Insight into redundancy schemes in DHTs

Chen, Guihai; Qiu, Tongqing; Wu, Fan
February 2008
Journal of Supercomputing;Feb2008, Vol. 43 Issue 2, p183
Academic Journal
In order to provide high data availability in peer-to-peer (P2P) DHTs, proper data redundancy schemes are required. This paper compares two popular schemes: replication and erasure coding. Unlike previous comparison, we take user download behavior into account. Furthermore, we propose a hybrid redundancy scheme, which shares user downloaded files for subsequent accesses and utilizes erasure coding to adjust file availability. Comparison experiments of three schemes show that replication saves more bandwidth than erasure coding, although it requires more storage space, when average node availability is higher than 47%; moreover, our hybrid scheme saves more maintenance bandwidth with acceptable redundancy factor.


Related Articles

  • iDispatcher: A unified platform for secure planet-scale information dissemination. Rahman, Md; Yan, Guanhua; Madhyastha, Harsha; Faloutsos, Michalis; Eidenbenz, Stephan; Fisk, Mike // Peer-to-Peer Networking & Applications;Mar2013, Vol. 6 Issue 1, p46 

    Traditional software and security patch update delivery mechanisms rely on a client/server approach where clients pull updates from servers regularly. This approach, however, suffers a high window of vulnerability (WOV) for clients and the risk of a single point of failure. Overlay-based...

  • eDonkey. Taylor, Nathan // Australian PC User;Oct2006, Vol. 18 Issue 10, p89 

    The article focuses on eDonkey2000 which was the original client for the network, with the open source eMule coming along much later. Although it invented the eDonkey/eMule network, eDonkey has moved away from the server-based style of eMule and now uses a network called Overnet by default,...

  • Sync Outlook Content Between Multiple Computers. Mader, Carolyn // Windows IT Pro;Apr2005, Vol. 11 Issue 4, p78 

    Features Vatia OSI's Outlook Sharing Add-in and Syncrhonizer software that lets users synchronize Microsoft Outlook content between multiple computers. Specifications; Capabilities; Target markets.

  • Share and share alike. Bannan, James // APC (Bauer Media Group);Nov2005, Vol. 25 Issue 11, p92 

    This article presents suggestions on secured computer file sharing. Windows XP is an operating system designed for communication, letting users interact, share data and more. The problem is that XP makes it a little too easy. What needs to be kept in mind when assessing XP's file-sharing...

  • Harvard Teams Up With Dutch Colleagues to Use Bandwidth as Global Currency.  // SWE Magazine;Oct2007, Vol. 53 Issue 5, p69 

    The article reports on the collaboration between computer scientists at Harvard University's School of Engineering and Applied Sciences and colleagues from the Netherlands to use a free download peer-to-peer video-sharing application to explore the use of bandwidth as a global currency in...

  • HFBP: Identifying P2P Traffic by Host Level and Flow Level Behavior Profiles. Jinghua Yan; Xiaohui Fan // Journal of Networks;Aug2013, Vol. 8 Issue 8, p1866 

    Recently, Peer-to-peer (P2P) networks have been widely applied in streaming media, instant messaging, file sharing and other fields, which have occupied more and more network bandwidth. Accurately identify P2P traffic is very important to management and control P2P traffic. In this paper, we...

  • Reward mechanisms for P2P VoIP networks. Li, Yung-Ming; Jhang-Li, Jhih-Hua; Cheng, Ding-Yuan // Information Technology & Management;Jun2010, Vol. 11 Issue 2, p91 

    As we have seen, P2P VoIP software, such as Skype, has emerged from the current generation of telecommunication systems. However, establishing communication applications based on P2P networks without considering the operational models of the Internet presents potential dangers. In this study, we...

  • Add Rocksteady to List of Bandwidth-Aid Applications. Stump, Matt // Multichannel News;4/26/2004, Vol. 25 Issue 17, p72 

    Reports that broadband vendor Rocksteady Networks Inc. has launched a bandwidth management software for the cable industry's tiered business services and residential peer-to-peer limitations. Reasons for the need to manage peer-to-peer traffic in parts of Austin, Texas populated by college...

  • Welcome! Vermeulen, Courtenay // Canadian Student Review;Winter2009, p3 

    The article discusses various reports published within the issue, including one by Christine van Geyn on the legality of peer-to-peer file-sharing networks, another by Obioma Osuji on the accounting standards overhaul in Canada, and an article by David Karp on the results of the referendum on...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics