J4 ›› 2009, Vol. 44 ›› Issue (11): 57-62.

• Articles • Previous Articles     Next Articles

Research on a RP(k)based resource awareness model

 LIU Ai-Wen, LIU Fang-Ai   

  1. School of Information Science and Engineering, Shandong Normal University, Jinan 250014, Shandong, China
  • Received:2009-05-31 Online:2009-11-16 Published:2009-11-25

Abstract:

A file sharing system called RP(k)CGrid is designed. It is a hybrid topology overlay network composed of two parts: a RP(k) backbone and resource cluster. A query register mechanism is proposed to enhance the cluster head nodes ability of resource discovery. A resource awareness model based on directory advertisement is introduced to improve resource awareness ability of the cluster head nodes without flooding. Experimental study reveals that the RP(k)CGrid has good efficiency in scalability and resource discovery.

Key words: grid; resource management; resource awareness; query register; peertopeer network

CLC Number: 

  • TP393
[1] LIU Yang, QIN Feng-lin, GE Lian-sheng. Measurement study of cloud computing: a survey [J]. J4, 2013, 48(11): 27-35.
[2] GUO Xiao-dong, JIAO Liang, QIU Yi-hong, GE Lian-sheng. Design and implementation of a multi-path inter-domain
routing simulator based on Click and NS2
[J]. J4, 2013, 48(11): 36-43.
[3] SHU Zhi-Jiang, HU An-Yin, HU Lin, LIAN Jian. Research on the method of viral mobile communication cross entropy based on video service [J]. J4, 2009, 44(9): 32-34.
[4] ZHOU Shu-Wang, WANG Yang-Long, GUO Jiang, WEI Nuo. Particle swarm optimizationbasedwireless sensor  network nodes localization method [J]. J4, 2009, 44(9): 52-55.
[5] LIU Ying-Hui, WANG Yang-Long, GUO Jiang, LI Dong-Yue. Channel sampling strategy of PTF with minimum time [J]. J4, 2009, 44(9): 56-59.
[6] DONG Yuan1, XU Ya-bin1,2*, LI Zhuo1,2, LI Yan-ping1. Research on spam identification based on social computing and machine learning [J]. J4, 2013, 48(7): 72-78.
[7] DU Xiao-jun, LIN Bo-gang, LIN Zhi-yuan, LI Ying. Research on multiple population genetic algorithm in security software fuzzy test [J]. J4, 2013, 48(7): 79-84.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!