P2P Weak State Routing Scheme Based on Decaying Bloom Filters
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [15]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    The current weak state routing schemes cannot facilitate in-network queries effectively. When a query is given for an item at an arbitrary node, disturbance in unrelated routing entries are likely stronger than the useful information in the right routing entries. Consequently, the majority of queries are moved towards wrong nodes. To solve this problem, this paper presents DWalker, an efficient weak state routing scheme-based design based on decaying bloom filters. DWalker uses a bloom filter to represent the summary information of resources at each node and then propagated a bloom filter within a propagation range. The amount of information in each bloom filter decreases exponentially with the distance from the source. DWalker makes the max propagation range less than the expected distance between any two nodes; hence, effectively tackling the problem of multi-path propagation of a decaying bloom filter. DWalker replaces a single bloom filter with multiple bloom filters as a routing entry and holds more routing information. DWalker can ensure that any query can be forwarded in the right direction with high a probability that is based on the proportion of bits set to 1 in a bloom filter and the least number of bits set to 1 in an entry bloom filter for a query. The analysis and simulation of results show that DWalker can make many queries that can be forwarded in the right direction to achieve a high query hit rate with low cost and low delay.

    Reference
    [1] Guo DK. Research on peer-to-peer networks based on Kautz digraph and Bloom filters [Ph.D. Thesis]. Changsha: National University of Defense Technology, 2008 (in Chinese with English abstract).
    [2] Zhang YM, Lu XC, Zheng QB, Li DS. PST: An efficient search algorithm for large-scale P2P systems. Journal of Software, 2008, 19(6):1473-1480 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/19/1473.htm [doi: 10.3724/SP.J.1001.2008. 01473]
    [3] Hodes TD, Czerwinski SE, Zhao BY, Joseph AD, Katz RH. An architecture for secure wide-area service discovery. Wireless Networks, 2002,8(2/3):213-230. [doi: 10.1023/A:1013772027164]
    [4] Reynolds P, Vahdat A. Efficient peer-to-peer keyword searching. In: Schmidt D, Endler M, eds. Proc. of the ACM/IFID/USENIX 2003 Int’l Conf. on Middleware. New York: Springer-Verlag, 2003. 21-40.
    [5] Rhea SC, Kubiatowicz J. Probabilistic location and routing. In: Lee D, Orda A, eds. Proc. of the IEEE INFOCOM 2002. Washington: IEEE Computer Society, 2002. 1248-1257. [doi: 10.1109/INFCOM.2002.1019375]
    [6] Bauer D, Hurley P, Pletka R, Waldvogel M. Bringing efficient advanced queries to distributed hash tables. In: Jha S, Hassanein H, eds. Proc. of the 29th Annual IEEE Int’l Conf. on Local Computer Networks. Washington: IEEE Computer Society, 2004. 6-14. [doi: 10.1109/LCN.2004.32]
    [7] Hebden P, Pearce AR. Data-Centric routing using bloom filters in wireless sensor networks. In: Alex H, Begg R, eds. Proc. of the 4th Int’l Conf. on Intelligent Sensing and Information Processing. Washington: IEEE Computer Society, 2006. 72-77. [doi: 10.1109/ICISIP.2006.4286065]
    [8] Hsiao PH. Geographical region summary service for geographical routing. In: Corson MS, Das SR, eds. Proc. of the 2nd ACM Int’l Symp. on Mobile Ad Hoc Networking & Computing. New York: ACM, 2001. 263-266. [doi: 10.1145/501449.501455]
    [9] Yuen WH, Schulzrinne H. Improving search efficient using Bloom filters in partially connected ad hoc networks: A node-centric analysis. Computer Communications, 2007,30(16):3000-3011. [doi: 10.1016/j.comcom.2007.05.055]
    [10] Acer UG, Kalyanaraman S, Abouzeid AA. Weak state routing for large scale dynamic networks. In: Hou J, Ramanathan R, eds. Proc. of the 13th ACM Int’l Conf. on Mobile Computing and Networking. New York: ACM, 2007. 290-301. [doi: 10.1145/1287853.1287888]
    [11] Gilbert R, Johnson K, Wu SM, Zhao BY, Zheng HT. Location independent compact routing for wireless networks. In: Petrioli C, Ramjee R, eds. Proc. of the 1st Int’l Workshop on Decentralized Resource Sharing in Mobile Computing and Networking. New York: ACM, 2006. 57-59. [doi: 10.1145/1161252.1161267]
    [12] Chan CF. Mole: Multi-hop object location in wireless mesh networks [Ph.D. Thesis]. Hong Kong: Hong Kong University of Science and Technology, 2008.
    [13] Kumar A, Xu J, Zegura EW. Efficient and scalable query routing for unstructured peer-to-peer networks. In: Knightly E, Makki K, eds. Proc. of the IEEE INFOCOM 2005. Washington: IEEE Computer Society, 2005. 1162-1173. [doi: 10.1109/INFCOM.2005. 1498343]
    [14] Bloom BH. Space/Time tradeoffs in hash coding with allowable errors. Communications of the ACM, 1970,13(7):422-426. [doi: 10.1145/362686.362692]
    [15] Jelasity M, Montresor A, Jesi GP. The PeerSim simulator. 2009. http://peersim.sf.net
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

朱桂明,郭得科,金士尧.基于衰落Bloom Filter 的P2P 网络弱状态路由算法.软件学报,2011,22(11):2810-2819

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:July 07,2009
  • Revised:March 01,2010
You are the first2044656Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063