2003
DOI: 10.1109/tnet.2002.808407
|View full text |Cite
|
Sign up to set email alerts
|

Chord: a scalable peer-to-peer lookup protocol for internet applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

16
6,702
2
121

Year Published

2003
2003
2008
2008

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 5,314 publications
(6,992 citation statements)
references
References 14 publications
16
6,702
2
121
Order By: Relevance
“…Chord [15] is based on the idea of mapping both peer (mesh router) IDs and resource IDs (keys) into the same ID space, namely the unit ring [0,1]. Each key resides on the peer with the smallest ID larger than the key (see Figure 1), i.e., peer p manages keys comprised between its own ID and the ID of the predecessor of p in the unit ring (denoted range(p)).…”
Section: Basic Chord Operationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Chord [15] is based on the idea of mapping both peer (mesh router) IDs and resource IDs (keys) into the same ID space, namely the unit ring [0,1]. Each key resides on the peer with the smallest ID larger than the key (see Figure 1), i.e., peer p manages keys comprised between its own ID and the ID of the predecessor of p in the unit ring (denoted range(p)).…”
Section: Basic Chord Operationsmentioning
confidence: 99%
“…Recently, we have proposed MESHCHORD [3], a specialization for mesh networks of the well-known Chord algorithm [15], which exploits i) the availability of a wireless infrastructure and ii) the I-hop broadcast nature of wireless communications, to realize a) location-aware ID assignment to nodes, and b) implementation of a cross-layering technique that bridges the MAC to the middleware layer.…”
Section: Introductionmentioning
confidence: 99%
“…Overlay networks such as the Content Addressable Network (CAN), 2 Chord, 3 Pastry, 4 and Viceroy 5 create a virtual topology on top of the physical topology. In this sense, TTL-based P2P networks are also a type of overlay, but we use the term here to refer only to networks that create virtual topologies based on node-content attributes.…”
Section: Overlay Networkmentioning
confidence: 99%
“…As long as the initial network is stable, researchers have found that the system maintains O(log N) lookup times even with 50 percent probability of node failure. 3 Finally, Chord stores multiple key-value pairs in each node, automatically balancing the node load as new network entrants arrive.…”
Section: Example Overlay Networkmentioning
confidence: 99%
“…Structured P2P networks (e.g., Chord [2], CAN [3], * This work was performed while the author was at Institut EURECOM.…”
Section: Introduction a Motivationsmentioning
confidence: 99%