Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays
نویسندگان
چکیده
Structured peer-to-peer hash tables provide decentralization, self-organization, failure-resilience, and good worst-case lookup performance for applications, but suffer from high latencies (O(logN )) in the average case. Such high latencies prohibit them from being used in many relevant, demanding applications such as DNS. In this paper, we present a proactive replication framework that can provide constant lookup performance for common Zipf-like query distributions. This framework is based around a closed-form optimal solution that achieves O(1) lookup performance with low storage requirements, bandwidth overhead and network load. Simulations show that this replication framework can realistically achieve good latencies, outperform passive caching, and adapt efficiently to sudden changes in object popularity, also known as flash crowds. This framework provides a feasible substrate for high-performance, low-latency applications, such as peer-to-peer domain name service.
منابع مشابه
Beehive: Exploiting Power Law Query Distributions for O(1) Lookup Performance in Peer to Peer Overlays
Structured peer-to-peer hash tables provide decentralization, self-organization, failure-resilience, and good worst-case lookup performance for applications, but suffer from high latencies (O( )) in the average case. Such high latencies prohibit them from being used in many relevant, demanding applications such as DNS. In this paper, we present a proactive replication framework that can achieve...
متن کاملPathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks
Peer-to-Peer networks are divided into two main classes: unstructured and structured. Overlays from the first class are better suited for exhaustive search, whereas those from the second class offer very efficient key-value lookups. In this paper we present a novel overlay, PathFinder, which combines the advantages of both classes within one single overlay for the first time. Our evaluation sho...
متن کاملSearch Performance Analysis in Peer-to-Peer Networks
Recently Peer-to-Peer networks (P2P) have gained great attention and popularity. One key challenging aspect in P2P resource sharing environments is efficient searching algorithm. This is especially important for Gnutella-like decentralized and unstructured networks since they have power-law degree distributions. A robust search algorithm should respond to the query message promptly without gene...
متن کاملByzantine Fault Tolerance of Inverse de Bruijn Overlay Networks for Secure P2P Routing
Byzantine faults in a peer-to-peer (P2P) system are resulted from adversarial and inconsistent peer behaviors. Malicious peers can disrupt the routing functions in peer joining and lookup services. Byzantine attackers may collude with each other to paralyze the entire P2P network operations. We discover a new class of DHT-based overlay networks, called inverse de Bruijn (IDB) graph, to enable m...
متن کاملA Performance Evaluation Framework for Mobile P2P Overlays under Churn
With the popular use of the mobile intelligence equipment, including smartphones and mobile tablets, mobile peer-to-peer (P2P) networks have become increasingly important. In recent years some mobile P2P overlays have been proposed. We propose a three-dimension evaluation framework for mobile P2P overlays under churn. Three P2P overlays, named as GIA, M-GIA, and KCCO(k-Clique Community Overlay)...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004