Distributed hash tables for large-scale cooperative applications

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=0NRNwnPjexg



Duration: 1:17:22
1,067 views
5


Distributed hash tables are a way to organize the storage and network resources of many Internet hosts to create a single storage system. The promise of DHTs lies in their potential to create a distributed storage infrastructure that, in aggregate, is more robust and offers higher performance than any individual host. Because DHTs are likely to be deployed on potentially unreliable volunteer nodes spread around the globe, meeting this goal is challenging: nodes in the system may join or leave at any time and latencies between nodes can be large. DHash is a distributed hash table that stores data reliably and provides low latency, high throughput access to data. DHash uses an efficient distributed lookup service, Chord, to map each block to a node based on the block's key. DHash replicates data blocks for availability and efficiently maintains the desired number of replicas as nodes join and leave the system. DHash minimizes the latency of block fetch operations by routing requests to nearby nodes in the network using a decentralized, synthetic coordinate system, Vivaldi, that accurately predicts network latency between hosts. A transport protocol, STP, allows DHash to efficiently and fairly use network resources while performing many parallel block downloads. DHash has proven to be a useful substrate for building a number of different cooperative applications including a file system for content distribution, a Usenet replacement, and a distributed backup and archival service.




Other Videos By Microsoft Research


2016-09-05Applied Nonparametric Bayes and Statistical Machine Learning
2016-09-05Reliability Estimation during Architectural Design
2016-09-05Program Analysis with Binary Decision Diagrams
2016-09-05Making Wireless LANs Faster and Fairer
2016-09-05More Than Human : Embracing the Promise of Biological Enhancement
2016-09-05Using Open Specifications for XML Web Services to Build Maintainable & Secure Health Care Systems
2016-09-05Source Code Evolution with Interactive Transformations
2016-09-05Is Linux Maintainable?
2016-09-05Pastiche: decentralized, low-cost backup using untrusted, Internet storage
2016-09-05Measurement-driven Modeling and Design of Internet-scale Systems [1/2]
2016-09-05Distributed hash tables for large-scale cooperative applications
2016-09-05Talk 1: Convergence research in the UK; Talk 2: Artistic rendering in the convergence area
2016-09-05Secure content distribution using untrusted servers
2016-09-05802.11i Security Analysis: Can we build a secure WLAN?
2016-09-05Gadgets for good: How computer researchers can help save lives in poor countries
2016-09-05Inferring Information Status for Reference Generation in Open Domains [1/12]
2016-09-05Improving the Reliability of Commodity Operating Systems [1/2]
2016-09-05Mentoring: The People Who Lead Us Toward Our Purpose in Life
2016-09-05Data Structure Repair
2016-09-05The neurophysiology of decision making: rate differences and log likelihood ratios
2016-09-05Can Parallel Computing Finally Impact Mainstream Computing?



Tags:
microsoft research