Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2015

01-09-2015

A performance comparison of Chord and Kademlia DHTs in high churn scenarios

Authors: Adán G. Medrano-Chávez, Elizabeth Pérez-Cortés, Miguel Lopez-Guerrero

Published in: Peer-to-Peer Networking and Applications | Issue 5/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A distributed hash table (DHT) is an important kind of P2P system that provides decentralized services to look up resources in various applications. In this context, Chord and Kademlia are two relevant DHTs and several pieces of work have appeared in the literature where their performance is evaluated. Unfortunately, available results are neither consistent nor concluding. This situation arises from the use of different churn models (i.e., peer arrivals and departures); all of them neglecting the fact that churn happens since the beginning of the lifetime of DHTs. Furthermore, available performance evaluations do not consider that DHT parameter settings are nonequivalent. To address these concerns, in this paper we present an exhaustive, fair and realistic evaluation framework integrated by: 1) A state-of-the-art churn model executed by peers since their creation. 2) An evaluation methodology that considers the difference in meaning of the parameters belonging to different DHTs. 3) A churn metric that quantifies the rate of change of the P2P population. By means of this evaluation framework, we found that under similar conditions, Kademlia exhibits higher performance than Chord. We conclude that DHTs must have mechanisms to deal with high churn during their whole existence, otherwise, they may not achieve a state where peers are correctly connected. Furthermore, our findings suggest that DHTs should rely on less-dynamic peers to improve their performance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Baset SA, Schulzrinne HG (2006) An analysis of the skype peer-to-peer internet telephony protocol.In: Proceedings of the 25th IEEE international conference on computer communications (INFOCOM), Barcelona, pp 1–11 Baset SA, Schulzrinne HG (2006) An analysis of the skype peer-to-peer internet telephony protocol.In: Proceedings of the 25th IEEE international conference on computer communications (INFOCOM), Barcelona, pp 1–11
2.
go back to reference Baumgart I, Heep B, Krause S (2007) OverSim: A flexible overlay network simulation framework.In: Proceedings of 10th IEEE global internet symposium in conjunction with IEEE INFOCOM, Anchorage, pp 79–84 Baumgart I, Heep B, Krause S (2007) OverSim: A flexible overlay network simulation framework.In: Proceedings of 10th IEEE global internet symposium in conjunction with IEEE INFOCOM, Anchorage, pp 79–84
3.
go back to reference Baumgart I, Mies S (2007) S/Kademlia: A practicable approach towards secure key-based routing. Proc 13th Int Conf Parallel Distributed Syst (PDCS) 2:1–8 Baumgart I, Mies S (2007) S/Kademlia: A practicable approach towards secure key-based routing. Proc 13th Int Conf Parallel Distributed Syst (PDCS) 2:1–8
4.
go back to reference Binzenhfer A, Leibnitz K (2007) Estimating churn in structured P2P networks.In: Proceedings of the 20th international teletraffic conference on managing traffic performance in converged networks, ITC20’07. Springer-Verlag, Ottawa, pp 630–641 Binzenhfer A, Leibnitz K (2007) Estimating churn in structured P2P networks.In: Proceedings of the 20th international teletraffic conference on managing traffic performance in converged networks, ITC20’07. Springer-Verlag, Ottawa, pp 630–641
5.
go back to reference Castro M, Costa M, Rowstron A (2004) Performance and dependability of structured peer-to-peer overlays.In: Proceedings of the 2004 international conference on dependable systems and networks (DSN), Florence, pp 9–18 Castro M, Costa M, Rowstron A (2004) Performance and dependability of structured peer-to-peer overlays.In: Proceedings of the 2004 international conference on dependable systems and networks (DSN), Florence, pp 9–18
6.
go back to reference Castro MC , Kassler AJ, Chiasserini CF, Casetti C, Korpeoglu I (2010) Peer-to-peer overlay in mobile ad-hoc networks. In: Shen X, Yu H, Buford J, Akon M (eds) Handbook of peer-to-peer networking. Springer US, Boston, pp 1045–1080CrossRef Castro MC , Kassler AJ, Chiasserini CF, Casetti C, Korpeoglu I (2010) Peer-to-peer overlay in mobile ad-hoc networks. In: Shen X, Yu H, Buford J, Akon M (eds) Handbook of peer-to-peer networking. Springer US, Boston, pp 1045–1080CrossRef
7.
go back to reference Chen K, Shen H, Zhang H (2011) Leveraging social networks for P2P content-based file sharing in mobile ad hoc networks.In: Proceedings of the IEEE 8th international conference on mobile adhoc and sensor systems (MASS), Valencia, pp 112–121 Chen K, Shen H, Zhang H (2011) Leveraging social networks for P2P content-based file sharing in mobile ad hoc networks.In: Proceedings of the IEEE 8th international conference on mobile adhoc and sensor systems (MASS), Valencia, pp 112–121
8.
go back to reference Eastlake DE, Jones PE (1995) US secure hash algorithm 1 (SHA1). Tech. Rep FIPS 180-1,U.S. Department of Commerce/NIST, Springfield, EUA Eastlake DE, Jones PE (1995) US secure hash algorithm 1 (SHA1). Tech. Rep FIPS 180-1,U.S. Department of Commerce/NIST, Springfield, EUA
9.
go back to reference Gummadi K P, Gummadi R , Gribble S D, Ratnasamy S, Shenker S, Stoica I (2003) The impact of DHT routing geometry on resilience and proximity.In: Proceedings of the conference on applications, technologies, architectures, and protocols for computer communications (ACM SIGCOMM), Karlsruhe, pp 381–394 Gummadi K P, Gummadi R , Gribble S D, Ratnasamy S, Shenker S, Stoica I (2003) The impact of DHT routing geometry on resilience and proximity.In: Proceedings of the conference on applications, technologies, architectures, and protocols for computer communications (ACM SIGCOMM), Karlsruhe, pp 381–394
10.
go back to reference Gupta I, Birman K, Linga P, Demers A, van Renesse R (2003) Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead.In:Proceedings of the 2nd international workshop on peer-to-peer systems (IPTPS). Berkeley, USA Gupta I, Birman K, Linga P, Demers A, van Renesse R (2003) Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead.In:Proceedings of the 2nd international workshop on peer-to-peer systems (IPTPS). Berkeley, USA
11.
go back to reference Harjula E, Koskela T, Ylianttila M (2011) Comparing the performance and efficiency of two popular DHTs in interpersonal communication.In: Proceedings of the IEEE wireless communications and networking conference (WCNC), Cancun, pp 2173–2178 Harjula E, Koskela T, Ylianttila M (2011) Comparing the performance and efficiency of two popular DHTs in interpersonal communication.In: Proceedings of the IEEE wireless communications and networking conference (WCNC), Cancun, pp 2173–2178
12.
go back to reference Herrera O, Znati T (2007) Modeling churn in P2P networks.In: Proceedings of the 40th annual simulation symposium (ANSS), Norfolk, pp 33–40 Herrera O, Znati T (2007) Modeling churn in P2P networks.In: Proceedings of the 40th annual simulation symposium (ANSS), Norfolk, pp 33–40
13.
go back to reference Huffaker B, Plummer D, Moore D, Claffy K (2002) Topology discovery by active probing.In: Proceedings of the symposium on applications and the internet workshops (SAINT), Nara, pp 90–96 Huffaker B, Plummer D, Moore D, Claffy K (2002) Topology discovery by active probing.In: Proceedings of the symposium on applications and the internet workshops (SAINT), Nara, pp 90–96
14.
go back to reference Kaashoek MF, Karger DR (2003) Koorde: a simple degree-optimal distributed hash table.In: Proceedings of the 2nd international workshop on peer-to-peer systems (IPTPS), Berkeley, pp 98–107 Kaashoek MF, Karger DR (2003) Koorde: a simple degree-optimal distributed hash table.In: Proceedings of the 2nd international workshop on peer-to-peer systems (IPTPS), Berkeley, pp 98–107
16.
go back to reference Koskela T, Harjula E, Kassinen O, Ylianttila M (2011) Robustness of a P2P community management system based on two-level hierarchical DHT overlays.In: Proceedings of the IEEE symposium on computers and communications (ISCC), Kerkyra, pp 881–886 Koskela T, Harjula E, Kassinen O, Ylianttila M (2011) Robustness of a P2P community management system based on two-level hierarchical DHT overlays.In: Proceedings of the IEEE symposium on computers and communications (ISCC), Kerkyra, pp 881–886
18.
go back to reference Lee JW, Schulzrinne H, Kellerer W (2011) Despotovic, Z.: 0 to 10k in 20 seconds: Bootstrapping large-scale dht networks.In: Proceedings of the IEEE international conference on communications (ICC), Kyoto, pp 1–6 Lee JW, Schulzrinne H, Kellerer W (2011) Despotovic, Z.: 0 to 10k in 20 seconds: Bootstrapping large-scale dht networks.In: Proceedings of the IEEE international conference on communications (ICC), Kyoto, pp 1–6
19.
go back to reference Li J, Stribling J, Gil TM, Morris R, Kaashoek MF (2004) Comparing the performance of distributed hash tables under churn.In: Proceedings of the third international conference on peer-to-peer systems (IPTPS), La Jolla, pp 87–99 Li J, Stribling J, Gil TM, Morris R, Kaashoek MF (2004) Comparing the performance of distributed hash tables under churn.In: Proceedings of the third international conference on peer-to-peer systems (IPTPS), La Jolla, pp 87–99
20.
go back to reference Liben-Nowell D, Balakrishnan H, Karger D. (2002) Analysis of the evolution of peer-to-peer systems.In: Proceedings of the twenty-first annual symposium on principles of distributed computing (PODC), Monterey, pp 233–242 Liben-Nowell D, Balakrishnan H, Karger D. (2002) Analysis of the evolution of peer-to-peer systems.In: Proceedings of the twenty-first annual symposium on principles of distributed computing (PODC), Monterey, pp 233–242
21.
go back to reference Liu Z, Yuan R, Li Z, Li H, Chen G (2006) Survive under high churn in structured P2P systems: Evaluation and strategy.In: Proceedings of the 6th international conference on computational science (ICCS), Reading, pp 404–411 Liu Z, Yuan R, Li Z, Li H, Chen G (2006) Survive under high churn in structured P2P systems: Evaluation and strategy.In: Proceedings of the 6th international conference on computational science (ICCS), Reading, pp 404–411
22.
go back to reference Mahadevan P, Krioukov DV, Fomenkov M, Huffaker B, Dimitropoulos XA, Claffy KC, Vahdat A (2005) Lessons from three views of the Internet topology.Computing Research Repository abs/cs/0508033 Mahadevan P, Krioukov DV, Fomenkov M, Huffaker B, Dimitropoulos XA, Claffy KC, Vahdat A (2005) Lessons from three views of the Internet topology.Computing Research Repository abs/cs/0508033
23.
go back to reference Maymounkov P, Mazires D (2002) Kademlia: A peer-to-peer information system based on the XOR metric.In: Revised papers from the first international workshop on peer-to-peer systems. Cambridge, USA, pp 53–65 Maymounkov P, Mazires D (2002) Kademlia: A peer-to-peer information system based on the XOR metric.In: Revised papers from the first international workshop on peer-to-peer systems. Cambridge, USA, pp 53–65
26.
go back to reference Montresor A, Jelasity M, Babaoglu O (2005) Chord on demand.In: Proceedings of the fifth IEEE international conference on peer-to-peer computing (P2Px), Konstanz, pp 87–94 Montresor A, Jelasity M, Babaoglu O (2005) Chord on demand.In: Proceedings of the fifth IEEE international conference on peer-to-peer computing (P2Px), Konstanz, pp 87–94
29.
go back to reference Rhea S, Geels D, Roscoe T, Kubiatowicz J (2004) Handling churn in a DHT.In: Proceedings of the annual conference on usenix annual technical conference (USENIX), Boston Rhea S, Geels D, Roscoe T, Kubiatowicz J (2004) Handling churn in a DHT.In: Proceedings of the annual conference on usenix annual technical conference (USENIX), Boston
30.
31.
go back to reference Rowstron AIT, Druschel P (2001) Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems.In: Proceedings of the IFIP/ACM international conference on distributed systems platforms (Middleware). Heidelberg, Germany, pp 329–350 Rowstron AIT, Druschel P (2001) Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems.In: Proceedings of the IFIP/ACM international conference on distributed systems platforms (Middleware). Heidelberg, Germany, pp 329–350
32.
go back to reference Stoica I, Morris R, Liben-Nowell D, Karger D R, Kaashoek M F, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans Networking 11(1):17–32. doi:10.1109/TNET.2002.808407 CrossRef Stoica I, Morris R, Liben-Nowell D, Karger D R, Kaashoek M F, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans Networking 11(1):17–32. doi:10.​1109/​TNET.​2002.​808407 CrossRef
33.
go back to reference Stutzbach D, Rejaie R (2006) Understanding churn in peer-to-peer networks.In: Proceedings of the 6th ACM SIGCOMM conference on internet measurement (IMC), Rio de Janeiro, pp 189–202 Stutzbach D, Rejaie R (2006) Understanding churn in peer-to-peer networks.In: Proceedings of the 6th ACM SIGCOMM conference on internet measurement (IMC), Rio de Janeiro, pp 189–202
35.
go back to reference Zhao BY, Kubiatowicz JD, Joseph AD (2001) Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Tech. Rep. UCB/CSD-01-1141, University of California at Berkeley, Berkeley. USA Zhao BY, Kubiatowicz JD, Joseph AD (2001) Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Tech. Rep. UCB/CSD-01-1141, University of California at Berkeley, Berkeley. USA
36.
go back to reference Zhuang SQ, Zhao BY, Joseph AD, Katz RH, Kubiatowicz JD (2001) Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination.in: Proceedings of the 11th international workshop on network and operating systems support fordigital audio and video (NOSSDAV). USA, New York, pp 11–20 Zhuang SQ, Zhao BY, Joseph AD, Katz RH, Kubiatowicz JD (2001) Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination.in: Proceedings of the 11th international workshop on network and operating systems support fordigital audio and video (NOSSDAV). USA, New York, pp 11–20
Metadata
Title
A performance comparison of Chord and Kademlia DHTs in high churn scenarios
Authors
Adán G. Medrano-Chávez
Elizabeth Pérez-Cortés
Miguel Lopez-Guerrero
Publication date
01-09-2015
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2015
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-014-0294-y

Other articles of this Issue 5/2015

Peer-to-Peer Networking and Applications 5/2015 Go to the issue

Premium Partner