Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays

نویسندگان

  • Venugopalan Ramasubramanian
  • Emin Gün Sirer
چکیده

Structured peer-to-peer hash tables provide decentralization, self-organization, failure-resilience, and good worst-case lookup performance for applications, but suffer from high latencies (O(logN )) in the average case. Such high latencies prohibit them from being used in many relevant, demanding applications such as DNS. In this paper, we present a proactive replication framework that can provide constant lookup performance for common Zipf-like query distributions. This framework is based around a closed-form optimal solution that achieves O(1) lookup performance with low storage requirements, bandwidth overhead and network load. Simulations show that this replication framework can realistically achieve good latencies, outperform passive caching, and adapt efficiently to sudden changes in object popularity, also known as flash crowds. This framework provides a feasible substrate for high-performance, low-latency applications, such as peer-to-peer domain name service.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Beehive: Exploiting Power Law Query Distributions for O(1) Lookup Performance in Peer to Peer Overlays

Structured peer-to-peer hash tables provide decentralization, self-organization, failure-resilience, and good worst-case lookup performance for applications, but suffer from high latencies (O( )) in the average case. Such high latencies prohibit them from being used in many relevant, demanding applications such as DNS. In this paper, we present a proactive replication framework that can achieve...

متن کامل

PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks

Peer-to-Peer networks are divided into two main classes: unstructured and structured. Overlays from the first class are better suited for exhaustive search, whereas those from the second class offer very efficient key-value lookups. In this paper we present a novel overlay, PathFinder, which combines the advantages of both classes within one single overlay for the first time. Our evaluation sho...

متن کامل

Search Performance Analysis in Peer-to-Peer Networks

Recently Peer-to-Peer networks (P2P) have gained great attention and popularity. One key challenging aspect in P2P resource sharing environments is efficient searching algorithm. This is especially important for Gnutella-like decentralized and unstructured networks since they have power-law degree distributions. A robust search algorithm should respond to the query message promptly without gene...

متن کامل

Byzantine Fault Tolerance of Inverse de Bruijn Overlay Networks for Secure P2P Routing

Byzantine faults in a peer-to-peer (P2P) system are resulted from adversarial and inconsistent peer behaviors. Malicious peers can disrupt the routing functions in peer joining and lookup services. Byzantine attackers may collude with each other to paralyze the entire P2P network operations. We discover a new class of DHT-based overlay networks, called inverse de Bruijn (IDB) graph, to enable m...

متن کامل

A Performance Evaluation Framework for Mobile P2P Overlays under Churn

With the popular use of the mobile intelligence equipment, including smartphones and mobile tablets, mobile peer-to-peer (P2P) networks have become increasingly important. In recent years some mobile P2P overlays have been proposed. We propose a three-dimension evaluation framework for mobile P2P overlays under churn. Three P2P overlays, named as GIA, M-GIA, and KCCO(k-Clique Community Overlay)...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004