Kademlia
   HOME

TheInfoList



OR:

Kademlia is a
distributed hash table A distributed hash table (DHT) is a Distributed computing, distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and any participating node (networking), node can efficiently retrieve the ...
for decentralized
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network, forming a peer-to-peer network of Node ...
computer network A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
s designed by Petar Maymounkov and David Mazières in 2002. It specifies the structure of the network and the exchange of information through
node In general, a node is a localized swelling (a "knot") or a point of intersection (a vertex). Node may refer to: In mathematics * Vertex (graph theory), a vertex in a mathematical graph *Vertex (geometry), a point where two or more curves, lines ...
lookups. Kademlia nodes communicate among themselves using UDP. A virtual or
overlay network An overlay network is a logical computer network that is protocol layering, layered on top of a physical network. The concept of overlay networking is distinct from the traditional model of OSI model, OSI layered networks, and almost always assum ...
is formed by the participant nodes. Each node is identified by a number or ''node ID''. The ''node ID'' serves not only as identification, but the Kademlia algorithm uses the ''node ID'' to locate values (usually file hashes or keywords). In order to look up the value associated with a given key, the algorithm explores the network in several steps. Each step will find nodes that are closer to the key until the contacted node returns the value or no more closer nodes are found. This is very efficient: like many other s, Kademlia contacts only O(\log n) nodes during the search out of a total of n nodes in the system. Further advantages are found particularly in the decentralized structure, which increases the resistance against a
denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
. Even if a whole set of nodes is flooded, this will have limited effect on network availability, since the network will recover itself by knitting the network around these "holes".
I2P The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by usin ...
's implementation of Kademlia is modified to mitigate Kademlia's vulnerabilities, such as
Sybil attack A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is ...
s.


System details

Peer-to-peer networks are made of nodes, by design. The protocols that these nodes use to communicate, and locate information, have become more efficient over time. The first generation peer-to-peer file sharing networks, such as
Napster Napster was an American proprietary peer-to-peer (P2P) file sharing application primarily associated with digital audio file distribution. Founded by Shawn Fanning and Sean Parker, the platform originally launched on June 1, 1999. Audio shared ...
, relied on a central database to co-ordinate lookups on the network. Second generation peer-to-peer networks, such as
Gnutella Gnutella is a peer-to-peer network protocol. Founded in 2000, it was the first decentralized peer-to-peer network of its kind, leading to other, later networks adopting the model. In June 2005, Gnutella's population was 1.81 million computer ...
, used flooding to locate files, searching every node on the network. Third generation peer-to-peer networks, such as
Bittorrent BitTorrent is a Protocol (computing), communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a Decentralised system, decentralized manner. The protocol is d ...
, use
distributed hash table A distributed hash table (DHT) is a Distributed computing, distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and any participating node (networking), node can efficiently retrieve the ...
s to look up files in the network. ''Distributed hash tables'' store resource locations throughout the network. Kademlia uses a "distance" calculation between two nodes. This distance is computed as the '' exclusive or (XOR)'' of the two node IDs, taking the result as an unsigned
integer number An integer is the number zero ( 0), a positive natural number (1, 2, 3, ...), or the negation of a positive natural number ( −1, −2, −3, ...). The negations or additive inverses of the positive natural numbers are referred to as negative ...
. Keys and node IDs have the same format and length, so distance can be calculated among them in exactly the same way. The node ID is typically a large random number that is chosen with the goal of being unique for a particular node (see
UUID A Universally Unique Identifier (UUID) is a 128-bit nominal number, label used to uniquely identify objects in computer systems. The term Globally Unique Identifier (GUID) is also used, mostly in Microsoft systems. When generated according to the ...
). It can and does happen that geographically far nodes – from Germany and Australia, for instance – can be "neighbors" if they have chosen similar random node IDs. ''XOR'' was chosen because it acts as a
distance function In mathematics, a metric space is a set together with a notion of ''distance'' between its elements, usually called points. The distance is measured by a function called a metric or distance function. Metric spaces are a general setting fo ...
between all the node IDs. Specifically: * the distance between a node and itself is zero * it is symmetric: the "distances" calculated from A to B and from B to A are the same * it follows the
triangle inequality In mathematics, the triangle inequality states that for any triangle, the sum of the lengths of any two sides must be greater than or equal to the length of the remaining side. This statement permits the inclusion of Degeneracy (mathematics)#T ...
: given A, B and C are vertices (points) of a triangle, then the distance from A to B is shorter than (or equal to) the sum of both the distance from A to C and the distance from C to B. These three conditions are enough to ensure that ''XOR'' captures all of the essential, important features of a "real" distance function, while being cheap and simple to calculate. Each Kademlia search iteration comes one bit closer to the target. A basic Kademlia search algorithm has complexity of '''', that means for network with 2^n nodes it will take at most n steps to find that node.


Fixed-size routing tables

Fixed-size routing tables were presented in the pre-proceedings version of the original paper and are used in the later version only for some mathematical proofs. An actual Kademlia implementation does not have a fixed-size routing table, but a dynamically sized one. Kademlia routing tables consist of a ''list'' for each bit of the node ID (e.g. if a node ID consists of 128 bits, a node will keep 128 such ''lists''.) Every entry in a ''list'' holds the necessary data to locate another node. The data in each ''list'' entry is typically the ''IP address'', ''port'', and ''node ID'' of another node. Every ''list'' corresponds to a specific distance from the node. Nodes that can go in the nth ''list'' must have a differing nth bit from the node's ID; the first n-1 bits of the candidate ID must match those of the node's ID. This means that it is very easy to populate the first ''list'' as 1/2 of the nodes in the network are far away candidates. The next ''list'' can use only 1/4 of the nodes in the network (one bit closer than the first), etc. With an ID of 128 bits, every node in the network will classify other nodes in one of 128 different distances, one specific distance per bit. As nodes are encountered on the network, they are added to the ''lists''. This includes store and retrieval operations and even helping other nodes to find a key. Every node encountered will be considered for inclusion in the ''lists''. Therefore, the knowledge that a node has of the network is very dynamic. This keeps the network constantly updated and adds resilience to failures or attacks. In the Kademlia literature, the ''lists'' are referred to as ''k-buckets''. ''k'' is a system wide number, like 20. Every ''k''-bucket is a ''list'' having up to ''k'' entries inside; i.e. for a network with k=20, each node will have ''lists'' containing up to 20 nodes for a particular bit (a particular distance from itself). Since the possible nodes for each ''k-bucket'' decreases quickly (because there will be very few nodes which are that close), the lower bit ''k-buckets'' will fully map all nodes in that section of the network. Since the quantity of possible IDs is much larger than any node population can ever be, some of the ''k''-buckets corresponding to very short distances will remain empty. Consider the simple network to the right. The network size is 2^3 or eight maximum keys and nodes. There are seven nodes participating; the small circles at the bottom. The node under consideration is node six (binary 110) in black. There are three ''k-buckets'' for each node in this network. Nodes zero, one and two (binary 000, 001, and 010) are candidates for the furthest ''k-bucket''. Node three (binary 011, not shown) is not participating in the network. In the middle ''k-bucket'', nodes four and five (binary 100 and 101) are placed. Finally, the third ''k-bucket'' can only contain node seven (binary 111). Each of the three ''k-buckets'' are enclosed in a gray circle. If the size of the ''k-bucket'' was two, then the furthest ''2-bucket'' can only contain two of the three nodes. For example, if node six has node one and two in the furthest 2-bucket, it would have to request a node ID lookup to these nodes to find the location (ip address) of node zero. Each node ''knows'' its neighbourhood well and has contact with a few nodes far away which can help locate other nodes far away. It is known that nodes which have been connected for a long time in a network will probably remain connected for a long time in the future. Due to this statistical distribution, Kademlia selects long connected nodes to remain stored in the k-buckets. This increases the number of known valid nodes at some time in the future and provides for a more stable network. When a ''k-bucket'' is full and a new node is discovered for that ''k-bucket'', the least recently seen node in the ''k-bucket'' is PINGed. If the node is found to be still alive, the new node is placed in a secondary list, a replacement cache. The replacement cache is used only if a node in the ''k-bucket'' stops responding. In other words: new nodes are used only when older nodes disappear.


Protocol messages

Kademlia has four messages. * PING — Used to verify that a node is still alive. * STORE — Stores a (key, value) pair in one node. * FIND_NODE — The recipient of the request will return the k nodes in its own buckets that are the closest ones to the requested key. * FIND_VALUE — Same as FIND_NODE, but if the recipient of the request has the requested key in its store, it will return the corresponding value. Each
RPC RPC may refer to: Science and technology * Rational polynomial coefficient * Reactive Plastic Curtain, a carbon-dioxide-absorbing device used in some rebreather breathing sets * Regional Playback Control, a regional lockout technology for DVDs ...
message includes a random value from the initiator. This ensures that when the response is received it corresponds to the request previously sent (see
magic cookie In computing, a magic cookie, or just cookie for short, is a token or short packet of data passed between communicating programs. The cookie is often used to identify a particular event or as "handle, transaction ID, or other token of agreement ...
).


Locating nodes

Node lookups can proceed asynchronously. The quantity of simultaneous lookups is denoted by α and is typically three. A node initiates a FIND_NODE request by querying to the α nodes in its own ''k-buckets'' that are the closest ones to the desired key. When these recipient nodes receive the request, they will look in their ''k-buckets'' and return the ''k'' closest nodes to the desired key that they know. The requester will update a results list with the results (node IDs) it receives, keeping the ''k'' best ones (the ''k'' nodes which are closer to the searched key) that respond to queries. Then the requester will select these ''k'' best results and issue the request to them, and iterate this process again and again. Since every node has a better knowledge of its own surroundings than any other node has, the received results will be other nodes that are every time closer and closer to the searched key. The iterations continue until no nodes are returned that are closer than the best previous results. When the iterations stop, the best k nodes in the results list are the ones in the whole network that are the closest to the desired key. The node information can be augmented with round trip times, or RTT. This information will be used to choose a time-out specific for every consulted node. When a query times out, another query can be initiated, never surpassing α queries at the same time.


Locating resources

Information is located by mapping it to a key. A
hash Hash, hashes, hash mark, or hashing may refer to: Substances * Hash (food), a coarse mixture of ingredients, often based on minced meat * Hash (stew), a pork and onion-based gravy found in South Carolina * Hash, a nickname for hashish, a canna ...
is typically used for the map. The storer nodes will have information due to a previous STORE message. Locating a value follows the same procedure as locating the closest nodes to a key, except the search terminates when a node has the requested value in its store and returns this value. The values are stored at several nodes (k of them) to allow for nodes to come and go and still have the value available in some node. Periodically, a node that stores a value will explore the network to find the k nodes which are near the key value and replicate the value onto them. This compensates for disappeared nodes. Also, for popular values that might have many requests, the load in the storer nodes is diminished by having a retriever store this value in some node near, but outside of, the k closest ones. This new storing is called a cache. In this way the value is stored further and further away from the key, depending on the quantity of requests. This allows popular searches to find a storer more quickly. Since the value is returned from nodes further away from the key, this alleviates possible "hot spots". Caching nodes will drop the value after a certain time depending on their distance from the key. Some implementations (e.g. Kad) have neither replication nor caching. The purpose of this is to remove old information quickly from the system. The node that is providing the file will periodically refresh the information onto the network (perform FIND_NODE and STORE messages). When all of the nodes having the file go offline, nobody will be refreshing its values (sources and keywords) and the information will eventually disappear from the network.


Joining the network

A node that would like to join the net must first go through a bootstrap process. In this phase, the joining node needs to know the
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
and port of another node—a bootstrap node (obtained from the user, or from a stored list)—that is already participating in the Kademlia network. If the joining node has not yet participated in the network it computes a
random In common usage, randomness is the apparent or actual lack of definite pattern or predictability in information. A random sequence of events, symbols or steps often has no order and does not follow an intelligible pattern or combination. ...
ID number, which by virtue of being a very large random number is extremely likely not to be already assigned to any other node. It uses this ID until leaving the network. The joining node inserts the bootstrap node into one of its ''k-buckets''. The joining node then performs a node lookup of its own ID against the bootstrap node (the only other node it knows). The "self-lookup" will populate other nodes' ''k-buckets'' with the new node ID, and will populate the joining node's ''k-buckets'' with the nodes in the path between it and the bootstrap node. After this, the joining node refreshes all ''k-buckets'' further away than the ''k-bucket'' the bootstrap node falls in. This refresh is just a lookup of a random key that is within that ''k-bucket'' range. Initially, nodes have one ''k-bucket''. When the ''k-bucket'' becomes full, it can be split. The split occurs if the range of nodes in the ''k-bucket'' spans the node's own id (values to the left and right in a binary tree). Kademlia relaxes even this rule for the one "closest nodes" ''k-bucket'', because typically one single bucket will correspond to the distance where all the nodes that are the closest to this node are, they may be more than ''k'', and we want it to know them all. It may turn out that a highly unbalanced binary sub-tree exists near the node. If ''k'' is 20, and there are 21+ nodes with a prefix "xxx0011....." and the new node is "xxx0000''11001''", the new node can contain multiple ''k-buckets'' for the other 21+ nodes. This is to guarantee that the network knows about all nodes in the closest region.


Accelerated lookups

Kademlia uses an ''
XOR Exclusive or, exclusive disjunction, exclusive alternation, logical non-equivalence, or logical inequality is a logical operator whose negation is the logical biconditional. With two inputs, XOR is true if and only if the inputs differ (one ...
metric Metric or metrical may refer to: Measuring * Metric system, an internationally adopted decimal system of measurement * An adjective indicating relation to measurement in general, or a noun describing a specific type of measurement Mathematics ...
'' to define distance. Two node IDs or a node ID and a key are XORed and the result is the distance between them. For each bit, the XOR function returns zero if the two bits are equal and one if the two bits are different. Distances in the XOR metric satisfy the
triangle inequality In mathematics, the triangle inequality states that for any triangle, the sum of the lengths of any two sides must be greater than or equal to the length of the remaining side. This statement permits the inclusion of Degeneracy (mathematics)#T ...
: given A, B and C are vertices (points) of a triangle, then the distance from A to B is shorter than (or equal to) the sum of the distances from A to C and from C to B. The ''XOR metric'' allows Kademlia to extend routing tables beyond single bits. Groups of bits can be placed in ''k-buckets''. The group of bits are termed a prefix. For an ''m-bit'' prefix, there will be 2m-1 ''k-buckets''. The missing ''k-bucket'' is a further extension of the routing tree that contains the node ID. An ''m-bit'' prefix reduces the maximum number of lookups from ''log2 n'' to ''log2m n''. These are maximum values and the average value will be far less, increasing the chance of finding a node in a ''k-bucket'' that shares more bits than just the prefix with the target key. Nodes can use mixtures of prefixes in their routing table, such as the
Kad Network The Kad network is a peer-to-peer (P2P) network which implements the Kademlia P2P overlay protocol. The majority of users on the Kad Network are also connected to servers on the eDonkey network, and Kad Network clients typically query known node ...
used by
eMule eMule is a Free software, free peer-to-peer file sharing application for Microsoft Windows. Started in May 2002 as an alternative to eDonkey2000, eMule connects to both the eDonkey network and the Kad network. The distinguishing features of eM ...
. The Kademlia network could even be heterogeneous in routing table implementations, at the expense of complicating the analysis of lookups.


Academic significance

While the XOR metric is not needed to understand Kademlia, it is critical in the analysis of the protocol. The XOR arithmetic forms an
abelian group In mathematics, an abelian group, also called a commutative group, is a group in which the result of applying the group operation to two group elements does not depend on the order in which they are written. That is, the group operation is commu ...
allowing closed analysis. Other DHT protocols and algorithms require
simulation A simulation is an imitative representation of a process or system that could exist in the real world. In this broad sense, simulation can often be used interchangeably with model. Sometimes a clear distinction between the two terms is made, in ...
or complicated formal analysis in order to predict network behavior and correctness. Using groups of bits as routing information also simplifies the algorithms.


Mathematical analysis of the algorithm

To analyze the algorithm, consider a Kademlia network of n nodes with IDs x_1, \ldots, x_n, each of which is a string of length d that consists of only ones and zeros. It can be modeled as a
trie In computer science, a trie (, ), also known as a digital tree or prefix tree, is a specialized search tree data structure used to store and retrieve strings from a dictionary or set. Unlike a binary search tree, nodes in a trie do not store t ...
, in which each leaf represents a node, and the labeled path from the root to a leaf represents its ID. For a node x \in \, let \mathcal D_i(x) be the set of nodes (IDs) that share a prefix with x of length d - i. Then filling the i-th bucket of x can be modeled as adding pointers from the leaf x to k leaves (IDs) chosen uniformly at random from \mathcal D_i(x). Thus routing can be seen as jumping among the leaves along these pointers such that each step goes towards the target ID as much as possible, i.e., in a greedy way. Let T_ be number of jumps needed to go from the leaf x to a target ID y. Assuming that x_1, \ldots, x_n are chosen deterministically from \^d, it has been proved that :\sup_ \, \sup_ \, \sup_ \mathbb E _\le (1+o(1)) \frac , where H_k is the k-th
harmonic number In mathematics, the -th harmonic number is the sum of the reciprocals of the first natural numbers: H_n= 1+\frac+\frac+\cdots+\frac =\sum_^n \frac. Starting from , the sequence of harmonic numbers begins: 1, \frac, \frac, \frac, \frac, \dot ...
. Since H_k/\log k \to 1 as k \to \infty, when k is large \mathbb E T_ is bounded from above by about \log_k n, however the IDs and the target are chosen. This justifies the intuition that in Kademlia only O(\log n) nodes are contacted in searching for a target node. To make the model closer to real Kademlia networks, x_1, \ldots, x_n can also be assumed to be chosen uniformly at random without replacement from \^d. Then it can be proved that for all x \in \ and y \in \^d, : \begin & T_ \xrightarrow \frac,\\ & \mathbb E _\to \frac, \end where c_k is a constant depending only on k with c_k/H_k \to 1 as k \to \infty. Thus for k large, \mathbb E T_/\log_k n converges to a constant close 1. This implies that the number of nodes need to be contact in searching for a target node is actually \Theta(\log n) on average.


Use in file sharing networks

Kademlia is used in
file sharing File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include ...
networks. By making Kademlia keyword searches, one can find information in the file-sharing network so it can be downloaded. Since there is no central instance to store an index of existing files, this task is divided evenly among all clients: If a node wants to share a file, it processes the contents of the file, calculating from it a number (
hash Hash, hashes, hash mark, or hashing may refer to: Substances * Hash (food), a coarse mixture of ingredients, often based on minced meat * Hash (stew), a pork and onion-based gravy found in South Carolina * Hash, a nickname for hashish, a canna ...
) that will identify this file within the file-sharing network. Since file hashes and node IDs have the same length, the client can use the XOR distance function to search for several nodes whose ID is close to the hash, and instruct those nodes to store the publisher's IP address in an implementation-defined manner. Nodes with IDs closest to the file hash will therefore have a list of IP addresses of peers/publishers of this file, from which a client may in an implementation-defined manner download the file. Clients that wish to download the file from this publisher do not have to know the publisher's IP address (there can be many publishers), but only the hash of the file. A searching client will use Kademlia to search the network for the node whose ID has the smallest distance to the file hash, then will retrieve the sources list that is stored in that node. Since a key can correspond to many values, e.g. many sources of the same file, every storing node may have different information. Then, the sources are requested from all k nodes close to the key, k being the size of the bucket. The file hash is usually obtained from a specially formed Internet
magnet link Magnet is a URI scheme that defines the format of magnet links, a de facto standard for identifying files ( URN) by their content, via cryptographic hash value rather than by their location. # Although magnet links can be used in a number of ...
found elsewhere, or included within an indexing file obtained from other sources. Filename searches are implemented using keywords. The filename is divided into its constituent words. Each of these keywords is hashed and stored in the network, together with the corresponding filename and file hash. A search involves choosing one of the keywords, contacting the node with an ID closest to that keyword hash, and retrieving the list of filenames that contain the keyword. Since every filename in the list has its hash attached, the chosen file can then be obtained in the normal way.


Implementations


Networks

Public networks using the Kademlia
algorithm In mathematics and computer science, an algorithm () is a finite sequence of Rigour#Mathematics, mathematically rigorous instructions, typically used to solve a class of specific Computational problem, problems or to perform a computation. Algo ...
(these
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematics ...
s are incompatible with one another): *
I2P The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by usin ...
: an anonymous
overlay network An overlay network is a logical computer network that is protocol layering, layered on top of a physical network. The concept of overlay networking is distinct from the traditional model of OSI model, OSI layered networks, and almost always assum ...
layer. *
Kad network The Kad network is a peer-to-peer (P2P) network which implements the Kademlia P2P overlay protocol. The majority of users on the Kad Network are also connected to servers on the eDonkey network, and Kad Network clients typically query known node ...
: developed originally by the
eMule eMule is a Free software, free peer-to-peer file sharing application for Microsoft Windows. Started in May 2002 as an alternative to eDonkey2000, eMule connects to both the eDonkey network and the Kad network. The distinguishing features of eM ...
community to replace the server-based architecture of the
eDonkey network The eDonkey Network (also known as the eDonkey2000 network or eD2k) is a decentralized, mostly server-based, peer-to-peer file-sharing network created in 2000 by US developers Jed McCaleb and Sam Yagan that is best suited to share big files ...
. *
Ethereum Ethereum is a decentralized blockchain with smart contract functionality. Ether (abbreviation: ETH) is the native cryptocurrency of the platform. Among cryptocurrencies, ether is second only to bitcoin in market capitalization. It is open-s ...
: the node discovery protocol in the Ethereum blockchain network stack is based on a modified implementation of Kademlia. It doesn't use value portion, has mutual endpoint verification, allows to find all nodes at the specified logarithmic distance, has a differentiation of sub-protocols. *
Overnet eDonkey2000 (nicknamed "ed2k") was a peer-to-peer file sharing application developed by US company MetaMachine ( Jed McCaleb and Sam Yagan), using the Multisource File Transfer Protocol. It supported both the eDonkey2000 network and the Overn ...
: With KadC a C library for handling its Kademlia is available. (development of Overnet is discontinued) *
Mainline DHT Mainline DHT is the name given to the Kademlia-based distributed hash table (DHT) used by Comparison of BitTorrent clients, BitTorrent clients to find peers via the BitTorrent protocol. The idea of using a DHT for distributed tracking in BitTorrent ...
: a DHT for
BitTorrent BitTorrent is a Protocol (computing), communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a Decentralised system, decentralized manner. The protocol is d ...
based on an implementation of the Kademlia algorithm, for trackerless torrents. *
Osiris Osiris (, from Egyptian ''wikt:wsjr, wsjr'') was the ancient Egyptian deities, god of fertility, agriculture, the Ancient Egyptian religion#Afterlife, afterlife, the dead, resurrection, life, and vegetation in ancient Egyptian religion. He was ...
(all version): used to manage distributed and anonymous web portal. *
Retroshare Retroshare is a free and open-source peer-to-peer communication and file sharing app based on a friend-to-friend network built by GNU Privacy Guard (GPG). Optionally peers may exchange certificates and IP addresses to their friends and vice ...
: F2F decentralised communication platform with secure VOIP, instant messaging, file transfer etc. * Tox: a fully distributed messaging, VoIP and video chat platform *
Gnutella Gnutella is a peer-to-peer network protocol. Founded in 2000, it was the first decentralized peer-to-peer network of its kind, leading to other, later networks adopting the model. In June 2005, Gnutella's population was 1.81 million computer ...
DHT: originally by
LimeWire LimeWire was a free peer-to-peer file sharing client for Windows, macOS, Linux, and Solaris. Created by Mark Gorton in 2000, it was most prominently a tool used for the download and distribution of pirated materials, particularly pirated m ...
to augment the Gnutella protocol for finding alternate file locations, now in use by other gnutella clients. * IPFS: a peer-to-peer distributed filesystem based on libp2p. * TeleHash: a mesh networking protocol that uses Kademlia to resolve direct connections between parties. * iMule:
file sharing File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include ...
utility software Utility software is a program specifically designed to help manage and tune system or application software. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that b ...
for
I2P The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by usin ...
. * OpenDHT: library providing an implementation of Kademlia, used by
Jami Nūr ad-Dīn 'Abd ar-Rahmān Jāmī (; 7 November 1414 – 9 November 1492), also known as Mawlanā Nūr al-Dīn 'Abd al-Rahmān or Abd-Al-Rahmān Nur-Al-Din Muhammad Dashti, or simply as Jami or Djāmī and in Turkey as Molla Cami, was a ...
and others. *
GNUnet GNUnet is a software framework for decentralized, peer-to-peer networking and an official GNU package. The framework offers link encryption, peer discovery, resource allocation, communication over many transports (such as TCP, UDP, HTTP, ...
: alternative network stack for building secure, decentralized and privacy-preserving distributed applications. Uses randomized version of Kademlia called R5N. * Dat: a peer-to-peer file sharing tool based on the Hypercore Protocol.


See also

*
Content-addressable network The content-addressable network (CAN) is a distributed, decentralized P2P infrastructure that provides hash table functionality on an Internet-like scale. CAN was one of the original four distributed hash table proposals, introduced concurrently w ...
*
Chord (peer-to-peer) In computing, Chord is a protocol and algorithm for a peer-to-peer distributed hash table. A distributed hash table stores associative array, key-value pairs by assigning keys to different computers (known as "nodes"); a node will store the values ...
*
Tapestry (DHT) Tapestry is a peer-to-peer overlay network which provides a distributed hash table, routing, and multicasting infrastructure for distributed applications.{{cite journal , last1=Zhao , first1=Ben Y. , last2=Huang , first2=Ling , last3=Stribling , fi ...
*
Pastry (DHT) Pastry is an overlay network and routing network for the implementation of a distributed hash table (DHT) similar to Chord. The key–value pairs are stored in a redundant peer-to-peer network of connected Internet hosts. The protocol is bootstrap ...
*
Koorde In peer-to-peer networks, Koorde is a distributed hash table (DHT) system based on the Chord (DHT), Chord DHT and the De Bruijn graph (De Bruijn sequence). Inheriting the simplicity of Chord, Koorde meets hops per Node (networking), node (where ...


References


External links


Xlattice projects
Kademlia Specification and definitions. {{EDonkey Computer-related introductions in 2002 Distributed data storage Hash-based data structures Distributed data structures File sharing Network architecture Hashing Routing Key-based routing Overlay networks