skip to main content
10.1145/571825.571857acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article

Viceroy: a scalable and dynamic emulation of the butterfly

Published:21 July 2002Publication History

ABSTRACT

We propose a family of constant-degree routing networks of logarithmic diameter, with the additional property that the addition or removal of a node to the network requires no global coordination, only a constant number of linkage changes in expectation, and a logarithmic number with high probability. Our randomized construction improves upon existing solutions, such as balanced search trees, by ensuring that the congestion of the network is always within a logarithmic factor of the optimum with high probability. Our construction derives from recent advances in the study of peer-to-peer lookup networks, where rapid changes require efficient and distributed maintenance, and where the lookup efficiency is impacted both by the lengths of paths to requested data and the presence or elimination of bottlenecks in the network.

References

  1. N. Alon, M. Dietzfelbinger, P. B. Miltersen, E. Petrank, and G. Tardos. "Linear Hashing". Journal of the ACM Vol. 46, No. 5, 1999, pp. 667-683. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Barriére, P. Fraigniaud, E. Kranakis and D. Krizanc. "Efficient routing in networks with long range contacts". 15th International Symposium on Distributed Computing (DISC '01), Lecture Notes in Computer Science vol. 2180, Springer, 2001 pp. 270-284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Fiat and J. Saia. "Censorship resistant peer-to-peer content addressable networks". Proceedings of the 13th ACM-SIAM Symp. on Discrete Algorithms, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. D. Gribble, E. A. Brewer, J. M. Hellerstein, and D. Culler. "Scalable, distributed data structures for Internet service construction. Proc. Fourth Symposium on Operating System Design and Implementation (OSDI 2000), October 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Karger, E. Lehman, F. T. Leighton, M. Levine, D. Lewin, and R. Panigrahy. "Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web". Proceedings of the 29th Annual ACM Symposium on Theory of Computing (STOC), pp. 654-663, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Kleinberg. "The small world phenomenon: An algorithmic perspective". Proceedings of the 32nd ACM Symposium on Theory of Computing, May 2000, pp. 163-170. (A shorter version available as "Navigation in a Small World", Nature 406, August 2000, pp. 845.) Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. "OceanStore: An Architecture for Global-Scale Persistent Storage", Proceedings of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), November 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Lynch, D. Malkhi and D. Ratajczak. "Atomic Data Access in Distributed Hash Tables", Proceedings of the International Peer-to-Peer Symposium, March 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. Lai and D. Wood. "Adaptive heuristics for binary search trees and constant linkage cost". Proceedings of the 2nd ACM-SIAM Symposium on Discrete Algorithms, pp. 72-77, San Francisco, CA, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M.-J. Lin, K. Marzullo and S. Masini, "Gossip versus Deterministically Constrained Flooding on Small Networks", Proceedings of the 14th International Conference on Distributed Computing, 2000, pp. 253-267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. J. Lipton and J. F. Naughton. "Clocked adversaries for hashing". Algorithmica, Vol. 9(3), 1993, pp. 239-252.Google ScholarGoogle ScholarCross RefCross Ref
  12. W. Litwin, M.A. Neimat, D. A. Schneider. "LH*-A scalable, distributed data structure". ACM Transactions on Database Systems, Vol. 21(4), 1996, pp. 480-525. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Motwani and P. Raghavan. "Randomized Algorithms". Cambridge University Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. T. Ottmann and D. Wood. "Updating binary trees with constant linkage cost". International Journal of Foundations of Computer Science, 3, 1992, pp. 479-501.Google ScholarGoogle ScholarCross RefCross Ref
  15. G. Pandurangan, P. Raghavan and E. Upfal. "Building low-diameter p2p networks". Proceedings of the 42nd Annual IEEE Symposium on the Foundations of Computer Science (FOCS), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Plaxton, R. Rajaram, and A. Richa. "Accessing nearby copies of replicated objects in a distributed environment". Proceedings of the Ninth Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA 97), pp. 311-320, June 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. W. Pugh. "Skip Lists: A probabilistic alternative to balanced trees". Communications of the ACM, vol 33(6), pp. 668-676, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Ratnasamy, P. Francis, M. Handley, R. Karp and S. Shenker. "A scalable content-addressable network". Proceedings of the ACM SIGCOMM 2001 Technical Conference. August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. H. J. Siegel. "Interconnection networks for SIMD machines". Computer 12(6):57-65, 1979.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. "Chord: A scalable peer-to-peer lookup service for Internet applications". Proceedings of the SIGCOMM 2001, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Y. Zhao, J. D. Kubiatowicz and A. D. Joseph. "Tapestry: An infrastructure for fault-tolerant wide-area location and routing". U. C. Berkeley Technical Report UCB/CSD-01-1141, April, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Viceroy: a scalable and dynamic emulation of the butterfly

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      PODC '02: Proceedings of the twenty-first annual symposium on Principles of distributed computing
      July 2002
      307 pages
      ISBN:1581134851
      DOI:10.1145/571825

      Copyright © 2002 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 July 2002

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      PODC '02 Paper Acceptance Rate43of149submissions,29%Overall Acceptance Rate740of2,477submissions,30%

      Upcoming Conference

      PODC '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader