Novel Architectures for P2P Applications: The Continuous-Discrete Approach

被引:38
作者
Naor, Moni [1 ]
Wieder, Udi [2 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
[2] Microsoft Res, Mountain View, CA 94043 USA
关键词
Peer-to-peer networks; routing;
D O I
10.1145/1273340.1273350
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a new approach for constructing P2P networks based on a dynamic decomposition of a continuous space into cells corresponding to servers. We demonstrate the power of this approach by suggesting two new P2P architectures and various algorithms for them. The first serves as a DHT (distributed hash table) and the other is a dynamic expander network. The DHT network, which we call Distance Halving, allows logarithmic routing and load while preserving constant degrees. It offers an optimal tradeoff between degree and path length in the sense that degree d guarantees a path length of O (log(d) n). Another advantage over previous constructions is its relative simplicity. A major new contribution of this construction is a dynamic caching technique that maintains low load and storage, even under the occurrence of hot spots. Our second construction builds a network that is guaranteed to be an expander. The resulting topologies are simple to maintain and implement. Their simplicity makes it easy to modify and add protocols. A small variation yields a DHT which is robust against random Byzantine faults. Finally we show that, using our approach, it is possible to construct any family of constant degree graphs in a dynamic environment, though with worse parameters. Therefore, we expect that more distributed data structures could be designed and implemented in a dynamic environment.
引用
收藏
页数:37
相关论文
共 48 条
[1]  
ABRAHAM I., 2003, P INT PAR DISTR PROC, V40
[2]  
Aiello W., 1993, Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing, P632, DOI 10.1145/167088.167250
[3]  
Alon N., 2004, The probabilistic method
[4]  
[Anonymous], P SPAA
[5]  
Byers J. W., 1998, Computer Communication Review, V28, P56, DOI 10.1145/285243.285258
[6]   Essentially every unimodular matrix defines an expander [J].
Cai, JY .
THEORY OF COMPUTING SYSTEMS, 2003, 36 (02) :105-135
[7]  
Chankhunthod A, 1996, PROCEEDINGS OF THE USENIX 1996 ANNUAL TECHNICAL CONFERENCE, P153
[8]  
Cohen E, 2002, LECT NOTES COMPUT SC, V2461, P297
[9]   Optimal adaptive broadcasting with a bounded fraction of faulty nodes [J].
Diks, K ;
Pelc, A .
ALGORITHMICA, 2000, 28 (01) :37-50
[10]  
DUBHASHI D, 2005, CONCENTRATION MEASUR