Now the primary concern is that how do we uniquely
identify every node. An m-bit identifier is used in such a
case wherein every node’s IP address is hashed into an m-
bit identifier and a key is hashed into an m-bit identifier.
This hashing is done using a
hash function. As described
earlier the primary function of a hash function is to produce
an m-bit identifier. This process is known as consistent
hashing.