11th IEEE International Conference on Network Protocols, 2003. Proceedings.
DOI: 10.1109/icnp.2003.1249775
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting routing redundancy via structured peer-to-peer overlays

Abstract: Structured peer-to-peer overlays provide a natural infrastructure for resilient routing via efficient fault detection and precomputation of backup paths. These overlays can respond to faults in a few hundred milliseconds by rapidly shifting between alternate routes. In this paper, we present two adaptive mechanisms for structured overlays and illustrate their operation in the context of Tapestry, a fault-resilient overlay from Berkeley. We also describe a transparent, protocol-independent traffic redirection m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(33 citation statements)
references
References 37 publications
0
33
0
Order By: Relevance
“…Ongoing work 4 is a knob for tuning the tradeoff between resources used and optimality of the resulting routing table. has shown Tapestry's viability as a resilient routing layer [31].…”
Section: ) Involuntary Node Deletionmentioning
confidence: 99%
“…Ongoing work 4 is a knob for tuning the tradeoff between resources used and optimality of the resulting routing table. has shown Tapestry's viability as a resilient routing layer [31].…”
Section: ) Involuntary Node Deletionmentioning
confidence: 99%
“…More recent protocols applying similar principles include [19] and [20]. Repair protocols used extensively in many DHT overlays also belong to this category (e.g., [8,21,22]). …”
Section: Introductionmentioning
confidence: 99%
“…This school of approaches mainly focuses on network anomaly and dynamic failure and is not beneficial to normal cases. Some other recently proposed algorithms also address the reliability problems of overlay networks [11,12,13,14], but they treat all the nodes equally without distinguishing the "critical" nodes from the ordinary ones. Indeed, critical nodes do exist in all sorts of distributed systems, such as critical nodes in service [16], in data or resources [11], and in topology.…”
Section: Related Workmentioning
confidence: 99%
“…The dynamic and self-organizing nature of large-scale distributed systems brings more challenges to this issue. Over the past few years, numerous methods and techniques have been proposed for monitoring, modeling, detecting failures [8,9,10], and various schemes have been developed to improve the availability and the system resiliency [11,12,13,14,15] to provide reliable services.…”
Section: Related Workmentioning
confidence: 99%