CN101854383B - Large-scale network resource searching method based on de Bruijn image - Google Patents

Large-scale network resource searching method based on de Bruijn image Download PDF

Info

Publication number
CN101854383B
CN101854383B CN2010101583767A CN201010158376A CN101854383B CN 101854383 B CN101854383 B CN 101854383B CN 2010101583767 A CN2010101583767 A CN 2010101583767A CN 201010158376 A CN201010158376 A CN 201010158376A CN 101854383 B CN101854383 B CN 101854383B
Authority
CN
China
Prior art keywords
node
bruijn
resource
sign
search
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010101583767A
Other languages
Chinese (zh)
Other versions
CN101854383A (en
Inventor
卢锡城
张一鸣
李东升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN2010101583767A priority Critical patent/CN101854383B/en
Publication of CN101854383A publication Critical patent/CN101854383A/en
Application granted granted Critical
Publication of CN101854383B publication Critical patent/CN101854383B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a large-scale network resource searching method based on a de Bruijn image, aiming to solve the technical problem of requirements on small node degree and low searching delay of large-scale network searching. The method comprises the following steps of: firstly, naming a resource object; secondly, realizing network topology by adopting a general de Bruijn image; thirdly, processing joining and exiting events of nodes by adopting an identification splitting and merging method; and realizing the searching of the resources by adopting a bit-by-bit matching mode and judging whether the searching is finished or not by adopting a front-to-back matching rule. By adopting the method, the average degree of the network topology is 4, and the maximum searching delay is only logdN, which can greatly improve the large-scale network resource searching efficiency.

Description

Large-scale network resource searching method based on de Bruijn figure
Technical field
The present invention relates to the resource search method in the computer network, especially a kind of resource search method based on de Bruijn figure.
Background technology
P2P (peer-to-peer) network is a kind of network of rising in recent years.In the P2P network, each node logically is reciprocity, does not have the branch of client and server, can directly communicate between each node with mutual.At present, the P2P network all has wide application at key areas such as scientific research, ecommerce, E-Government and military applications.In order to realize that resources effective is shared and comprehensive utilization, the P2P network user need search for satisfactory resource, and resource searching is one of key technology of P2P network.
According to resource organizations's pattern, the P2P network can be divided into two kinds usually: structuring (Structured) P2P network and destructuring (Unstructured) P2P network.Structured P 2 P network has obtained extensive application at present owing to have performance more reliably on Internet.
Resource searching problem in the structured P 2 P network can abstractly be: how on large scale network, to realize the effective search of resource object, and adapt to the dynamic change of node.
At present, the resource search method in the structured P 2 P network mainly comprises Chord, CAN, Pastry, Tapestry etc.In said method, each node all has unique sign, and based on certain algorithm building network topology between node.Each node is all safeguarded one " transmitting ", preserves the information of relevant neighbours' node.Each resource object obtains the resource object sign according to its keyword through hash function.The sign of resource object and node sign belong to same or analogous name space usually, and each node all is responsible for the part of resource object identifier space.When node added or withdraws from, each junction associated need be revised and transmit, and dynamically adjusted the identifier space scope that it is responsible for, to safeguard the consistency of distributed Hash table.When resource searching, each node " is transmitted " the resource searching forwards to corresponding neighbours' node according to it, accomplishes search up to final arrival destination node.The important parameter of estimating the large-scale network resource search performance comprises the node number of degrees and search delay etc.The node number of degrees are meant the size of " routing table " safeguarded on each node; Search delay is meant the logic leapfrog number that the first resource searching request is transmitted in system.The standard of evaluating network searching method mainly comprises the node number of degrees and search delay, and searching method should have the less node number of degrees on the one hand efficiently, should have lower search delay on the other hand.But existing searching method is not all realized the compromise preferably of the node number of degrees and search delay.
Summary of the invention
Technical problem to be solved by this invention: search for the little and low demand of search delay to the node number of degrees to large scale network; A kind of large-scale network resource searching method based on de Bruijn figure is proposed; This method can either have the less node number of degrees (being less routing table), has lower search delay again.
In order to address the above problem, the technical scheme that the present invention proposes is:
The first step; Be the resource object name: to each node and resource object; Adopt document " RFC 1321:The MD5Message-DigestAlgorithm " (http://www.ietf.org/rfc/rfc1321.txt, April 1992) described MD5 (eap-message digest 5) algorithm to name.
In second step, adopt de Bruijn figure realization network topology: (d D) is a kind of directed graph to de Bruijn figure B, and wherein d is the base (span that is each character in the node sign is 0 to d-1) of each node sign, the length that D identifies for each node.Each some u=u 1u 2... u DHave the d bar to go out the limit: to any α ∈ 0,1,2 ..., d-1}, some u have one to some v=u 2u 3... u Dα goes out the limit.Document " A Combinatorial Problem " (Proc.of Koninklijke Nederlundse Academic van Watenschappen, vol.A49, pp.758-764,1946) proves that the maximum delay of de Bruijn figure is log dN, the node number of degrees are 2d.
The nodal point number of traditional de Bruijn figure is d D, can not hold the node of arbitrary number.For example, get d=2, then nodal point number can only be 2 1=2,2 2=4,2 3=8 ...Therefore, we adopt document " Factoring and Scaling Kautz Digraphs " (Research Report 94-15, LIP ENSL; 69364Lyon, France, the general de Bruijn figure definition that Apr.1994) proposes: make GB (d; N) representing base is the vague generalization de Bruijn figure of n for d and node number; ((GB (d, n)) is respectively its point set V for GB (d, n)) and limit collection E so
V(GB(d,n))={0,1,…,n-1}, (1)
E(GB(d,n))={[i,(d×i+α)modn]|0≤α≤d-1}, (2)
Each node sign has its corresponding binary representation.Because B (d, D) ≡ GB (d, d D), so vague generalization de Bruijn figure is the superset (being that any conventional de Bruijn figure can be expressed as a vague generalization de Bruijn figure) of traditional de Bruijn figure, and vague generalization de Bruijn figure can hold the node of arbitrary number.Node in the some map network topology of vague generalization de Bruijn figure connects between the node in the map network topology of limit, can obtain corresponding network topology.For simplified design, with the sign of the point among the binary number representation vague generalization de Bruijn figure.
In the 3rd step, incident is withdrawed from the adding of adopting " identification splitting act of union " to handle node: when new node P adds fashionablely, the node sign length of at first choosing the arbitrary node V:V that satisfies following condition in the network is not more than its arbitrary neighbours' node; Node V divides then, establishes node V and is designated v 1v 2... v k, after then node P adds, v 1v 2... v kBe split into v 1v 2... v k0 and v 1v 2... v k1, the sign of node V becomes v 1v 2... v k0, the sign of new node P is set to v 1v 2... v k1.And then upgrade the routing table of P, V and junction associated according to vague generalization de Bruijn figure, promptly the annexation of each node satisfies formula (2).It is the inverse process that adds that node withdraws from.When detecting node Q and leave, at first choose certain a pair of sibling Y=y that satisfies following condition in the network 1y 2... y P-10 and Y '=y 1y 2... y P-1The sign length of 1:Y and Y ' all is not less than its neighbours separately; Then the sign of node Y is changed into the sign of Q, the sign of Y ' changes y into 1y 2... y P-1(being that Y and Y ' merge); And upgrade the routing table of junction associated according to vague generalization de Bruijn figure.
In the 4th step, adopt " coupling by turn " mode to realize the search of resource: resource searching is accomplished through transmitting search message between node.At first definition " front and back matching value ": to any two character string u=u 1u 2... u mAnd v=v 1v 2... v n, the front and back matching value of u and v (be designated as QH (u is meant that v)=x) the back x position of u is identical with the preceding x position of v, for example 100 11With 11010 front and back matching value is 2.Each node calculates front and back matching value x own and the target resource object after receiving the resource object search message, in routing table, selecting front and back matching value with the target resource object then is that the neighbours of x+1 transmit.
In the 5th step, adopt " front and back coupling " rule judgment whether to accomplish search: node u=u 1u 2... u mHave resource s=s 1s 2... s r, and if only if: QH (u, s)=| u|, perhaps QH (u, s)=| u|-1 ∧ u 1=s rWhen satisfying the front and back matched rule, the search of accomplishing resource is described, finish, proceed search otherwise changeed for the 4th step.
Adopt the present invention can reach following technique effect:
1. in the present invention, each node is organized neighborhood according to their sign through simulation vague generalization de Bruijn figure, by document " Factoring and Scaling Kautz Digraphs " (Research Report 94-15; LIP ENSL; 69364Lyon, France, Apr.1994); The average number of degrees that can know this network topology are 4, and maximum search postpones to be merely log dN.
2. on the basis that forms good topological structure, matching mode was transmitted resource searching message before and after the present invention used, and can resource searching message be forwarded to from the near neighbours' node of destination node exactly, improved the resource searching efficient of large scale network.
Description of drawings
Fig. 1 is an overview flow chart of the present invention;
Fig. 2 is a de Bruijn illustrated example;
Fig. 3 is that node adds the processing procedure example.
Embodiment
The present invention mainly comprised for five steps (as shown in Figure 1): 1. be the resource object name; 2. adopt de Bruijn figure to realize network topology; 3. incident is withdrawed from the adding of adopting " identification splitting act of union " to handle node; 4. adopt " coupling by turn " mode to realize the search of resource; 5. adopt " front and back coupling " rule judgment whether to accomplish search.
In second step, the present invention adopts de Bruijn figure to realize network topology, and Fig. 2 has provided the example of two de Bruijn figure, and left side figure is B (2,2), and right figure is B (2,3).
In the 3rd step, incident is withdrawed from the adding that the present invention adopts " identification splitting act of union " to handle node, and Fig. 3 has provided a node and added the example of handling.Before new node adds, V=000 in left figure; After new node added, the sign of V became 0000, and P is designated 0001, and connection relation is shown in right figure: the limit neighbours that go out of V=0000 are 001,010, and going into the limit neighbours is 010,100; The limit neighbours that go out of P=0001 are 100,101, and going into the limit neighbours is 010,100.

Claims (2)

1. large-scale network resource searching method based on de Bruijn figure is characterized in that may further comprise the steps:
The first step is the resource object name: to each node and resource object, adopt the MD5 algorithm to name;
In second step, adopt de Bruijn figure to realize network topology: to adopt general de Bruijn figure definition: make GB (d, n) represent base is that the vague generalization de Bruijn of n schemes for d and node number, ((GB (d, n)) is respectively its point set V for GB (d, n)) and limit collection E so
V(GB(d,n))={0,1,…,n-1}, (1)
E(GB(d,n))={[i,(d×i+α)modn]|0≤α≤d-1}, (2)
Node in the some map network topology of vague generalization de Bruijn figure connects between the node in the map network topology of limit, promptly obtains corresponding network topology;
In the 3rd step, incident is withdrawed from the adding of adopting " identification splitting act of union " to handle node: when new node P adds fashionablely, the node sign length of at first choosing the arbitrary node V:V that satisfies following condition in the network is not more than its arbitrary neighbours' node; Node V divides then, establishes node V and is designated v 1v 2... v k, after then node P adds, v 1v 2... v kBe split into v 1v 2... v k0 and v 1v 2..v k1, the sign of node V becomes v 1v 2... v k0, the sign of new node P is set to v 1v 2... v k1; And then upgrade the routing table of P, V and junction associated according to vague generalization de Bruijn figure, promptly the annexation of each node satisfies formula (2); When detecting node Q and leave, at first choose certain a pair of sibling Y=y that satisfies following condition in the network 1y 2... y P-10 and Y '=y 1y 2... y P-1The sign length of 1:Y and Y ' all is not less than its neighbours separately; Then the sign of node Y is changed into the sign of Q, the sign of Y ' changes y into 1y 2... y P-1And upgrade the routing table of junction associated according to vague generalization de Bruijn figure;
In the 4th step, adopt " coupling by turn " mode to realize the search of resource: resource searching is accomplished through transmitting search message between node; At first definition " front and back matching value ": to any two character string u=u 1u 2... u mAnd v=v 1v 2... v nThe front and back matching value of u and v, be designated as QH (u, v)=x; The back x position that is meant u is identical with the preceding x position of v; Each node calculates front and back matching value x own and the target resource object after receiving the resource object search message, in routing table, selecting front and back matching value with the target resource object then is that the neighbours of x+1 transmit;
In the 5th step, adopt " front and back coupling " rule judgment whether to accomplish search: node u=u 1u 2... u mHave resource s=s 1s 2... s r, and if only if: QH (u, s)=| u|, perhaps QH (u, s)=| u|-1 ∧ u 1=s r, when satisfying the front and back matched rule, the search of accomplishing resource is described, finish; Otherwise changeed for the 4th step and proceed search.
2. the large-scale network resource searching method based on de Bruijn figure as claimed in claim 1, the sign that it is characterized in that the point among the vague generalization de Bruijn figure is with binary number representation.
CN2010101583767A 2010-04-28 2010-04-28 Large-scale network resource searching method based on de Bruijn image Expired - Fee Related CN101854383B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101583767A CN101854383B (en) 2010-04-28 2010-04-28 Large-scale network resource searching method based on de Bruijn image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101583767A CN101854383B (en) 2010-04-28 2010-04-28 Large-scale network resource searching method based on de Bruijn image

Publications (2)

Publication Number Publication Date
CN101854383A CN101854383A (en) 2010-10-06
CN101854383B true CN101854383B (en) 2012-07-04

Family

ID=42805647

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101583767A Expired - Fee Related CN101854383B (en) 2010-04-28 2010-04-28 Large-scale network resource searching method based on de Bruijn image

Country Status (1)

Country Link
CN (1) CN101854383B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699813B (en) * 2013-12-10 2017-05-10 深圳先进技术研究院 Method for identifying and removing repeated bidirectional edges of bidirectional multistep De Bruijn graph

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101442479A (en) * 2007-11-22 2009-05-27 华为技术有限公司 Method, equipment and system for updating route in P2P peer-to-peer after node failure

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070280276A1 (en) * 2006-05-30 2007-12-06 Tellabs Operations, Inc. Method and apparatus for managing client layer communications services

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101442479A (en) * 2007-11-22 2009-05-27 华为技术有限公司 Method, equipment and system for updating route in P2P peer-to-peer after node failure

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张一鸣等.一种面向大规模P2P系统的快速搜索算法.《软件学报》.2008,全文. *

Also Published As

Publication number Publication date
CN101854383A (en) 2010-10-06

Similar Documents

Publication Publication Date Title
Triantafillou et al. Towards a unifying framework for complex query processing over structured peer-to-peer data networks
Li et al. Fissione: A scalable constant degree and low congestion dht scheme based on kautz graphs
JP2002335269A (en) Peer-to-peer name resolution protocol(pnrp) and multilevel cache for use therewith
CN101719155B (en) Method of multidimensional attribute range inquiry for supporting distributed multi-cluster computing environment
CN101854383B (en) Large-scale network resource searching method based on de Bruijn image
CN101094244A (en) Method of high performance distributed Hash table in P2P system
Tato et al. Designing overlay networks for decentralized clouds
Zöls et al. The hybrid chord protocol: A peer-to-peer lookup service for context-aware mobile applications
KR102596700B1 (en) System and method for inter shard transaction in blockchain network
Zhang et al. A new algorithm of service discovery based on DHT for mobile application
Bharathi et al. Model based controller design for a spherical tank
CN104168147B (en) A kind of node maitaining method that one-dimensional chained list is based on for P2P network monitorings
CN101040506B (en) Method for initializing a peer-to-peer data network
Ma et al. A new P2P network routing algorithm based on ISODATA clustering topology
Makikawa et al. Balance and proximity-aware Skip Graph construction
Lee et al. P2P trust model: The resource chain model
Cao et al. A multi-level Super peer based P2P architecture
Yu et al. A semi-structured overlay for multi-attribute range queries in cloud computing
Fan et al. GA_Chord: An improvement to Chord algorithm based on group autonomy in structed P2P network
Mokadem et al. An efficient resource discovery while minimizing maintenance overhead in sdds based hierarchical dht systems
Raju et al. Reputation and trust management models in peer-to-peer
Mashayekhi et al. Efficient semantic based search in unstructured peer-to-peer networks
Zhao et al. An improved chord based on counting bloom filter and topology-aware lookup
Mizutani et al. MARIF: Multiple queries look-up architecture using range information feedback in a DHT network
Yu et al. Improving the lookup performance of Chord network by hashing landmark clusters

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120704

Termination date: 20160428