TITLE

Distributed redundancy strategy in P2P environment

AUTHOR(S)
Lei Yang; Zhi-guang Qin; Can Wang; Hao Yang
PUB. DATE
February 2012
SOURCE
International Journal of Digital Content Technology & its Applic;Feb2012, Vol. 6 Issue 3, p148
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
P2P storage architecture plays an important role in distributed storage systems. For P2P dynamic environment, the sufficient redundant data must be maintained to ensure the data availability. System will pay various costs to maintain redundant data. In this paper, the costs of the bandwidth that are respectively caused by the methods of replication and erasure coding are qualitatively analyzed based on Markov chain model. Combined the advantage of replication and erasure coding, a new hybrid redundancy strategy is proposed. Just as replication, the downloaded files automatically are viewed as shared files for next downloading. Like erasure coding, when the availability of one file needs to be repaired, anyone of peers which store the fully copy of this file is assigned to generate and distribute new fragments. The analysis result shows that the hybrid redundancy strategy can maintain the appropriate level of redundancy and save more bandwidth than the traditional redundancy strategy in a variety of network environment.
ACCESSION #
76388483

 

Related Articles

  • Dependability in Peer-to-Peer Systems. DePaoli, Flavio; Mariani, Leonardo // IEEE Internet Computing;Jul/Aug2004, Vol. 8 Issue 4, p54 

    Server-centric architectures such as the Web's suffer from well-known problems related to application size and increasing user requests. Peer-to-peer systems can help address some of the key challenges, but this survey of several current P2P systems shows that dependability remains an open...

  • A Recommendation Trust Method Based on Fuzzy Clustering in P2P Networks. Liangmin Guo; Yonglong Luo; Zhengzhen Zhou; Meijing Ji // Journal of Software (1796217X);Feb2013, Vol. 8 Issue 2, p357 

    In this paper, we apply the thought of maximal tree to propose a peer classification method. It's based on fuzzy clustering. The method classifies effectively the recommendation peers according to their trusted level. Finally, the experiment results show that if you choose the recommendation...

  • Impact of Feedback on Trust in P2P Networks. Zhihua Huang; Songnian Lu; Aixin Zhang; Jie Gu // Journal of Networks;Aug2012, Vol. 7 Issue 8, p1182 

    Feedback plays an important role in P2P trust systems. Existing trust systems usually assume that most of normal peers have idealized feedback behaviors, that is, peers can provide honest feedback after download immediately. However, studies show that feedback sparsity and delay widely exist in...

  • PEER-2-PEERING INTO THE FUTURE. Millard, Elizabeth // ABA Journal;Mar2002, Vol. 88 Issue 3, p66 

    Focuses on the peer-to-peer (P2P) technology, which lets users access each other's files without having to store the information in a central place such as a company mainframe. Information on NextPage's Matrix P2P application; Security problem with P2P technology; Benefits of P2P technology to...

  • Understanding peer-to-peer computing. Edwards, Morris // Communications News;Oct2001, Vol. 38 Issue 10, p71 

    Provides information on peer-to-peer (P2P) computing. Concept of P2P computing; Early uses of P2P computing; Promise holds by P2P for software interaction.

  • Appendix D: Overview of Peer-to-Peer (P2P) Networks.  // Defending the Brand;2004, p235 

    Information on different frameworks for a peer-to-peer network that relate to topics discussed in the book "Defending the Brand" is presented.

  • Peer-to-peer. Connolly, P. J. // InfoWorld;1/7/2002, Vol. 24 Issue 1, p35 

    Focuses on the emergence and the effect of peer-to-peer file sharing technology on business collaboration. Challenging area where the technology can be used; Concerns on security and architecture in relation to the technology.

  • Journey to the Edge: Peer-to-Peer Computing and Content Control. Arnold, Steve // Searcher;Oct2001, Vol. 9 Issue 9, p64 

    Provides information on peer-to-peer (P2P) computing. Challenges posed by P2P architectures; Overview of the building blocks of P2P services; Information on the Gnutella portal in which peers can interact as if working on one system.

  • An Empirical Analysis of Network Externalities in Peer-to-Peer Music-Sharing Networks. Asvanund, Atip; Clay, Karen; Krishnan, Ramayya; Smith, Michael D. // Information Systems Research;Jun2004, Vol. 15 Issue 2, p155 

    Peer-to-peer (P2P) file sharing networks are an important medium for the distribution of information goods. However, there is little empirical research into the optimal design of these networks under real-world conditions. Early speculation about the behavior of P2P networks has focused on the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics