首页 | 本学科首页   官方微博 | 高级检索  
     


Algorithms and performance of load-balancing with multiple hash functions in massive content distribution
Authors:Ye Xia  Shigang Chen  Chunglae Cho  Vivekanand Korgaonkar
Affiliation:1. Department of Biochemistry and Biomedical Sciences, McMaster University, Hamilton, Ontario L8S 4K1, Canada;2. Nephrology Division & Cell Biology Program, Hospital for Sick Children, Toronto, Ontario, Canada;3. Department of Biochemistry, University of Toronto, Toronto, Ontario, Canada;4. Institute of Medicine, University of Toronto, Toronto, Ontario, Canada;5. Huntsman Cancer Institute, University of Utah, Salt Lake City, UT 84112, United States;6. Department of Pharmacology and Therapeutics, Center for Research and Treatment of Atherosclerosis, DREAM Children''s Hospital Research Institute of Manitoba, University of Manitoba, Winnipeg, Manitoba, Canada
Abstract:We consider a two-tier content distribution system for distributing massive content, consisting of an infrastructure content distribution network (CDN) and a large number of ordinary clients. The nodes of the infrastructure network form a structured, distributed-hash-table-based (DHT) peer-to-peer (P2P) network. Each file is first placed in the CDN, and possibly, is replicated among the infrastructure nodes depending on its popularity. In such a system, it is particularly pressing to have proper load-balancing mechanisms to relieve server or network overload. The subject of the paper is on popularity-based file replication techniques within the CDN using multiple hash functions. Our strategy is to set aside a large number of hash functions. When the demand for a file exceeds the overall capacity of the current servers, a previously unused hash function is used to obtain a new node ID where the file will be replicated. The central problems are how to choose an unused hash function when replicating a file and how to choose a used hash function when requesting the file. Our solution to the file replication problem is to choose the unused hash function with the smallest index, and our solution to the file request problem is to choose a used hash function uniformly at random. Our main contribution is that we have developed a set of distributed, robust algorithms to implement the above solutions and we have evaluated their performance. In particular, we have analyzed a random binary search algorithm for file request and a random gap removal algorithm for failure recovery.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号