Home > Research > Publications & Outputs > Stealth distributed hash table: a robust and fl...
View graph of relations

Stealth distributed hash table: a robust and flexible super-peered DHT

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Stealth distributed hash table: a robust and flexible super-peered DHT. / Brampton, Andrew; MacQuire, Andrew; Rai, Idris et al.
Proceedings of the 2006 ACM CoNEXT conference. ACM, 2006.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Brampton, A, MacQuire, A, Rai, I, Race, NJP & Mathy, L 2006, Stealth distributed hash table: a robust and flexible super-peered DHT. in Proceedings of the 2006 ACM CoNEXT conference. ACM, 2nd Conference on Future Networking Technologies (CoNEXT'06), Lisbon, Portugal, 1/01/00. https://doi.org/10.1145/1368436.1368462

APA

Brampton, A., MacQuire, A., Rai, I., Race, N. J. P., & Mathy, L. (2006). Stealth distributed hash table: a robust and flexible super-peered DHT. In Proceedings of the 2006 ACM CoNEXT conference ACM. https://doi.org/10.1145/1368436.1368462

Vancouver

Brampton A, MacQuire A, Rai I, Race NJP, Mathy L. Stealth distributed hash table: a robust and flexible super-peered DHT. In Proceedings of the 2006 ACM CoNEXT conference. ACM. 2006 doi: 10.1145/1368436.1368462

Author

Brampton, Andrew ; MacQuire, Andrew ; Rai, Idris et al. / Stealth distributed hash table: a robust and flexible super-peered DHT. Proceedings of the 2006 ACM CoNEXT conference. ACM, 2006.

Bibtex

@inproceedings{c7bb463636474779bcbe8235931a3a87,
title = "Stealth distributed hash table: a robust and flexible super-peered DHT",
abstract = "Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment. Additionally, we believe that it is this approach that contributes to a limited exploitation of peer-to-peer technologies. Previous work on super-peers in DHTs was proposed to address these performance issues, however the strategy used is often based on locally clustering peers around individual super-peers. This method of superpeering, however, compromises fundamental features such as load-balancing, resilience and routing efficiency, which traditional DHTs originally promised to offer. We propose a Stealth DHT which addresses the deficiencies of previous super-peer approaches by using the DHT algorithm itself to select the most appropriate super-peer for each message sent by peers. Through simulations and measurements, we show the fitness for purpose of our proposal.",
keywords = "distributed hash tables, Peer-to-peer, Stealth DHT",
author = "Andrew Brampton and Andrew MacQuire and Idris Rai and Race, {Nicholas J. P.} and Laurent Mathy",
year = "2006",
month = dec,
doi = "10.1145/1368436.1368462",
language = "English",
isbn = "1-59593-456-1",
booktitle = "Proceedings of the 2006 ACM CoNEXT conference",
publisher = "ACM",
note = "2nd Conference on Future Networking Technologies (CoNEXT'06) ; Conference date: 01-01-1900",

}

RIS

TY - GEN

T1 - Stealth distributed hash table: a robust and flexible super-peered DHT

AU - Brampton, Andrew

AU - MacQuire, Andrew

AU - Rai, Idris

AU - Race, Nicholas J. P.

AU - Mathy, Laurent

PY - 2006/12

Y1 - 2006/12

N2 - Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment. Additionally, we believe that it is this approach that contributes to a limited exploitation of peer-to-peer technologies. Previous work on super-peers in DHTs was proposed to address these performance issues, however the strategy used is often based on locally clustering peers around individual super-peers. This method of superpeering, however, compromises fundamental features such as load-balancing, resilience and routing efficiency, which traditional DHTs originally promised to offer. We propose a Stealth DHT which addresses the deficiencies of previous super-peer approaches by using the DHT algorithm itself to select the most appropriate super-peer for each message sent by peers. Through simulations and measurements, we show the fitness for purpose of our proposal.

AB - Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment. Additionally, we believe that it is this approach that contributes to a limited exploitation of peer-to-peer technologies. Previous work on super-peers in DHTs was proposed to address these performance issues, however the strategy used is often based on locally clustering peers around individual super-peers. This method of superpeering, however, compromises fundamental features such as load-balancing, resilience and routing efficiency, which traditional DHTs originally promised to offer. We propose a Stealth DHT which addresses the deficiencies of previous super-peer approaches by using the DHT algorithm itself to select the most appropriate super-peer for each message sent by peers. Through simulations and measurements, we show the fitness for purpose of our proposal.

KW - distributed hash tables

KW - Peer-to-peer

KW - Stealth DHT

U2 - 10.1145/1368436.1368462

DO - 10.1145/1368436.1368462

M3 - Conference contribution/Paper

SN - 1-59593-456-1

BT - Proceedings of the 2006 ACM CoNEXT conference

PB - ACM

T2 - 2nd Conference on Future Networking Technologies (CoNEXT'06)

Y2 - 1 January 1900

ER -