2006
DOI: 10.1109/tpds.2006.66
|View full text |Cite
|
Sign up to set email alerts
|

SCALLOP: a scalable and load-balanced peer-to-peer lookup protocol

Abstract: A number of structured peer-to-peer (P2P) lookup protocols have been proposed recently. A P2P lookup protocol routes a lookup request to its target node in a P2P distributed system. Existing protocols achieve balanced routing traffic among nodes by assuming that lookup requests are evenly targeted at every node. However, when lookup requests concentrate on a few nodes simultaneously, these nodes become hot spots. Due to uneven routing patterns in existing protocols, hot spots cause unbalanced routing traffic w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…This means that most of the traffic is spread uniformly across all destinations, but a certain fraction is directed at one specific destination (or a small set of destinations) [546,432,17,163,545,133]. A generalization of this model is based on mass-count disparity: for example, 80% of the traffic can be directed at 20% of the destinations, while the other 20% of the traffic is distributed across the remaining 80% of the destinations [133]. Or, 90% of the I/O operations can refer to 10% of the files, while the remaining 10% of operations are spread across the remaining 90% of the files [577].…”
Section: Independent Reference Modelmentioning
confidence: 99%
“…This means that most of the traffic is spread uniformly across all destinations, but a certain fraction is directed at one specific destination (or a small set of destinations) [546,432,17,163,545,133]. A generalization of this model is based on mass-count disparity: for example, 80% of the traffic can be directed at 20% of the destinations, while the other 20% of the traffic is distributed across the remaining 80% of the destinations [133]. Or, 90% of the I/O operations can refer to 10% of the files, while the remaining 10% of operations are spread across the remaining 90% of the files [577].…”
Section: Independent Reference Modelmentioning
confidence: 99%
“…The tree is composed of four subtrees, each one having, as root, one of the fingers of Node 2 (that is, Nodes 3, 4, 6 and 10 ). Since the spanning tree corresponds to the lookup tree, which is a binomial tree in a (fully populated) Chord network [16], also the spanning tree associated with the broadcast over a fully populated Chord ring is a binomial tree.…”
Section: Background On Broadcast Over a Chord Overlaymentioning
confidence: 99%
“…The overall broadcast procedure can be viewed as the process of passing the data item through a spanning tree, rooted at the querying node, which covers all nodes in the network. Since the spanning tree corresponds to the lookup tree, which is a binomial tree in a (fully populated) Chord network [14], also the spanning tree associated to the broadcast over a fully populated Chord ring is a binomial tree.…”
Section: Broadcast Over a Dhtmentioning
confidence: 99%
“…In these cases, the generated number of messages depends on the accuracy of the popularity estimation, which is better when a higher number of nodes is queried during the probe query (that is, when V includes a finger with a high index). For instance, when r = 1%, the average number of messages is 25207 for V = {F 8 }, 14341 for V = {F 11 }, and 13169 for V = {F 14 …”
Section: Simulation Analysismentioning
confidence: 99%