2001
DOI: 10.1145/964723.383072
|View full text |Cite
|
Sign up to set email alerts
|

A scalable content-addressable network

Abstract: Hash tables -which map "keys" onto "values" -are an essential building block in modern software systems. We believe a similar functionality would be equally valuable to large distributed systems. In this paper, we introduce the concept of a Content-Addressable Network (CAN) as a distributed infrastructure that provides hash table-like functionality on Internet-like scales. The CAN is scalable, fault-tolerant and completely self-organizing, and we demonstrate its scalability, robustness and low-latency properti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
2,001
0
20

Year Published

2002
2002
2013
2013

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 2,333 publications
(2,057 citation statements)
references
References 12 publications
4
2,001
0
20
Order By: Relevance
“…DCS uses the GPSR [7] geographic routing algorithm for low-level routing. It then builds a DHT [11,12,14,16] on top of GPSR. We first describe GPSR and then the construction of a lookup algorithm over GPSR.…”
Section: Data-centric Storagementioning
confidence: 99%
See 1 more Smart Citation
“…DCS uses the GPSR [7] geographic routing algorithm for low-level routing. It then builds a DHT [11,12,14,16] on top of GPSR. We first describe GPSR and then the construction of a lookup algorithm over GPSR.…”
Section: Data-centric Storagementioning
confidence: 99%
“…A significant benefit of DCS is that queries for data of a certain type can be sent directly to the node storing data of that type, rather than flooding the queries throughout the network (unlike data-centric routing proposals [4,6]). DCS is based on the low-level routing functionality provided by the GPSR geographic routing algorithm [7], and on distributed hash-table functionality provided by peer-to-peer lookup algorithms such as CAN [11], Chord [14], Pastry [12] and Tapestry [16]. It is shown in [10] and [13] that DCS offers reduced total network load and peak (hotspot) network usage.…”
Section: Introductionmentioning
confidence: 99%
“…The edges in U may be unidirectional or not. We believe that DHT graphs [3,4,5] can be efficiently used as the graph (X, U). In this paper, we use the Chord DHT graph as an example.…”
Section: Topology-aware Multi-cluster Overlaymentioning
confidence: 99%
“…The floods support arbitrary queries, but are not scalable because they cause exponentially increased network traffic. In contrast, structured P2P systems are developed to perform key queries by constructing Distributed Hash Tables (DHTs), such as Chord [3], CAN [4], and Pastry [5], etc. Although such schemes provide good performance for exact match queries, they almost don't work for range, approximate, or text queries.…”
Section: Introductionmentioning
confidence: 99%
“…Overlay networks such as the Content Addressable Network (CAN), 2 Chord, 3 Pastry, 4 and Viceroy 5 create a virtual topology on top of the physical topology. In this sense, TTL-based P2P networks are also a type of overlay, but we use the term here to refer only to networks that create virtual topologies based on node-content attributes.…”
Section: Overlay Networkmentioning
confidence: 99%