skip to main content
10.1145/1329469.1329481acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmumConference Proceedingsconference-collections
research-article

Performance evaluation of replication strategies in DHTs under churn

Published:12 December 2007Publication History

ABSTRACT

This paper presents a comparative analysis of replication algorithms for DHT (Distributed Hash Table) architectures. These algorithms are applicable to all existing structured peer-to-peer systems, and can be implemented on top of any DHT. The performance of these algorithms is examined using emulation through virtualization. Significant differences are identified in terms of delays, control overhead, success rate, and overlay route length.

References

  1. Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, 'Wide-area ooperative storage with CFS', In Proc. 18th ACM Symposium on Operating System Principles, pages 202--215, October 21--24, 2001, Chateau Lake Louise, Banff, Alberta, Canada. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, 'OceanStore: Architecture for Global-Scale Persistent Storage', Appears in Proceedings of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), November 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Rubén Mondéjar, Pedro García, Carles Pairot, 'Bunshin: DHT for distributed applications'. Spain 2005.Google ScholarGoogle Scholar
  4. Antony Rowstron, Peter Druschel, 'Storage management and caching in PAST, a large-scale persistent peer-to-peer storage utility', 18th ACM SOSP'01, Lake Louise, Alberta, Canada, October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Antony Rowstron, and Peter Druschel, 'Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems', 18 Conference on Distributed Systems Platforms, Heidelberg (D), 2001 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ben Y. Zhao, John Kubiatowicz, and Anthony D. Joseph, 'Tapestry: An Infrastructure for fault-tolerant Wide-area Location and Routing', April 2001.Google ScholarGoogle Scholar
  7. Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp1, Scott Shenker, 'A Scalable Content-Addressable Network', in Processings of the ACM SIGCOMM, 2001, pp. 161--172 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Petar Maymounkov and David Mazieres, 'Kademlia: A Peer-to-peer Information System Based on the XOR Metric', in Processings of the IPTPS, Cambridge, MA, USA, February 2002, pp. 53--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ion Stoicay, Robert Morrisz, David Liben-Nowellz, David R. Kargerz, M. Frans Kaashoekz, Frank Dabekz, Hari Balakrishnanz, 'Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications', IEEE/ACM Transactions on Networking, vol. 11, no. 1, pp. 17--32, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Antony Rowstron, Anne-Marie Kermarrec, Miguel Castro, and Peter Drusche, 'SCRIBE: The design of a large-scale event notification infrastructure', in Proceedings of the Third International Workshop on Networked Group Communications (NGC2001), London, UK, November 2001, pp. 30--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Shelley Q. Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John D. Kubiatowicz, 'Bayeux : An Architecture for Scalable and Faulttolerant Widearea Data Dissemination', in Proceedings of the 11th internationalworkshop on Network and operating systems support for digital audioand video, 2001, pp. 11--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Predrag Knezevic, Andreas Wombacher, Thomas Risse, 'Enabling High Data Availability in a DHT', in 2nd International Workshop on Grid and Peer-to-peer Computing Impacts on Large Scale Heterogeneous Distributed Database Systems (GLOBE), 2005Google ScholarGoogle Scholar
  13. Ali Ghodsi, Luc Onana Alima, and Seif Haridi; 'Symmetric Replication for Structured Peer-to-Peer Systems', The 3rd International Workshop on Databases, Information Systems and Peer-to-Peer Computing, July 2005, Trondheim, Norway. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Predrag Knezevic, Andreas Wombacher, and Thomas Risse, 'DHT-based Self-adapting Replication Protocol for Achieving High Data Availability', in The InternationalConference on Signal-image Technology and Internetbased Systems (SITIS), 2006.Google ScholarGoogle Scholar
  15. Marcel Waldvogel, Paul Hurley, Daniel Bauer, 'Dynamic Replica Management in Distributed Hash Tables', Published in: RZ3502 in 2003.Google ScholarGoogle Scholar
  16. Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenker, 'Search and Replication in Unstructured Peer-to-Peer Networks', In Proceedings of the 16th annual ACM International Conference on supercomputing, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kei Ohnishi, Hiroshi Yamamotoy, Kento Ichikawa, Masato Uchida and Yuji Oiey, 'Storage Load Balancing via Local Interactions Among Peers in Unstructured P2P Networks', Proceedings of the 1st international conference on Scalable information systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Edith Cohen and Scott Shenker. 'Replication strategies in unstructured peer-to-peer networks'. In ACM SIGCOMM 2002, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Performance evaluation of replication strategies in DHTs under churn

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        MUM '07: Proceedings of the 6th international conference on Mobile and ubiquitous multimedia
        December 2007
        183 pages
        ISBN:9781595939166
        DOI:10.1145/1329469

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 December 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        MUM '07 Paper Acceptance Rate20of44submissions,45%Overall Acceptance Rate190of465submissions,41%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader