What is distributed hash table

Assignment Help Data Structure & Algorithms
Reference no: EM131575257 , Length: word count:2500

Assignment-

Distributed Hash Table (DHT) is a new distributed computing paradigm that harnesses the computing and storage resources across the Internet for providing a variety of services such as distributed file systems, content-distribution systems, and domain name services etc. Among others, Chord is an original and successful DHT protocol, and Open Chord is an open source implementation of Chord protocol.

In this assignment, you are to research DHT and write a technical report about DHT. The report is to be structured as an academic report and the sections must be titled and numbered. Your work must be appropriately referenced using the Harvard (author-date) referencing style. The length of the report should be about 2,500 words. You are not required to provide an Executive Summary for the report. An Exemplar for Writing a Simple Academic Technical Report is available on the unit web site; you should read it before writing your report.

To prepare your report, you will need to research widely on DHT, and download and use Open Chord. Your report must cover the issues that are detailed as follows.

Part 1: General Review of DHT

1. What is distributed hash table (DHT)?

2. How is the hash function performed in DHT?

3. What distributed services can be built on DHT?

Part 2: Review of Chord

1. What is the topology of Chord DHT?

2. What is the consistent hashing of Chord?

3. Chord search algorithm and performance.

4. Chord node joins and stabilisation.

5. Chord node failure.

Part 3: Demonstration of DHT features via Open Chord

In this part you need to demonstrate some features of DHT and Chord by Open Chord software. You need to download Open Chord and read its Unser's Manual. You don't have to rebuild (compile) the source code as these features can be demonstrated through the Open Chord Console (as detailed in Section 4 of the User's Manual). To complete this part you need use both screenshots and textual explanations.

1. Creation of a Chord overlay on a single JVM

Crate an Open Chord overlay network which has at least 8 nodes running on single Java Virtual Machine (JVM). Show the screenshots with the commands to create the overlay.

2. Insert into and retrieve values from the Chord DHT

Show a screenshot that inserts a pair of (key, value) from a node. Check how the value is replicated by showing the DHT entries at each node by screenshots. Show a screenshot to retrieve the value from a node.

3. Show the finger table, predecessors and successors of a node

4. Node leave and stabilization.

Make a node that stores the value leave and check how the value is replicated through the Chord stabilisation algorithm.

5. Node Failure and stabilisation

Crash a node that stores the value and check how the value is replicated. What is the default number of replicates that Open Chord maintains for a key-value pair?

Textbook - DISTRIBUTED SYSTEMS Concepts and Design, Fifth Edition by George Coulouris, Jean Dollimore, Tim Kindberg and Gordon Blair.

Attachment:- Assignment Files.rar

Reference no: EM131575257

Questions Cloud

Determine the companys capabilities and core competencies : Determine the company's resources, capabilities, and core competencies. Give your opinion on corporation's greatest strengths and most significant weaknesses.
Define how the parameters of search and seizure : Develop a response to Mr. Jenkins that addresses how the parameters of search and seizure will change by involving the police in the investigation at this time
Analyze how your company applies compensation practice : Analyze how your company applies compensation practice to determine the positive or negative impact to the company and its stakeholders.
Develop an initial reference list to assure : Develop an initial reference list to assure that there is adequate literature to support your evidence-based practice project.
What is distributed hash table : General Review of DHT - What is distributed hash table (DHT)? How is the hash function performed in DHT? What distributed services can be built on DHT
The united states government to fight identity theft : United States government is not doing enough to fight identity theft
Write a literary essay on hills like white elephants : Write a literary critical analysis essay on the following topic: Hills like white elephants. Department of English and Modern Languages.
What levels of evidence are present in relation to research : What levels of evidence are present in relation to research and practice, and why it is important regardless of the method you use?
What steps must be taken to prove insanity : What is required in your state for an insanity defense. What steps must be taken to prove insanity

Reviews

len1575257

7/22/2017 8:41:19 AM

Australian student, 2500 words + practical work, Part 1 and part 2 is theory and part 3 is technical (based on OPEN CHORD AND JVM SOFTWARE) Example Technical Report(How to write technical report), Distributed Systems(TEXTBOOK). Harvard Referencing Guide. And Assignment 1 Specification file. NOTE - Please follow the MARKING CRITERIA IN Assignment 1 Specification File. This Subject is based on Assignment. Please look at all the file as well as how to write technical report. The assignment must be submitted as a single Microsoft Word document. You must submit your assignment via the unit web site. Any hardcopy or email submission will not be accepted.

len1575257

7/22/2017 8:41:11 AM

Introduce your research of DHT and its role in distributed systems. What are you going to cover in the remainder of the report? What does your research conclude about DHT in general and Chord DHT protocol. Demonstration of DHT features via Open Chord Creation of a Chord overlay on a single JVM and Insert into and retrieve values from the Chord DHT. After the marked assignments are returned, any late submissions will not be accepted.

Write a Review

Data Structure & Algorithms Questions & Answers

  Advantages and five disadvantages of doubly linked lists

Write down atleast any five advantages and five disadvantages of doubly linked lists over singly linked lists in tabulated format

  What is the average queue occupancy

What is the average queue occupancy - What is the average delay of a bit in the queue?

  Create algorithm to perform any sequence of two operations

Let A[1, n] be an array of real numbers. Create an algorithm to perform any sequence of the following two operations: Add(i, x): add the value x to A[i].

  Write a suitable logical description of the robot.

Write a sentence describing the Go action. Use a successor-state axiom.

  Analyzing certain software properties affects

Describe how the lack of metrics for analyzing certain software properties affects the software engineering discipline.

  Briefly explain the craft cofad and corelap

Briefly describe each of the following computerized layout techniques. In each case, indicate whether the method is a construction or improvement method.

  Which algorithm is better for sorting short lists?

Write a method Insertion_Sort that implements the "insertion sort algorithm" simply by calling GeneralSort with an appropriate Cut_In_Two method (which you must also write). Insertion_Sort should return the sorted list and the integer C returned b..

  Encryption feistel cipher and decryption algorithm

If this is psudocode for encryption feistel cipher determine decryption algorithm?Output: ciphertext = (left[16], right[16]) Explain pseudo-code of corresponding decryption algorithm for this cipher.

  Test the bin packing algorithms

Test the following bin-packing algorithms: (a) Next fit. (b) Firstfit.?(c) First fit decreasing.

  Assume that firedup has created a database

Create a view called CustomerRepair that shows CUSTOMER.Name and STOVE_REPAIR.SerialNumber, Date, Description, and TotalDue, where TotalDue is the difference between TotalCost and TotalPaid.

  Can you find the element of an array

We would like to determine whether a given array A has a majority element, and if so, find the element.

  Algorithm bubble sort

This project is a great opportunity to express your unique problem solving skills as well as your use of structured logic.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd