Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

DSpace/Manakin Repository

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Citable link to this page


Title: Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn
Author: Ledlie, Jonathan; Seltzer, Margo

Note: Order does not necessarily reflect citation order of authors.

Citation: Ledlie, Jonathan and Margo Seltzer. 2005. Distributed, secure load balancing with skew, heterogeneity, and churn. In Proceedings of IEEE INFOCOM 2005 the conference on computer communications : 24th Annual Joint Conference of the IEEE Computer and Communications Societies : proceedings : 13-17 March, 2005, Hyatt Regency Miami, Miami, Florida, ed. Kia Makki and Edward Knightly, 1419 - 1430. Piscataway, N.J.: IEEE.
Full Text & Related Files:
Abstract: Numerous proposals exist for load balancing in peer-to-peer (p2p) networks. Some focus on namespace balancing, making the distance between nodes as uniform as possible. This technique works well under ideal conditions, but not under those found empirically. Instead, researchers have found heavytailed query distributions (skew), high rates of node join and leave (churn), and wide variation in node network and storage capacity (heterogeneity). Other approaches tackle these less-thanideal conditions, but give up on important security properties. We propose an algorithm that both facilitates good performance and does not dilute security. Our algorithm, k-Choices, achieves load balance by greedily matching nodes’ target workloads with actual applied workloads through limited sampling, and limits any fundamental decrease in security by basing each nodes’ set of potential identifiers on a single certificate. Our algorithm compares favorably to four others in trace-driven simulations. We have implemented our algorithm and found that it improved aggregate throughput by 20% in a widely heterogeneous system in our experiments.
Published Version: http://dx.doi.org/10.1109/INFCOM.2005.1498366
Terms of Use: This article is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of-use#LAA
Citable link to this page: http://nrs.harvard.edu/urn-3:HUL.InstRepos:2962660
Downloads of this work:

Show full Dublin Core record

This item appears in the following Collection(s)


Search DASH

Advanced Search