1 / 8

Replication for P2PSIP

Replication for P2PSIP. Bruce Lowekamp 12/5/2007. Replication vs Erasure Codes.

judyallen
Download Presentation

Replication for P2PSIP

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Replication for P2PSIP Bruce Lowekamp 12/5/2007

  2. Replication vs Erasure Codes • This talk discusses “replication.” For P2PSIP, where the primary resource is a AoR->URI or similar mapping, this is the right approach. For storage of larger objects, mechanisms such as erasure codes are more appropriate. Most of the same issues of placement and responsibility are still applicable with only slight modifications.

  3. The Questions • What should replication achieve? • What peer is responsible for replication? • What layer is responsible? • How many replicas? • Where to put the replicas?

  4. Goals of Replication • Persistence • Data retained after crash of responsible peer • “Permanence” after storing peer leaves • Security • DoS by responsible peer • Routing attacks along path to responsible peer • Load Balancing • Queries for a popular resource distributed between replicas

  5. Popular Replication Schemes • Neighbors/Successors • Persistence with loss of responsible peer • DHT-dependent definition • Successor vulnerable to routing attacks • Typically depends on responsible peer • Random replicas • Fixed offsets or text addition before hashing • Paths to different replicas are independent • Harder to replace on loss of responsible peer • Query-path • Replicas added along path to responsible peer • Good for load balancing

  6. Who Replicates? • Storing (owner) peer • Cares the most about the outcome • Should bear work responsibility • Can’t refresh after leaving • Responsible peer • “Responsible” • Easiest support for “permanent” resources • Low overhead for neighbors • Higher overhead for random replicas • Replicas • Can pull/refresh what you replicate

  7. What Layer Replicates? • DHT • Appropriate replication scheme related to DHT algorithm • Application • Knows requirements • Persistence • Reliability • Popularity • Knows when owner is present • Only layer that can generate new signatures (if needed)

  8. Possible Solutions? • Neither DHT or Application layer can solve all problems for different types of data. • Proposal: We need both • DHT-level replication always appropriate, can’t be done by application-layer. • Only application-layer knows enough about requirements to justify/define further replication. • Responsible/replica peer needs to make application-layer decisions about its resources if they have different persistence requirements. Not just DHT-level. • Interaction between these layers may be useful to detect malicious peers.

More Related