DocumentCode :
684411
Title :
The law of the distribution in Kads routing table
Author :
Yang Yu ; Hui Liu ; Tianzuo Wang ; Huaping Hu
Author_Institution :
National University Of Defense Technology, CHINA
fYear :
2013
fDate :
23-23 Nov. 2013
Firstpage :
473
Lastpage :
477
Abstract :
In recent years, in the field of file sharing on the Internet, BitTorrent and eMule accounted for a large proportion of the application. The two software have their own proprietary peer-to-peer (P2P) network, and are based on the Kademha protocol development, Kademlia protocol is typical of the DHT(Distnbuted Hash Table) protocol. In eMule, proprietary peer-to-peer (P2P) network is called the KAD network, the goal to detect KAD network is to discover the relationship between the nodes and find new nodes in network rapidly and completely. Optimization of detection, we think, should be based on the distribution in routing table. Our job is to detect some nodes in KAD, and find out the existing laws of routing table. At present, only a few articles that involves detection of the routing table, but there is not enough analysis to summarize laws. In our experiment, We have developed a crawler, called Y-CRAWLER. We used it to crawl the KAD, and found one million and five hundred thousand nodes in one time. We have detected some of their routing table, found out that their routing table is not always in full. The detection results show that the actual routing table structure of KAD network nodes has clustering property. The neighboring nodes center on the upper 20 layers of the similar binary tree structure of the routing table, and the first 15 layers occupy more than 85% of the nodes.
Keywords :
Crawl; DHT; KAD; Peer-to-Peer;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Cyberspace Technology (CCT 2013), International Conference on
Conference_Location :
Beijing, China
Electronic_ISBN :
978-1-84919-801-1
Type :
conf
DOI :
10.1049/cp.2013.2175
Filename :
6748637
Link To Document :
بازگشت