A performance evaluation of the Kad-protocol


Most efficient peer-to-peer protocols deploy structured overlay networks based on Distributed Hash Tables (DHTs). These have been extensively studied through theoretical simulations and analysis over the last few years. Recently, the popular eMule and aMule file-sharing applications incorporate a widelydeployed Kademlia-based DHT, called Kad. The Kad… (More)


73 Figures and Tables


Citations per Year

51 Citations

Semantic Scholar estimates that this publication has 51 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics