P2P Networking and Applications

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a viable multimillion dollar business model for the distribution of academic and clinical information, telecommunications, and social networking. Written at an accessible level for any reader familiar with fundamental Internet protocols, Peer-to-Peer Networking and Applications explains the conceptual operations and architecture underlying basic P2P systems using well-known commercial systems as models. The book also delineates the latest research directions, thereby providing not only a sophisticated understanding of current systems, but also the means to improve upon these systems with innovations that will better performance, security, and flexibility. Peer-to-Peer Networking and Applications is thus both a valuable starting point and an important reference to those practioners employed by any of the 200 companies with approximately $400 million invested in this new and lucrative technology.
  • Uses well-known commercial P2P systems as models, thus demonstrating real-world applicability.
  • Discusses how current research trends in wireless networking, high-def content, DRM, etc. will intersect with P2P, allowing readers to account for future developments in their designs.
  • Provides online access to the Overlay Weaver P2P emulator, an open-source tool that supports a number of peer-to-peer applications with which readers can practice.

Author(s): John Buford, Heather Yu, Eng Keong Lua
Series: Morgan Kaufmann Series in Networking
Publisher: Morgan Kaufmann
Year: 2008

Language: English
Pages: 396

Cover Page......Page 1
Copyright Page......Page 2
Dedication......Page 3
Preface......Page 4
About the Authors......Page 7
The Rise of P2P File-Sharing Applications......Page 8
Voice over P2P (VoP2P)......Page 11
P2PTV......Page 12
P2P Overlays and Network Services......Page 15
Impact of P2P Traffic on the Internet......Page 17
P2P from the End User's Perspective......Page 18
P2P Strengths and Benefits......Page 19
The P2P Value Proposition......Page 21
Revenue Models and Revenue Collection......Page 22
P2P Application Critical Mass......Page 23
VoP2P......Page 24
File Sharing......Page 26
Social Impact......Page 28
Technology Trends Impacting P2p......Page 29
Further Reading......Page 30
The User View......Page 32
P2P Beyond the Desktop Computer......Page 33
Overlay View......Page 35
Principles of the P2P Paradigm......Page 36
Overlay......Page 38
Graph Properties......Page 40
Object Storage and Lookup......Page 41
A Design Space Perspective......Page 42
Routing Geometries and Resilience......Page 43
Churn and Maintaining the Overlay......Page 44
Locality......Page 46
An Implementation Perspective: Overlayweaver......Page 48
Summary......Page 50
For Further Reading......Page 51
Connecting Peers on a Global Scale......Page 52
Flooding and Expanding Ring......Page 53
Random Walk......Page 56
Random Graphs......Page 57
Power-Law Random Graphs......Page 58
Scale-Free Graphs and Self-Similarity......Page 59
Social Networks and the Small-World Phenomenon......Page 61
FastTrack......Page 62
Freenet......Page 63
Techniques......Page 68
Case Study: Gia......Page 69
Using Similar Interests Among Peers......Page 71
Tribler......Page 72
INGA......Page 74
Local Minima Search......Page 76
Unstructured Distributed Hash Table......Page 77
OverlayWeaver Routing Layer......Page 79
For Further Reading......Page 80
Motivation and Categories......Page 81
Roadmap for the Chapter......Page 83
PRR......Page 85
Tapestry......Page 88
P-Grid......Page 90
Pastry......Page 91
Chord......Page 92
DKS(N,k,f)......Page 94
Chord......Page 95
Features of Constant Degree Graphs......Page 97
Ulysses......Page 99
Cycloid......Page 100
Content Addressable Network (CAN)......Page 101
Kademlia......Page 103
Multihop Versus One-Hop......Page 105
OneHop......Page 106
Analytical Performance Bounds......Page 107
Measurement Through Simulation......Page 109
Surveys and Frameworks......Page 110
Routing and Geometry in Computer Networks......Page 111
Peer Churn......Page 112
Opportunistic Maintenance......Page 114
Pastry......Page 115
New Peer Joining......Page 117
Existing Peer Leaving Voluntarily......Page 118
New Peer Joining......Page 119
Peer Departing (Failure)......Page 120
Koorde......Page 121
New Peer Joining......Page 122
Cycloid......Page 123
EpiChord......Page 124
D1HT......Page 126
The Network Model......Page 128
Stochastic Model for Long-Range Connections......Page 129
Maintenance of Long-Range Connections......Page 130
Federated Overlay Topologies......Page 131
Universal Overlay......Page 133
Hierarchical Overlays......Page 134
Hierarchical Group Management......Page 135
Concentric Nested Rings......Page 136
New Peer Joining......Page 137
For Further Reading......Page 138
P2P Building Blocks......Page 140
Network Programming......Page 143
General Protocol Issues......Page 144
Unstructured Overlay: Gnutella......Page 145
BitTorrent......Page 149
Structured Overlays......Page 151
How NAT Effects P2P Connectivity......Page 153
NAT Traversal......Page 155
NAT Traversal with ICE......Page 156
Overview......Page 158
Network Capacity......Page 159
Finding a Rendezvous Peer......Page 160
Merging Partitions......Page 161
Peer Identity......Page 162
Peer Overlay......Page 163
Grouping......Page 164
Identity Management......Page 165
For Further Reading......Page 166
Overview......Page 167
Centralized Indexing......Page 168
Localized Indexing......Page 170
Hybrid Indexing......Page 171
Searching in a Flat DHT......Page 172
Discussion......Page 173
Flooding-Based Search......Page 174
Guided Search......Page 175
Hybrid-Based Approaches......Page 176
Range Queries......Page 177
Range Queries in DHTs......Page 178
Skip Graphs......Page 179
Semantic Search in Structured Overlays......Page 180
Semantic Search in Unstructured Overlays......Page 182
DiffSearch......Page 183
Content-Based Search......Page 184
For Further Reading......Page 185
Content Delivery......Page 186
Various Delivery Methods......Page 187
Topology Constraints......Page 188
Characteristics of Content Flow Control Strategy......Page 189
P2P Caching......Page 190
Data Consistency and Synchronization......Page 194
Cache Replacement Policies......Page 195
PeerOLAP......Page 196
FastTrack Cache Replacement......Page 197
Content Pull and Content Push......Page 198
Push-Pull Gossiping......Page 199
CoolStreaming......Page 200
Hybrid CDN and P2P Architectures......Page 201
Case Study......Page 202
Summary......Page 204
For Further Reading......Page 205
Popular Peercasting Applications......Page 206
Terminology......Page 207
P2p streaming......Page 209
IP Multicast vs. Overlay Multicast......Page 212
Hybrid Multicast......Page 216
Proxy-Based Overlay Multicast......Page 217
OM Groups and OM Sessions......Page 218
Group Management......Page 219
Message Dissemination......Page 221
Categorization of OM Systems......Page 222
Improving OM Performance......Page 224
Summary......Page 230
For Further Reading......Page 231
Motivation......Page 232
Basic Properties of Network Embedding......Page 237
Lipschitz Embedding......Page 239
Internet Coordinate Systems......Page 240
Systems Using Lipschitz Embedding and Matrix Factorization......Page 244
Systems Using Numerical Optimization......Page 245
Multiresolution Rings......Page 249
Ring Membership Management......Page 250
Closest-Node Discovery......Page 251
Accuracy and Overhead......Page 252
Summary......Page 255
For Further Reading......Page 256
applied......Page 257
Service Orientation......Page 259
Domain Name Service......Page 260
DDNS......Page 261
Resilient Overlay Network......Page 264
Bandwidth-Aware RON......Page 266
Overview......Page 268
OverQoS......Page 270
QRON......Page 271
Wide Area Service Discovery......Page 272
Location-Based Service Discovery......Page 273
Churn and Index Availability......Page 274
Index Load and Object Popularity......Page 276
Beehive......Page 277
Service Composition......Page 278
Summary......Page 279
For Further Reading......Page 280
From Voip to VoP2P......Page 281
VoIP Elements......Page 282
Mapping VoIP Elements to a VoP2P Overlay......Page 283
Types of Relays......Page 284
Relay Selection and Discovery......Page 285
Overview......Page 287
Dimensionality......Page 288
Example Peer Features......Page 289
Case Study: Skype......Page 291
Overview......Page 293
Hip-Hop......Page 294
Address Settlement by Peer-to-Peer......Page 296
Reload......Page 297
Summary......Page 298
For Further Reading......Page 299
Impact of Mobile Devices on P2P Overlays......Page 300
Roaming and Node Lifetime......Page 301
Growing Mobile Peer Frequency......Page 303
Mobile IP Support......Page 304
Stealth Nodes......Page 305
Bristle......Page 306
Warp......Page 307
Multihomed Peers......Page 309
Accordion......Page 310
Overview......Page 312
Mobile Hash Table......Page 313
MADPastry......Page 315
Other P2P MANET Designs......Page 316
For Further Reading......Page 318
Introduction......Page 319
Classifications of Attacks......Page 320
Classification by Target Functional Layer......Page 321
The P2P Security Gap......Page 322
Sample Attacks and Threats......Page 323
Sybil Attacks......Page 326
More on DDoS......Page 327
Cryptographic Solutions......Page 328
DoS Countermeasures......Page 329
Secure Routing in Structured P2P......Page 330
Secure nodeId Assignment......Page 331
Secure Message Forwarding......Page 332
Auditing and Incentives......Page 333
Trust and Privacy Issues......Page 334
Architecture......Page 335
Reputation......Page 336
Privacy......Page 337
Case Study: Pollution in File-Sharing Systems......Page 338
Summary......Page 339
For Further Reading......Page 340
Introduction......Page 341
Overlay Dimensions Impacting Manageability......Page 343
Managed Overlay Model......Page 345
Role of the Overlay Operator......Page 346
Service Assurance......Page 347
Managing a Resilient Overlay Network......Page 348
Managing a Distributed File Storage Service......Page 350
Integration with Peer State and Event Detection......Page 352
Reaching All Peers......Page 354
Aggregating Data Collection for Performance Management......Page 355
P2P Traffic in the ISP Network......Page 357
P4P......Page 358
For Further Reading......Page 359
Glossary......Page 361
References......Page 366