Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
In Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI '07), Cambridge, Massachusetts, April 2007
 

Summary: In Proceedings of the 4th Symposium on Networked Systems Design
and Implementation (NSDI '07), Cambridge, Massachusetts, April 2007
Exploiting Similarity for Multi­Source Downloads
Using File Handprints
Himabindu Pucha, David G. Andersen, Michael Kaminsky
Purdue University, Carnegie Mellon University, Intel Research Pittsburgh
Abstract
Many contemporary approaches for speeding up large
file transfers attempt to download chunks of a data ob­
ject from multiple sources. Systems such as BitTorrent
quickly locate sources that have an exact copy of the de­
sired object, but they are unable to use sources that serve
similar but non­identical objects. Other systems automati­
cally exploit cross­file similarity by identifying sources
for each chunk of the object. These systems, however,
require a number of lookups proportional to the number
of chunks in the object and a mapping for each unique
chunk in every identical and similar object to its corre­
sponding sources. Thus, the lookups and mappings in
such a system can be quite large, limiting its scalability.

  

Source: Andersen, Dave - School of Computer Science, Carnegie Mellon University

 

Collections: Computer Technologies and Information Sciences