Content deleted Content added
m →History: Copy edit ▸ Diction ▸ Suggested for disambiguation of meaning, as "every other" machine can also mean "every second" machine. Tags: Mobile edit Mobile app edit Android app edit |
m →Properties: Copy edit ▸ Presentation ▸ Dashes. Tags: Mobile edit Mobile app edit Android app edit |
||
Line 30:
* [[scale (computing)|Scalability]]: The system should function efficiently even with thousands or millions of nodes.
A key technique used to achieve these goals is that any one node needs to coordinate with only a few other nodes in the system
Some DHT designs seek to be [[Secure communication|secure]] against malicious participants<ref>Guido Urdaneta, Guillaume Pierre and Maarten van Steen. [http://www.globule.org/publi/SDST_acmcs2009.html A Survey of DHT Security Techniques] {{Webarchive|url=https://web.archive.org/web/20230601193203/http://www.globule.org/publi/SDST_acmcs2009.html |date=2023-06-01 }}. ACM Computing Surveys 43(2), January 2011.</ref> and to allow participants to remain [[Anonymity|anonymous]], though this is less common than in many other peer-to-peer (especially [[file sharing]]) systems; see [[anonymous P2P]].
|