skip to main content
A scalable content-addressable network
Publisher:
  • University of California, Berkeley
Order Number:AAI3082374
Pages:
93
Bibliometrics
Skip Abstract Section
Abstract

In May 1999, Shawn Fanning, then a freshman at Northeastern University, launched the first “peer-to-peer” or P2P file-sharing application—Napster. Napster allowed individual end-users (called peers) to share the MP3-encoded music stored on their local computers directly with one another over the Internet. Within a year, Napster had grown to a user population of over 50 million users making it the fastest growing Internet application to date. Three years later, despite the closure of Napster, the phenomenon of file-sharing continues its dramatic growth and appears set to remain an important feature of the Internet for the foreseeable future. The sheer scale of these file-sharing applications make them important in their own right. And yet, as this thesis will argue, P2P is much more than just a way to trade MP3s over the Internet. The P2P architecture with its use of low-cost, grass-roots resources and its decentralized nature that does not rely on any form of centrally managed infrastructure, represents a significant departure from the client-server architecture of the Web. These unique characteristics, we believe, allow P2P systems to support the rapid and low-cost deployment of powerful large-scale applications in a manner that would not be possible with the current architecture of the Web.

There are two key pieces to a P2P system: the lookup mechanism used to locate a desired file and the actual file download. The decentralized storage in P2P systems makes the file transfer process inherently scalable; the hard part is finding the peer(s) from which to retrieve the desired file. This thesis addresses this problem of scalable indexing in P2P systems, i.e ., given a file identifier, how can we find the IP address of the peer(s) holding the file__ __ Ideally, a solution to this indexing problem must be scalable to millions of users, must find files quickly, and must be resilient to the frequent arrival and departure of participant peers. As a solution, we introduce the concept of a Content-Addressable Network (CAN) as a distributed system that provides hash table functionality—mapping “keys” onto “values”—on Internet-like scales. Our CAN design is completely distributed (requiring no form of centralized control, coordination or configuration), scalable (nodes maintain only a small amount of control state that is independent of the number of nodes in the system), and fault-tolerant (nodes can route around failures).

The Distributed Hash Table (DHT) functionality supported by CAN serves as a useful substrate for a range of large distributed systems; for example, Internet-scale facilities such as global file systems, application-layer multicast, event notification, and chat services can all be layered over a DHT system such as CAN.

Cited By

  1. Yu B, Li X, Zhao H and Zhou T (2022). A scalable blockchain network model with transmission paths and neighbor node subareas, Computing, 104:10, (2253-2277), Online publication date: 1-Oct-2022.
  2. Mori T, Asaka T and Takahashi T A novel cooperative caching scheme for unstrutured peer-to-peer networks Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, (765-769)
  3. Gotthelf P, Zunino A, Mateos C and Campo M (2008). GMAC, Journal of Parallel and Distributed Computing, 68:8, (1081-1096), Online publication date: 1-Aug-2008.
  4. ACM
    Martins R, Lopes L and Silva F A peer-to-peer middleware platform for fault-tolerant, QoS, real-time computing Proceedings of the 2nd workshop on Middleware-application interaction: affiliated with the DisCoTec federated conferences 2008, (1-6)
  5. Cutting D, Quigley A and Landfeldt B (2008). SPICE, Computer Communications, 31:3, (437-451), Online publication date: 15-Feb-2008.
  6. ACM
    Hautakorpi J and Camarillo G Evaluation of DHTs from the viewpoint of interpersonal communications Proceedings of the 6th international conference on Mobile and ubiquitous multimedia, (74-83)
  7. ACM
    Ghodsi A, Haridi S and Weatherspoon H (2007). Exploiting the synergy between gossiping and structured overlays, ACM SIGOPS Operating Systems Review, 41:5, (61-66), Online publication date: 1-Oct-2007.
  8. Wang X, Liang P, Ma H, Xing D and Wang B A P2P trust model based on multi-dimensional trust evaluation Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications, (347-356)
  9. Carchiolo V, Malgeri M, Mangioni G and Nicosia V Evaluating the dynamic behaviour of PROSA P2P network Proceedings of the 4th international conference on Parallel and Distributed Processing and Applications, (904-915)
  10. Knoll M and Weis T Optimizing locality for self-organizing context-based systems Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems, (62-73)
  11. ACM
    Li H, Tan Q and Lee W Efficient progressive processing of skyline queries in peer-to-peer systems Proceedings of the 1st international conference on Scalable information systems, (26-es)
  12. Ghinita G and Teo Y An adaptive stabilization framework for distributed hash tables Proceedings of the 20th international conference on Parallel and distributed processing, (29-29)
  13. Guéret C, Monmarché N and Slimane M Sharing ressources with artificial ants Proceedings of the 20th international conference on Parallel and distributed processing, (240-240)
  14. Zhao D, Mylopoulos J, Kiringa I and Kantere V An ECA rule rewriting mechanism for peer data management systems Proceedings of the 10th international conference on Advances in Database Technology, (1069-1078)
  15. ACM
    Wang H, Zimmermann R and Ku W ASPEN Proceedings of the 13th annual ACM international workshop on Geographic information systems, (230-239)
  16. Sherman A, Lisiecki P, Berkheimer A and Wein J ACMS Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2, (245-258)
  17. Aberer K and Wu J Towards a common framework for peer-to-peer web retrieval From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments, (138-151)
  18. Morikawa H and Aoyama T (2018). Realizing the Ubiquitous Network, Telecommunications Systems, 25:3-4, (449-468), Online publication date: 1-Mar-2004.
  19. Marti S, Ganesan P and Garcia-Molina H DHT routing using social links Proceedings of the Third international conference on Peer-to-Peer Systems, (100-111)
  20. ACM
    Gummadi K, Gummadi R, Gribble S, Ratnasamy S, Shenker S and Stoica I The impact of DHT routing geometry on resilience and proximity Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, (381-394)
  21. Voulgaris S, Jelasity M and van Steen M A robust and scalable peer-to-peer gossiping protocol Proceedings of the Second international conference on Agents and Peer-to-Peer Computing, (47-58)
Contributors
  • University of California, Berkeley
  • University of California, Berkeley
  • University of California, Berkeley

Recommendations