Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/134083
DC FieldValueLanguage
dc.contributor.advisor蔡子傑zh_TW
dc.contributor.advisorTsai, Tzu-Chiehen_US
dc.contributor.author簡豪廷zh_TW
dc.contributor.authorJian, Hao-Tingen_US
dc.creator簡豪廷zh_TW
dc.creatorJian, Hao-Tingen_US
dc.date2021en_US
dc.date.accessioned2021-03-02T06:31:46Z-
dc.date.available2021-03-02T06:31:46Z-
dc.date.issued2021-03-02T06:31:46Z-
dc.identifierG0107753026en_US
dc.identifier.urihttp://nccur.lib.nccu.edu.tw/handle/140.119/134083-
dc.description碩士zh_TW
dc.description國立政治大學zh_TW
dc.description資訊科學系zh_TW
dc.description107753026zh_TW
dc.description.abstractKademlia是一種被廣泛使用的P2P分散式雜湊表技術,在高度網路擾動環境中仍存在資料搜尋失敗的問題。本文以模擬的方式對以Kademlia運作的P2P系統進行分析,整理出在Kademlia技術下資料搜尋失敗的原因,並提出改良方法以少量成本增長提升資料搜尋成功率。\n高度網路擾動會造成部分節點的路由表失效,同時使部份節點無法有效認識周遭節點。前者會導致儲存資料後資料難以被搜尋,或者搜尋資料時無法取得資料;後者會使資料儲存者與搜尋者找到的節點不一致,導致搜尋失敗。本文提出以紀錄長時間上線的節點,在路由表失效時向其連線以處理路由表失效的問題;及以向遠距離的節點詢問資料處理節點無法有效認識周遭節點的問題。實驗結果證實實施兩者後能使得資料搜尋成功率提升。\n相較於傳統上以超級節點支援的P2P網路,我們的方法能以較低的通訊成本達到相當的資料搜尋成功率。zh_TW
dc.description.abstractKademlia is a widely deployed P2P-Distributed Hash Table network, however there exists some search failure issue under high churn. This thesis analyzes the reasons for Kademlia search failure by simulating the Kademlia-based P2P system and proposed some methods to improve Kademlia search success rate with little extra cost.\nHigh churn causes Kademlia Routing Table to be invalid, and in such case, nodes would have insufficient acknowledge of surrounding nodes. Invalid Routing Tables not only make data hard to be found but also directly lead to search failure. Insufficient acknowledge of surrounding nodes would make the traversing nodes and data nodes different and cause search failure. To this end, we suggest that nodes can connect with long-stay nodes to handle the invalid Routing Table invalid problem, and nodes can ask the far nodes for information to avoid the problem for insufficient acknowledge of surrounding nodes. Simulation experiments confirm that the search success rate of Kademlia increases when the above two enhancements are implemented.\nFurthermore, we also compare the performance with traditional supernode supported P2P network. Simulation results also show that our method maintains the comparable search success rate but with less overhead.en_US
dc.description.tableofcontents第一章 緒論 1\n第一節 背景與動機 1\n第二節 研究目的 3\n第二章 文獻探討 4\n第一節 Kademlia 4\n第二節 Kademlia搜尋成功率 16\n第三節 網路擾動 20\n第三章 研究方法 22\n第一節 依距離分析Kademlia搜尋失敗情境 22\n第二節 模擬方法及環境 24\n第三節 初步改良方式及其實驗結果分析 26\n第四節 Kademlia搜尋失敗原因 30\n第五節 改良方法 32\n第六節 Kademlia搜尋失敗原因及改良方法統整 34\n第四章 實驗結果與分析 35\n第一節 將改良方法與Kademlia進行比較 35\n第二節 將改良方法與其他方法進行比較 38\n第三節 其他調整方式及其實驗結果 44\n第五章 結論與未來展望 48\n第一節 結論 48\n第二節 未來展望 49\n參考文獻 50zh_TW
dc.format.extent2076822 bytes-
dc.format.mimetypeapplication/pdf-
dc.source.urihttp://thesis.lib.nccu.edu.tw/record/#G0107753026en_US
dc.subjectKademliazh_TW
dc.subject點對點zh_TW
dc.subject網路擾動zh_TW
dc.subject分散式雜湊表zh_TW
dc.subjectKademliaen_US
dc.subjectP2Pen_US
dc.subjectchurnen_US
dc.subjectdistributed hash tableen_US
dc.title改良Kademlia在高度網路擾動下的搜尋成功率zh_TW
dc.titleImproving search success rate of Kademlia under high churnen_US
dc.typethesisen_US
dc.relation.reference[1] aMule, Retrieved January 2021, from: amule.org\n[2] Bittorrent, Retrieved January 2021, from: https://www.bittorrent.com/\n[3] D.Stutzbach and R.Rejaie. (2006). Improving Lookup Performance Over a Widely-Deployed DHT. Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. doi:10.1109/INFOCOM.2006.329\n[4] D. Stutzbach and R. Rejaie. (2006). Understanding Churn in Peer-to-Peer Networks. IMC `06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 189~202. doi:10.1145/1177080.1177105\n[5] Gnutella, Retrieved January 2021, from: https://en.wikipedia.org/wiki/Gnutella\n[6] J. Falkner, M. Piatek, J. John, A. Krishnamurthy, and T. Anderson. (2007). Profiling a Million User DHT. IMC `07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. doi: 10.1145/1298306.1298325\n[7] Kad network, Retrieved January 2021, from: https://en.wikipedia.org/wiki/Kad_network\n[8] Kang H, Chan-Tin E, Hopper N, Kim Y. (2009). Why kad lookup fails.\n2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 121–130. doi: 10.1109/P2P.2009.5284547\n[9] Liu B, Wei T, Zhang J, Li J, Zou W, Zhou M. (2012). Revisiting why kad lookup fails. 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), 37–42. doi: 10.1109/P2P.2012.6335808\n[10] Liu Z, Yuan R, Li Z, Li H, Chen G. (2006). Survive under high churn in structured P2P systems: Evaluation and strategy. Computational Science – ICCS 2006, 404−411. doi: 10.1007/11758549_58\n[11] M. Steiner, E. W. Biersack, and T. En-Najjary. (2007). Actively Monitoring Peers in KAD. IPTPS 2007.\n[12] Maymounkov P, Mazières D. (2002). Kademlia: a peer-to-peer information system based on the xor metric. IPTPS `01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp 53–65.\n[13] O. Herrera and T. Znati. (2007). Modeling Churn in P2P Networks. 40th Annual Simulation Symposium (ANSS`07). doi: 10.1109/ANSS.2007.28\n[14] Official eMule-Board, Retrieved January 2021, from: forum.emule-project.netzh_TW
dc.identifier.doi10.6814/NCCU202100314en_US
item.fulltextWith Fulltext-
item.grantfulltextembargo_20260218-
item.openairetypethesis-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_46ec-
Appears in Collections:學位論文
Files in This Item:
File Description SizeFormat
302601.pdf2.03 MBAdobe PDF2View/Open
Show simple item record

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.