HAL Id: inria-00448100
https://hal.inria.fr/inria-00448100v2
Submitted on 29 Apr 2010
HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from
L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de
Evaluation of recovery schemes
Abdulhalim Dandoush, Sara Alouf, Philippe Nain
To cite this version:
Abdulhalim Dandoush, Sara Alouf, Philippe Nain. Lifetime and availability of data stored on a P2P
system: Evaluation of recovery schemes. [Research Report] RR-7170, INRIA. 2010, pp.37. �inria-
00448100v2�
a p p o r t
d e r e c h e r c h e
-6 3 9 9 IS R N IN R IA /R R -- 7 1 7 0 -- F R + E N G
Thème COM
Lifetime and availability of data stored on a P2P system: Evaluation of redundancy and recovery
schemes
Abdulhalim Dandoush — Sara Alouf — Philippe Nain
N° 7170
April 2010
AbdulhalimDandoush , Sara Alouf ,PhilippeNain
ThèmeCOMSystèmesommuniants
ProjetMAESTRO
Rapportdereherhe n° 7170April201034pages
Abstrat: ThisreportstudiestheperformaneofPeer-to-Peerstorageandbakupsystems
(P2PSS). Thesesystemsare basedonthree pillars: data fragmentationand dissemination
amongthepeers,redundanymehanismstoopewithpeershurn,andrepairmehanisms
to reoverlost or temporarilyunavailable data. Usually, redundany is ahievedeither by
using repliation orby using erasure odes. A new lass of network oding (regenerating
odes)hasbeenproposedreently. Therefore,wewill adaptourworktothese threeredun-
danyshemes. Weintroduetwomehanismsforreoveringlost data and evaluatetheir
performanebymodelingthemthroughabsorbingMarkovhains. Speially,weevaluate
thequalityofservieprovidedtousersintermsofdurabilityandavailabilityofstoreddata
foreahreoverymehanismanddeduetheimpatofitsparametersonthesystemperfor-
mane. Therstmehanismis entralizedandbasedontheuseofasingleserverthat an
reovermultiplelossesatone. Theseondmehanismisdistributed: reonstrutionoflost
fragmentsisiteratedsequentiallyonmanypeersuntiltherequiredlevelofredundanyisat-
tained. Thekeyassumptionsmadeinthiswork,inpartiular,theassumptionsmadeonthe
reoveryproess andpeeron-timesdistribution, arein agreementwiththeanalysis in [11℄
andin [20℄ respetively. Themodels aretherebygeneralenoughto beappliable tomany
distributedenvironmentsasshownthroughnumerialomputations. Wendthat,instable
environmentssuhas loal areaorresearhinstitute networks wheremahinesare usually
highly available, the distributed-repair sheme in erasure-oded systems oers a reliable,
salableandheapstorage/bakupsolution. Fortheaseofhighly dynamienvironments,
in general, thedistributed-repairshemeis ineient, in partiular to maintainhigh data
availability, unless thedata redundany is high. Using regeneratingodes overomesthis
limitationof thedistributed-repairsheme. P2PSS withentralized-repairsheme aree-
ient in anyenvironmentbut havethe disadvantageof relyingon aentralized authority.
However,theanalysisoftheoverheadost(e.g. omputation,bandwidthostandomplex-
ity)resultingfrom thedierentredundanyshemeswithrespetto theiradvantages(e.g.
simpliity),isleftforfuturework.
Key-words: Peer-to-Peer network, distributed storage system, performane evaluation,
absorbingMarkovhain,dataavailability,datadurability,reoveryproess
redondane et de reouvrement
Résumé : Ce rapport étudie les performanes de systèmes pair-à-pair de stokage des
données(P2PSS).Ces systèmes reposentsur troispiliers: la fragmentationdes donnéeset
leurdisséminationhezlespairs,laredondanedesdonnéesandefairefaeauxéventuelles
indisponibilités des pairset l'existened'un méanisme de réparationoude reouvrement
desdonnéesperduesoutemporairementindisponibles. Nousintroduisonsdeuxméanismes
dereouvrementdesdonnéesperduesetenévaluonslesperformanesenlesmodélisantpar
deshaînesde Markovabsorbantes. Plus préisément,nous évaluonslaqualité duservie
rendu aux utilisateurs en terme de longévité et de disponibilité des données de haque
méanisme et en déduisons l'impat de ses paramètressur ses performanes. Le premier
méanismeestentraliséetreposesurl'utilisationd'ununiqueserveurpourlareonstrution
desfragmentsdedonnéeperdus. Leseondméanismeestdistribué: lareonstrutiondes
fragments perdus met en oeuvre, séquentiellement, plusieurs pairs et s'arrête dès que le
niveaude redondanerequis est atteint. Les prinipaleshypothèsesfaitesdans e travail,
notammentellesportantsurladistributionduproessusdereouvrementetdedisponibilité
des pairs,sonten aordaveles hypothèses dans[11,20℄. Nosmodèles, qui généralisent
euxdans [10℄, sontsusammentgénériques pour s'appliquerà diérentsenvironnements
distribués, omme le montrent nos appliations numériques. Nous onstatons que dans
des environnements stables omme les réseaux loaux des instituts de reherhe, où les
mahinessontgénéralementtrèsdisponibles, leméanismede reouvrementdistribuéore
unesolutiondestokageable,évolutiveetpeuoûteuse. Pourdesréseauxtrèsdynamiques
l'eaitéduméanismedistribuéestinversementproportionnelleauniveauderedondane
des données, tout partiulièrement pour e qui onerne leur disponibilité. Les systèmes
destokage quiimplémentent leméanismede reouvremententralisé sonteaesdans
n'importe quelenvironnement,leurtalon d'ahilleétant lespannesduserveurqui rendent
inopéranteslareonstrutiondesdonnéesperdues.
Mots-lés : systèmes pair-à-pair, évaluation de performane, haîne de Markov absor-
bante,approximationhampmoyen
1 Introdution
Conventionalstoragesolutionsrelyonrobustdediatedserversandmagnetitapesonwhih
dataarestored. Theseequipmentsarereliable,buttheyarealsoexpensiveanddonotsale
well. Thegrowthof storagevolume, bandwidth,and omputationalresouresforPCs has
fundamentallyhangedthewayappliations are onstruted. Almost10 yearsago,anew
networkparadigmhasbeenproposedwhere omputers anbuild avirtualnetwork (alled
overlay)on top of another network or an existing arhiteture (e.g. Internet). This new
networkparadigmhasbeenlabeledpeer-to-peer(P2P) distributednetwork. A peerin this
paradigmis aomputer that play the role of both supplierand onsumerof resoures, in
ontrast to the traditional lient-server model where only servers supply, and omputers
onsume. Appliationsthatusethis distributednetworkprovidesenhanedsalabilityand
servierobustnessasall theonnetedomputers orpeersprovidesomeservies. Peers in
theoverlayanbethoughtofasbeingonnetedbyvirtualorlogiallinks,eah ofwhih
orrespondstoapath,perhapsthroughmanyphysiallinks,intheunderlyingnetwork. As
already mentioned,eah peer reeives/providesa serviefrom/to other peers throughthe
overlaynetwork;examplesofsuhserviesareomputing(sharingtheapaityofitsentral
proessingunit),dataupload(sharingitsbandwidthapaity),datastorage(sharingitsfree
storagespae),aswellassupport toloateresoures,serviesandotherpeers.
ThisP2PmodelhasprovedtobeanalternativetotheClient/Servermodelandapromis-
ingparadigmforGridomputing,lesharing,voieoverIP,bakupandstorageappliations.
Someof thereenteortsforbuilding highlyavailablestorageorbakup systembasedon
the P2P paradigminlude Intermemory [13℄, OeanStore [18℄, CFS [9℄, PAST [24℄, Total
Reall [5℄, UbiStorage [27℄ andTahoe[28℄. Although salableand eonomiallyattrative
ompared to traditional storage/bakup systems,these P2Psystems pose many problems
suh asreliability,dataavailabilityandondentiality.
We andistinguishbetweenbakup and storagesystems. P2P bakup systemsaim to
provide long data lifetime without onstraints on the data availability level orthe reon-
strutiontime. Forthisreason,thebakupsystemdesignersareinterestedinthepermanent
departuresofpeersratherthantheintermediatedisonnetions,ontheontraryto storage
systems,evenifthedisonnetionsdurationswerelong.
1.1 Redundany shemes
In a P2P network, peers are free to leave and join the system at any time. As a result
of theintermittent availability ofpeers, ensuring high availabilityof thestored data isan
interesting and hallenging problem. To ensure data reliability and availability in suh
dynami systems, redundant data is inserted into the system. Existing systems ahieve
redundanyeitherbyrepliation,wheretherearetworepliationlevels,orbyerasureodes
(e.g. [23,6℄). Thetworepliationlevelsareasfollows:
The whole-le-level repliation sheme. A le
f
is repliatedr
times overr
dierentpeers(asinPAST[24℄)sothatthetoleraneagainstfailuresorpeersdepartureisequal
to
r
. Theratio1/{r + 1}
denestheusefulstoragespaeinthesystem. Hereafter,wewillrefertothisrepliationshemeasrepliation.
The fragment-levelrepliationsheme. Thisshemeonsistsofdividingthele
f
intos
equally sized fragments, and then maker
opies of eah of them and plae onefragmentopyperpeer,asinCFS[9℄.
Theerasureode(EC) shemeonsistsof dividingthele
f
intob
equallysizedbloks(say
S B
bits). Eah blok of dataD
is partitioned intos
equally sized fragments (sayF EC = S B /s
bits)towhih,usingoneoftheerasureodessheme(e.g. [23,6℄),r
redundantfragments are added of the same size. To download a blok of data, any
s
fragmentsare needed out of the
s + r
(downloadingthe size of the original blokS B
). Reoveringany fragment (if it is lost) or adding a new redundant fragment of a given blok of data
requiresthedownloadofanyother
s
fragmentsoutoftheavailablefragmentsofthatblok(downloadingagain thesize of theoriginal blok
S B
). Therefore,for eah stored blokofdata,thetoleraneagainstfailuresorpeersdepartureisequalto
r
. Theusefulstoragespaeinthesystemisdened bytheratio
s/(s + r)
. Intermemory[13,7℄, OeanStore[18℄, Total Reall[5℄andUbiStorage[27℄aresomeexamplesofexistingP2Psystemsthatuseerasureoding mehanismsto providesomelevelofsystemreliabilityanddataavailability.
Forthe same amountof redundany, erasure odes provide higher availability of data
thanrepliation[29℄. In[3℄,theauthors showthatanerasureodesshememakesbakup
systemsmoresalablethan repliationand blok-levelrepliation shemesastherequired
availability gets higher. They show as well that the salability of the blok-level sheme
withrespettothetotalstoragerequiredisevenlowerthanthat oftherepliationsheme.
A new lass of odes, so-alled regenerating odes (RC) has been proposed reently
in [12℄. RC an be onsidered a generalization of erasure ode (EC), whih redues the
ommuniationost of EC by slightly inreasing the storage ost. The size of fragments
in RC is larger of that in EC. In[12℄, the authors onsider in Theorem 1, p. 5 a simple
shemeinwhihtheyrequirethatany
s
fragments(theminimumpossible)anreonstruttheoriginalblokofdata. Allfragmentshaveequalsize
F RC = α ∗ S B
,whereS B
standsforthesizeofthegivenblokofdatatobestored. Anewommer(anewpeerinournotation)
produesanewredundantfragmentbyonnetingtoany
s
nodesanddownloadingαS B /s
bits from eah. In this theorem, the authors assume that the soure node of the blok
of data will store initially
n
fragmentsof sizeαS B
bits onn
storage nodes. In addition,newommersarrivesequentiallyandeahoneonnetstoanarbitrary
k
-subsetofpreviousnodes(inludingpreviousnewommers). Theydene
α c := s
s 2 − s + 1
to be,in theworthase,thelowerboundontheminimalamountofdatathatanewomermustdownload. The
worthaseisouredwhenadataolletor(lient)needtoreovertheoriginalblokofdata
from only newomers. Ingeneral, if
α ≥ α c
there exists a linearnetwork ode sothat alldataolletorsanreonstrut theonsideredblokbydownloading
s
fragmentsfrom anys
nodes. So,using thissimplesheme ofRC,addinganewredundantfragmentofagivenblok requires anewpeer to download
1/s
perentofs
storedfragments(αS B /s
of eah)sothatthe newpeer regeneratesonerandom linearombinationof theparts offragments
alreadydownloaded;thenewpeerwillstoreallthedownloadeddatawhosesizeisequalto
thesizeofthestoredfragmentsinsteadtodownloadtheequivalentoforiginalbloksize,in
theaseofEC,toregenerateonefragmentanddeletinglaterthedownloadedfragments. In
thesameway, downloadingtheblok,by adata olletor,in EC requires thedownloadof
itssize(
s ∗ F EC = S B
),whereinRC,itrequiresthedownloadofs∗ F RC = s∗ α∗ S B = βS B
,where
β > 1
. Theauthorsshowthatβ → 1
ass → ∞
. Untilthetimeofwritingthisreport,theregeneratingodesis notyet used inanyP2Psystem. However,wewillshowthrough
numerialresultsthat RCisapromissingredundanyshemeforP2Pstorageand bakup
systems.
1.2 Reovery mehanisms and poliies
Using redundany mehanisms withoutrepairing lost data is not eient, as the level of
redundany dereases when peers leave the system. Consequently, P2P storage/bakup
systemsneedto ompensatethelossof databy ontinuously storingadditionalredundant
dataonto newhosts.
Systems may rely on a entral authority that reonstruts fragments when neessary;
thesesystemswillbereferredtoasentralized-reoverysystems. Alternatively,seureagents
runningonnewhostsanreonstrutbythemselvesthedatatobestoredonthehostsdisks.
Suh systemswill be referred to asdistributed-reovery systems. A entralized server an
reoveratonemultiplelossesofthesamedoumentintheentralized-reoverysheme. In
thedistributedase,eahnewhostthankstoitsseureagentreoversonlyonelossper
doument.
Regardlessofthereoverymehanismused,tworepairpoliies anbeenfored. Inthe
eager poliy, when thesystem detets that onehost has left the network, it immediately
initiatesthereonstrutionofthelostdata,andstoresitonanewpeeruponreovery. This
poliy is simple but makes no distintion between permanentdepartures that need to be
reovered,andtransientdisonnetionsthatdonot.
Havingin mind that onnetionsmayexperienetemporary, asopposed to permanent
failures,onemaywantto deployasystemthat deferstherepairbeyondthedetetionof a
rst lossof data. This alternativepoliy, alled lazy, inherently usesless bandwidththan
theeagerpoliy. However,itisobviousthatanextraamountofredundanyisneessaryto
maskandtotoleratehostdeparturesforextendedperiodsoftime.
1.3 Contributions
Theaim ofthis reportis todevelopmathematialmodels toevaluatefundamental perfor-
manemetris(datalifetimeandavailability)ofP2PSS. Ourontributionsareasfollows:
Analysisofentralizedanddistributed reoverymehanisms.
Propositionofageneralmodelthatapturesthebehaviorofeager/lazyrepairpoliies
andthethreerepliationshemes,andaommodatesbothtemporaryandpermanent
disonnetionsofpeers.
Numerialinvestigationusingrealistiparametersvaluestosupportthemathematial
models andto ompareerasureodeswithregeneratingodes.
Provision ofguidelines onhowto engineer aP2Pbakuporstorage systemin order
tosatisfygivenrequirements.
Inthefollowing,Setion 2reviews relatedworkand Setion 3introduestheassumptions
andnotationusedthroughoutthereport. InSetion4,wedisusssomepreliminarymaterial
to beused in subsequentsetions. Setions 5and 6are dediated to the modeling of the
entralized-anddistributed-reoverymehanism,respetively. InSetion8,weprovidesome
numerialresultsshowingtheperformaneoftheentralizedanddeentralizedshemeswhen
eithererasureodesorregeneratingodesareused. Setion 9onludesthereport.
2 Related Work and Bakground
Althoughtheliteratureonthearhitetureandlesystemofdistributedbakupandstorage
systemsis abundant, mostof these systemsare ongured statiallyto providedurability
and/oravailabilitywithonlyaursoryunderstandingofhowtheongurationwillimpat
overall performane. Some systems allow data to be repliated and ahed without on-
straintsonthestorageoverheadoronthefrequenyatwhihdataareahedorreovered.
Theseyieldtowasteofbandwidthandstoragevolumeanddonotprovidealearpredened
durabilityand availabilitylevel. Hene,theimportane ofthethorough evaluation ofP2P
storagesystemsbefore theirdeployment.
There havebeen reent modeling eorts fousing on the performane analysis of P2P
bakupandstoragesystemsintermsofdatadurabilityandavailabilitysuhas[22,1℄and[?℄.
However,inallthesemodels,ndingsandonlusionsrelyontheassumptionthatthepeers
availabilityandthereoveryproessareexponentiallydistributed withsomeparameterfor
the sake of simpliation or for the lak of works haraterizing their distribution under
realistisettings andassumptions.
Charaterizingpeersavailabilitybothinloalandwideareaenvironmentshasbeenthe
fous of[20℄. Inthis paper, Nurmi,Brevik andWolski investigate threesets of data,eah
measuringmahine availabilityin adierent setting, and perform goodness-of-t tests on
eah dataset toassesswhihoutof fourdistributions bestts thedata. Theyhavefound
thatahyper-exponentialmodeltsmoreauratelythemahineavailabilitydurationsthan
theexponential,Pareto,orWeibulldistribution.
Tounderstandhowthereoveryproessouldbebettermodeled,weperformedapaket-
levelsimulationanalysis ofthe downloadand thereoveryproessesin erasure-odedsys-
tems; f. [11℄. We ran several experiments and olleted a large number of samples of
theseproessesin alargevarietyofsenarios. Weusedexpetationmaximizationandleast
square estimation algorithms to t the empirial distributions and tested the goodness of
ourtsusingstatistial(Kolmogorov-Smirnovtest)andgraphialmethods. Wefoundthat
thedownloadtimeofafragmentofdataloatedonasinglepeerfollowsapproximatelyan
exponentialdistribution. Wealso foundthat the reoverytime essentiallyfollowsahypo-
exponentialdistributionwithmanydistintphases.. Wefoundthatthedownloadtimeofa
fragmentofdataloatedonasinglepeerfollowsapproximatelyanexponentialdistribution.
Wealsofoundthatthereoverytimeessentiallyfollowsahypo-exponentialdistributionwith
manydistintphases.
In light of theonlusions of [20℄, namely, that mahine availability is modeled with a
hyper-exponentialdistribution,and buildingon thendingsof[11℄wewillproposein this
reportgeneralandauratemodelsthat arevalidunderdierentdistributedenvironments.
3 System Desription and Assumptions
Inthefollowing,wewilldistinguishthepeers,whihareomputerswheredataisstoredand
whih form astoragesystem, fromtheusers whoseobjetiveis toretrievethedatastored
inthestoragesystem.
We onsider a distributed storage system whih peers randomly join and leave. The
followingassumptionsontheP2PSS designwill beenforedthroughoutthereport:
Ablokofdata
D
ispartitionedintos
equallysizedfragmentstowhih,usingerasureodesorregeneratingode,
r
redundantfragmentsareadded. Theaseofrepliation- basedredundanyisequallyapturedbythisnotation,aftersettings = 1
andlettingthe
r
redundantfragmentsbesimplerepliasoftheuniquefragmentoftheblok. Thisnotationandheneourmodelingisgeneralenoughtostudybothrepliation-based
anderasureode-basedstoragesystems.
Mainlyforprivayissues,apeeranstoreatmostonefragmentofanydata
D
. Weassumethesystemhasperfetknowledgeoftheloationoffragmentsatanygiven
time,e.g. byusingaDistributedHashTable(DHT)oraentralauthority.
Thesystemkeepstrakofonlythelatest knownloationofeahfragment.
Overtime,apeeran beeitheronnetedtoordisonnetedfromthestoragesystem.
Atreonnetion,apeer mayormaynotstillstoreitsfragments. Wedenoteby
p
theprobabilitythatapeerthat reonnetsstillstoresitsfragments.
Thenumberofonnetedpeersatanytimeistypiallymuhlargerthanthenumber
offragmentsassoiatedwith
D
,i.e.,s +r
. Therefore,weassumethattherearealwaysatleast
s + r
onnetedpeershereafterreferredtoasnewpeerswhiharereadyto reeiveandstorefragmentsofD
.We refer to as on-time (resp. o-time) atime-interval during whih a peer is always
onneted (resp. disonneted). During a peer's o-time, the fragments stored on this
peer aremomentarily unavailable totheusersofthestoragesystem. Atreonnetion,and
aordingtotheassumptionsabove,thefragmentsstoredonthispeerwillbeavailableonly
with a persistene probability
p
(and with probability1 − p
they are lost). In order toimprove data availability and inrease the reliability of the storagesystem, it is therefore
ruialtoreoverfromlossesbyontinuouslymonitoringthesystemandaddingredundany
wheneverneeded.
We will investigatethe performaneof the twodierent repairpoliies: theeagerand
thelazyrepairpoliies. Reallthatinthelazypoliy,therepairisdelayeduntilthenumber
ofunavailablefragmentsreahesagiventhreshold,denoted
k
. Wemusthavek ≤ r
sineD
is lostif morethan
r
fragments aremissing from thestoragesystem. Bothrepairpoliiesanberepresentedbythethresholdparameter
k ∈ {1, 2, . . . , r}
,wherek
antakeanyvalueintheset
{2, . . . , r}
inthelazypoliyandk = 1
in theeagerpoliy.Anyrepairpoliyanbeimplementedeitherinaentralizedoradistributedway. Inthe
followingdesription,weassumethatthesystemmisses
k
fragmentsso thatlostfragmentshaveto berestored.
In the entralized implementation, aentral authoritywill: (1) downloadin parallel
s
fragmentsfromthepeerswhihareonneted,(2)reonstrut at oneall theunavail-
ablefragments,and(3)uploadthereonstrutedfragmentsinparallelontoasmanynew
peersforstorage. Theentralauthorityupdatesthedatabasereordingfragmentsloations
assoonasalluploadsterminate. Step2exeutesinanegligibletimeomparedtotheexe-
utiontimeofSteps1and3andwill heneforthbeignoredin themodeling. Step1(resp.
Step3)endsexeutingwhenthedownload(resp. upload)ofthelastfragmentisompleted.
Inthedistributedimplementation,a seureagentononenewpeerisnotied
ofthe identityofone out ofthe
k
unavailablefragmentsfor ittoreonstrut it.Upon notiation, the seure agent (1) downloads
s
fragments (ors
parts ofs
fragmentsifRCisused)of
D
fromthepeerswhihareonnetedtothestoragesystem,(2)reonstrutsthe speied fragmentand storesiton thepeer'sdisk;
(3) subsequently disards the
s
downloaded fragments, in the ase of erasureode, so as to meet the privay onstraint that only one fragment ofa blok of
data may be held by a peer. This operationiterates until lessthan
k
fragments aresensedunavailableandstopsifthenumberofmissingfragmentsreahes
k − 1
. Thereoveryof onefragment lasts mainly for the exeution time of Step 1. We will thus onsider the
reoveryproesstoendwhenthedownloadofthelastfragment(outof
s
)isompleted.Inbothimplementations,oneafragmentisreonstruted,anyotheropyof
itthat reappears in the systemdue to a peer reonnetion issimplyignored,
as only one loation (the newest) of the fragment is reorded in the system.
Similarly,ifafragmentisunavailable,thesystemknowsofonlyonedisonneted
peerthat stores the unavailablefragment.
Giventhesystemdesription,data
D
anbeeither available, unavailable orlost. DataD
is saidto beavailable ifanys
fragmentsoutof thes + r
fragmentsanbedownloadedby the usersof the P2PSS. Data
D
is said to be unavailable if less thans
fragments areavailablefordownload,howeverthemissingfragmentstoomplete
D
areloatedat apeeroraentralauthorityon whih areoveryproessisongoing. Data
D
is saidto be lostiftherearelessthan
s
fragmentsinthesysteminludingthefragmentsinvolvedinareoveryproess. We assume that, at time
t = 0
, at leasts
fragments are available so that thedoumentisinitiallyavailable.
Wenowintroduetheassumptionsonsideredin ourmodels.
Assumption1: (o-times) Weassumethatsuessivedurationsofo-timesofapeerare
independent andidentially distributed (iid) randomvariables (rvs) with aommon
exponentialdistributionfuntionwithparameter
λ > 0
.Assumption1is inagreementwiththeanalysisin[22℄.
Assumption2: (on-times) We assume that suessive durations of on-times of a peer
areiidrvswithaommonhyper-exponentialdistributionfuntionwith
n
phases;theparametersofphase
i
are{p i , µ i }
,withp i
theprobabilitythatphasei
isseletedand1/µ i
themeandurationofphasei
. WenaturallyhaveP n
i=1 p i = 1
.Assumption2,with
n > 1
,isinagreementwiththeanalysisin [20℄;whenn = 1
,itisinagreementwiththeanalysis in[22℄.
Assumption3: (independene) Suessive on-times and o-times are assumed to be
independent. Peersareassumedto behaveindependentlyofeahother.
Assumption4: (download/upload durations) We assume that suessive download
(resp. upload) durationsof a fragment are iid rvs with a ommon exponential dis-
tribution funtion with parameter
α
(resp.β
). We further assume that onurrentfragmentsdownloads/uploadsarenotorrelated.
Assumption4issupportedbyourndingsin[11℄. Asalreadymentioned,thefragment
download/upload timewasfoundto followapproximatelyanexponentialdistribution. As
fortheonurrentdownloads/uploads,wehavefound insimulationsthat theseare weakly
orrelatedandlosetobeindependentaslongasthetotalworkloadisequallydistributed
overtheativepeers. Therearetwomainreasonsfortheweakorrelationbetweenonur-
rent downloads/uploadsasobservedin simulations: (i)the good onnetivityof nowadays
orenetworksand(ii)theasymmetryinpeersupstreamanddownstreambandwidths,ason
average,apeertendsto havehigherdownstreamthanupstreambandwidth[25,15℄. So,as
thebottlenekwouldbetheupstream apaityof peers, the fragmentdownloadtimesare
losetobeiidrvs.
AonsequeneofAssumption4isthateahoftheblokdownloadtimeandthedurations
oftheentralizedandthedistributedreoveryproessesisarvfollowingahypo-exponential
distribution [16℄. Indeed, eah of these durations is the summation of independently dis-
tributedexponentialrvs(
s
fortheblokdownloadandinthedistributedsheme,ands + k
intheentralizedshemeif
k
fragmentsareto bereonstruted)havingeah itsownrate.Thisisafundamentaldierenewith[1℄wherethereoveryproessisassumedtofollowan
exponentialdistribution.
It is worthmentioningthat the simulationanalysis of [11℄ has onludedthat in most
ases the reovery time follows roughly a hypo-exponential distribution. This result is
Table1: Systemparameters.
D
Blokofdatas
Originalnumberoffragmentsforeahblokofdatar
Numberofredundantfragmentsk
Thresholdofthereoveryproessp
Persisteneprobabilityλ
Rateatwhihpeersrejointhesystem{p i , µ i } i=1,...,n
Parametersofthepeersfailure proessα
Downloadrateofapiee ofdata(fragment)β
Uploadrateofafragmentin theentralized-repairshemeexpeted as long as fragments downloads/uploads are exponentially distributed and very
weakly orrelated. It wasalso found in [11℄ that a hypo-exponential model gives a more
reasonableapproximationof thereoveryproess thananexponentialmodelevenin ases
whenthenullhypothesis isrejeted.
Given Assumptions14, the models developed in this report are more generaland/or
morerealistithan thosein [22,1,10℄. Table1reapitulatestheparametersintrodued in
thissetion. Wewillreferto
s
,r
andk
astheprotoolparameters,p
,λ
and{p i , µ i } i=1,...,n
asthepeersparameters,and
α
andβ
asthenetworkparameters.4 Preliminaries and Notation
Wewillfousinthissetiononthedynamiofpeersinthestoragesystem. Inpartiular,we
areinterestedinomputingthestationarydistribution ofpeers. AordingtoAssumptions
13intheprevioussetion,eahtimeapeerrejoinsthesystem,itpiksitson-timeduration
fromanexponentialdistributionhavingparameter
µ i
with probabilityp i
,fori ∈ [1..n]
. Inotherwords,apeeranstayonnetedforashorttime inasession andforalongtime in
anotherone.
This dynamiity anbemodeledas ageneralqueueing network with anarbitrary but
nite number
n
ofdierentlassesof ustomers(peers)and aninnitenumberof servers.Inthisnetwork,anewustomerenters diretly,withprobability
p i
,aserverwithaservierate
µ i
. DeneP I(~n = (n 1 , . . . , n n )) := lim t→∞ P(N 1 (t) = n 1 , . . . , N n (t) = n n )
to bethejointdistributionfuntion ofthenumberof ustomersoflass
1, . . . , n
in steady-state(or, equivalently, thenumber of busy servers) whereN i (t)
is thenumberof peers of lassi
inthesystemattime
t
fori = 1, . . . , n
. Wehavethefollowingknownresults[2,17℄:P I(~n) = 1/G
n
Y
i=1
ρ n i i n i !
where
ρ i = λp i /µ i
is the rate at whih work enters lassi
andG
is the normalizing onstant.G = X
~ n∈N n
n
Y
i=1
ρ n i i n i !
Denotetheexpetednumberofustomersoflass
i
inthesystembyE[n i ]
whereE[n i ] = X
~ n∈N n
n i P I (~n) = ρ i n
Y
l=1
e ρ l ,
fori = 1, . . . , n
.
Forlateruse,wewillomputetheprobabilityofseletinganewpeerinphase
i
,denotedby
R(i)
,orequivalentlytheperentageoftheonnetedpeersinphasei
asfollows:R(i) = E[n i ] P n
l=1 E[n l ] = ρ i
P n
l=1 ρ l = p i /µ i
P n l=1 p l /µ l
(1)
Weintrodue aswellfuntions
S
andf
suh that for agivenn
-tuple~a = (a 1 , . . . , a n )
,S(~a) := P n
i=1 a i
andf i (~a) := a i /S(~a)
.We onlude this setion by a word on the notation: a subsript
c
(resp.d
) willindiate that weare onsidering the entralized (resp. distributed) reoverysheme. The
notation
~e j i
referstoarowvetorofdimensionj
whoseentriesarenullexeptthei
-thentrythatisequalto
1
;thenotation~ 1 j
referstoaolumnvetorofdimensionj
whoseeahentryisequalto
1
;andthenotation~ 0
referstoanullrowvetorofappropriatedimension.1
l{A}
is the harateristi funtion of event
A
. The notation[a] +
referstomax{a, 0}
. The setof integersranging from
a
tob
is denoted[a..b]
. Given aset ofn
rvs{B i (t)} i∈[1..n]
,B(t) ~
denotesthevetor
(B 1 (t), . . . , B n (t))
andB ~
denotesthestohastiproess
{ B(t), t ~ ≥ 0}
.5 Centralized Repair Systems
Inthissetion,weaddresstheperformaneofP2PSSusingtheentralized-reoverysheme.
We will fous on a single blok of data
D
, and pay attention only to peers storingfragmentsofthisblok. Atanytime
t
,thestateofablokD
anbedesribedbyboththenumberoffragmentsthatareavailable fordownloadandthestateofthereoveryproess.
Whentriggered,thereoveryproessgoesrstthroughadownloadphase (fragmentsare
downloadedfromonnetedpeerstotheentralauthority)thenthroughanuploadphase
(fragmentsareuploadedto newpeersfromtheentral authority).
Moreformally,weintrodue
n
-dimensionalvetorsX ~ c (t)
,Y ~ c (t)
,Z ~ c (t)
,U ~ c (t)
,andV ~ c (t)
,where
n
is the number of phases of the hyper-exponentialdistribution of peers on-times durations, and a5n
-dimensional vetorW ~ c (t) = ( X ~ c (t), ~ Y c (t), ~ Z c (t), ~ U c (t), ~ V c (t))
. VetorsY ~ c (t)
andZ ~ c (t)
desribethedownloadphaseofthereoveryproesswhereasU ~ c (t)
andV ~ c (t)
desribeitsuploadphase. Theformaldenition ofthesevetorsisasfollows:
X ~ c (t) := (X c,1 (t), . . . , X c,n (t))
whereX c,l (t)
is a[0..s + r]
-valued rv denoting thenumberoffragmentsof
D
storedonpeersthatarein phasel
attimet
.
Y ~ c (t) := (Y c,1 (t), . . . , Y c,n (t))
whereY c,l (t)
isa[0..s −1]
-valuedrvdenotingthenumberof fragmentsof
D
beingdownloadedat timet
to theentral authority frompeers inphase
l
(one fragmentperpeer).
Z ~ c (t) := (Z c,1 (t), . . . , Z c,n (t))
whereZ c,l (t)
isa[0..s]
-valuedrvdenotingthenumberoffragmentsof
D
hold attimet
bytheentralauthorityandwhosedownloadwasdonefrompeersinphase
l
(onefragmentperpeer). Observethatthesepeersmayhaveleftthesystembytime
t
.
U ~ c (t) := (U c,1 (t), . . . , U c,n (t))
whereU c,l (t)
is a[0..s + r − 1]
-valued rvdenotingthenumberof(reonstruted) fragmentsof
D
beinguploaded attimet
from theentralauthoritytonewpeersthat areinphase
l
(one fragmentperpeer).
V ~ c (t) := (V c,1 (t), . . . , V c,n (t))
whereV c,l (t)
is a[0..s + r − 1]
-valued rv denotingthenumberof(reonstruted)fragmentsof
D
whoseuploadfromtheentralauthoritytonewpeersthatareinphase
l
hasbeenompletedattimet
(onefragmentperpeer).Giventheabovedenitions,weneessarilyhave
Y c,l (t) ≤ X c,l (t)
forl ∈ [1..n]
atanytimet
.Thenumberoffragmentsof
D
thatareavailablefordownloadattimet
isgivenbyS( X ~ c (t))
(reallthedenition ofthefuntion
S
in Setion3). Giventhats
fragmentsofD
needtobedownloadedtotheentralauthorityduringthedownloadphaseofthereoveryproess,
we will have (during this phase)
S( Y ~ c (t)) + S( Z ~ c (t)) = s
, suh thatS( Y ~ c (t)), S( Z ~ c (t)) ∈ [1..s − 1]
. Onethedownloadphaseisompleted,theentralauthoritywillreonstrut atone allmissing fragments, that is
s + r − S( X ~ c (t))
. Therefore, during the uploadphase,we have
S( U ~ c (t)) + S( V ~ c (t)) = s + r − S( X ~ c (t))
. Observethat, one the download phaseis ompleted, the number of available fragments,
S( X ~ c (t))
, may well derease to 0 withpeersallleavingthesystem. Insuhasituation,theentralauthoritywillreonstrut
s + r
fragmentsof
D
. Assoon asthe downloadphaseis ompletedY ~ c (t) = ~ 0
andS ( Z ~ c (t)) = s
.The end of the upload phase is also the end of the reoveryproess. We will then have
Y ~ c (t) = Z ~ c (t) = U ~ c (t) = V ~ c (t) = ~ 0
untilthereoveryproessisagaintriggered.Aording to theterminologyintrodued in Setion 3, at time
t
, dataD
is available ifS( X ~ c (t)) ≥ s
,regardlessofthestateofthereoveryproess. Itisunavailable ifS( X ~ c (t)) <
s
butS( Z ~ c (t))
the number of fragments hold by the entral authorityis larger thans − S( X ~ c (t))
and at leasts − S( X ~ c (t))
fragmentsoutofS( Z ~ c (t))
are dierent from thoseS( X ~ c (t))
fragmentsavailable onpeers. Otherwise,D
is onsidered to be lost. Thelattersituationwillbemodeledbyasinglestate
a
.Ifareoveryproessisongoing,theexatnumberofdistintfragmentsof
D
thatareinthesystemountingboththosethatareavailableandthoseholdbytheentralauthority
may be unknown due to peers hurn. However,we are ableto nd a lower bound on it,
namely,
b( X ~ c (t), ~ Y c (t), ~ Z c (t)) :=
n
X
l=1
max{X c,l (t), Y c,l (t) + Z c,l (t)}.
Infat,the unertainty aboutthe numberof distint fragmentsis aresultof peershurn.
Thatsaid, thisbound isverytightandmostoftengivestheexatnumberof distintfrag-
ments sine peers hurn ours at a muh larger time-sale than a fragment download.
In our modeling, we onsider an unavailable data
D
to beome lost when the boundb
takesa valuesmaller than
s
. Observe that, ifthe reoveryproess is nottriggered, thenb( X ~ c (t),~ 0,~ 0) = S( X ~ c (t))
givestheexatnumberofdistintfragments.The system state at time
t
an be represented by the5n
-dimensional vetorW ~ c (t)
.ThankstotheassumptionsmadeinSetion3,themulti-dimensionalproess
W ~ c := { W ~ c (t), t ≥ 0}
isanabsorbinghomogeneousontinuous-timeMarkovhain(CTMC)withasetoftran- sientstatesT c
representing thesituations whenD
iseither available orunavailable and a singleabsorbingstatea
representingthesituationwhenD
islost. AswritingT c
istedious,wewillsimplysaythat
T c
isasubsetof[0..s+r] n ×[0..s−1] n ×[0..s] n ×[0..s+r−1] n ×[0..s+r−1] n
.Theelementsof
T c
mustverifytheonstraintsmentionedabove.Without loss of generality, we assume that
S( X ~ c (0)) ≥ s
. The innitesimal generator hasthefollowinganonialformT c a T c
a
Q ~ c R ~ c
~ 0 0
where
R ~ c
isanon-zeroolumnvetorofsize|T c |
,andQ ~ c
is|T c |
-by-|T c |
matrix. Theelementsof
R ~ c
arethetransitionratesbetweenthetransientstatesw ~ c ∈ T c
andtheabsorbingstatea
. The diagonalelementsofQ ~ c
areeahthetotaltransition rateoutoftheorresponding transient state. The other elements ofQ ~ c
are the transition rates between eah pair oftransient states. The non-zero elements of
R ~ c
are, forS(~y c ) ∈ [1..S (~x c )]
andS(~z c ) = s − S(~y c )
,r c (~x c ,~ 0,~ 0,~ 0,~ 0) =
n
X
l=1
x c,l µ l ,
forS(~x c ) = s.
r c (~x c , ~y c , ~z c ,~ 0,~ 0) =
n
X
l=1
y c,l µ l · 1
l{b(~x c , ~y c , ~z c ) = s} ,
forS(~x c ) ∈ [1..s].
Letus proeedtothedenitionofthenon-zeroelementsof
Q ~ c
.The ase when a peerleaves the system
Therearesevendierentsituationsinthisase. Intherstsituation,eitherthereovery
proesshasnotbeentriggered orithasbut nodownloadhasbeenompleted yet. Inboth
the seond and third situations, the download phase of the reovery proess is ongoing
and at least one downloadis ompleted. However, in the seond situation, the departing
peer does notaet the reoveryproess (either it wasnot involved in it orits fragment
downloadisompleted),unlikewhathappensinthethird situation. Inthethird situation,
afragmentdownloadis interrupteddueto thepeer's departure. Theentralauthoritywill
thenimmediatelystartdownloadingafragmentfromanotheravailablepeerthatisuniformly
seletedamongallavailablepeersnoturrentlyinvolvedinthereoveryproess. Thefourth
situation arises when a peer leaves the system at the end of the download phase. The
fth situation ours when an available fragment beomes unavailable during the upload
phase. Thesixthsituationourswhen apeer,to whih theentralauthorityisuploading
afragment,leavesthesystem. Thelastsituationarisesbeauseofadepartureofapeer to
whih the entral authority hasompletely uploadedareonstruted fragment. Note that
the uploaded fragmentwas notyet integrated in the available fragments. This is aused
bythe fat that the entral authority updates the databasereordingfragmentsloations
assoon as all uploadsterminate. Tooverom any departure orfailure that ours in the
ontextofoneofthelastthreesituations,theentralauthorityhasthentouploadagainthe
givenfragmentto anew peer. A newseletedpeer would bein phase
m
with probabilityR(m)
form ∈ [1..n]
. TheelementsofQ ~ c
orresponding to these seven situations are, forl ∈ [1..n]
andm ∈ [1..n]
,q c ((~x c ,~ 0,~ 0,~ 0,~ 0), (~x c − ~e n l ,~ 0,~ 0,~ 0,~ 0)) = x c,l µ l ,
for
S(~x c ) ∈ [s + 1..s + r].
q c ((~x c , ~y c , ~z c ,~ 0,~ 0), (~x c − ~e n l , ~y c , ~z c ,~ 0,~ 0)) = [x c,l − y c,l ] + µ l ,
for
S(~x c ) ∈ [s..s + r − 1], S(~y c ) ∈ [1..s − 1], S(~z c ) = s − S(~y c );
or
S(~x c ) ∈ [2..s − 1], S (~y c ) ∈ [1..S(~x c ) − 1], S(~z c ) = s − S (~y c ).
q c ((~x c , ~y c , ~z c ,~ 0,~ 0), (~x c − ~e n l , ~y c − ~e n l + ~e n m , ~z c ,~ 0,~ 0)) = y c,l µ l [x c,m − y c,m − z c,m ] + P n
i=1 [x c,i − y c,i − z c,i ] + ,
for
S(~x c ) ∈ [s..s + r − 1], S(~y c ) ∈ [1..s − 1], S(~z c ) = s − S(~y c );
or
S(~x c ) ∈ [2..s − 1], S (~y c ) ∈ [1..S(~x c ) − 1], S(~z c ) = s − S (~y c ).
q c ((~x c ,~ 0, ~z c ,~ 0,~ 0), (~x c − ~e n l ,~ 0, ~z c ,~ 0,~ 0)) = x c,l µ l ,
for
S(~x c ) ∈ [1..s + r − 1], S(~z c ) = s.
q c ((~x c ,~ 0, ~z c , ~u c , ~v c ), (~x c − ~e n l ,~ 0, ~z c , ~u c + ~e n m , ~v c )) = x c,l µ l R(m),
for
S(~x c ) ∈ [1..s + r − 2], S(~z c ) = s, S(~u c ) ∈ [1..s + r − S(~x c ) − 1], S(~v c ) = s + r − S(~x c ) − S (~u c ).
q c ((~x c ,~ 0, ~z c , ~u c , ~v c ), (~x c ,~ 0, ~z c , ~u c − ~e n l + ~e n m , ~v c )) = u c,l µ l R(m),
for
S(~x c ) ∈ [1..s + r − 2], S(~z c ) = s, S(~u c ) ∈ [1..s + r − S(~x c ) − 1], S(~v c ) = s + r − S(~x c ) − S (~u c ), l 6= m.
q c ((~x c ,~ 0, ~z c , ~u c , ~v c ), (~x c ,~ 0, ~z c , ~u c + ~e n m , ~v c − ~e n l )) = v c,l µ l R(m),
for
S(~x c ) ∈ [1..s + r − 2], S(~z c ) = s, S(~u c ) ∈ [1..s + r − S(~x c ) − 1], S(~v c ) = s + r − S(~x c ) − S (~u c ).
The ase when a peerrejoins the system
Reall that thesystem keepstraeof onlythe latestknownloation ofeah fragment.
As suh, one a fragment is reonstruted, any other opy of it that reappears in the
systemdue to a peer reonnetion is simply ignored,as onlyone loation(the newest) of
thefragmentisreorded in thesystem. Similarly, ifafragmentisunavailable,thesystem
knowsofonlyonedisonnetedpeerthatstorestheunavailablefragment. Inthefollowing,
only relevantreonnetions are onsidered. Forinstane, when the reoveryproess is in
itsuploadphase,anypeerthatrejoinsthesystemdoesnotaetthesystemstatesineall
fragmentshavebeenreonstrutedandarebeinguploadedtotheirnewloations.
There arethreesituations wherereonnetions may berelevant. Intherst, eitherthe
reoveryproesshasnotbeentriggeredorithasbutnodownloadhasbeenompletedyet.In
boththeseondandthirdsituations,thedownloadphaseofthereoveryproessisongoing
andat leastonedownloadis ompleted. However,in thethird situation,there isonly one
missing fragment,so when thepeer storing the missing fragmentsrejoins the system,the
reoveryproessaborts.
Theelementsof
Q ~ c
orrespondingtothesethreesituationsare,forl ∈ [1..n]
andS(~z c ) = s − S(~y c )
q c ((~x c ,~ 0,~ 0,~ 0,~ 0), (~x c + ~e n l ,~ 0,~ 0,~ 0,~ 0)) = p l (s + r − S(~x c ))pλ,
for
S(~x c ) ∈ [s..s + r − 1].
q c ((~x c , ~y c , ~z c ,~ 0,~ 0), (~x c + ~e n l , ~y c , ~z c ,~ 0,~ 0)) = p l (s + r − S(~x c ))pλ,
for
S(~x c ) ∈ [s..s + r − 2], S(~y c ) ∈ [1..s − 1];
or
S(~x c ) ∈ [1..s − 1], S(~y c ) ∈ [1..S(~x c )].
q c ((~x c , ~y c , ~z c ,~ 0,~ 0), (~x c + ~e n l ,~ 0,~ 0,~ 0,~ 0)) = p l pλ,
for
S(~x c ) = s + r − 1, S(~y c ) ∈ [1..s − 1].
The ase when onedownload isompleted during the reovery proess
Whenareoveryproessisinitiated,thesystemstateveries
S(~x c ) ∈ [s..s + r − k]
and~y c = ~z c = ~u c = ~v c = ~ 0
. Theentral authorityseletss
peers out oftheS(~x c )
peers thatare onneted to the system and initiates afragment download from eah. Among the
s
peers that are seleted,
i l
outofs
would be in phasel
, forl ∈ [1..n]
. Let~i = (i 1 , . . . , i n )
.We naturallyhave
0 ≤ i l ≤ x c,l
, forl ∈ [1..n]
, andS( ~i) = s
. This seletion ours withprobability
g( ~i, ~x c ) :=
Q n l=1
x c,l
i l
S(~ x c ) s
.
Theprobabilitythattherstdownloadtobeompleted outof
s
wasfromapeerinphasel
isequalto
f l ( ~i) = i l /s
(reallthedenitionoff
in Setion3). Similarly,whenthenumberofongoingdownloadsis
~ y c
, theprobabilitythatthe rstdownloadto beompleted outofS(~y c )
was fromapeerin phasel
isequaltof l (~y c ) = y c,l /S(~y c )
.The two possible transition rates in suh situations are, for
l ∈ [1..n]
,m ∈ [1..n]
andS(~z c ) = s − S(~y c )
,q c ((~x c ,~ 0,~ 0,~ 0,~ 0), (~x c ,~i − ~e n l , ~e n l ,~ 0,~ 0)) = sα g( ~i, ~x c ) f l ( ~i),
for
S(~x c ) ∈ [s..s + r − k], i m ∈ [0..x c,m ], S( ~i) = s.
q c ((~x c , ~y c , ~z c ,~ 0,~ 0), (~x c , ~y c − ~e n l , ~z c + ~e n l ,~ 0,~ 0)) = S(~y c )α f l (~y c ),
for
S(~x c ) ∈ [s..s + r − 1], S(~y c ) ∈ [1..s − 1];
or
S(~x c ) ∈ [1..s − 1], S(~y c ) ∈ [1..S(~x c )].
The ase when oneupload isompletedduring the reovery proess
When the downloadphase is ompleted, the systemstate veries
S(~z c ) = s
and~y c =
~u c = ~v c = ~ 0
. Theentralauthorityseletss + r − S(~x c )
newpeersthatareonnetedtothesystemandinitiatesa(reonstruted)fragmentuploadtoeah. Among thepeers thatare
seleted,
i l
outofs + r − S(~x c )
wouldbeinphasel
,forl ∈ [1..n]
. Let~i = (i 1 , . . . , i n )
. Wenaturallyhave
0 ≤ i l ≤ s + r − S(~x c )
,forl ∈ [1..n]
,andS( ~i) = s + r − S(~x c )
. Thisseletionourswithprobability
h( ~i, ~x c ) :=
s + r − S (~x c ) i 1 , i 2 , . . . , i n
n Y
l=1
R(l) i l
wherethemultinomialoeienthasbeenused. For
l ∈ [1..n]
andS(~z c ) = s
,weanwriteq c ((~x c ,~ 0, ~z c ,~ 0,~ 0), (~x c ,~ 0, ~z c ,~i − ~e n l , ~e n l )) = S( ~i)β h( ~i, ~x c ) f l ( ~i),
for
S(~x c ) ∈ [0..s + r − 2], ~i ∈ [0..s + r − S(~x c )] n , S( ~i) = s + r − S(~x c ).
q c ((~x c ,~ 0, ~z c , ~u c , ~v c ), (~x c ,~ 0, ~z c , ~u c − ~e n l , ~v c + ~e n l )) = S(~u c )β f l (~u c ),
for
S(~x c ) ∈ [0..s + r − 2], S(~u c ) ∈ [2..s + r − S(~x c ) − 1], S(~v c ) = s + r − S(~x c ) − S(~u c ).
q c ((~x c ,~ 0, ~z c , ~e n l , ~v c ), (~x c + ~v c + ~e n l ,~ 0,~ 0,~ 0,~ 0)) = β,
for
S(~x c ) ∈ [0..s + r − 2], S(~v c ) = s + r − S(~x c ) − 1.
q c ((~x c ,~ 0, ~z c ,~ 0,~ 0), (~x c + ~e n l ,~ 0,~ 0,~ 0,~ 0)) = R(l)β,
for
S(~x c ) = s + r − 1.
Notethat
Q ~ c
isnotaninnitesimalgeneratorsineelementsinsomerowsdonotsumupto0
. Thoserowsorrespondtothesystemstateswhereonlys
distint fragmentsarepresentinthesystem. Thediagonalelementsof
Q ~ c
areq c (~ w c , ~ w c ) = −r c ( w ~ c ) − X
~
w c ′ ∈T c −{ w ~ c }
q c ( w ~ c , ~ w c ′ ),
forw ~ c ∈ T c .
Forillustrationpurposes,wedepitinFig. 1someofthetransitionsoftheabsorbingCTMC
when
n = 2
,s = 3
,r = 1
,andk = 1
.5.1 Data Lifetime
Thissetionisdevotedtotheanalysisofthelifetimeof
D
. Itwillbeonvenienttointroduesets
E I := {(~x c ,~ 0,~ 0,~ 0,~ 0) : ~x c ∈ [0..s + r] n , S(~x c ) = I}
forI ∈ [s..s + r].
The set
E I
onsists of all states of the proessW ~ c
in whih the number of fragments ofD
urrentlyavailable is equaltoI
and thereoveryproess either hasnot been triggered(for
I ∈ [s + r − k + 1..s + r]
) or it has but no download has been ompleted yet (forI ∈ [s..s + r − k]
). ForanyI
,theardinalofE I
isI+n−1
n−1
(thinkofthepossibleseletions
of
n − 1
boxesin arowofI + n − 1
boxes,soastodelimitn
groupsofboxessumming upto
I
).Introdue
T c (E I ) := inf{t > 0 : W ~ c (t) = a| W ~ c (0) ∈ E I }
, the time until absorption instate
a
orequivalentlythetimeuntilD
islostgiventhattheinitialnumberoffragmentsof
D
available in the systemis equal toI
. In the following,T c (E I )
will be referredto astheonditional blok lifetime. Weareinterestedin theonditional probabilitydistribution
funtion,
P (T c (E I ) ≤ t)
,andtheonditional expetation,E[T c (E I )]
, giventhatW ~ c (0) ∈ E I
for
I ∈ [s..s + r]
.Fromthe theory ofabsorbingMarkov hains, weanompute
P(T c ({ w ~ c }) ≤ t)
whereT c h ({ w ~ c })
is the time until absorption in statea
given that the system initiates in state~
w c ∈ T c
. Weknowthat(e.g. [19,Lemma2.2℄)P(T c ({ w ~ c }) ≤ t) = 1 − ~e |T ind( c | w ~ c ) · exp t ~ Q c
· ~ 1 |T c | , t > 0, ~ w c ∈ T c
(2)where
ind( w ~ c )
referstotheindexofstatew ~ c
inthematrixQ ~ c
. Denitionsofvetors~e j i
and~ 1 j
were givenat theend ofSetion 3. Observethat theterm~e |T ind( c | w ~ c ) · exp t ~ Q c
· ~ 1 |T c |
intheright-handsideof (2)isnothingbutthesummation ofall
|T c |
elementsinrowind(~ w c )
ofmatrix
exp t ~ Q c
.
(2, 0), (0, 0), (2, 1), (0, 0), (0, 0) (2, 1), (0, 0), (2, 1), (0, 0), (0, 0)
(2, 1), (1, 0), (1, 1), (0, 0), (0, 0)
(2, 1), (2, 0), (0, 1), (0, 0), (0, 0)
(2, 1), (0, 0), (0, 0), (0, 0), (0, 0) (2, 0), (1, 0), (1, 1), (0, 0), (0, 0)
(2, 0), (2, 0), (0, 1), (0, 0), (0, 0) (2, 0), (0, 0), (2, 1), (1, 0), (0, 1)
(1, 0), (0, 0), (2, 1), (0, 0), (0, 0) (1, 0), (0, 0), (2, 1), (2, 0), (0, 1) (1, 0), (0, 0), (2, 1), (1, 0), (1, 1)
(1, 0), (1, 0), (1, 1), (0, 0), (0, 0)
(1, 1), (1, 0), (1, 1), (0, 0), (0, 0)
(3, 1), (0, 0), (0, 0), (0, 0), (0, 0)
(2, 2), (0, 0), (0, 0), (0, 0), (0, 0)
D
isunavailableD
isavailableµ 2
2µ 1
µ 1
µ 1
β
D
islostβ
p 2 λ p 2µ 1 p 1
2β
3α · 1/3 µ 1
3 p 2 λp 2µ 1
2α 3p 1 λp
2 p 2 λp 2p 1 λp α
µ 1
µ 2
2µ 1 + µ 2
2 p 2 λp µ 2
µ 1 2µ 1 + µ 2
2µ 1
3µ 1
1 p p λ 2α
α
µ 1
2 p
p λ
p 1 λ p
α R(2)β R(1)β 3β · 3R(1) 2 R(2) · 1/3 2β · 2R(1)R(2) · 1/2
a
Figure1: SometransitionsoftheMarkovhain
W ~ c
whenn = 2
,s = 3
,r = 1
,andk = 1
.Let
π ~ x c
denotetheprobabilitythatthesystemstartsinstatew ~ c = (~x c ,~ 0,~ 0,~ 0,~ 0) ∈ E I
attime
0
giventhatW ~ c (0) ∈ E I
. Weanwriteπ ~ x c := P
W ~ c (0) = w ~ c ∈ E I | W ~ c (0) ∈ E I
=
I x c,1 , . . . , x c,n
n Y
l=1
R(l) x c,l .
(3)Clearly
P
~
w c ∈E I π ~ x c = 1
forI ∈ [s..s + r]
. Using (2) and (3) and the total probability theoremyields,forI ∈ [s..s + r]
,P (T c (E I ) ≤ t) = X
~ w c ∈E I
π ~ x c P (T c ({ w ~ c }) ≤ t)
= 1 − X
~ w c ∈E I
π ~ x c ~e |T ind( c | w ~ c ) · exp t ~ Q c
· ~ 1 |T c | , t > 0.
(4)Weknowfrom[19,p. 46℄thattheexpetedtimeuntilabsorptiongiventhatthe
W ~ c (0) =
~
w c ∈ T c
anbewrittenasE [T c ({ w ~ c )}] = −~e |T ind( w ~ c )
c | ·
Q ~ c
−1
· ~ 1 |T c | , w ~ c ∈ T c ,
wheretheexisteneof
Q ~ c
−1
isaonsequeneofthefatthatallstatesin
T c
aretransient[19,p. 45℄. Theonditionalexpetationof
T c (E I )
isthen(reallthattheelementsofE I
areoftheform
(~x c ,~ 0,~ 0,~ 0,~ 0)
)E [T c (E I )] = X
~ w c ∈E I
π ~ x c E [T c ({ w ~ c })]
= − X
~ w c ∈E I
π ~ x c ~e |T ind( c | w ~ c ) · Q ~ c
−1
· ~ 1 |T c | ,
forI ∈ [s..s + r].
(5)5.2 Data Availability
In this setion we introdue dierent metristo quantify the availability of
D
. But rst,we will study the time during whih
J
fragmentsofD
are available in the system giventhattherewereinitially
I
fragments. Toformalizethismeasure,weintroduethefollowingsubsetsof
T c
,forJ ∈ [0..s + r]
,F J := {(~x c , ~y c , ~z c , ~u c , ~v c ) ∈ T c : S(~x c ) = J }
The set
F J
onsists of all states of proessW ~ c
in whih the number of fragments ofD
urrentlyavailableisequalto