Open Access Open Access  Restricted Access Subscription Access

Comparative Analysis of Peer to Peer Networks


Affiliations
1 Department of Computer Science, Comsats Institute of Information Technology, WahCantt, Pakistan
 

Today over the Internet, communication and computing environments are considerably and significantly becoming more and more chaotic and complex than normal classical distributed systems that have some lacking of any hierarchical control and some centralized organization. There in the emerging of Peer-to-Peer (P2P) networks overlays has become of much interest because P2P networks provide a good quality substrate to create a largescale content distribution, data sharing, and multicast applications at the application-level. P2P networks are commonly used as “file-swapping” in any network to provide support in sharing of distributed contents. For data and file sharing, a number of P2P networks have been deployed and developed. Gnutella, Fast track and Napster are three popular and commonly used P2P networking systems. In this research a broad overview of P2P networks computing is presented. This research is focusing on content sharing technologies, networks and techniques. In this research, it is also tried to emphasize on the study and analysis of popular P2P network topologies used in networking systems. This research is also focuses, identifies and describes the most common architecture models of P2P networks and compares different properties, characteristics and features of four P2P systems—Fast track, Gnutella, Open FT and Napster. In P2P organization, every peer grosses mutually the parts of the server as well of the client. By way of a client, it can demand and copy its required record files from additional peers, and in place of a server, it can offer data files to additional peers. The survey basically analyzes and outlines the basic structuring of P2P networks together with their analysis, comparison, applications, advantages, and disadvantages. The survey presents numerous organized and unstructured P2P structures.

Keywords

Peer to Peer Networks, Centralized, Distributed, Structured, Unstructured.
User
Notifications
Font Size

  • Stoica, I., et al. Chord, "A scalable peer-to-peer lookup service for internet applications". in ACM SIGCOMM Computer Communication Review. 2001: ACM.
  • Sen, S., & Wang, J. "Analyzing peer-to-peer traffic across large networks." IEEE/ACM Transactions on Networking (ToN), 12(2), 219232.(2004).
  • Yunhao, L., Xiao, L., & Ni, L. M. " Building a scalable bipartite P2P overlay network. Parallel and Distributed Systems", IEEE Transactions on, 18(9), 1296-1306.(2007)
  • Jones, M. B., Theimer, M., Wang, H., & Wolman, A. " Unexpected complexity: Experiences tuning and extending CAN." Submitted for publication. (2002).
  • Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., &Balakrishnan, H. " Chord: A scalable peertopeer lookup service for internet applications". Paper presented at the ACM SIGCOMM Computer Communication Review. (2001).
  • Saroiu, S., Gummadi, P. K., & Gribble, S. D. "A measurement study of peer-to-peer file sharing systems". In Electronic Imaging 2002 (pp. 156170). International Society for Optics and Photonics. (2001, December).
  • Kang, B. B., Chan-Tin, E., Lee, C. P., Tyra, J., Kang, H. J., Nunnery, C., ...& Kim, Y. " Towards complete node enumeration in a peertopeer botnet". In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (pp. 23-34). ACM. (2009, March).
  • Kang, J., Zhang, J. Y., Li, Q., & Li, Z. "Detecting new P2P botnet with multi-chart CUSUM. In Networks Security, Wireless Communications and Trusted Computing", 2009. NSWCTC'09. International Conference on (Vol. 1, pp. 688-691). IEEE. (2009, April).
  • Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., van Steen, M., Freiling, F. C., &Pohlmann, N. "Sandnet: Network traffic analysis of malicious software". In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (pp. 78-88). ACM. (2011, April).
  • Nazario, J., &Holz, T. "As the net churns: Fastflux botnet observations. In Malicious and Unwanted Software", 2008. MALWARE 2008. 3rd International Conference on (pp. 24-31). IEEE. (2008, October).
  • Wang, Y., &Vassileva, J. "Trust-based community formation in peer-to-peer file sharing networks". In Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (pp. 341-348). IEEE Computer Society. (2004, September).
  • Rahbar, A. G. P., & Yang, O. "Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. Parallel and Distributed Systems", IEEE Transactions on, 18(4), 460473. (2007).
  • Zhou, R., & Hwang, K. "Gossip-based reputation aggregation for unstructured peer-topeer networks". In Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International (pp. 1-10). IEEE. (2007, March).
  • Lou, X., & Hwang, K. "Proactive Content Poisoning To Prevent Collusive Piracy in P2P File Sharing" IEEE Transactions on Computers TC 2008. (2008).
  • J. Hu and R. Klefstad, “Decentralized Load Balancing onUnstructured Peer-to-Peer Computing Grids,”Proc. Fifth IEEEInt’lSymp. Network Computing and Applications (NCA ’06), July 2006.
  • Zhou, R., Hwang, K., &Cai, M. "Gossiptrust for fast reputation aggregation in peer-to-peer networks". Knowledge and Data Engineering, IEEE Transactions on, 20(9), 1282-1295. (2008).
  • Antoniadis, P., & Le Grand, B."Incentives for resource sharing in self-organized communities: From economics to social psychology". In Digital Information Management, 2007. ICDIM'07. 2nd International Conference on(Vol. 2, pp. 756-761). IEEE. (2007, October).
  • Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., &Bhattacharjee, B. "Measurement and analysis of online social networks". InProceedings of the 7th ACM SIGCOMM conference on Internet measurement(pp. 29-42). ACM. (2007, October).
  • Yang, S. J., Zhang, J., Lin, L., & Tsai, J. J. " Improving peer-to-peer search performance through intelligent social search". Expert Systems with Applications, 36(7), 10312-10324. (2009).
  • Kourtellis, N., Finnis, J., Anderson, P., Blackburn, J., Borcea, C., &Iamnitchi, A. "Prometheus: User-controlled P2P social data management for socially-aware applications". In Middleware 2010 (pp. 212-231). Springer Berlin Heidelberg. (2010).
  • Howe, A. J. "Napster and Gnutella: a comparison of two popular Peer-to-Peer protocols". Universidade de Victoria, 11. (2000).
  • Saboori, E., &Mohammadi, S. "Anonymous Communication in Peer-to-Peer Networks for providing more Privacy and Security". arXiv preprint arXiv:1208.3192. (2012).
  • Burgess, M., &Canright, G. "Scalability of peer configuration management in partially reliable and ad hoc networks". In Integrated Network Management, 2003. IFIP/IEEE Eighth International Symposium on (pp. 293-305). IEEE. (2003, March).
  • Padmanabhan, V. N., Wang, H. J., & Chou, P. A. "Resilient peer-to-peer streaming". In Network Protocols, 2003. Proceedings. 11th IEEE International Conference on (pp. 16-27). IEEE. (2003, November).
  • Wouhaybi, R. H., & Campbell, A. T. "Phenix: Supporting resilient low-diameter peer-to-peer topologies". In INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies(Vol. 1). IEEE. (2004, March).
  • Ganesan, P., Sun, Q., & Garcia-Molina, H. "Yappers: A peer-to-peer lookup service over arbitrary topology". In INFOCOM 2003. TwentySecond Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 2, pp. 1250-1260). IEEE. (2003, March).
  • Tran, D. A., Hua, K. A., & Do, T. "Zigzag: An efficient peer-to-peer scheme for media streaming". In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 2, pp. 1283-1292). IEEE. (2003, March).
  • Castro, M., Jones, M. B., Kermarrec, A. M., Rowstron, A., Theimer, M., Wang, H., & Wolman, A. (2003, April). An evaluation of scalable application-level multicast built using peer-to-peer overlays. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies(Vol. 2, pp. 1510-1520). IEEE.
  • Ge, Z., Figueiredo, D. R., Jaiswal, S., Kurose, J., &Towsley, D. (2003, March). Modeling peerpeer file sharing systems. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 3, pp. 2188-2198). IEEE.
  • Van Ruitenbeek, E.; Sanders, W.H., "Modeling Peer-to-Peer Botnets," Quantitative Evaluation of Systems, 2008. QEST '08. Fifth International Conference on , vol., no., pp.307,316, 14-17 Sept. 2008 doi: 10.1109/QEST.2008.43
  • Arai, B., Das, G., Gunopulos, D., &Kalogeraki, V. (2007). Efficient approximate query processing in peer-to-peer networks. Knowledge and Data Engineering, IEEE Transactions on, 19(7), 919-933.
  • Li, M., Yu, J., & Wu, J. (2008). Free-riding on bittorrent-like peer-to-peer file sharing systems: Modeling analysis and improvement. Parallel and Distributed Systems, IEEE Transactions on, 19(7), 954-966.
  • Das, K.; Bhaduri, K.; Kun Liu; Kargupta, H., "Distributed Identification of Top-l Inner Product Elements and its Application in a PeertoPeer Network," Knowledge and Data Engineering, IEEE Transactions on , vol.20, no.4, pp.475,488, April 2008
  • Zhou, R., Hwang, K., &Cai, M. "Gossiptrust for fast reputation aggregation in peer-to-peer networks". Knowledge and Data Engineering, IEEE Transactions on, 20(9), 1282-1295. (2008).
  • Chen, K., Hwang, K., & Chen, G. "Heuristic discovery of role-based trust chains in peer-topeer networks". Parallel and Distributed Systems, IEEE Transactions on, 20(1), 83-96. (2009).
  • Chen, H., Jin, H., Liu, Y., & Ni, L. M. "Difficulty-aware hybrid search in peer-to-peer networks". Parallel and Distributed Systems, IEEE Transactions on,20(1), 71-82. (2009).
  • Li, D., Cao, J., Lu, X., & Chen, K. " Efficient range query processing in peer-to-peer systems". Knowledge and Data Engineering, IEEE Transactions on,21(1), 78-91. (2009).
  • Ping Wang; Sparks, S.; Zou, C.C., "An Advanced Hybrid Peer-to-Peer Botnet," Dependable and Secure Computing, IEEE Transactions on , vol.7, no.2, pp.113,127, April-June 2010
  • Datta, S., Giannella, C. R., &Kargupta, H. "Approximate distributed k-means clustering over a peer-to-peer network". Knowledge and Data Engineering, IEEE Transactions on, 21(10), 1372-1388. (2009).
  • Datta, S., Giannella, C., &Kargupta, H. "KMeans Clustering Over a Large, Dynamic Network". In SDM. (2006, April).
  • Hsiao, H. C., Liao, H., & Huang, C. C. "Resolving the topology mismatch problem in unstructured peer-to-peer networks". Parallel and Distributed Systems, IEEE Transactions on, 20(11), 1668-1681. (2009).
  • Jin, X., Chan, S. H., Wong, W. C., &Begen, A. C. "A distributed protocol to serve dynamic groups for peer-to-peer streaming". Parallel and Distributed Systems, IEEE Transactions on, 21(2), 216-228. (2010).
  • Furfaro, F., Mazzeo, G. M., &Pugliese, A. "Managing multidimensional historical aggregate data in unstructured P2P networks". Knowledge and Data Engineering, IEEE Transactions on, 22(9), 1313-1330.
  • (2010).
  • Gaeta, R., &Sereno, M. "Generalized probabilistic flooding in unstructured peer-topeer networks". Parallel and Distributed Systems, IEEE Transactions on, 22(12), 20552062. (2011).
  • Bao, X., Fang, B., Hu, M., &Xu, B. "Heterogeneous search in unstructured peer-topeer networks". Distributed Systems Online, IEEE, 6(2). (2005).
  • Zhao, B. Y., Huang, L., Stribling, J., Joseph, A. D., &Kubiatowicz, J. D. "Exploiting routing redundancy via structured peer-to-peer overlays". In Network Protocols, 2003. Proceedings. 11th IEEE International Conference on (pp. 246-257). IEEE. (2003, November).
  • Kumar, A., Merugu, S., Xu, J. J., Zegura, E. W., & Yu, X."Ulysses: a robust, low‐diameter, low‐latency peer‐to‐peer network". European transactions on telecommunications, 15(6), 571587. (2004).
  • Kourtellis, N., &Iamnitchi, A. "Leveraging Peer Centrality in the Design of Socially-Informed Peer-to-Peer Systems". (2013).
  • Weigle, E., Hiltunen, M., Schlichting, R., Vaishampayan, V. A., &Chien, A. A." Peer-topeer error recovery for hybrid satellite-terrestrial networks". In Peer-to-Peer Computing, 2006. P2P 2006. Sixth IEEE International Conference on (pp. 153-160). IEEE. (2006, September).
  • Krishnan, R., Smith, M. D., Tang, Z., &Telang, R. "The impact of free-riding on peer-to-peer networks" In System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on (pp. 10-pp). IEEE. (2004, January).
  • Castro, M., Druschel, P., Ganesh, A., Rowstron, A., & Wallach, D. S. "Secure routing for structured peer-to-peer overlay networks". ACM SIGOPS Operating Systems Review, 36(SI), 299-314. (2002).
  • Gupta, M., Judge, P., &Ammar, M. "A reputation system for peer-to-peer networks". In Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video (pp. 144152). ACM. (2003, June).
  • Biersack, E. W., Rodriguez, P., &Felber, P. "Performance analysis of peer-to-peer networks for file distribution". In Quality of Service in the Emerging Networking Panorama (pp. 1-10). Springer Berlin Heidelberg. (2004).
  • Lehman, L. W., &Lerman, S. "Pcoord: Network position estimation using peer-to-peer measurements". In Network Computing and Applications, 2004.(NCA 2004). Proceedings. Third IEEE International Symposium on (pp. 15-24). IEEE. (2004, August).
  • Basu, A., Fleming, S., Stanier, J., Naicken, S., Wakeman, I., &Gurbani, V. K. "The state of peer-to-peer network simulators". ACM Computing Surveys (CSUR), 45(4), 46. (2013).
  • Lua, E. K., Crowcroft, J., Pias, M., Sharma, R., & Lim, S. "A survey and comparison of peer-topeer overlay network schemes". IEEE Communications Surveys and Tutorials, 7(1-4), 72-93. (2005).
  • Becker, J. U., & Clement, M. "Dynamics of illegal participation in peer-to-peer networks— why do people illegally share media files?." Journal of Media Economics, 19(1), 732. (2006).
  • Lu, J., &Callan, J. "Content-based retrieval in hybrid peer-to-peer networks." In Proceedings of the twelfth international conference on Information and knowledge management (pp. 199-206). ACM. (2003, November).
  • Amad, M., Meddahi, A., &Aïssani, D. "Peer to peer networks management survey". arXiv preprint arXiv:1203.3351. (2012).
  • Yang, M., & Yang, Y. "An efficient hybrid peertopeer system for distributed data sharing". Computers, IEEE Transactions on, 59(9), 1158-1171. (2010).
  • Maly, R. J., Mischke, J., Kurtansky, P., & Stiller, B. "Comparison of Centralized (ClientServer) and Decentralized (Peer-to-Peer) Networking.Semester thesis", ETH Zurich, Zurich, Switzerland, 1-12. (2003).
  • Yao, Z. "Understanding Churn in Decentralized Peer-to-Peer Networks", (Doctoral dissertation, Texas A&M University). (2009).
  • El-Ansary, S., &Haridi, S. "An overview of structured P2P overlay networks." (2005).
  • Fletcher, G. H., Sheth, H. A., &Börner, K. "Unstructured peer-to-peer networks: Topological properties and search performance". In Agents and Peer-to-Peer Computing (pp. 1427). Springer Berlin Heidelberg. (2005).
  • Ioannidis, S., &Marbach, P. "On the design of hybrid peer-to-peer systems". ACM SIGMETRICS Performance Evaluation Review, 36(1), 157-168. (2008).
  • Ripeanu, M. "Peer-to-peer architecture case study: Gnutella network". In Peer-to-Peer Computing, 2001. Proceedings. First International Conference on (pp. 99-100). IEEE. (2001, August).
  • Bellovin, S. "Security aspects of Napster and Gnutella". In 2001 Usenix Annual Technical Conference. (2001, June).
  • Clarke, I., Sandberg, O., Wiley, B., & Hong, T. W." Freenet: A distributed anonymous information storage and retrieval system". In Designing Privacy Enhancing Technologies (pp. 46-66). Springer Berlin Heidelberg. (2001, January).
  • Ripeanu, M., Foster, I., &Iamnitchi, A. "Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design". arXiv preprint cs/0209028. (2002).
  • Graffi, K., Gross, C., Stingl, D., Hartung, D., Kovacevic, A., & Steinmetz, R. " LifeSocial. KOM: A secure and P2P-based solution for online social networks". In Consumer Communications and Networking Conference (CCNC), 2011 IEEE (pp. 554-558). IEEE. (2011, January).
  • Cutillo, L. A., Molva, R., &Strufe, T. "Safebook: A privacy-preserving online social network leveraging on real-life trust". Communications Magazine, IEEE, 47(12), 94-101. (2009).
  • Suk, William. "ANTHROPOLOGY OF ICT: CELLULAR INTERNET, SOCIAL MEDIA, MOBILE MONEY, DECENTRALIZED ARCHITECTURE, BIG DATA." In 2015 Annual Meeting. Aaa, 2015.
  • Maniatis, P., Roussopoulos, M., Giuli, T. J., Rosenthal, D. S., & Baker, M. "The LOCKSS peer-to-peer digital preservation system". ACM Transactions on Computer Systems (TOCS), 23(1), 2-50. (2005).
  • Pouwelse, J. A., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., ...& Sips, H. J. "TRIBLER: a social‐based peer‐to‐peer system". Concurrency and Computation: Practice and Experience, 20(2), 127-138. (2008).
  • Toninelli, A., Pathak, A., &Issarny, V. "Yarta: A middleware for managing mobile social ecosystems". In Advances in Grid and Pervasive Computing (pp. 209-220). Springer Berlin Heidelberg. (2011).
  • Shakimov, A., Varshavsky, A., Cox, L. P., &Cáceres, R. "Privacy, cost, and availability tradeoffs in decentralized OSNs". In Proceedings of the 2nd ACM workshop on Online social networks (pp. 13-18). ACM. (2009, August).
  • Kourtellis, N., Finnis, J., Anderson, P., Blackburn, J., Borcea, C., &Iamnitchi, A. "Prometheus: User-controlled P2P social data management for socially-aware applications". In Middleware 2010 (pp. 212-231). Springer Berlin Heidelberg. (2010).
  • Kourtellis, N., &Iamnitchi, A. " Inferring peer centrality in socially-informed peer-to-peer systems". In Peer-to-Peer Computing (P2P), 2011 IEEE International Conference on (pp. 318-327). IEEE. (2011, August).
  • Blackburn, J., Simha, R., Kourtellis, N., Zuo, X., Ripeanu, M., Skvoretz, J., &Iamnitchi, A. " Branded with a scarlet C: cheaters in a gaming social network". In Proceedings of the 21st international conference on World Wide Web (pp. 81-90). ACM.(2012, April).
  • Scellato, S., Noulas, A., Lambiotte, R., &Mascolo, C."Socio-Spatial Properties of Online Location-Based Social Networks". ICWSM, 11, 329-336. (2011).
  • Kourtellis, N., Alahakoon, T., Simha, R., Iamnitchi, A., &Tripathi, R. " Identifying high betweenness centrality nodes in large social networks". Social Network Analysis and Mining, 1-16. (2012).
  • Zhao, B. Y., Huang, L., Stribling, J., Rhea, S. C., Joseph, A. D., &Kubiatowicz, J. D. "Tapestry: A resilient global-scale overlay for service deployment".Selected Areas in Communications, IEEE Journal on, 22(1), 4153. (2004).
  • Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., &Balakrishnan, H. "Chord: A scalable peertopeer lookup service for internet applications". In ACM SIGCOMM Computer Communication Review (Vol. 31, No. 4, pp. 149-160). ACM. (2001, August).
  • Foster, I., &Iamnitchi, A. " On death, taxes, and the convergence of peer-to-peer and grid computing". In Peer-to-Peer Systems II (pp. 118-128). Springer Berlin Heidelberg. (2003).
  • Talia, D., &Trunfio, P. "Toward a synergy between p2p and grids.Internet Computing", IEEE, 7(4), 96-95. (2003).
  • Zhao, S., Stutzbach, D., &Rejaie, R. "Characterizing files in the modern gnutella network: A measurement study". In Electronic Imaging 2006 (pp. 60710M-60710M). International Society for Optics and Photonics. (2006, January).
  • Backx, P., Wauters, T., Dhoedt, B., &Demeester, P. "A comparison of peer-to-peer architectures". In Eurescom Summit (Vol. 2002). (2002, October).
  • Saroiu, S., Gummadi, K. P., & Gribble, S. D. "Measuring and analyzing the characteristics of Napster and Gnutella hosts". Multimedia systems, 9(2), 170-184. (2003).
  • Gummadi, K. P., Dunn, R. J., Saroiu, S., Gribble, S. D., Levy, H. M., &Zahorjan, J. "Measurement, modeling, and analysis of a peer-to-peer file-sharing workload". In ACM SIGOPS Operating Systems Review (Vol. 37, No. 5, pp. 314-329). ACM. (2003, October).
  • Sen, S., & Wang, J."Analyzing peer-to-peer traffic across large networks". IEEE/ACM Transactions on Networking (ToN), 12(2), 219232. (2004).
  • Stutzbach, D., Rejaie, R., &Sen, S. "Characterizing unstructured overlay topologies in modern P2P file-sharing systems". Networking, IEEE/ACM Transactions on, 16(2), 267-280. (2008).
  • Baset, S. A., &Schulzrinne, H. "An analysis of the skype peer-to-peer internet telephony protocol". arXiv preprint cs/0412017. (2004).
  • Tewari, S., &Kleinrock, L. "Analysis of search and replication in unstructured peer-to-peer networks". In ACM SIGMETRICS Performance Evaluation Review (Vol. 33, No. 1, pp. 404405). ACM. (2005, June).
  • Ganesan, P., Bawa, M., & Garcia-Molina, H. " Online balancing of range-partitioned data with applications to peer-to-peer systems". In Proceedings of the Thirtieth international conference on Very large data bases-Volume 30(pp. 444-455). VLDB Endowment. (2004, August).
  • Zhang, C., Krishnamurthy, A., & Wang, R. Y. "Skipindex: Towards a scalable peer-to-peer index service for high dimensional data". Department of Computer Science, Princeton University, New Jersey, USA, Tech.
  • Rep, 703-04. (2004).
  • Chi, H., Zhang, Q., Jia, J., &Shen, X. “Efficient search and scheduling in P2P-based media-ondemand streaming service." Selected Areas in Communications, IEEE Journal on, 25(1), 119130. (2007).
  • Do, T. T., Hua, K. A., &Tantaoui, M. A. " P2VoD: Providing fault tolerant video-on-demand streaming in peer-to-peer environment". InCommunications, 2004 IEEE International Conference on (Vol. 3, pp. 1467-1472). IEEE. (2004, June).
  • Shahid, Muhammad Alyas, and Muhammad Sharif. "Cloud Computing Security Models, Architectures, Issues and Challenges." SmartCR 5, no. 6 (2015): 602-616.
  • Yiu, W. P., Wong, K. F., Chan, S. H., Wong, W. C., Zhang, Q., Zhu, W. W., & Zhang, Y. Q. " Lateral error recovery for media streaming in application-level multicast". Multimedia, IEEE Transactions on, 8(2), 219-232. (2006).
  • Guo, Y., Suh, K., Kurose, J., &Towsley, D. "P2Cast: peer-to-peer patching scheme for VoD service". In Proceedings of the 12th international conference on World Wide Web (pp. 301-309). ACM. (2003, May).
  • Jin, X., Cheng, K. L., & Gary Chan, S. H. "SIM: Scalable island multicast for peer-to-peer media streaming". In Multimedia and Expo, 2006 IEEE International Conference on (pp. 913-916). IEEE, (2006, July).
  • Sharif, Muhammad, NasirMehmod Butt, MudassarRaza, and Muhammad Arshad. "Distributed Virtual Disk Storage System." Control Theory and Informatics 2 (2012): 17-23.
  • Sharif, Muhammad, Aisha Azeem, and MudassarRazaWaqasHaider. "A Novel Wormhole Detection Technique for Wireless Ad Hoc Networks." International Journal of Advanced Networking and Applications 3, no. 5 (2012): 1298.
  • Imran, Noreen, SamiaRiaz, AsmaShaheen, Muhammad Sharif, and MudassarRaza. "COMPARATIVE ANALYSIS OF LINK STATE AND DISTANCE VECTOR ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKS." Science International 26, no. 2 (2014).
  • Hussain, Khalid, AkhtabHussain, Muhammad Sharif, and JunaidAhsenaliChaudhry. "Throughput Incorporated Cluster Head Election Technique for Mobile Ad Hoc Networks." Journal of Computational and Theoretical Nanoscience 13, no. 1 (2016): 736-742.
  • Amjad, Muhammad, Muhammad Sharif, Muhammad Khalil Afzal, and Sung Won Kim. "TinyOS-new trends, comparative views, and supported sensing applications: A review." IEEE Sensors Journal 16, no. 9 (2016): 2865-2889.
  • Hussain, Altaf, Faisal Azam, Muhammad Sharif, MussaratYasmin, and SajjadMohsin. "A Survey on ANN Based Task Scheduling Strategies in Heterogeneous Distributed Computing Systems." Nepal Journal of Science and Technology 16, no. 1 (2016): 69-78.
  • Shah, Jamal Hussain, Muhammad Sharif, and MudassarRaza. "Wireless USB Home Security System using Internet Technology." Research Journal of Applied Sciences, Engineering and Technology 7, no. 7 (2014): 1377-1380.
  • Raza, Mudassar, Muhammad Iqbal, Muhammad Sharif, and WaqasHaider. "A survey of password attacks and comparative analysis on methods for secure authentication." World Applied Sciences Journal 19, no. 4 (2012): 439444.
  • Sharif, Muhammad, MaryumMurtaza, WaqasHaider, and MudassarRaza. "Priority based congestion control routing in wireless mesh network." International Journal of Advanced Networking and Applications 3, no. 3 (2011): 1147.
  • Ikram, Fahad, Muhammad Sharif, and MudassarRaza. "Protecting Users against Phishing Attacks." In 7th CIIT Workshop on Research in Computing. 2008.
  • Sharif, Muhammad, and AmanUllah Khan. "Benchmarking of PVM and LAM/MPI Using OSCAR, Rocks and Knoppix Clustering Tools." World Academy of Science, Engineering and Technology International Journal of Computer, Information Science and Engineering Vol 1 (2007).
  • Ahsen, Faraz, Khalid Hussain, NylaKhadam, Muhammad Sharif, and Noor Zaman. "Identification of a Lossy Channel in Wireless Mesh Network using Conservation of flow."Journal of Information & Communication Technology Vol 1 (2007): 60-70.
  • Murtaza, Muhammad, Muhammad Sharif, MudassarRaza, and AmanUllah Khan. "A Unified Model for Computer Threat Protection (UMCTP)."
  • Masood, Anum, Muhammad Sharif, MussaratYasmin, and MudassarRaza. "Virtualization tools and techniques: Survey." Nepal Journal of Science and Technology 15, no. 2 (2015): 141-150.
  • Shahid, Muhammad Alyas, and Aisha Azeem. "Disseminating Traffic Information in Vehicular Networks." International Journal of Advanced Networking and Applications 7, no. 3 (2015): 2752.
  • Taylor, Ian J., and Andrew Harrison. From P2P and grids to services on the web: evolving distributed communities. Springer Science & Business Media, 2008.
  • Ou, Zhonghong. "Structured peer-to-peer networks: Hierarchical architecture and performance evaluation." Dissertation (2010).

Abstract Views: 184

PDF Views: 0




  • Comparative Analysis of Peer to Peer Networks

Abstract Views: 184  |  PDF Views: 0

Authors

Saleha Masood
Department of Computer Science, Comsats Institute of Information Technology, WahCantt, Pakistan
Muhammad AlyasShahid
Department of Computer Science, Comsats Institute of Information Technology, WahCantt, Pakistan
Muhammad Sharif
Department of Computer Science, Comsats Institute of Information Technology, WahCantt, Pakistan
Mussarat Yasmin
Department of Computer Science, Comsats Institute of Information Technology, WahCantt, Pakistan

Abstract


Today over the Internet, communication and computing environments are considerably and significantly becoming more and more chaotic and complex than normal classical distributed systems that have some lacking of any hierarchical control and some centralized organization. There in the emerging of Peer-to-Peer (P2P) networks overlays has become of much interest because P2P networks provide a good quality substrate to create a largescale content distribution, data sharing, and multicast applications at the application-level. P2P networks are commonly used as “file-swapping” in any network to provide support in sharing of distributed contents. For data and file sharing, a number of P2P networks have been deployed and developed. Gnutella, Fast track and Napster are three popular and commonly used P2P networking systems. In this research a broad overview of P2P networks computing is presented. This research is focusing on content sharing technologies, networks and techniques. In this research, it is also tried to emphasize on the study and analysis of popular P2P network topologies used in networking systems. This research is also focuses, identifies and describes the most common architecture models of P2P networks and compares different properties, characteristics and features of four P2P systems—Fast track, Gnutella, Open FT and Napster. In P2P organization, every peer grosses mutually the parts of the server as well of the client. By way of a client, it can demand and copy its required record files from additional peers, and in place of a server, it can offer data files to additional peers. The survey basically analyzes and outlines the basic structuring of P2P networks together with their analysis, comparison, applications, advantages, and disadvantages. The survey presents numerous organized and unstructured P2P structures.

Keywords


Peer to Peer Networks, Centralized, Distributed, Structured, Unstructured.

References