Optimizing the finger tables in Chord-like DHTs
نویسندگان
چکیده
The Chord protocol is the best known example of implementation of logarithmic complexity routing for structured peer-to-peer networks. Its routing algorithm, however, does not provide an optimal trade-off between resources exploited (the size of the ‘finger table’) and performance (the average or worst-case number of hops to reach destination). Cordasco et al. showed that a finger table based on Fibonacci distances provides lower number of hops with fewer table entries. In this paper we generalize this result, showing how to construct an improved finger table when the objective is to reduce the number of hops, possibly at the expense of an increased size of the finger table. Our results can also be exploited to guarantee low routing time in case a fraction of nodes fails. Copyright © 2007 John Wiley & Sons, Ltd.
منابع مشابه
Ring-like DHTs and the Postage Stamp Problem
We explore Chord-like ring structures for Distributed Hash Tables (DHTs) and show that the Postage Stamp Problem (PSP) is equivalent to finding optimal structures for such ring topologies. We first leverage known results for that problem to design structures for ring-like DHTs that use shortest-path routing. We then describe a variant of the PSP that corresponds to ring-like DHTs that use greed...
متن کاملChord: Structured Overlay Network for Non-Uniform Load-Distribution
Data lookup is a fundamental problem in peer-to-peer systems: Given a key, find the node that stores the associated object. Chord and other P2P algorithms use distributed hash tables (DHTs) to distribute the keys and nodes evenly across a logical ring. Using an efficient routing strategy, DHTs provide a routing performance of O(logN) in networks of N nodes. While the routing performance has bee...
متن کاملCR-Chord: Improving lookup availability in the presence of malicious DHT nodes
Distributed Hash Tables (DHTs) provide a useful key-to-value lookup service for many Internet applications. However, without additional mechanisms DHTs are vulnerable to attacks. In particular, previous research showed that Chord is not well resistant to malicious nodes that joined the DHT. We introduce the cyclic routing algorithm as an extension of Chord (CR-Chord). Using simulations we compa...
متن کاملThe Cost of Inconsistency in DHTs
Distributed Hash Tables (DHTs) support a hash-table-like lookup interface: given a key, it maps the key onto a node. One of the crucial questions facing DHTs is whether lookups can route correctly in a dynamic environment where the routing state is inconsistent. The routing state may become inconsistent when a node falsely thinks a failed neighbor is up (false negative), when a node falsely rem...
متن کاملExploiting Network Proximity in Distributed Hash Tables
Self-organizing peer-to-peer (p2p) overlay networks like CAN, Chord, Pastry and Tapestry (also called distributed hash tables or DHTs) offer a novel platform for a variety of scalable and decentralized distributed applications. These systems provide efficient and fault-tolerant routing, object location, and load balancing within a self-organizing overlay network. One important aspect of these s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Concurrency and Computation: Practice and Experience
دوره 20 شماره
صفحات -
تاریخ انتشار 2008