ChordlessA hash table to help you with your work. | |
Download |
Chordless Ranking & Summary
Advertisement
- License:
- GPL
- Publisher Name:
- Martin Kihlgren
- Operating Systems:
- Windows All
- File Size:
- 1.2 MB
Chordless Tags
- search searcher Hash Algorithm Secure Hash Hash search network find hash quicklink hash data Check Hash distribute hash table MD hash extract hash Hash Functions decifre hash decrypt hash hash decrypter hash decoder create hash Hash Value hash generator MD-5 hash compute hash hash information hash text hash library distributed hash table system hash algorithm selection Hash Breaker hash system disk hash table verify hash hash table nhetwork node deny hash create hash value hash value generator BCrypt hash analyze hash Multiple Hash What Hash Identify Hash hash make
Chordless Description
Chordless is a Java based. on the lowest level a distributed hash table. Main features: Lookup time is logarithmic with regard to number of nodes in network but constant with regard to amount of data in network. Modification time follows the same limits as lookup time. Data is redundant to a configurable degree. Operations are evenly (as evenly as SHA1 is able to) distributed across all nodes in the network. There is no master node or other single point of failure. The system automatically handles failed nodes by letting the next node having a complete backup of the failed node handle its operations. The system automatically keeps the data set distributed so that failover is handled as gracefully as possible. Nodes will automatically broadcast their addresses using UDP multicast to make it easier and quicker to start a group of nodes on the same network. Java objects that are stored in the network can have methods executed, so that it is unnecessary to get/set them for each operation. Java objects that have methods executed on them either checks for a dirty flag, or simply serializes themselves and compares the result to what is stored in the database, and only re-saves themselves when changed. Java objects that have methods executed upon them are cached in a HashMap with SoftReference keys and values to increase performance with regard to the most heavily used objects. Method execution of java objects of classes that does not exist in the node causes their classes to be loaded over the network from the client that initiated the execution. A transaction concept with serializable isolation level and optimistic locking makes operations (either simple put/get/del or remote method invocation on held java objects) complete ACID.
Chordless Related Software