2012
DOI: 10.1007/978-3-642-32820-6_37
|View full text |Cite
|
Sign up to set email alerts
|

ID-Replication for Structured Peer-to-Peer Systems

Abstract: Structured overlay networks, like any distributed system, use replication to avoid losing data in the presence of failures. In this paper, we discuss the short-comings of existing replication schemes and propose a technique for replication, called ID-Replication. ID-Replication allows different replication degrees for keys in the system, thus allowing popular data to have more copies. We discuss how ID-Replication is less sensitive to churn compared to existing replication schemes, which makes ID-Replication b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…The drawback of symmetric method is the necessity of manipulating complex structure data each time replicating or searching a resource. This method presents a fixed value of replication factor (number of replicas), unlike ID replication where this factor varies between 2 values: rmin and rmax. The advantage of this latter is the no necessity of manipulating complex structure data, but it generates more messages to stabilize groups and to achieve load balance between them.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The drawback of symmetric method is the necessity of manipulating complex structure data each time replicating or searching a resource. This method presents a fixed value of replication factor (number of replicas), unlike ID replication where this factor varies between 2 values: rmin and rmax. The advantage of this latter is the no necessity of manipulating complex structure data, but it generates more messages to stabilize groups and to achieve load balance between them.…”
Section: Discussionmentioning
confidence: 99%
“…The joining/leaving implies the exchange of update messages between r nodes of the same class to maintain the replicas, which is much reduced compared to the approaches of the preceding category. ID‐Replication: The authors use the notion of group to express the notion of node, what means each range of resources is assigned to a corresponding group with specific identifier. As this method is applied on Chord, the group responsible of resource key is the one with ID equals or immediately superior than key, then all the r nodes of this group replicate the resource key.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Perhaps the closest approaches to ours are Scatter [24], ID-Replication [25], and Oracle's NoSQL database [17]. All these systems use consistent hashing and self-managing replication groups.…”
Section: Related Workmentioning
confidence: 99%
“…Kelips supports e cient lookups, but it does not present any solution for data replication and each node stores a pointer to every object owned by its virtual node, a property that severely limits its scalability. Concurrently to our work [28], [29] proposes an architecture inspired on similar principles; however Rollercain uses di↵erent techniques to perform joins, merges, and to maintain the routing table.…”
Section: Combining Structured and Unstructured Overlaysmentioning
confidence: 99%