• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Huang Yuanqiang, Luan Zhongzhi, and Qian Depei. A Membership Management Mechanism for Large Scale P2P Environment[J]. Journal of Computer Research and Development, 2011, 48(7): 1225-1236.
Citation: Huang Yuanqiang, Luan Zhongzhi, and Qian Depei. A Membership Management Mechanism for Large Scale P2P Environment[J]. Journal of Computer Research and Development, 2011, 48(7): 1225-1236.

A Membership Management Mechanism for Large Scale P2P Environment

More Information
  • Published Date: July 14, 2011
  • Node topology plays an important role in P2P-based systems. It serves as a basis to support application functions, and has major impact on their efficiency, cost and robustness. Membership management can construct node topology according to application’s semantic requirements by maintaining neighbor view on every node. However, large-scale P2P environment with the features of dynamic node joining/leaving, dynamic network condition fluctuation, dynamic resources varying and a large number of nodes, greatly challenges the perturbation-resistance and scalability of membership management. Many typical membership management techniques either ignored the issue of system perturbation, or ignored the issue of system size’s expansion/shrinking, and can’t work well in large-scale P2P environment. In this paper, a new membership management mechanism considering multiple factors of dynamic variation is given to maintain stable node topology in harsh environment. The proposed mechanism mainly consists of perturbation-resisted membership discovery protocol and scalable membership maintenance method. Experimental results verify the effectiveness of the proposed methods. Some useful conclusions obtained through the analysis of the experimental data lay a solid foundation for further research.
  • Related Articles

    [1]Chen Yanmin, Wang Hao, Ma Jianhui, Du Dongfang, Zhao Hongke. A Hierarchical Attention Mechanism Framework for Internet Credit Evaluation[J]. Journal of Computer Research and Development, 2020, 57(8): 1755-1768. DOI: 10.7544/issn1000-1239.2020.20200217
    [2]Shen Jianliang, Li Sikun, Liu Lei, Wang Guanwu, Wang Xin, Liu Qinrang. Hierarchical Configuration Memory Design for Coarse-Grained Reconfigurable SoC[J]. Journal of Computer Research and Development, 2017, 54(5): 1121-1129. DOI: 10.7544/issn1000-1239.2017.20150889
    [3]Hou Xiaofeng, Song Pengtao, Tang Weichao, Li Chao, Liang Xiaoyao. Green Hierarchical Management for Distributed Datacenter Containers[J]. Journal of Computer Research and Development, 2016, 53(7): 1493-1502. DOI: 10.7544/issn1000-1239.2016.20160119
    [4]Zhao Bo, Huang Shujian, Dai Xinyu, Yuan Chunfeng, Huang Yihua. Parallel Algorithm for Hierarchical Phrase Machine Translation Based on Distributed Memory Storage[J]. Journal of Computer Research and Development, 2014, 51(12): 2724-2732. DOI: 10.7544/issn1000-1239.2014.20131335
    [5]Chen Shuming, Chen Shenggang, and Yin Yaming. Revisiting Amdahl’s Law in the Hierarchical Chip Multicore Processors[J]. Journal of Computer Research and Development, 2012, 49(1): 83-92.
    [6]Mu Chengpo, Huang Houkuan, Tian Shengfeng. Hierarchical Online Risk Assessment for Intrusion Scenarios[J]. Journal of Computer Research and Development, 2010, 47(10): 1724-1732.
    [7]Zhang Gang, Liu Yue, Guo Jiafeng, and Cheng Xueqi. A Hierarchical Search Result Clustering Method[J]. Journal of Computer Research and Development, 2008, 45(3): 542-547.
    [8]Zhang Hanwen, Zhang Yujun, Tian Ye, Xiao Wenshu, Li Zhongcheng. Hierarchical Access Authentication Method in Mobile IPv6 Networks[J]. Journal of Computer Research and Development, 2007, 44(1): 51-57.
    [9]Yu Manquan, Luo Weihua, Xu Hongbo, Bai Shuo. Research on Hierarchical Topic Detection in Topic Detection and Tracking[J]. Journal of Computer Research and Development, 2006, 43(3): 489-495.
    [10]Zhuo Jiliang, Li Xianxian, Li Jianxin, and Huai Jinpeng. A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation[J]. Journal of Computer Research and Development, 2005, 42(7): 1100-1107.

Catalog

    Article views (683) PDF downloads (426) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return