A performance comparison of Chord and Kademlia DHTs in high churn scenarios

A distributed hash table (DHT) is an important kind of P2P system that provides decentralized services to look up resources in various applications. In this context, Chord and Kademlia are two relevant DHTs and several pieces of work have appeared in the literature where their performance is evaluated. Unfortunately, available results are neither consistent nor concluding. This situation arises from the use of different churn models (i.e., peer arrivals and departures); all of them neglecting the fact that churn happens since the beginning of the lifetime of DHTs. Furthermore, available performance evaluations do not consider that DHT parameter settings are nonequivalent. To address these concerns, in this paper we present an exhaustive, fair and realistic evaluation framework integrated by: 1) A state-of-the-art churn model executed by peers since their creation. 2) An evaluation methodology that considers the difference in meaning of the parameters belonging to different DHTs. 3) A churn metric that quantifies the rate of change of the P2P population. By means of this evaluation framework, we found that under similar conditions, Kademlia exhibits higher performance than Chord. We conclude that DHTs must have mechanisms to deal with high churn during their whole existence, otherwise, they may not achieve a state where peers are correctly connected. Furthermore, our findings suggest that DHTs should rely on less-dynamic peers to improve their performance.

[1]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[2]  Priya Mahadevan,et al.  Lessons from Three Views of the Internet Topology , 2005, ArXiv.

[3]  Wolfgang Kellerer,et al.  0 to 10k in 20 Seconds: Bootstrapping Large-Scale DHT Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[4]  Andreas Kassler,et al.  Peer-to-Peer Overlay in Mobile Ad-hoc Networks , 2010 .

[5]  T. Nixon,et al.  Home networking with Universal Plug and Play , 2001 .

[6]  Daniel Stutzbach,et al.  Understanding churn in peer-to-peer networks , 2006, IMC '06.

[7]  Ben Y. Zhao,et al.  An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .

[8]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[9]  Seif Haridi,et al.  An Analytical Study of a Structured Overlay in the Presence of Dynamic Membership , 2008, IEEE/ACM Transactions on Networking.

[10]  Dmitri Loguinov,et al.  Analysis of Link Lifetimes and Neighbor Selection in Switching DHTs , 2011, IEEE Transactions on Parallel and Distributed Systems.

[11]  Wolfgang Kellerer,et al.  Bootstrapping large-scale DHT networks , 2007, CoNEXT '07.

[12]  Vwani P. Roychowdhury,et al.  Resilience of structured P2P systems under churn: The reachable component method , 2008, Comput. Commun..

[13]  K. Claffy,et al.  Topology discovery by active probing , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT) Workshops.

[14]  Indranil Gupta,et al.  Kelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead , 2003, IPTPS.

[15]  S. Krause,et al.  OverSim: A Flexible Overlay Network Simulation Framework , 2007, 2007 IEEE Global Internet Symposium.

[16]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[17]  Guihai Chen,et al.  Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy , 2006, International Conference on Computational Science.

[18]  Taieb Znati,et al.  Modeling Churn in P2P Networks , 2007, 40th Annual Simulation Symposium (ANSS'07).

[19]  Ben Y. Zhao,et al.  Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination , 2001, NOSSDAV '01.

[20]  Krishna P. Gummadi,et al.  The impact of DHT routing geometry on resilience and proximity , 2003, SIGCOMM '03.

[21]  Janne Riihijärvi,et al.  A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks , 2008, Comput. Networks.

[22]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[23]  Henning Schulzrinne,et al.  An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[25]  David R. Karger,et al.  Analysis of the evolution of peer-to-peer systems , 2002, PODC '02.

[26]  David R. Karger,et al.  Koorde: A Simple Degree-Optimal Distributed Hash Table , 2003, IPTPS.

[27]  John Kubiatowicz,et al.  Handling churn in a DHT , 2004 .

[28]  Robert Tappan Morris,et al.  Comparing the Performance of Distributed Hash Tables Under Churn , 2004, IPTPS.

[29]  Mika Ylianttila,et al.  Comparing the performance and efficiency of two popular DHTs in interpersonal communication , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[30]  Mika Ylianttila,et al.  Robustness of a P2P community management system based on two-level hierarchical DHT overlays , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[31]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[32]  Ingmar Baumgart,et al.  S/Kademlia: A practicable approach towards secure key-based routing , 2007, 2007 International Conference on Parallel and Distributed Systems.

[33]  Miguel Castro,et al.  Performance and dependability of structured peer-to-peer overlays , 2004, International Conference on Dependable Systems and Networks, 2004.

[34]  Márk Jelasity,et al.  Chord on demand , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).

[35]  Haibo Zhang,et al.  Leveraging Social Networks for P2P Content-Based File Sharing in Mobile Ad Hoc Networks , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[36]  Ben Y. Zhao,et al.  Maintenance-Free Global Data Storage , 2001, IEEE Internet Comput..

[37]  Mika Ylianttila,et al.  Performance evaluation of a Kademlia-based communication-oriented P2P system under churn , 2010, Comput. Networks.