Performance of redundancy methods in P2P networks under churn

Peer-to-Peer (P2P) networks organize large amounts of resources distributed across the Internet for user access. However, the availability of these resources is hindered by the participants' transient connectivity. Redundancy can be used to deal with this problem, but the redundancy repair traffic must be controlled to prevent performance degradation. In this paper, we present a comprehensive analytical formulation for erasure code redundancy methods in P2P networks, focused on fragments availability and redundancy repair cost. We use this model to evaluate the effectiveness of a proposed new redundancy scheme (PR) that outperforms other methods. Our results provide important insights for the design and construction of automated content availability mechanisms for P2P overlays under churn. Our evaluation framework allows us to determine at which point substituting a traditional erasure coding method (MDS) with other schemes is viable. For instance, e_MBR network coding performs worst than MDS for average fragment availabilities below 0.52. In addition, our experimental results indicate that adaptive repair strategies with elastic maintenance intervals can produce significant bandwidth savings compared with reactive and periodic redundancy repair strategies. In our experimental evaluation, an adaptive repair strategy consumes up to 49% less bandwidth than its periodic counterpart.

[1]  Reza Rejaie,et al.  Is content publishing in BitTorrent altruistic or profit-driven? , 2010, CoNEXT.

[2]  Dmitri Loguinov,et al.  Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[3]  Nihar B. Shah,et al.  Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction , 2010, IEEE Transactions on Information Theory.

[4]  D. M. Chiu,et al.  Erasure code replication revisited , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..

[5]  John Kubiatowicz,et al.  Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.

[6]  Bin Li,et al.  Content Availability and Bundling in Swarming Systems , 2009, IEEE/ACM Transactions on Networking.

[7]  John Kubiatowicz,et al.  Handling churn in a DHT , 2004 .

[8]  Jussi Kangasharju,et al.  Optimizing File Availability in Peer-to-Peer Content Distribution , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[9]  Daniel Stutzbach,et al.  Understanding churn in peer-to-peer networks , 2006, IMC '06.

[10]  Panayotis Antoniadis,et al.  Incentives for content availability in memory-less peer-to-peer file sharing systems , 2005, SECO.

[11]  Rodrigo Rodrigues,et al.  High Availability in DHTs: Erasure Coding vs. Replication , 2005, IPTPS.

[12]  David Moore,et al.  Replication Strategies for Highly Available Peer-to-Peer Storage , 2002, Future Directions in Distributed Computing.

[13]  Eduardo Pinheiro,et al.  Failure Trends in a Large Disk Drive Population , 2007, FAST.

[14]  Rodrigo Rodrigues,et al.  Proceedings of Hotos Ix: the 9th Workshop on Hot Topics in Operating Systems Hotos Ix: the 9th Workshop on Hot Topics in Operating Systems High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two , 2022 .

[15]  Alexandros G. Dimakis,et al.  Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.