The P2P MultiRouter: A black box approach to run-time adaptivity for P2P DHTs

James Newell, Indranil Gupta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Peer-to-peer distributed hash tables (p2p DHTs) are individually built by their designers with specific performance goals in mind. However, no individual DHT can satisfy an application that requires a "best of all worlds" performance, viz., adaptive behavior at run-time. We propose the MultiRouter, a light-weight solution that provides adaptivity to the application using a DHT-independent approach. By merely making run-time choices to select from among multiple DHT protocols using simple cost functions, we show the MultiRouter is able to provide a best-of-all-DHTs run-time performance with respect to object access times and churn-resistance. In addition, the MultiRouter is not limited to any particular set of DHT implementations since the interaction occurs in a black box manner, i.e., through well-defined interfaces. We present microbenchmark and trace-driven experiments to show that if one fixes bandwidth at each node, the MultiRouter outperforms the component DHTs.

Original languageEnglish (US)
Title of host publication2005 International Conference on Collaborative Computing
Subtitle of host publicationNetworking, Applications and Worksharing
StatePublished - 2005
Event2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing - San Jose, CA, United States
Duration: Dec 19 2005Dec 21 2005

Publication series

Name2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing
Volume2005

Other

Other2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing
CountryUnited States
CitySan Jose, CA
Period12/19/0512/21/05

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'The P2P MultiRouter: A black box approach to run-time adaptivity for P2P DHTs'. Together they form a unique fingerprint.

Cite this