Title :
Implementation of the Distributed Hash Tables on Peer-to-peer Networks
Author :
Dougherty, Michael ; Kimm, Haklin ; Ham, Ho-sang
Author_Institution :
Comput. Sci. Dept., East Stroudsburg Univ. of Pennsylvania, East Stroudsburg, PA
Abstract :
This paper is an examination of the Koorde distributed hash table protocol, "an extension of the Chord protocol" and "a scalable peer-to-peer lookup service" designed to be employed by Internet applications. The Koorde extension uses deBruijn graphs to improve the efficiency of the basic Chord algorithm. The two protocols are described and their basic operation are constructed in Java classes so that their operation may be analyzed and compared using simulations that is developed to roughly represent common communication sessions between peers over the Internet. Simulations are run comparing the hop counts of accessing different numbers of possible nodes and percentages of live nodes using the Chord or its Koorde extension.
Keywords :
Internet; cryptographic protocols; graph theory; peer-to-peer computing; telecommunication security; Chord protocol; Internet; deBruijn graphs; distributed hash tables protocol; peer-to-peer networks; scalable peer-to-peer lookup service; Authentication; Computer science; Electronic mail; Fingers; IP networks; Internet; Java; Peer to peer computing; Protocols; Search methods;
Conference_Titel :
Sarnoff Symposium, 2008 IEEE
Conference_Location :
Princeton, NJ
Print_ISBN :
978-1-4244-1843-5
DOI :
10.1109/SARNOF.2008.4520057