About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International Conference on Collaborative Computing: Networking, Applications and Worksharing

Research Article

The P2P MultiRouter: a black box approach to run-time adaptivity for P2P DHTs

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/COLCOM.2005.1651216,
        author={James Newell and Indranil Gupta},
        title={The P2P MultiRouter: a black box approach to run-time adaptivity for P2P DHTs},
        proceedings={1st International Conference on Collaborative Computing: Networking, Applications and Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2006},
        month={7},
        keywords={Access protocols  Application software  Bandwidth  Computer science  Cost function  Engineering profession  Peer to peer computing  Routing  Runtime},
        doi={10.1109/COLCOM.2005.1651216}
    }
    
  • James Newell
    Indranil Gupta
    Year: 2006
    The P2P MultiRouter: a black box approach to run-time adaptivity for P2P DHTs
    COLLABORATECOM
    IEEE
    DOI: 10.1109/COLCOM.2005.1651216
James Newell1,*, Indranil Gupta1,*
  • 1: Department of Computer Science University of Illinois Urbana-Champaign Urbana, IL 61801.
*Contact email: jnewell2@cs.uiuc.edu, indy@cs.uiuc.edu

Abstract

Peer-to-peer distributed hash tables (P2P DHTs) are individually built by their designers with specific performance goals in mind. However, no individual DHT can satisfy an application that requires a "best of all worlds" performance, viz., adaptive behavior at run-time. We propose the MultiRouter, a light-weight solution that provides adaptivity to the application using a DHT-independent approach. By merely making run-time choices to select from among multiple DHT protocols using simple cost functions, we show the MultiRouter is able to provide a best-of-all-DHTs run-time performance with respect to object access times and churn-resistance. In addition, the MultiRouter is not limited to any particular set of DHT implementations since the interaction occurs in a black box manner, i.e., through well-defined interfaces. We present microbenchmark and trace-driven experiments to show that if one fixes bandwidth at each node, the MultiRouter outperforms the component DHTs.

Keywords
Access protocols Application software Bandwidth Computer science Cost function Engineering profession Peer to peer computing Routing Runtime
Published
2006-07-24
Publisher
IEEE
Modified
2011-11-04
http://dx.doi.org/10.1109/COLCOM.2005.1651216
Copyright © 2005–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL