CSE202 Project - Consistent Hashing

نویسنده

  • Neil Alldrin
چکیده

Consistent hashing is a special kind of hashing which is useful for certain applications. Originally devised by Karger et. al. at MIT[2] for use in distributed caching, the idea has now been expanded to other areas, most notably peer to peer networking[5][4]. As internet use increases and as distributed systems grow more prevalent (ie, Napster clones), consistent hashing could play an increasingly important role. At a basic level, consistent hashing is just a special kind of hashing. Namely, a consistent hash function is one which changes minimally as the range of the function changes[2]. This makes consistent hashing ideal in circumstances where the set of buckets changes over time. Furthermore, it can be shown that, with high probability, two users with inconsistent but overlapping sets of buckets will map items to the same buckets. This is particularly important because it eliminates the need to maintain consistent state among all nodes in a network. In this paper I present a family of consistent hash functions, attempt to prove certain properties of these functions, and describe an application of consistent hashing, namely peer to peer networking.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

Compressed Image Hashing using Minimum Magnitude CSLBP

Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...

متن کامل

Perfect Consistent Hashing

Consistent Hashing functions are widely used for load balancing across a variety of applications. However, the original presentation and typical implementations of Consistent Hashing rely on randomised allocation of hash codes to keys which results in a flawed and approximately-uniform allocation of keys to hash codes. We analyse the desired properties and present an algorithm that perfectly ac...

متن کامل

Multi-probe consistent hashing

1 Abstract We describe a consistent hashing algorithm which performs multiple lookups per key in a hash table of nodes. It requires no additional storage beyond the hash table, and achieves a peak-to-average load ratio of 1 + ε with just 1 + 1 ε lookups per key.

متن کامل

Asymptotic Miss Ratio of LRU Caching with Consistent Hashing

To efficiently scale data caching infrastructure to support emerging big data applications, many caching systems rely on consistent hashing to group a large number of servers to form a cooperative cluster. These servers are organized together according to a random hash function. They jointly provide a unified but distributed hash table to serve swift and voluminous data item requests. Different...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002