SlideShare a Scribd company logo
Wanhive vs CHORD 
Comparative Analysis 
Copyright ©2014 Wanhive Systems Private Limited, all rights reserved
Basics 
SL CHORD WANHIVE 
1 Algorithm for DHT Implementation Multimedia Messaging Framework based 
on Chord Algorithm 
2 UniformKey space (K) with at max 
2m Nodes where, 
m = Key length 
Partitioned Key Space: 
Overlay Key space: Ko of key length mo 
User Key Space: Ku of key length mu 
mu >> mo, Ko and Ku are disjoint 
3 Consistent Hashing for Key 
generation 
Keys are assigned locally at overlay nodes 
and/or by Registry Service. 
Structure: Logical Ring Structure: Hierarchical (Super‐Peer Based) 
4 Functions: 
v= get (k) 
t (k ) 
Functions: k Є Ku 
register (k) 
put k, v) d (k ) M 
delete (k) 
send_message k, m), m=Message 
unregister (k) 
5 Implementation: 
a Iterative (reference MIT impl ) 
Implementation: 
a. impl.) Direct (Recursive) Routing only; Iterative 
b. Recursive 
user join to the super‐peer network (opt) 
Copyright ©2014 Wanhive Systems Private Limited, all rights reserved
Structure 
SL CHORD WANHIVE 
1 Components: 
1. Node (n Є K) 
Components: 
1. Overlay Nodes (n Є Ko) 
2. Keys (k Є K) 
3. Values (v) 
2. Keys (k Є Ku)representing logical 
connections 
3. Messages (m Є M), M= {0,1}y 
2 Nodes are the Active Components Logical Connections represented by the 
keys (Ku) are the Active Components 
3 Structure: Logical Ring, Finger Table Structure: (Hierarchical/Layered) 
1. Logical Ring for Message Routing 
2. Centralized for Overlay Maintenance 
4 Discovery/Storage: 
get successor(k) 
Message Routing: 
get_forward(h(k), Number of nodes that must be 
contacted to find a successor in an 
N d k 
m) 
h: Ku → Ko (efficient, non‐invertible 
function) 
N‐node network: N b f h i N d 
O(log(N)) 
Number of hops in a N‐node super‐peer 
network: O(log(N)) (several 
optimizations possible) 
Copyright ©2014 Wanhive Systems Private Limited, all rights reserved
Features 
SL CHORD WANHIVE 
1 Primary Function: 
Primarily persistent storage and 
Primary Function: 
Real‐time high throughput, low latency 
information sharing multimedia messaging. 
2 Communication: 
1. Uses UDP 
d /d li 
Communication: 
1. Uses TCP 
2. No order/delivery guarantee ff d d d li 
3. Packet Oriented 
2. Best effort ordered delivery 
3. Message Oriented (SCTP‐like) 
3 Protocol: Flexible Protocol: Well‐defined 
4 Node Authentication and message 
security hard to implement 
Robust security and authentication 
through Symmetric and Asymmetric 
key cryptography 
5 Scalable, Reliable and Robust, but T d ff l bilit d b t f 
vulnerable to sybil and blasting 
attacks. Slow. 
Trades off scalability and robustness for 
better security and better QOS 
guarantee 
6 Designed for scalability, robustness Designed for easy maintenance mobility 
and reliability 
maintenance, and performance 
Copyright ©2014 Wanhive Systems Private Limited, all rights reserved
Research Areas 
• Third‐party assisted Authentication 
• Cryptographic Key Management 
• Network Key Management 
• Flooding and Misuse Prevention 
• Protocol Standardization and Communication 
Security 
• Improvements in DHT Algorithm and Overlay 
Architecture to improve Routing Performance 
• Maintenance, Mobility and Virtualization 
Copyright ©2014 Wanhive Systems Private Limited, all rights reserved
That’s it, Thank you 
Author: Amit Kumar at Wanhive Systems Private Limited, Patna Bihar (India) 800024. EMAIL: 
amit[*AT*]wanhive.com 
Copyright ©2014 Wanhive Systems Private Limited, all rights reserved

More Related Content

What's hot

International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Nsl seminar(2)
Nsl seminar(2)Nsl seminar(2)
Nsl seminar(2)
Thomhert Siadari
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETS
Ankur Singhal
 
Ods chapter7
Ods chapter7Ods chapter7
Ods chapter7
JeroenDhondt
 
Introduction to Network Coding
Introduction to Network CodingIntroduction to Network Coding
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedDebesh Sadhukhan
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
IJMER
 
Information Density Estimation in Wireless Ad Hoc Networks Based on Caching ...
Information Density Estimation in Wireless Ad Hoc Networks Based  on Caching ...Information Density Estimation in Wireless Ad Hoc Networks Based  on Caching ...
Information Density Estimation in Wireless Ad Hoc Networks Based on Caching ...
IOSR Journals
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
JPINFOTECH JAYAPRAKASH
 
Deeplearning ai june-sharable (1)
Deeplearning ai june-sharable (1)Deeplearning ai june-sharable (1)
Deeplearning ai june-sharable (1)
Vienna Data Science Group
 
Ijcnc050215
Ijcnc050215Ijcnc050215
Ijcnc050215
IJCNCJournal
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network Coding
Dr. Amarjeet Singh
 
IJET-V2I6P7
IJET-V2I6P7IJET-V2I6P7
Ns2
Ns2Ns2
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
ijwmn
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
A. Sufian
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
ijircee
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
journal ijrtem
 
An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing Problem
CSCJournals
 

What's hot (20)

International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Nsl seminar(2)
Nsl seminar(2)Nsl seminar(2)
Nsl seminar(2)
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETS
 
Ods chapter7
Ods chapter7Ods chapter7
Ods chapter7
 
Introduction to Network Coding
Introduction to Network CodingIntroduction to Network Coding
Introduction to Network Coding
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
Information Density Estimation in Wireless Ad Hoc Networks Based on Caching ...
Information Density Estimation in Wireless Ad Hoc Networks Based  on Caching ...Information Density Estimation in Wireless Ad Hoc Networks Based  on Caching ...
Information Density Estimation in Wireless Ad Hoc Networks Based on Caching ...
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
Last
LastLast
Last
 
Deeplearning ai june-sharable (1)
Deeplearning ai june-sharable (1)Deeplearning ai june-sharable (1)
Deeplearning ai june-sharable (1)
 
Ijcnc050215
Ijcnc050215Ijcnc050215
Ijcnc050215
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network Coding
 
IJET-V2I6P7
IJET-V2I6P7IJET-V2I6P7
IJET-V2I6P7
 
Ns2
Ns2Ns2
Ns2
 
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing Problem
 

Similar to Wanhive vs Chord Distributed Hash Table

Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
Samuel Dratwa
 
DCS Unit-II COMMUNICATION AND COORDINATION.pdf
DCS Unit-II COMMUNICATION AND COORDINATION.pdfDCS Unit-II COMMUNICATION AND COORDINATION.pdf
DCS Unit-II COMMUNICATION AND COORDINATION.pdf
rameshwarchintamani
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
Yoss Cohen
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
eSAT Publishing House
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
eSAT Journals
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnetssnv09
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
IJCNCJournal
 
I1086066
I1086066I1086066
I1086066
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
idescitation
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
Blaqray1998
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
Blaqray1998
 
Network security
Network securityNetwork security
Network security
Ramasubbu .P
 
I1086066
I1086066I1086066
I1086066
Selva Raj
 
Protocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDNProtocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDN
Gerardo Pardo-Castellote
 
2018a 1324654jhjkhkhkkjhk
2018a 1324654jhjkhkhkkjhk2018a 1324654jhjkhkhkkjhk
2018a 1324654jhjkhkhkkjhk
Jasser Kouki
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsAleksandr Yampolskiy
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
hoang971
 

Similar to Wanhive vs Chord Distributed Hash Table (20)

Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
 
DCS Unit-II COMMUNICATION AND COORDINATION.pdf
DCS Unit-II COMMUNICATION AND COORDINATION.pdfDCS Unit-II COMMUNICATION AND COORDINATION.pdf
DCS Unit-II COMMUNICATION AND COORDINATION.pdf
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
I1086066
I1086066I1086066
I1086066
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Network security
Network securityNetwork security
Network security
 
I1086066
I1086066I1086066
I1086066
 
Protocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDNProtocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDN
 
2018a 1324654jhjkhkhkkjhk
2018a 1324654jhjkhkhkkjhk2018a 1324654jhjkhkhkkjhk
2018a 1324654jhjkhkhkkjhk
 
Lecture04 H
Lecture04 HLecture04 H
Lecture04 H
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 

Recently uploaded

Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 

Recently uploaded (20)

Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 

Wanhive vs Chord Distributed Hash Table

  • 1. Wanhive vs CHORD Comparative Analysis Copyright ©2014 Wanhive Systems Private Limited, all rights reserved
  • 2. Basics SL CHORD WANHIVE 1 Algorithm for DHT Implementation Multimedia Messaging Framework based on Chord Algorithm 2 UniformKey space (K) with at max 2m Nodes where, m = Key length Partitioned Key Space: Overlay Key space: Ko of key length mo User Key Space: Ku of key length mu mu >> mo, Ko and Ku are disjoint 3 Consistent Hashing for Key generation Keys are assigned locally at overlay nodes and/or by Registry Service. Structure: Logical Ring Structure: Hierarchical (Super‐Peer Based) 4 Functions: v= get (k) t (k ) Functions: k Є Ku register (k) put k, v) d (k ) M delete (k) send_message k, m), m=Message unregister (k) 5 Implementation: a Iterative (reference MIT impl ) Implementation: a. impl.) Direct (Recursive) Routing only; Iterative b. Recursive user join to the super‐peer network (opt) Copyright ©2014 Wanhive Systems Private Limited, all rights reserved
  • 3. Structure SL CHORD WANHIVE 1 Components: 1. Node (n Є K) Components: 1. Overlay Nodes (n Є Ko) 2. Keys (k Є K) 3. Values (v) 2. Keys (k Є Ku)representing logical connections 3. Messages (m Є M), M= {0,1}y 2 Nodes are the Active Components Logical Connections represented by the keys (Ku) are the Active Components 3 Structure: Logical Ring, Finger Table Structure: (Hierarchical/Layered) 1. Logical Ring for Message Routing 2. Centralized for Overlay Maintenance 4 Discovery/Storage: get successor(k) Message Routing: get_forward(h(k), Number of nodes that must be contacted to find a successor in an N d k m) h: Ku → Ko (efficient, non‐invertible function) N‐node network: N b f h i N d O(log(N)) Number of hops in a N‐node super‐peer network: O(log(N)) (several optimizations possible) Copyright ©2014 Wanhive Systems Private Limited, all rights reserved
  • 4. Features SL CHORD WANHIVE 1 Primary Function: Primarily persistent storage and Primary Function: Real‐time high throughput, low latency information sharing multimedia messaging. 2 Communication: 1. Uses UDP d /d li Communication: 1. Uses TCP 2. No order/delivery guarantee ff d d d li 3. Packet Oriented 2. Best effort ordered delivery 3. Message Oriented (SCTP‐like) 3 Protocol: Flexible Protocol: Well‐defined 4 Node Authentication and message security hard to implement Robust security and authentication through Symmetric and Asymmetric key cryptography 5 Scalable, Reliable and Robust, but T d ff l bilit d b t f vulnerable to sybil and blasting attacks. Slow. Trades off scalability and robustness for better security and better QOS guarantee 6 Designed for scalability, robustness Designed for easy maintenance mobility and reliability maintenance, and performance Copyright ©2014 Wanhive Systems Private Limited, all rights reserved
  • 5. Research Areas • Third‐party assisted Authentication • Cryptographic Key Management • Network Key Management • Flooding and Misuse Prevention • Protocol Standardization and Communication Security • Improvements in DHT Algorithm and Overlay Architecture to improve Routing Performance • Maintenance, Mobility and Virtualization Copyright ©2014 Wanhive Systems Private Limited, all rights reserved
  • 6. That’s it, Thank you Author: Amit Kumar at Wanhive Systems Private Limited, Patna Bihar (India) 800024. EMAIL: amit[*AT*]wanhive.com Copyright ©2014 Wanhive Systems Private Limited, all rights reserved