2002
DOI: 10.1145/844128.844131
|View full text |Cite
|
Sign up to set email alerts
|

Taming aggressive replication in the Pangaea wide-area file system

Abstract: Pangaea is a wide-area file system that supports data sharing among a community of widely distributed users. It is built on a symmetrically decentralized infrastructure that consists of commodity computers provided by the end users. Computers act autonomously to serve data to their local users. When possible, they exchange data with nearby peers to improve the system's overall performance, availability, and network economy. This approach is realized by aggressively creating a replica of a file whenever and whe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(24 citation statements)
references
References 23 publications
0
24
0
Order By: Relevance
“…The optimistic replication concept [28] used in large-scale file systems like Coda [27], Pangaea [4] and Ficus [29] leads to costly reconciliation protocols. The Ficus reconciliation protocol makes use of a combination of version vectors [30] and ghost entries to detect creation / deletion conflicts.…”
Section: Related Workmentioning
confidence: 99%
“…The optimistic replication concept [28] used in large-scale file systems like Coda [27], Pangaea [4] and Ficus [29] leads to costly reconciliation protocols. The Ficus reconciliation protocol makes use of a combination of version vectors [30] and ghost entries to detect creation / deletion conflicts.…”
Section: Related Workmentioning
confidence: 99%
“…Liveness ensures that a responsible process deletes the file eventually. 4 Partial data replication has been studied for many years, e.g., in databases [11,13], email and file systems [16,24,25], and more recently, in peer to peer systems [7]. Gray et al [13] argue against the dangers of large-scale replication and warn that maintaining consistency among a large number of replicas might counter the goal of scalability.…”
Section: Case Study I: Responsibility Migrationmentioning
confidence: 99%
“…Most existing solutions to replica location [23,24] locate replicas statically and reactively, i.e., the subset of hosts selected to hold replicas of a given object does not change unless a special event happens, e.g., one of the hosts could crash. This approach has the following three disadvantages: (1) it can be expensive in systems containing millions of hosts, where a large fraction have short lifetimes [O(several minutes)] and rejoin multiple times (6.4 times/day as reported in the Overnet system [5]); 5 (2) From a security stand-point, static and reactive strategies allow an attacker to easily locate and attack all the individual replicas of an object.…”
Section: Case Study I: Responsibility Migrationmentioning
confidence: 99%
“…for U2) then become the previous names, and ni becomes the new current name for both users. This mechanism is similar to the back pointers introduced by Saito et al in the Pangea filesystem [19] where it is used for consistency. We use back pointers to improve usability, instead.…”
Section: Managing the Local Namespacementioning
confidence: 99%