Graduate School and Research Center in Digital Sciences

Analyzing peer behavior in KAD

Steiner, Moritz; En-Najjary, Taoufik; Biersack, Ernst W

Research report RR-07-205

Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have been implemented in real systems and deployed on a large scale. One exception is KAD, a DHT based on Kademlia, which is part of eDonkey2000, a peer-to-peer le sharing system with several million simultaneous users. We have been crawling KAD continuously for about six months and obtained information about geographical distribution of peers, session times, peer availability, and peer lifetime. We also evaluated to what extent information about past peer uptime can be used to predict the remaining uptime of the peer. Peers are identied by the so called KAD ID, which was up to now assumed to remain the same across sessions. However, we observed that this is not the case: There is a large number of peers, in particular in China, that change their KAD ID, sometimes as frequently as after each session. This change of KAD IDs makes it difcult to characterize end-user availability or membership turnover. By tracking end-users with static IP addresses, we could measure the rate of change of KAD ID per end-user.

Document Bibtex

Title:Analyzing peer behavior in KAD
Type:Report
Language:English
Date:
Department:Digital Security
Eurecom ref:2358
Copyright: © EURECOM. Personal use of this material is permitted. The definitive version of this paper was published in Research report RR-07-205 and is available at :
Bibtex: @techreport{EURECOM+2358, year = {2007}, title = {{A}nalyzing peer behavior in {KAD}}, author = {{S}teiner, {M}oritz and {E}n-{N}ajjary, {T}aoufik and {B}iersack, {E}rnst {W}}, number = {EURECOM+2358}, month = {10}, institution = {Eurecom}, url = {http://www.eurecom.fr/publication/2358},, }
See also: