Abstract
The KAD network is one of the largest distributed hash tables (DHT) deployed in the real world. DHT is designed to provide scalable peer-to-peer lookup service. Its real-world lookup performance, however, is recognized as inefficient. We ran wide-range measurements on the KAD network to evaluate this inefficiency by examining peer behaviors in publishing and retrieving information using routing tables and publishing tables. Our measurements show that even though routing tables are well maintained, the current refreshment scheme of publishing tables and lack of effective incentive policy cause lookup performance deficiency. Based on our findings, we propose three improvement schemes, analyze their strengths, and give suggestions to implementations.
Similar content being viewed by others
References
Brunner R (2006) A performance evaluation of the KAD-protocol. Master’s thesis, Institute Eurecom
Douceur J, Donath JS (2002) The sybil attack. USENIX IPTPS
eMule Officical Website Retrieved Mar 3, 2013, from. http://sourceforge.net/projects/amule/
eMule Officical Website Retrieved Mar 3, 2013, from. http://www.emule.com/
Feldman M, Papadimitriou C, Chuang J, Stoica I (2006) Free-riding and whitewashing in peer-to-peer systems. IEEE J Sel Areas Commun 24(5):1010–1019
Gummadi KP, Dunn RJ, Saroiu S, Gribble SD, Levy HM, Zahorjan J (2003) Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: Proceedings of the 9th ACM symposium on operating systems principles, SOSP ’03. ACM, New York, pp 314–329
Handurukande SB, Kermarrec A-M, Le Fessant F, Massoulié L, Patarin S (2006) Peer sharing behaviour in the edonkey network, and implications for the design of server-less file sharing systems. In: Proceedings of the 1st ACM SIGOPS/EuroSys European conference on computer systems 2006, EuroSys ’06. ACM, New York, pp 359–371
Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on world wide web. ACM, Budapest, pp 640–651
Kang HJ, Chan-Tin E, Hopper NJ, Kim Y (2009) Why KAD lookup fails. In: IEEE peer-to-peer computing (IEEE P2P)
Lai K, Feldman M, Stoica I, Chuang J (2003) Incentives for cooperation in peer-to-peer networks. In: Workshop on economics of peer-to-peer systems. pp 1243–1248
Li Y, Gruenbacher D, Scoglio C (2011) Reward only is not enough: evaluating and improving the fairness policy of the p2p file sharing network emule/edonkey. Peer-to-Peer Netw Appl 5:40–57
Lin M, Fan B, Lui JCS, Chiu D-M (2007) Stochastic analysis of file-swarming systems. Perform Eval 64(9–12):856–875
Locher T, Mysicka D, Schmid S, Wattenhofer R (2009) A peer activity study in eDonkey and KAD. In: International workshop on dynamic networks: algorithms and security (DYNAS)
Ma RTB, Lee SCM, Lui JCS, Yau DKY (2006) Incentive and service differentiation in p2p networks: a game theoretic approach. IEEE/ACM Trans Netw 14(5):978–991
Marti S, Garcia-Molina H (2006) Taxonomy of trust: categorizing p2p reputation systems. Comput Netw 50:472–484
Maymounkov P, Mazires D (2002) Kademlia: a peer-to-peer information system based on the xor metric. In:Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS)
Memon G, Rejaie R, Guo Y, Stutzbach D (2009) Large-scale monitoring of DHT traffic. In: Proceedings of 8th international workshop workshop on peer-to-peer systems (IPTPS)
PlanetLab Retrieved Mar 3, 2013, from, http://www.planet-lab.org/
Qiu D, Srikant R (2004) Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: ACM SIGCOMM. ACM, Portland, pp 367–378
Rowstron AIT, Druschel P (2001) Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Proceedings of the IFIP/ACM international conference on distributed systems platforms. Springer-Verlag, London, pp 329–350
Seibert J, Torres R, Mellia M, Munafo MM, Nita-Rotaru C, Rao S (2012) The internet-wide impact of p2p traffic localization on isp profitability. IEEE/ACM Trans Netw 20(6):1910–1923
Steiner M (2008) Structures and algorithms for peer-to-peer cooperation. PhD thesis, Thesis, 12
Steiner M, Biersack EW, Ennajjary T (2007) Actively monitoring peers in KAD. In: Proceedings of the 6th international workshop on peer-to-peer systems (IPTPS)
Steiner M, Carra D, Biersack EW (2008) Faster content access in KAD. In: IEEE peer-to-peer computing (IEEE P2P)
Steiner M, En-najjary T, Biersack EW (2007) Exploiting KAD: possible uses and misuses. ACM SIGCOMM CCR 37:65–69
Steiner M, En-Najjary T, Biersack EW (2007) A global view of KAD. In: ACM internet measurement conference (IMC)
Steiner M, En-Najjary T, Biersack EW (2009) Long term study of peer behavior in the KAD DHT. IEEE/ACM Trans Netw 17(5):1371–1384
Stoica I, Morris R, Karger D, Frans Kaashoek M, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of the ACM SIGCOMM conference. San Diego
Stutzbach D, Rejaie R (2006) Improving lookup performance over a widely-deployed DHT. In: 25th IEEE international conference on computer communications (INFOCOM)
Stutzbach D, Rejaie R (2006) Understanding churn in peer-to-peer networks. In: Internet measurement conference (IMC)
Yu J, Fang C, Xu J, Chang E-C, Li Z (2009) Id repetition in KAD. In: IEEE international conference on peer-to-peer computing
Zhao BY, Huang L, Stribling J, Rhea SC, Joseph AD, Kubiatowicz JD (2004) Tapestry: a resilient global-scale overlay for service deployment. IEEE J Sel Areas Commun 22(1):41–53
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, Y., Liu, H., Guenbacher, D. et al. Lookup Performance Deficiencies in the KAD Network. Mobile Netw Appl 19, 649–659 (2014). https://doi.org/10.1007/s11036-013-0492-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-013-0492-5