{"title":"P2P系统中基于DHT的范围查询模型","authors":"Wang Dan, Li Maozeng","doi":"10.1109/NSWCTC.2009.55","DOIUrl":null,"url":null,"abstract":"A Peer-to-Peer (P2P) system has emerged as one of the most successful ways to share resources in distributed environment, and DHT(Distributed Hash Table) is used as an effective approach to locate shared resources in a P2P system. This paper describes an extended DHT model by combining DHT with B+ tree. The sharing resources are represented by their attributes. Each query request is associated with ranges in one or more attributes, and B+ tree is introduced to organize the values of each attribute. In order to implement and verify our model, Chord is chosen as the underlying DHT system. In addition to equality queries, this model also makes it possible to execute range queries over a DHT. The relevant technologies mapping from B+ trees to Chord system are described. The node adding and leaving process and range query process are illustrated.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"35 5","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Range Query Model Based on DHT in P2P System\",\"authors\":\"Wang Dan, Li Maozeng\",\"doi\":\"10.1109/NSWCTC.2009.55\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A Peer-to-Peer (P2P) system has emerged as one of the most successful ways to share resources in distributed environment, and DHT(Distributed Hash Table) is used as an effective approach to locate shared resources in a P2P system. This paper describes an extended DHT model by combining DHT with B+ tree. The sharing resources are represented by their attributes. Each query request is associated with ranges in one or more attributes, and B+ tree is introduced to organize the values of each attribute. In order to implement and verify our model, Chord is chosen as the underlying DHT system. In addition to equality queries, this model also makes it possible to execute range queries over a DHT. The relevant technologies mapping from B+ trees to Chord system are described. The node adding and leaving process and range query process are illustrated.\",\"PeriodicalId\":433291,\"journal\":{\"name\":\"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing\",\"volume\":\"35 5\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NSWCTC.2009.55\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NSWCTC.2009.55","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Peer-to-Peer (P2P) system has emerged as one of the most successful ways to share resources in distributed environment, and DHT(Distributed Hash Table) is used as an effective approach to locate shared resources in a P2P system. This paper describes an extended DHT model by combining DHT with B+ tree. The sharing resources are represented by their attributes. Each query request is associated with ranges in one or more attributes, and B+ tree is introduced to organize the values of each attribute. In order to implement and verify our model, Chord is chosen as the underlying DHT system. In addition to equality queries, this model also makes it possible to execute range queries over a DHT. The relevant technologies mapping from B+ trees to Chord system are described. The node adding and leaving process and range query process are illustrated.