skip to main content
article

OpenDHT: a public DHT service and its uses

Published:22 August 2005Publication History
Skip Abstract Section

Abstract

Large-scale distributed systems are hard to deploy, and distributed hash tables (DHTs) are no exception. To lower the barriers facing DHT-based applications, we have created a public DHT service called OpenDHT. Designing a DHT that can be widely shared, both among mutually untrusting clients and among a variety of applications, poses two distinct challenges. First, there must be adequate control over storage allocation so that greedy or malicious clients do not use more than their fair share. Second, the interface to the DHT should make it easy to write simple clients, yet be sufficiently general to meet a broad spectrum of application requirements. In this paper we describe our solutions to these design challenges. We also report our early deployment experience with OpenDHT and describe the variety of applications already using the system.

References

  1. Bamboo. http://bamboo-dht.org/.]]Google ScholarGoogle Scholar
  2. Chord. http://www.pdos.lcs.mit.edu/chord/.]]Google ScholarGoogle Scholar
  3. Pastry. http://freepastry.rice.edu/.]]Google ScholarGoogle Scholar
  4. H. Balakrishnan, S. Shenker, and M. Walfish. Peering peer-to-peer providers. In IPTPS, Feb. 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Bavier et al. Operating system support for planetary-scale network services. In NSDI, Mar. 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Beck, T. Moore, and J. S. Plank. An end-to-end approach to globally scalable programmable networking. In FDNA, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Castro, P. Druschel, A.-M. Kermarrec, A. Nandi, A. Rowstron, and A. Singh. SplitStream: High-bandwidth multicast in a cooperative environment. In SOSP, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Cates. Robust and efficient data management for a distributed hash table. Master's thesis, MIT, May 2003.]]Google ScholarGoogle Scholar
  9. F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-area cooperative storage with CFS. In SOSP, Oct. 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. F. Dabek, J. Li, E. Sit, J. Robertson, M. F. Kaashoek, and R. Morris. Designing a DHT for low latency and high throughput. In NSDI, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. Dabek, B. Zhao, P. Druschel, J. Kubiatowicz, and I. Stoica. Towards a common API for structured P2P overlays. In IPTPS, 2003.]]Google ScholarGoogle Scholar
  12. A. Demers, S. Keshav, and S. Shenker. Analysis and simulation of a fair queuing algorithm. In SIGCOMM, 1989.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Douceur. The Sybil attack. In IPTPS, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Druschel and A. Rowstron. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In SOSP, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. J. Freedman, E. Freudenthal, and D. Mazières. Democratizing content publication with Coral. In NSDI, Mar. 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Goyal, H. Vin, and H. Cheng. Start-time fair queuing: A scheduling algorithm for integrated services packet switching networks. In SIGCOMM, Aug. 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Huebsch, J. M. Hellerstein, N. Lanham, B. T. Loo, S. Shenker, and I. Stoica. Querying the Internet with PIER. In VLDB, 2003.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. R. Karger and M. Ruhl. Diminished Chord: A protocol for heterogeneous subgroup formation in peer-to-peer networks. In IPTPS, 2004.]]Google ScholarGoogle Scholar
  19. B. Karp, S. Ratnasamy, S. Rhea, and S. Shenker. Spurring adoption of DHTs with OpenHash, a public DHT service. In IPTPS, 2004.]]Google ScholarGoogle Scholar
  20. A. Mislove et al. POST: a secure, resilient, cooperative messaging system. In HotOS, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. Moskowitz, P. Nikander, P. Jokela, and T. Henderson. Host identity protocol (work in progress). IETF Internet Draft, 2004.]]Google ScholarGoogle Scholar
  22. A. Muthitacharoen, S. Gilbert, and R. Morris. Etna: A fault-tolerant algorithm for atomic mutable DHT data. Technical Report MIT-LCS-TR-993, MIT-LCS, June 2005.]]Google ScholarGoogle Scholar
  23. A. Muthitacharoen, R. Morris, T. Gil, and B. Chen. Ivy: A read/write peer-to-peer file system. In OSDI, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. K. Petersen, M. Spreitzer, D. Terry, M. Theimer, and A. Demers. Flexible update propagation for weakly consistent replication. In SOSP, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Ramabhadran, S. Ratnasamy, J. Hellerstein, and S. Shenker. Brief announcement: Prefix hash tree (extended abstract). In PODC, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. V. Ramasubramanian and E. G. Sirer. The design and implementation of a next generation name service for the Internet. In SIGCOMM, Aug. 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. Ratnasamy, M. Handley, R. Karp, and S. Shenker. Application-level multicast using content-addressable networks. Lecture Notes in Computer Science, 2233:14--29, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao, and J. Kubiatowicz. Pond: the OceanStore prototype. In USENIX FAST, Mar. 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz. Handling churn in a DHT. In USENIX Annual Tech. Conf., June 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. T. Roscoe and S. Hand. Palimpsest: Soft-capacity storage for planetary-scale services. In HotOS, May 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet indirection infrastructure. In SIGCOMM, Aug. 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. J. Stribling. Planetlab all-pairs ping. http://www.pdos.lcs.mit.edu/~strib/pl_app/APP_README.txt.]]Google ScholarGoogle Scholar
  33. M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. In NSDI, Mar. 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph, and J. D. Kubiatowicz. Tapestry: A resilient global-scale overlay for service deployment. IEEE JSAC, 22(1):41--53, Jan. 2004.]]Google ScholarGoogle Scholar
  35. S. Q. Zhuang, B. Y. Zhao, A. D. Joseph, R. H. Katz, and J. Kubiatowicz. Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination. In NOSSDAV, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. OpenDHT: a public DHT service and its uses

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 35, Issue 4
        Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
        October 2005
        324 pages
        ISSN:0146-4833
        DOI:10.1145/1090191
        Issue’s Table of Contents
        • cover image ACM Conferences
          SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
          August 2005
          350 pages
          ISBN:1595930094
          DOI:10.1145/1080091

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 August 2005

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader