跳到主要內容

簡易檢索 / 詳目顯示

研究生: 許弘奇
Xu,Hong-Qi
論文名稱: 適用於P2P檔案分享系統傳輸協定之設計
A UDP-Based Protocol for Distributed P2P File Sharing
指導教授: 連耀南
Lien,Yao-Nan
學位類別: 碩士
Master
系所名稱: 理學院 - 資訊科學系
論文出版年: 2005
畢業學年度: 94
語文別: 中文
論文頁數: 54
中文關鍵詞: 網路協定P2P檔案分享系統分散式計算
外文關鍵詞: Network Protocol, P2P File Sharing System, Distributed Computing
相關次數: 點閱:73下載:30
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • Peer-to-Peer(P2P)架構讓社群內的使用者收集分散在網路各處之資源,其中最為風行的P2P系統當屬P2P檔案分享系統。P2P檔案分享系統之架構可分為集中式及分散式,而分散式架構又可細分為結構化及非結構化兩種。採用分散式且非結構化之BitTorrent-like架構,因其可擴張性較佳而廣為風行。在經驗中發現,BitTorrent-like架構在非對稱網路之下雖擁有寬裕的下行頻寬,但是其頻寬使用率卻不高,我們分析其成因如下:(1) Fractional Upward Bandwidth (FUB) 、 (2)Blockage of Acknowledgement (BoA) 與 (3)Long Physical Paths 等。而其中的Blockage of ACK問題,現今尚未有研究學者提出完整解決方案。本研究之目的,即要針對此Blockage of ACK的問題,改良網路協定中的傳輸層 (Transport Layer) 協定以提昇P2P檔案分享系統之效能。我們改用UDP作為傳輸層協定,並在應用層加入自動重建遺失之封包、決定基本傳輸單位大小及決定資料傳送速率等機制,以彌補UDP之缺陷。文中並提供了傳輸協定運作時所需參數的估計法,並且也與其它傳輸協定做效能之比較。實驗結果發現,我們設計的傳輸協定確可改善P2P檔案共享系統的運作效能。


    Peer-to-Peer (P2P) architectures let participants gather resources form network and make participants acquire more computation resources than they could offer. One of the most prominent P2P systems is P2P file sharing system. P2P file sharing system could be classified into to 2 categories: centralized and decentralized model. BitTorrent-like (BT-like) model can be classified as decentralized and unstructured model. BT-like model is quit popular nowadays due to its scalability. Unfortunately, BT-like model has several shortcomings on performance over asymmetric networks, because of some problems, such as Fractional Upward Bandwidth (FUB), Blockage of Acknowledgement (BoA) and long physical paths. No complete solution is available yet to solve the BoA problem. We propose a new UDP-based protocol to alleviate this problem. Since UDP protocol is not able to guarantee the data-integrity nor to determine the proper transmission rate by itself. To offer a complete solution, we have to enhance UDP, to add extra capabilities such as packet loss recovery, segment size determination and data rate determination mechanisms. Experiments show that our proposed protocol has good improvement on performance.

    第一章 簡介 1
    1.1 BitTorrent-like Model 3
    1.1.1 BitTorrent之角色 3
    1.1.2 BitTorrent之特色 3
    1.1.3 BitTorrent之運作機制 4
    1.2 TCP簡介 5
    1.2.1 TCP之特色 5
    1.2.2 TCP之擁塞控管 6
    1.3 P2P檔案共享系統之效能議題 7
    1.3.1 效能缺陷 7
    1.3.2 效能問題之分析 7
    1.6 研究動機與目的 10
    1.7 解決方案 11
    1.8 論文組織架構 11
    第二章 相關研究 13
    2.1 BT-like效能議題 13
    2.1.1 對BT之效能觀察 13
    2.1.2 對BT之效能分析 13
    2.2 非對稱網路下之TCP問題 14
    2.2.1 非對稱網路下TCP問題之回顧 14
    2.2.2 非對稱網路下TCP問題之解法 14
    2.3 評論 15
    第三章 以UDP為基礎之解決方案 16
    3.1 Packet Loss Recovery 21
    3.2 Segment Size Determination 24
    3.3 Adaptive UDP Mechanism 26
    3.3.1 頻寬參數 26
    第四章 效能評估 29
    4.1 模擬與計算環境 29
    4.2 參數估算 29
    4.2.1 傳送單位之Segment Size計算 29
    4.2.1.1 實驗設計 30
    4.2.1.2 Segment Size計算結果 31
    4.2.1.3 封包遺失率對Segment Size之影響 32
    4.2.2 調節式 UDP 機制之校正參數估算 33
    4.2.2.1 實驗設計 33
    4.2.2.2 實驗結果 34
    4.3 效能評估 37
    4.3.1 評估指標 37
    4.3.2 實驗設計 38
    4.3.3 實驗結果 39
    4.3 總結 50
    第五章 結論 51
    參考文獻 52

    [1] H. Balakrishnan and V. N. Padmanabhan, "How Network Asymmetry Affects TCP," IEEE Communications, Vol. 39, No. 4, Apr. 2001, pp. 60-67.
    [2] B. Cohen, “Incentives Build Robustness in BitTorrent,” http://www.bitorrent.com/, May 2003.
    [3] C. Dovrolis et.al., “Packet-Dispersion Techniques and a Capacity-Estimation Methodology,” IEEE/ACM Transactions on Networking, Vol. 12, No. 6, Dec. 2004, pp. 963-977.
    [4] Wanjiun Liao and Yi-Der Li, "Improving TCP Performance for Asymmetric Networks," Proceedings of IEEE ICC, Helsinki, Finland, Jun. 2001, pp. 1824-1828.
    [5] Yao-Nan Lien, "Performance Issues of P2P File Sharing Over Asymmetric and Wireless Networks," Proceedings of The First International Workshop on Mobility in Peer-to-peer Systems (MPPS05), Jun. 2005, pp. 850-855.
    [6] L. Peterson and B. Davie "Computer Networks, A Systems Approach, 3rd Edition," The Morgan Kaufmann Series in Networking, May 2003.
    [7] P. Prasad et.al., “Bandwidth Estimation: Metrics, Measurement Techniques, and Tools,” IEEE Network, Vol. 17, No.6, Nov. 2003, pp. 27-35.
    [8] B. Melander, M. Bjorkman, and P. Gunningberg, “A New End-to-End Probing and Analysis Method for Estimating Bandwidth Bottlenecks,” IEEE Global Internet Symp., 2000, pp. 415-420.
    [9] M. Izal, et.al., "Dissecting BitTorrent: Five Months in a Torrent’s Lifetime," Proceedings of PAM, Antibes Juan-les-Pins, France, Apr. 2004, pp. 415-420.
    [10] D. Qiu and R. Srikant. "Modeling and Performance Analysis of BitTorrent-like Peer-to-Peer Networks," Proceedings of ACM SIGCOMM, Portland, OR, Aug. 2004, pp. 367-377.
    [11] H. Balakrishnan and V. N. Padmanabhan, “How Network Asymmetry Affect TCP,” IEEE Communications, Vol. 39, No. 4, Apr. 2001, pp. 60-67.
    [12] Yao-Nan Lien and Yung-Ping Chung, "Design of TCP Congestion Control Techniques by Router-assisted Approach," National Chengchi University Master Thesis, Sep. 2005.
    [13] Stephanos Androutsellis-Theotokis et. al., "A Survey of Peer-to-Peer Content Distribution Technologies," ACM Computing Surveys, Vol. 36, No. 4, Dec. 2004, pp. 335–371.
    [14] I. Foster, and A. Iamnitchi, ”On Death, Taxes, and the Convergence of Peer-to-Peer and Grid Computing,” Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03), Berkley, CA, US, 2003.
    [15] http://www.bittorrent.com/
    [16] S. Saroiu, P. K. Gummadi, and S. D. Gribble, "Exploring the Design Space of Distributed Peer-to-peer Systems: Comparing the web, Triad and Chord/CFS," Springer-Verlag Lecture Notes in Computer Science, Vol. 2429, Mar. 2002, pp. 214-224.
    [17] S. M. Lui and S. H. Kwok, "Interoperability of Peer-To-Peer File Sharing Protocols," ACM SIGecom Exchanges, Vol. 3, No. 3, Aug. 2002, pp. 25-33.
    [18] S. Iren et al., "The Transport Layer: Tutorial and Survey," ACM Computing Surveys, Vol. 31, No. 4, Dec. 1999, pp. 360-404.
    [19] D. D. Clark and D. L. Tennenhouse, "Architectural Considerations for a New Generation of Protocols," ACM SIGCOMM Computer Communication Review, Vol. 20, No. 4 , Sep. 1990, pp. 200–208.
    [20] H. Schulzrinne et al., "RTP: A Transport Protocol for Real-Time Applications," IETF RFC 3550, Jul. 2003.
    [21] J. Postel, "Transmission Control Protocol," IETF RFC 793, Sep. 1981.
    [22] V. Jacobson, "Congestion Avoidance and Control," Proceedings of SIGCOMM Symposium on Communications Architectures and Protocols, Aug. 1988, pp.314–329.
    [23] W. Stevens, "TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms", IETF RFC 2001, Jan. 1997.
    [24] W. Stevens, M. Allman and V. Paxson, "TCP Congestion Control", IETF RFC 2581, Apr. 1999.
    [25] V. Cerf and R. Kahn, "A Protocol for Packet Network Intercommunication", IEEE Transactions on Communications, Vol. COM-22, No. 5, May 1974, pp. 637-648.
    [26] J. Postel, "Internet Protocol," IETF RFC 791, Sep. 1981.
    [27] L. Brakmo, S. O'Malley, and L. Peterson, "TCP Vegas: New Techniques for Congestion Detection and Avoidance," Proceedings of the SIGCOMM '94 Symposium, Aug. 1994, pp. 24-35.
    [28] S. Floyd, "A Report on Recent Developments in TCP Congestion Control," IEEE Communications, Vol. 39, No. 4, Apr. 2001, pp. 84-90.
    [29] C. P. Fu and S. C. Liew, "A Remedy for Performance Degradation of TCP Vegas in Asymmetric Networks," IEEE Communications Letters, Vol. 7, No. 1, Jan. 2003, pp. 42-44.
    [30] G. Fox, "Peer-to-Peer Networks," IEEE Computing in Science and Engineering, Vol. 3, No. 3, May 2001, pp. 75-77.

    無法下載圖示 此全文未授權公開
    QR CODE
    :::