Academia.eduAcademia.edu

Outline

Proportional Replication in Peer-to-Peer Networks

2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications

Abstract

We recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages. In this paper we complement those results to show that this distribution has network-wide advantages as well. Given these benefits of proportional replication, the next issue is achieving proportional replication in a decentralized manner. We show that local storage management algorithms like LRU automatically achieve near-proportional replication and that the system performance with the replica distribution achieved by LRU is very close to optimal. We also show that the LRU responds to a change in user access pattern quickly (the number of accesses taken to reach the new steady-state replica distribution with LRU is close to the minimum possible with any cache replacement algorithm). Analytical models are provided for computing the steady-state network-wide replica distribution and the transient period for LRU.

References (20)

  1. M. Adler, R. Kumar, K. Ross, D. Rubenstein, T.Suel and D. Yao, "Optimal Peer Selection for P2P Downloading and Streaming," In Proc. of IEEE INFOCOM 2005.
  2. L. Breslau, P. Cao, G. Phillips, and S. Shenker, "Web caching and Zipf- like distributions: Evidence and implications," In Proc. of IEEE INFOCOM 1999.
  3. A. Bhide, A. Dan, D. M. Dias, "A Simple Analysis of the LRU Buffer Policy and Its Relationship to Buffer Warm-Up Transient," In Proc. of ICDE 1993.
  4. F. Clévenot and P. Nain, "A Simple Model for the Analysis of the Squirrel Peer-to-peer Caching System," In Proc. of IEEE INFOCOM 2004.
  5. A. Dan and D. Towsley, "An Approximate Analysis of the LRU and FIFO Buffer Replacement Schemes," In Proc. of ACM SIGMETRICS 1990.
  6. C. Faloutsos, M. Faloutsos, P. Faloutsos, "On power-law relationships of the internet topology," In Proc. of ACM SIGCOMM 1999.
  7. K. P. Gummadi, et al., "Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload," In Proc. of ACM SOSP 2003.
  8. J. Kubiatowicz et. al., "OceanStore: An Architecture for Global-scale Persistent Storage," In Proc. of ASPLOS 2000.
  9. N. Laoutaris, V. Zissimopoulos, I. Stavrakakis, "On the Optimization of Storage Capacity Allocation for Content Distribution," Computer Networks, Vol. 47, No. 3, pp. 409-428, February 2005.
  10. C. Lindemann and O. P. Waldhorst, "Modeling Epidemic Information Dissemination on Mobile Devices with Finite Buffers," In Proc. of ACM SIGMETRICS 2005.
  11. L. Massoulie, M. Vojnovic, "Coupon Replication Systems," In Proc. of ACM SIGMETRICS 2005.
  12. A. Rowstron and P. Druschel, "Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility", In Proc. of SOSP 2001.
  13. D. Rubenstein and S. Sahu, "Can Unstructured P2P Protocols Survive Flash Crowds?," IEEE/ACM Trans. on Networking, Vol. 13, No. 3, pp. 501-512, April 2005.
  14. D. Starobinski and D. Tse, "Probabilistic Methods for Web Caching," Performance Evaluation, Vol 46, Nos. 2-3, October 2001.
  15. H. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, and W. Willinger, "Network topology generators: Degree-based vs structural," In Proc. of ACM SIGCOMM 2002.
  16. S. Tewari, and L. Kleinrock, "Analysis of Search and Replication in Unstructured Peer-to-Peer Networks," In Proc. of ACM SIGMETRICS 2005.
  17. S. Tewari, and L. Kleinrock, "Search and Replication in Unstructured Peer-to-Peer Networks," UCLA Computer Science Dept Technical Report UCLA-CSD-TR050006, March 2005.
  18. S. Tewari, and L. Kleinrock, "On Fairness, Optimal Download Performance and Proportional Replication in Peer-to-Peer Networks," In Proc. of IFIP Networking 2005.
  19. S. Tewari, and L. Kleinrock, "Optimal Search Performance in Unstructured Peer-to-Peer Networks With Clustered Demands," to appear in Proc. of ICC 2006.
  20. L. Rizzo and L.Vicisano, "Replacement policies for a proxy cache," UCL-CS Research Note RN/98/13.