Hi Gabor,
    I had the same question too while implementing Chord. For now, I
have used an arbitrary interval to run the stabilize algorithm. It'll be
interesting to know if someone has put more thought into this. Maybe an
algorithm to learn and evolve the frequency as the network continues to
function. A question: what are you suggesting when you say "extrapolate
it"?  

Regards,
Ratul Mukhopadhyay




-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Gabor Czigola
Sent: Tuesday, September 25, 2007 2:53 AM
To: P2P hackers mailing list
Subject: [p2p-hackers] Chord stabilize frequency

Hy!

I'm actually working on the implementation of a p2p library, I call it
libDRPC (distributed remote procedure call). I began the
implementation just a few weeks ago, and it will take a long time
before I have finished it.
The main goals are:
- The library supports connecting to networks, registering RPC's
locally, and handling remote RPC requests.
- The library supports internetworking.
- Nodes can be weighted.
- Nodes are looked up with keys.
- The keys are well-balanced.
- Nodes have information about at most O(log n) hosts, and have no
information about the total node count.


The joining/routing/key lookup algorithms are based on Chord.

The Chord spec [1] states on page 7:
"Every node runs stabilize periodically (...)"

We can find a similar update / stabilize procedures in other p2p
systems. But what is a good interval to run it? Should the frequency
be a constant, or shall I extrapolate it? When the latter, how?

[1] http://pdos.csail.mit.edu/papers/chord:sigcomm01/

-- 
Czigola, Gabor
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers


The information contained in this electronic message and any attachments to 
this message are intended for the exclusive use of the addressee(s) and may 
contain proprietary, confidential or privileged information. If you are not the 
intended recipient, you should not disseminate, distribute or copy this e-mail. 
Please notify the sender immediately and destroy all copies of this message and 
any attachments. 

WARNING: Computer viruses can be transmitted via email. The recipient should 
check this email and any attachments for the presence of viruses. The company 
accepts no liability for any damage caused by any virus transmitted by this 
email.
 
www.wipro.com
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to