Robust Object Replication in a DHT Ring
نویسندگان
چکیده
There have been a lot of studies on distributed storage systems and peer-to-peer file systems based on distributed hash tables (DHTs), in which nodes have global unique identifiers generated by a hash function. Since such distributed systems are built on top of a heterogeneous and unreliable infrastructure, replication techniques are often used to improve object availability. However, typical consecutive replication technique provided by DHTs can encounter replication failures caused by storage imbalance due to some reasons such as storage heterogeneity, various file size distribution, or insert rush to some ID regions. In this project, we develop heuristics to provide robust object replication by exploring more nodes than the traditional replication technique. According to the simulation result conducted on PlanetSim, the suggested heuristics significantly diminish replication failure rate with a little overhead. In addition, we present how to maintain replicas with the suggested heuristics in churn situations which is pretty common in wide-area distributed systems.
منابع مشابه
Dihydrotestosterone, a robust promoter of osteoblastic proliferation and differentiation: understanding of time-mannered and dose-dependent control of bone forming cells
Objective(s): The present study was aimed to evaluate the time-mannered and dose-dependent effects of 5α-dihydrotestosterone (5α-DHT) on the proliferation and differentiation of bone forming cells using MC3T3-E1 cells. Materials and Methods: Cell proliferation was analyzed using MTS and phase contrast microscopic assays. Osteogenic differentiation was assessed through a series of in vitro exper...
متن کاملSet Functionality over DHT Systems
For the last few years, Peer-to-Peer systems were created with the purpose of distributing information across a very large set of hosts. The scalability demands of such systems lead to the design of Distributed Hash Tables algorithms[1, 2, 3, 4], which are capable of locating an object anywhere on the system given a key value using logarithmic (or constant) message hops while maintaining logari...
متن کاملEntropy and Search Distance in Peer-to-Peer Networks
We had previously shown that the average search distance in unstructured peer-to-peer networks having an Erdos-Renyi random graph search topology is minimized when the number of replicas of objects is proportional to the object request probabilities and this results in a minimum search distance is equal to the entropy in object request probabilities minus the logarithm of per-node cache size. I...
متن کاملStoring and managing data in a distributed hash table
Distributed hash tables (DHTs) have been proposed as a generic, robust storage infrastructure for simplifying the construction of large-scale, wide-area applications. For example, UsenetDHT is a new design for Usenet News developed in this thesis that uses a DHT to cooperatively deliver Usenet articles: the DHT allows a set of N hosts to share storage of Usenet articles, reducing their combined...
متن کاملEnhancing Data Locality in a Fully Decentralised P2P Cycle Stealing Framework
Peer-to-peer (P2P) networks such as Gnutella and BitTorrent have revolutionised Internet based applications. P2P approaches provide a number of benefits, however most cycle stealing projects, such as SETI@home, have concentrated on centralised methods which still require massive amounts of concentrated network bandwidth in order to scale. More recent P2P research has developed the concept of di...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007