Preview

p2p networks

Powerful Essays
Open Document
Open Document
11971 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
p2p networks
Peer-to-Peer Networks for Content Sharing
Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya
Grid Computing and Distributed Systems Laboratory,
Department of Computer Science and Software Engineering,
The University of Melbourne, Australia
(chd, sarana, raj)@cs.mu.oz.au

ABSTRACT
Peer-to-peer (P2P) systems are popularly used as “file-swapping” networks to support distributed content sharing. A number of P2P networks for file sharing have been developed and deployed. Napster, Gnutella, and Fasttrack are three popular P2P systems.
This chapter presents a broad overview of P2P computing and focuses on content sharing networks and technologies. It also emphasizes on the analysis of network topologies used in popular P2P systems. In addition, this chapter also identifies and describes architecture models and compares various characteristics of four P2P systems—Napster, Gnutella,
Fasttrack, and OpenFT.
Keywords: Peer-to-Peer Networks, Distributed Content Sharing, Distributed Systems,
Internet File Sharing, Fasttrack, Gnutella, Napster, and OpenFT.

1. INTRODUCTION
Peer-to-peer (P2P) content sharing technologies like Napster, Gnutella, and Kazaa are applications that have been astonishingly successful on the Internet. P2P has gained tremendous public attention through Napster which is a system supporting music sharing on the Web. It is an emerging and interesting research technology with a promising product base.
Intel P2P working group gave the definition of P2P as "The sharing of computer resources and services by direct exchange between systems" (Kan, 2001). This thus gives
P2P systems two main key characteristics:
• Scalability: there is no algorithmic, or technical limitation of the size of the system, e.g. the complexity of the system should be somewhat constant regardless of number of nodes in the system.
• Reliability: The malfunction on any given node will not effect the whole system
(or maybe even any other nodes).
File



References: 1. Peter, B., Tim, W., Bart, D., & Piet, D. (2002), A Comparison of Peer-to-Peer Architectures, Broadband Communication Networks Group (IBCN), Department of 2. Minar, N. (2001), Distributed Systems Topologies: Part 1, Oreilly Network, http://www.openp2p.com/pub/a/p2p/2001/12/14/topologies_one.html 3. Minar, N. (2002), Distributed Systems Topologies: Part 2, Oreilly Network, http://www.openp2p.com/pub/a/p2p/2002/01/08/p2p_topologies_pt2.html 4. Kurose, J. F. & Ross, K. W. (2003), Computer Networking: A Top-Down Approach Featuring the Internet, Addison Wesley, Boston, USA. 5. Yang, B. H. & Garcia-Moline (February 2002), Designing a Super-Peer Network, Standford University. 6. Shirky, C. (2001), Listening to Napster, Peer-to-Peer: Harnessing the Power of Disruptive Technologies, A 7. Tyson, J. (2000), Marshall Brain ' HowStuffWorks, How Napster Worked s (2002), Peer-to-Peer: 13. Dimitri, D. & Antonio, G. & Bill, K. (2002), Analysis of Peer-to-Peer Network http://www.cs.berkeley.edu/~daw/teaching/cs261Security LLC (2003), 20. Sharma, A., (Sept. 2002), The FastTrack Network, PC Quest Magazine, India. 14, 2002), 23. Guilfoyle, J., & Lempsink, E., (2003), giFT’s Interface Protocol, Source Forge, http://gift.sourceforge.net/docs.php?document=interface.html

You May Also Find These Documents Helpful

  • Powerful Essays

    Capstone Project It331

    • 3189 Words
    • 13 Pages

    Five doctor offices have decided to join each of their buildings to a network. With this, each office will have access to each of the other four offices’ information. This would greatly benefit them and their patients, allowing them to pull up a patient’s medical and billing information from a central server for easy access. However the central, east and west offices are each on their own LAN. The three LANs are similar in design for connecting each workstation and for hardware and software. The eastern and western offices have already been in a partnership with their own peer-to-peer with remote access network along with shared billing and insurance management software. The north and south locations are running standalone workstations that are various ages. Each office has no kind of network compatible hardware and runs the billing and insurance software on one dedicated computer, each with its own attached printer. Patient information is stored on several computers throughout the offices and patient records are filed manually on paper.…

    • 3189 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    It 273 Unit 1

    • 316 Words
    • 2 Pages

    4. Describe two hypothetical situations, one in which a peer-to-peer network would be most appropriate and one in which a client-server network would be most appropriate, and explain why the particular network type would be most appropriate for that case.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    A peer-to-peer network is a network where each workstation has equivalent capabilities and responsibilities. In this type of network there is no dedicated server, each workstation acts as a server and they share the responsibilities that a single dedicated server would. Each workstation is allowed to access all information allowed by the owners of each workstation. Each…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT2580

    • 940 Words
    • 4 Pages

    * No peer to peer file sharing or externally reachable file transfer protocol (FTP) servers…

    • 940 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Windows Part 2

    • 771 Words
    • 3 Pages

    2. What might be a disadvantage of a large company using a peer-to-peer network model?…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Case Study 1

    • 516 Words
    • 2 Pages

    Person-to-person or P2P networking, Sean Fanning, an 18-year-old student with the nickname ‘the Napster’, was intrigued by the challenge of being able to enable his friends to ‘see’ and share between their own personal record collections. Napster.com did not actually hold any music on its files – but every day millions of swaps were made by people around the world exchanging their music collections. Napster opened a door for many others to reinvent similar software’s or technologies successful iPod personal MP3 player they opened a site called iTunes which offered users a choice of thousands of tracks for download at 99c each. This allowed over 1 billion songs to legally be purchased and downloaded…

    • 516 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In a peer-to-peer network, all of the devices connected to the network share each other’s resources. This is common in a LAN network that does not have a server.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Peer-to-Peer technology allows you to share of computer files by exchanging them with other systems. This kind of sharing became popular in the late 90’s with the first site by the name of NAPSTER. Napster changed file sharing because it was accessible for anyone that had an active internet connection. After Napster became so popular, a lot of individuals saw this as a gateway to open more sites to upload and share music files over the internet.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Over four months, a very short period of time, a small accounting firm grew from five employees to fifty. The existing network architecture could no longer support the exponential growth. Peer-to-Peer networks work very well in a small office environment. Once the ratio of employees exceeds around five employees resources, file storage and a plethora of other network disasters begin. The obvious solution was to recommend a change. As explained in the proposal the proposed upgrade from a peer-to-peer network architecture to client/server was an imminent necessity.…

    • 6041 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    B2P Case Study

    • 796 Words
    • 4 Pages

    Dr. Sharpin recognized the need for a fast, portable, and small testing solution that would deliver results in the field. As she started her project she had to decide which market would prove to be the most lucrative for her product: Australia, North America, or Europe. Though Dr. Sharpin began the project in 2007 in New Zealand, ultimately it was clear that she had to exploit the US and North American market.…

    • 796 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Pirate Bay

    • 593 Words
    • 3 Pages

    copyrights of owners. They also found them guilty on the basis that they provided a search…

    • 593 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    TEMEP Discussion Papers 2010-41: 2010-42: 2010-43: 2010-44: 2010-45: 2010-46: 2010-47: 2010-48: Ruzana Davoyan, Jörn Altmann, and Wolfgang Effelsberg, “Intercarrier Compensation in Unilateral and Bilateral Arrangements” Ruzana Davoyan, Jörn Altmann, and Wolfgang Effelsberg, “Exploring the Effect of Traffic Differentiation on Interconnection Cost Sharing” Ruzana Davoyan and Jörn Altmann, “Investigating the Role of a Transmission Initiator in Private Peering Arrangements” Ruzana Davoyan, Jörn Altmann, and Wolfgang Effelsberg, “A New Bilateral Arrangement between Interconnected Providers” Marcel Risch and Jörn Altmann, “Capacity Planning in Economic Grid Markets” Dang Minh Quan and Jörn Altmann, “Grid Business Models for Brokers Executing SLA-Based Workflows” Dang Minh Quan, Jörn Altmann, and Laurence T. Yang, “Error Recovery for SLA-Based Workflows within the Business Grid” Jörn Altmann, Alireza Abbasi, and Junseok Hwang, “Evaluating the Productivity of Researchers and their Communities: The RP-Index and the CP-Index” Jörn Altmann and Zelalem Berhanu Bedane, “A P2P File Sharing Network Topology Formation Algorithm Based on Social Network Information” Tai-Yoo Kim, Seunghyun Kim and Jongsu Lee , “The Gene of an Accelerating Industrial Society: Expansive Reproduction” Almas Heshmati and Sangchoon Lee , “The Relationship between Globalization, Economic Growth and Income Inequality” Flávio Lenz-Cesar and Almas Heshmati, “Agent-based Simulation of Cooperative Innovation” Erkhemchimeg BYAMBASUREN and Almas HESHMATI, “ECONOMIC DEVELOPMENT IN MONGOLIA”…

    • 29413 Words
    • 118 Pages
    Powerful Essays
  • Good Essays

    Online Piracy

    • 616 Words
    • 3 Pages

    Twitter, Facebook, Google, Wikipedia and many other sites are some of the most common ways people communicate and use as a leg for viral services. Two laws that are being placed into effect will serve as a hinder to users of the internet and also to many of the websites. If they were to be censored or “taken away” people would be left dangling wondering what next. I will inform my audience about the laws (SOPA AND PIPA), how it will censor sites, which sites may be affected, what sites did to prevent it, and when were they introduced. Also how censorship may cause some sites to shut down completely. The two laws will cause them to lose their viral services, no longer being able to inform users with information.…

    • 616 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Internet Piracy

    • 2884 Words
    • 12 Pages

    he Internet has become a central part of the American economy, delivering innovative products while eliminating the need for inefficient middlemen. However, the free flow of information facilitated by the Internet has also created problems with copyright and trademark infringement. The problem is significant; as much as 6 percent of the U.S. gross national product is generated by industries supported by intellectual property laws. A recent report contends that nearly 24 percent of all Internet traffic worldwide is infringing. Piracy of the content created by movie, music, and software companies, and counterfeiting of goods such as clothing, pharmaceutical drugs, and consumer electronics, negatively impacts the American economy. Although the Government Accountability Office cautions that it is difficult to precisely quantify the economy-wide impacts of piracy, it is believed to be a serious problem. To combat problems with online copyright and trademark infringement, U.S. Immigration and Customs Enforcement (ICE) began a new initiative called “Operation In Our Sites.” Between June 30, 2010, and February 14, 2011, ICE seized 112 domain names associated with Internet piracy. Domain name seizures are an innovative use of civil forfeiture proceedings authorized under criminal copyright law. Domain name registrars redirected traffic from the seized domains to a government website explaining that the domain name had been seized by ICE pursuant to a warrant issued by a Federal court. However, the sites remain online and accessible through their Internet protocol addresses. The global nature of the Internet presents problems to the civil forfeiture approach. Only domain names registered within the United States and subject to ICE’s jurisdiction may be seized. However, many websites trafficking in copyrighted content or counterfeit goods are registered and operate entirely in foreign…

    • 2884 Words
    • 12 Pages
    Powerful Essays

Related Topics