Peer-to-Peer (P2P) networking emerged as a disruptive business model displacing the server based
networks within a point in time.P2P technologies are on the edge of becoming all-purpose in developing
several applications for social networking. In the past seventeen years, research on P2P computing and
systems has received enormous amount of attention in the areas of academia and the industry. P2P rose to
triumphant profit-making systems in the internet. It represents the best incarnation of the end to end
argument, the frequently disputed design philosophies that guided the design of the internet. The doubting
factor then is why is research on P2P computing now fading from the spotlight and suffering a nose dive
fall as dramatic as its rise to its popularity. This paper is going to capture a quick look at past results in
peer-to-peer computing with focus on understanding what led to its rise, what contributed to its commercial
success and what has led to its lack of interest. The insight of this paper introduces cloud computing as a
paradigm to peer-to-peer computing.
A Survey Of Free-Ridingbehaviour In Peer-To-Peer Networksijiert bestjournal
This paper present the extensive survey of P2P file sharing network with different protocols.This paper presents the most highlighted issue in the network that is Free-Riding issue. Free riding is an important issue for any pe er-to-peer system. An extensive analysis of user traffic on Gnutella shows a significant amount of free riding in the system. Reseachers have analyse Free-Riding extensively and give vari ous results. They found that nearly 70% of Gnutella users share no files,and nearly 50% of all responses are returned by the top 1% of sharing hosts.In this paper we present Bittorent Protocol that can overcome Free-Riding to a greater extent,and many other methodology. While it is well-known that BitTorrent is vulnerable to selfish behaviour of the networkbehav ior
This long paper started out as a small experiment which was supposed to last an afternoon - a play-around with softwares NetDraw and yEd.
It ended up being a huge paper - too long to publish in a printed publication.
Results are not that significant, in that in the IETF (Internet Engineering Task Force) community, it appears that people really mingle a lot with each other, but the matter of interest is to discover the power of the analysis which can be performed using the software used.
I really believe that Social Network Analysis using Netdraw, yEd, and other SNA and visualisation software, should be mandatory for any bottom-up organisation. I also think that corporations and organisations would really benefit from:
1. having their internal social networks analysis in the same manner.
2. using this type of analysis on their external professional social networks
This pinpoints who are the movers and shakers in the organization. This also pinpoints areas/departments where information flow might not be optimal, thus having a lesser contribution to the organization as a whole.
Feedback/discussion very welcome.
Several solutions exist for file storage, sharing, and synchronization. Many of them involve a
central server, or a collection of servers, that either store the files, or act as a gateway for them
to be shared. Some systems take a decentralized approach, wherein interconnected users form a
peer-to-peer (P2P) network, and partake in the sharing process: they share the files they
possess with others, and can obtain the files owned by other peers.
In this paper, we survey various technologies, both cloud-based and P2P-based, that users use
to synchronize their files across the network, and discuss their strengths and weaknesses.
A study of index poisoning in peer topeerIJCI JOURNAL
P2P file sharing systems are the most popular forms of file sharing to date. Its client-server architecture
attains faster file transfers, however with its peer anonymity and lack of authentication it has become a
gold mine for malicious attacks. One of the leading sources of disruptions in the P2P file sharing systems is
the index poisoning attacks. This attack seeks to corrupt the indexes used to reference files available for
download in P2P systems with false data. In order to protect the users from these attacks it is important to
find solutions to eliminate or mitigate the effects of index poisoning attacks. This paper will analyze index
poisoning attacks, their uses and solutions proposed to defend against them.
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Survey Of Free-Ridingbehaviour In Peer-To-Peer Networksijiert bestjournal
This paper present the extensive survey of P2P file sharing network with different protocols.This paper presents the most highlighted issue in the network that is Free-Riding issue. Free riding is an important issue for any pe er-to-peer system. An extensive analysis of user traffic on Gnutella shows a significant amount of free riding in the system. Reseachers have analyse Free-Riding extensively and give vari ous results. They found that nearly 70% of Gnutella users share no files,and nearly 50% of all responses are returned by the top 1% of sharing hosts.In this paper we present Bittorent Protocol that can overcome Free-Riding to a greater extent,and many other methodology. While it is well-known that BitTorrent is vulnerable to selfish behaviour of the networkbehav ior
This long paper started out as a small experiment which was supposed to last an afternoon - a play-around with softwares NetDraw and yEd.
It ended up being a huge paper - too long to publish in a printed publication.
Results are not that significant, in that in the IETF (Internet Engineering Task Force) community, it appears that people really mingle a lot with each other, but the matter of interest is to discover the power of the analysis which can be performed using the software used.
I really believe that Social Network Analysis using Netdraw, yEd, and other SNA and visualisation software, should be mandatory for any bottom-up organisation. I also think that corporations and organisations would really benefit from:
1. having their internal social networks analysis in the same manner.
2. using this type of analysis on their external professional social networks
This pinpoints who are the movers and shakers in the organization. This also pinpoints areas/departments where information flow might not be optimal, thus having a lesser contribution to the organization as a whole.
Feedback/discussion very welcome.
Several solutions exist for file storage, sharing, and synchronization. Many of them involve a
central server, or a collection of servers, that either store the files, or act as a gateway for them
to be shared. Some systems take a decentralized approach, wherein interconnected users form a
peer-to-peer (P2P) network, and partake in the sharing process: they share the files they
possess with others, and can obtain the files owned by other peers.
In this paper, we survey various technologies, both cloud-based and P2P-based, that users use
to synchronize their files across the network, and discuss their strengths and weaknesses.
A study of index poisoning in peer topeerIJCI JOURNAL
P2P file sharing systems are the most popular forms of file sharing to date. Its client-server architecture
attains faster file transfers, however with its peer anonymity and lack of authentication it has become a
gold mine for malicious attacks. One of the leading sources of disruptions in the P2P file sharing systems is
the index poisoning attacks. This attack seeks to corrupt the indexes used to reference files available for
download in P2P systems with false data. In order to protect the users from these attacks it is important to
find solutions to eliminate or mitigate the effects of index poisoning attacks. This paper will analyze index
poisoning attacks, their uses and solutions proposed to defend against them.
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
Big Data Handling Technologies ICCCS 2014_Love Arora _GNDU Love Arora
Big data came into existence when the traditional relational database systems were not able to handle the unstructured data (weblogs, videos, photos, social updates, human behaviour) generated today by organisation, social media, or from any other data generating source. Data that is so large in volume, so diverse in variety or moving with such velocity is called Big data. Analyzing Big Data is a challenging task as it involves large distributed file systems which should be fault tolerant, flexible and scalable. The technologies used by big data application to handle the massive data are Hadoop, Map Reduce, Apache Hive, No SQL and HPCC. These technologies handle massive amount of data in MB, PB, YB, ZB, KB, and TB.
In this research paper various technologies for handling big data along with the advantages and disadvantages of each technology for catering the problems in hand to deal the massive data has discussed.
A Fairer, Faster Internet Protocol
The Internet is founded on a very simple premise: shared communications
links are more efficient than dedicated channels that lie idle much of the time.
And so we share. We share local area networks at work and neighborhood
links from home. And then we share again—at any given time, a terabit
backbone cable is shared among thousands of folks surfing the Web,
downloading videos, and talking on Internet phones.
But there’s a profound flaw in the protocol that governs how people share the
Internet’s capacity. The protocol allows you to seem to be polite, even as you
elbow others aside, taking far more resources than they do.
Network providers like Verizon and BT either throw capacity at the problem or
improvise formulas that attempt to penalize so-called bandwidth hogs. Let me
speak up for this much-maligned beast right away: bandwidth hogs are not
the problem. There is no need to prevent customers from downloading huge
amounts of material, so long as they aren’t starving others.
Rather than patching over the problem, my colleagues and I at BT (formerly
British Telecom) have worked out how to fix the root cause: the Internet’s
sharing protocol itself. It turns out that this solution will make the Internet not
just simpler but much faster too.
ipoque has analyzed the Internet traffic in five regions of the world between August and September 2007. Comprehensive statistics about user behavior provide a unique overview of the Internet’s current state. While the emphasis of last year’s ipoque sur- vey was on peer-to-peer (P2P) file sharing, this study also includes data about Internet telephony (VoIP), Skype, video streaming, instant messaging (IM), file hosting and encrypted P2P protocols. Three petabytes of anonymous data representing over one million users in Australia, Eastern Europe, Germany, the Middle East and Southern Europe have been analyzed. The results for these different regions vary considerably. P2P produces, on average, between 49 and 83 percent of all Internet traffic with nighttime peaks of over 95 percent. About 20 percent of P2P traffic is already encryp- ted. Skype is by far the most popular Internet telephony service.
A Survey Of Free-Ridingbehaviour In Peer-To-Peer Networks ijiert bestjournal
This paper present the extensive survey of P2P file sharing network with different protocols.This paper presents the most highlighted issue in the network that is Free-Riding issue. Free riding is an important issue for any pe er-to-peer system. An extensive analysis of user traffic on Gnutella shows a significant amount of free riding in the system. Reseachers have analyse Free-Riding extensively and give vari ous results. They found that nearly 70% of Gnutella users share no files,and nearly 50% of all responses are returned by the top 1% of sharing hosts.In this paper we present Bittorent Protocol that can overcome Free-Riding to a greater extent,and many other methodology. While it is well-known that BitTorrent is vulnerable to selfish behaviour of the networkbehav ior
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies’ solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
Big Data Handling Technologies ICCCS 2014_Love Arora _GNDU Love Arora
Big data came into existence when the traditional relational database systems were not able to handle the unstructured data (weblogs, videos, photos, social updates, human behaviour) generated today by organisation, social media, or from any other data generating source. Data that is so large in volume, so diverse in variety or moving with such velocity is called Big data. Analyzing Big Data is a challenging task as it involves large distributed file systems which should be fault tolerant, flexible and scalable. The technologies used by big data application to handle the massive data are Hadoop, Map Reduce, Apache Hive, No SQL and HPCC. These technologies handle massive amount of data in MB, PB, YB, ZB, KB, and TB.
In this research paper various technologies for handling big data along with the advantages and disadvantages of each technology for catering the problems in hand to deal the massive data has discussed.
A Fairer, Faster Internet Protocol
The Internet is founded on a very simple premise: shared communications
links are more efficient than dedicated channels that lie idle much of the time.
And so we share. We share local area networks at work and neighborhood
links from home. And then we share again—at any given time, a terabit
backbone cable is shared among thousands of folks surfing the Web,
downloading videos, and talking on Internet phones.
But there’s a profound flaw in the protocol that governs how people share the
Internet’s capacity. The protocol allows you to seem to be polite, even as you
elbow others aside, taking far more resources than they do.
Network providers like Verizon and BT either throw capacity at the problem or
improvise formulas that attempt to penalize so-called bandwidth hogs. Let me
speak up for this much-maligned beast right away: bandwidth hogs are not
the problem. There is no need to prevent customers from downloading huge
amounts of material, so long as they aren’t starving others.
Rather than patching over the problem, my colleagues and I at BT (formerly
British Telecom) have worked out how to fix the root cause: the Internet’s
sharing protocol itself. It turns out that this solution will make the Internet not
just simpler but much faster too.
ipoque has analyzed the Internet traffic in five regions of the world between August and September 2007. Comprehensive statistics about user behavior provide a unique overview of the Internet’s current state. While the emphasis of last year’s ipoque sur- vey was on peer-to-peer (P2P) file sharing, this study also includes data about Internet telephony (VoIP), Skype, video streaming, instant messaging (IM), file hosting and encrypted P2P protocols. Three petabytes of anonymous data representing over one million users in Australia, Eastern Europe, Germany, the Middle East and Southern Europe have been analyzed. The results for these different regions vary considerably. P2P produces, on average, between 49 and 83 percent of all Internet traffic with nighttime peaks of over 95 percent. About 20 percent of P2P traffic is already encryp- ted. Skype is by far the most popular Internet telephony service.
A Survey Of Free-Ridingbehaviour In Peer-To-Peer Networks ijiert bestjournal
This paper present the extensive survey of P2P file sharing network with different protocols.This paper presents the most highlighted issue in the network that is Free-Riding issue. Free riding is an important issue for any pe er-to-peer system. An extensive analysis of user traffic on Gnutella shows a significant amount of free riding in the system. Reseachers have analyse Free-Riding extensively and give vari ous results. They found that nearly 70% of Gnutella users share no files,and nearly 50% of all responses are returned by the top 1% of sharing hosts.In this paper we present Bittorent Protocol that can overcome Free-Riding to a greater extent,and many other methodology. While it is well-known that BitTorrent is vulnerable to selfish behaviour of the networkbehav ior
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies’ solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
Peer-to-peer swarming protocols have been proven to be very efficient for content replication over Internet.
This fact has certainly motivated proposals to adapt these protocols to meet the requirements of on-demand
streaming system. The vast majority of these proposals focus on modifying the piece and peer selection
policies, respectively, of the original protocols. Nonetheless, it is true that more attention has often been
given to the piece selection policy rather than to the peer selection policy. Within this context, this article
proposes a simple algorithm to be used as basis for peer selection policies of BitTorrent-like protocols,
considering interactive scenarios. To this end, we analyze the client’s interactive behaviour when accessing
real multimedia systems. This analysis consists of looking into workloads of real content providers and
assessing three important metrics, namely temporal dispersion, spatial dispersion and object position
popularity. These metrics are then used as the main guidelines for writing the algorithm. To the best of our
knowledge, this is the first time that the client’s interactive behaviour is specially considered to derive an
algorithm for peer selection policies. Finally, the conclusion of this article is drawn with key challenges
and possible future work in this research field.
Copyright Protection in Peer To Peer NetworkIJERA Editor
Recently, P2P technology has become so popular that a large number of files are being exchanged by millions of users concurrently. However, due to the significant growth of P2P file sharing, even copyrighted files are also actively exchanged so copyright infringement has become a serious issue. In particular, P2P file sharing is recognized as a killer application for the P2P technology, and several P2P file sharing systems have been used by many users from the late 90’s to the present, including Napster, Gnutella, Kazaa and Bit Torrent. However, the popularization of such P2P file sharing causes several undesired issues in recent years, such as the illegal sharing of copyrighted contents violating the copyright law and the act as a hotbed of cyber-crimes such as phishing scams and leaks of personal information. In this work, we propose a solution to ensure copy right violation in P2P systems. Keywords- Peer to Peer systems, copyright infringement, file sharing, digital rights management, pollution attack, index poisoning, watermarking and fingerprinting.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docxherbertwilson5999
Peer-to-Peer Architecture Case Study: Gnutella Network
Matei Ripeanu
Computer Science Department,
The University of Chicago
[email protected]
Abstract
Despite recent excitement generated by the P2P
paradigm and despite surprisingly fast deployment of
some P2P applications, there are few quantitative
evaluations of P2P systems behavior. Due to its open
architecture and achieved scale, Gnutella is an
interesting P2P architecture case study. Gnutella, like
most other P2P applications, builds at the application
level a virtual network with its own routing mechanisms.
The topology of this overlay network and the routing
mechanisms used have a significant influence on
application properties such as performance, reliability,
and scalability. We built a ‘crawler’ to extract the
topology of Gnutella’s application level network, we
analyze the topology graph and evaluate generated
network traffic. We find that although Gnutella is not a
pure power-law network, its current configuration has the
benefits and drawbacks of a power-law structure. These
findings lead us to propose changes to Gnutella protocol
and implementations that bring significant performance
and scalability improvements.
1. Introduction
Peer-to-peer systems (P2P) have emerged as a
significant social and technical phenomenon over the last
year. P2P systems provide infrastructure for communities
that share CPU cycles (e.g., Entropia, [email protected])
and/or, storage space (e.g., FreeNet, Gnutella), or that
support interpersonal collaborative environments. Two
factors have fostered the recent explosive growth of such
systems: first, the low cost and high availability of huge
computing and storage resources, and second, increased
network connectivity. As these trends continue, the P2P
paradigm can be expected to become more popular.
Peer-to-peer networks allow individual computers to
communicate directly with each other and to share
information and resources without using specialized
‘servers’. A common characteristic of this new breed of
applications is that they build, at the application level, a
virtual network with its own routing mechanisms. The
topology of this virtual network and the routing
mechanisms used have a significant influence on
application properties such as performance, reliability,
and, in some cases, anonymity. The virtual topology also
determines the communication costs incurred when
running the P2P application.
These considerations have motivated us to conduct a
detailed study of the topology and protocol of a popular
P2P system, Gnutella. In this study, we benefited from
Gnutella’s large existing user base and open architecture,
and, in effect, use the public Gnutella network as a large-
scale, if uncontrolled, testbed. We capture the network
topology, the generated traffic, and the resources’
dynamic behavior. We use our findings to evaluate costs
and benefits of the P2P approach and to investigate
possible improvements to the routing protocol that would
a.
Peer to Peer Network with its Architecture, Types, and Examples!!DigitalThinkerHelp
Today, here we are going to cover all possible things about is peer to peer network with its architecture and types; involving with several examples of peer to peer network with ease.
Peer-to-Peer Communication Service and Messaging SystemEditor IJMTER
The peer-to-peer communication services[1] has entered into the public limelight over the last few
years. Several researches are underway on peer-to-peer communication technologies, but no definitive conclusion
is currently available. Comparing to traditional server client technology on the Internet, the peer-to-peer
technology has capabilities to realize highly scalable, extensible and efficient distributed applications. Our work
presents an anonymous peer-to-peer (P2P) messaging system. A P2P network consists of a large number of peers
interconnected together to share all kinds of digital content. A key weakness of most existing P2P systems is the
lack of anonymity. Without anonymity, it is possible for third parties to identify the participants involved. First,
anonymous P2P system should make it impossible for third parties to identify the participants involved. Second,
anonymous P2P system should guarantee that only the content receiver knows the content. Third, anonymous P2P
system should allow the content publisher to plausibly deny that the content originated from him or her.
Standard Protocols for Heterogeneous P2P Vehicular Networksijtsrd
Vehicular Communication Systems are developing form of networks in which moving vehicles and side road units are the main communicating nodes. In such networks, vehicular nodes provide information to other nodes via Vehicle to Vehicle communication protocols. A vehicular communication system can be used to support smart road applications such as accidents and traffic congestion avoidance, collision warning forwarding, forensic accidents assistance, crime site investigation, and alert notification. However, current Vehicular Communication Systems suffer from many issues and challenges, one of which is their poor interoperability as they lack standardization due to the inconsistent technologies and protocols they use. This paper proposes several standard protocols and languages for P2P vehicular networks that are built using heterogeneous technologies and platforms. These standards consist of three protocols a Standard Communication Protocol which enables the interoperable operation between the heterogeneous nodes of a P2P Vehicular network an Autonomous Peers Integration Protocol which enables the self integration and self disintegration of functionalities and a Standard Information Retrieval Protocol which allows the P2P network to be queried using a standard high level language. In the experiments, a case study was presented as a proof of concept which demonstrated the feasibility of the proposed protocols and that they can be used as a standard platform for data exchange in P2P Vehicular Communication Systems. As future work, Service oriented architectures for vehicular networks are to be investigated while addressing security issues such as confidentiality, integrity, and availability. Youssef Bassil ""Standard Protocols for Heterogeneous P2P Vehicular Networks"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23025.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23025/standard-protocols-for-heterogeneous-p2p-vehicular-networks/youssef-bassil
SECURED SOCIAL TUBE TO AVOID REDUNDANT VIDEO SHARING IN OSN SYSTEMEditor IJMTER
Recent years have witnessed the blossom of online social network service and online
video service as well as the rapid convergence of the two services. Social video contents or social videos
in short that is generated and shared by users in online social networks are becoming increasingly
popular on today's Internet. The unique propagation properties make the video access pattern in the
online social network quite different from that in the traditional centralized video service systems, in that
(1) video contents are no longer produced by a few centralized content providers, but by all individual
users; and (2) social connections and social activities determine the propagation of the videos among the
users. In that Existing system Secure Social tube, an improved peer-assisted video sharing system that
explores interest similarity, physical location and social relationship between peers in OSNs.
Specifically, social Tube incorporates four algorithms: a social network (SN)-based a buffer
management, scheduling, chunk delivery, chunk prefetching and P2P overlay construction. Proposed
system implement secure social tube approach to share useful videos in online social network and
implement video conversion approach to convert videos into frames and check each and every frames
using video content features and also eliminate the redundant video shared on network. Implement this
social tube framework in security manner.
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEEMEMTECHSTUDENTPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Similar to FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING (20)
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally.
International Journal of Peer to Peer Networks .docxijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of P2P networks.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results
in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best
practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems,
large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety
of fields can exchange ideas to further research and improve practices in all areas of P2P.
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)ijp2p
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Big Data, Internet of Things (IoT) and Machine Learning. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Big Data, IoT and Machine Learning.
7th International Conference on Networks, Communications, Wireless and Mobile...ijp2p
7th International Conference on Networks, Communications, Wireless and Mobile Computing (NCWMC 2022) looks for significant contributions to the Computer Networks, Communications, wireless and mobile computing for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, network protocols and wireless networks, Data communication Technologies, network security and mobile computing. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
4th International Conference on Internet of Things (CIoT 2022)ijp2p
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT.
11th International conference on Parallel, Distributed Computing and Applicat...ijp2p
11th International conference on Parallel, Distributed Computing and Applications (IPDCA 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Parallel, Distributed Computing. Original papers are invited on Algorithms and Applications, computer Networks, Cyber trust and security, Wireless networks and mobile Computing and Bioinformatics. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)ijp2p
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Cloud computing. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
4th International Conference on Internet of Things (CIoT 2022) ijp2p
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT.
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
3rd International Conference on Networks, Blockchain and Internet of Things (...ijp2p
3rd International Conference on Networks, Blockchain and Internet of Things (NBIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Networks, Blockchain and Internet of Things. The Conference looks for significant contributions to all major fields of the Networks, Blockchain and Internet of Things in theoretical and practical aspects.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas but are not limited to:
3rd International Conference on NLP & Information Retrieval (NLPI 2022)ijp2p
3rd International Conference on NLP & Information Retrieval (NLPI 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Information Retrieval.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...ijp2p
14th International Conference on Wireless & Mobile Networks (WiMoNe 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Wireless & Mobile computing Environment. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Wireless, Mobile Networks & its applications had received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)ijp2p
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of P2P networks.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)ijp2p
3rd International Conference on Blockchain and Internet of Things (BIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and
applications of Blockchain and Internet of Things. The Conference looks for significant contributions to all major fields of the Blockchain and Internet of Things in theoretical and
practical aspects. Authors are solicited to contribute to the conference by submitting articles that illustrate research
results, projects, surveying works and industrial experiences that describe significant advances in the areas of Blockchain and Internet of Things.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)ijp2p
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Internet of Things.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Accelerate your Kubernetes clusters with Varnish Caching
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
1. International Journal of Peer to Peer Networks (IJP2P) Vol.8, No.2/3, August 2017
DOI : 10.5121/ijp2p.2017.8304 45
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH
THE RISE OF CLOUD COMPUTING
Phillip Kisembe1
and Wilson Jeberson2
1
All Nations University College, Koforidua, Eastern Region, Ghana
2
Department of Computer Science & Engineering, SHUATS, Allahabad, India
ABSTRACT
Peer-to-Peer (P2P) networking emerged as a disruptive business model displacing the server based
networks within a point in time.P2P technologies are on the edge of becoming all-purpose in developing
several applications for social networking. In the past seventeen years, research on P2P computing and
systems has received enormous amount of attention in the areas of academia and the industry. P2P rose to
triumphant profit-making systems in the internet. It represents the best incarnation of the end to end
argument, the frequently disputed design philosophies that guided the design of the internet. The doubting
factor then is why is research on P2P computing now fading from the spotlight and suffering a nose dive
fall as dramatic as its rise to its popularity. This paper is going to capture a quick look at past results in
peer-to-peer computing with focus on understanding what led to its rise, what contributed to its commercial
success and what has led to its lack of interest. The insight of this paper introduces cloud computing as a
paradigm to peer-to-peer computing.
KEYWORDS
Peer-to-peer networking, social networking, and cloud computing
1. INTRODUCTION
17 years ago research on P2P systems has received a significant amount of attention in the
academic and industrial sectors. The main purpose of the P2P design is for peers to correspond on
the internet, without the need of new protocols on switches and routers in the internet core. In P2P
computing, nodes organize themselves as an overlay network, in which packet transmission on
each of the overlay links uses standard Internet protocols, that is Transmission Control Protocol
(TCP) and User Datagram Protocol (UDP). P2P file distribution systems allow nodes to
collaborate among each another so that very bulky files can be distributed from one node to
several receivers - gossiping. A file is divided into chunks, and nodes connect with one another in
a random mesh topology, exchanging these chunks using random gossiping. Research on P2P
systems began about 17 years ago and since its inception; it has gone through four major stages of
evolution.
The earliest stage paid attention on well-organized search protocols, either by using a distributed
hash table [1]-[3], or by using a gossip protocol. The second stage started around the year 2007,
when the research attention on P2P systems shifted towards optimizing protocols to transfer large
files. The third stage began around 2010 when live and on demand streaming protocols have
become the topic that attracted passionate research attention. The final stage is where we are now
which is P2P social networks [4]-[6]. These stages however have substantial overlaps in time. For
example mechanisms that distribute resources in P2P have started to receive attention from cloud
computing today.
2. International Journal of Peer to Peer Networks (IJP2P) Vol.8, No.2/3, August 2017
46
P2P computing however rose into successful commercial systems, displaying the feasibility of
their design. Despite all this, research in this field has recently declined and suffered a fall that we
can equate to its rise in popularity [7]. Figure 1 represents the rise and fall in its popularity by
counting the number of papers with the term P2P in its index. Data points are drawn from
Advanced Google Scholar Search, with the term “P2P”
Figure 1. Rise and fall of the popularity of peer-to-peer as a research topic
Many can disagree of other ways of examining the fame of a research topic such as workshops,
symposiums, and journals created to accommodate papers on the topic. When it comes to
research in P2P computing, we can point out one workshop: the International Workshop on P2P
systems (IPTPS). This workshop was launched by scholars from MIT in the year 2002, to offer a
stage for researchers involved in this field to discuss various challenges. It became an annual
event and attendance was strictly by invitation. Yet in 2015 according to [8], the annual workshop
was cancelled with emphasis being put on lack of interest in the subject matter.
Why then do we observe a rise and an equally drastic fall of research interest in P2P systems?
This paper attempts to offer a review of the past 17 years of P2P research and show what
contributed to its rise in popularity in academia, the key features that led to its commercial
success, and what has led to its research fall. Observations made in this paper may be useful to
shed some light on our thoughts on cloud computing research.
2. EVOLUTION OF PEER-TO-PEER FILE SHARING SYSTEMS
The most important cutting edge applications that motivated peer-to-peer system design is file
sharing. Users very often need to distribute their files to others as conveniently and as efficiently
as possible for example friends on a social group. These files are essentially large in their sizes,
such as a HD song, or a video, and large PDFs in recent years. [9] Proposes two fundamental
issues that arise from such a need of sharing large files: first need to have an effective way to
search for their availability, and then an efficient mechanism to distribute the file from its source
to all the users who may be interested.
The P2P file sharing applications can be categorized into two types: centralized/hybrid or
decentralize/pure architectures [10]. In the centralized model, for example Napster and Bit
Torrent, there is the presence of a central server to index contents and peers. This model is easy to
manage and gives a competent search. However, it has a limited scalability and a single point of
failure. Decentralize p2p systems eliminate a central server, thus enhancing the reliability [11].
3. International Journal of Peer to Peer Networks (IJP2P) Vol.8, No.2/3, August 2017
47
Peer to Peer, previously known as the host-to-host concept, was at first used to institute equal
communication between two peers. In this concept each peer plays the role as server and client
simultaneously. USENET was established for exchanging information between UNIX machines.
2.1. NAPSTER
Napster is a well known P2P file sharing application; written by "Shawn Fanning" in 1999.
Napster was first created for those who had difficulty in discovering and downloading MP3 music
files. Napster is a combination of a search engine and a file-sharing application. Napster is a file
sharing service that facilitates the location and exchange of files, which usually include images,
audio or video, via access to the internet. Napster being the first sharing application paved way
for various programs including Kazaa, Morpheus, LimeWire and Bearshare. Figure 2 shows the
architectural structure of Napster. However, in 2001, [12] Napster was penalized by the
Recording Industry Association of America (RIAA) for copyright reasons and was forced to pay
a fee of $26 million to resolve its legal battle with songwriters and music publishers. Figure 2
below depicts an architectural representation of Napster and how messaging occurs between a
directory server and the connected users.
Figure 2: Architecture of Napster
2.2. GNUTELLA
Gnutella is a large P2P network. Other networks adapted this model since it was first of its
kind. Peers have same capability and responsibility. Nodes communicate in a symmetric manner
in this type of network. Lack of a central directory server Index allows metadata of shared files to
be stored locally among all peers. Figure 3 below represents the architectural representation of
Gnutella in which: Each user acts independently. Nodes communicate with each other with the
use of queries.
Figure 3: Architecture of Gnutella
4. International Journal of Peer to Peer Networks (IJP2P) Vol.8, No.2/3, August 2017
48
2.3. KAZAA
KaZaA uses P2P file sharing; this is a similar technology which led to the rise of Napster. When
compared to Napster, that distributed files through a central server, KaZaA uses a decentralized
system. KaZaA users make contact with one another directly online to share resources. To
transfer data between peers, KaZaA uses the FastTrack protocol.
FastTrack is a so-called "second generation" P2P protocol [13]. The system divides KazaA users
into two groups: supernodes and ordinary nodes. Supernodes are mainly computers with high
processing capabilities.
Each supernode can manage 60 to 150 ordinary nodes at any particular time. Users have to install
the KaZaA software on the computer, which already has a list of supernodes. Every time this
application is launched by the user, the computer registers with the central server and then selects
from a list of currently active supernodes. Once a file request is sent out by the computer to either
upload or download a file, this request will be through the supernode.
The supernode communicates with other supernodes which later on connects with other regular
nodes in order to fulfill the request until the Time to Live of 7 runs out. This indicates that the
search request will extend seven levels into the network before it stops propagating. When the file
needed is located, it is transferred directly from the source to the destination using HTTP
(HyperText Transfer Protocol).
2.4. BIT-TORRENT
Bit-Torrent appeared in 2005 as an application layer network protocol used to distribute files.
Nodes here can download and upload a file at the same time. This does not necessary mean that a
node finishes its download before uploading. Complete downloaded blocks can be uploaded to
other nodes on the network.
The serving capacity increases as the number of downloads increases making the system self-
scaling [14]. Client-server architecture is also adapted here as nodes contact the server to locate
other nodes that they may connect to. A torrent file must first be acquired for one to begin a
download [15]. The .torrent files are found on the web and contain information about; the files
that are contained in the torrent the location address/hostname of the torrent’s tracker The tracker
is a computer which acts as a server, and maintains a list of nodes which are participating in the
system (i.e. computers that are currently downloading or uploading file data) [16].
Once a computer has established a connection to one other node in the system, it can begin
downloading data. Faster download occurs based on the increased number of node connections
hence the likelihood of obtaining a complete copy of the file. A typical Bit-Torrent system needs
to have at least one seeder which has a complete copy of the data being shared.
When a copy has been uploaded by the seeder to other nodes, the seeder may leave the network.
However, for successful ongoing sharing of the data, at least one complete copy must remain
available across the nodes in the network.
2.5. PEER-TO-PEER VIDEO STREAMING
In 2009, video streaming of content on the internet became popular due to the increase in demand
of multimedia content. This led to the modification of network technologies.
5. International Journal of Peer to Peer Networks (IJP2P) Vol.8, No.2/3, August 2017
49
A broad collection of such applications can be found in these days, e.g. as video streaming, video
conferencing, surveillance, media broadcasting, e-learning and storage, etc. In regular, video
streaming techniques typically employ the client- server model and the usage of Content
Distribution Networks (CDN) along with IP multicast which has been the most desirable
solutions to support media streaming over the Internet.
Each node contributes with its own resources to the streaming session [18 – 20]. This serves as an
advantage in using P2P content delivery. For high quality service to be effectively provided in
this network, P2P protocols need to be modified so that they are able to support multimedia
features and video streaming technology needs in order to cope with the changing bandwidth
capacities. [21] Some of the common P2P based video streaming platforms include; PP Live –
that is widely used in China, Vuze – a P2P based video on demand platform, and BBC player.
2.6. DISTRIBUTED SOCIAL NETWORKS
Distributed social networks became popular in 2014 and are currently picking up today.
According to [22] P2P file sharing system provides a platform for a great number of nodes to
share their files. They first study trace data from Facebook and BitTorrent. Guided by the
observation a system is proposed that integrates social network into a P2P network named social
P2P, for simultaneous efficient and trust worthy file sharing. Three mechanisms are incorporated:
a) Interest based structure
b) Interest based file searching
c) Trust relationship adjustment
By exploiting the social interest and relationships in the social network, the interest based
structure groups’ common-multi-interest interest nodes into a cluster and further connects socially
close nodes within a cluster. The comparably stable nodes in each cluster form a Distributed Hash
Table (DHT) for inter-cluster file searching. In the interest based file searching mechanism, a file
query is forwarded to the cluster of the file by the DHT routing first. Then, it is forwarded along
constructed connections within a cluster, which achieves high hit rate and reliable routing.
Sharing files among socially close friends discouraged nodes from providing faulty files because
people are unlikely to risk their reputation in the real world. In the trust relationship adjustment
mechanism, each node in a routing path adaptively decreases its trust on the node that has
forwarded a faulty file in order to avoid routing queries towards misbehaving nodes later on.
Results show that social P2P achieves highly efficient and trust worthy file sharing compared to
current file sharing systems and trust management systems.
3. COMPARISON OF PEER-TO-PEER TECHNOLOGY TO OTHER TECHNOLOGIES
In this section the similarities and differences of the client/server and cloud computing models are
discussed in relation to the P2P technology. Both the client/server and cloud computing models
are successful technologies and are the underlying architecture of the internet today too, but what
made P2P popular and different? This section shows what makes a P2P technology special as
compared to the other mentioned technologies.
3.1. CLIENT/SERVER MODEL VS. P2P TECHNOLOGY
Seventeen years ago P2P technology was not in existence but a server which clients connected to
get the information that they wanted. Figure 4 shows the architecture of the client/server model.
The major challenge here was that the clients did not know precisely on which server the
information they wanted was resting on. This client was then later to be directed to another server
6. International Journal of Peer to Peer Networks (IJP2P) Vol.8, No.2/3, August 2017
50
which is the technology that led to the rise of search engines such as Google and yahoo which do
the searching of the server for the client. It is easy to set up if you don’t have very many users and
also if something goes wrong you can easily fix it hence making it very reliable and with well
known behaviour but if the server crushes it will not provide enough memory to serve all the
clients leading to resources not being available. The client/server model is clearly not P2P since
communication is only between clients and servers, not between clients and clients.
Figure 4. Client/Server Architecture
3.2 CLOUD COMPUTING VS. P2P TECHNOLOGY
In cloud computing we have a distributed pool of resources, basically it’s not just one server but a
federation of several servers. For example face book is estimated to have over 100,000 servers
running their infrastructure so is Google. But despite this every node can’t fail and they all
provide additional benefits such as storage and computational power and typically they are all
operated in a controlled environment. Therefore, we don’t have malicious nodes, they don’t go
offline and if they do they are just thrown away at some point and operate on homogeneous
devices. Cloud computing also has selective centralized structures with single access point where
centralized updates can be performed and monitoring. Figure 5 below shows the architecture of a
cloud computing environment.
Some of the essential cloud computing aspects it provides are on demand self-service where
resources such as server time and network storage are automatically provided to a customer when
required. Second being rapid elasticity, the underlying infrastructure is able to adapt to changing
requirements e.g. number of concurrent users. It also allows for dynamic up/down scaling. Third
is measured service which is the metering of resource and service consumption to provide elastic
pricing and billing models e.g. pay per use. Fourth is resource pooling that provides and assigns
dynamism in a multi-tenant way. Finally, broad network access capabilities are available
worldwide over standard network mechanisms.
Figure 5: Cloud Computing Architecture
7. International Journal of Peer to Peer Networks (IJP2P) Vol.8, No.2/3, August 2017
51
3.3 NEED FOR P2P SYSTEMS
These systems are very similar to cloud computing since they do have a large pool of resources,
but it is in an uncontrolled environment therefore churning is performed, there is the availability
of heterogeneous devices with different capabilities, they are unpredictable with distributed
access points. Currently the mechanisms that do this distributed data and search in cloud
computing are those used in the P2P environment. The question then is why not use cloud
computing since it provides all the nice features? Why the need for peer to peer systems?
Several reasons are available to answer this one being P2P protocols serve as a backend to cloud
computing technology. Decentralized mechanisms, data storage and big data are provided by the
P2P protocols. Various decentralized mechanisms, data storage mechanisms and the massive data
available on the servers in the cloud operate on P2P protocols in the sharing of resources in the
cloud. Two is costs; resources are available and are for free. E.g. Facebook has over 100,000
servers for more than a billion uses. So how much does it cost to operate a year per user? It is
estimated to 2 dollars per year for every user [17]. Third being security which has to be integrated
in all the mechanisms. There should be no central point to get data over all users. Protocols must
be designed to assume that everyone is an attacker. Fourth is the locality/”offline” usage where
local data is exchanged in companies or private households. The fifth point is a larger set of
resources are available. Some of the resources available can be categorized as content which
include programs, data and information and also various capacities such as CPUs, storage,
memory and bandwidth. Finally observation, the quality demand of users of the content grows
basing on two things; the processing speed and amount/size of content. Demand goes beyond the
capabilities of single devices.
4. MAJOR CHALLENGE OF P2P
The rise of research interests in peer-to-peer computing was largely fuelled by real-world peer-to-
peer systems from the industry, most notably Gnutella, as well as by the need of millions of users
to share large files in a peer-to-peer fashion. The essence of peer-to-peer systems is to take full
advantage of both storage and bandwidth resources on end hosts, realizing potentially substantial
resource savings on dedicated servers. For example, peer-to-peer live streaming systems were
designed to utilize the upload bandwidth of end hosts to alleviate bandwidth demand on servers in
Content Distribution Networks (CDNs). Peer-to-peer file sharing, on the other hand, utilized peer
upload bandwidth to improve the downloading performance.
The other major contributing factor to the strong academic interests, in our opinion, was the fact
that the design of peer-to-peer systems was able to start from a clean slate, in that it was not
confined by any legacy protocols in the Internet.
Major drawbacks of peer-to-peer systems started to be realized, with extensive research efforts to
solve them. The number one challenge on the list was its lack of robustness against peer
dynamics, such as a flash crowd scenario in which a large number of peers join around the same
time, or an alarmingly high attrition rate in which a large number of peers leave the system. By
dividing the file into smaller blocks and serving them from multiple peers, BitTorrent was able to
mitigate the negative impact of peer dynamics, but was still not able to provide any performance
guarantees that are routine if dedicated servers are to be used. This still leaves the big challenge
of free-riders in P2P content distribution. Various incentive mechanisms have been proposed to
curb this problem such as tit for tat mechanism that is employed by bit torrent to minimize the
free riding issue. In this case nodes that upload a file are given an incentive of an increase in their
bandwidth. This solution however, has still not proved to be effective to this challenge.
8. International Journal of Peer to Peer Networks (IJP2P) Vol.8, No.2/3, August 2017
52
5. PROMISE OF P2P CLOUD COMPUTING
Many of the most popular and successful Internet services today such as Netflix and Dropbox
make use of cloud computing. Cloud based data centres are costly to construct and are mostly
owned by huge organizations such as Google and Microsoft. Recent research has been
investigating a very different strategy to do cloud computing without those giant centralized
facilities at all—using peer-to-peer technologies of the kind sometimes associated with shady file-
sharing operations.
Placing the physical infrastructure for a cloud-computing operation where it’s usually found, in a
single massive data centre, has definite advantages. Construction, equipment procurement,
installation, and maintenance are all simplified, and economies of scale reduce costs. On the other
hand, a single large data centre consumes an enormous amount of electrical power, often
comparable to what you’d need to run a small town, and dissipating the waste heat it generates is
usually a big headache.
Another drawback of centralized clouds is that their geographic location, which may be best for
the owners, may not be best for the customers. This is the case, for example, when governments
place restrictions on sensitive data crossing national borders. A data centre located in one country
may then be off-limits to customers in some other countries.
In principle, a P2P cloud could be built using the ordinary computing, storage, and
communication equipment found now in people’s homes, with essentially zero initial investment.
Broadband modems, routers, set-top boxes, game consoles, and laptop and desktop PCs could all
contribute. The challenge is to turn this motley collection into a coherent and usable cloud
infrastructure and offer its services to customers. You also have to ensure that the salient features
of clouds—on-demand resource provisioning and the metering of service—are maintained.
This would surely be tough to do, but think of the advantages. First, there would be no single
entity that owns or controls it. As with most other P2P applications, a P2P cloud could be created
and operated as a grassroots effort, without requiring the permission or consent of any authority.
People would choose to participate in a P2P cloud by installing the appropriate client software on
their local machines, and the value of the resulting cloud infrastructure would be commensurate
with the number of individuals who are contributing to it.
A second advantage comes from the fact that a P2P cloud’s components are small, individually
consume little power, and well distributed. This drastically reduces concerns about local
catastrophes. It also removes the usual worries about heat dissipation. Although such P2P clouds
couldn’t provide the quality-of-service guarantees of a Google or an Amazon, for many
applications that wouldn’t much matter.
6. CONCLUSION
As cloud computing begins its rise in taking over as the current technology, can P2P be rescued
from its fall in popularity? This paper has covered a journey of the P2P technology and you will
notice that from file sharing and video streaming to social P2P, this technology overlaps through
time. File sharing is still being implemented in social P2P. This is because, the social groups that
are coming up on the internet today that are defining which functionality is current on the internet
are youths and adults using snapchat, whatsapp, Facebook, etc. User generated content is
becoming more and more popular today. Still the shift in paradigm to cloud computing is
unstoppable but yet cloud computing implements P2P file sharing protocols in the sharing of its
resources in the cloud. The success of the many volunteer-computing projects demonstrates the
9. International Journal of Peer to Peer Networks (IJP2P) Vol.8, No.2/3, August 2017
53
extreme scale that a P2P cloud could in principle attain, both in terms of the number of different
computers involved and their geographic distribution. Using such a collection would, of course,
mean that equipment failures will be common. And besides, the people who contribute their
computers to these clouds could turn them on and off at any time, something the people who run
P2P networks refer to as “churn.” So the first task for any P2P cloud is to keep track of all
functioning and online devices enrolled in the system and to dynamically partition these resources
among customers. And you have to do that in a completely decentralized manner and despite
churn. In summary P2P computing is a technology still in use today and should not be lost.
ACKNOWLEDGEMENTS
The authors would like to thank everyone who has contributed to the completion of this paper.
REFERENCES
[1] E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, (2005) “A survey and comparison of peer-
to-peer overlay network schemes”, IEEE Communications Surveys and Tutorials, 7(2):72–93.
http://www.disi.unitn.it/~montreso/ds/papers/P2PSurvey.pdf
[2] Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan,(2001) “Chord: A Scalable Peer-
to-Peer Lookup Servicefor Internet Applications,” in Proc. ACM SIGCOMM, pp. 149–160.
[3] Rajput, Ubaidullah, Fizza Abbas, Jian Wang, Hasoo Eun, and Heekuck Oh, "CACPPA: A Cloud-
Assisted Conditional Privacy Preserving Authentication Protocol for VANET", In Cluster, Cloud and
Grid Computing (CCGrid), pp. 434-442, 2016.
[4] Peer-to-Peer Systems, (2001)” in Proc. International Conference on Distributed Systems Platforms
(Middleware), pp. 329–350.
[5] D. Frey, A.-M. Kermarrec, M. Raynal, J. Stainer, (2013) "Trust-aware peer sampling: Performance
and privacy tradeoffs", Theor. Comput. Sci., vol. 512, pp. 67-83.
[6] W. Galuba, K. Aberer, Z. Despotovic, W. Kellerer, (2010) "Leveraging social networks for increased
bittorrent robustness", Proc. 7th IEEE Conf. Consumer Commun. Netw. Conf., pp. 159-163.
[7] H. Shen, Ze Li, and K. Chen, (2015) “Social P2P: An online sical network based P2P file sharing
system”, IEEE Transactions on Parallel and Distributed Systems, Pg. 2874-2889.
[8] R. Yu et al., "Cooperative Resource Management in Cloud-Enabled Vehicular Networks," in IEEE
Transactions on Industrial Electronics, Vol. 62, No. 12, pp. 7938-7951, 2015.
[9] Mozilla Development Network (MDN). Retrieved April 10, 2017 from
http://www.wikicfp.com/cfp/program?id=1651&s=IPTPS&f=International%20Workshop%20on%20
Peer-to-Peer%20Systems
[10] G. Dan, N. Carlsson, and I. Chatzidrosso, (2011) “Effective and highly available peer discovery: A
case for independent trackers and gossiping”, In peer-to-peer (P2P) computing, 2011 IEEE
International conference on, pages 290—299.
[11] Clarke, L.; Sandberg, O.; wiley, B. Hong, T.W, (2009) “Freenet: a distributed anonymous information
storage and retrieval system”, Design Privacy Enhancing Technologies (Lecture Notes in Computer
Science, vol. 2009), p. 46 – 66. International Workshop on Design Issues in Anonymity and
Unobservability, Berkeley, CA, USA Proceedings
[12] Lu, Yanrong, Lixiang Li, Haipeng Peng, and Yixian Yang, "Robust ID based mutual authentication
and key agreement scheme preserving user anonymity in mobile networks", KSII Transactions on
Internet & Information Systems, Vol.10, No.3, 2016.
[13] Mozilla Development Network (MDN). Retrieved April 10, 2017 from
https://www.wired.com/2009/12/1207riaa-sues-napster/
[14] Mozilla Development Network (MDN). Retrieved April 10, 2017 from
http://computer.howstuffworks.com/kazaa3.htm
[15] "RIAA v. The People: Five Years Later". Electronic Frontier Foundation. Retrieved 1 November
2016
[16] Bharambe, Ashwin R, (2003) “Analyzing and Improving BitTorrent Performance,” in MSR-TR
[17] Cohen, Bram, (2003) “Incentives Build Robustness in BitTorrent”.
[18] Mozilla Development Network (MDN). Retrieved April 10, 2017 from
http://www.bittorrent.com/bittorrentecon.pdf
10. International Journal of Peer to Peer Networks (IJP2P) Vol.8, No.2/3, August 2017
54
[19] M. Castro, P. Druschel, A.-M. Kermarrec, A. Nandi, A. Rowstron, and A. Singh, (2013) “Splitstream:
High-bandwidth content distribution in cooperative environments”, In Proceedings of IPTPS03,
Berkeley, USA.
[20] Rachel King, (2014) “Facebook data centers worldwide, by the numbers and pictures”.
[21] X. Zhang, J. Liu, B. Li, and Y.-S. Yum, (2005) “Cool streaming/donet: a data-driven overlay network
for peer-to-peer live media streaming,” in Proc. IEEE INFOCOM, vol. 3, pp. 2102–2111.
[22] Y. Huang, T. Z. Fu, D.-M. Chiu, J. C. Lui, and C. Huang, (2008) “Challenges, Design and Analysis of
a Large-scale P2P-VoD System,” in Proc. ACM SIGCOMM, pp. 375–388.
[23] C. Huang, J. Li, and K. W. Ross, (2007) “Peer-Assisted VoD: Making Internet Video Distribution
Cheap,” in Proc. 6th International Workshop on Peer-to-Peer Systems (IPTPS), pp. 1-6.
[24] N. Ramzam, H. Park, and E. Izquierdo, (2012) “Video streaming over P2P networks: Challenges and
Opportunities”. Elsevier.
[25] J. Ross, Y. Lin, and S. K. Chalup, (2016) “RTCSS: a framework for developing real time peer-to-peer
web application”, ACSW ‘16’ proceedings of the Australian Computer Science week Multi-
conference, Article No.56
AUTHORS
Phillip Kisembe is currently a Ph.D candidate doing his research on P2P systems at
SHUATS, India. He is under sponsorship from All Nations University College, Ghana.
Wilson Jeberson is currently the Head of Department of Computer Science and
Information Technology at SHUATS, India.