Computer Scientist

Monday, 10 May 2010

Agenda on 10/05/2010 meeting

What I next need to do is to plan an experiment to approve that
    1. the hotspots emergence and
    2. the consistent hashing's vulnerability
on load balancing.

This is for Chord. This step is used to find out the disadvantages of Chord. Because it is out of date, there must be a lot of problems.

Then evolved into Kademlia, how Kademlia solved these problems. How effectively Kademlia solved these problems? And then to prove them.

Also find some problems of Kademlia. Then to propose some methods to solve them.

Using this evolution method, to expend to BitTorrent and eDonkey.