Understanding the Session Durability in Peer-to-Peer Storage System

  • Jing Tian
  • Yafei Dai
  • Hao Wang
  • Mao Yang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3994)


This paper emphasizes that instead of long-term availability and reliability, the short-term session durability analysis will greatly impact the design of the real large-scale Peer-to-Peer storage system. In this paper, we use a Markov chain to model the session durability, and then derive the session durability probability distribution. Subsequently, we show the difference between our analysis and the traditionalMean Time to Failure (MTTF) analysis, from which we conclude that the misuse of MTTF analysis will greatly mislead our understanding of the session durability. We further show the impact of session durability analysis on the real system design. To our best knowledge, this is the first time ever to discuss the effects of session durability in large-scale Peer-to-Peer storage system.


Storage System Storage Unit Exponential Approximation Session Durability Erasure Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Bhagwan, R., Tati, K., Cheng, Y., Savage, S., Voelker, G.M.: Total recall: System support for automated availability management. In: Proc. of the First ACM/Usenix Symposium on Networked Systems Design and Implementation, NSDI (2004)Google Scholar
  2. 2.
    Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: An Architecture for Global-Scale Persistent Storage. In: ACM ASPLOS (November 2000)Google Scholar
  3. 3.
    Schwarz, T.: Generalized Reed Solomon codes for erasure correction in SDDS. In: Workshop on Distributed Data and Structures (WDAS 2002), Paris, France (March 2002)Google Scholar
  4. 4.
    Weatherspoon, H., Kubiatowicz, J.D.: Erasure Coding vs. Replication: A Quantitative Comparison. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 328. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Rodrigues, R., Liskov, B.: High Availability in DHTs: Erasure Coding vs. Replication. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, pp. 226–239. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Plank, J.: A tutorial on Reed-Solomon coding for fault-tolerance in raid-like systems. Software Practice and Experience 27(9), 995–1012 (1997)CrossRefGoogle Scholar
  7. 7.
    Gibson, G.A.: Redundant Disk Arrays: Reliable, Parallel Secondary Storage. PhD thesis, U. C. Berkeley (April 1991)Google Scholar
  8. 8.
    Yalagandula, P., Nath, S., Yu, H., Gibbons, P.B., Seshan, S.: Beyond Availability: Towards a Deeper Understanding of Machine Failure Characteristics in Large Distributed Systems. In: Proc. of the 1st Workshop on Real, Large Distributed Systems (2004)Google Scholar
  9. 9.
    Pandurangan, G., Raghavan, P., Upfal, E.: Building low-diameter P2P networks. In: Proc. of the 42nd Annual IEEE Symposium on the Foundations of Computer Science (October 2001)Google Scholar
  10. 10.
    Liben-Nowell, D., Balakrishnan, H., Karger, D.: Analysis of the evolution of Peer-to-Peer systems. In: Proc. of the 21st ACM Symposium on Principles of Distributed Computing. ACP Press, Monterey (2002)Google Scholar
  11. 11.
    Zhao, Y.: Decentralized Object Location and Routing: A New Networking Paradigm. U.C. Berkeley PhD Dissertation (August 2004)Google Scholar
  12. 12.
    Giesecke, S., Warns, T., Hasselbring, W.: Availability Simulation of Peer-to-Peer Architectural Styles. In: Proc. of ICSE 2005 WADS (2005)Google Scholar
  13. 13.
    Bhagwan, R., Savage, S., Voelker, G.: Understanding availability. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  14. 14.
    Kijima, M.: Markov Processes for Stochastic Modeling. Chapman and Hall, London (1997)MATHGoogle Scholar
  15. 15.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jing Tian
    • 1
  • Yafei Dai
    • 1
  • Hao Wang
    • 1
  • Mao Yang
    • 1
  1. 1.Department of Computer SciencePeking UniversityBeijingChina

Personalised recommendations