A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and...
36 KB (4,182 words) - 01:23, 10 June 2025
data type that maps keys to values. A hash table uses a hash function to compute an index, also called a hash code, into an array of buckets or slots...
54 KB (6,112 words) - 03:09, 2 August 2025
Chord (peer-to-peer) (redirect from Chord (distributed hash table))
Chord is a protocol and algorithm for a peer-to-peer distributed hash table. A distributed hash table stores key-value pairs by assigning keys to different...
18 KB (2,538 words) - 15:15, 22 July 2025
Consistent hashing is also the cornerstone of distributed hash tables (DHTs), which employ hash values to partition a keyspace across a distributed set of...
22 KB (2,597 words) - 01:56, 26 May 2025
hash function are called hash values, hash codes, (hash/message) digests, or simply hashes. The values are usually used to index a fixed-size table called...
50 KB (7,455 words) - 17:15, 31 July 2025
Content-addressable network (category Hash-based data structures)
original four distributed hash table proposals, introduced concurrently with Chord, Pastry, and Tapestry. Like other distributed hash tables, CAN is designed...
6 KB (806 words) - 11:47, 3 July 2023
connection to a tracker. Modern BitTorrent clients may implement a distributed hash table and the peer exchange protocol to discover peers without trackers;...
8 KB (1,032 words) - 18:54, 14 August 2024
Torrent file (section Distributed hash tables)
torrent file, and/or achieves a similar result through the use of distributed hash tables. Then the client connects directly to the peers in order to request...
18 KB (2,303 words) - 02:41, 12 May 2025
the BitTorrent protocol. See Comparison of BitTorrent clients. Distributed Hash Tables (DHT) are used in Bittorrent for peers to send a list of other...
13 KB (1,861 words) - 15:20, 9 May 2025
InterPlanetary File System (category Hash-based data structures)
and file sharing peer-to-peer network for sharing data using a distributed hash table to store provider information. By using content addressing, IPFS...
17 KB (1,372 words) - 19:28, 12 June 2025
Merkle tree (redirect from Tiger-Tree Hash)
gtk-gnutella. Computer programming portal Binary tree Blockchain Distributed hash table Hash table Hash trie Linked timestamping Radix tree Becker, Georg (2008-07-18)...
15 KB (1,787 words) - 20:00, 22 July 2025
The Circle (file system) (category Distributed file systems)
Circle is a peer-to-peer distributed file system written mainly in Python. It is based on the Chord distributed hash table (DHT). Development on the...
2 KB (206 words) - 15:13, 21 May 2022
as fast table lookup (hash tables) and distributed databases (distributed hash tables). A hash list is an extension of the concept of hashing an item...
3 KB (490 words) - 17:39, 17 December 2024
Mainline DHT (section Routing table)
Kademlia-based distributed hash table (DHT) used by BitTorrent clients to find peers via the BitTorrent protocol. The idea of using a DHT for distributed tracking...
8 KB (1,127 words) - 06:43, 23 April 2025
messages to destinations not specified by an IP address. For example, distributed hash tables can be used to route messages to a node having a specific logical...
11 KB (1,414 words) - 18:05, 29 July 2025
BitTorrent (redirect from Distributed BitTorrent trackers)
first Vuze and then the BitTorrent client introduced distributed tracking using distributed hash tables which allowed clients to exchange data on swarms directly...
87 KB (8,961 words) - 07:14, 20 July 2025
Tapestry (DHT) (category Distributed data storage)
peer-to-peer overlay network which provides a distributed hash table, routing, and multicasting infrastructure for distributed applications. The Tapestry peer-to-peer...
7 KB (887 words) - 10:42, 1 July 2023
Kademlia (category Hash-based data structures)
Kademlia is a distributed hash table for decentralized peer-to-peer computer networks designed by Petar Maymounkov and David Mazières in 2002. It specifies...
28 KB (4,223 words) - 13:03, 20 January 2025
Elliptics is a distributed key–value data storage with open source code. By default it is a classic distributed hash table (DHT) with multiple replicas...
8 KB (796 words) - 07:11, 8 January 2025
PNRP uses an architecture similar to distributed hash table systems such as Chord or Pastry. The peer name is hashed to produce a 128-bit peer identifier...
6 KB (760 words) - 01:04, 10 January 2025
basic network topology is that of a mesh network. GNUnet includes a distributed hash table (DHT) which is a randomized variant of Kademlia that can still efficiently...
20 KB (2,141 words) - 18:57, 2 April 2025
OSI model's network layer), it also provides the semantics of a distributed hash table. This reduces the overhead to having an overlay protocol on top...
9 KB (1,071 words) - 17:46, 15 November 2023
content recommendation and voting. Whānau is a Sybil-resistant distributed hash table algorithm. I2P's implementation of Kademlia also has provisions...
22 KB (2,492 words) - 19:59, 19 June 2025
using an agent-centric approach with individual source chains and a distributed hash table (DHT) for data validation, eliminating the need for a global consensus...
13 KB (1,165 words) - 08:07, 6 July 2025
Perfect Dark (P2P) (section Distributed datastore)
entire network. "DKT" stands for Distributed Keyword Table. "DHT" for Distributed Hash Table. "DU" for distributed Unity. "DKT" is mainly for providing...
13 KB (1,288 words) - 16:51, 2 August 2025
Peer-to-peer (section Distributed storage and search)
of structured P2P networks implement a distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file...
61 KB (6,947 words) - 12:28, 18 July 2025
List of data structures (redirect from Hash-based data structures)
Distributed hash table Double hashing Dynamic perfect hash table Hash array mapped trie Hash list Hash table Hash tree Hash trie Koorde Prefix hash tree...
9 KB (914 words) - 05:55, 20 March 2025
Salt (cryptography) (redirect from Salted hash)
function that hashes data, a password or passphrase. Salting helps defend against attacks that use precomputed tables (e.g. rainbow tables), by vastly growing...
13 KB (1,527 words) - 22:35, 14 June 2025
Open addressing (redirect from Open address hash table)
Open addressing, or closed hashing, is a method of collision resolution in hash tables. With this method a hash collision is resolved by probing, or searching...
9 KB (1,225 words) - 10:26, 16 June 2025
database Data grid Distributed cache Distributed data store Distributed hash table Routing protocol Distributed SQL "Definition: distributed database". www...
8 KB (829 words) - 07:46, 15 July 2025