Files in this item



application/pdfA Migratory App ... le Distributed Systems.pdf (1MB)
(no description provided)PDF


Title:A Migratory Approach to Dynamic Replication in Large-Scale Distributed Systems
Author(s):Gupta, Indranil
Subject(s):Distributed Systems
Abstract:Distributed replication forms a significant component in many distributed systems. We consider migratory solutions for replica location in a large-scale distributed system. Replica location strategies decide dynamically how many times an object is replicated and where it is placed, in order to ensure availability, attacker-resistance, and scalability. Most traditional replica location schemes are static and reactive to failures. This paper presents dynamic and migratory schemes for replica location. More specifically, we present a new class of probabilistic protocols called {\it Endemic protocols}. By using analytical techniques borrowed from the study of non-linear systems, and through large-scale simulations, we show how an endemic protocol can be used in building a decentralized and persistent file storage service. he protocols continuously migrate a small number of replicas of each object through the host population. This means an attacker will not be able to predict the exact number and locations of all replicas of an object. Contrary to intuition, ndemic protocols can provide good performance by generating only a constant mount of network traffic at each host. Endemic protocols are resistant to massive failures and host churn. Existence of even one residual replica of an object in the system causes the system to regenerate more replicas. Analytically, endemics have the potential to preserve an object for several human generations, much like the persistent survival of folklores and endemic diseases such as common cold. The protocols are also very simple to implement.
Issue Date:2004-05
Genre:Technical Report
Rights Information:You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Date Available in IDEALS:2009-04-14

This item appears in the following Collection(s)

Item Statistics