Skip to content

Latest commit

 

History

History
 
 

Lecture 19: P2P, DHTs, and Chord

预习

Chord:A Scalable Peer-to-peerLookupServiceforInternetApplicationsTrackerless Bittorrent

FAQ

  1. Is hashing across machines a good way to get load balanced sharding? Why not explicitly divide up the key space so it's evenly split?
  2. Does BitTorrent use Chord?
  3. If you want to add fault-tolerance to a Chord-based system should you replicate each Chord node using Raft?
  4. What if Chord DHT nodes are malicious?
  5. Is Chord used anywhere in practice?
  6. Could the performance be improved if the nodes knew more about network locality?
  7. Is it possible to design a DHT in which lookups take less than log(N) hops?
  8. Does consistent hashing of keys still guarantee load balanced nodes if keys are not evenly distributed?
  9. In the case of concurrent joins and failures, Chord pauses when a get fails to find the key it was looking for. If there's constant activity, how can Chord distinguish between the system not being stable and the key not actually existing?
  10. If I introduce a malicious peer in Chord that keeps returning wrong values or inexistent addresses how disruptive can it be to the whole DHT? How does Bittorrent deal with particular issue?
  11. Why isn’t there a danger of improper load balancing if some keys are simply used more than others?

课堂

讲义

FAQ 答案

[作业](6.824 Spring 2018 Paper Questions.html)