• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Novel architectures for P2P applications: The continuousdiscrete approach. (2007)

by M Naor, U Wieder
Venue:Proc. of the 15th SPAA,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 166
Next 10 →

A Survey and Comparison of Peer-to-Peer Overlay Network Schemes

by Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma, Steven Lim - IEEE COMMUNICATIONS SURVEYS AND TUTORIALS , 2005
"... Over the Internet today, computing and communications environments are significantly more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. There has been much interest in emerging Peer-to-Peer (P2P) network overlays because they ..."
Abstract - Cited by 302 (1 self) - Add to MetaCart
Over the Internet today, computing and communications environments are significantly more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. There has been much interest in emerging Peer-to-Peer (P2P) network overlays because they provide a good substrate for creating large-scale data sharing, content distribution and application-level multicast applications. These P2P networks try to provide a long list of features such as: selection of nearby peers, redundant storage, efficient search/location of data items, data permanence or guarantees, hierarchical naming, trust and authentication, and, anonymity. P2P networks potentially offer an efficient routing architecture that is self-organizing, massively scalable, and robust in the wide-area, combining fault tolerance, load balancing and explicit notion of locality. In this paper, we present a survey and comparison of various Structured and Unstructured P2P networks. We categorize the various schemes into these two groups in the design spectrum and discuss the application-level network performance of each group.
(Show Context)

Citation Context

...R-TO-PEER OVERLAY NETWORK SCHEMES 11 ’greedy’, and for a given degree, the algorithms are suboptimal because the routing distance is longer. There are increasing de Bruijn P2P overlay proposals [46], =-=[49]-=-–[52]. The de Bruijn graph of degree k (k can be varied) could achieve an asymptotically optimum diameter (maximum hopcounts between any two peers in the graph) of logkN, where N is the total number o...

Simple Efficient Load Balancing algorithms for Peer-to-Peer Systems

by David R. Karger, Matthias Ruhl - SPAA'04 , 2004
"... Load balancing is a critical issue for the efficient operation of peer-to-peer networks. We give two new load-balancing protocols whose provable performance guarantees are within a constant factor of optimal. Our protocols refine the consistent hashing data structure that underlies the Chord (and Ko ..."
Abstract - Cited by 204 (1 self) - Add to MetaCart
Load balancing is a critical issue for the efficient operation of peer-to-peer networks. We give two new load-balancing protocols whose provable performance guarantees are within a constant factor of optimal. Our protocols refine the consistent hashing data structure that underlies the Chord (and Koorde) P2P network. Both preserve Chord’s logarithmic query time and near-optimal data migration cost. Consistent hashing is an instance of the distributed hash table (DHT) paradigm for assigning items to nodes in a peer-to-peer system: items and nodes are mapped to a common address space, and nodes have to store all items residing closeby in the address space. Our first protocol balances the distribution of the key address space to nodes, which yields a load-balanced system when the DHT maps items “randomly” into the address space. To our knowledge, this yields the first P2P scheme simultaneously achieving O(log n) degree, O(log n) look-up cost, and constant-factor load balance (previous schemes settled for any two of the three). Our second protocol aims to directly balance the distribution of items among the nodes. This is useful when the distribution of items in the address space cannot be randomized. We give a simple protocol that balances load by moving nodes to arbitrary locations “where they are needed.” As an application, we use the last protocol to give an optimal implementation of a distributed data structure for range searches on ordered data.

Graph-Theoretic Analysis of Structured Peer-to-Peer Systems: Routing Distances and Fault Resilience

by Dmitri Loguinov, Anuj Kumar, Vivek Rai, Sai Ganesh , 2003
"... This paper examines graph-theoretic properties of existing peer-to-peer architectures and proposes a new infrastructure based on optimal-diameter de Bruijn graphs. Since generalized de Bruijn graphs possess very short average routing distances and high resilience to node failure, they are well suite ..."
Abstract - Cited by 127 (7 self) - Add to MetaCart
This paper examines graph-theoretic properties of existing peer-to-peer architectures and proposes a new infrastructure based on optimal-diameter de Bruijn graphs. Since generalized de Bruijn graphs possess very short average routing distances and high resilience to node failure, they are well suited for structured peer-to-peer networks. Using the example of Chord, CAN, and de Bruijn, we first study routing performance, graph expansion, and clustering properties of each graph. We then examine bisection width, path overlap, and several other properties that affect routing and resilience of peer-to-peer networks. Having confirmed that de Bruijn graphs offer the best diameter and highest connectivity among the existing peer-to-peer structures, we offer a very simple incremental building process that preserves optimal properties of de Bruijn graphs under uniform user joins/departures. We call the combined peer-to-peer architecture
(Show Context)

Citation Context

...to-peer architecture is determined by the properties of these graphs, which typically possess diameter and degree at each node (where is the number of peers in the system). Until recently [13], [20], =-=[30]-=-, understanding whether these bounds were optimal and whether there existed fixed-degree graphs with diameter was an important topic of distributed hash table (DHT) research [34], [46]. In the first p...

Can ISPs and P2P users cooperate for improved performance

by Vinay Aggarwal, Anja Feldmann, Christian Scheideler, Michalis Faloutsos, Vinay Aggarwal, Anja Feldmann - ACM SIGCOMM Computer Communication Review , 2007
"... This paper addresses the antagonistic relationship between overlay/p2p networks and IPS providers: they both try to manage and control traffic at different level and with different goals, but in a way that inevitably leads to overlapping, duplicated, and conflicting behavior. The creation of a p2p n ..."
Abstract - Cited by 120 (5 self) - Add to MetaCart
This paper addresses the antagonistic relationship between overlay/p2p networks and IPS providers: they both try to manage and control traffic at different level and with different goals, but in a way that inevitably leads to overlapping, duplicated, and conflicting behavior. The creation of a p2p network and the routing at the p2p layer are ultimately treading on the routing functions of ISPs. The paper proposes a solution to develop a synergistic relationship between p2p and ISPs: ISPs maintain an “oracle ” to help p2p networks in making better choices in picking neighboring nodes. The solution provides benefits to both parties. ISPs become able to influence the p2p decisions, and ultimately the amount of traffic that flows in and out of their network, while p2p networks get performance information for “free. ” The reviewers find that the problem is important and the solution is interesting and shows promise. An advantage of the method is that ISPs do not run into legal issues, since they do not engage in caching of potentially illegal content, they just provide performance information. a c m s i g c o m m Public review written by
(Show Context)

Citation Context

...es) from p to q in H. It is well-known that any graph of n nodes and degree d has a hop count diameter of at least log d−1 n, and that dynamic overlay networks such as variants of the de Bruijn graph =-=[26]-=- can get very close to this lower bound, a very nice property. However, even though the hop count diameter may be small, the AS diameter (i.e., the distance between two P2P nodes when taking the under...

Know thy Neighbor's Neighbor: the Power of Lookahead in Randomized P2P Networks

by Gurmeet Singh Manku, Moni Naor, Udi Wieder - In Proceedings of the 36th ACM Symposium on Theory of Computing (STOC , 2004
"... Several peer-to-peer networks are based upon randomized graph topologies that permit e#cient greedy routing, e.g., randomized hypercubes, randomized Chord, skip-graphs and constructions based upon small-world percolation networks. In each of these networks, a node has out-degree #(log n), where n de ..."
Abstract - Cited by 102 (5 self) - Add to MetaCart
Several peer-to-peer networks are based upon randomized graph topologies that permit e#cient greedy routing, e.g., randomized hypercubes, randomized Chord, skip-graphs and constructions based upon small-world percolation networks. In each of these networks, a node has out-degree #(log n), where n denotes the total number of nodes, and greedy routing is known to take O(log n) hops on average. We establish lower-bounds for greedy routing for these networks, and analyze Neighbor-of-Neighbor (NoN)-greedy routing. The idea behind NoN, as the name suggests, is to take a neighbor's neighbors into account for making better routing decisions.

One torus to rule them all: Multi-dimensional queries in p2p systems

by Prasanna Ganesan, Beverly Yang, Hector Garcia-molina - In WebDB ’04: Proceedings of the 7th International Workshop on the Web and Databases , 2004
"... Peer-to-peer systems enable access to data spread over an extremely large number of machines. Most P2P systems support only simple lookup queries. However, many new applications, such as P2P photo sharing and massively multiplayer games, would benefit greatly from support for multidimensional range ..."
Abstract - Cited by 84 (1 self) - Add to MetaCart
Peer-to-peer systems enable access to data spread over an extremely large number of machines. Most P2P systems support only simple lookup queries. However, many new applications, such as P2P photo sharing and massively multiplayer games, would benefit greatly from support for multidimensional range queries. We show how such queries may be supported in a P2P system by adapting traditional spatialdatabase technologies with novel P2P routing networks and load-balancing algorithms. We show how to adapt two popular spatial-database solutions – kd-trees and space-filling curves – and experimentally compare their effectiveness. 1.
(Show Context)

Citation Context

...tribution is static, and does not change over time, it is possible to also obtain good load balance across nodes, using simple techniques developed for load balancing in distributed hash tables, e.g. =-=[1, 13]-=-. When the data distribution is itself dynamic, however, the insertion and deletion of tuples can make the partitions unbalanced even if the set of nodes is fixed. As ongoing work, we are investigatin...

Minimizing churn in distributed systems

by P. Brighten Godfrey, Scott Shenker, Ion Stoica , 2006
"... A pervasive requirement of distributed systems is to deal with churn — change in the set of participating nodes due to joins, graceful leaves, and failures. A high churn rate can increase costs or decrease service quality. This paper studies how to reduce churn by selecting which subset of a set of ..."
Abstract - Cited by 80 (3 self) - Add to MetaCart
A pervasive requirement of distributed systems is to deal with churn — change in the set of participating nodes due to joins, graceful leaves, and failures. A high churn rate can increase costs or decrease service quality. This paper studies how to reduce churn by selecting which subset of a set of available nodes to use. First, we provide a comparison of the performance of a range of different node selection strategies in five real-world traces. Among our findings is that the simple strategy of picking a uniform-random replacement whenever a node fails performs surprisingly well. We explain its performance through analysis in a stochastic model. Second, we show that a class of strategies, which we call “Preference List ” strategies, arise commonly as a result of optimizing for a metric other than churn, and produce high churn relative to more randomized strategies under realistic node failure patterns. Using this insight, we demonstrate and explain differences in performance for designs that incorporate varying degrees of randomization. We give examples from a variety of protocols, including anycast, overlay multicast, and distributed hash tables. In many cases, simply adding some randomization can go a long way towards reducing churn.
(Show Context)

Citation Context

...r of nodes. We will compare two different ways of selecting long-distance neighbors. Deterministic and randomized topologies In the first class of topologies, used in Chord [34], CAN [26], and others =-=[17, 25]-=-, each node v maintains links to the owners of certain other IDs which are a deterministic function of v’s ID. For example, Chord’s keyspace is {0,...,N − 1}, whereN = 2 160 , and node v maintains lin...

Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-Peer Networks

by Kirsten Hildrum, John Kubiatowicz - IN PROCEEDINGS OF THE 17TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING , 2003
"... In this paper, we show that two peer-to-peer systems, Pastry [13] and Tapestry [17] can be made tolerant to certain classes of failures and a limited class of attacks. These systems are said to operate properly if they can find the closest node matching a requested ID. ..."
Abstract - Cited by 57 (4 self) - Add to MetaCart
In this paper, we show that two peer-to-peer systems, Pastry [13] and Tapestry [17] can be made tolerant to certain classes of failures and a limited class of attacks. These systems are said to operate properly if they can find the closest node matching a requested ID.
(Show Context)

Citation Context

... performs well for almost all objects and almost all searchers. In their system, nodes have degree O(log 2 n). Naor and Wieder take a different approach. They build a constant-degree DHT (detailed in =-=[9]-=-), and then force each node to act for O(log n) others. Since the original degree was constant, the final degree is still a reasonable O(log n). Section 4 gives similar techniques that can be used to ...

Routing Networks for Distributed Hash Tables

by Gurmeet Singh Manku , 2003
"... Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing determin-istic routing topologies is presented. Using this technique, classical parallel interconnection networks can be adapted ..."
Abstract - Cited by 56 (7 self) - Add to MetaCart
Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing determin-istic routing topologies is presented. Using this technique, classical parallel interconnection networks can be adapted to handle the dynamic nature of participants in peer-to-peer networks. A unified picture of randomized routing topolo-gies is also presented. Two new protocols are described which improve average latency as a function of out-degree. One of the protocols can be shown to be optimal with high probability. Finally, routing networks for distributed hash-ing are revisited from a systems perspective and several open design problems are listed.
(Show Context)

Citation Context

...hoices made by all participants. b) Existing deterministic DHT routing networks are adaptations of specific parallel inter-connection networks: hypercubes [13, 26, 28], tori [26] and de Bruijn graphs =-=[10, 14, 24]-=-. We present a general technique for building deterministic DHTs that allows us to adapt any of the innumerable parallel routing topologies to handle the dynamic nature of P2P networks. Our constructi...

A Simple Fault Tolerant Distributed Hash Table

by Moni Naor, Udi Wieder - In Second International Workshop on Peer-to-Peer Systems , 2003
"... We introduce a distributed hash table (DHT) with logarithmic degree and logarithmic dilation. We show two lookup algorithms. The first has a message complexity of log n and is robust under random deletion of nodes. The second has parallel time of log n and message complexity of log^2 n. It is robust ..."
Abstract - Cited by 55 (5 self) - Add to MetaCart
We introduce a distributed hash table (DHT) with logarithmic degree and logarithmic dilation. We show two lookup algorithms. The first has a message complexity of log n and is robust under random deletion of nodes. The second has parallel time of log n and message complexity of log^2 n. It is robust under spam induced by a random subset of the nodes. The construction has competitive parameters when compared to other DHT's. Its main merits are its simplicity, its flexibility and the fresh ideas introduced in its design. It is very easy to modify and to add more sophisticated protocols, such as dynamic caching and erasure correcting codes.
(Show Context)

Citation Context

...em yet they do not describe a spam resistant lookup. The construction presented here is designed using design rules which we call continuous - discrete. These design rules are defined and analyzed in =-=[5]-=-, where their power is demonstrated by the suggestion of several distributed dynamic data structures. Among them is a constant degree DHT. The only previously known constant degree DHT is Viceroy [4] ...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University