skip to main content
10.1145/633025.633043acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

Replication strategies in unstructured peer-to-peer networks

Published:19 August 2002Publication History

ABSTRACT

The Peer-to-Peer (P2P) architectures that are most prevalent in today's Internet are decentralized and unstructured. Search is blind in that it is independent of the query and is thus not more effective than probing randomly chosen peers. One technique to improve the effectiveness of blind search is to proactively replicate data. We evaluate and compare different replication strategies and reveal interesting structure: Two very common but very different replication strategies - uniform and proportional - yield the same average performance on successful queries, and are in fact worse than any replication strategy which lies between them. The optimal strategy lies between the two and can be achieved by simple distributed algorithms. These fundamental results o.er a new understanding of replication and show that currently deployed replication strategies are far from optimal and that optimal replication is attainable by protocols that resemble existing ones in simplicity and operation.

References

  1. Boeing proxy logs. http://www.web-caching.com/traces-logs.html.Google ScholarGoogle Scholar
  2. Open Source Community. The free network project - rewiring the internet. In http://freenet.sourceforge.net/, 2001.Google ScholarGoogle Scholar
  3. Open Source Community. Gnutella. In http://gnutella.wego.com/, 2001.Google ScholarGoogle Scholar
  4. KaZaA file sharing network. KaZaA. In http://www.kazaa.com/, 2002.Google ScholarGoogle Scholar
  5. Morpheus file sharing system. Morpheus. In http://www.musiccity.com/, 2002.Google ScholarGoogle Scholar
  6. Napster Inc. The napster homepage. In http://www.napster.com/, 2001.Google ScholarGoogle Scholar
  7. J. Kangasharju, K. W. Ross, and D. A. Turner. Optimal content replication in P2P communities. Manuscript, 2002.Google ScholarGoogle Scholar
  8. L. Kleinrock. Queueing Systems, Volume II: Computer Applications. Wiley-Interscience, New York, 1976.Google ScholarGoogle Scholar
  9. Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker. Search and replication in unstructured peer-to-peer networks. In Proceedings of the 16th annual ACM International Conference on supercomputing, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Ratnassamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In Proceedings of the ACM SIGCOMM'01 Conference, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Rowstron and P. Druschel. Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility. In Proceedings of SOSP'01, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnana. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the ACM SIGCOMM'01 Conference, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. FastTrack Peer-to-Peer technology company. FastTrack. In http://www.fasttrack.nu/, 2001.Google ScholarGoogle Scholar
  14. N. H. Vaidya and S. Hameed. Scheduling data broadcast in asymmetric communication environments. ACM/Baltzer Wireless Networks, 5, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. Y. Zhao, J. Kubiatowicz, and A. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical Report UCB/CSD-01-1141, University of California at Berkeley, Computer Science Department, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Replication strategies in unstructured peer-to-peer networks

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SIGCOMM '02: Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
              August 2002
              368 pages
              ISBN:158113570X
              DOI:10.1145/633025
              • cover image ACM SIGCOMM Computer Communication Review
                ACM SIGCOMM Computer Communication Review  Volume 32, Issue 4
                Proceedings of the 2002 SIGCOMM conference
                October 2002
                332 pages
                ISSN:0146-4833
                DOI:10.1145/964725
                Issue’s Table of Contents

              Copyright © 2002 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 19 August 2002

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              SIGCOMM '02 Paper Acceptance Rate25of300submissions,8%Overall Acceptance Rate554of3,547submissions,16%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader