DHT & Peer Discovery
What is a DHT?
Kademlia Protocol
XOR Distance
Distance(A, B) = A XOR BRouting Table
Operations
PING
STORE
FIND_NODE
FIND_VALUE
Peer Discovery Process
Joining the Network
Iterative Lookup
Data Storage
What's Stored in DHT
Key Type
Value
TTL
Replication
TTL and Refresh
Configuration
Performance
Lookup Efficiency
Bandwidth Usage
Security Considerations
Sybil Protection
Eclipse Protection
Data Integrity
Comparison with Other DHTs
DHT
Used By
Differences
Troubleshooting
Few Peers
Slow Lookups
Data Not Found
Last updated

