer networks,in:Proc.of the ACM SIGMETRICS'02,ACM Press,2002:258-259.
    [53]Gkantsidis C, Mihail M, Saberi A. Random walks in peer-to-peer networks. In Proc. of IEEE conference on compute rcommunications,2004:7-11.
    [54]马文明,孟祥武,张玉洁.面向非结构化P2P网络的双向随机漫步搜索机制.软件学报,2012,23(4):894-911.
    [55]Lelin Z, Zhiyong W, Dagan F. Distributed Indexing for Resource Discovery in P2P Networks.IEEE International Conference on Multimedia and Expo (ICME),2010:1439-1444.
    [56]Yingwu Z, Haiying S.High search performance, small document index:P2P search can have both.International Conference on High Performance Computing (HiPC),2009:312-321.
    [57]Ratnasamy S, Francis P, Handley M, et al. A scalable content addressable network. In Proc. of the ACM SIGCOMM,2001:161-172.
    [58]Stoica I, Morris R, Karger D, et al.Chord:A scalable peer-to-peer lookup protocol for internet applications.IEEE/ACM Transactions on Networking,2003:17-32.
    [59]Zhao B Y, Huang L, Stribling J, et al. Tapestry:A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications,2004:41-53.
    [60]Rowstron A, Druschel P. Pastry:Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proc. of the Middleware,2001.
    [61]PHyuncheol K, YoungHwa K, PKwangjoon K, etal.Restricted Path Flooding Scheme in Distributed P2P Overlay Networks. In Proc. of 2008 International Conference on Information Science and Security,2008:58-61.
    [62]Margariti S V, Dimakopoulos V V. A Novel Probabilistic Flooding Strategy for Unstructured Peer-to-Peer Networks.15th Panhellenic Conference on Informatics (PCI),2011: 149-153.
    [63]Gaeta R, Sereno M. Generalized Probabilistic Flooding in Unstructured Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems,2011:2055-2062.
    [64]Ai W, Xinsong L,Kejian L.Efficient flooding in peer-to-peer networks.7th International Conference on Computer-Aided Industrial Design and Conceptual Design,2006:1-6.
    [65]Gkantsidis C, Mihail M, Saberi A.Hybrid search schemes for unstructured peer-to-peer networks. In:Proceedings of IEEE conference on computer communications,2005:1526-37.
    [66]Kun Z, Zhendong N, Yumin Z. Degree biased random walk in unstructured peer-to-peer networks.2nd International Conference on Computer Engineering and Technology (ICCET), 2010(V2):339-343.
    [67]Kitamura, H, Fujita, S. A Biased k-Random Walk to Find Useful Files in Unstructured Peer-to-Peer Networks. International Conference on Parallel and Distributed Computing, Applications and Technologies,2009:210-216.
    [68]Ming Z, Kai S, Seiferas J.The Convergence-Guaranteed Random Walk and Its Applications in Peer-to-Peer Networks. IEEE Transactions on Computers,2008:619-633.
    [69]Jing X, King-Shan L. Modeling Random Walk Search Algorithms in Unstructured P2P Networks with Social Information.IEEE International Conference on Communications,2009: 1-5.
    [70]Ronasi K, Firooz M H, Pakravan M R,et al.An Enhanced Random-walk Method for Content Locating in P2P Networks.27th International Conference on Distributed Computing Systems Workshops,2007:21.
    [71]Qianbing Z, Xicheng Lu, Peidong Z, et al. An efficient random walks based approach to reducing file locating delay in unstructured P2P network.IEEE Global Telecommunications Conference,2005.
    [72]Bisnik N, Abouzeid A. Modeling and analysis of random walk search algorithms in P2P networks.Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005:95-103.
    [73]Himali D M R, Prasad S K.SPUN:A P2P Probabilistic Search Algorithm Based on Successful Paths in Unstructured Networks. IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW),2011:1610-1617.
    [74]Xiaoyu Y, Yiming H. SEIF:Search Enhanced by Intelligent Feedback in Unstructured P2P Networks. International Conference on Parallel Processing,2009:494-501.
    [75]Shuo J, St Juste P, Figueiredo R J. A multidimensional heuristic for social routing in peer-to-peer networks. IEEE Consumer Communications and Networking Conference (CCNC), 2013:329-335.
    [76]Shen X J, Jiang Z Q, Zhang, X Y. Search algorithm based on information diffusion for unstructured peer-to-peer networks.Electronics Letters,2011:1026-1027.
    [77]黄永生,孟祥武,张玉洁.基于社会网络特征的P2P内容定位策略.软件学报,2010(10):2622-2630.
    [78]Tsoumakos D, Roussopoulos N. Adaptive probabilistic search for peer-to-peer networks. In:Shahmehri N, ed. Proc. of the 3rd Int'l Conf. on Peer-to-Peer Computing (P2P 2003),2003: 102-109.
    [79]Kalogeraki V, Gunopulos D, Zeinalipour-Yazti D. A local search mechanism for peer-to-peer networks. In:Proc. of the Information and Knowledge Management. McLean: ACM Press,2002:300-307.
    [80]Xu M, Zhou SG, Guan JH, Hu XH. A path-traceable query routing mechanism for search in unstructured peer-to-peer networks.Joumal of Network and Computer Applications,2010, 33(2):115-127.
    [81]冯国富,毛莺池,陆桑璐,陈道蓄PeerRank一种无结构P2P资源发现策略.软件学报,2006,17(5):1098-1106.
    [82]Yeferny T, Arour K. Efficient Routing Method in P2P Systems Based upon Training Knowledge.26th International Conference on Advanced Information Networking and Applications Workshops (WAINA),2012:300-305.
    [83]R. Beverly and M. Afergan. Machine learning for efficient neighbor selection in unstructured p2p networks. In SYSML'07:Proceedings of the 2nd USENIX workshop on Tackling computer systems problems with machine learning techniques,2007:1-6.
    [84]Yongqiong Z, Ruimin H. Adaptive routing for P2P networks using reinforcement learning.3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT),2010:37-41.
    [85]Gatani L, Re G L, Urso A, et al. Reinforcement learning for P2P searching. In Proc. of the International Workshop on Computer Architecture for Machine Perception (CAMP'05), 2005.
    [86]Li, X. and J. Wu. Improve Searching by Reinforcement Learning in Unstructured P2Ps. Proceedings of the 26th IEEE International Conference Workshops on Distributed Computing Systems,2006:75.
    [87]Yongsheng H, Jun W, Zhenwu H, et al. A reliable searching and broadcasting scheme in large-scale structured peer-to-peer system.4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT),2011:324-328.
    [88]X. Li and J. Wu. Searching techniques in peer-to-peer networks. In J. Wu, editor, Handbook of Theoretical and Algorithmic Aspects of Ad Hoc, Sensor, and Peer-to-Peer Networks. Auerbach, New York, USA,2006.
    [89]Kaashoek M F, Karger D R. Koorde:a simple degree-optimal distributed hash table. In Proc. of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03),2003:98-107.
    [90]Malkhi D, Naor M, Ratajczak D. Viceroy:A scalable and dynamic emulation of the butterfly. In Proc. of Principles of Distributed Computing 2002:183-192.
    [91]Shen H, Xu C, Chen G. Cycloid:A scalable constant-degree P2P overlay network. Performance Evaluation,2006,63(3):195-216.
    [92]Ying G, Jiang Z. Design of Original Search Model Based on Broadcast and DHT in Peer to Peer Environment. International Conference on Management of e-Commerce and e-Government (ICMeCG),2012:258-263.
    [93]Fujita S. Proximity-Aware DHT for Efficient Lookup Service in Peer-to-Peer Applications. IEEE 14th International Conference on Computational Science and Engineering (CSE),2011:464-470.
    [94]Hengkui W, Deyun G, Fuhong L, et al. A near-optimal one hop DHT lookup in structure peer-to-peer networks.2nd IEEE International Conference on Network Infrastructure and Digital Content,2010:987-991.
    [95]Gupta I, Birman K, Linga P, et al. Kelips:building an efficient and stable P2P DHT through increased memory and background overhead, In Proc. of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03),2003:160-169.
    [96]刘业,杨鹏.基于自组织聚类的结构化P2P语义路由改进算法.软件学报,2006,17(2):339-348.
    [97]Sabu M. Thampi. Survey of Search and Replication Schemes in Unstructured P2P Networks. Network Protocols and Algorithms 2010:93-131.
    [98]Cohen E, Shenker S. Replication strategies in unstructured peer-to-peer networks, In Proceedings of ACM SIGCOMM'02, Aug.2002.
    [99]Yamamoto H., Maruta D. and Oie Y. Replication Methods for Load-balancing on Distributed Storages in P2P Networks. In Proc. of Symposium on Applications and the Internet, 2005:264-271.
    [100]Sabu M. Thampi and Chandra Sekaran K, "Autonomous Data Replication Using Q-Learning for Unstructured P2P Networks," Proc. of the sixth IEEE International Symposium on Network Computing and Applications (IEEE NCA07), ISBN:0-7695-2922-4, pp.311-317, July 12-14,2007.
    [101]Sabu M, Thampi and Chandra Sekaran K. Q-Feed-An Effective Solution for the Free-riding Problem in Unstructured P2P Networks. International Journal of Digital Multimedia Broadcasting,2010.
    [102]Kavitha R, Adriana I, Ian F. Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities, Proc.of 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, pp.376-376, May 2002.
    [103]Taizo Y, Kenro A, Atsuhiro T, et al. Adaptive Replication Method Based on Peer Behavior Pattern in Unstructured Peer-to-Peer Systems. In Proc.of 21st International Conference on Data Engineering Workshop,2005:1239-1239.
    [104]Letian R. Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment. Journal of Computers.2008:9-15.
    [105]Rajasekhar S, Rong B, Lai K Y, et al. Load Sharing in Peer-to-Peer Networks using Dynamic Replication. In Proc. of the 20th International Conference on Advanced Information Networking and Applications,2006:1011-1016
    [106]DHTSim. http://www.informatics.sussex.ac.uk/users/ianw/teach/dist-sys/.2013-2.
    [107]P2Psim:A Simulator for Peer-to-Peer (P2P) Protocols.http://pdos.csail.mit.edu/p2psim/. 2013-2.
    [108]Shudo K. Overlay Weaver. http://overlayweaver.sourceforge.net/.2013-2.
    [109]PlanetSim:An Overlay Network Simulation Framework. http://planet.urv.es/planetsim/. 2013-2.
    [110]Montresor A, Jelasity M. PeerSim:A Scalable P2P Simulator. In Proceedings of the 9th P2P Conference,2009. http://peersim.sourceforge.net/
    [111]Li J, Stribling J, Morris R, et al. Bandwidth-Efficient Management of DHT Routing Tables.In Proc of the 2nd NSDI,2005.
    [112]Goh S T, Kalnis P, Bakiras S, et al. Real datasets for file-sharing peer-to-peer systems, In Proc. of 10th International Conference of Database Systems for Advanced Applications, 2005.
    [113]Newman MEJ, Strogatz SH, Watts DJ. Random graphs with arbitrary degree distributions and their applications. Physical Review E—Statistical, Nonlinear, and Soft Matter Physics,2001,64(2 Ⅱ):261181261187. [doi:10.1103/PhysRevE.64.026118].
    [114]Kun Z, Zhendong N, Yumin Z. Degree biased random walk in unstructured peer-to-peer networks.2nd International Conference on Computer Engineering and Technology (ICCET), 2010(V2):339-343.
    [115]Kitamura H, Fujita S. A Biased k-Random Walk to Find Useful Files in Unstructured Peer-to-Peer Networks.International Conference on Parallel and Distributed Computing, Applications and Technologies,2009:210-216.
    [116]Aral S, Muchnik L, Sundararajan A. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proc. Natl. Acad. Sci. USA,2009, 106(51):21544-21549.
    [117]Young HP. Innovation Diffusion in Heterogeneous Populations:Contagion, social influence, and social learning. Am Econ Rev 99,2009:1899-1924.
    [118]Centola D. The spread of behavior in an online social network experiment. Science 329: 1194-1197.
    [119]Centola D, Macy M. Complex contagions and the weakness of long ties. American Journal of Sociology,2007,113:702-734.
    [120]Montanari A, Saberi A. The spread of innovations in social networks. Proc Natl Acad Sci USA,200,107:20196-20201.
    [121]Hackett A, Melnik S, Gleeson J P. Cascades on a class of clustered random networks. Physical Review E,83,2011.
    [122]Golub B, Jackson MO. How homophily affects the speed of learning and diffusion in networks. Stanford University arXiv:0811.4013v2 (physics.soc-ph) (2008).
    [123]Romero D, Meeder B, Kleinberg J. Differences in the mechanics of information diffusion across topics:Idioms, political hashtags, and complex contagion on twitter. In WWW'11:Proceedings of the 20th international conference on World Wide Web. ACM, 2011:695-704.
    [124]Kozen D, Zaks S, Optimal Bounds for the Change-Making Problem, Theoret. Comput. Sci.123(1994),377-388.
    [125]Robertson S.Understanding Inverse Document Frequency:On Theoretical Arguments for IDF. J. Documentation, vol.60,2004:503-520.
    [126]Gnawali O D. A Keyword-Set Search System for Peer-to-Peer Networks. Master's Thesis, Massachusetts Inst. of Technology,2002.
    [127]Podnar I, Rajman M, Luu T, et. al. Scalable Peer-to-Peer Web Retrieval with Highly Discriminative Keys.Proc. IEEE Int'l Conf. Data Eng. (ICDE),2007.
    [128]Skobeltsyn G, Luu T, Zarko I P, et. al. Web Text Retrieval with a P2P Query-Driven Index. In Proc. of Ann. Int'l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR),2007.
    [129]Bender M, Michel S, Triantafillou P, et al. P2P Content Search:Give the Web Back to the People. In Proc. of Int'l Workshop Peer-to-Peer System (IPTPS),2006.
    [130]Hanhuan C, Lei C, Yunhao L, et. al. Optimizing Bloom Filter Settings in Peer-to-Peer Multikeyword Searching. IEEE Transcations on Knowledge and Data Engineering. Vol.24, No.4, April 2012.
    [131]Broder A, Mitzenmacher M. Network Applications of Bloom Filters:A Survey. Internet Math, vol.1, no.4,2005:484-509.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700