Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The impact of DHT routing geometry on resilience and proximity
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
OpenDHT: a public DHT service and its uses
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Fixing the embarrassing slowness of OpenDHT on PlanetLab
WORLDS'05 Proceedings of the 2nd conference on Real, Large Distributed Systems - Volume 2
Non-transitive connectivity and DHTs
WORLDS'05 Proceedings of the 2nd conference on Real, Large Distributed Systems - Volume 2
Do incentives build robustness in bit torrent
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Network coordinates in the wild
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Decentralized Bootstrapping of P2P Systems: A Practical View
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Efficient data management using the session log in DHT and its evaluation
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
INFOCOM'10 Proceedings of the 29th conference on Information communications
DHT performance for peer-to-peer SIP - a mobile phone perspective
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Privacy-preserving P2P data sharing with OneSwarm
Proceedings of the ACM SIGCOMM 2010 conference
BTWorld: towards observing the global BitTorrent file-sharing network
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Large-scale monitoring of DHT traffic
IPTPS'09 Proceedings of the 8th international conference on Peer-to-peer systems
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Network virtualization in energy-efficient office environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
Access control to BitTorrent swarms using closed swarms
Proceedings of the 2010 ACM workshop on Advanced video streaming techniques for peer-to-peer networks and social networking
Comet: an active distributed key-value store
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT
Computer Communications
Scalable consistency in Scatter
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Towards robust and efficient computation in dynamic peer-to-peer networks
Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms
A detailed examination of the overlay construction and maintenance mechanism in BitTorrent
Computer Communications
P2P consistency support for large-scale interactive applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Montra: A large-scale DHT traffic monitor
Computer Networks: The International Journal of Computer and Telecommunications Networking
Sophia: A local trust system to secure key-based routing in non-deterministic DHTs
Journal of Parallel and Distributed Computing
A secure self-destructing scheme for electronic data
Journal of Computer and System Sciences
Storage and search in dynamic peer-to-peer networks
Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards practical communication in Byzantine-resistant DHTs
IEEE/ACM Transactions on Networking (TON)
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Hi-index | 0.00 |
Distributed hash tables (DHTs) provide scalable, key-based lookup of objects in dynamic network environments. Although DHTs have been studied extensively from an analytical perspective, only recently have wide deployments enabled empirical examination. This paper reports measurements of the Azureus BitTorrent client's DHT, which is in active use by more than 1 million nodes on a daily basis. The Azureus DHT operates on untrusted, unreliable end-hosts, offering a glimpse into the implementation challenges associated with making structured overlays work in practice. Our measurements provide characterizations of churn, overhead, and performance in this environment. We leverage these measurements to drive the design of a modified DHT lookup algorithm that reduces median DHT lookup time by an order of magnitude for a nominal increase in overhead.