HEAL DSpace

Storing and locating mutable data in structured peer-to-peer overlay networks

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Chazapis, A en
dc.contributor.author Koziris, N en
dc.date.accessioned 2014-03-01T02:43:33Z
dc.date.available 2014-03-01T02:43:33Z
dc.date.issued 2005 en
dc.identifier.issn 0302-9743 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/31472
dc.subject Distributed Hash Table en
dc.subject Distributed System en
dc.subject Fault Tolerant en
dc.subject Peer-to-peer Overlay Networks en
dc.subject.classification Computer Science, Theory & Methods en
dc.subject.other Distributed Hash Tables (DHT) en
dc.subject.other Kademlia networks en
dc.subject.other Mutable data en
dc.subject.other Peer-to-peer overlay networks en
dc.subject.other Algorithms en
dc.subject.other Computer networks en
dc.subject.other Data storage equipment en
dc.subject.other Distributed computer systems en
dc.subject.other Network protocols en
dc.subject.other Nonbibliographic retrieval systems en
dc.subject.other Data structures en
dc.title Storing and locating mutable data in structured peer-to-peer overlay networks en
heal.type conferenceItem en
heal.identifier.primary 10.1007/11573036_22 en
heal.identifier.secondary http://dx.doi.org/10.1007/11573036_22 en
heal.language English en
heal.publicationDate 2005 en
heal.abstract Structured peer-to-peer overlay networks or Distributed Hash Tables (DHTs) are distributed systems optimized for storage and retrieval of read-only data. In this paper we elaborate on a method that allows them to manage mutable data. We argue that by altering the retrieval algorithm of DHTs, we can enable them to cope with data updates, without sacrificing their fundamental properties of scalability and fault-tolerance. We describe in detail and analyze an implementation of a Kademlia network capable of handling mutable data. Nevertheless, the corresponding protocol additions can easily be applied to any DHT design. Experimental results show that although the process of managing and propagating data updates throughout the network adds up to the total cost of the lookup operation, the extra network utilization can be exploited in favor of overlay resilience to random node joins and failures. © Springer-Verlag Berlin Heidelberg 2005. en
heal.publisher SPRINGER-VERLAG BERLIN en
heal.journalName Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) en
heal.bookName LECTURE NOTES IN COMPUTER SCIENCE en
dc.identifier.doi 10.1007/11573036_22 en
dc.identifier.isi ISI:000233675500022 en
dc.identifier.volume 3746 LNCS en
dc.identifier.spage 234 en
dc.identifier.epage 244 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής