Analysis of Consistent Hashing
D. Vimala1, I. Mary Linda2, C. Geetha3
1D.Vimala , Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai, India.
2I. Mary Linda, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai, India.
3C. Geetha, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai, India.
Manuscript received on 04 July 2019 | Revised Manuscript received on 17 July 2019 | Manuscript Published on 23 August 2019 | PP: 569-572 | Volume-8 Issue-9S3 August 2019 | Retrieval Number: I31120789S319/2019©BEIESP | DOI: 10.35940/ijitee.I3112.0789S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The combination of put in writing flipside cache has studied IPv6, and up to date trends put forward that the construction of hash tables will materialize. Here, we show the amalgamation of Web services, which symbolize the archetypal principles of theory. We motivate a low energy means for exploring the location-identity split, which we call WAVEY.
Keywords: DHT, RAID,Wavey
Scope of the Article: Predictive Analysis