基于P2P网格的新型科学计算基础架构研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
网格技术和对等(Peer-to-Peer,简称P2P)技术是当今分布式计算领域的两个研究热点,它们为各种高性能计算应用提供了基础计算架构。网格技术通过网络大规模地集成地理上广泛分布的各种资源,为各种科学研究和工程应用提供强大的计算支持,但在网格环境中节点缺乏自由度,系统的可扩展性不强。而P2P技术与网格不同,它的每一个节点都有平等的地位,能够自由地加入和离开,因此具有较强的可扩展性和鲁棒性,但现有的P2P技术节点缺少安全策略,容易受到恶意攻击,安全性较差。
     本文提出了一种P2P网格模型,它融合了网格技术和P2P技术的优点,实现了一个低成本、高效、稳定、安全的科学计算架构。本文通过详细介绍如何实现基于P2P网络和网格模型的P2P网格架构,如何对P2P网格进行优化以实现节点负载均衡,以及P2P网格在科学计算和协同应用领域的实例,全面分析P2P网格的实现、优化和应用,并通过多个实验证明该混合式计算架构在计算性能、安全性、可扩展性、鲁棒性等方面相比于传统的P2P结构、网格模型以及相关应用的优势。研究工作取得以下创新成果:
     (1)利用Globus Toolkit(GT)和Sun Grid Engine(SGE)构建了层次型组合中间件架构的校园网格。GT能够高效快速地在网格节点间传输资源和计算任务,而SGE可以根据节点的负载情况进行自动任务调度。这种架构在计算性能、安全性方面都具有较大的优势,具有一定的新颖性和实用性。
     (2)实现了一种基于角色和信誉访问摔制的P2P网络模型——R2P,并对它进行改进,提出了SW-R2P模型。SW-R2P模型利用零知识交互式证明算法和Bayesian信誉网实现一种可信小世界P2P网络模型。SW-R2P模型把Bayesian信誉评估测量和小世界P2P网络进行结合,不仅能够保证网络的可信性和安全性,还能够利用拓扑结构提高网络的资源查找性能。
     (3)实现了基于SW-R2P模型实现的网格架构,把网格的安全、稳定的特点和P2P的可扩展、灵活的特点进行结合,提出了一种新型的科学计算基础架构。它利用P2P网络把所有节点划分成组,并使用中间件软件组织其中部分节点构建成网格。这种层次型的计算架构能够综合利用两种网络模型的优点,具有较强的创新性。它能够利用节点间的交互历史对P2P网格节点的负载情况进行预测,以此影响资源请求节点选择服务节点的过程,有效均衡P2P网格环境的负载,从而能够确保资源利用的高效性,节点服务的可靠性以及整个网络的稳定性。该模型是对P2P网格的一个重要优化。
     此外,利用本文的研究成果P2P网格,改进原有的层次型校园网格架构,实现一种新型的协同应用框架。大量实验证明,P2P网格能够较大程度地提高校园网格的科学计算性能和协同应用的效率,具有较强的实用性。
Grid and Peer-to-Peer (P2P) are two state-of-the-art research spots in the area of distributed computing, and they are capable of providing cyberinfrastructures for various applications in high performance computing. Grid technology utilizes the network to integrate geographically distributed resources, supporting the scientific research and engineering applications by large computing cycles. However, the grid network harnesses the nodes over-tightly, which leads to a lower system scalability. In contrast, each peer in P2P network has an equal position, joining and leaving freely, therefore P2P has a much higher scalability and robustness. However, it has less security strategy, which causes to be fragile to malicious attacks.
     This dissertation specifies a P2P grid model, which integrates the grid technology with P2P network to utilize both their advantages and to avoid their disadvantages. This combined model can be used to implement a low-cost, efficient, stable and secure cyberinfrastructure. The dissertation also introduces how to implement the specified P2P network and grid model to construct this P2P grid architecture, how to optimize the P2P grid to implement the load balance, and how to apply the architecture into the scientific computation and collaborative applications. Through multiple test cases for parallel computing and simulation experiments, the P2P grid cyberinfrastructure is explicitly proved to be more excellent than the traditional P2P, grid and their related applications, in terms of computing performance, security, scalability and robustness. The main creative contributions of the whole research work are listed as follows.
     (1) The campus grid is constructed by using the hierarchical combination of the middleware GT and SGE, which can make use of both their advantages. GT facilitates the resource transfer and computing tasks between the grid nodes efficiently, while SGE schedules the tasks dynamically based on the node loads. This novel architecture is much excellent in terms of computing performance and security.
     (2) Stemming from the P2P network with role and reputation based access control policies, we propose a SW-R2P model, which utilizes the zero knowledge interactive proof and Bayesian trust model to construct a trusted small world overlay P2P network. As we know, SW-R2P is the first work to synthesize the Bayesian trust evaluation and small world P2P network topology. This architecture not only keeps the whole network trustability and security, but also uses the topology to improve the resources locating.
     (3) The P2P grid architecture is implemented based on the SW-R2P network. It inherits the security and stableness of grid, and scalability and flexibility of P2P, to provide a novel cyberinfrastructure for scientific computation. The P2P grid uses the P2P network to group all the peers, and deploys the grid middleware on some of them to construct the upper grid layer. This hierarchical cyberinfrastructure makes full use of the advantages of both network models.
     (4) The load balance model for the P2P grid can be implemented by adding some kinds of load measurements in the Bayesian trust network. It uses the interactions history to probably predict the load of the candidate peers, therefore affecting the server peers selection. This model facilitates to make full use of P2P grid resources, which keeps the services robust and the whole network stable. This model is an optimization strategy for the P2P grid.
     Moreover, by using the proposed P2P grid, we are able to improve the traditional campus grid architecture and implement a new collaborative application framework. The experiments show that the P2P grid is capable of significantly improving the performance of the scientific computation in the campus grid and the efficiency of the collaborative applications, and further imply that the architecture has much practicability.
引文
[1]李三立,网格--新一代的信息基础设施[C],CCID论坛,2002.
    [2]P.Freeman,D.Crawford,S.Kim,J.Munoz.Cyberinfrastructure for Science and Engineering:Promises and Challenges[J].Proceeding of the IEEE,2005,93(3):682-691.
    [3]I.Foster,C.Kesselman.The Grid:Blueprint for a New Computing Infrastructure[M].Morgan Kaufmann Publishers,San Francisco,CA,USA,1998.
    [4]I.Foster,C.Kesselman.The Grid 2:Blueprint for a New Computing Infrastructure[M].Morgan Kaufmann Publishers,San Francisco,CA,USA,2004.
    [5]徐志伟,冯百明,李伟.网格计算技术[M].电子工业出版社,中国北京,2004.
    [6]I.Foster,C.Kesselman,T.Steven.The Anatomy of the Grid:Enabling Scalable Virtual Organizations[J].International Journal of High Performance Computing Applications,2001,15(3):200-222.
    [7]I.Foster,C.Kesselman,J.Nick,S.Tuecke.The Physiology of the Grid:An Open Grid Services Architecture for Distributed Systems Integration[EB/OL].Technical Report,Glous Project,http://www.globus.org/research/papers/ogsa.pdf,2002.
    [8]I.Foster.What is the Grid? A Three Point Checklist[N].GRIDToday,1(6),2002.
    [9]A.Oram.Peer-to-Peer:Harnessing the Power of Disruptive Technologies[M].O'Reilly and Associates,2001.
    [10]D.Talia,P.Trunfio.Toward a Synergy between P2P and Grids[J].IEEE Internet Computing,2003,7(4):94-96.
    [11]A.Iamnitchi,I.Foster,D.Nurmi.A Peer-to-Peer Approach to Resource Location in Grid Environments[C].Proceeding of the IEEE International Symposium on High Performance Distributed Computing,Edinburgh,Scotland,2002,7.
    [12]A.Oram.Peer-to-Peer利用颠覆性技术的强大能量(影印版)[M].清华大学出版社,2003.
    [13]罗杰文.P2P综述[EB/OL].http://www.intsci.ac.cn/users/luojw/papers/p2p.htm,2005.
    [14]The Napster Project.http://www.napster.com.
    [15]The Gnutella Project.http://gnutella.wego.com.
    [16]B.Zhao,J.Kubiatowicz,A.Joseph.Tapestry:An Infrastructure for Fault-tolerant Wide-area Location and Routing[TR].Technical Report UCB/CSD-01-1141,UC Berkeley, 2001.
    [17] I. Stoica, R. Morris, D. Karger, F. Kaashoek, H. Balakrishnan. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications[C]. Proceeding of SIGCOMM, San Diego, USA, 2001, 8.
    [18] A. Rowstron, P. Druschel. Pastry: Scalable, Distributed Object Location and Routing for Large-scale Peer-to-Peer Systems[C]. Proceeding of IFIP/ACM International Conference on Distributed Systems Platforms, Heidelberg, Germany,2001,11.
    
    [19] The Pastry Project. http://www.cs.rice.edu/CS/Systems/Pastry.
    [20] The Kazaa Project. http://www.kazaa.com.
    [21] J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R.Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, B. Zhao.OceanStore: An Architecture for Global-scale Persistent Storage[C]. Proceeding of International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, 2000, 11.
    [22] The Farsite Project. http://research.microsoft.com/farsite.
    [23] The Morpheus Project. http://www.musiccity.com.
    [24] The SETI@home Project. http://setiathome.ssl.berkeley.edu.
    [25] D. Reed, I. Pratt, P. Menage, S. Early, N. Stratford. Xenoservers: Accountable Execution of Untrusted Programs[C]. Proceeding of Hot Topics in Operating Systems, Rio Rico, Arizona, 1999, 3.
    [26] The Maze Project. http://maze.pku.cn.
    [27] The Granary Project. http://hpc.cs.tsinghua.edu.cn/granary.
    [28] The AnySee Project. http://www.anysee.net.
    [29] The PPLive Project. http://www.pplive.com.
    [30] The Poco Project. http://my.poco.cn.
    [31]田慧蓉.P2P网络信任模型与激励机制的研究[D].北京邮电大学,2006.
    
    [32] K. Aberer, Z. DesPotovic. Managing Trust in a Peer-to-Peer Information System[C]. Proceeding of the International Conference on Information and Knowledge Management, Atlanta, Georgia, 2001,11.
    [33] S. Lee, R. Sherwood, B. Bhattacharjee. Cooperative Peer Groups in NICE[C].Proceeding of IEEE Infocom, San Francisco, USA, 2003,4.
    [34] S. Kamvar, M. Schlosser. The EigenTrust Algorithm for Reputation Management in P2P Networks[C]. Proceeding of WWW, Budapest, Hungary, 2003, 5.
    [35] L. Xiong, L. Liu. PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities[J]. IEEE Transactions on Knowledge and Data Engineering,2004,16(7):843-857.
    [36]S.Song,K.Hwang,R.Zhou,Y.Kwok.Trusted P2P Transactions with Fuzzy Reputation Aggregation[J].IEEE Internet Computing,2005,9(6):18-28.
    [37]Z.Liang,W.Shi.PET:A Personalized Trust Model with Reputation and Risk Evaluation for P2P resource sharing[C].Proceeding of Hawaii International Conference on System Science,Hawaii,USA,2005,1.
    [38]G.Zacharia,P.Maes.Trust Management through Reputation Mechanisms[J].Applied Artificial Intelligence,2000,14(9):881-901.
    [39]J.Sabater,C.Sierra.Reputation and Social Network Analysis in Multi-Agent Systems[C].Proceeding of International Joint Conference on Autonomous Agents and Multi-Agent Systems,Bologna,Italy,2002,7.
    [40]J.Pujol,R.Sanguesa.Extracting Reputation in Multi-Agent Systems by Means of Social Network Topology[C].Proceeding of International Joint Conference on Autonomous Agents and Multi-Agent Systems,Bologna,Italy,2002,7.
    [41]ebay.http://www.ebay.com.
    [42]Amazon.http://www.amazon.com.
    [43]A.Josang,R.Ismail.The Beta Reputation System[C].Proceeding of Bled Electronic Commerce Conference,Bled,Slovenia,2002,6.
    [44]Y.Wang,J.Vassileva.Trust and Reputation Model in Peer-to-Peer Networks[C].Proceeding of International Conference on Peer-to-Peer Computing,Linkoeping,Sweden,2003,9.
    [45]V.Cahill,B.Shand,E.Gray,C.Jensen,et al.Using Trust for Secure Collaboration in Uncertain Environments[J].Pervasive Computing,2003,2(3):52-61.
    [46]A.Abdul-Rahman,S.Hailes.Supporting Trust in Virtual Communities[C].Proceeding of Hawaii International Conference on System Sciences,Hawaii,USA,20O0,1.
    [47]W.Dou,H.Wang,Y.Jia,P.Zou.A Recommendation-Based Peer-to-Peer Trust Model[J].Journal of Software,2004,15(4):571-583.
    [48]窦文.信任敏感的P2P拓扑构造及其相关技术研究[D].国防科学技术大学,2003.
    [49]A.Yamamoto,D.Asahara,T.Itao,S.Tanaka,T.Suda.Distributed Pagerank:A Distributed Reputation Model for Open P2P networks[C].Proceeding of International Symposium on Applications and the Internet Workshops,Tokyo,Japan,2004,1.
    [50]B.Yu,M.R Singh,K.Sycara.Developing Trust in Large-Scale Peer-to-Peer Systems[C].Proceeding of IEEE Symposium on Multi-Agent Security and Survivability,Philadepllia,USA,2004,8.
    [51]A Josang.An Algebra for Assessing Trust in Certificate Chains[C].Proceeding of the Network and Distributed Systems Security Symposium,San Diego,CA,1999,2.
    [52]T.DeFanti,I.Foster,M.Papka,R.Stevens,T.Kuhfuss.Overview of the I-way:Wide Area Visual Supercomputing[J].International Journal of Supercomputer Applications,High Performance Computing,1996,10(2-3):123-131.
    [53]R.Stevens,P.Woodward,T.DeFanti,C.Catlett.From the I-WAY to the National Technology Grid[J].Communications of the Acm,1997,40(11):50-60.
    [54]I.Foster,C.Kesselman.Globus:A Metacomputing Infrastructure Toolkit[J].International Journal of Supercomputer Applications,High Performance Computing,1997,11(2):115-128.
    [55]A.Grimshaw,W.Wulf.The Legion Vision of a Worldwide Virtual Computer[J].Communications of the Acm,1997,40(1):39-45.
    [56]Global Grid Forum.http://www.ggf.org.
    [57]徐志伟,冯百明,李伟.因特网之后是什么--网格技术探讨[N].计算机世界报,2001.
    [58]D.Arnold,H.Casanova,J.Dongarra.Innovations of the NetSolve Grid Computing System[J].Concurrency and Computation:Practice and Experience,2002,14(13-15):1457-1479.
    [59]H.Nakada,Y.Tanaka,S.Matsuoka,S.Sekiguchi.The Design and Implementation of a Fault-Tolerant RPC System:Ninf-C.Proceeding of International Conference on High Performance Computing,Grid in Asia Pacific Region,Tokyo,Japan,2004,7.
    [60]D.Erwin.UNICORE:A Grid Computing Environment.Concurrency and Computation:Practice and Experience,2002,14(13-15):1395-1410.
    [61]R.Buyya,S.Venugopal.The Gridbus Toolkit for Service Oriented Grid and Utility Computing:An Overview and Status Report[C].Proceeding of Gecon,Seoul,Korea,2004,7.
    [62]F.Berman,R.Wolski,S.Figueira,J.Schopf,G.Shao.Application-Level Scheduling on Distributed Heterogeneous Networks[C].Proceeding of Supercomputing,Pittsburgh,PA,1996,11.
    [63]J.Frey,T.Tannenbaum,M.Livny,I.Foster,S.Tuecke.Condor-G:A Computation Management Agent for Multi-Institutional Grids[J].Cluster Computing,2002,5(3):237-246.
    [64] R. Buyya, D. Abramson, J. Giddy. Nimrod/G: An Architecture for a Resource Management and Scheduling System in a Global Computational Grid[C].Proceeding of International Conference on High Performance Computing in the Asia-Pacific Region, Beijing, China, 2000, 5.
    [65] G. Tom, A. Gabrielle, L. Gerd, J. Masso, R. Thomas, S. Edward, S. John. The Cactus Framework and Toolkit: Design and Applications[C]. Proceeding of High Performance Computing for Computational Science - VECPAR, Porto, Portugal,2002, 6.
    
    [66] F. Berman, A. Chien, K. Cooper, J. Dongarra, I. Foster, D. Gannon, L. Johnsson,K. Kennedy, C. Kesselman, J. Crummey, D. Reed, L. Torczon, R. Wolski. The GrADS Project: Software Support for High-Level Grid Application Development[J]. International Journal of High Performance Computing Applications, 2001, 15(4):327-344.
    [67] M. Thomas, S. Mock, M. Dahan, K. Mueller, D. Sutton, J. Boisseau. The GridPort Toolkit: A System for Building Grid Portals[C]. Proceeding of International Symposium on High Performance Distributed Computing, San Francisco, CA,2001,8.
    [68] P. Kunszt. European DataGrid Project: Status and Plans[J]. Nuclear Instruments & Methods in Physics Research Section A: Accelerators Spectrometers Detectors and Associated Equipment, 2003, 502(2-3): 376-381.
    [69] E. Deelman, C. Kesselman, G. Mehta, L. Meshkat, L. Pearlman, K. Blackburn, P. Ehrens, A. Lazzarini, R. Williams, S. Koranda. GriPhyN and LIGO, Building a Virtual Data Grid for Gravitational Wave Scientists[C]. Proceeding of International Symposium on High Performance Distributed Computing,Edinburgh, UK, 2002, 7.
    [70] B. Spencer, T. Finholt, I. Foster, C. Kesselman, C. Beldica, J. Futrelle, S.Gullapalli, P. Hubbard, L. Liming, D. Marcusiu, L. PearLman, C. Severance, G.Yang. NEESGrid: A Distributed Collaboratory For Advanced Earthquake Engineering Experiment and Simulation[C]. Proceeding of World Conference on Earthquake Engineering, Vancouver, Canada, 2004, 8.
    [71] S. Cox. Grid Enabled Optimisation and Design Search for Engineering. Proceeding of Semantic Grid Workshop, Tokyo, Japan, 2003, 5.
    [72] W. Leinberger, V. Kumar. Information Power Grid: The New Frontier in Parallel Computing?[J]. Concurrency, 1999, 7(4): 75-84.
    [73] L. Zha, W. Li, H. Yu, X. Xie, N. Xiao, Z. Xu. System Software for China National Grid[C]. Proceeding of Network and Parallel Computing, Beijing, China, 2005, 11.
    [74]H.Jin.Grid Computing and ChinaGrid Project[C].Proceeding of International Conference on Parallel Processing Workshops,Oslo,Norway,2005,6.
    [75]H.Jin.ChinaGrid:Making Grid Computing a Reality[C].Proceeding of International Conference on Asian Digital Libraries,Shanghai,China,2004,12.
    [76]NSFC网格.http://www.nsfcnet.net.
    [77]M.Li,H.Liu,C.Jiang,W.Tong,A.Zhou,Y.Gui,H.Zhu,S.Jiang,R.Rao,J.Cao,Q.Deng,Q.Qian,W.Jin.Shanghai Grid in Action:The First Stage Projects Towards Digital City and City Grid.Proceeding of Grid and Cooperative Computing,Wuhan,China,2004,10.
    [78]The NEES Project.http://www.nees.org.
    [79]The GriPhyN Project.http://www.griphyn.org.
    [80]The iVDGL Project.http://www.ivdgl.org.
    [81]The TeroGyroid Project.http://www.realitygrid.org/TeraGyroid.pdf.
    [82]The NVO Project.http://www.us-vo.org.
    [83]The EcoInformatics Project.http://www.ecoinformatics.org.
    [84]Nanyang Technical University Campus Grid.http://ntu-cg.ntu.edu.sg.
    [85]夏莹杰,宋广华,郑耀.基于校园网格的多学科计算及协同可视化[J].华中科技大学学报,2007,35(Sup2):109-112.
    [86]M.Sloan,R.Abrol,G.Cawood,T.Seed,F.Ferstl.Sun Data and Compute Grids[C].Proceedings of the 2nd UK e-Science All Hands Meeting.Nottingham,UK,2003,9.
    [87]T.Jing,M.Lim,Y.Ong.A Parallel Hybrid GA for Combinatorial Optimization Using Grid Technology[C].Proceeding of IEEE Congress on Evolutionary Computation,Canberra,Australia,2003,12.
    [88]P.Anderson.Public Computing:Reconnecting People to Science[C].Proceeding of International Conference on Shared Knowledge and the Web,Madrid,Spain,2003,11.
    [89]The BLAST Project.http://www.ncbi.nlm.nih.gov/blast.
    [90]The ClustalW Project.http://www.ebi.ac.uk/clustalw.
    [91]The NaSt3DGP Project.http://wissrech.ins.uni-bonn.de/research/projects/NaSt3DGP.
    [92]D.Selman.Java 3D programming[EB/OL].http://www.wrgrid.org.uk/workshop2005/JimAustin-Introduction.pdf.
    [93]ParaView.http://www.paraview.org.
    [94]CacheLogic Research.The True Picture of P2P File Sharing[EB/OL]. http://cachelogic.com/research/slidel.php.
    [95] Q. Liu, P. Xu, H. Yang, Y. Peng. Research on Measurement of Peer-to-Peer File Sharing System[J]. Journal of Software, 2006, 17(10): 2131-2140.
    [96] D. Ferraiolo, D. Kuhn, R. Chandramouli. Role-Based Access Control[M]. Artech House, 2003.
    
    [97] G. Zhang, X. Dang, W. Wei. Trust Domain-Based Management Model in P2P Access Control[J]. Computer Technology and Development, 2006, 16(8):228-230.
    [98] S. Qing. Cryptography and Network Security[M]. Tsinghua University Press,2001.
    
    [99] F. Harrell, Y. Hu, F. Wang, H. Xia. Survey of Locating and Routing in Peer-to-Peer Systems[EB/OL].http://www.cs.ucsd.edu/classes/fa01/cse221/projects/group15.pdf.
    [100] IBM Developerworks. Getting Started with NIO[EB/OL].http://www.cs.brown.edu/courses/csl61/papers/j-nio-ltr.pdf.
    [101] J. Park, J. Hwang. Trusted P2P Computing Environments with Role-Based Access Control [J]. IET Information Security, 2007, 1(1):27-35.
    [102] K. Hui, J. Lui, D. Yau. Small World Overlay P2P Networks: Construction,Management and Handling of Dynamic Flash Crowds[J]. Computer Networks,2006, 50(15): 2727-2746.
    [103] S. Merugu, S. Srinivasan, E. Zegura. Adding Structure to Unstructure Peer-to-Peer Networks: the Use of Small World Graphs[J]. Journal of Parallel and Distributed Computing, 2005, 65(2):142-153.
    
    [104] Y. Xia, G. Song, Y. Zheng, M. Zhu. R2P: A Peer-to-Peer Transfer System Based on Role and Reputation[C]. Proceeding of International Workshop on Knowledge Discovery and Data Mining, Adelaid, Australia, 2008, 1.
    [105] 负载均衡定义. http://publish.itl68.com/cword/2876.shtml.
    [106] R. Mirchandaney, D. Towsley, J. Stankovic. Analysis of the Effects of Delays on Load Sharing[J]. IEEE Transactions on Computers, 1989, 38 (11):1513-1525.
    [107] B. Godfrey, K. Lakshminarayanan, S. Surana. Load Balancing in Dynamic Structured P2P Systems[C]. Proceeding of IEEE Infocom, Hong Kong, 2004, 3.
    [108] J. Byers, J. Considine, M. Mitzenmacher. Simple Load Balancing for Distributed Hash Tables[C]. Proceeding of International Workshop on Peer-to-Peer Systems,Berkeley, CA, 2003, 2.
    
    [109] Z. Wu, W. Rao, F. Ma. Efficient Topology-Aware Routing in Peer-to-Peer Network[C]. Proceeding of International Workshop on Grid and Cooperative Computing,Sanya,China,2002,12.
    [110]T.Kunz.The Influence of Different Workload Description on a Heuristic Load Balancing Scheme[J].IEEE Transactions on Software Engineering,1991,17(7):126-131.
    [111]P.Mehra,W.Wah.Automatic Learning of Workload Measures for Load Balancing on a Distributed System[C].Proceeding of International Conference on Parallel Processing,New York,USA,1993,1.
    [112]鞠九滨,杨鳃,徐高潮.使用资源利用率作为负载平衡系统的负载指标[J].软件学报,1996,7(4):238-243.
    [113]S.Deering,D.Cheriton.Multicast Routing in Datagram Internetworks and Extended Lans[J].ACM Transactions on Computer Systems,1990,8(2):85-110.
    [114]D.Ahmed,S.Shirmohammadi.A Hybrid P2P Protocol for Real-Time Collaboration[C].Proceeding of the IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises,Manchester,UK,2006,6.
    [115]Y.Chu,S.Rao,S.Seshan,H.Zhang.A Case for End System Multicast[J].Journal on Selected Areas in Communications,2002,20(8):1456-1471.
    [116]J.Jannotti,D.Gifford.Overcast:Reliable Multicasting with an Overlay Network[C].Proceedings of the Symposium on Operating System Design and Implementation,San Diego,CA,2000,10.
    [117]The YOID Project.http://www.icir.org/yoid.
    [118]J.Zhu,T.Tsuchiya.Peer-to-peer Collaborative Application-Level Multicast[C].Proceeding of International Conference on E-Commerce Technology,Tokyo,Japan,2007,7.
    [119]S.Ratnasamy,M.Handley.Application-Level Multicast Using Content-Addressable Networks[C].Proceeding of the International Workshop on Networked Group Communication,London,UK,2001,11.
    [120]S.Ratnasamy,P.Francis.A Scalable Content-Address Network[C].Proceeding of ACM SIGCOMM,San Diego,USA,2001,8.
    [121]Y.Xia,Y.Zheng,Y.Li.A public grid computing framework based on a hierarchical combination of middlware[C].Proceeding of Web-Based Internet Computing for Science and Engineering,Harbin,China,2006,1.
    [122]李余党.基于层次型组合中间件架构的校园网格及其多学科应用[D].浙江大学硕士学位论文,2007,10.
    [123]毛小云.暴于Bayesian网络的对等环境负载均衡模型[D].浙江大学硕士学位论文,2008,6.
    [124]周能能.基于P2P模型的协同架构实现方法[D].浙江大学硕士学位论文,2008.6.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700