Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1621890.1621911acmconferencesArticle/Chapter ViewAbstractPublication PagescomswareConference Proceedingsconference-collections
research-article

Developing, simulating, and deploying peer-to-peer systems using the Kompics component model

Published: 16 June 2009 Publication History

Abstract

Currently, the development of overlay network systems typically produces two software artifacts: a simulator to model key protocols and a production system for a WAN environment. However, this methodology requires the maintenance of two implementations, as well as adding both development overhead and the potential for errors, through divergence in the different code bases. This paper describes how our message-passing component model, called Kompics, is used to build overlay network systems using a P2P component framework, where the same implementation can be simulated or deployed in a production environment. Kompics enables two different modes of simulation: deterministic simulation for reproducible debugging, and emulation mode for stress-testing systems. We used our P2P component framework to build and evaluate overlay systems, and we show how our model lowers the programming barrier for simulating and deploying overlay network systems.

References

[1]
Apache MINA project. In http://mina.apache.org. The Apache Software Foundation, 2008.
[2]
Kompics: Reactive Component Model for Distributed Computing. In http://kompics.sics.se, 2009.
[3]
K. Aberer, L. O. Alima, A. Ghodsi, S. Girdzijauskas, S. Haridi, and M. Hauswirth. The essence of P2P: A reference architecture for overlay networks. In The 5th IEEE International Conference on Peer-to-Peer Computing, pages 11--20, 2005.
[4]
C. Arad and S. Haridi. Practical protocol composition, encapsulation and sharing in Kompics. Workshop on Decentralized Self Management for Grids, P2P, and User Communities, 2008.
[5]
J. Armstrong. Programming Erlang: Software for a Concurrent World. Pragmatic Bookshelf, July 2007.
[6]
I. Baumgart, B. Heep, and S. Krause. OverSim: A flexible overlay network simulation framework. In IEEE Global Internet Symposium, 2007, pages 79--84, 2007.
[7]
R. D. Blumofe and C. E. Leiserson. Scheduling multithreaded computations by work stealing. J. ACM, 46(5):720--748, 1999.
[8]
E. Bruneton, T. Coupaye, M. Leclercq, V. Quéma, and J.-B. Stefani. The fractal component model and its support in Java: Experiences with auto-adaptive and reconfigurable systems. Softw. Pract. Exper., 36(11--12):1257--1284, 2006.
[9]
B. Chun, D. Culler, T. Roscoe, A. Bavier, L. Peterson, M. Wawrzoniak, and M. Bowman. PlanetLab: an overlay testbed for broad-coverage services. SIGCOMM Comput. Commun. Rev., 33(3):3--12, 2003.
[10]
G. Coulson, G. Blair, P. Grace, F. Taiani, A. Joolia, K. Lee, J. Ueyama, and T. Sivaharan. A generic component model for building systems software. ACM Trans. Comput. Syst., 26(1):1--42, February 2008.
[11]
F. Dabek, B. Zhao, P. Druschel, J. Kubiatowicz, and I. Stoica. Towards a common API for structured peer-to-peer overlays. In Proc. of IPTPS'03 Workshop, pages 33--44, 2003.
[12]
J. Dowling and V. Cahill. The k-component architecture meta-model for self-adaptive software. In REFLECTION '01: Proceedings of the Third International Conference on Metalevel Architectures and Separation of Crosscutting Concerns, pages 81--88, London, UK, 2001. Springer-Verlag.
[13]
K. P. Gummadi, S. Saroiu, and S. D. Gribble. King: Estimating latency between arbitrary internet end hosts. In SIGCOMM Internet Measurement Workshop, 2002.
[14]
D. Jefferson, B. Beckman, F. Wieland, L. Blume, and M. Diloreto. Time warp operating system. SIGOPS Oper. Syst. Rev., 21(5):77--93, 1987.
[15]
M. Jelasity, A. Montresor, and O. Babaoglu. A modular paradigm for building self-organizing peer-to-peer applications. In Engineering Self-Organising Systems, G. Di Marzo Serugendo, volume 2977, pages 265--282, 2004.
[16]
C. E. Killian, J. W. Anderson, R. Braud, R. Jhala, and A. M. Vahdat. Mace: language support for building distributed systems. SIGPLAN Not., 42(6):179--188, June 2007.
[17]
J. Li, J. Stribling, R. Morris, M. Kaashoek, and T. Gil. A performance vs. cost framework for evaluating DHT design tradeoffs under churn. INFOCOM 2005, 1:225--236, March 2005.
[18]
S. Lin, A. Pan, R. Guo, and Z. Zhang. Simulating large-scale P2P systems with the WiDS toolkit. In MASCOTS '05: Proceedings of the 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, pages 415--424, Washington, DC, USA, 2005. IEEE Computer Society.
[19]
K. Ostrowski, K. Birman, D. Dolev, and J. H. Ahnn. Programming with live distributed objects. In ECOOP, pages 463--489, 2008.
[20]
A. Rodriguez, C. Killian, S. Bhat, D. Kostić, and A. Vahdat. Macedon: methodology for automatically creating, evaluating, and designing overlay networks. In NSDI'04: Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, pages 267--280, Berkeley, CA, USA, 2004. USENIX Association.
[21]
I. Stoica, R. Morris, D. Liben-Nowell, D. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. IEEE Transactions on Networking, 11, February 2003.
[22]
A. Vahdat, K. Yocum, K. Walsh, P. Mahadevan, D. Kostić, J. Chase, and D. Becker. Scalability and accuracy in a large-scale network emulator. SIGOPS Oper. Syst. Rev., 36(SI):271--284, 2002.
[23]
S. Voulgaris, D. Gavidia, and M. Steen. Cyclon: Inexpensive membership management for unstructured P2P overlays. Journal of Network and Systems Management, 13(2):197--217, June 2005.

Cited By

View all
  • (2018)Peer-to-Peer Gradient Topologies in Networks With ChurnIEEE Transactions on Control of Network Systems10.1109/TCNS.2018.27957045:4(2085-2095)Online publication date: Dec-2018
  • (2015)From P2P to cloud based P2P for live media streaming — A survey2015 Seventh International Conference on Advanced Computing (ICoAC)10.1109/ICoAC.2015.7562809(1-13)Online publication date: Dec-2015
  • (2015)Improved identification of peers using enhanced gossip++protocol in NAT2015 Seventh International Conference on Advanced Computing (ICoAC)10.1109/ICoAC.2015.7562803(1-6)Online publication date: Dec-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
COMSWARE '09: Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE
June 2009
183 pages
ISBN:9781605583532
DOI:10.1145/1621890
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 June 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. component model
  2. discrete-event simulation
  3. event-based systems
  4. peer-to-peer
  5. software architecture

Qualifiers

  • Research-article

Conference

COMSWARE '09

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Peer-to-Peer Gradient Topologies in Networks With ChurnIEEE Transactions on Control of Network Systems10.1109/TCNS.2018.27957045:4(2085-2095)Online publication date: Dec-2018
  • (2015)From P2P to cloud based P2P for live media streaming — A survey2015 Seventh International Conference on Advanced Computing (ICoAC)10.1109/ICoAC.2015.7562809(1-13)Online publication date: Dec-2015
  • (2015)Improved identification of peers using enhanced gossip++protocol in NAT2015 Seventh International Conference on Advanced Computing (ICoAC)10.1109/ICoAC.2015.7562803(1-6)Online publication date: Dec-2015
  • (2014)Component-based development of cloud applicationsProceedings of the 10th Central and Eastern European Software Engineering Conference in Russia10.1145/2687233.2687242(1-10)Online publication date: 23-Oct-2014
  • (2013)Lightweight gossip-based distribution estimation2013 IEEE International Conference on Communications (ICC)10.1109/ICC.2013.6655081(3439-3443)Online publication date: Jun-2013
  • (2012)Dealing with Bootstrapping, Maintenance, and Network Partitions and Mergers in Structured Overlay NetworksProceedings of the 2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems10.1109/SASO.2012.36(149-158)Online publication date: 10-Sep-2012
  • (2012)CLive: Cloud-assisted P2P live streaming2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P)10.1109/P2P.2012.6335820(79-90)Online publication date: Sep-2012
  • (2012)Shuffling with a CroupierProceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems10.1109/ICDCS.2012.19(102-111)Online publication date: 18-Jun-2012
  • (2012)Distributed optimization of P2P live streaming overlaysComputing10.1007/s00607-012-0195-y94:8-10(621-647)Online publication date: 26-Jun-2012
  • (2012)ID-replication for structured peer-to-peer systemsProceedings of the 18th international conference on Parallel Processing10.1007/978-3-642-32820-6_37(364-376)Online publication date: 27-Aug-2012
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media