2013 Conference on Networked Systems 2013
DOI: 10.1109/netsys.2013.9
|View full text |Cite
|
Sign up to set email alerts
|

Adding Capacity-Aware Storage Indirection to Homogeneous Distributed Hash Tables

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…It is hard to say how much benefit is gain by doubling the memory or CPU frequency. The papers of Suselbeck et al and Wetti and Graffi [20,21] use the bottleneck rate at which data can be sent into the network as a node capacity. In this paper, we focus on the NoSQL node's performance.…”
Section: Quantify Node's Capacitymentioning
confidence: 99%
See 1 more Smart Citation
“…It is hard to say how much benefit is gain by doubling the memory or CPU frequency. The papers of Suselbeck et al and Wetti and Graffi [20,21] use the bottleneck rate at which data can be sent into the network as a node capacity. In this paper, we focus on the NoSQL node's performance.…”
Section: Quantify Node's Capacitymentioning
confidence: 99%
“…The papers of Suselbeck et al . and Wetti and Graffi use the bottleneck rate at which data can be sent into the network as a node capacity. In this paper, we focus on the NoSQL node's performance.…”
Section: Optimizing Data Placementmentioning
confidence: 99%
“…For that the responsible node maintains a list of receivers and forwards the file request to individual nodes from this list. 56 Which previous receiver is selected can be chosen based on various factors. However, for popular files, many receivers are available to serve the file even further.…”
Section: Traffic Load Balancingmentioning
confidence: 99%
“…We extended PAST to harness, in such cases, the large group of file receivers to spread out the data themselves. For that the responsible node maintains a list of receivers and forwards the file request to individual nodes from this list 56 . Which previous receiver is selected can be chosen based on various factors.…”
Section: The P2p Frameworkmentioning
confidence: 99%
“…For unstructured overlays, Gnutella 0.4 , Gnutella 0.6 , and Gia are implemented as representatives. For the structured variant, Kademlia , Pastry , Content addressable Network (CAN) , and multiple Chord alternatives (EpiChord , ReChord , Ca‐ReChord , and Adaptive Chord ) are ready to use. Furthermore, the simulator comes with two centralized overlays for comparison: one with a centralized index and one with a centralized storage.…”
Section: Simulator Architecturementioning
confidence: 99%