Publication | Closed Access
Availability and Redundancy in Harmony: Measuring Retrieval Times in P2P Storage Systems
14
Citations
23
References
2010
Year
Unknown Venue
Software MaintenanceCluster ComputingDistributed File SystemAvailabilityEngineeringP2p Storage SystemsStorage ManagementStorage SystemsInformation RetrievalData ScienceMeasuring Retrieval TimesData IntegrationBig DataData ManagementAvailability IssueAvailability (System)Computer ScienceEdge ComputingReal P2p TracesCloud ComputingPeer-to-peer DatabaseDistributed Data StorePermanent Peer Failures
Peer-to-peer (P2P) storage systems are strongly affected by churn - temporal and permanent peer failures. Because of this churn, the main requirement of such systems is to guarantee that stored objects can always be retrieved. This requirement is specially needed in two main situations: when users want to access the stored objects or when data maintenance processes have to repair lost information. To meet this requirement, exiting P2P storage systems introduce large amounts of redundancy that maintain data availability close to 100%. Unfortunately, these large amounts of redundancy increase the storage costs, either by reducing the overall net capacity or by increasing the communication required for data maintenance. In order to minimize storage costs, P2P storage systems can reduce data redundancy. However, less redundancy means lower data availability, which leads to increase object retrieval times. Unfortunately, longer retrieval times could compromise data maintenance processes and could penalize user's retrieval times. It is crucial then for P2P storage systems to predict the effects of a redundancy reduction. In order to provide this information, we present a novel analytical framework to measure object retrieval times under different redundancy and churn circumstances. Our framework can be directly used by backup applications aiming to maintain durability at the lower cost, or by data sharing applications that seek to reduce costs by penalizing user retrieval times. We validate our framework by simulation using real P2P traces (Skype and eMule's KAD).
| Year | Citations | |
|---|---|---|
Page 1
Page 1