Abstract

Comparative Study of can, Pastry, Kademlia and Chord DHTS

Highlights

  • With the arrival of concept of P2P, people have changed the way they use Internet

  • An evaluation of structured peer-to-peer performance in mobile networks described in [7] evaluates the performance of five structured P2P protocols based on popular Distributed Hash Tables (DHTs), namely: Chord, Pastry, Kademlia, Broose [7] and EpiChord [7]

  • Distributed hash tables provide reliable scaling while maintaining network performance compared to unstructured peer-to-peer technologies

Read more

Summary

INTRODUCTION

With the arrival of concept of P2P, people have changed the way they use Internet. It allows users to create an application based on a virtual network in which data can be exchanged, even with the restrictions of the underlying networks of the Internet, such as firewalls, dynamic IP address assignment (1). Each node is responsible for a portion of the keys in the system and each object is stored in the node whose identifier is closest to its key according to the distance metric used These structured P2P networks give several types of routing topology that will change the performance of peer-to peer systems. Our contribution is to compare in terms of hop count, latency and transmitted messages both theoretical results and simulation results of CAN, Pastry, Kademlia and chord protocols by using the peerfactSim [18] simulator. This simulator abstracts the different network layers which gives the advantage to test the performances with a good accuracy. We proceed to their simulation and finish with a comparative analyse

Distance between Two Nodes With XOR Metric
The Kademlia protocol works
Arrival and Departure of a node
Protocol Operation
Routing in Chord
Arrival and Departure of A Node
Principle of the Pastry DHT
Principle of the CAN DHT
Optimization of DHTs with the De Bruijn graph
Work on the Analysis of DHTs
Existing Peer-to-Peer Simulator
The PeerfactSim simulator
Advantages
2.10. Drawbacks
The Event Scheduler
Simulation Time and Progression Mechanism
Description of the Simple Network
Behavior of the Peers
Bandwidth management
The Configuration
Process of Examining the Configuration in the XML File by the Simulator
The Simulation Method
RESULT
Graph and Theoretical Comparison of DHT
Path Length Versus Number of Nodes
Path Length Versus Number of Nodes variation of path length versus time
Average Number of Failed Messages and Number of Transmitted Messages
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call