12
Contributing Storage Using the Transparent
File System
JAMES CIPAR, MARK D. CORNER, and EMERY D. BERGER
University of Massachusetts Amherst
Contributory applications allow users to donate unused resources on their personal computers to
a shared pool. Applications such as SETI@home, Folding@home, and Freenet are now in wide use
and provide a variety of services, including data processing and content distribution. However,
while several research projects have proposed contributory applications that support peer-to-peer
storage systems, their adoption has been comparatively limited. We believe that a key barrier to
the adoption of contributory storage systems is that contributing a large quantity of local storage
interferes with the principal user of the machine.
To overcome this barrier, we introduce the Transparent File System (TFS). TFS provides back-
ground tasks with large amounts of unreliable storage—all of the currently available space—
without impacting the performance of ordinary file access operations. We show that TFS allows
a peer-to-peer contributory storage system to provide 40% more storage at twice the performance
when compared to a user-space storage mechanism. We analyze the impact of TFS on replication
in peer-to-peer storage systems and show that TFS does not appreciably increase the resources
needed for file replication.
Categories and Subject Descriptors: D.4.3 [Operating Systems]: File Systems Management—File
organization
General Terms: Performance
Additional Key Words and Phrases: Contributory systems, fragmentation, aging, peer-to-peer
ACM Reference Format:
Cipar, J., Corner, M. D., and Berger, E. D. 2007. Contributing storage using the transparent file
system. ACM Trans. Stor. 3, 3, Article 12 (October 2007), 26 pages. DOI = 10.1145/1288783.1288787
http://doi.acm.org/10.1145/1288783.1288787
This material is based upon work supported by the National Science Foundation under CAREER
Awards CNS-0447877 and CNS-0347339, and DUE 0416863. Any opinions, findings, and conclu-
sions or recommendations expressed in this material are those of the author(s) and do not neces-
sarily reflect the views of the NSF.
Authors’ addresses: J. Cipar, M. D. Corner (corresponding author), E. D. Berger, Computer Science
Building, University of Massachusetts Amherst, 140 Governor’s Drive, Amherst, MA 01003; email:
mcorner@cs.umass.edu.
Permission to make digital or hard copies of part or all of this work for personal or classroom use is
granted without fee provided that copies are not made or distributed for profit or direct commercial
advantage and that copies show this notice on the first page or initial screen of a display along
with the full citation. Copyrights for components of this work owned by others than ACM must be
honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers,
to redistribute to lists, or to use any component of this work in other works requires prior specific
permission and/or a fee. Permissions may be requested from Publications Dept., ACM, Inc., 2 Penn
Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1 (212) 869-0481, or permission@acm.org.
C
2007 ACM 1553-3077/2007/10-ART12 $5.00 DOI = 10.1145/1288783.1288787 http://doi.acm.org/
10.1145/1288783.1288787
ACM Transactions on Storage, Vol. 3, No. 3, Article 12, Publication date: October 2007.