Abstract
In recent years, peer-to-peer (P2P) file sharing applications (e.g., eMule) have dominated the Internet. eMule deploys its distributed network (i.e., KAD) based on Kademlia, a robust distributed hash table (DHT) protocol, to facilitate the delivery of content. In this paper, we conduct a series of analyses on the social network of KAD which is formed based on the information of how peers share files in KAD. Our analyses reveal many interesting characteristics of KAD. We further discuss the uses and misuses of these characteristics. Especially, we propose a novel approach to improve the routing performance of KAD based on the characteristic of its community structure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Karagiannis, T., Broido, A., Faloutsos, M., Claffy, K.: Transport layer identification of P2P traffic. In: Proceedings of the Internet Measurement Conference (IMC), Taormina, Sicily, Italy, pp. 121–134 (2004)
Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002)
Khambatti, M., Ryu, K.D., Dasgupta, P.: Peer-to-peer communities: formation and discovery. In: International Conference on Parallel and Distributed Computing Systems, Cambridge, USA, pp. 161–166 (2002)
Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of community in large networks. Journal of Statistical Mechanics: Theory and Experiment 2008(10), 440–442 (2008)
Liu, K., Bhaduri, K., Das, K., Nguyen, P., Kargupta, H.: Client-side web mining for community formation in peer-to-peer environments. In: The Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, USA, pp. 11–20 (2006)
Tian, Y., Wu, D., Wing Ng, K.: Modeling, analysis and improvement for Bittorrent-like file-sharing networks. In: IEEE International Conference on Computer Communications (INFOCOM), Barcelona, Catalunya, Spain, pp. 1–11 (2006)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against Sybil attacks via social network. IEEE/ACM Trans. on Networking 16, 576–589 (2008)
Watts, J.D., Strogatz, H.S.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440–442 (1998)
Newman, M.E.J.: Modularity and community structure in networks. Proceedings of the National Academy of Sciences 103(23), 8577–8582 (2006)
Brunner, R.: A performance evaluation of the Kad-protocol. Master’s thesis, University Mannheim, Germany (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, X., Li, Y., Li, Z., Cheng, X. (2011). Social Network Analysis on KAD and Its Application. In: Du, X., Fan, W., Wang, J., Peng, Z., Sharaf, M.A. (eds) Web Technologies and Applications. APWeb 2011. Lecture Notes in Computer Science, vol 6612. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20291-9_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-20291-9_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20290-2
Online ISBN: 978-3-642-20291-9
eBook Packages: Computer ScienceComputer Science (R0)