skip to main content
article

Bubblestorm: resilient, probabilistic, and exhaustive peer-to-peer search

Published:27 August 2007Publication History
Skip Abstract Section

Abstract

Peer-to-peer systems promise inexpensive scalability, adaptability, and robustness. Thus, they are an attractive platform for file sharing, distributed wikis, and search engines. These applications often store weakly structured data, requiring sophisticated search algorithms. To simplify the search problem, most scalable algorithms introduce structure to the network. However, churn or violent disruption may break this structure, compromising search guarantees.

This paper proposes a simple probabilistic search system, BubbleStorm, built on random multigraphs. Our primary contribution is a flexible and reliable strategy for performing exhaustive search. BubbleStorm also exploits the heterogeneous bandwidth of peers. However, we sacrifice some of this bandwidth for high parallelism and low latency. The provided search guarantees are tunable, with success probability adjustable well into the realm of reliable systems.

For validation, we simulate a network with one million low-end peers and show BubbleStorm handles up to 90% simultaneous peer departure and 50% simultaneous crash.

References

  1. B. Bollobàs. Random Graphs. Cambridge University Press, 2nd edition, 2001.Google ScholarGoogle Scholar
  2. V. Bourassa and F. B. Holt. SWAN: Small-world wide area networks. In SSGRR, 2003.Google ScholarGoogle Scholar
  3. L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker. Web Caching and Zipf-like Distributions: Evidence and Implications. In INFOCOM, pages 126--134, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  4. Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker. Making gnutella-like P2P systems scalable. In SIGCOMM, pages 407--418, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Cooper, M. Dyer, and C. Greenhill. Sampling regular graphs and a peer-to-peer network. In SODA, pages 980--988, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. T. Eugster, P. A. Felber, R. Guerraoui, and A. M. Kermarrec. The many faces of Publish/Subscribe. ACM Computing Surveys, 35(2):114--131, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. A. Ferreira, M. K. Ramanathan, A. Awan, A. Grama, and S. Jagannathan. Search with Probabilistic Guarantees in Unstructured Peer-to-Peer Networks. In P2P, pages 165--172, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Greenhill, F. B. Holt, and N. Wormald. Expansion properties of a random regular graph after random vertex deletions, 2007. European Journal of Combinatorics (to appear). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K. P. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, and J. Zahorjan. Measurement, Modeling and Analysis of a Peer-to-Peer File-Sharing Workload. In SOSP, pages 314--329, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Kempe, A. Dobra, and J. Gehrke. Gossip-Based Computation of Aggregate Information. In FOCS, pages 482--491, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Li, B. Loo, J. Hellerstein, F. Kaashoek, D. Karger, and R. Morris. On the feasibility of peer-to-peer web indexing and search. In IPTPS, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  12. P. Maymounkov and D. Mazières. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In IPTPS, pages 53--65, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Reynolds and A. Vahdat. Efficient peer-to-peer keyword searching. In Middleware, pages 21--40, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. K. Sankaralingam, S. Sethumadhavan, and J. C. Browne. Distributed Pagerank for P2P Systems. In HPDC, pages 58--68, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Saroiu, P. K. Gummadi, and S. D. Gribble. A Measurement Study of Peer-to-Peer File Sharing Systems. In MMCN, 2002.Google ScholarGoogle Scholar
  16. N. Sarshar, P. O. Boykin, and V. P. Roychowdhury. Percolation Search in Power Law Networks: Making Unstructured Peer-to-Peer Networks Scalable. In P2P, pages 2--9, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. W. W. Terpstra, C. Leng, and A. P. Buchmann. Brief Announcement: Practical Summation via Gossip. In PODC, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. W. W. Terpstra, C. Leng, and A. P. Buchmann. BubbleStorm: Analysis of Probabilistic Exhaustive Search in a Heterogeneous Peer-to-Peer System. Technical Report TUD-CS-2007-2, Technische Universität Darmstadt, Germany, 2007.Google ScholarGoogle Scholar
  19. Wikimedia Foundation. What we need the money for. http://wikimediafoundation.org/w/index.php?title=What_we_need_the_money_for&oldid=18704Google ScholarGoogle Scholar
  20. K.-H. Yang and J.-M. Ho. Proof: A DHT-based Peer-to-Peer Search Engine. In Conference on Web Intelligence, pages 702--708, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Y. Yang, R. Dunlap, M. Rexroad, and B. F. Cooper. Performance of Full Text Search in Structured and Unstructured Peer-to-Peer Systems. In INFOCOM, 2006.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Bubblestorm: resilient, probabilistic, and exhaustive peer-to-peer search

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM SIGCOMM Computer Communication Review
                ACM SIGCOMM Computer Communication Review  Volume 37, Issue 4
                October 2007
                420 pages
                ISSN:0146-4833
                DOI:10.1145/1282427
                Issue’s Table of Contents
                • cover image ACM Conferences
                  SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
                  August 2007
                  432 pages
                  ISBN:9781595937131
                  DOI:10.1145/1282380

                Copyright © 2007 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 27 August 2007

                Check for updates

                Qualifiers

                • article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader