Soumettre la recherche
Mettre en ligne
The easiest consistent hashing
•
Télécharger en tant que PPTX, PDF
•
13 j'aime
•
2,254 vues
DaeMyung Kang
Suivre
The easiest Consistent Hashing
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 56
Télécharger maintenant
Recommandé
Consistent hashing
Consistent hashing
Jooho Lee
SQOOP PPT
SQOOP PPT
Dushhyant Kumar
Introduction to Redis
Introduction to Redis
Maarten Smeets
Elastic search overview
Elastic search overview
ABC Talks
Introduction to Redis
Introduction to Redis
Arnab Mitra
DNS Security Presentation ISSA
DNS Security Presentation ISSA
Srikrupa Srivatsan
Redis introduction
Redis introduction
Federico Daniel Colombo Gennarelli
Building robust CDC pipeline with Apache Hudi and Debezium
Building robust CDC pipeline with Apache Hudi and Debezium
Tathastu.ai
Recommandé
Consistent hashing
Consistent hashing
Jooho Lee
SQOOP PPT
SQOOP PPT
Dushhyant Kumar
Introduction to Redis
Introduction to Redis
Maarten Smeets
Elastic search overview
Elastic search overview
ABC Talks
Introduction to Redis
Introduction to Redis
Arnab Mitra
DNS Security Presentation ISSA
DNS Security Presentation ISSA
Srikrupa Srivatsan
Redis introduction
Redis introduction
Federico Daniel Colombo Gennarelli
Building robust CDC pipeline with Apache Hudi and Debezium
Building robust CDC pipeline with Apache Hudi and Debezium
Tathastu.ai
Introduction to sqoop
Introduction to sqoop
Uday Vakalapudi
PostgreSQL: Advanced indexing
PostgreSQL: Advanced indexing
Hans-Jürgen Schönig
Introduction to redis
Introduction to redis
Tanu Siwag
Intro to HBase
Intro to HBase
alexbaranau
Deep Dive Into Elasticsearch
Deep Dive Into Elasticsearch
Knoldus Inc.
Hive Tutorial | Hive Architecture | Hive Tutorial For Beginners | Hive In Had...
Hive Tutorial | Hive Architecture | Hive Tutorial For Beginners | Hive In Had...
Simplilearn
redis 소개자료 - 네오클로바
redis 소개자료 - 네오클로바
NeoClova
A Survey of HBase Application Archetypes
A Survey of HBase Application Archetypes
HBaseCon
Introduction to MongoDB
Introduction to MongoDB
Ravi Teja
Unified Data Platform, by Pauline Yeung of Cisco Systems
Unified Data Platform, by Pauline Yeung of Cisco Systems
Altinity Ltd
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Simplilearn
Sharding
Sharding
MongoDB
Apache HBase™
Apache HBase™
Prashant Gupta
Elasticsearch for beginners
Elasticsearch for beginners
Neil Baker
Column oriented database
Column oriented database
Kanike Krishna
MongoDB Sharding Fundamentals
MongoDB Sharding Fundamentals
Antonios Giannopoulos
MongoDB Journaling and the Storage Enginer
MongoDB Journaling and the Storage Enginer
MongoDB
[2D4]Python에서의 동시성_병렬성
[2D4]Python에서의 동시성_병렬성
NAVER D2
[Pgday.Seoul 2020] SQL Tuning
[Pgday.Seoul 2020] SQL Tuning
PgDay.Seoul
PostgreSQL query planner's internals
PostgreSQL query planner's internals
Alexey Ermakov
Hashing and separate chain
Hashing and separate chain
VijayapriyaPandi
Gotcha! Ruby things that will come back to bite you.
Gotcha! Ruby things that will come back to bite you.
David Tollmyr
Contenu connexe
Tendances
Introduction to sqoop
Introduction to sqoop
Uday Vakalapudi
PostgreSQL: Advanced indexing
PostgreSQL: Advanced indexing
Hans-Jürgen Schönig
Introduction to redis
Introduction to redis
Tanu Siwag
Intro to HBase
Intro to HBase
alexbaranau
Deep Dive Into Elasticsearch
Deep Dive Into Elasticsearch
Knoldus Inc.
Hive Tutorial | Hive Architecture | Hive Tutorial For Beginners | Hive In Had...
Hive Tutorial | Hive Architecture | Hive Tutorial For Beginners | Hive In Had...
Simplilearn
redis 소개자료 - 네오클로바
redis 소개자료 - 네오클로바
NeoClova
A Survey of HBase Application Archetypes
A Survey of HBase Application Archetypes
HBaseCon
Introduction to MongoDB
Introduction to MongoDB
Ravi Teja
Unified Data Platform, by Pauline Yeung of Cisco Systems
Unified Data Platform, by Pauline Yeung of Cisco Systems
Altinity Ltd
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Simplilearn
Sharding
Sharding
MongoDB
Apache HBase™
Apache HBase™
Prashant Gupta
Elasticsearch for beginners
Elasticsearch for beginners
Neil Baker
Column oriented database
Column oriented database
Kanike Krishna
MongoDB Sharding Fundamentals
MongoDB Sharding Fundamentals
Antonios Giannopoulos
MongoDB Journaling and the Storage Enginer
MongoDB Journaling and the Storage Enginer
MongoDB
[2D4]Python에서의 동시성_병렬성
[2D4]Python에서의 동시성_병렬성
NAVER D2
[Pgday.Seoul 2020] SQL Tuning
[Pgday.Seoul 2020] SQL Tuning
PgDay.Seoul
PostgreSQL query planner's internals
PostgreSQL query planner's internals
Alexey Ermakov
Tendances
(20)
Introduction to sqoop
Introduction to sqoop
PostgreSQL: Advanced indexing
PostgreSQL: Advanced indexing
Introduction to redis
Introduction to redis
Intro to HBase
Intro to HBase
Deep Dive Into Elasticsearch
Deep Dive Into Elasticsearch
Hive Tutorial | Hive Architecture | Hive Tutorial For Beginners | Hive In Had...
Hive Tutorial | Hive Architecture | Hive Tutorial For Beginners | Hive In Had...
redis 소개자료 - 네오클로바
redis 소개자료 - 네오클로바
A Survey of HBase Application Archetypes
A Survey of HBase Application Archetypes
Introduction to MongoDB
Introduction to MongoDB
Unified Data Platform, by Pauline Yeung of Cisco Systems
Unified Data Platform, by Pauline Yeung of Cisco Systems
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Sharding
Sharding
Apache HBase™
Apache HBase™
Elasticsearch for beginners
Elasticsearch for beginners
Column oriented database
Column oriented database
MongoDB Sharding Fundamentals
MongoDB Sharding Fundamentals
MongoDB Journaling and the Storage Enginer
MongoDB Journaling and the Storage Enginer
[2D4]Python에서의 동시성_병렬성
[2D4]Python에서의 동시성_병렬성
[Pgday.Seoul 2020] SQL Tuning
[Pgday.Seoul 2020] SQL Tuning
PostgreSQL query planner's internals
PostgreSQL query planner's internals
Similaire à The easiest consistent hashing
Hashing and separate chain
Hashing and separate chain
VijayapriyaPandi
Gotcha! Ruby things that will come back to bite you.
Gotcha! Ruby things that will come back to bite you.
David Tollmyr
Potential Friend Finder
Potential Friend Finder
Richard Schneeman
How we hash passwords
How we hash passwords
Nick Josevski
Webinar: MongoDB 2.4 Feature Demo and Q&A on Hash-based Sharding
Webinar: MongoDB 2.4 Feature Demo and Q&A on Hash-based Sharding
MongoDB
Chapter 10: hashing data structure
Chapter 10: hashing data structure
Mahmoud Alfarra
Paul Dix (Founder InfluxDB) - Organising Metrics at #DOXLON
Paul Dix (Founder InfluxDB) - Organising Metrics at #DOXLON
Outlyer
Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just Passwords
John Congdon
Data Structure and Algorithms: What is Hash Table ppt
Data Structure and Algorithms: What is Hash Table ppt
JUSTFUN40
Hash algorithms in IT security
Hash algorithms in IT security
University of South Wales
Implementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codes
Khadidja BOUKREDIMI
Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...
Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...
Spark Summit
Engineering fast indexes
Engineering fast indexes
Daniel Lemire
Perl and Elasticsearch
Perl and Elasticsearch
Dean Hamstead
MongoDB San Francisco 2013: Hash-based Sharding in MongoDB 2.4 presented by B...
MongoDB San Francisco 2013: Hash-based Sharding in MongoDB 2.4 presented by B...
MongoDB
Fazendo mágica com ElasticSearch
Fazendo mágica com ElasticSearch
Pedro Franceschi
Experiments in genetic programming
Experiments in genetic programming
Lars Marius Garshol
Elasticsearch at Dailymotion
Elasticsearch at Dailymotion
Cédric Hourcade
AES by example
AES by example
Shiraz316
Hashing Considerations In Web Applications
Hashing Considerations In Web Applications
Islam Heggo
Similaire à The easiest consistent hashing
(20)
Hashing and separate chain
Hashing and separate chain
Gotcha! Ruby things that will come back to bite you.
Gotcha! Ruby things that will come back to bite you.
Potential Friend Finder
Potential Friend Finder
How we hash passwords
How we hash passwords
Webinar: MongoDB 2.4 Feature Demo and Q&A on Hash-based Sharding
Webinar: MongoDB 2.4 Feature Demo and Q&A on Hash-based Sharding
Chapter 10: hashing data structure
Chapter 10: hashing data structure
Paul Dix (Founder InfluxDB) - Organising Metrics at #DOXLON
Paul Dix (Founder InfluxDB) - Organising Metrics at #DOXLON
Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just Passwords
Data Structure and Algorithms: What is Hash Table ppt
Data Structure and Algorithms: What is Hash Table ppt
Hash algorithms in IT security
Hash algorithms in IT security
Implementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codes
Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...
Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...
Engineering fast indexes
Engineering fast indexes
Perl and Elasticsearch
Perl and Elasticsearch
MongoDB San Francisco 2013: Hash-based Sharding in MongoDB 2.4 presented by B...
MongoDB San Francisco 2013: Hash-based Sharding in MongoDB 2.4 presented by B...
Fazendo mágica com ElasticSearch
Fazendo mágica com ElasticSearch
Experiments in genetic programming
Experiments in genetic programming
Elasticsearch at Dailymotion
Elasticsearch at Dailymotion
AES by example
AES by example
Hashing Considerations In Web Applications
Hashing Considerations In Web Applications
Plus de DaeMyung Kang
Count min sketch
Count min sketch
DaeMyung Kang
Redis
Redis
DaeMyung Kang
Ansible
Ansible
DaeMyung Kang
Why GUID is needed
Why GUID is needed
DaeMyung Kang
How to use redis well
How to use redis well
DaeMyung Kang
How to name a cache key
How to name a cache key
DaeMyung Kang
Integration between Filebeat and logstash
Integration between Filebeat and logstash
DaeMyung Kang
How to build massive service for advance
How to build massive service for advance
DaeMyung Kang
Massive service basic
Massive service basic
DaeMyung Kang
Data Engineering 101
Data Engineering 101
DaeMyung Kang
How To Become Better Engineer
How To Become Better Engineer
DaeMyung Kang
Kafka timestamp offset_final
Kafka timestamp offset_final
DaeMyung Kang
Kafka timestamp offset
Kafka timestamp offset
DaeMyung Kang
Data pipeline and data lake
Data pipeline and data lake
DaeMyung Kang
Redis acl
Redis acl
DaeMyung Kang
Coffee store
Coffee store
DaeMyung Kang
Scalable webservice
Scalable webservice
DaeMyung Kang
Number system
Number system
DaeMyung Kang
webservice scaling for newbie
webservice scaling for newbie
DaeMyung Kang
Internet Scale Service Arichitecture
Internet Scale Service Arichitecture
DaeMyung Kang
Plus de DaeMyung Kang
(20)
Count min sketch
Count min sketch
Redis
Redis
Ansible
Ansible
Why GUID is needed
Why GUID is needed
How to use redis well
How to use redis well
How to name a cache key
How to name a cache key
Integration between Filebeat and logstash
Integration between Filebeat and logstash
How to build massive service for advance
How to build massive service for advance
Massive service basic
Massive service basic
Data Engineering 101
Data Engineering 101
How To Become Better Engineer
How To Become Better Engineer
Kafka timestamp offset_final
Kafka timestamp offset_final
Kafka timestamp offset
Kafka timestamp offset
Data pipeline and data lake
Data pipeline and data lake
Redis acl
Redis acl
Coffee store
Coffee store
Scalable webservice
Scalable webservice
Number system
Number system
webservice scaling for newbie
webservice scaling for newbie
Internet Scale Service Arichitecture
Internet Scale Service Arichitecture
Dernier
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Dernier
(20)
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
The easiest consistent hashing
1.
The Easiest Consistent Hashing charsyam@naver.com
2.
Consistent Hashing?
3.
WHY?
4.
There was data In
the beginning.
5.
1 2 3 4 5 6 7 89
6.
How do you
distribute data pairly into 3 servers? Considering the future.
7.
1 2 3 4 5 6 7 8 9 Sequence
8.
1 2 3 4
5 6 7 8 9 Modular
9.
If you add
one server, or remove one server What happened?
10.
1 2 3 4 5 6 Add one server
for Sequence 7 8 9
11.
Add one server
for Modular 1 2 3 4 5 6 7 8 9
12.
How do you
redistribute these data?
13.
Redistribute by Modular 1
2 3 4 5 6 7 8 9
14.
Most of data
is redistributed!
15.
Redistribution is Burden.
16.
What is a
good way to reduce redistribution?
17.
Consistent Hashing Can Do!!!
18.
Consistent Hashing redistribute only N/K
data N = data size K = servers
19.
Key Concept is Hash
20.
What is main concept
of hash
21.
If you use
same hash function? The result is always the same.
22.
hash(“abc”) = 1 hash(“abc1”)
= 2 hash(“abc”) = 1
23.
You have 3
servers. 10.0.1.1 10.0.1.2 10.0.1.3
24.
There is a
hash function. y = hash(x)
25.
You hash 3
servers hash(“10.0.1.1”) = 100 hash(“10.0.1.2”) = 400 hash(“10.0.1.3”) = 700 Just Giving server address as key
26.
Just define a
rule. We will store a key in hash(key) is higher and the nearest one.
27.
hash(key) Hash value hash(“10.0.1.1”)
100 hash(“10.0.1.2”) 400 hash(“10.0.1.3”) 700
28.
There is key
“redis” hash(“redis”) = 200 Where we store it?
29.
hash(key) Hash value hash(“10.0.1.1”)
100 hash(“redis”) 200 in hash(“10.0.1.2”) hash(“10.0.1.2”) 400 hash(“10.0.1.3”) 700
30.
There is key
“charsyam” hash(“charsyam”) = 450 Where we store it?
31.
hash(key) Hash value hash(“10.0.1.1”)
100 hash(“redis”) 200 in hash(“10.0.1.2”) hash(“10.0.1.2”) 400 hash(“charsyam”) 450 in hash(“10.0.1.3”) hash(“10.0.1.3”) 700
32.
There is key
“udemy” hash(“udemy”) = 50 Where we store it?
33.
hash(key) Hash value hash(“udemy”)
50 in hash(“10.0.1.1”) hash(“10.0.1.1”) 100 hash(“redis”) 200 in hash(“10.0.1.2”) hash(“10.0.1.2”) 400 hash(“charsyam”) 450 in hash(“10.0.1.3”) hash(“10.0.1.3”) 700
34.
There is key
“web” hash(“web”) = 1000 Where we store it?
35.
There is no
server has higher hash value 1000. Where we can store it?
36.
Think it is
Circle
37.
hash(key) Hash value hash(“udemy”)
50 in hash(“10.0.1.1”) hash(“10.0.1.1”) 100 hash(“redis”) 200 in hash(“10.0.1.2”) hash(“10.0.1.2”) 400 hash(“charsyam”) 450 in hash(“10.0.1.3”) hash(“10.0.1.3”) 700 hash(“web”) 1000 in hash(“10.0.1.1”)
38.
Key “web” is
stored in First Server.
39.
If we add
new server It is “10.0.1.4”. And hash(“10.0.1.4”) = 500
40.
hash(key) Hash value hash(“udemy”)
50 in hash(“10.0.1.1”) hash(“10.0.1.1”) 100 hash(“redis”) 200 in hash(“10.0.1.2”) hash(“10.0.1.2”) 400 DELETED hash(“charsyam”) 450 hash(“10.0.1.4”) 500 hash(“10.0.1.3”) 700 hash(“web”) 1000 in hash(“10.0.1.1”)
41.
After adding “10.0.1.4” Key
“charsyam” is missing
42.
But other keys
are never changed.
43.
You can still
find key “udemy” in “10.0.1.1”
44.
There is key
“charsyam” hash(“charsyam”) = 450 Where we store it?
45.
hash(key) Hash value hash(“udemy”)
50 in hash(“10.0.1.1”) hash(“10.0.1.1”) 100 hash(“redis”) 200 in hash(“10.0.1.2”) hash(“10.0.1.2”) 400 hash(“charsyam”) 450 in hash(“10.0.1.4”) hash(“10.0.1.4”) 500 hash(“10.0.1.3”) 700 hash(“web”) 1000 in hash(“10.0.1.1”)
46.
A Add A Server
47.
A B Add B Server
48.
A BC Add C Server
49.
A BC Add Key 1 1
50.
A BC Add Key 2 1 2
51.
A BC Add Key 3 1 2 3
52.
A BC Add Key 4 1 2 3 4
53.
A BC Add Key 5 1 2 3 4 5
54.
A C Fail B Server 2 3 4 5
55.
A C Add Key 1 2 3 4 5 1
56.
In Next Lecture ●
We will discuss belows topics ○ How to use Consistent Hashing in Real World.
Télécharger maintenant