2003
DOI: 10.1007/978-3-540-45172-3_9
|View full text |Cite
|
Sign up to set email alerts
|

Koorde: A Simple Degree-Optimal Distributed Hash Table

Abstract: . While inheriting the simplicity of Chord, Koorde meets various lower bounds, such as O(log n) hops per lookup request with only 2 neighbors per node (where n is the number of nodes in the DHT), and O(log n/ log log n) hops per lookup request with O(log n) neighbors per node.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
294
0
8

Year Published

2004
2004
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 389 publications
(302 citation statements)
references
References 15 publications
(11 reference statements)
0
294
0
8
Order By: Relevance
“…Hence, we can subtract the number of the strings σ * σ * from the bound in Eqn. (10). From Lemmas 1 and 2, we infer that, in a de Bruijn graph, for any i, j and…”
Section: Lemma 2 the Number Of Routesmentioning
confidence: 81%
See 1 more Smart Citation
“…Hence, we can subtract the number of the strings σ * σ * from the bound in Eqn. (10). From Lemmas 1 and 2, we infer that, in a de Bruijn graph, for any i, j and…”
Section: Lemma 2 the Number Of Routesmentioning
confidence: 81%
“…De Bruijn graphs De Bruijn graphs are used in algorithms such as Koorde [10], Distance-Halving [15], or ODRI [12], and are extensively discussed in [12,20]. In a de Bruijn graph, any node i is represented by an identifier string (i 1 The resulting directed graph has a fixed out-degree ∆, and a diameter D.…”
Section: Theorem 1 If the Number Of Nodesmentioning
confidence: 99%
“…Several distributed hash tables (DHTs) have been introduced which are provably robust to random peer deletions (i.e. fail-stop faults) [1,13,16,21,22,26,28]. We are aware of several results that deal with the more challenging problem of designing DHTs which are robust to Byzantine faults.…”
Section: Related Workmentioning
confidence: 99%
“…Chord [33] was one of the pioneering works and guarantees a routing in log(N ) hops. Koorde [17] is an optimization of Chord which provides a routing complexity equal to O(log(N )/log(log(N )). Storm/Peacomm [28] is a infamous real worm using both cryptographic protection and peer-to-peer communication models [14].…”
Section: Botnet Architecturesmentioning
confidence: 99%