Unlock instant, AI-driven research and patent intelligence for your innovation.

Load balancing realization method and device for DHT (distributed Hash table) network

A distributed hash table and load balancing technology, applied in the field of communication, can solve problems such as load imbalance and achieve the effect of ensuring load balancing

Inactive Publication Date: 2012-05-16
ZTE CORP
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main purpose of the present invention is to provide a load balancing implementation scheme of a DHT network, to at least solve the problem of unbalanced load between the nodes of the DHT network caused by the increase of nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Load balancing realization method and device for DHT (distributed Hash table) network
  • Load balancing realization method and device for DHT (distributed Hash table) network
  • Load balancing realization method and device for DHT (distributed Hash table) network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] image 3 It is a schematic structural diagram of a device for implementing load balancing of a DHT network according to an embodiment of the present invention, the device can split the virtual identifiers allocated by each node in the DHT network when the DHT network is expanded.

[0036] like image 3As shown, the device mainly includes: a splitting module 10 and a distribution module 20 . The splitting module 10 is configured to equally divide the load space corresponding to each of the first virtual identities in the Z first virtual identities that have been allocated to each node in the DHT network into M shares, and use M×N second virtual identities. The identifier identifies each load space after the even distribution, wherein M and N are natural numbers, and M≥2; the allocation module 20 is used for allocating M×N of the second virtual identifiers to the current DHT network Each node is responsible for the load space corresponding to the second virtual identifi...

Embodiment 2

[0044] Image 6 This is a flowchart of a method for implementing load balancing of a DHT network according to an embodiment of the present invention, and the method can be implemented by the apparatus described in the first embodiment. like Image 6 As shown, the method mainly includes the following steps:

[0045] Step S602: Divide the load space corresponding to each of the first virtual identities in the Z first virtual identities that have been allocated to each node in the DHT network into M shares, and use M×Z second virtual identities to equally divide the load space. Each subsequent load space is identified, where M and Z are natural numbers, and M≥2;

[0046] Among them, Z is the number of virtual identifiers in the current DHT network, that is, the number of virtual spaces evenly divided into the entire load space in the DHT network. For example, when the DHT network is initially built, Z can be determined according to the node planning of the DHT network and the ...

Embodiment 3

[0067] The embodiment of the present invention takes a centralized topology network as an example to describe the splitting process of a virtual identity. In the embodiment of the present invention, splitting is performed when the load unbalance degree of some nodes in the DHT network exceeds the load unbalance degree threshold, and after splitting, the number of responsible virtual identifiers of each node is adjusted, so that the DHT The load imbalance of nodes in the network decreases.

[0068] Figure 7 is a flowchart of virtual identification splitting in the embodiment of the present invention, such as Figure 7 It mainly includes the following steps:

[0069] Step 701: As new nodes continue to join the overlay network, the network scale continues to expand, and the load unbalance degree continues to increase. When the unbalance degree threshold is reached, the management service node generates an alarm;

[0070] Step 702: The management service node sends an alarm noti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a load balancing realization method and device for a DHT (distributed Hash table) network. The method comprises the following steps: equalizing load space corresponding to each first virtual identification in N first virtual identifications which are distributed to each node in the DHT network into M parts; identifying each equalized load space by M*N second virtual identifications, wherein M and N are natural numbers, and M is more than or equal to 2; distributing the M*N second virtual identifications to each node in the current DHT network; and ensuring that each node is in charge of the load space corresponding to the second virtual identification which is distributed to each node. According to the load balancing realization method and device disclosed by the invention, the load of each node in the DHT network is guaranteed to be balanced.

Description

technical field [0001] The present invention relates to the field of communications, and in particular, to a method and device for implementing load balancing in a distributed hash table (Distributed Hash Table, DHT for short) network. Background technique [0002] At present, the distributed hash table (DHT) has become the main organizational form of the peer-to-peer (P2P) overlay network, and its storage load balancing is mainly realized by the method of virtual identification. In the distributed hash overlay network, an identifier with two different attributes, node ID and virtual identifier, is at the same time. Among them, the node ID is used to distinguish different nodes and maintain the distributed hash table overlay network; the virtual ID is used to divide the hash table space into multiple intervals and assign them to the nodes. In a distributed hash table overlay network, each node ID is different, and each virtual identity is also different. The situation wher...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/56H04L29/08
CPCH04L29/08234H04L29/08306H04L67/104H04L67/1023
Inventor 胡学川李漓春
Owner ZTE CORP