skip to main content
10.1145/863955.863998acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

The impact of DHT routing geometry on resilience and proximity

Published:25 August 2003Publication History

ABSTRACT

The various proposed DHT routing algorithms embody several different underlying routing geometries. These geometries include hypercubes, rings, tree-like structures, and butterfly networks. In this paper we focus on how these basic geometric approaches affect the resilience and proximity properties of DHTs. One factor that distinguishes these geometries is the degree of flexibility they provide in the selection of neighbors and routes. Flexibility is an important factor in achieving good static resilience and effective proximity neighbor and route selection. Our basic finding is that, despite our initial preference for more complex geometries, the ring geometry allows the greatest flexibility, and hence achieves the best resilience and proximity performance.

References

  1. M. Castro, M. Jones, Anne-Marie Kermarrec, A. Rowstron, M. Theimer, H. Wang, and A. Wolman. An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays. In Proceedings of the INFOCOM 2003, San Francisco, April 2003.Google ScholarGoogle ScholarCross RefCross Ref
  2. Miguel Castro, Peter Drushel, Y.C. Hu, and Antony Rowstron. Exploiting Network Proximity in Peer-to-peer Networks. Technical Report MSR-TR-2002-82, Microsoft Research, 2002.Google ScholarGoogle Scholar
  3. Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP 2001), Lake Louise, AB, Canada, October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Peter Druschel and Antony Rowstron. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP 2001), Lake Louise, AB, Canada, October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. IRIS: Infrastructure for Resilient Internet Systems. http://iris.lcs.mit.edu, May 2002.Google ScholarGoogle Scholar
  6. David Karger Frans Kaashoek. Simple Constant-Space Distributed Hash Tables. In Proceedings of the IPTPS 2003, Berkeley, February 2003.Google ScholarGoogle Scholar
  7. Anjali Gupta, Barbara Liskov, and Rodrigo Rodrigues. One Hop Lookups for Peer-to-Peer Overlays. In Proceedings of the HotOS-IX 2003, Hawaii, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kirsten Hildrum, John D. Kubiatowicz, Satish Rao, and Ben Y. Zhao. Distributed Object Location in a Dynamic Environment. In Proceedings of the ACM SPAA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Sushant Jain, Ratul Mahajan, and David Wetherall. A Study of Performance Potential of DHT-based Overlays. In Proceedings of the 4th Usenix Symposium on Internet Technologies and Systems (USITS), Seattle, WA, USA, March 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. David R. Karger and Matthias Ruhl. Finding Nearest Neighbours in Growth-restricted Metrics. In Proceedings of the ACM STOC, Montreal, May 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Kleinberg. The small-world phenomenon: An algorithmic perspective. In Proceedings of the ACM STOC 2000, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. John Kubiatowicz. Oceanstore: An Architecture for Global-Scalable Persistent Storage. In Proceedings of the ASPLOS 2000, Cambridge, MA, USA, November 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Dmitri Loguinov, Anuj Kumar, Vivek Rai, and Sai Ganesh. Graph-Theoretic Analysis of Structured Peer-to-Peer Systems; Routing Distances and Fault Resilience. In Proceedings of the ACM SIGCOMM '03 Conference, Karlsruhe, Germany, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Dahlia Malkhi, Moni Naor, and David Ratajczak. Viceroy: A Scalable Dynamic Emulation of the Butterfly. In Proceedings of the PODC, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Petar Maymounkov and David Mazieres. Kademlia: A Peer-to-peer Information Systems Based on the XOR Metric.In Proceedings of the IPTPS 2002, Boston, March 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Greg Plaxton, Rajmohan Rajaraman, and Andrea W. Richa. Accessing Nearby Copies of Replicated Objects in a Distributed Environment. In Proceedings of the ACM SPAA, June 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. CAIDA: The Skitter Measurement Project. www.caida.org/tools/measurement/skitter/index.html, 2002.Google ScholarGoogle Scholar
  18. Sylvia Ratnasamy. A Scalable Content-Addressable Network. PhD thesis, University of California, Berkeley, October 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker. A Scalable Content-Addressable Network. In Proceedings of the ACM SIGCOMM 2001 Technical Conference, San Diego, CA, USA, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Sylvia Ratnasamy, Mark Handley, Richard Karp, and Scott Shenker. Application-level Multicast using Content-Addressable Networks. In Proceedings of the NGC 2001, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sylvia Ratnasamy, Mark Handley, Richard Karp, and Scott Shenker. Topologically-Aware Overlay Construction and Server Selection. In Proceedings of the INFOCOMM, 2002.Google ScholarGoogle Scholar
  22. Antony Rowstron and Peter Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), pages 329--350, November 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble. A Measurement Study of Peer-to-peer File Sharing Systems. In Proceedings of the Multimedia Computing and Networking Conference (MMCN), San Jose, CA, USA, January 2002.Google ScholarGoogle Scholar
  24. John Kubiatowicz Sean Rhea, Timothy Roscoe. DHTs Need Application-Driven Benchmarks. In Proceedings of the IPTPS 2003, Berkeley, February 2003.Google ScholarGoogle Scholar
  25. Ion Stoica, Robert Morris, David Karger, Frans Kaashoek, and Hari Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proceedings of the ACM SIGCOMM 2001, San Diego, CA, USA, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Marcel Waldvogel and Roberto Renaldi. Efficient Topology-Aware Overlay Network. In Proceedings of the HotNets-I 2002, Princeton, October 2002.Google ScholarGoogle Scholar
  27. Ben Y. Zhao, Anthony Joseph, and John D. Kubiatowicz. Locality Aware Mechanisms for Large-scale Networks. In Proceedings of the FuDiCo 02, Bertinoro, Italy, June 2002.Google ScholarGoogle Scholar
  28. B.Y. Zhao, K.D. Kubiatowicz, and A.D. Joseph. Tapestry: An Infrastructure for Fault-Resilient Wide-Area Location and Routing. Technical Report UCB//CSD-01-1141, University of California at Berkeley, April 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Shelley Q. Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, and John Kubiatowicz. Bayeux: An Architecture for Scalable and Fault-tolerant Wide-Area Data Dissemination. In Proceedings of the NOSSDAV 2001, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The impact of DHT routing geometry on resilience and proximity

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
        August 2003
        432 pages
        ISBN:1581137354
        DOI:10.1145/863955

        Copyright © 2003 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 August 2003

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        SIGCOMM '03 Paper Acceptance Rate34of319submissions,11%Overall Acceptance Rate554of3,547submissions,16%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader