[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1133373.1133397acmotherconferencesArticle/Chapter ViewAbstractPublication PagesewConference Proceedingsconference-collections
Article

Self-organization in peer-to-peer systems

Published: 01 July 2002 Publication History

Abstract

This paper addresses the problem of forming groups in peer-to-peer (P2P) systems and examines what dependability means in decentralized distributed systems. Much of the literature in this field assumes that the participants form a local picture of global state, yet little research has been done discussing how this state remains stable as nodes enter and leave the system. We assume that nodes remain in the system long enough to benefit from retaining state, but not sufficiently long that the dynamic nature of the problem can be ignored. We look at the components that describe a system's dependability and argue that next-generation decentralized systems must explicitly delineate the information dispersal mechanisms (e.g., probe, event-driven, broadcast), the capabilities assumed about constituent nodes (bandwidth, up-time, re-entry distributions), and distribution of information demands (needles in a haystack vs. hay in a haystack [13]). We evaluate two systems based on these criteria: Chord [22] and a heterogeneous-node hierarchical grouping scheme [11]. The former gives a > 1% failed request rate under normal P2P conditions and a prototype of the latter a similar rate under more strenuous conditions with an order of magnitude more organizational messages. This analysis suggests several methods to greatly improve the prototype.

References

[1]
E. Adar and B. Huberman. Free riding on Gnutella. First Monday, 5(10), October 2000.
[2]
P. Bak and K. Sneppen. Punctuated equilibrium and criticality in a simple model of evolution. Physical Review Letters, 71:4083, 1993.
[3]
P. Bernstein, M. Brodie, S. Ceri, D. DeWitt, M. Franklin, H. Garcia-Molina, J. Gray, J. Held, J. Hellerstein, H. V. Jagadish, M. Lesk, D. Maier, J. Naughton, H. Pirahesh, M. Stonebraker, and J. Ullman. The asilomar report on database research. ACM SIGMOD Record, December 1998.
[4]
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422--426, 1970.
[5]
I. Clarke. Freenet: A distributed anonymous information storage and retrieval system. http://freenetproject.org/cgi-bin/twiki/view/Main/ICSI, 2001.
[6]
F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), October 2001.
[7]
P. Druschel and A. Rowstron. Past: A large-scale, persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), October 2001.
[8]
Gnutella. Gnutella protocol specification v0.4. http://www.clip2.com/GnutellaProtoco104.pdf, 2001.
[9]
J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan. Building efficient wireless sensor networks with low-level naming. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), October 2001.
[10]
J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. Oceanstore: An architecture for global-scale persistent storage. In Proceedings of ACM ASPLOS. ACM, November 2000.
[11]
J. Ledlie, L. Serban, and D. Toncheva. Scaling filename queries in a large-scale distributed file system. Research Report TR-03-02, Harvard University, January 2002.
[12]
D. Liben-Nowell, H. Balakrishnan, and D. Karger. Observations on the dynamic evolution of peer-to-peer networks. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, March 2002.
[13]
Q. Lv, S. Ratnasamy, and S. Shenker. Can heterogeneity make Gnutella scalable? In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, March 2002.
[14]
M. Mitzenmacher. Compressed Bloom filters. In Twentieth ACM Symposium on Principles of Distributed Computing (PODC 2001), 2001.
[15]
C. Perez, A. Corral, A. Diaz-Guilera, K. Christensen, and A. Arenas. On self-organized criticality and synchronization in lattice models of coupled dynamical systems. International Journal of Modern Physics B, 10:1111, 1996.
[16]
M. Ramakrishna. Practical performance of Bloom filters and parallel free-text searching. Communications of the ACM, 32(10):1237--1239, October 1989.
[17]
S. Rhea and J. Kubiatowicz. Probabilistic location and routing. In INFOCOM 2002, January 2002.
[18]
M. Ripeanu. Peer-to-peer architecture case study: Gnutella network. In Proceedings of International Conference on Peer-to-peer Computing, August 2001.
[19]
J. Ritter. Why Gnutella can't scale. http://www.darkridge.com/~jpr5/doc/gnutella.html, 2001.
[20]
S. Saroiu, P. K. Gummadi, and S. D. Gribble. A measurement study of peer-to-peer file sharing systems. In Proceedings of the Multimedia Computing and Networking (MMCN), San Jose, CA, January 2002.
[21]
I. Stoica. Chord simulator. http://www.fs.net/cvs/sfsnet/simulator/?cvsroot=CFS-CVS, 2001.
[22]
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the ACM SIGCOMM '01 Conference, August 2001.
[23]
I. Stoica, R. Morris, D. Liben-Nowell, D. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. Research report, MIT, January 2002.
[24]
P. Weichman, A. Harter, and D. Goodstein. Colloquium: Criticality and superfluidity in liquid 4he under nonequilibrium conditions. Reviews of Modern Physics, 73:1, 2001.
[25]
B. Wilcox-O'Hearn. Experiences deploying a large-scale emergent network. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, March 2002.
[26]
B. Y. Zhao, Y. Duan, L. Huang, A. D. Joseph, and J. D. Kubiatowicz. Brocade: Landmark routing on overlay networks. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, March 2002.

Cited By

View all
  • (2019)ElfStore: A Resilient Data Storage Service for Federated Edge and Fog Resources2019 IEEE International Conference on Web Services (ICWS)10.1109/ICWS.2019.00062(336-345)Online publication date: Jul-2019
  • (2017)Multi-Dimensional Bloom Filter: Design and EvaluationIEICE Transactions on Information and Systems10.1587/transinf.2016INP0022E100.D:10(2368-2372)Online publication date: 2017
  • (2014)Indexing bipartite memberships in web graphsProceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.5555/3191835.3191868(166-173)Online publication date: 17-Aug-2014
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
EW 10: Proceedings of the 10th workshop on ACM SIGOPS European workshop
July 2002
258 pages
ISBN:9781450378062
DOI:10.1145/1133373
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2002

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 37 of 37 submissions, 100%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)ElfStore: A Resilient Data Storage Service for Federated Edge and Fog Resources2019 IEEE International Conference on Web Services (ICWS)10.1109/ICWS.2019.00062(336-345)Online publication date: Jul-2019
  • (2017)Multi-Dimensional Bloom Filter: Design and EvaluationIEICE Transactions on Information and Systems10.1587/transinf.2016INP0022E100.D:10(2368-2372)Online publication date: 2017
  • (2014)Indexing bipartite memberships in web graphsProceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.5555/3191835.3191868(166-173)Online publication date: 17-Aug-2014
  • (2012)Duplicate detection in pay-per-click streams using temporal stateful Bloom filtersInternational Journal of Data Analysis Techniques and Strategies10.1504/IJDATS.2012.0504054:4(340-377)Online publication date: 1-Nov-2012
  • (2012)A complex event routing infrastructure for distributed systemsJournal of Parallel and Distributed Computing10.1016/j.jpdc.2011.11.00572:3(450-461)Online publication date: 1-Mar-2012
  • (2012)Optimizing hash function number for BF-Based object locating algorithmProceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part II10.1007/978-3-642-31020-1_65(543-552)Online publication date: 17-Jun-2012
  • (2011)The context of coordinating groups in dynamic mobile networksProceedings of the 13th international conference on Coordination models and languages10.5555/2022052.2022056(49-64)Online publication date: 6-Jun-2011
  • (2011)Bounded vector signatures and their applicationsProceedings of the 6th ACM Symposium on Information, Computer and Communications Security10.1145/1966913.1966949(277-285)Online publication date: 22-Mar-2011
  • (2011)The Context of Coordinating Groups in Dynamic Mobile NetworksCoordination Models and Languages10.1007/978-3-642-21464-6_4(49-64)Online publication date: 2011
  • (2010)Authentication and secret search mechanisms for RFID-aware wireless sensor networksInternational Journal of Security and Networks10.1504/IJSN.2010.0307195:1(15-25)Online publication date: 1-Dec-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media