Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for realizing load balancing of distributed hash table network

A distributed hash table and load balancing technology, applied in the field of communication, can solve problems such as load imbalance and achieve the effect of ensuring load balancing

Inactive Publication Date: 2015-10-21
ZTE CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main purpose of the present invention is to provide a load balancing implementation scheme of a DHT network, to at least solve the problem of unbalanced load between the nodes of the DHT network caused by the increase of nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing load balancing of distributed hash table network
  • Method and device for realizing load balancing of distributed hash table network
  • Method and device for realizing load balancing of distributed hash table network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] image 3 It is a structural schematic diagram of a device for implementing load balancing of a DHT network according to an embodiment of the present invention, and the device can split the virtual identifiers allocated by each node in the DHT network when the DHT network expands.

[0036] Such as image 3As shown, the device mainly includes: a splitting module 10 and a distributing module 20 . Wherein, the splitting module 10 is used to divide the load space corresponding to each of the first virtual identities among the Z first virtual identities allocated to each node in the DHT network into M shares, and use M×N second virtual identities The identifier identifies each share of load space after equalization, wherein M and N are natural numbers, and M≥2; the allocation module 20 is used to allocate M×N second virtual identifiers to the current DHT network Each node is responsible for the load space corresponding to the second virtual identifier allocated to it.

[0...

Embodiment 2

[0044] Image 6 It is a flowchart of a method for realizing load balancing of a DHT network according to an embodiment of the present invention, and the method can be realized by the device described in the first embodiment above. Such as Image 6 As shown, the method mainly includes the following steps:

[0045] Step S602: Divide the load space corresponding to each of the first virtual identities among the Z first virtual identities allocated to each node in the DHT network into M shares, and use M×Z second virtual identities to equally divide Each load space after is identified, where M and Z are natural numbers, and M≥2;

[0046] Among them, Z is the number of virtual identities in the current DHT network, that is, the number of virtual spaces that the entire load space in the DHT network is evenly divided into. For example, when the DHT network is initially established, Z can be determined according to the node planning of the DHT network and the preset load imbalance ...

Embodiment 3

[0067] In the embodiment of the present invention, the centralized topological network is taken as an example to illustrate the splitting process of the virtual identifier. In the embodiment of the present invention, when the load imbalance degree of a node in the DHT network exceeds the threshold value of the load imbalance degree, the split is performed, and after the split, the number of responsible virtual identities of each node is adjusted so that the DHT The load imbalance of nodes in the network decreases.

[0068] Figure 7 It is a flow chart of virtual identification splitting in the embodiment of the present invention, such as Figure 7 As shown, it mainly includes the following steps:

[0069] Step 701: As new nodes continue to join the overlay network, the network scale continues to expand, and the load imbalance continues to increase. When the imbalance threshold is reached, the management service node generates an alarm;

[0070] Step 702: the management servic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and an apparatus for implementing load balancing of a Distributed Hash Table (DHT) network, wherein the method includes: a load space corresponding to each first virtual identifier of N first virtual identifiers distributed to each node in the DHT network is divided into M portions equally, and M×N second virtual identifiers are respectively used to identify each portion of the load space after equal division, wherein M and N are natural numbers, and M?2; the M×N second virtual identifiers are distributed to each node in the current DHT network, and each node is responsible for the load space corresponding to the second virtual identifier distributed to itself. The present invention can implement data storage load balancing of DHT networks, and meanwhile reduce workloads of virtual identifier management and virtual identifier transfer.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a load balancing method and device for a distributed hash table (Distributed Hash Table, DHT for short) network. Background technique [0002] At present, Distributed Hash Table (DHT) has become the main organization form of peer-to-peer (P2P) overlay network, and its storage load balancing is mainly realized by the method of virtual identification. In the distributed hash overlay network, there are two different attributes of node ID and virtual ID. Among them, the node ID is used to distinguish different nodes and maintain the distributed hash table overlay network; the virtual identifier is used to divide the hash table space into multiple intervals and assign them to nodes. In a distributed hash table overlay network, each node ID is different, and each virtual identity is also different. It is allowed that the node ID is the same as the virtual ID. In the overlay networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/803H04L12/743H04L29/08
CPCH04L67/104H04L67/1023
Inventor 胡学川李漓春
Owner ZTE CORP