# Comparing Hybrid Peer-to-Peer Systems

Save this PDF as:

Size: px
Start display at page:

## Transcription

5 describe a simple query model that can be used to estimate the desired values. We assume a universe of queries Õ ½ Õ ¾ Õ. Wedefine two probability density functions over this universe: the probability function that describes query popularity. That is, µ is the probability that a submitted query happens to be query Õ. the probability density function that describes query selection power. In particular, if we take a given file in a user s library, with probability µ it will match query Õ. For example, if ½µ¼, and a library has 100 files, then we expect 50 files to match query Õ ½. Note that distribution tells us what queries users like to submit, while tells us what files users like to store (ones that are likely to match which queries). Calculating ExServ for the Chained Architecture. Using these two definitions we now compute ExServ, theexpected number of servers needed in a chained architecture (Section 3) to obtain the desired Ê MaxResults results. Let È µ represent the probability that exactly servers, out of an infinite pool, are needed to return Ê or more results. The expected number of servers is then: ÜËÖÚ ½ È µ ½ ½ È µ (1) where is the number of servers in the actual system. (The second summation represents the case where more than servers from the infinite pool were needed to obtain Ê results. In that case, the maximum number of servers,, will actually be used.) In [24] we show that this expression can be rewritten as: ÜËÖÚ ½ ½ É UsersPerServer FilesPerUserµ Here É Òµ is the probability that Ê or more query matches can be found in a collection of Ò or fewer files. Note that Ò UsersPerServer FilesPerUser is the number of files found on servers. To compute É Òµ, we first compute Ì Ò Ñµ, the probability of exactly Ñ answers in a collection of exactly Ò files. For a given query Õ, the probability of Ñ results can be restated as the probability of Ñ successes in Ò Bernoulli trials, where the probability of a success is µ. Ì Ò Ñµ can be computed as: Ì Ò Ñµ ½ µ Ò Ñ ¼ Thus, µµ Ñ ½ µµ Ò Ñ É Òµ can now be computed as the probability that we do not get ¼ ½ or Ê ½ results in exactly Ò files, or É Òµ ½ Ê ½ Ñ¼ Ì Ò Ñµ Calculating Expected Results for Chained Architecture. Next we compute two other values required for our evaluations, ExLocalResults and ExRemoteResults, againfor a chained architecture. ExLocalResults is the expected number of query results from a single server, while ExRemoteResults is the expected number of results that will be returned by a remote server. The former value is needed, for instance, to compute how much work a server will perform as it answers a query. The latter value is used, for example, to compute how much data a server receives from remote servers that assist in answering a query. Both values can be obtained if we compute Å Òµ to be the expected number of results returned from a collection of Ò files. Then, ExLocalResults is simply Å Ýµ, where Ý UsersPerServer FilesPerUser. Similarly, the expected total number of results, ExTotalResults,isÅ Ýµ. Then ExRemoteResults is ExTotalResults - ExLocalResults Å Ýµ Å Ýµ. In [24] we show that Å Òµ ½ Ê ½ Ò µ Ê µµ Ñ Ñ¼ Ñ ½ µµ Æ Ñ Ê Ñµ ¼ Calculating Expected Values for Other Architectures. So far we have assumed a chained architecture. For full replication, ExServ is trivially ½, since every server contains a full replica of the index at all other servers. Because ExServ is 1, all results are local, and none are remote. Hence ExRemoteResults ¼,andExLocalResults = ExTotalResults Å Æ µ, whereå is defined above, and Æ UsersPerServer FilesPerUser is the number of files in the entire system. For the unchained architecture, ExServ is trivially 1, since queries are not sent to remote servers. ExRemoteResults ¼ and ExLocalResults Å Òµ, where Ò UsersPerServer FilesPerUser is the number of files at a single server. Finally, for the hash architecture, again ExRemoteResults ¼ and ExLocalResults Å Æ µ, since all the results are found at the server that the client is connected to. ExServ is more difficult to calculate, however. The problem again takes the form of equation (1), but now the probability È µ that exactly servers are needed to to return Ê or more results is equal to the probability that exactly servers contain Û inverted lists, where Û is the number of words per query. Finding this probability is the same as finding the probability that Û balls being assigned to exactly bins, a well-known probability problem. We refer the reader to [24] for a complete solution. Distributions for and. While we can use any and distributions in our model, we have found that exponential distributions are computationally easier to deal with and provide accurate enough results in the music domain. Thus, we assume for now that µ ½. Since this function monotonically decreases, this means that Õ ½ is the most popular query, while Õ ¾ is the second most popular one, and so on. The parameter is the mean. If is small, popularity drops quickly as increases; if is large, pop-

9 Maximum Users Supported (per server) 9 x batch CHN incr. CHN 3 batch FR incr. FR 2 batch HASH incr. HASH 1 batch UNCH incr. UNCH Query/Logon Ratio Expected Number of Results (per query) batch CHN incr. CHN batch FR incr. FR batch HASH incr. HASH batch UNCH incr. UNCH Query/Logon Ratio Memory Required (bytes) 2.5 x batch CHN incr. CHN 1 batch FR incr. FR batch HASH 0.5 incr. HASH batch UNCH incr. UNCH Number of Users x 10 4 Figure 3: Overall Performance of Strategies vs. QueryLoginRatio Figure 4: Expected Number of Results Figure5: Memory Requirements memory required by these two strategies is shown in Figure 5 by the large o marks. Again, the amount of memory required by incremental CHN is far too large for our limit. However, looking at incremental CHN performance at the 4 GB limit, we find that the users supported by incremental CHN is greater than the 9190 users supported by batch CHN. Hence, incremental CHN is still the better choice, because within the limit, it still has better performance than batch CHN. 6.2 Beyond Music: Systems in Other Domains In Section 4, we describe a query model where, given distributions for query frequency and query selection power, we can calculate the expected number of results for a query, and the expected number of servers needed to satisfy the query. The model itself is completely general in that it makes no assumptions about the type of distributions used for and ; however, for the purposes of modeling musicsharing systems and validating the model, we made the temporary assumption that and are exponential distributions. Implied by this assumption is the additional assumption that and are positively correlated thatis, the more popular or frequent a query is, the greater the selection power it has (i.e. the larger the result set). While we believe that our music model can be used in many other domains, one can construct examples where the and distributions have different properties. Differences in and distributions can be caused by different characteristics of application domains, and/or varying expressiveness of queries. For example, if the system supported complex, expressive relational queries, an obscure query such as select * from Product where price 0 would return as many results as a common query such as select * from Product. In this case, there is very little, if any, correlation between the popularity of a query and the size of its result set. We say that such systems have no correlation distributions. Another example might be an archive-driven system, where users provide old, archived files online but keep their current, relevant information offline. This scenario might occur in the business domain where companies do not want their current data available to the public or their competitors, but might be willing to provide outdated information for research purposes. Because archives hold historical data, popular queries which refer to recent times return less data, whereas rare queries which refer to the past will return more. In this case, there is a negative correlation between query popularity and selection power. In [24], we show through detailed analysis how the behavior of systems with negative and no correlation distributions can in fact be approximated very closely by systems with positive correlation distributions. Although the input to the query model, the and distributions, are very different, the output of the model, values for ExServ and ExResults, are closely matched. In particular, no correlation distributions are closely approximated by positive correlation distributions where Ö ½, andnegative correlation distributions are closely approximated when Ö is very large. Thus, we can understand the behavior of systems with negative and no correlation distributions by studying the performance of systems with a wide range of positive correlation distributions. To illustrate, Figure 6 shows CPU performance of each strategy as Ö is varied. For comparison, the Ö value derived for the OpenNap system is shown by a dotted line in the figure. In addition, in [24] we presented several representative curves for negative and no correlation distributions, and determined the best-fit positive correlation approximations for each. For comparison, the Ö values derived for the approximations of the negative and no correlation curves are also shown in Figure 6 by dotted lines. From this figure, we can make several observations about the performance of strategies in different query models: With negative correlation distributions, or positive correlation with high Ö, incremental strategies are recommended. CPU performance of incremental strategies is usually bound by expensive queries (see [24]), but with negative correlation or high Ö, the expected number of results is very low, thereby making queries inexpensive. With no correlation distributions, or positive correlation with low Ö, batch strategies outperform incremental (except for FR). This is because when Ö is low, the expected number of results is very high, thereby making queries expensive and incremental performance poor. Batch FR performs so poorly because of expensive logins. CHN and HASH show greater improvement than FR as Ö increases. FR, which has poor login performance but

### Comparing Hybrid Peer-to-Peer Systems

Comparing Hybrid Peer-to-Peer Systems Beverly Yang Hector Garcia-Molina byang, hector@cs.stanford.edu Computer Science Department, Stanford University Abstract Peer-to-peer systems like Napster and Gnutella

### The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

### An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

### Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

### Interoperability of Peer-To-Peer File Sharing Protocols

Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and

### Recommendations for Performance Benchmarking

Recommendations for Performance Benchmarking Shikhar Puri Abstract Performance benchmarking of applications is increasingly becoming essential before deployment. This paper covers recommendations and best

### Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann

Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies

### Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

### A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems*

A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* Junho Jang, Saeyoung Han, Sungyong Park, and Jihoon Yang Department of Computer Science and Interdisciplinary Program

### FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data

FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:

### The edonkey File-Sharing Network

The edonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universität Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock,

### Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

### System Models for Distributed and Cloud Computing

System Models for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Classification of Distributed Computing Systems

### Monitoring Traffic manager

Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

### 1. Comments on reviews a. Need to avoid just summarizing web page asks you for:

1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of

### Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

### Cloud-dew architecture: realizing the potential of distributed database systems in unreliable networks

Int'l Conf. Par. and Dist. Proc. Tech. and Appl. PDPTA'15 85 Cloud-dew architecture: realizing the potential of distributed database systems in unreliable networks Yingwei Wang 1 and Yi Pan 2 1 Department

### YouServ: A Web Hosting and Content Sharing Tool for the Masses

YouServ: A Web Hosting and Content Sharing Tool for the Masses Roberto Bayardo IBM Almaden Research Center Joint work with Rakesh Agrawal, Daniel Gruhl, and Amit Somani Goal Allow people to easily share

### MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,

### BENCHMARKING CLOUD DATABASES CASE STUDY on HBASE, HADOOP and CASSANDRA USING YCSB

BENCHMARKING CLOUD DATABASES CASE STUDY on HBASE, HADOOP and CASSANDRA USING YCSB Planet Size Data!? Gartner s 10 key IT trends for 2012 unstructured data will grow some 80% over the course of the next

### Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

### System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................

### Peer to peer networks: sharing between peers. Trond Aspelund

Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server

### Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1

Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System

### Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

### Client/server and peer-to-peer models: basic concepts

Client/server and peer-to-peer models: basic concepts Dmitri Moltchanov Department of Communications Engineering Tampere University of Technology moltchan@cs.tut.fi September 04, 2013 Slides provided by

### Chapter 18: Database System Architectures. Centralized Systems

Chapter 18: Database System Architectures! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems! Network Types 18.1 Centralized Systems! Run on a single computer system and

### Performance evaluation of Web Information Retrieval Systems and its application to e-business

Performance evaluation of Web Information Retrieval Systems and its application to e-business Fidel Cacheda, Angel Viña Departament of Information and Comunications Technologies Facultad de Informática,

### Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2

Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22

### Energy Efficient MapReduce

Energy Efficient MapReduce Motivation: Energy consumption is an important aspect of datacenters efficiency, the total power consumption in the united states has doubled from 2000 to 2005, representing

### The Classical Architecture. Storage 1 / 36

1 / 36 The Problem Application Data? Filesystem Logical Drive Physical Drive 2 / 36 Requirements There are different classes of requirements: Data Independence application is shielded from physical storage

### The Microsoft Large Mailbox Vision

WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more e mail has many advantages. Large mailboxes

### Planning Domain Controller Capacity

C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a

### A Measurement Study of Peer-to-Peer File Sharing Systems

CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University

### A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

### Christoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW

Bitcoin s Peer-to-Peer network Christoph Sorge February 12th, 2014 Bitcoin minisymposium at KNAW Clipart source: http://openclipart.org, users Machovka and Keistutis Department of Computer Science What

### Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

### Chapter 17: Database System Architectures

Chapter 17: Database System Architectures Database System Concepts, 6 th Ed. See www.db-book.com for conditions on re-use Chapter 17: Database System Architectures Centralized and Client-Server Systems

### CS533 Modeling and Performance Evaluation of Network and Computer Systems

Let s Get Started! CS533 Modeling and Performance Evaluation of Network and Computer Systems Introduction (Chapters 1 and 2) Describe a performance study you have done Work or School or Describe a performance

### G22.3250-001. Porcupine. Robert Grimm New York University

G22.3250-001 Porcupine Robert Grimm New York University Altogether Now: The Three Questions! What is the problem?! What is new or different?! What are the contributions and limitations? Porcupine from

### Centralized Systems. A Centralized Computer System. Chapter 18: Database System Architectures

Chapter 18: Database System Architectures Centralized Systems! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems! Network Types! Run on a single computer system and do

### PIONEER RESEARCH & DEVELOPMENT GROUP

SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for

### A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage

Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf

### DELL RAID PRIMER DELL PERC RAID CONTROLLERS. Joe H. Trickey III. Dell Storage RAID Product Marketing. John Seward. Dell Storage RAID Engineering

DELL RAID PRIMER DELL PERC RAID CONTROLLERS Joe H. Trickey III Dell Storage RAID Product Marketing John Seward Dell Storage RAID Engineering http://www.dell.com/content/topics/topic.aspx/global/products/pvaul/top

### Efficient Search in Gnutella-like Small-World Peerto-Peer

Efficient Search in Gnutella-like Small-World Peerto-Peer Systems * Dongsheng Li, Xicheng Lu, Yijie Wang, Nong Xiao School of Computer, National University of Defense Technology, 410073 Changsha, China

### MAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services

MAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services Jiansheng Wei, Hong Jiang, Ke Zhou, Dan Feng School of Computer, Huazhong University of Science and Technology,

### Distributed Software Development with Perforce Perforce Consulting Guide

Distributed Software Development with Perforce Perforce Consulting Guide Get an overview of Perforce s simple and scalable software version management solution for supporting distributed development teams.

### From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

### Designing a Cloud Storage System

Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes

### A Case for Dynamic Selection of Replication and Caching Strategies

A Case for Dynamic Selection of Replication and Caching Strategies Swaminathan Sivasubramanian Guillaume Pierre Maarten van Steen Dept. of Mathematics and Computer Science Vrije Universiteit, Amsterdam,

### Using an In-Memory Data Grid for Near Real-Time Data Analysis

SCALEOUT SOFTWARE Using an In-Memory Data Grid for Near Real-Time Data Analysis by Dr. William Bain, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 IN today s competitive world, businesses

### Distributed Data Management

Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that

### PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department

### By the Citrix Publications Department. Citrix Systems, Inc.

Licensing: Planning Your Deployment By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED

### Lecture 5: GFS & HDFS! Claudia Hauff (Web Information Systems)! ti2736b-ewi@tudelft.nl

Big Data Processing, 2014/15 Lecture 5: GFS & HDFS!! Claudia Hauff (Web Information Systems)! ti2736b-ewi@tudelft.nl 1 Course content Introduction Data streams 1 & 2 The MapReduce paradigm Looking behind

### A Model for Access Control Management in Distributed Networks

A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,

### Case Study I: A Database Service

Case Study I: A Database Service Prof. Daniel A. Menascé Department of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.html 1 Copyright Notice Most of the figures in this set of

### DELL s Oracle Database Advisor

DELL s Oracle Database Advisor Underlying Methodology A Dell Technical White Paper Database Solutions Engineering By Roger Lopez Phani MV Dell Product Group January 2010 THIS WHITE PAPER IS FOR INFORMATIONAL

### Scalability of web applications. CSCI 470: Web Science Keith Vertanen

Scalability of web applications CSCI 470: Web Science Keith Vertanen Scalability questions Overview What's important in order to build scalable web sites? High availability vs. load balancing Approaches

### Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)

1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication

### Big Data Technology Map-Reduce Motivation: Indexing in Search Engines

Big Data Technology Map-Reduce Motivation: Indexing in Search Engines Edward Bortnikov & Ronny Lempel Yahoo Labs, Haifa Indexing in Search Engines Information Retrieval s two main stages: Indexing process

### Peer-to-Peer Systems: "A Shared Social Network"

Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology hanguyen@cc.hut.fi Abstract In the last few years, the success of the Napster online music sharing program

### Features of AnyShare

of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

### Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support

### BillQuick Agent 2010 Getting Started Guide

Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)

### Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

### Hardware Configuration Guide

Hardware Configuration Guide Contents Contents... 1 Annotation... 1 Factors to consider... 2 Machine Count... 2 Data Size... 2 Data Size Total... 2 Daily Backup Data Size... 2 Unique Data Percentage...

### SharePoint Server 2010 Capacity Management: Software Boundaries and Limits

SharePoint Server 2010 Capacity Management: Software Boundaries and s This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references,

### A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM

A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM Sneha D.Borkar 1, Prof.Chaitali S.Surtakar 2 Student of B.E., Information Technology, J.D.I.E.T, sborkar95@gmail.com Assistant Professor, Information

### Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

### Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction

### Cloud Computing at Google. Architecture

Cloud Computing at Google Google File System Web Systems and Algorithms Google Chris Brooks Department of Computer Science University of San Francisco Google has developed a layered system to handle webscale

### Oracle NoSQL Database and SanDisk Offer Cost-Effective Extreme Performance for Big Data

WHITE PAPER Oracle NoSQL Database and SanDisk Offer Cost-Effective Extreme Performance for Big Data 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 What Is Big Data?...

### Improved metrics collection and correlation for the CERN cloud storage test framework

Improved metrics collection and correlation for the CERN cloud storage test framework September 2013 Author: Carolina Lindqvist Supervisors: Maitane Zotes Seppo Heikkila CERN openlab Summer Student Report

### low-level storage structures e.g. partitions underpinning the warehouse logical table structures

DATA WAREHOUSE PHYSICAL DESIGN The physical design of a data warehouse specifies the: low-level storage structures e.g. partitions underpinning the warehouse logical table structures low-level structures

### Tuning Tableau Server for High Performance

Tuning Tableau Server for High Performance I wanna go fast PRESENT ED BY Francois Ajenstat Alan Doerhoefer Daniel Meyer Agenda What are the things that can impact performance? Tips and tricks to improve

### Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

### THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with

### Exploring the Efficiency of Big Data Processing with Hadoop MapReduce

Exploring the Efficiency of Big Data Processing with Hadoop MapReduce Brian Ye, Anders Ye School of Computer Science and Communication (CSC), Royal Institute of Technology KTH, Stockholm, Sweden Abstract.

### File sharing using IP-Multicast

File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion

### Cloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels.

Parallels Cloud Server White Paper An Introduction to Operating System Virtualization and Parallels Cloud Server www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating

### International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

### Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at

Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How

### Solutions to the Sample Questions on Application Layer

Solutions to the Sample Questions on Application Layer 1) Why is SMTP not used for transferring e-mail messages from the recipient s mail server to the recipient s personal computer? Answer: Whereas SMTP

### Motivation for peer-to-peer

Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised

### Chapter 3 Application Monitors

Chapter 3 Application Monitors AppMetrics utilizes application monitors to organize data collection and analysis per application server. An application monitor is defined on the AppMetrics manager computer

Optimizing a ëcontent-aware" Load Balancing Strategy for Shared Web Hosting Service Ludmila Cherkasova Hewlett-Packard Laboratories 1501 Page Mill Road, Palo Alto, CA 94303 cherkasova@hpl.hp.com Shankar

### Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &

### On the Ubiquity of Logging in Distributed File Systems

On the Ubiquity of Logging in Distributed File Systems M. Satyanarayanan James J. Kistler Puneet Kumar Hank Mashburn School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Logging is

### EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE

EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE INTRODUCTION IT organizations today grapple with two critical data storage challenges: the exponential growth of data and an increasing need to keep more data for

### Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described

### Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta

### Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas

3. Replication Replication Goal: Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas Problems: Partial failures of replicas and messages No

### Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer

### VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5

Performance Study VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5 VMware VirtualCenter uses a database to store metadata on the state of a VMware Infrastructure environment.