English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 111300/142216 (78%)
Visitors : 48299147      Online Users : 1080
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/139217
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/139217


    Title: 透過內容中心式命名資料網路改善Kademlia資料管理機制
    Enhancing Kademlia data management via Named Data Networking
    Authors: 洪辰瑋
    Hong, Chen-Wei
    Contributors: 蔡子傑
    Tsai, Tzu-Chieh
    洪辰瑋
    Hong, Chen-Wei
    Keywords: 智慧商圈
    命名資料網路
    以內容為中心的網路
    點對點網路
    分散式雜湊表
    Kademlia
    Named Data Network
    Information centric Network
    P2P
    Distributed Hash Table
    Smart business district
    Date: 2022
    Issue Date: 2022-03-01 17:19:56 (UTC+8)
    Abstract: Kademlia 是一種分散式雜湊表 ( DHT : Distributed Hash Table ) 技術,作為 IP 之上的覆蓋網路,每個節點以 Kademlia 路由表,稱之為 K-bucket ,維護部份拓樸資訊,提供 P2P 網路資料存取能力。然而 IP 網路以位址為識別的點對點通訊機制,卻限制了 Kademlia 架構的擴展。
    本研究以內容中心式命名資料網路 ( NDN : Named Data Network ) 取代底層 IP 路由,透過 NDN 以「名稱前綴」為識別的封包路由模式,以及「興趣」與「資料」兩種不同類型之封包,設計相應名稱前綴使 Kademlia 查找資料時能動態匹配節點,從路由層面有效解決 Kademlia 路由表因其節點紀錄規則,所形成群集現象導致的查找錯誤。進一步提出 Kademlia 雙向路由表、 逐跳式 Look up Method 等架構,降低延遲與路由成本。
    此外,本研究提出一個基於邊緣運算的智慧商圈情境,並以商品推薦服務為主。在情境中,NDN 提供了網路內服務發現機制,契合 P2P 網路特性,Kademlia 則作為資料管理架構,有效解決 NDN 前綴氾濫問題,通過融合 NDN 與 Kademlia,建立具有高查找效率的分散式資料儲存網路,運行智慧商圈中的多樣化服務。
    Kademlia uses a Distributed Hash Table (DHT) technique to form a P2P overlay network above IP. Each node maintains some topology information with Kademlia routing table, called K-bucket, and provides P2P network data access capabilities. However, the IP network`s peer-to-peer communication mechanism limits the extension of the Kademlia architecture.
    In this study, a content-centric Named Data Network (NDN) is used as the underlying routing instead of IP. Routing in NDN is identified by the “name prefix”, and two types of packets (“interest”& “data”) are using for searching and reply. We modify Kademlia K-bucket to make good use of NDN in order to dynamically match node for searching data effectively. We also mitigate the search errors caused by the K-bucket clustering phenomenon. In addition, the Kademlia bidirectional routing table and hop-by-hop Look up Method are proposed to further reduce latency and routing costs.
    This study also proposes a smart business district scenario based on edge computing, with product recommendation as the main service, using the integration of NDN and Kademlia technologies. In the scenario, NDN provides a service discovery mechanism in the network,and Kademlia is used as a data management architecture to effectively solve the problem of NDN prefix flooding.
    Reference: [1] 5G Americas, “5G at Edge : Americas Whitepaper”, 2019 October
    [2] Cheng Yi, Alexander Afabasyev, Ilya Moiseenko, Lan Wang, Beichuan Zhang, Lixia Zhang, “A case for forwarding Plane,”ACM SIGCOMM Computer Communications, April 2013
    [3] Kang H, Chan-Tin E, Hopper N, Kim Y, “Why kad lookup fails,” 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 121– 130, September 2009
    [4] Liu B, Wei T, Zhang J, Li J, Zou W, Zhou M, “Revisiting why kad lookup fails,” 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), 37–42, September 2012
    [5] Zhuo Li, Yaping Xu, Beichuan Zhang, Liu Yan, Kaihua Liu, “Packet Forwarding in Named Data Networking Requirements and Survey of Solutions,” IEEE Communications Surveys & Tutorials, pp. 1950 - 1987, 12 November 2018
    [6] W. You, B. Mathieu, P. Truong, J.-F. Peltier, and G. Simon, “Dipit: A distributed bloom-filter based pit table for ccn nodes,” in 2012 21st International Conference on Computer Communications and Networks, pp. 1–7, Munich, Germany, 2012.
    [7] D. Saxenaa, V. Raychoudhurya, N. Surib, C. Beckerc, and J. Cao,“Named data networking: A survey,”Comput. Sci. Rev., vol. 19,pp. 15–55, Feb. 2016.
    [8] Petar Maymounkov, David MazièresKademlia, “Kademlia : A Peer-to-Peer Information System Based on the XOR Metric,”International Workshop on Peer-to-Peer Systems, October 2002
    [9] Lixia Zhang, Alexander Afanasyev, Spyridon Mastorakis, “On the Evolution of ndnSIM: an OpenSource Simulator for NDN Experimentation,” ACM SIGCOMM Computer Communication Review, September 2017
    [10] Dario Sabella, Vadim Sukhomlinov, Linh Trang, Sami Kekki, Pietro Paglierani, Ralf Rossbach, Xinhui Li, Yonggang Fang, Dan Druta, Fabio Giust, Luca Cominardi, Walter Featherstone, Bob Pike, Shlomi Hadad, “Developing Software for Multi-Access Edge Computing 2nd edition”, ETSI White Paper No. 20, February 2019
    [11] Jiyeon Kim, Sooyoung Jang, Deockgu Jee, Eunjin Ko, Seung Han Choi, Mi Kyong Han, “5G based SmartCity Convergence Service Platform for Data sharing”, 2020 International Conference on Information and Communication Technology Convergence (ICTC), 21 December 2020
    [12] Elena-Madalina Oproiu, Marius Iordache, Cristian Patachia, Catalin Costea, Ion Marghescu, “Development and implementation of a Smart City Use Case in a 5G mobile network`s operator”, 2017 25th Telecommunication Forum (TELFOR), 08 January 2018
    [13] Aleksandar Karadimce, Ninoslav Marina, “Smart Mobile City Services in the 5G Era”, 2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 04 February 2019
    [14] Sami Kekki, Walter Featherstone, Yonggang Fang, Pekka Kuure, Alice Li, Anurag Ranjan, Debashish Purkayastha, Feng Jiangping, Danny Frydman, Gianluca Verin, Kuo-Wei Wen, Kwihoon Kim, Rohit Arora, Andy Odgers, Luis M. Contreras, Salvatore Scarpina, “MEC in 5G networks First edition”, ETSI White Paper No. 28, June 2018
    [15] Rehmat Ullah, Muhammad Atif Ur Rehman, Byung-Seo Kim, “Design and Implementation of an Open Source Framework and Prototype For Named Data Networking-Based Edge Cloud Computing System,” IEEE Access, pp. 57741 - 57759, 30 April 2019
    [16] Giovanna Carofiglio, Massimo Gallo, Luca Muscariello, Michele Papalini, and Sen Wang, “Controlling Strategy Retransmissions in Named Data Networking”,
    Optimal multipath congestion control and request forwarding in information-centric networks. In 2013 21st IEEE International Conference on Network Protocols (ICNP), pages 1–10. IEEE, 2013
    [17] Y. Wang, H. Dai, J. Jiang, K. He, W. Meng, and B. Liu, “Parallel name lookup for named data networking,” in Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5, Houston, USA, 2011
    [18] W. You, B. Mathieu, P. Truong, J.-F. Peltier, and G. Simon, “Dipit: A distributed bloom-filter based pit table for ccn nodes,” in 2012 21st International Conference on Computer Communications and Networks, pp. 1–7, Munich, Germany, 2012.
    [19] D. Saxenaa, V. Raychoudhurya, N. Surib, C. Beckerc, and J. Cao,“Named data networking: A survey,” Comput. Sci. Rev., vol. 19,pp. 15–55, Feb. 2016.
    [20] Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, Khaled B. Letaief, “A Survey on Mobile Edge Computing: The Communication Perspective,” IEEE Communications Surveys & Tutorials, pp. 2322 - 2358, 25 August 2017
    Description: 碩士
    國立政治大學
    資訊科學系
    108753108
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0108753108
    Data Type: thesis
    DOI: 10.6814/NCCU202200231
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    310801.pdf3783KbAdobe PDF20View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback