International Conference on Peer-to-Peer Computing
About: International Conference on Peer-to-Peer Computing is an academic conference. The conference publishes majorly in the area(s): Peer-to-peer & Overlay network. Over the lifetime, 532 publication(s) have been published by the conference receiving 16051 citation(s).
••19 Dec 2013
TL;DR: This paper analyzes how Bitcoin uses a multi-hop broadcast to propagate transactions and blocks through the network to update the ledger replicas, and verifies the conjecture that the propagation delay in the network is the primary cause for blockchain forks.
Abstract: Bitcoin is a digital currency that unlike traditional currencies does not rely on a centralized authority. Instead Bitcoin relies on a network of volunteers that collectively implement a replicated ledger and verify transactions. In this paper we analyze how Bitcoin uses a multi-hop broadcast to propagate transactions and blocks through the network to update the ledger replicas. We then use the gathered information to verify the conjecture that the propagation delay in the network is the primary cause for blockchain forks. Blockchain forks should be avoided as they are symptomatic for inconsistencies among the replicas in the network. We then show what can be achieved by pushing the current protocol to its limit with unilateral changes to the client's behavior.
••27 Aug 2001
TL;DR: A 'crawler' is built to extract the topology of Gnutella's application level network, a topology graph is analyzed and the current configuration has the benefits and drawbacks of a power-law structure.
Abstract: Despite recent excitement generated by the P2P paradigm and despite surprisingly fast deployment of some P2P applications, there are few quantitative evaluations of P2P system behavior. Due to its open architecture and achieved scale, Gnutella is an interesting P2P architecture case study. Gnutella, like most other P2P applications, builds at the application level a virtual network with its own routing mechanisms. The topology of this overlay network and the routing mechanisms used have a significant influence on application properties such as performance, reliability, and scalability. We built a 'crawler' to extract the topology of Gnutella's application level network, we analyze the topology graph and evaluate generated network traffic. We find that although Gnutella is not a pure power-law network, its current configuration has the benefits and drawbacks of a power-law structure. These findings lead us to propose changes to the Gnutella protocol and implementations that bring significant performance and scalability improvements.
27 Aug 2001
TL;DR: This paper offers a definition for peer-to-peer networking and makes the differences to common so called client server-architectures clear.
Abstract: This paper offers a definition for peer-to-peer networking and makes the differences to common so called client server-architectures clear. With this definition we are able to classifiy currently existing networking concepts in the Internet either as "pure" peer-to-peer, or "hybrid" peer-to-peer or client server architecture.
••09 Oct 2009
TL;DR: The key features of peer-to-peer (P2P) systems are scalability and dynamism, so simulation is crucial in P2P research.
Abstract: The key features of peer-to-peer (P2P) systems are scalability and dynamism. The evaluation of a P2P protocol in realistic environments is very expensive and difficult to reproduce, so simulation is crucial in P2P research.
••01 Sep 2003
TL;DR: A Bayesian network-based trust model and a method for building reputation based on recommendations in peer-to-peer networks are proposed and shown to outperforms the system where peers do not share recommendations with each other and that a differentiated trust adds to the performance in terms of percentage of successful interactions.
Abstract: It is important to enable peers to represent and update their trust in other peers in open networks for sharing files, and especially services. We propose a Bayesian network-based trust model and a method for building reputation based on recommendations in peer-to-peer networks. Since trust is multifaceted, peers need to develop differentiated trust in different aspects of other peers' capability. The peer's needs are different in different situations. Depending on the situation, a peer may need to consider its trust in a specific aspect of another peer's capability or in multiple aspects. Bayesian networks provide a flexible method to present differentiated trust and combine different aspects of trust. The evaluation of the model using a simulation shows that the system where peers communicate their experiences (recommendations) outperforms the system where peers do not share recommendations with each other and that a differentiated trust adds to the performance in terms of percentage of successful interactions.
Related Conferences (5)
International Conference on Distributed Computing Systems
3.8K papers, 118.6K citations
The Web Conference
6.8K papers, 423.6K citations
ACM Special Interest Group on Data Communication
4.1K papers, 455.6K citations
International Parallel and Distributed Processing Symposium
7.8K papers, 137K citations
IEEE International Conference on Pervasive Computing and Communications
2.5K papers, 56.3K citations