The Kademlia Protocol Succinctly

by Marc Clifton

DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

With its novel XOR-based metric topology, Kademlia is the first peer-to-peer system to combine provable consistency and performance, latency-minimizing routing, and a symmetric, unidirectional topology. In The Kademlia Protocol Succinctly, author Marc Clifton leads readers through the positive aspects of Kademlia's decentralized specifications. He also details map specification with implementation, areas of concern with the specification, and abstract key areas of the design so that readers can proceed with confidence.

This open book is licensed strictly for personal or educational use. You can download The Kademlia Protocol Succinctly ebook for free in PDF format (3.3 MB).

Table of Contents

Chapter 1
Introduction
 
Chapter 2
Key Concepts
 
Chapter 3
Getting Started
 
Chapter 4
Adding Contacts
 
Chapter 5
Node Lookup
 
Chapter 6
Value Lookup
 
Chapter 7
The DHT Class
 
Chapter 8
The Dht-Bootstrapping
 
Chapter 9
Bucket Management
 
Chapter 10
Key-Value Management
 
Chapter 11
Persisting the DHT
 
Chapter 12
Considerations for an Asynchronous Implementation
 
Chapter 13
A Basic TCP Subnet Protocol
 
Chapter 14
RPC Error Handling and Delayed Eviction
 
Chapter 15
Putting It Together: A Demo
 
Chapter 16
Things Not Implemented
 

Book Details

Subject
Computer Science
Publisher
Syncfusion
Published
2018
Pages
194
Edition
1
Language
English
PDF Size
3.3 MB
License
For personal or educational use

Book Hashtags

Related Books

Great Policy Successes
With so much media and political criticism of their shortcomings and failures, it is easy to overlook the fact that many governments work pretty well much of the time. Great Policy Successes turns the spotlight on instances of public policy that are remarkably successful. It develops a framework for identifying and assessing policy successes, payin...
Kubernetes Succinctly
With excellent orchestration and routing capabilities, Kubernetes is an enterprise-grade platform for building microservices applications. Kubernetes is evolving as the de facto container management tool used by organizations and cloud vendors all over the world. Kubernetes Succinctly by Rahul Rai and Tarun Pabbi is your guide to learning Kubernete...
Java Succinctly Part 2
In this second e-book on Java, Christopher Rose takes readers through some of the more advanced features of the language. Java Succinctly Part 2 explores powerful and practical features of Java, such as multithreading, building GUI applications, and 2-D graphics and game programming. Then learn techniques for using these mechanisms in coherent proj...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Social Theory of Fear
In the current crisis of the capitalist world system, elites promote fear of crime and terrorism to keep and expand their privileges and control the masses. This book offers an analysis of the crisis and strategies for rebellion....
Asterisk: The Future of Telephony
This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally be in control ...