DHT 01
DHT 01
To reduce the amount of traffic required to obtain results and thus make the routing efficient, the maximum number of neighbors any node maintains is low, and the maximum route length is also kept low. Both of these parameters are often set at log n, where n is the total number of nodes. Some systems may keep a record of routing paths to increase efficiency and to provide network self-healing. This design also increases resistance against denial of service attacks since a limited number of nodes will be affected, making the system effectively impossible to shut down. Distributed hash tables reside in the application layer, though they are not usually the applications themselves. They are used in complex applications such as distributed file systems, multicast, domain name systems, and instant messaging. One of their most famous uses is in peer-to-peer file sharing; Bittorrent, eDonkey, and newer versions of Gnutella use distributed hash tables in conjunction with more traditional means of data distribution. They are also used in content distribution systems and cooperative web caching. For example, the Coral Content Distribution Network caches websites that are hit with large amounts of traffic. There are a number of experimental search engines such as YaCy, which use distributed hash tables to index content. They are also used in anonymous networks such as Freenet, which can be used to bypass censorship by passing information indirectly through a number of nodes. Distributed hash tables provide a fast and fault-tolerant way of accessing large amounts of data with minimal cost.
References
Distributed Hash Table. Wikipedia. http://en.wikipedia.org/wiki/Distributed_hash_table Gribble, Steven D., et. al. Scalable, Distributed Data Structures for Internet Service Construction. 4th Symposium on Operating System Design & Implementation. 25 Oct 2005. San Diego, CA. http://www.usenix.org/events/osdi00/gribble.html Hash Table. Wikipedia. http://en.wikipedia.org/wiki/Hash_table Maymounkov, Petar and David Mazieres. Kademlia: A Peer-to-peer Information System Based on the XOR Metric. Electronic Proceedings for the 1st International Workshop on Peer-to-Peer Systems. 07 Mar 2002. MIT Faculty Club, Cambridge, MA. http://www.cs.rice.edu/Conferences/IPTPS02/109.pdf Stoica, Ion, et. al. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. Transactions on Networking. 11(1). Feb 2003. http://pdos.csail.mit.edu/papers/ton:chord/ Wiley, Brandon. Distributed Hash Tables. Linux Journal. 01 Oct 2003. http://www.linuxjournal.com/article/6797