1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

Similar documents
i

スライド 1

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S

untitled


58 10

LAN LAN LAN LAN LAN LAN,, i

ID Z-Ordering 4) P2P P2P 2. Peer-to-Peer(P2P) P2P Gnutella ) BitTorrent 2) P2P (DHT:Distributed Hash Table) Chord 5) CAN(Content Adressable Network) 6

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

DTN DTN DTN DTN i

分散ハッシュテーブル(DHT)

Web Web Web Web i

P2P P2P Winny 3 P2P P2P 1 P2P, i

21 Key Exchange method for portable terminal with direct input by user

第 55 回自動制御連合講演会 2012 年 11 月 17 日,18 日京都大学 1K403 ( ) Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. T

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

Table 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig

2 ( ) i

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

特集_03-07.Q3C

4.1 % 7.5 %

soturon.dvi

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

P2P P2P peer peer P2P peer P2P peer P2P i

900 GPS GPS DGPS Differential GPS RTK-GPS Real Time Kinematic GPS 2) DGPS RTK-GPS GPS GPS Wi-Fi 3) RFID 4) M-CubITS 5) Wi-Fi PSP PlayStation Portable

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2013-CVIM-186 No /3/15 EMD 1,a) SIFT. SIFT Bag-of-keypoints. SIFT SIFT.. Earth Mover s Distance


IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

Web Basic Web SAS-2 Web SAS-2 i

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval

3_39.dvi

WMN Wi-Fi MBCR i

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

修士論文

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

Computer Security Symposium October 2013 Android OS kub

Q [4] 2. [3] [5] ϵ- Q Q CO CO [4] Q Q [1] i = X ln n i + C (1) n i i n n i i i n i = n X i i C exploration exploitation [4] Q Q Q ϵ 1 ϵ 3. [3] [5] [4]

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

28 Horizontal angle correction using straight line detection in an equirectangular image

IPSJ SIG Technical Report Vol.2013-GN-86 No.35 Vol.2013-CDS-6 No /1/17 1,a) 2,b) (1) (2) (3) Development of Mobile Multilingual Medical

7,, i

( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst

揃 Lag [hour] Lag [day] 35

CHORD

3_23.dvi

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

1 I/F I/F 1 6) MobileIP 7) 8) MN: Monile Node MN AR Mobility Anchor Point(MAP) MobileIP HMIP HMIP HA-MAP MN MAP MN MAP HMIP MAP MN 2 MobileIP Mo

25 About what prevent spoofing of misusing a session information

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i

3...._TOPICS*

○広島大学職員任免規則\(案\)

○広島大学船員就業規則

Table 1. Assumed performance of a water electrol ysis plant. Fig. 1. Structure of a proposed power generation system utilizing waste heat from factori

( )

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

2...._TOPICS*

Iteration 0 Iteration 1 1 Iteration 2 Iteration 3 N N N! N 1 MOPT(Merge Optimization) 3) MOPT MOP

9_4.dvi

24 Region-Based Image Retrieval using Fuzzy Clustering

"CAS を利用した Single Sign On 環境の構築"

Vol.53 No (July 2012) EV ITS 1,a) , EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Commu

Consideration of Cycle in Efficiency of Minority Game T. Harada and T. Murata (Kansai University) Abstract In this study, we observe cycle in efficien

, IT.,.,..,.. i

29 jjencode JavaScript

大学における原価計算教育の現状と課題

10-渡部芳栄.indd

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

先端社会研究 ★5★号/4.山崎

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

Abstract This paper concerns with a method of dynamic image cognition. Our image cognition method has two distinguished features. One is that the imag

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a


X

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :

1_26.dvi

スライド 1

n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i

06’ÓŠ¹/ŒØŒì

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

Appropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Educati

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

1 1 tf-idf tf-idf i

DEIM Forum 2009 B4-6, Str

ITAOI2003第三屆離島資訊與應用研討會論文範例

01ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐02ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐03ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐04ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐05ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐06ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六

Fig. 1 Table l l l l l l l l l l l l l l l l l l l l l l l l l l

MDD PBL ET 9) 2) ET ET 2.2 2), 1 2 5) MDD PBL PBL MDD MDD MDD 10) MDD Executable UML 11) Executable UML MDD Executable UML

1 p.27 Fig. 1 Example of a koto score. [1] 1 1 [1] A 2. Rogers [4] Zhang [5] [6] [7] Löchtefeld [8] Xiao [

Transcription:

P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract: Peer-to-Peer (P2P for short) systems and Distributed Hash Tables (DHTs for short), which are implementations of P2P systems, have attracted much attention in recent years because of their performance, scalability, and fault tolerance. Unfortunately, as far as we know, little is known about efficient construction of distributed hash trees on P2P systems. Therefore in this paper we propose several constructions of the hash trees on Chord, which is a most famous implementation of DHTs. Keywords: P2P, Chord, hash tree, data authentication 1. Peer-to-Peer P2P P2P P2P 1 Chord[1] Chord 1 Hiroshima City University a) mw68020@wm.hiroshima-cu.ac.jp 1 1 P2P Chord P2P Chord 2. 1

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value DHT 2.2 Chord Chord 2.2.1 Chord DHT P2P SHA-1[2] 2 160 0 ID 2 160 1 ID SuccessorList FingerTable Predecessor N O(log N) 2.2.2 SuccessorList Chord k 1 Table 1 Fig. 3 3 SuccessorList Example of SuccessorList N15 SuccessorList Example of node N15 s routing table of SuccessorList SuccessorList[i] SuccessorList[1](N15) SuccessorList[2](N15) SuccessorList[3](N15). i N20 N31 N38. k Successor 2 Successor 2 N15 N26 N15 Successor N26 Successor Chord Successor Successor Successor SuccessorList SuccessorList N r = O(log N) 3 SuccessorList 3 N15 SuccessorList 1 2.2.3 FingerTable Successor Chord 2

5 Fig. 5 Example of hash tree 4 FingerTable Fig. 4 Example of FingerTable 2 N8 FingerTable Table 2 Example of node N8 s routing table of FingerTable FingerTable[i] i FingerTable[1](N8) N14 FingerTable[2](N8) N14 FingerTable[3](N8) N14 FingerTable[4](N8) N21 FingerTable[5](N8) N32 FingerTable[6](N8) N42 Successor N N Chord N O(N) FingerTable FingerTable n +2 0, +2 1, +2 2,, +2 n 1 4 6 Chord 64 FingerTable N8 FingerTable 2 N8 N48 Successsor 6 FingerTable N42 2 1 2 2.3 5 8 k i d i h(m n) m n H h(= 1, 2,, H) 1 H 1 d 3 d 3 k 4, c 21, c 12 r d 3 d 3 k 3 k 4 c 22 c 21 c 22 c 11 c 11 c 12 r r r d 3 m log m 3. Chord 3.1 Chord P2P Chord 3

6 2 Fig. 6 Example of hash tree construction with 2-pass hash tree method 3.2 r N1 1 r 3.2.1 1 2 Chan 2 [3] P2P 6 8 2 s N1 N1 N2 1 N1 1 N2 N3 N3 N8 15 2 Chord Chord Successor 2 3.2.2 2 Chord Successor FingerTable 7 7 2 Fig. 7 Example of hash tree construction with Method 2 8 N1 N2 N3 N5 7 N1 N2 N3 N5 N1 ϕ N3 N5 2 7 N2 N4 N3 N4 N5 N6 N7 3 N4 N6 N7 N8 N8 N8 15 3.2.3 3 Chord 1 1 2 Chord 4

Table 4 4 The number of messages in our proposed methods 1 2 3 8 7 10 8 16 15 22 18 32 31 46 38 64 63 94 78 128 127 190 158 256 255 382 318 512 511 766 638 1024 1023 1534 1278 8 3 Fig. 8 Example of hash tree construction with Method 3 Table 5 5 The number of steps in our proposed methods Chord 2 8 8 2 2 N1 N2 N3 N4 N8 N1 N5 N6 N7 N8 2 2 1 2 4. 3 N Chord 5. 4 1 2 3 5 1 2 3 4 1024 1 1 2 3 8 7 3 4 16 15 4 5 32 31 5 6 64 63 6 7 128 127 7 8 256 255 8 9 512 511 9 10 1024 1023 10 11 2 511 5 1 2 3 Chord 1 2 3 1 1024 3 2 256 1024 1 3 255 3 3 3 6. 3 Table 3 Evaluation of the number of messages and steps in our proposed methods 1 N 1 N 1 2 3 3 2 N 2 log N N 2 (log N) + 1 5 4 P2P Chord 2 3 5

[1] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M., Dabek, F. and Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications, Networking, IEEE/ACM Transactions on, Vol. 11, No. 1, pp. 17 32 (2003). [2] Eastlake, 3rd, D. and Jones, P.: US Secure Hash Algorithm 1 (SHA1) (2001). [3] Chan, H. and Perrig, A.: Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes, Security and Privacy (SP), 2010 IEEE Symposium on, IEEE, pp. 257 272 (2010). 6