Advanced Search
Volume 30 Issue 6
Dec.  2010
Turn off MathJax
Article Contents
Li Yong-hao, Liu Yun, He De-quan. An Incentive Search Model Based on Utility in CAN Network[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1485-1488. doi: 10.3724/SP.J.1146.2006.01863
Citation: Li Yong-hao, Liu Yun, He De-quan. An Incentive Search Model Based on Utility in CAN Network[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1485-1488. doi: 10.3724/SP.J.1146.2006.01863

An Incentive Search Model Based on Utility in CAN Network

doi: 10.3724/SP.J.1146.2006.01863
  • Received Date: 2006-11-24
  • Rev Recd Date: 2007-08-20
  • Publish Date: 2008-06-19
  • Based on analyses of CAN(Content-Addressable Network) protocol, DFO (Distributed Fairly Optimal) arithmetic is proposed, which use peers up/down bandwidth usage and overlay multicast link efficiency defined by utility function as standard. DFO define request/response utility function respective and evaluate global transmit overload based on peer input efficiency vector to conform a fire restrict. DFO can reduce average query latency and global bandwidth cost by optimizing global utility. Simulative results and analysis has shown that DFO improved on hot spot problem in CAN, can achieve the purpose of minimum global query latency and maximal transmit overload balance.
  • loading
  • Ratnasamy S, Francis P, and Handley M, et al.. A scalablecontent-addressable network[J].ACM SIGCOMM ComputerCommunication Review.2001, 31(4):161-172[2]Damiani E, Vimercati D C, and Paraboschi S, et al.. Areputation- based approach for choosing reliable resources inpeer-to-peer networks. Computer and communicationssecurity, Washingtion, DC USA, 2002: 207-221.[3]Yu B, Singh M P, and Sycara K. Developing trust inlarge-scale peer-to-peer systems. Multi-Agent Security andSurvivability, Philadelphia USA, 2004: 23-34.[4]Ciglaric M. Effective message routing in unstructuredpeer-to-peer overlays[J].IEE Proceedings, Communications.2005, 152(5):673-678[5]Ma R T B, Lee S C M, and Lui J C S, et al.. A game theoreticapproach to provide incentive and service differentiation inP2P networks[J].ACM SIGMETRICS Performance EvaluationReview.2004, 32(1):189-201[6]Kubiatowicz J, Bindel D, and Chen Y, et al.. OceanStore : anarchitecture for global-scale persistent storage[J].ACMSIGPLAN Notices.2000, 35(11):190-201[7]Adar E B A H. Free riding on gnutella. First Monday, 2000,5(10): 176-194.[8]Fudenberg D and Tirole J. Game Theory. Cambridge, Mass.:MIT Press, 1991, 47-72.[9]李庆华, 张阳, 王多强. P2P 网络中基于谣言传播机制的资源搜索算法. 计算机应用, 2005, 25(11): 2465-2471.[10]Chiola G, G Cordasco, and L Gargano, et al.. Optimizing thefinger table in chord-like DHTs. Parallel and DistributedProcessing Symposium, Santa Fe, New Mexico, 2006:143-151.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3073) PDF downloads(757) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return