\relax 
\providecommand\hyper@newdestlabel[2]{}
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
\global\let\oldcontentsline\contentsline
\gdef\contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}}
\global\let\oldnewlabel\newlabel
\gdef\newlabel#1#2{\newlabelxx{#1}#2}
\gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
\AtEndDocument{\ifx\hyper@anchor\@undefined
\let\contentsline\oldcontentsline
\let\newlabel\oldnewlabel
\fi}
\fi}
\global\let\hyper@last\relax 
\gdef\HyperFirstAtBeginDocument#1{#1}
\providecommand\HyField@AuxAddToFields[1]{}
\providecommand\HyField@AuxAddToCoFields[2]{}
\@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{1}{section.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces HDFS Architecture [25]}}{2}{figure.1}}
\newlabel{fig_hdfsarchitecture}{{1}{2}{HDFS Architecture [25]}{figure.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {II}Related Work}{2}{section.2}}
\newlabel{sect_relatedwork}{{II}{2}{Related Work}{section.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {III}System Overview}{3}{section.3}}
\newlabel{sect_systemoverview}{{III}{3}{System Overview}{section.3}{}}
\@writefile{toc}{\contentsline {section}{\numberline {IV}Redirection Hash Table Algorithm (RHT)}{3}{section.4}}
\newlabel{sect_rht}{{IV}{3}{Redirection Hash Table Algorithm (RHT)}{section.4}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {IV-A}}\_ClusterState}{3}{subsection.4.1}}
\newlabel{sect_clusterstate}{{\unhbox \voidb@x \hbox {IV-A}}{3}{\_ClusterState}{subsection.4.1}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Pseudo-code of the pseudo-random generation algorithm}}{4}{figure.2}}
\newlabel{fig_pseudocode}{{2}{4}{Pseudo-code of the pseudo-random generation algorithm}{figure.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {IV-B}}Redirection Hash Table Algorithm}{4}{subsection.4.2}}
\newlabel{sect_rdhalgorithm}{{\unhbox \voidb@x \hbox {IV-B}}{4}{Redirection Hash Table Algorithm}{subsection.4.2}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Metadata nodes selection process}}{4}{figure.3}}
\newlabel{fig_metadatanodesselection}{{3}{4}{Metadata nodes selection process}{figure.3}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces File accessing in centralized cluster (HDFS)}}{4}{figure.4}}
\newlabel{fig_hdfsfileaccess}{{4}{4}{File accessing in centralized cluster (HDFS)}{figure.4}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces File reading in Hiver}}{5}{figure.5}}
\newlabel{fig_hiverfileaccess}{{5}{5}{File reading in Hiver}{figure.5}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {IV-C}}Algorithm Performance Analysis}{5}{subsection.4.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {IV-D}}Replica Placement}{5}{subsection.4.4}}
\@writefile{toc}{\contentsline {section}{\numberline {V}System Reliability, Data Safety and Consistency}{5}{section.5}}
\newlabel{sect_datasafty}{{V}{5}{System Reliability, Data Safety and Consistency}{section.5}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {V-A}}Failure Detection and Data Safety}{5}{subsection.5.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {V-B}}Redistribution on Cluster Changes and Data Movement}{6}{subsection.5.2}}
\newlabel{sect_redistributionproof}{{\unhbox \voidb@x \hbox {V-B}}{6}{Redistribution on Cluster Changes and Data Movement}{subsection.5.2}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Metadata/File redistribution when node joins in cluster}}{6}{figure.6}}
\newlabel{fig_hiverredistribution}{{6}{6}{Metadata/File redistribution when node joins in cluster}{figure.6}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {V-C}}Data Consistency during Cluster Update}{6}{subsection.5.3}}
\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces Metadata/File redistribution when node joins in cluster}}{7}{figure.7}}
\newlabel{fig_proof2}{{7}{7}{Metadata/File redistribution when node joins in cluster}{figure.7}{}}
\@writefile{toc}{\contentsline {section}{\numberline {VI}Evaluations}{7}{section.6}}
\newlabel{sect_evaluation}{{VI}{7}{Evaluations}{section.6}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {VI-A}}Delay of metadata operation}{7}{subsection.6.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {VI-B}}Throughput}{7}{subsection.6.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Average Latencies of Centralized and Decentralized Network}}{7}{figure.8}}
\newlabel{fig_averagedelay}{{8}{7}{Average Latencies of Centralized and Decentralized Network}{figure.8}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {VI-C}}Reliability}{7}{subsection.6.3}}
\bibcite{IEEEhowto:kopka}{1}
\bibcite{1}{2}
\bibcite{}{3}
\bibcite{}{4}
\bibcite{}{5}
\bibcite{}{6}
\bibcite{}{7}
\bibcite{}{8}
\bibcite{}{9}
\bibcite{}{10}
\bibcite{}{11}
\bibcite{}{12}
\bibcite{}{13}
\bibcite{}{14}
\bibcite{}{15}
\bibcite{}{16}
\bibcite{}{17}
\@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces Probabilities of data lost when node drop out (Backup number is 3)}}{8}{table.1}}
\newlabel{table_dataloss}{{I}{8}{Probabilities of data lost when node drop out (Backup number is 3)}{table.1}{}}
\@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Throughput of Hiver}}{8}{table.2}}
\newlabel{table_throughput}{{II}{8}{Throughput of Hiver}{table.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {VII}Conclusions}{8}{section.7}}
\@writefile{lot}{\contentsline {table}{\numberline {III}{\ignorespaces Comparisons between Hiver, centralized System and Naive hash-based System}}{8}{table.3}}
\newlabel{table_centralvsdecentral}{{III}{8}{Comparisons between Hiver, centralized System and Naive hash-based System}{table.3}{}}
\@writefile{toc}{\contentsline {section}{\numberline {VIII}Future Work}{8}{section.8}}
\@writefile{toc}{\contentsline {section}{References}{8}{section*.1}}
\bibcite{}{18}
\bibcite{}{19}
\bibcite{}{20}
\bibcite{}{21}
\bibcite{}{22}
\bibcite{}{23}
\bibcite{}{24}
\bibcite{}{25}
\@writefile{toc}{\contentsline {section}{Biographies}{9}{IEEEbiography.0}}
\@writefile{toc}{\contentsline {subsection}{Yifeng Chen, Weidong Zhang, Lei Zhang}{9}{IEEEbiography.1}}
