skip to main content
research-article

P-DONAS: A P2P-Based Domain Name System in Access Networks

Published:16 September 2015Publication History
Skip Abstract Section

Abstract

The domain name system (DNS) includes infrastructures deployed by Internet service providers (ISPs) and third-party suppliers to ensure high responsiveness, resilience, and load sharing. This equipment implies high effort and energy for 24/7 operation. To facilitate cost reductions in this regard, P-DONAS—a peer-to-peer (P2P)-based DNS—organizes access nodes (ANs) of an ISP’s access network, which possess available resources, into a decentralized, self-organizing distributed hash table--based P2P network. Each AN acts as traditional DNS server and solely stores a piece of DNS data. DNS requests issued to an AN are resolved via P2P lookups while maintaining full compatibility with traditional DNS. The article discusses the application of P-DONAS as both a complement and an alternative to traditional DNS. Results from both simulations and a practical test arrangement prove P-DONAS’ high scalability and its performance comparable to that of a commercial DNS name server relieving this name server by 53% to 75% of DNS traffic.

References

  1. R. Brunner. 2006. A Performance Evaluation of the Kad-Protocol. Master's thesis. Mannheim, Germany.Google ScholarGoogle Scholar
  2. M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and J. van der Merwe. 2005. Design and implementation of a routing control platform. In Proceedings of NSDI. 15-28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Cox, A. Muthitacharoen, and R. T. Morris. 2002. Serving DNS using a peer-to-peer lookup service. In Proceedings of IPTPS. 155-165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Danielis and D. Timmermann. 2010. Use of peer-to-peer technology in Internet access networks and its impacts. In Proceedings of IEEE IPDPSW. 1-3.Google ScholarGoogle Scholar
  5. Digia. 2014. Qt Project. Retrieved August 28, 2015, from http://qt-project.org/.Google ScholarGoogle Scholar
  6. D. Eastlake. 1997. Domain Name System Security Extensions. RFC 2065. Network Working Group. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Google. 2014. Public DNS - Google Developers. Retrieved August 28, 2015, from https://developers.google.com/speed/public-dns/?hl=de.Google ScholarGoogle Scholar
  8. R. Jain. 1992. A comparison of hashing schemes for address lookup in computer networks. IEEE Transactions on Communications 40, 10, 1570-1573.Google ScholarGoogle ScholarCross RefCross Ref
  9. D. Malkhi, M. Naor, and D. Ratajczak. 2002. Viceroy: A scalable and dynamic emulation of the butterfly. In Proceedings of ACM PODC. 183-192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. G. S. Manku, M. Bawa, and P. Raghavan. 2003. Symphony: Distributed hashing in a small world. In Proceedings of USITS. 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Maymounkov and D. Mazieres. 2002. Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of PTPS. 53-65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. Mockapetris. 1987. Domain Names--Implementation and Specification. RFC 1035. Network Working Group. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Ninnemann. 2011. Freescale Semiconductor PowerQUICC II Pro--Performance and Utilization. Nokia Siemens Networks GmbH & Co. KG, Broadband Access Division.Google ScholarGoogle Scholar
  14. V. Pappas, D. Massey, A. Terzis, and L. Zhang. 2006. A comparative study of the DNS design with DHT-based alternatives. In Proceedings of IEEE INFOCOM. 1-13.Google ScholarGoogle Scholar
  15. V. Ramasubramanian and E. G. Sirer. 2004. The design and implementation of a next generation name service for the Internet. In Proceedings of ACM SIGCOMM. 331-342. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Rowstron and P. Druschel. 2001. Pastry: Scalable, decentralized object location, and routing for large-scale P2P systems. In Proceedings of Middleware. 329-350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Sancho and R. Lopes Pereira. 2014. Hybrid peer-to-peer DNS. In Proceedings of ICNC. 977-981.Google ScholarGoogle Scholar
  18. J. Schrittwieser. 2014. P2P-DNS. Retrieved August 28, 2015, from https://github.com/Mononofu/P2P-DNS.Google ScholarGoogle Scholar
  19. O. Selke. 2013. Telekom HVT Standorte. Retrieved August 28, 2015, from http://selke.de/privater/hvt-standorte/.Google ScholarGoogle Scholar
  20. J. Skodzik, P. Danielis, V. Altmann, J. Rohrbeck, D. Timmermann, Thomas Bahls, and D. Duchow. 2011. DuDE: A distributed computing system using a decentralized P2P environment. In Proceedings of IEEE LCN. 1048-1055. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Skodzik, P. Danielis, V. Altmann, and D. Timmermann. 2013. Extensive analysis of a Kad-based distributed storage system for session data. In Proceedings of IEEE ISCC. 489-494.Google ScholarGoogle Scholar
  22. Y. Song and K. Koyanagi. 2011. Study on a hybrid P2P based DNS. In Proceedings of IEEE CSAE. 152-155.Google ScholarGoogle Scholar
  23. R. Steinmetz and K. Wehrle (Eds.). 2005. P2P Systems and Applications. Springer-Verlag, Berlin.Google ScholarGoogle Scholar
  24. I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. 2001. Chord: A scalable peer-to-peer lookup service for Internet applications. ACM SIGCOMM Computer Communication Review 31, 4, 149-160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. D. Stutzbach and R. Rejaie. 2006. Improving lookup performance over a widely-deployed DHT. In Proceedings of INFOCOM. 1-12.Google ScholarGoogle Scholar
  26. D. Ulevitch. 2014. OpenDNS Home Page: Cloud-Delivered Security Enforcement and Intelligence. Retrieved August 28, 2015, from http://www.opendns.com/.Google ScholarGoogle Scholar
  27. P. Vixie. 1997. Dynamic Updates in the Domain Name System (DNS UPDATE). RFC 2136. Network Working Group. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. P. Vixie. 2000. Secret Key Transaction Authentication for DNS (TSIG). RFC 2845. Network Working Group. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. WIRED.CO.UK. 2010. Peter Sunde Starts Peer-to-Peer DNS System. Retrieved August 28, 2015, from http://www.wired.co.uk/news/archive/2010-12/02/peter-sunde-p2p-dns.Google ScholarGoogle Scholar
  30. XILINX. 2011. LightWeight IP (lwIP) Application Examples. Retrieved August 28, 2015, from http://www.xilinx.com/support/documentation/application_notes/xapp1026.pdf.Google ScholarGoogle Scholar

Index Terms

  1. P-DONAS: A P2P-Based Domain Name System in Access Networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 15, Issue 3
        September 2015
        68 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/2809898
        • Editor:
        • Munindar P. Singh
        Issue’s Table of Contents

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 September 2015
        • Accepted: 1 July 2015
        • Revised: 1 May 2015
        • Received: 1 May 2014
        Published in toit Volume 15, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader