Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 263-265.

Previous Articles     Next Articles

Hybrid Method for Capturing Snapshot of Routing Table of DHT Networks

YU Jie, LI Qiang, LI Sha-sha, MA Jun and LI Zhou-jun   

  • Online:2018-11-14 Published:2018-11-14

Abstract: DHT network is the most widely used P2P protocol in the world and routing table is the key component for its self-organization.It’s difficult to measure the global routing table of a DHT network due to its feature of totally distributed architecture.In this paper,we propose a hybrid method to capture the snapshot of the routing table of DHT network.We first introduce a repetition degree to define the efficiency when crawling the snapshot.Then,we propose a DHT snapshot method that uses breadth-first search first and then changes to depth-first search.Finnally,we propose a self-adaptive method to crawl the routing tables based on the un-even feature of routing table.The experiment on Kad network shows that,the DHT snapshot method is 91.2% better than Blizzard,64.5% better than breadth-first and 27.4% better than depth-first.Routing table snapshot method reaches the best when g=5 and it is 187.4% better than the random method and 38.9% better than g=7.

Key words: DHT,Routing table,Two layer model,Hybrid strategy,Self-adaptive strategy

[1] Stoica I,Morris R,Karger D,et al.Chord:A scalable peer-to-peer lookup service for Internet applications[C]∥Proceedings of SIGCOMM’01.2001:149-160
[2] Han J,Liu Y.Rumor Riding:Anonymizing Unstructured Peer-to-Peer Systems[M].IEEE ICNP,Santa Barbara,California,USA,November,2006
[3] 刘琼,徐鹏,杨海涛,等.Peer-to-Peer文件共享系统的测量研究[J].软件学报,2006,17(10):2131-2140
[4] Maymounkov P,Mazières D.Kademlia:A Peer-to-Peer Information System Based on the XOR Metric[C]∥Proceedings of the 1st International Workshop on Peer-to-Peer Systems(IPTPS’02).2002:53-65
[5] Bhagwan R,Savage S,Voelker G.Understanding availability[C]∥Proceedings of the 2nd International Workshop on Peer-to-Peer Systems(IPTPS’03).2003:256-267
[6] Brunner R.A performance evaluation of the Kad-protocol[M].Master Thesis,2006
[7] Steiner M,Biersack E W,Ennajjary T.Actively monitoringpeers in KAD[C]∥Proceedings of the 6th International Workshop on Peer-to-Peer Systems(IPTPS’07).2007
[8] Guo L,Chen S,Xiao Z,et al.Measurement,analysis,and mode-ling of BitTorrent-like systems[C]∥Proceedings of IMC’05.2005
[9] Neglia G,Reina G,Zhang H.Availability in BitTorrent Systems[C]∥Proceedings of INFOCOM’07.2007
[10] Jimenez R,Osmani F,Knutsson B.Connectivity Properties ofMainline BitTorrent DHT Nodes[C]∥Proceedings of P2P’09.2009
[11] Yu J,Fang C,Xu J,et al.ID repetition in Kad[C]∥Proceedings of IEEE P2P’09.2009
[12] Yu J,Lu L,Li Z,et al.A simple effective scheme to enhance the capability of web servers using P2P networks[C]∥Proceedings of ICPP’10.2010
[13] 李强,李舟军,周长斌,等.Kad网络中Sybil攻击团体检测技术研究[J].计算机研究与发展,2014,51(7):1614-1624
[14] Steiner M,Carra D,Biersack E W.Long term study of peer behavior in the KAD DHT[C]∥IEEE/ACM Trans.Networking.2009

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!