Method and device for realizing load balancing of distributed hash table network
A distributed hash table and load balancing technology, applied in the field of communication, can solve problems such as load imbalance and achieve the effect of ensuring load balancing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] image 3 It is a structural schematic diagram of a device for implementing load balancing of a DHT network according to an embodiment of the present invention, and the device can split the virtual identifiers allocated by each node in the DHT network when the DHT network expands.
[0036] Such as image 3As shown, the device mainly includes: a splitting module 10 and a distributing module 20 . Wherein, the splitting module 10 is used to divide the load space corresponding to each of the first virtual identities among the Z first virtual identities allocated to each node in the DHT network into M shares, and use M×N second virtual identities The identifier identifies each share of load space after equalization, wherein M and N are natural numbers, and M≥2; the allocation module 20 is used to allocate M×N second virtual identifiers to the current DHT network Each node is responsible for the load space corresponding to the second virtual identifier allocated to it.
[0...
Embodiment 2
[0044] Image 6 It is a flowchart of a method for realizing load balancing of a DHT network according to an embodiment of the present invention, and the method can be realized by the device described in the first embodiment above. Such as Image 6 As shown, the method mainly includes the following steps:
[0045] Step S602: Divide the load space corresponding to each of the first virtual identities among the Z first virtual identities allocated to each node in the DHT network into M shares, and use M×Z second virtual identities to equally divide Each load space after is identified, where M and Z are natural numbers, and M≥2;
[0046] Among them, Z is the number of virtual identities in the current DHT network, that is, the number of virtual spaces that the entire load space in the DHT network is evenly divided into. For example, when the DHT network is initially established, Z can be determined according to the node planning of the DHT network and the preset load imbalance ...
Embodiment 3
[0067] In the embodiment of the present invention, the centralized topological network is taken as an example to illustrate the splitting process of the virtual identifier. In the embodiment of the present invention, when the load imbalance degree of a node in the DHT network exceeds the threshold value of the load imbalance degree, the split is performed, and after the split, the number of responsible virtual identities of each node is adjusted so that the DHT The load imbalance of nodes in the network decreases.
[0068] Figure 7 It is a flow chart of virtual identification splitting in the embodiment of the present invention, such as Figure 7 As shown, it mainly includes the following steps:
[0069] Step 701: As new nodes continue to join the overlay network, the network scale continues to expand, and the load imbalance continues to increase. When the imbalance threshold is reached, the management service node generates an alarm;
[0070] Step 702: the management servic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 