Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy

The Kademlia Protocol Succinctly

by Marc Clifton

The Kademlia Protocol Succinctly

Subscribe to new books via dBooks.org telegram channel

Join
DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

With its novel XOR-based metric topology, Kademlia is the first peer-to-peer system to combine provable consistency and performance, latency-minimizing routing, and a symmetric, unidirectional topology. In The Kademlia Protocol Succinctly, author Marc Clifton leads readers through the positive aspects of Kademlia's decentralized specifications. He also details map specification with implementation, areas of concern with the specification, and abstract key areas of the design so that readers can proceed with confidence.

This open book is licensed strictly for personal or educational use. You can download The Kademlia Protocol Succinctly ebook for free in PDF format (3.3 MB).

Table of Contents

Chapter 1
Introduction
Chapter 2
Key Concepts
Chapter 3
Getting Started
Chapter 4
Adding Contacts
Chapter 5
Node Lookup
Chapter 6
Value Lookup
Chapter 7
The DHT Class
Chapter 8
The Dht-Bootstrapping
Chapter 9
Bucket Management
Chapter 10
Key-Value Management
Chapter 11
Persisting the DHT
Chapter 12
Considerations for an Asynchronous Implementation
Chapter 13
A Basic TCP Subnet Protocol
Chapter 14
RPC Error Handling and Delayed Eviction
Chapter 15
Putting It Together: A Demo
Chapter 16
Things Not Implemented

Book Details

Title
The Kademlia Protocol Succinctly
Subject
Computer Science
Publisher
Syncfusion
Published
2018
Pages
194
Edition
1
Language
English
PDF Size
3.3 MB
License
For personal or educational use

Book Hashtags

Related Books

Great Policy Successes
With so much media and political criticism of their shortcomings and failures, it is easy to overlook the fact that many governments work pretty well much of the time. Great Policy Successes turns the spotlight on instances of public policy that are remarkably successful. It develops a framework for identifying and assessing policy successes, payin...
Kubernetes Succinctly
With excellent orchestration and routing capabilities, Kubernetes is an enterprise-grade platform for building microservices applications. Kubernetes is evolving as the de facto container management tool used by organizations and cloud vendors all over the world. Kubernetes Succinctly by Rahul Rai and Tarun Pabbi is your guide to learning Kubernete...
Java Succinctly Part 2
In this second e-book on Java, Christopher Rose takes readers through some of the more advanced features of the language. Java Succinctly Part 2 explores powerful and practical features of Java, such as multithreading, building GUI applications, and 2-D graphics and game programming. Then learn techniques for using these mechanisms in coherent proj...
Kafka: The Definitive Guide
Every enterprise application creates data, whether it consists of log messages, metrics, user activity, or outgoing messages. Moving all this data is just as important as the data itself. With this updated edition, application architects, developers, and production engineers new to the Kafka streaming platform will learn how to handle data in motio...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Social Theory of Fear
In the current crisis of the capitalist world system, elites promote fear of crime and terrorism to keep and expand their privileges and control the masses. This book offers an analysis of the crisis and strategies for rebellion....