A survey and comparison of peer-to-peer overlay network schemes
read more
Citations
A survey of network virtualization
InterCloud: utility-oriented federation of cloud computing environments for scaling of application services
A Survey on Security and Privacy Issues of Bitcoin
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
An advanced hybrid peer-to-peer botnet
References
Basic Local Alignment Search Tool
Emergence of Scaling in Random Networks
Design Patterns: Elements of Reusable Object-Oriented Software
The Tragedy of the Commons
Error and attack tolerance of complex networks
Related Papers (5)
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Frequently Asked Questions (21)
Q2. What have the authors stated for future works in "A survey and comparison of peer-to-peer overlay network schemes" ?
Finally, the authors close this survey with their thoughts on some directions for the future in P2P overlay networking research: • Future research would aim to reduce the stretch ( ratio of overlay path to underlying network path ) routing metric based on scalable and robust proximity calculations. The authors see the future of P2P overlay networks inexorably linked to the take-up and subsequent commercial success of P2P overlay computing, personal area and ad-hoc networking, mobile location-based services, mirrored content delivery, and networked file-sharing.
Q3. What is the advantage of de Bruijn graphs?
Since de Bruijn graphs give very short average routing distances and high resilience to peer failure, they are well suited for structured P2P overlay networks.
Q4. What is the purpose of the routing algorithm?
The routing algorithm for storing and retrieving data is designed to adaptively adjust routes over time and to provide efficient performance while using local knowledge, since peers only have knowledge of their immediate neighbors.
Q5. What is the protocol used to update the successor pointers?
The Chord protocol uses a stabilization protocol [6] running periodically in the background to update the successor pointers and the entries in the finger table.
Q6. What is the protocol used by a downloader?
The trackers use a simple protocol layered on top of HTTP in which a downloader sends information about the file it is downloading and the port number.
Q7. How can the authors handle the authenticity of data objects?
The authenticity of the data objects can be handled by using cryptographic techniques through some cost-effective public keys and/or content hashes to securely link together different pieces of data objects.
Q8. What is the purpose of the P2P decentralized overlay network?
P2P decentralized overlay network is designed to handle the discovery and location of data and resources in a dynamic butterfly fashion.
Q9. How many malicious peers can be tolerated in a de Bruijn graph?
The technique can tolerate up to 25% of malicious peers while providing good performance when the number of compromised peers is small.
Q10. Why is the neighborhood set not used in the routing of messages?
The neighborhood set is not used in the routing of messages, but it is still kept fresh/update because the set plays an important role in exchanging information about nearby peers.
Q11. What is the future of P2P overlay networks?
The authors see the future of P2P overlay networks inexorably linked to the take-up and subsequent commercial success of P2P overlay computing, personal area and ad-hoc networking, mobile location-based services, mirrored content delivery, and networked file-sharing.
Q12. What is the effect of a deterministic short overlay path?
This can result in high network delay and unnecessary long-distance network traffics, from a deterministic short overlay path of O(logN), (where N is the number of peers).
Q13. Who proposed a mechanism to improve resiliency to network partitions?
Stoica et al. [6] demonstrates that the advantage of recursive lookups over iterative lookups, but future improvement work is proposed to improve resiliency to network partitions using a small set of known peers, and to reduce the amount of messages in lookups by increasing the size of each step around the ring with a larger fingers in each peer.
Q14. What is the average hopcount of the collapse point lookup query?
They used the collapse point lookup query rate (define as the per node query rate at which the successful query rate falls below 90%) and the average hopcounts prior to collapse.
Q15. What is the argument for DHT-based systems?
The argument is that DHT-based systems while more efficient at many tasks and have strong theoretical fundamentals to guarantee a key to be found if it exists, they are not well suited for mass-market file sharing.
Q16. What is the comparison study done by Loguinov et al.?
A good comparison study done by Loguinov et al. [50] where they use example of Chord, CAN and de Bruijn to study routing performance and resilience of P2P overlay networks, including graph expansion and clustering properties.
Q17. What is the defense that prevents Eclipse attacks?
Singh et al. [55] proposes a defense that prevents Eclipse attacks for both Structured and Unstructured P2P overlay networks, by bounding degree of overlay peers, i.e. the in-degree of overlay peers is likely to be higher than the average in-degree of legitimate peers and legitimate peers choose their neighbors from a subset of overlay peers whose in-degree is below a threshold.
Q18. What is the defense for P2P overlay networks?
this defense restricts the flexibility necessary to implement optimizations such as proximity neighbor selection and only works in Structured P2P overlay networks.
Q19. What are the main improvements in the lookup properties of Unstructured P2P overlays?
in the research community, efforts are being made in improving the lookup properties of Unstructured P2P overlays to include flow control, dynamic geometric topology adaptation, one-hop replication, peer heterogeneity, etc.
Q20. What is the key used to sign the data file?
The private half of the asymmetric key pair is used to sign the data file, thus, providing a minimal integrity check that a retrieved data file matches its data file key.
Q21. What is the process of sending a PING message to a neighbor?
The PING message is then forwarded to its neighbors and initiates a back-propagated PONG message, which contains information about the peer such as the IP address, number and size of the data items.