[1]董西广 刘占伟 庄雷.对等网络中基于连接度优化的谣传协议[J].计算机技术与发展,2011,(09):43-46.
 DONG Xi-guang,LIU Zhan-wei,ZHUANG Lei.Optimizing Rumor Mongering Protocol Based on Degree in P2P Network[J].,2011,(09):43-46.
点击复制

对等网络中基于连接度优化的谣传协议()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年09期
页码:
43-46
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
Optimizing Rumor Mongering Protocol Based on Degree in P2P Network
文章编号:
1673-629X(2011)09-0043-04
作者:
董西广1 刘占伟1 庄雷2
[1]河南工程学院数理科学系[2]郑州大学信息工程学院
Author(s):
DONG Xi-guangLIU Zhan-weiZHUANG Lei
[1]Department of Mathematical and Physical Science,Henan Institute of Engineering[2]School of Information Engineering,Zhengzhou University
关键词:
对等网络谣言传播连接度小世界幂规律
Keywords:
peer-to-peer network rumor mongering degree small world power law
分类号:
TP393
文献标志码:
A
摘要:
谣言传播算法随机选择邻居节点转发消息,降低了消息的覆盖范围。根据Gnutella网络的小世界及幂规律特性,提出基于连接度优化的dbRM改进协议。dbRM在搜索的不同阶段,依据连接度大小来选择消息的转发对象,跳数较低时优先选择连接度大的节点,以保证查询有一个必需的覆盖范围,且有助于消息快速到达目标节点,跳数较高时优先选择连接度小的节点,以尽量降低冗余消息的数量,从而在保持高覆盖率的同时尽量减少冗余消息的开销。分析和实验结果表明,dbRM能够提供较低负载的查询,高效应用于P2P搜索
Abstract:
Rumor mongering algorithm selects neighbor nodes to forward messages randomly,reducing the coverage.According to Gnutella network's small world and power law characteristics,propose an improved algorithm dbRM which optimized based on connection degree.On different searching steps,dbRM choses different nodes to forward messages according to their degrees.For ensuring a high coverage of message and finding the targets quickly,dbRM first select nodes which have biggest degrees when hop is low,and to reduce the redundant messages while keeping the high coverage rate it first select the nodes which have smallest degrees when hop is high.Analysis and simulation results show that the dbRM provides a low overhead broadcasting facility that can be effectively used in P2P searching

相似文献/References:

[1]张祖昶,王诚.P2P网络的信任评估安全模型研究[J].计算机技术与发展,2014,24(01):163.
 ZHANG Zu-chang,WANG Cheng.Research of a Safe Model of Trust Evaluation for P2 P Network[J].,2014,24(09):163.
[2]孙名松 邸明星 王湛昱.多决策树算法在P2P网络流量检测中的应用[J].计算机技术与发展,2010,(06):126.
 SUN Ming-song,DI Ming-xing,WANG Zhan-yu.Application of Decision Tree Algorithm in Traffic Detection of P2P Network[J].,2010,(09):126.
[3]李莹峰 邓晓衡.DHT网络中基于测量的QoS监控系统[J].计算机技术与发展,2009,(05):188.
 LI Ying-feng,DENG Xiao-heng.Measurement- Based QoS Monitor System in DHT Network[J].,2009,(09):188.
[4]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
 HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(09):181.
[5]吴敏 王汝传 王治平.基于支持向量机的P2P网络DoS攻击检测[J].计算机技术与发展,2009,(11):151.
 WU Min,WANG Ru-chuan,WANG Zhi-ping.Detection Mechanism of DoS Attacks in Peer- to- Peer Networks Based on Support Vector Machine[J].,2009,(09):151.
[6]郭晶 吴国新 李想.P2P网络环境下信任模型的研究与实现[J].计算机技术与发展,2009,(03):102.
 GUO Jing,WU Guo-xin,LI Xiang.Research and Design for Trust Model in P2P Network[J].,2009,(09):102.
[7]许加兴 汪厚新 周艳 金炜东.P2P网中基于IP组播的发现机制研究[J].计算机技术与发展,2006,(06):32.
 XU Jia-xing,WANG Hou-xin,Zhou yah,et al.Discovery Implementation by IP Multicast in Peer to Peer Network[J].,2006,(09):32.
[8]杨文俊.P2P网络系统中节点自组织管理机制[J].计算机技术与发展,2006,(07):57.
 YANG Wen-jun.A Novel Self-Organization Mechanism for Nodes Management in P2P Networks[J].,2006,(09):57.
[9]阳天保 张修如 贾丽会.基于P2P的视频点播系统模型及算法研究[J].计算机技术与发展,2006,(10):45.
 YANG Tian-bao,ZHANG Xiu-ru,JIA Li-hui.Research on Video- on- Demand System Model and Algorithm Based on P2P[J].,2006,(09):45.
[10]徐小龙 程春玲 陈丹伟 熊婧夷.一种应用于对等网络的可信片上Agent模型[J].计算机技术与发展,2010,(09):140.
 XU Xiao-long,CHENG Chun-ling,CHEN Dan-wei,et al.Research on Model of Trusted Agent-on-Chip for P2P Networks[J].,2010,(09):140.

备注/Memo

备注/Memo:
河南省教育科学研究基金项目(2008A520024); 河南工程学院青年基金(Y09059)董西广(1981-),男,硕士研究生,研究方向为对等网络体系结构;庄雷,博士,博士生导师,主研领域为网络体系结构
更新日期/Last Update: 1900-01-01