SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
309
A METHOD FOR BALANCING HETEROGENEOUS REQUEST LOAD
IN DHT-BASED P2P SYSTEMS
Mrs. Yogita A. Dalvi
M.TECH.[C.S.E.] (Pursuing), IES College, RGPV University Bhopal
ABSTRACT
DHT-based P2P systems have been proven to be a scalable and efficient means of
sharing information. With the entrance of quality of services concerns into DHT systems,
however, the ability to guarantee that the system will not be overwhelmed due to load
imbalance becomes much more significant, especially when factors such as item popularity
and skewing are taken into consideration. In this paper, we focus on the problem of load
imbalance caused by skewed access distribution. We propose an effective load balancing
solution, which takes the peer heterogeneity and access popularity into account to determine
the load distribution. Our algorithm achieves load balancing by dynamically balancing the
query routing load and query answering load respectively. Experimentations performed over
a Pastry-like system illustrate that our balancing algorithms effectively balance the system
load and significantly improves performance.
Keywords: Load-balancing, distributed hash tables (DHT), peer-to-peer (P2P) systems, and
quality of service (QoS).
1. INTRODUCTION
Distributed Hash Tables (DHTs) provide a reliable, scalable, fault tolerant and
efficient way to manage P2P networks. Typically employing some variant of consistent
hashing to associate keys with nodes, each node is mapped to a unique ID and owns the set of
objects whose IDs are “closest” to it, while object lookup queries consist of following well-
defined paths from a querying node to a destination node that holds the index entries
pertaining to the query. In theory, DHTs can provide fair and scalable service because they
achieve a balanced partition of workload amount the nodes in the system. In practice
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 2, March – April (2013), pp. 309-314
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
310
however, this is not always the case. Given the heterogeneous nature of
individual peer capacity in a P2P network (due to non-uniform computational power,
storage capacity and network bandwidth difference between peers), even a uniform workload
distribution amongst peers can still lead to load imbalance problems, additionally
encumbered by the fact that the consistent hash used by DHTs can cause certain peers to have
up to O(logN) times as many objects as the average peer in the network [3], intensifying the
imbalance. Furthermore, since objects and queries within the system tend to be skewed [5][6]
(i.e. certain objects are significantly more popular than others), heavy lookup traffic load is
experienced at the peers responsible for popular objects, as well as at the intermediary nodes
on the lookup paths to those peers. When subsequent tasks are then obliviously assigned to
the already overloaded node, the average response time consequently increases drastically.
This paper aims at balancing the highly unbalanced load caused by skewed object and query
distribution through the use of a comprehensive balancing mechanism, which includes an
adaptive load redistribution scheme as well as a dynamic routing table reconfiguring scheme.
2. RELATED WORK
There have been many load balancing schemes proposed for DHT-based systems. Roughly,
we divide them into four categories:
The virtual server approach focuses on the imbalance of the key distribution due to
the hash function. Each physical node instantiates O(logN) number of virtual servers with
random IDs that act as peers in the DHT, which reduces the load imbalance to a constant
factor. To address peer heterogeneity, each node selects a number of virtual servers to create
proportional to its capacity. Unfortunately, the usage of virtual servers greatly increases the
amount of routing metadata needed on each peer and causes more maintenance overhead. In
addition, the number of hops per lookup (and latencies) increases. Moreover, it doesn’t take
object popularity into account.
Unlike the virtual server approach, the dynamic ID approach uses just a single ID per
node .The load of a peer can be adjusted by choosing a suitable ID in the namespace.
However, all such solutions requires IDs to be reassigned to maintain load balance as nodes
dynamically join and leave the system, resulting in a high overhead because it involves
transferring objects and updating overlay links.
The third class of approaches uses multiple hash functions to balance the load. The
power of two choices uses two or more hash functions to map a key to multiple nodes and
store the key on the peer that is the least loaded. In the k-choice load balancing algorithm, the
node uses multiple hashes to generate a set of IDs and at join time selects an ID in a way to
minimize the discrepancies between capacity and load for itself and the nodes that will be
affected by its join time. While such a strategy is simple and efficient, it increases the
computational overhead for publishing and retrieving content, since multiple hash functions
have to be computed each time; in addition, it is a static allocation, and does not change in the
case that the workload distribution shifts.
The last category of balancing schemes is by caching and replication. Hotspots and
dynamic streams are handled by using caches to store popular objects in the network, and
lookups are considered resolved whenever cache hits occur along the path. Pastry and Chord
replicate an object on the k servers whose identifiers are closest to the object key in the
namespace to improve the availability, but it also help balance the load of a popular topic.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
311
Unfortunately, the last few hops of a lookup are precisely the ones that can least be
optimized. Moreover, since the query load is dynamic, a fixed number of replicas do not
work well; if the number is chosen too high, then resources may be wasted, and if it is set too
low, then these replicas may not be enough to support a high query load.
3. ADAPTIVE LOAD BALANCING SCHEME
We propose a comprehensive load balancing strategy, which address this problem by
dynamically re-distributing the load of hot spots to other ‘cold spots’. Particularly, we
distinguish two types of load: query answering load and query forwarding load (query load
and routing load for short). Aiming at balancing these two kinds of load, three balancing
strategies have been proposed:
(1) Adaptive object replication scheme, which targets balancing the query load; and
(2) Adaptive routing replication and
(3) Dynamic routing table reconfiguration, both aimed at balancing the system’s routing
load. Each node analyzes the main cause of its overloading and uses a particular balancing
algorithm to correct its situation.
1. Adaptive Routing Replication Algorithm
Replicating popular keys relieves the query answering load of the nodes responsible
for the keys. However, another major source of workload in DHT overlays is caused by
relaying queries among nodes. A node may be overwhelmed simply by the traffic of
forwarding incoming routing queries. For example, the last hop neighbors of a popular key
can be overloaded by forwarding queries to the popular node. While this problem can be
partially solved by the aforementioned duplication of popular keys to disperse the traffic, it
cannot completely alleviate the problem since certain nodes in the system might still be
functioning effectively as traffic hubs for popular sections of the network. To address this
problem, we propose a balancing scheme which actively redistributes the routing load of an
overloaded node by duplicating its routing table to other nodes, thereby sharing its routing
load. When a node is overloaded by routing loads, it will pick a light loaded node to replicate
its routing table, so that the replica node can share its routing load. As with the object
replication algorithm, the routing replica information should be propagated to other related
nodes. These nodes subsequently update their respective routing tables by adding a replica
entry to the entry of the original node so that future queries can be routed to either the
original node or the new node, all the while maintaining system network correctness. Besides
load balancing, replication approach can also improve the routing resiliency in the face of
network failures.
Figure 1 shows an example of the Pastry structure with the replication of routing
tables. The query for item ID 0221, which is actually served by node 0222, is initiated at node
2012. According to its routing table, node 2012 chooses 0021 as the next hop. Node 0021
determines that node 0200 should be the right node to forward the query. Since node 0200
has a replica at node 1102, node 0021 may choose 1102 as the next hop. When the query is
sent to 1102, it uses the duplicated routing table for 0200 to serve the query and send the
query to the destination node 0222. When node 0200 is exposed to a high load, the replicas
will share some of the traffic, preventing overload.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
312
Figure 1. An example of adaptive routing replication algorithm
2. Dynamic routing load adjusting algorithm
In addition to the use of replication, another scheme to balance the routing load is by
dynamically reconfiguring the routing table. In the previously mentioned methods, an
overloaded node actively redistributes its own load, but in cases where external policies or
the network environment prevents the redistribution effort, replacing routing table content
can help relieve highly loaded nodes.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
313
This algorithm is tailored specifically for DHTs like Pastry or Tapestry. In those
systems, many nodes with the same prefix can be potentially filled in a node’s routing table;
the one in the table is the one the node knows, and with topological metric considered, it will
‘pick’ the one closest to itself. We propose changing the strategy of choosing nodes in the
routing table to balance routing load (especially to relieve heavily loaded nodes). In lieu of
simply choosing according to a proximity metric, we choose with lower routing load instead.
Whenever an overloaded node receives a querying message from its neighbour, it will reply
with a message indicating its overloaded status. This neighbour, receiving the message, will,
at the earliest opportunity possible, replace the entry of the overloaded node in its routing
table with another node of the similar prefix. The light-loaded candidate nodes are learned
from forwarded query messages which include IDs of passed nodes. By doing so, traffic is
alleviated from the overloaded load as long as it is not the actual ‘end target’ of the query
request, as the replacement node will be able to direct any queries the original node could’ve,
and forwarding traffic is spread out more evenly.
Continuing from our example in Figure 1, in node 1102’s routing table, let us assume
that a neighbor node, 2122, (1
st
row 3
rd
column) is heavily-loaded. When a query passes
through node 2012 to 0021 and then comes to node 1102, since 2012 shares the identical first
digital prefix (2) as the overloaded neighbor 2122 in 1102’s routing table, the entry of 2122
will be replaced with 2012. This way, the traffic to the more heavily loaded 2122 will be
redirected to the more free 2012.
4. CONCLUSION
We have presented an effective approach to balance load in DHT systems. Our work
distinguishes routing load and retrieval load, and deals them separately. By dynamically
replicating different potions of the overloaded node based on source of the overloading
(replicating either its routing table or its keys), we overcome the restrictive nature of
traditional balancing schemes that assumes homogeneity among peers and the type of load
they incur. This approach enables the system good load balance even when demand is heavily
skewed. Extensive simulation results indicate significant improvements in maintaining a
more balanced system, leading to improved scalability and performance.
5. REFERENCES
[1] B. Godfrey, K. Lakshminarayanan, S. Surana, R. Karp, and I. Stoica, “Load balancing in
dynamic structured P2P systems,” in Proceedings of the 23rd Conference of the IEEE
Communications Society (Infocom 2004), 2004.
[2] D. Karger and M. Ruhl, “Simple efficient load balancing algorithms for peer-to-peer
systems,” in Proceedings of 16th ACM Symposium on Parallelism in Algorithms and
Architectures, 2004, pp. 36–43.
[3] A. R. Karthik, K. Lakshminarayanan, S. Surana, R. Karp, and I. Stoica, “Load balancing
in structured P2P systems,” in Proceedings of 2ndInternational Workshop on Peer-to-Peer
Systems, 2003, pp. 68–79.
[4] G. Manku. “Balanced binary trees for ID management and load balance in distributed
hash tables.” In Proceedings of Twenty-Third Annual ACM SIGACT-SIGOPS
Symposium on Principles of Distributed Computing (PODC 2004), 2004.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
314
[5] J. Byers, J. Considine, and M. Mitzenmacher, “Simple load balancing for distributed hash
tables,” in Proceedings of 2nd International Workshop on Peer-to-Peer Systems, 2003,
pp. 80–87.
[6] J. Ledlie and M. Seltzer, “Distributed, secure load balancing with skew, heterogeneity,
and churn,” in Proceedings of the 24rd Conference of the IEEE Communications Society,
(Infocom 2005), 2005.
[7] Mohanjeet Singh, D.S Dhaliwal and Neeraj Garg, “Searching and Streaming of
Multimedia Content in P2P Overlay Network”, International journal of Computer
Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 433 - 438,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[8] Srikanth T.N. and Prabhudeva S, “Explicit Study on Security Issues in Multimedia
Streaming in Peer to Peer Network”, International journal of Computer Engineering &
Technology (IJCET), Volume 3, Issue 2, 2012, pp. 588 - 602, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.

More Related Content

What's hot

An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...ijceronline
 
Survey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in CloudSurvey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in CloudAM Publications
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621IJRAT
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networkscsandit
 
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASESA PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASESijp2p
 
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server EnvironmentTime Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environmentrahulmonikasharma
 
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...CSCJournals
 
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...IJCNCJournal
 
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...IRJET Journal
 
A load balancing algorithm based on
A load balancing algorithm based onA load balancing algorithm based on
A load balancing algorithm based onijp2p
 
Challenges in Dynamic Resource Allocation and Task Scheduling in Heterogeneou...
Challenges in Dynamic Resource Allocation and Task Scheduling in Heterogeneou...Challenges in Dynamic Resource Allocation and Task Scheduling in Heterogeneou...
Challenges in Dynamic Resource Allocation and Task Scheduling in Heterogeneou...rahulmonikasharma
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 

What's hot (14)

An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
 
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh NetworkRobustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
 
Survey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in CloudSurvey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in Cloud
 
06425531
0642553106425531
06425531
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networks
 
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASESA PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
 
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server EnvironmentTime Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment
 
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
 
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
 
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...
 
A load balancing algorithm based on
A load balancing algorithm based onA load balancing algorithm based on
A load balancing algorithm based on
 
Challenges in Dynamic Resource Allocation and Task Scheduling in Heterogeneou...
Challenges in Dynamic Resource Allocation and Task Scheduling in Heterogeneou...Challenges in Dynamic Resource Allocation and Task Scheduling in Heterogeneou...
Challenges in Dynamic Resource Allocation and Task Scheduling in Heterogeneou...
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 

Viewers also liked

Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...IAEME Publication
 
Analytical techniques used for disease diagnosis–invasive and non invasive tools
Analytical techniques used for disease diagnosis–invasive and non invasive toolsAnalytical techniques used for disease diagnosis–invasive and non invasive tools
Analytical techniques used for disease diagnosis–invasive and non invasive toolsIAEME Publication
 
Overlapping optimization with parsing through metagrammars
Overlapping optimization with parsing through metagrammarsOverlapping optimization with parsing through metagrammars
Overlapping optimization with parsing through metagrammarsIAEME Publication
 
An overview of a continuous monitoring and control system for 3 phase induct
An overview of a continuous monitoring and control system for 3 phase inductAn overview of a continuous monitoring and control system for 3 phase induct
An overview of a continuous monitoring and control system for 3 phase inductIAEME Publication
 
Geothermal energy the eco friendly alternative source of energy
Geothermal energy  the eco friendly alternative source of energyGeothermal energy  the eco friendly alternative source of energy
Geothermal energy the eco friendly alternative source of energyIAEME Publication
 
Enhancement in frequency band of printed rectangular monopole antenna by pushing
Enhancement in frequency band of printed rectangular monopole antenna by pushingEnhancement in frequency band of printed rectangular monopole antenna by pushing
Enhancement in frequency band of printed rectangular monopole antenna by pushingIAEME Publication
 
Lotka’s law a study with reference to the literature by
Lotka’s law a study with reference to the literature byLotka’s law a study with reference to the literature by
Lotka’s law a study with reference to the literature byIAEME Publication
 
Bisfenol a eta parabenak
Bisfenol a eta parabenakBisfenol a eta parabenak
Bisfenol a eta parabenakiker7
 
Diego loaiza manejo de word (1)
Diego loaiza manejo de word (1)Diego loaiza manejo de word (1)
Diego loaiza manejo de word (1)1984bulldog
 
Tipografía y color sesión 8
Tipografía y color sesión 8Tipografía y color sesión 8
Tipografía y color sesión 8yessiguitar
 
Boa constrictor occidentalis
Boa constrictor occidentalisBoa constrictor occidentalis
Boa constrictor occidentalisjuliomunoz501
 
3ª Pesquisa Eleitoral - 2º Turno
3ª Pesquisa Eleitoral - 2º Turno3ª Pesquisa Eleitoral - 2º Turno
3ª Pesquisa Eleitoral - 2º TurnoDurango Duarte
 
Diseño de ambientes de aprendizaje
Diseño de ambientes de aprendizajeDiseño de ambientes de aprendizaje
Diseño de ambientes de aprendizajeAKARYYAMILET
 
Warner Bros.
Warner Bros.Warner Bros.
Warner Bros.fajavare
 

Viewers also liked (20)

Agener~1
Agener~1Agener~1
Agener~1
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...
 
Analytical techniques used for disease diagnosis–invasive and non invasive tools
Analytical techniques used for disease diagnosis–invasive and non invasive toolsAnalytical techniques used for disease diagnosis–invasive and non invasive tools
Analytical techniques used for disease diagnosis–invasive and non invasive tools
 
Overlapping optimization with parsing through metagrammars
Overlapping optimization with parsing through metagrammarsOverlapping optimization with parsing through metagrammars
Overlapping optimization with parsing through metagrammars
 
An overview of a continuous monitoring and control system for 3 phase induct
An overview of a continuous monitoring and control system for 3 phase inductAn overview of a continuous monitoring and control system for 3 phase induct
An overview of a continuous monitoring and control system for 3 phase induct
 
Geothermal energy the eco friendly alternative source of energy
Geothermal energy  the eco friendly alternative source of energyGeothermal energy  the eco friendly alternative source of energy
Geothermal energy the eco friendly alternative source of energy
 
Enhancement in frequency band of printed rectangular monopole antenna by pushing
Enhancement in frequency band of printed rectangular monopole antenna by pushingEnhancement in frequency band of printed rectangular monopole antenna by pushing
Enhancement in frequency band of printed rectangular monopole antenna by pushing
 
Lotka’s law a study with reference to the literature by
Lotka’s law a study with reference to the literature byLotka’s law a study with reference to the literature by
Lotka’s law a study with reference to the literature by
 
Encuadre curso
Encuadre cursoEncuadre curso
Encuadre curso
 
Bisfenol a eta parabenak
Bisfenol a eta parabenakBisfenol a eta parabenak
Bisfenol a eta parabenak
 
Diego loaiza manejo de word (1)
Diego loaiza manejo de word (1)Diego loaiza manejo de word (1)
Diego loaiza manejo de word (1)
 
Presentación1
Presentación1Presentación1
Presentación1
 
Tipografía y color sesión 8
Tipografía y color sesión 8Tipografía y color sesión 8
Tipografía y color sesión 8
 
Boa constrictor occidentalis
Boa constrictor occidentalisBoa constrictor occidentalis
Boa constrictor occidentalis
 
3ª Pesquisa Eleitoral - 2º Turno
3ª Pesquisa Eleitoral - 2º Turno3ª Pesquisa Eleitoral - 2º Turno
3ª Pesquisa Eleitoral - 2º Turno
 
Powerpoint 4cad
Powerpoint 4cadPowerpoint 4cad
Powerpoint 4cad
 
One direction
One directionOne direction
One direction
 
Ser piloto es
Ser piloto esSer piloto es
Ser piloto es
 
Diseño de ambientes de aprendizaje
Diseño de ambientes de aprendizajeDiseño de ambientes de aprendizaje
Diseño de ambientes de aprendizaje
 
Warner Bros.
Warner Bros.Warner Bros.
Warner Bros.
 

Similar to A method for balancing heterogeneous request load in dht based p2 p

Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlesSoundar Msr
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...ijp2p
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...ijp2p
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...ijp2p
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...ijp2p
 
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...iosrjce
 

Similar to A method for balancing heterogeneous request load in dht based p2 p (20)

Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
 
J017367075
J017367075J017367075
J017367075
 
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
 
J41046368
J41046368J41046368
J41046368
 
C017130912
C017130912C017130912
C017130912
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

A method for balancing heterogeneous request load in dht based p2 p

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 309 A METHOD FOR BALANCING HETEROGENEOUS REQUEST LOAD IN DHT-BASED P2P SYSTEMS Mrs. Yogita A. Dalvi M.TECH.[C.S.E.] (Pursuing), IES College, RGPV University Bhopal ABSTRACT DHT-based P2P systems have been proven to be a scalable and efficient means of sharing information. With the entrance of quality of services concerns into DHT systems, however, the ability to guarantee that the system will not be overwhelmed due to load imbalance becomes much more significant, especially when factors such as item popularity and skewing are taken into consideration. In this paper, we focus on the problem of load imbalance caused by skewed access distribution. We propose an effective load balancing solution, which takes the peer heterogeneity and access popularity into account to determine the load distribution. Our algorithm achieves load balancing by dynamically balancing the query routing load and query answering load respectively. Experimentations performed over a Pastry-like system illustrate that our balancing algorithms effectively balance the system load and significantly improves performance. Keywords: Load-balancing, distributed hash tables (DHT), peer-to-peer (P2P) systems, and quality of service (QoS). 1. INTRODUCTION Distributed Hash Tables (DHTs) provide a reliable, scalable, fault tolerant and efficient way to manage P2P networks. Typically employing some variant of consistent hashing to associate keys with nodes, each node is mapped to a unique ID and owns the set of objects whose IDs are “closest” to it, while object lookup queries consist of following well- defined paths from a querying node to a destination node that holds the index entries pertaining to the query. In theory, DHTs can provide fair and scalable service because they achieve a balanced partition of workload amount the nodes in the system. In practice INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), pp. 309-314 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 310 however, this is not always the case. Given the heterogeneous nature of individual peer capacity in a P2P network (due to non-uniform computational power, storage capacity and network bandwidth difference between peers), even a uniform workload distribution amongst peers can still lead to load imbalance problems, additionally encumbered by the fact that the consistent hash used by DHTs can cause certain peers to have up to O(logN) times as many objects as the average peer in the network [3], intensifying the imbalance. Furthermore, since objects and queries within the system tend to be skewed [5][6] (i.e. certain objects are significantly more popular than others), heavy lookup traffic load is experienced at the peers responsible for popular objects, as well as at the intermediary nodes on the lookup paths to those peers. When subsequent tasks are then obliviously assigned to the already overloaded node, the average response time consequently increases drastically. This paper aims at balancing the highly unbalanced load caused by skewed object and query distribution through the use of a comprehensive balancing mechanism, which includes an adaptive load redistribution scheme as well as a dynamic routing table reconfiguring scheme. 2. RELATED WORK There have been many load balancing schemes proposed for DHT-based systems. Roughly, we divide them into four categories: The virtual server approach focuses on the imbalance of the key distribution due to the hash function. Each physical node instantiates O(logN) number of virtual servers with random IDs that act as peers in the DHT, which reduces the load imbalance to a constant factor. To address peer heterogeneity, each node selects a number of virtual servers to create proportional to its capacity. Unfortunately, the usage of virtual servers greatly increases the amount of routing metadata needed on each peer and causes more maintenance overhead. In addition, the number of hops per lookup (and latencies) increases. Moreover, it doesn’t take object popularity into account. Unlike the virtual server approach, the dynamic ID approach uses just a single ID per node .The load of a peer can be adjusted by choosing a suitable ID in the namespace. However, all such solutions requires IDs to be reassigned to maintain load balance as nodes dynamically join and leave the system, resulting in a high overhead because it involves transferring objects and updating overlay links. The third class of approaches uses multiple hash functions to balance the load. The power of two choices uses two or more hash functions to map a key to multiple nodes and store the key on the peer that is the least loaded. In the k-choice load balancing algorithm, the node uses multiple hashes to generate a set of IDs and at join time selects an ID in a way to minimize the discrepancies between capacity and load for itself and the nodes that will be affected by its join time. While such a strategy is simple and efficient, it increases the computational overhead for publishing and retrieving content, since multiple hash functions have to be computed each time; in addition, it is a static allocation, and does not change in the case that the workload distribution shifts. The last category of balancing schemes is by caching and replication. Hotspots and dynamic streams are handled by using caches to store popular objects in the network, and lookups are considered resolved whenever cache hits occur along the path. Pastry and Chord replicate an object on the k servers whose identifiers are closest to the object key in the namespace to improve the availability, but it also help balance the load of a popular topic.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 311 Unfortunately, the last few hops of a lookup are precisely the ones that can least be optimized. Moreover, since the query load is dynamic, a fixed number of replicas do not work well; if the number is chosen too high, then resources may be wasted, and if it is set too low, then these replicas may not be enough to support a high query load. 3. ADAPTIVE LOAD BALANCING SCHEME We propose a comprehensive load balancing strategy, which address this problem by dynamically re-distributing the load of hot spots to other ‘cold spots’. Particularly, we distinguish two types of load: query answering load and query forwarding load (query load and routing load for short). Aiming at balancing these two kinds of load, three balancing strategies have been proposed: (1) Adaptive object replication scheme, which targets balancing the query load; and (2) Adaptive routing replication and (3) Dynamic routing table reconfiguration, both aimed at balancing the system’s routing load. Each node analyzes the main cause of its overloading and uses a particular balancing algorithm to correct its situation. 1. Adaptive Routing Replication Algorithm Replicating popular keys relieves the query answering load of the nodes responsible for the keys. However, another major source of workload in DHT overlays is caused by relaying queries among nodes. A node may be overwhelmed simply by the traffic of forwarding incoming routing queries. For example, the last hop neighbors of a popular key can be overloaded by forwarding queries to the popular node. While this problem can be partially solved by the aforementioned duplication of popular keys to disperse the traffic, it cannot completely alleviate the problem since certain nodes in the system might still be functioning effectively as traffic hubs for popular sections of the network. To address this problem, we propose a balancing scheme which actively redistributes the routing load of an overloaded node by duplicating its routing table to other nodes, thereby sharing its routing load. When a node is overloaded by routing loads, it will pick a light loaded node to replicate its routing table, so that the replica node can share its routing load. As with the object replication algorithm, the routing replica information should be propagated to other related nodes. These nodes subsequently update their respective routing tables by adding a replica entry to the entry of the original node so that future queries can be routed to either the original node or the new node, all the while maintaining system network correctness. Besides load balancing, replication approach can also improve the routing resiliency in the face of network failures. Figure 1 shows an example of the Pastry structure with the replication of routing tables. The query for item ID 0221, which is actually served by node 0222, is initiated at node 2012. According to its routing table, node 2012 chooses 0021 as the next hop. Node 0021 determines that node 0200 should be the right node to forward the query. Since node 0200 has a replica at node 1102, node 0021 may choose 1102 as the next hop. When the query is sent to 1102, it uses the duplicated routing table for 0200 to serve the query and send the query to the destination node 0222. When node 0200 is exposed to a high load, the replicas will share some of the traffic, preventing overload.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 312 Figure 1. An example of adaptive routing replication algorithm 2. Dynamic routing load adjusting algorithm In addition to the use of replication, another scheme to balance the routing load is by dynamically reconfiguring the routing table. In the previously mentioned methods, an overloaded node actively redistributes its own load, but in cases where external policies or the network environment prevents the redistribution effort, replacing routing table content can help relieve highly loaded nodes.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 313 This algorithm is tailored specifically for DHTs like Pastry or Tapestry. In those systems, many nodes with the same prefix can be potentially filled in a node’s routing table; the one in the table is the one the node knows, and with topological metric considered, it will ‘pick’ the one closest to itself. We propose changing the strategy of choosing nodes in the routing table to balance routing load (especially to relieve heavily loaded nodes). In lieu of simply choosing according to a proximity metric, we choose with lower routing load instead. Whenever an overloaded node receives a querying message from its neighbour, it will reply with a message indicating its overloaded status. This neighbour, receiving the message, will, at the earliest opportunity possible, replace the entry of the overloaded node in its routing table with another node of the similar prefix. The light-loaded candidate nodes are learned from forwarded query messages which include IDs of passed nodes. By doing so, traffic is alleviated from the overloaded load as long as it is not the actual ‘end target’ of the query request, as the replacement node will be able to direct any queries the original node could’ve, and forwarding traffic is spread out more evenly. Continuing from our example in Figure 1, in node 1102’s routing table, let us assume that a neighbor node, 2122, (1 st row 3 rd column) is heavily-loaded. When a query passes through node 2012 to 0021 and then comes to node 1102, since 2012 shares the identical first digital prefix (2) as the overloaded neighbor 2122 in 1102’s routing table, the entry of 2122 will be replaced with 2012. This way, the traffic to the more heavily loaded 2122 will be redirected to the more free 2012. 4. CONCLUSION We have presented an effective approach to balance load in DHT systems. Our work distinguishes routing load and retrieval load, and deals them separately. By dynamically replicating different potions of the overloaded node based on source of the overloading (replicating either its routing table or its keys), we overcome the restrictive nature of traditional balancing schemes that assumes homogeneity among peers and the type of load they incur. This approach enables the system good load balance even when demand is heavily skewed. Extensive simulation results indicate significant improvements in maintaining a more balanced system, leading to improved scalability and performance. 5. REFERENCES [1] B. Godfrey, K. Lakshminarayanan, S. Surana, R. Karp, and I. Stoica, “Load balancing in dynamic structured P2P systems,” in Proceedings of the 23rd Conference of the IEEE Communications Society (Infocom 2004), 2004. [2] D. Karger and M. Ruhl, “Simple efficient load balancing algorithms for peer-to-peer systems,” in Proceedings of 16th ACM Symposium on Parallelism in Algorithms and Architectures, 2004, pp. 36–43. [3] A. R. Karthik, K. Lakshminarayanan, S. Surana, R. Karp, and I. Stoica, “Load balancing in structured P2P systems,” in Proceedings of 2ndInternational Workshop on Peer-to-Peer Systems, 2003, pp. 68–79. [4] G. Manku. “Balanced binary trees for ID management and load balance in distributed hash tables.” In Proceedings of Twenty-Third Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2004), 2004.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 314 [5] J. Byers, J. Considine, and M. Mitzenmacher, “Simple load balancing for distributed hash tables,” in Proceedings of 2nd International Workshop on Peer-to-Peer Systems, 2003, pp. 80–87. [6] J. Ledlie and M. Seltzer, “Distributed, secure load balancing with skew, heterogeneity, and churn,” in Proceedings of the 24rd Conference of the IEEE Communications Society, (Infocom 2005), 2005. [7] Mohanjeet Singh, D.S Dhaliwal and Neeraj Garg, “Searching and Streaming of Multimedia Content in P2P Overlay Network”, International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 433 - 438, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [8] Srikanth T.N. and Prabhudeva S, “Explicit Study on Security Issues in Multimedia Streaming in Peer to Peer Network”, International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 588 - 602, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.