Symphony: Distributed Hashing in a Small World

نویسندگان

  • Gurmeet Singh Manku
  • Mayank Bawa
  • Prabhakar Raghavan
چکیده

We present Symphony, a novel protocol for maintaining distributed hash tables in a wide area network. The key idea is to arrange all participants along a ring and equip them with long distance contacts drawn from a family of harmonic distributions. Through simulation, we demonstrate that our construction is scalable, exible, stable in the presence of frequent updates and o ers small average latency with only a handful of long distance links per node. The cost of updates when hosts join and leave is small.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Compressed Image Hashing using Minimum Magnitude CSLBP

Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...

متن کامل

Symphony - Agent-Based Platform for Distributed Smart Grid Experiments

The electricity networks in many countries are facing a number of challenges due to growth in peak demand, integration of renewable energy sources, increasing security risks and environmental concerns. Smart Grid, as an automated and widely distributed energy network, offers viable solutions to those challenges. Software agents running on customer premises or embedded in appliances and equipmen...

متن کامل

World Energy Outlook : a Comparative Study

Differen world energy outlook with different horizons (2035, 2040 and 2050) show that demand for primary energy will increase. The energymix in 2050 will mainly be fossil based although the share of theses fuels will decrease. Accorging to some forecasts, energy consumption will increase more than 50 percent during next 30 years which most of this growth belongs to non-OECD countries. In supply...

متن کامل

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

Near Optimal Routing in a Small-World Network with Augmented Local Awareness

In order to investigate the routing aspects of small-world networks, Kleinberg [13] proposes a network model based on a d-dimensional lattice with long-range links chosen at random according to the d-harmonic distribution. Kleinberg shows that the greedy routing algorithm by using only local information performs in O(lg n) expected number of hops, where n denotes the number of nodes in the netw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003