Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles 2001
DOI: 10.1145/502034.502054
|View full text |Cite
|
Sign up to set email alerts
|

Wide-area cooperative storage with CFS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
265
0
2

Year Published

2005
2005
2014
2014

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 801 publications
(267 citation statements)
references
References 15 publications
0
265
0
2
Order By: Relevance
“…Many of the load balancing schemes are based on the notion of virtual servers [11][12][13]. Each peer is assigned several virtual servers, each of which is responsible for a portion of the ID space (i.e., hash space) of the DHT, and a load distribution is conducted by migrating virtual servers among peers.…”
Section: Task Migration Based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Many of the load balancing schemes are based on the notion of virtual servers [11][12][13]. Each peer is assigned several virtual servers, each of which is responsible for a portion of the ID space (i.e., hash space) of the DHT, and a load distribution is conducted by migrating virtual servers among peers.…”
Section: Task Migration Based Approachesmentioning
confidence: 99%
“…A query counter for counting total number of incoming queries is used at every peer (line 1). If peer n i exceeds the threshold of query load T 0 (line 2), then the following process is used to justify the main cause of this overloading (line [4][5][6][7][8][9][10][11]. If this overloading is mainly caused by the response load (line 4), n i will choose an index replica of d i for its neighbor peer n j , where d i and n j are selected by sorting w(d i , n j ), which is maintained by peer n i (line 5-6).…”
Section: Passive Index Replicationmentioning
confidence: 99%
“…All of them are distributed hash table (DHT) based approaches, which divide and distribute the routing lookup table to all participating nodes of the network. Systems for the general-purpose of file storage and exchange have been built on top of these routing protocols, e.g., CFS [6] on Chord [22], and PAST [20] on Pastry [21]. However, to retrieve the content, these systems can only operate in a "download mode".…”
Section: Related Workmentioning
confidence: 99%
“…However, network locality has not been amply exploited (except in case of Pastry). Examples of P2P systems include CFS [11] on top of Chord [30], and PAST [27] on top of Pastry [26]. Another example is Pixie [25]: a P2P content exchange architecture.…”
Section: Related Workmentioning
confidence: 99%
“…In a P2P system, peers communicate directly with each other for the sharing of data as well as other resources such as storage and CPU cycles. Paralleling research in other aspects of P2P, such as lookup [23,26,30], storage [11,27], and multicast [1,9,32], we in this paper focus on P2P media streaming, which poses more stringent bandwidth requirement than general file sharing. More specifically, as first addressed in our earlier work [33], for a media streaming session with playback rate R 0 , a single sending peer may not be able or willing to contribute the full outbound bandwidth of R 0 .…”
Section: Introductionmentioning
confidence: 99%