Publications-Theses

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 改良Kademlia在高度網路擾動下的搜尋成功率
Improving search success rate of Kademlia under high churn
作者 簡豪廷
Jian, Hao-Ting
貢獻者 蔡子傑
Tsai, Tzu-Chieh
簡豪廷
Jian, Hao-Ting
關鍵詞 Kademlia
點對點
網路擾動
分散式雜湊表
Kademlia
P2P
churn
distributed hash table
日期 2021
上傳時間 2-Mar-2021 14:31:46 (UTC+8)
摘要 Kademlia是一種被廣泛使用的P2P分散式雜湊表技術,在高度網路擾動環境中仍存在資料搜尋失敗的問題。本文以模擬的方式對以Kademlia運作的P2P系統進行分析,整理出在Kademlia技術下資料搜尋失敗的原因,並提出改良方法以少量成本增長提升資料搜尋成功率。
高度網路擾動會造成部分節點的路由表失效,同時使部份節點無法有效認識周遭節點。前者會導致儲存資料後資料難以被搜尋,或者搜尋資料時無法取得資料;後者會使資料儲存者與搜尋者找到的節點不一致,導致搜尋失敗。本文提出以紀錄長時間上線的節點,在路由表失效時向其連線以處理路由表失效的問題;及以向遠距離的節點詢問資料處理節點無法有效認識周遭節點的問題。實驗結果證實實施兩者後能使得資料搜尋成功率提升。
相較於傳統上以超級節點支援的P2P網路,我們的方法能以較低的通訊成本達到相當的資料搜尋成功率。
Kademlia is a widely deployed P2P-Distributed Hash Table network, however there exists some search failure issue under high churn. This thesis analyzes the reasons for Kademlia search failure by simulating the Kademlia-based P2P system and proposed some methods to improve Kademlia search success rate with little extra cost.
High churn causes Kademlia Routing Table to be invalid, and in such case, nodes would have insufficient acknowledge of surrounding nodes. Invalid Routing Tables not only make data hard to be found but also directly lead to search failure. Insufficient acknowledge of surrounding nodes would make the traversing nodes and data nodes different and cause search failure. To this end, we suggest that nodes can connect with long-stay nodes to handle the invalid Routing Table invalid problem, and nodes can ask the far nodes for information to avoid the problem for insufficient acknowledge of surrounding nodes. Simulation experiments confirm that the search success rate of Kademlia increases when the above two enhancements are implemented.
Furthermore, we also compare the performance with traditional supernode supported P2P network. Simulation results also show that our method maintains the comparable search success rate but with less overhead.
參考文獻 [1] aMule, Retrieved January 2021, from: amule.org
[2] Bittorrent, Retrieved January 2021, from: https://www.bittorrent.com/
[3] D.Stutzbach and R.Rejaie. (2006). Improving Lookup Performance Over a Widely-Deployed DHT. Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. doi:10.1109/INFOCOM.2006.329
[4] D. Stutzbach and R. Rejaie. (2006). Understanding Churn in Peer-to-Peer Networks. IMC `06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 189~202. doi:10.1145/1177080.1177105
[5] Gnutella, Retrieved January 2021, from: https://en.wikipedia.org/wiki/Gnutella
[6] J. Falkner, M. Piatek, J. John, A. Krishnamurthy, and T. Anderson. (2007). Profiling a Million User DHT. IMC `07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. doi: 10.1145/1298306.1298325
[7] Kad network, Retrieved January 2021, from: https://en.wikipedia.org/wiki/Kad_network
[8] Kang H, Chan-Tin E, Hopper N, Kim Y. (2009). Why kad lookup fails.
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 121–130. doi: 10.1109/P2P.2009.5284547
[9] Liu B, Wei T, Zhang J, Li J, Zou W, Zhou M. (2012). Revisiting why kad lookup fails. 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), 37–42. doi: 10.1109/P2P.2012.6335808
[10] Liu Z, Yuan R, Li Z, Li H, Chen G. (2006). Survive under high churn in structured P2P systems: Evaluation and strategy. Computational Science – ICCS 2006, 404−411. doi: 10.1007/11758549_58
[11] M. Steiner, E. W. Biersack, and T. En-Najjary. (2007). Actively Monitoring Peers in KAD. IPTPS 2007.
[12] Maymounkov P, Mazières D. (2002). Kademlia: a peer-to-peer information system based on the xor metric. IPTPS `01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp 53–65.
[13] O. Herrera and T. Znati. (2007). Modeling Churn in P2P Networks. 40th Annual Simulation Symposium (ANSS`07). doi: 10.1109/ANSS.2007.28
[14] Official eMule-Board, Retrieved January 2021, from: forum.emule-project.net
描述 碩士
國立政治大學
資訊科學系
107753026
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0107753026
資料類型 thesis
dc.contributor.advisor 蔡子傑zh_TW
dc.contributor.advisor Tsai, Tzu-Chiehen_US
dc.contributor.author (Authors) 簡豪廷zh_TW
dc.contributor.author (Authors) Jian, Hao-Tingen_US
dc.creator (作者) 簡豪廷zh_TW
dc.creator (作者) Jian, Hao-Tingen_US
dc.date (日期) 2021en_US
dc.date.accessioned 2-Mar-2021 14:31:46 (UTC+8)-
dc.date.available 2-Mar-2021 14:31:46 (UTC+8)-
dc.date.issued (上傳時間) 2-Mar-2021 14:31:46 (UTC+8)-
dc.identifier (Other Identifiers) G0107753026en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/134083-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊科學系zh_TW
dc.description (描述) 107753026zh_TW
dc.description.abstract (摘要) Kademlia是一種被廣泛使用的P2P分散式雜湊表技術,在高度網路擾動環境中仍存在資料搜尋失敗的問題。本文以模擬的方式對以Kademlia運作的P2P系統進行分析,整理出在Kademlia技術下資料搜尋失敗的原因,並提出改良方法以少量成本增長提升資料搜尋成功率。
高度網路擾動會造成部分節點的路由表失效,同時使部份節點無法有效認識周遭節點。前者會導致儲存資料後資料難以被搜尋,或者搜尋資料時無法取得資料;後者會使資料儲存者與搜尋者找到的節點不一致,導致搜尋失敗。本文提出以紀錄長時間上線的節點,在路由表失效時向其連線以處理路由表失效的問題;及以向遠距離的節點詢問資料處理節點無法有效認識周遭節點的問題。實驗結果證實實施兩者後能使得資料搜尋成功率提升。
相較於傳統上以超級節點支援的P2P網路,我們的方法能以較低的通訊成本達到相當的資料搜尋成功率。
zh_TW
dc.description.abstract (摘要) Kademlia is a widely deployed P2P-Distributed Hash Table network, however there exists some search failure issue under high churn. This thesis analyzes the reasons for Kademlia search failure by simulating the Kademlia-based P2P system and proposed some methods to improve Kademlia search success rate with little extra cost.
High churn causes Kademlia Routing Table to be invalid, and in such case, nodes would have insufficient acknowledge of surrounding nodes. Invalid Routing Tables not only make data hard to be found but also directly lead to search failure. Insufficient acknowledge of surrounding nodes would make the traversing nodes and data nodes different and cause search failure. To this end, we suggest that nodes can connect with long-stay nodes to handle the invalid Routing Table invalid problem, and nodes can ask the far nodes for information to avoid the problem for insufficient acknowledge of surrounding nodes. Simulation experiments confirm that the search success rate of Kademlia increases when the above two enhancements are implemented.
Furthermore, we also compare the performance with traditional supernode supported P2P network. Simulation results also show that our method maintains the comparable search success rate but with less overhead.
en_US
dc.description.tableofcontents 第一章 緒論 1
第一節 背景與動機 1
第二節 研究目的 3
第二章 文獻探討 4
第一節 Kademlia 4
第二節 Kademlia搜尋成功率 16
第三節 網路擾動 20
第三章 研究方法 22
第一節 依距離分析Kademlia搜尋失敗情境 22
第二節 模擬方法及環境 24
第三節 初步改良方式及其實驗結果分析 26
第四節 Kademlia搜尋失敗原因 30
第五節 改良方法 32
第六節 Kademlia搜尋失敗原因及改良方法統整 34
第四章 實驗結果與分析 35
第一節 將改良方法與Kademlia進行比較 35
第二節 將改良方法與其他方法進行比較 38
第三節 其他調整方式及其實驗結果 44
第五章 結論與未來展望 48
第一節 結論 48
第二節 未來展望 49
參考文獻 50
zh_TW
dc.format.extent 2076822 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0107753026en_US
dc.subject (關鍵詞) Kademliazh_TW
dc.subject (關鍵詞) 點對點zh_TW
dc.subject (關鍵詞) 網路擾動zh_TW
dc.subject (關鍵詞) 分散式雜湊表zh_TW
dc.subject (關鍵詞) Kademliaen_US
dc.subject (關鍵詞) P2Pen_US
dc.subject (關鍵詞) churnen_US
dc.subject (關鍵詞) distributed hash tableen_US
dc.title (題名) 改良Kademlia在高度網路擾動下的搜尋成功率zh_TW
dc.title (題名) Improving search success rate of Kademlia under high churnen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) [1] aMule, Retrieved January 2021, from: amule.org
[2] Bittorrent, Retrieved January 2021, from: https://www.bittorrent.com/
[3] D.Stutzbach and R.Rejaie. (2006). Improving Lookup Performance Over a Widely-Deployed DHT. Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. doi:10.1109/INFOCOM.2006.329
[4] D. Stutzbach and R. Rejaie. (2006). Understanding Churn in Peer-to-Peer Networks. IMC `06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 189~202. doi:10.1145/1177080.1177105
[5] Gnutella, Retrieved January 2021, from: https://en.wikipedia.org/wiki/Gnutella
[6] J. Falkner, M. Piatek, J. John, A. Krishnamurthy, and T. Anderson. (2007). Profiling a Million User DHT. IMC `07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. doi: 10.1145/1298306.1298325
[7] Kad network, Retrieved January 2021, from: https://en.wikipedia.org/wiki/Kad_network
[8] Kang H, Chan-Tin E, Hopper N, Kim Y. (2009). Why kad lookup fails.
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 121–130. doi: 10.1109/P2P.2009.5284547
[9] Liu B, Wei T, Zhang J, Li J, Zou W, Zhou M. (2012). Revisiting why kad lookup fails. 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), 37–42. doi: 10.1109/P2P.2012.6335808
[10] Liu Z, Yuan R, Li Z, Li H, Chen G. (2006). Survive under high churn in structured P2P systems: Evaluation and strategy. Computational Science – ICCS 2006, 404−411. doi: 10.1007/11758549_58
[11] M. Steiner, E. W. Biersack, and T. En-Najjary. (2007). Actively Monitoring Peers in KAD. IPTPS 2007.
[12] Maymounkov P, Mazières D. (2002). Kademlia: a peer-to-peer information system based on the xor metric. IPTPS `01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp 53–65.
[13] O. Herrera and T. Znati. (2007). Modeling Churn in P2P Networks. 40th Annual Simulation Symposium (ANSS`07). doi: 10.1109/ANSS.2007.28
[14] Official eMule-Board, Retrieved January 2021, from: forum.emule-project.net
zh_TW
dc.identifier.doi (DOI) 10.6814/NCCU202100314en_US