H. Shen

University of Arkansas, Fayetteville, AR, United States

Are you H. Shen?

Claim your profile

Publications (4)1.8 Total impact

  • Source
    H. Shen, C.-Z. Xu
    [Show abstract] [Hide abstract]
    ABSTRACT: Structured peer-to-peer overlay networks, like distributed hash tables (DHTs), map data items to the network based on a consistent hashing function. Such mapping for data distribution has an inherent load balance problem. Data redistribution algorithms based on randomized matching of heavily loaded nodes with light ones can deal with the dynamics of DHTs. However, they are unable to consider the proximity of the nodes simultaneously. There are other methods that rely on auxiliary networks to facilitate locality-aware load redistribution. Due to the cost of network construction and maintenance, the locality-aware algorithms can hardly work for DHTs with churn. This paper presents a locality-aware randomized load-balancing algorithm to deal with both the proximity and network churn at the same time. We introduce a factor of randomness in the probing of lightly loaded nodes in a range of proximity. We further improve the efficiency by allowing the probing of multiple candidates (d-way) at a time. Simulation results show the superiority of the locality-aware two-way randomized algorithm in comparison with other random or locality-aware algorithms. In DHTs with churn, it performs no worse than the best chum-resilient algorithm. It takes advantage of node capacity heterogeneity and achieves good load balance effectively even in a skewed distribution of items
    IEEE Transactions on Parallel and Distributed Systems 07/2007; 18(6):849-862. · 1.80 Impact Factor
  • Source
    H. Shen, C.-Z. Xu
    [Show abstract] [Hide abstract]
    ABSTRACT: Structured P2P overlay networks based on a consistent hashing function have an aftermath load balance problem that needs to be dealt with. A load balancing method should take into account both proximity and dynamic features of DHTs, Randomized matching between heavily loaded nodes with lightly loaded nodes can deal with the dynamic feature. But current randomized methods are unable to consider physical proximity of the node simultaneously. There are locality-aware methods that rely on an additional logical network to capture the physical locality in load balancing. Due to the cost for network construction and maintenance, these locality-aware algorithms can hardly deal with DHTs with churn. This paper presents a locality-aware randomized load balancing algorithm to deal with both of the proximity and dynamic features of DHTs. We introduce a factor of randomness in the probing process in a range of proximity to deal with the DHT churn. We further improve the randomized load balancing efficiency by d-way probing. Simulation results show the superiority of a locality-aware 2-way randomized load balancing in DHTs, in comparison with other pure random policies and locality-aware sequential algorithms. In DHTs with churn, it performs no worse than the best churn resilient algorithm.
    Parallel Processing, 2005. ICPP 2005. International Conference on; 07/2005
  • Source
    H. Shen, C.-Z. Xu, Guihai Chen
    [Show abstract] [Hide abstract]
    ABSTRACT: Summary form only given. There are many structured P2P systems that use DHT technologies to map data items onto the nodes in various ways for scalable routing and location. Most of the systems require O(logn) hops per lookup request with O(logn) neighbors per node, where n is the network size. We present a constant-degree P2P architecture, namely Cycloid, which emulates a cube-connected-cycles (CCC) graph in the routing of lookup requests. It achieves a time complexity of O(d) per lookup request by using O(1) neighbors per node, where n = d· 2<sup>d</sup>. We compare Cycloid with other two constant-degree systems, Viceroy and Koorde in various architectural aspects via simulation. Simulation results show that Cycloid has more advantages for large scale and dynamic systems that have frequent node arrivals and departures. In particular, Cycloid delivers a higher location efficiency in the average case and exhibits a more balanced distribution of keys and query loads between the nodes.
    Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International; 05/2004
  • Source
    X. Zhong, C.-Z. Xu, H. Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: Connection migration in mobile systems is to support continuous and transparent communication operations between mobile agents. We present a reliable connection migration mechanism that provides exactly-once delivery for all transmitted data during agent migration. It integrates with an agent-based access control mechanism that controls the access to network ports. To avoid frequent agent authentication and permission checking due to agent migration, a secret session key is associated with each connection. We present the design and implementation of the mechanism, named NapletSocket in Naplet mobile agent system. It is a pure middleware implementation, requiring no modification of Java virtual machines. Evaluation results show that the NapletSocket system incurs a moderate overhead in connection setup, mainly due to security checking. Once a secure connection is established, only a marginal cost is needed to pay for reliable communication during agent migration.
    Distributed Computing Systems Workshops, 2004. Proceedings. 24th International Conference on; 04/2004

Publication Stats

63 Citations
1.80 Total Impact Points


  • 2007
    • University of Arkansas
      • Department of Computer Science and Computer Engineering
      Fayetteville, AR, United States
  • 2004–2005
    • Wayne State University
      • Department of Electrical and Computer Engineering
      Detroit, MI, United States