QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn



Similar documents
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

P2P P2P Winny 3 P2P P2P 1 P2P, i

P2P P2P peer peer P2P peer P2P peer P2P i

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

DTN DTN DTN DTN i

スライド 1

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

Consideration of Cycle in Efficiency of Minority Game T. Harada and T. Murata (Kansai University) Abstract In this study, we observe cycle in efficien

i

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

23

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

1

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P

Web Web Web Web Web, i

DEIM Forum 2009 B4-6, Str

Table 1. Assumed performance of a water electrol ysis plant. Fig. 1. Structure of a proposed power generation system utilizing waste heat from factori

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :

1 CCN CCN(Content-Centric-Network) [1] PUR- SUIT [2]DONA(Data-Oriented-Network Architecture) [3] 4WARD [4]PSIRP [5] Energy Efficient and Enhanced-type

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka

DEIM Forum 2009 E

Vol.2.indb

DEIM Forum 2010 A Web Abstract Classification Method for Revie

58 10

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

16_.....E...._.I.v2006

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

Kyushu Communication Studies 第2号

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

3_39.dvi

修士論文

1 I/F I/F 1 6) MobileIP 7) 8) MN: Monile Node MN AR Mobility Anchor Point(MAP) MobileIP HMIP HMIP HA-MAP MN MAP MN MAP HMIP MAP MN 2 MobileIP Mo

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) Vocaloid PV YouTube 1 minato minato ussy 3D MAD F EDis ussy


udc-4.dvi

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information

スライド 1

1_26.dvi

yasi10.dvi

Social Intelligence []... [] ( ) ( ) 一 般 の 情 報 他 人 の 情 報 人 コンテキスト 付 与 ソーシャル メディアの 普 及 により 受 け 手 は 自 分 の 認 識 を 発 信 機 械 コンテキスト 分 析 私 の 情 報 神 沼 靖 子, 内 木

Computer Security Symposium October 2013 Android OS kub

知能と情報, Vol.30, No.5, pp

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

( )

untitled

paper.dvi

untitled

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

109 Peer-to-Peer Peer-to-Peer (P2P) [5]. P2P P2P P2P P2P [10] [11], [12] [4] For an efficient contents sharing by a lot of network users, various kind

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i

Table 1 Table 2

(MIRU2008) HOG Histograms of Oriented Gradients (HOG)

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree

日本看護管理学会誌15-2

Core Ethics Vol. Nerriere D.Hon EU GS NPO GS GS Oklahoma State University Kyoto Branch OSU-K OSU-K OSU-K

1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing

新製品開発プロジェクトの評価手法

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara

BOK body of knowledge, BOK BOK BOK 1 CC2001 computing curricula 2001 [1] BOK IT BOK 2008 ITBOK [2] social infomatics SI BOK BOK BOK WikiBOK BO

46

06_仲野恵美.indd

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

06’ÓŠ¹/ŒØŒì

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0

_念3)医療2009_夏.indd

39-3/2.論説:藤井・戸前・山本・井上

ディープラーニングとオープンサイエンス ~研究の爆速化が引き起こす摩擦なき情報流通へのシフト~

On the Wireless Beam of Short Electric Waves. (VII) (A New Electric Wave Projector.) By S. UDA, Member (Tohoku Imperial University.) Abstract. A new e

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi

[2] , [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7

3. ( 1 ) Linear Congruential Generator:LCG 6) (Mersenne Twister:MT ), L 1 ( 2 ) 4 4 G (i,j) < G > < G 2 > < G > 2 g (ij) i= L j= N

9_4.dvi

7,, i

FUJII, M. and KOSAKA, M. 2. J J [7] Fig. 1 J Fig. 2: Motivation and Skill improvement Model of J Orchestra Fig. 1: Motivating factors for a

Modal Phrase MP because but 2 IP Inflection Phrase IP as long as if IP 3 VP Verb Phrase VP while before [ MP MP [ IP IP [ VP VP ]]] [ MP [ IP [ VP ]]]

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL

: Name, Tel name tel (! ) name : Name! Tel tel ( % ) 3. HTML. : Name % Tel name tel 2. 2,., [ ]!, [ ]!, [ ]!,. [! [, ]! ]!,,. ( [ ], ),. : [Name], nam

特集_02-03.Q3C

Transcription:

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 565 871 1 5 E-mail: {j-konisi,wakamiya,murata}@ist.osaka-u.ac.jp QoS P2P P2P P2P P2P (Peer-to-Peer) Abstract Proposal and Evaluation of a Cooperative Mechanism for Pure P2P File Sharing Networks Junjiro KONISHI, Naoki WAKAMIYA, and Masayuki MURATA Graduate School of Information Science and Technology, Osaka University 1 5 Yamadaoka, Suita-shi, Osaka 565 871, Japan E-mail: {j-konisi,wakamiya,murata}@ist.osaka-u.ac.jp To provide application-oriented network services, variety of overlay networks are deployed over physical IP networks. Since they share and compete for physical network resource, their selfish behaviors affect each other and their performance deteriorates. Our research group considers the model of overlay network symbiosis, where overlay networks coexist and cooperate to improve their application-level QoS while sustaining influences over physical networks and other overlay networks. In this paper, we propose mechanisms for pure P2P networks of file-sharing application to cooperate with each other. In our proposal, cooperative peers establish logical links among two or more P2P networks, through which messages and files are exchanged among cooperative P2P networks. Through simulation experiments, it was shown that our proposed mechanisms could improve the search efficiency and reduce load on P2P networks. Key words Overlay Network, P2P (Peer-to-Peer), File Sharing, Cooperative Network 1. QoS [1], [2] 1

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gnutella Winny P2P ( 1.) P2P [8] P2P Peer E 2. R el ay Peer F 2.Relay 2. R el ay Logical Link Data Link 1 Peer C Peer D 2. Re l a y 2. Re l a y 6.Transmit 3. Re s p o n s e 5.R equest Peer B 1. Q ue ry 4.R esp o n se Peer A P2P New File Get!! P2P P2P TTL P2P P2P P2P P2P P2P TTL P2P P2P P2P 2 P2P 3 4 2. P2P P2P P2P 2

Logical Link Query Cooperative Peer Response Candidate Network Candidate Network Q uery P2P Network In d ir ect T r an sm it R e que s t Di r e c t Tr a ns mi t R e s p o n s e P2P Network 2 P2P ( 2.)P2P 2. 1 P2P P2P P2P ( ) P2P ( 2.) P2P i3 P2P i3 i3 trigger i3 packet packet 256 l m P2P P2P P2P P2P P2P P2P IP m P2P P2P l + m n i3 inexact matching trigger packet P2P packet i3 2. 2 P2P P2P P2P P2P [9] P2P P2P 3

P2P TTL TTL TTL 2. 3 P2P i3 P2P i3 trigger l m P2P i3 inexact matching packet P2P 2. 4 P2P P2P P2P P2P P2P P2P P2P P2P P2P P2P P2P 2. 5 P2P ( 2.) P2P TTL 1 P2P P2P P2P P2P P2P 2. 6 3. 2 P2P 4

1.9.8.7 Uncooperative 1.9.8.7 Reachability.6.5.4 Reachability.6.5.4.3.3.2.1 1 2 3 4 5 6 7 TTL.2.1 1 2 3 4 5 6 7 8 9 1 Number of Cooperative Peers 3 TTL 4 3. 1 P2P BRITE [1] BA [11] F =1. Zipf 1 1 5 45473 5 TTL P2P =1. Zipf 1 2 P2P 5 45473 1 1 TTL 1 7 2 3. 2 34 Uncooperative P2P Decending Order of Degree Proposal (Hop Count >= n) TTL n 1 n 3 1 TTL 3 TTL 7 TTL 6 4 TTL 7 P2P 1 2 P2P 11 3. 3 56 P2P 3 5 4 6 TTL 7 33 TTL 6 35 1 7 7 2 P2P 5

Number of Messages 7 6 5 4 3 2 Uncooperative Number of Messages (x1 6 ) 12 1 8 6 4 Uncooperative 1 2 1 2 3 4 5 6 7 TTL 5 1 15 2 25 3 35 Degree 5 TTL 7 Number of Messages 7 6 5 4 3 2 1 1 2 3 4 5 6 7 8 9 1 6 Number of Cooperative Peers P2P 4. P2P P2P P2P P2P P2P 21 COE ( ) [1] L. Qiu, Y.R. Yang, Y. Zhang, and S. Shenker, On Selfish Routing in Internet-Like Environments, in Proceedings of ACM SIGCOMM, p151-162, Aug. 23. [2] M. Seshadri and R.H. Katz, Dynamics of Simultaneous Overlay Network Routing, in UCB EECS report UCB//CSD-3-1291, Nov. 23. [3] I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana, Internet Indirection Infrastructure, in Proceedings of ACM SIGCOMM, p73-88, Aug. 22. [4] M. Kwon and S. Fahmy, Toward Cooperative Inter-overlay Networking, in Poster in IEEE ICNP, Nov. 23. [5] A. Nakao, L. Peterson, and A. Bavier, A Routing Underlay for Overlay Networks, in Proceedings of ACM SIGCOMM, p11-18, Aug. 23. [6] D.G. Andersen, H. Balakrishnan, M.F. Kaashoek, and R. Morris, Resilient Overlay Networks, in Proceedings of ACM SOSP, Oct. 21. [7] N. Wakamiya and M. Murata, Toward Overlay Network Symbiosis, to be presented at the Fifth International Peerto-Peer conference (P2P25), Aug. 25. [8] R. Schollmeier and G. Schollmeier, Why peer-to-peer (P2P) does scale: An analysis of P2P traffic patterns, in Proceedings of P2P22, (Linkoping), Sept. 22. [9] L.A. Adamic, R.M. Lukose, A.R. Puniyani, and B.A. Huberman, Search in power-law networks, in Physical Review E, vol 64, 46135, Sept. 21. [1] A. Medina, A. Lakhina, I. Matta, and J. Byers, BRITE: An approach to universal topology generation, in Proceedings of the International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication System (MASCOTS 1). available at http://www.cs.bu.edu/brite/, 21. [11] A.L. Barabasi and R. Albert, Emergence of Scaling in Networks, in Science, Vol 286, p59-512, Oct. 1999. 6