Please use this identifier to cite or link to this item:
https://ah.lib.nccu.edu.tw/handle/140.119/134083
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | 蔡子傑 | zh_TW |
dc.contributor.advisor | Tsai, Tzu-Chieh | en_US |
dc.contributor.author | 簡豪廷 | zh_TW |
dc.contributor.author | Jian, Hao-Ting | en_US |
dc.creator | 簡豪廷 | zh_TW |
dc.creator | Jian, Hao-Ting | en_US |
dc.date | 2021 | en_US |
dc.date.accessioned | 2021-03-02T06:31:46Z | - |
dc.date.available | 2021-03-02T06:31:46Z | - |
dc.date.issued | 2021-03-02T06:31:46Z | - |
dc.identifier | G0107753026 | en_US |
dc.identifier.uri | http://nccur.lib.nccu.edu.tw/handle/140.119/134083 | - |
dc.description | 碩士 | zh_TW |
dc.description | 國立政治大學 | zh_TW |
dc.description | 資訊科學系 | zh_TW |
dc.description | 107753026 | zh_TW |
dc.description.abstract | Kademlia是一種被廣泛使用的P2P分散式雜湊表技術,在高度網路擾動環境中仍存在資料搜尋失敗的問題。本文以模擬的方式對以Kademlia運作的P2P系統進行分析,整理出在Kademlia技術下資料搜尋失敗的原因,並提出改良方法以少量成本增長提升資料搜尋成功率。\n高度網路擾動會造成部分節點的路由表失效,同時使部份節點無法有效認識周遭節點。前者會導致儲存資料後資料難以被搜尋,或者搜尋資料時無法取得資料;後者會使資料儲存者與搜尋者找到的節點不一致,導致搜尋失敗。本文提出以紀錄長時間上線的節點,在路由表失效時向其連線以處理路由表失效的問題;及以向遠距離的節點詢問資料處理節點無法有效認識周遭節點的問題。實驗結果證實實施兩者後能使得資料搜尋成功率提升。\n相較於傳統上以超級節點支援的P2P網路,我們的方法能以較低的通訊成本達到相當的資料搜尋成功率。 | zh_TW |
dc.description.abstract | Kademlia is a widely deployed P2P-Distributed Hash Table network, however there exists some search failure issue under high churn. This thesis analyzes the reasons for Kademlia search failure by simulating the Kademlia-based P2P system and proposed some methods to improve Kademlia search success rate with little extra cost.\nHigh churn causes Kademlia Routing Table to be invalid, and in such case, nodes would have insufficient acknowledge of surrounding nodes. Invalid Routing Tables not only make data hard to be found but also directly lead to search failure. Insufficient acknowledge of surrounding nodes would make the traversing nodes and data nodes different and cause search failure. To this end, we suggest that nodes can connect with long-stay nodes to handle the invalid Routing Table invalid problem, and nodes can ask the far nodes for information to avoid the problem for insufficient acknowledge of surrounding nodes. Simulation experiments confirm that the search success rate of Kademlia increases when the above two enhancements are implemented.\nFurthermore, we also compare the performance with traditional supernode supported P2P network. Simulation results also show that our method maintains the comparable search success rate but with less overhead. | en_US |
dc.description.tableofcontents | 第一章 緒論 1\n第一節 背景與動機 1\n第二節 研究目的 3\n第二章 文獻探討 4\n第一節 Kademlia 4\n第二節 Kademlia搜尋成功率 16\n第三節 網路擾動 20\n第三章 研究方法 22\n第一節 依距離分析Kademlia搜尋失敗情境 22\n第二節 模擬方法及環境 24\n第三節 初步改良方式及其實驗結果分析 26\n第四節 Kademlia搜尋失敗原因 30\n第五節 改良方法 32\n第六節 Kademlia搜尋失敗原因及改良方法統整 34\n第四章 實驗結果與分析 35\n第一節 將改良方法與Kademlia進行比較 35\n第二節 將改良方法與其他方法進行比較 38\n第三節 其他調整方式及其實驗結果 44\n第五章 結論與未來展望 48\n第一節 結論 48\n第二節 未來展望 49\n參考文獻 50 | zh_TW |
dc.format.extent | 2076822 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.source.uri | http://thesis.lib.nccu.edu.tw/record/#G0107753026 | en_US |
dc.subject | Kademlia | zh_TW |
dc.subject | 點對點 | zh_TW |
dc.subject | 網路擾動 | zh_TW |
dc.subject | 分散式雜湊表 | zh_TW |
dc.subject | Kademlia | en_US |
dc.subject | P2P | en_US |
dc.subject | churn | en_US |
dc.subject | distributed hash table | en_US |
dc.title | 改良Kademlia在高度網路擾動下的搜尋成功率 | zh_TW |
dc.title | Improving search success rate of Kademlia under high churn | en_US |
dc.type | thesis | en_US |
dc.relation.reference | [1] aMule, Retrieved January 2021, from: amule.org\n[2] Bittorrent, Retrieved January 2021, from: https://www.bittorrent.com/\n[3] D.Stutzbach and R.Rejaie. (2006). Improving Lookup Performance Over a Widely-Deployed DHT. Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. doi:10.1109/INFOCOM.2006.329\n[4] D. Stutzbach and R. Rejaie. (2006). Understanding Churn in Peer-to-Peer Networks. IMC `06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 189~202. doi:10.1145/1177080.1177105\n[5] Gnutella, Retrieved January 2021, from: https://en.wikipedia.org/wiki/Gnutella\n[6] J. Falkner, M. Piatek, J. John, A. Krishnamurthy, and T. Anderson. (2007). Profiling a Million User DHT. IMC `07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. doi: 10.1145/1298306.1298325\n[7] Kad network, Retrieved January 2021, from: https://en.wikipedia.org/wiki/Kad_network\n[8] Kang H, Chan-Tin E, Hopper N, Kim Y. (2009). Why kad lookup fails.\n2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 121–130. doi: 10.1109/P2P.2009.5284547\n[9] Liu B, Wei T, Zhang J, Li J, Zou W, Zhou M. (2012). Revisiting why kad lookup fails. 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), 37–42. doi: 10.1109/P2P.2012.6335808\n[10] Liu Z, Yuan R, Li Z, Li H, Chen G. (2006). Survive under high churn in structured P2P systems: Evaluation and strategy. Computational Science – ICCS 2006, 404−411. doi: 10.1007/11758549_58\n[11] M. Steiner, E. W. Biersack, and T. En-Najjary. (2007). Actively Monitoring Peers in KAD. IPTPS 2007.\n[12] Maymounkov P, Mazières D. (2002). Kademlia: a peer-to-peer information system based on the xor metric. IPTPS `01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp 53–65.\n[13] O. Herrera and T. Znati. (2007). Modeling Churn in P2P Networks. 40th Annual Simulation Symposium (ANSS`07). doi: 10.1109/ANSS.2007.28\n[14] Official eMule-Board, Retrieved January 2021, from: forum.emule-project.net | zh_TW |
dc.identifier.doi | 10.6814/NCCU202100314 | en_US |
item.fulltext | With Fulltext | - |
item.grantfulltext | embargo_20260218 | - |
item.openairetype | thesis | - |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_46ec | - |
Appears in Collections: | 學位論文 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
302601.pdf | 2.03 MB | Adobe PDF2 | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.