StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How P2P Network Works - Literature review Example

Cite this document
Summary
This paper 'How P2P Network Works' discusses that P2P is keeping its identity as the platform for providing extraordinary services that helps to facilitate free speech and free transfer of information.The most significant power of P2P is to offer independent infrastructure and also to provide controlled centralized system. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
How P2P Network Works
Read Text Preview

Extract of sample "How P2P Network Works"

? P2P Networks s per 1st Affiliation Dept. of organization (Line of Affiliation - optional) of organization - acronyms acceptable (line 2) City, Country (line 3) name@xyz.com – optional (line 4) I. how p2p network works There are several techniques that are used by P2P system. Here the fundamental architectural options such as degree of centralization and the structure of networks are discussed. In fact, the core challenge is to establish an overlay along with the routing skills (Yang, Yang 2010). This mechanism will be great for any high membership revenue generator business. Moreover, this is usually implemented in P2P systems. The significant solutions are provided for the present problems that are mentioned in P2P systems (RODRIGUES, DRUSCHEL 2010): Application state maintenance Application-level node coordination Content distribution In this paper, interesting techniques along with related example are discussed. II. degree of centraliztion In the stem design, the architecture of P2P system is characterized according to the presence or absence of centralized elements (RODRIGUES, DRUSCHEL 2010). The centralized P2P system may include a committed node controller that helps to manage a set of contributing nodes and control the whole system. For example, the membership as, well as the content index is maintained by the website posse by Napster. Moreover, the initial version includes Bit Torrent ‘tracker’ that helps to keep track of all the uploading and downloading content. Thus provides a set of nodes if connected by peer. The BOINC platform consist a website that help to maintain the membership and allocate other computer related task. The log in system, account management and payment is managed by the Skype that contains a centralized website. In order to transmit content or other computer applications, resource-intensive is utilized. In fact, centralized P2P system can give organic growth and plentiful resources. However, the same degree of scalability and resilience is not offered. This is due to the availability of potential bottleneck controller forms and initial attack point. The individual organization with the help of controller can easily manage the partly centralized P2P systems (RODRIGUES, DRUSCHEL 2010). III. decentralization of p2p networks There is no devoted nodes are present that are critical for the operating systems in the decentralized P2P system. In addition, the decentralized P2P system comprise no inherent bottlenecks are present. Moreover, this shortage of devoted nodes prevents the system from potential attacks, failure and legal challenges from the hackers. The nodes contain abundance of resources, high availability and publicly routable IP known as super nodes in several decentralized P2P systems. The rendez-vous point for nodes is considered as extra responsibilities of super nodes. These nodes are present behind firewalls, storing state or keeping an index of available content. In the P2P system, the super nodes can enhance the effectiveness but also it is involve in failure of nodes. IV. Distributed coordination Repeatedly, a number of nodes within the P2P application need to synchronize their activities without having a centralized administration or control. For example, the group of nodes that duplicates a specific object needs to be synchronized for the updates associated with the object. (Sianati, Abbaspour et al. 2011) One more example of a node that is seeking for a specific streaming content segment will be curious to identify the node that is received by that channel i.e. the channel that is within reach and that has adequate upstream bandwidth. In this study we will incorporate two different methods for this issue; the first techniques will be epidemic techniques in which information is scattered virally from the workstation. The second technique will be a tree based method in which distribution trees are constructed for dispersing the information (RODRIGUES, DRUSCHEL 2010). Our primary focus will be on the decentralized intersections, as the coordination can be achieved via the controller mode in partially centralized systems. Likewise, in the unstructured intersections, coordination is based on prevalent techniques. Likewise, within these protocols, the information is scattered via overlay in the same way similar to the population extension. This methodology is relatively easy and effective in terms of time required (RODRIGUES, DRUSCHEL 2010). V. challenges The agreed P2P systems stem along with independent infrastructure and centralized control poses properties to expose several expectional challenges of P2P systems. In addition, the popularity of P2P system becomes natural target for maltreatment or attack of hackers. In this paper an overview is given to describe the challenges that are faced by P2P system by the attackers and how P2P manage to defense itself from these attacks. However, some of the problems are addressed here while other remains as an open question. A. Controlling membership The P2P system includes open or loose controlled memberships. This will help the hackers to populate P2P system with nodes as P2P system does not have strong user identities. The hackers may generate many fake identities on the system (such action was termed a Sybil attack15). This way the hackers can create control over large number of ‘virtual’ peers and can overcome several types of defense against node failure. For example, a hacker who wishes to suppress the value associated with some key k from a DHT can add virtual nodes to the system until he controls all of the nodes that store replicas of the value. These nodes can then deny the existence of that key/value pair when a get operation for key k is issued. Initially, the Sybil attacks need some proof of work in order to get the proposals for example, solving a cryptographic puzzle or downloading a large file. However, these approaches minimize the rate of identities theft while making it difficult for all the hackers to do so. In addition, the Sybil can still be attacked by the hackers if they have sufficient resources to access botnet. One more solution is to provide certified identities as built a correspondence relationship among peer identity and real-world entity. Conversely, certified identities needs trust authority registration procedures that are inappropriate in some applications (RODRIGUES, DRUSCHEL 2010). B. Protecting data The characteristics of P2P system includes (RODRIGUES, DRUSCHEL 2010): Availability Durability Integrity Authenticity These features are used for data storage in download by peer or in any system. The different P2P system works differently in order to resolve the problems. C. Integrity and Authenticity By utilizing self-certifying named objects, the data integrity play a vital role for verification in the case of DHTs. In addition, DHT receives great benefit from the fact that it has the suppleness for all the values that are stored in DHT (RODRIGUES, DRUSCHEL 2010). By configuring the key equal to the value of hash within the process of put operation, the current download files can authenticate the data that is being pulled (Zhu, Hajek 2012). Likewise, this is carried out by a cryptographic hash operation for retrieving the get operation result and by comparing them to the unique key. Likewise, the workstations that are used for storing data that is mutable along with granting access to users for selecting the arbitrary name for inserting content can use signatures embedded with cryptography. These signatures will mitigate the risk for authentication and data integrity. However, there is still a requirement of managing the cryptographic keys. One of the researches says that the system that does not support data integrity is common. There is one solution to this issue of content pollution is to cast voting from the peers for data authenticity. For instance, a voting mechanism that is named as ‘Credence’ was designed and developed by the research team and it is also used by many peers in the file sharing network called as ‘Gnutella’. Although, still this issue is considered as a challenge, as Sybil attacks can compromise the voting mechanism. VI. conclusion and recommendations In this paper, the technology and tasks that are related to P2P systems are discussed. It is considered as the disturbing technology as it generates several challenges as, well as chances for the Internet, Industry and society. The most particular capacity as mentioned by P2P technology is that it helps to reduce barriers for modernization. However, the most significant power of P2P is to offer independent infrastructure and also to provide controlled centralized system. But on the other hand, it also creates fresh challenges that must be handled via technical, commercial and legal means. But one probable outcome is that P2P proves itself to bring out new ideas and quality services. However, P2P is keeping its identity as the platform for providing extraordinary services that helps to facilitate free speech and free transfer of information. The services that are famous for their viability are then converted into infrastructure based commercial services.in order to develop highly proficient and independent system, the P2P systems need to be combined traditionally. References RODRIGUES, R. and DRUSCHEL, P., 2010. Peer-to-Peer Systems. Communications of the ACM, 53(10), pp. 72-82. SIANATI, A., ABBASPOUR, M. and NOROUZI, M., 2011. Head-Tail Video Streaming Over Peer to Peer Systems. International Journal of Computer Networks & Communications, 3(2), pp. 68-81. YANG, M. and YANG, Y., 2010. An Efficient Hybrid Peer-to-Peer System for Distributed Data Sharing. IEEE Transactions on Computers, 59(9), pp. 1158-1171. ZHU, J. and HAJEK, B., 2012. Stability of a Peer-to-Peer Communication System. IEEE Transactions on Information Theory, 58(7), pp. 4693-4713. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Peer to Peer Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1474046-peer-to-peer
(Peer to Peer Research Paper Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/information-technology/1474046-peer-to-peer.
“Peer to Peer Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1474046-peer-to-peer.
  • Cited: 0 times

CHECK THESE SAMPLES OF How P2P Network Works

Peer to Peer Networks

hellip; In 90s, it has been known with different names (network computing, distributed computing).... Many in the industry consider the Peer-to-Peer network as an emerging paradigm shift, which could revolutionize the IT industry by offering better - Performance and Price/performance, Scalability, Fault Tolerance and Deployment Flexibility.... The peers communicate directly among themselves and can assume a role of provider, a consumer or a registrar depending upon what is most efficient for the network....
3 Pages (750 words) Essay

Simulation of Address Resolution Protocol

The dissertation "Simulation of Address Resolution Protocol" explains that anytime a router, needs to find the physical address of another host or router on its network, it sends an ARP query packet.... But the IP datagram must be encapsulated in a frame to be able to pass through the physical network.... This is a 16-bit field defining the type of the network on which ARP is running.... ARP can be used on any physical network....
28 Pages (7000 words) Dissertation

Copyright Law Issues

This has implications for online protection of copyright with the proliferation of the Internet and multifarious online uses involving copyrighted works.... Additionally, these acts will constitute copyright infringement if there is the copying of the “substantial part” of the copyright works....
6 Pages (1500 words) Essay

National and International Trials In Ending Violence

However, the national or local judicial system in states affected by violence (post-conflict states) has been frequently broken down and thus, their incapability to hold… In some states such as Rwanda and Mozambique, individuals have been brought to justice through the local traditional justice systems....
9 Pages (2250 words) Essay

How Norfolk Southern Corp Affects the Hampton Roads Area

nbsp; The company provides services as well as offering intermodal network in almost half of the Eastern part of the USA.... The author of the review "how Norfolk Southern Corp Affects the Hampton Roads Area" comments on the significance that the Norfolk Southern Corp has on residents of the Hampton Area....
7 Pages (1750 words) Literature review

System Security Threats and Vulnerabilities

The paper "System Security Threats and Vulnerabilities" describes that the web-based service would be achieved through distributed interactivity.... SOA, distributed infrastructure, and business process management (BPM) would be integrated for achieving meaningful and collaborative learning processes....
8 Pages (2000 words) Assignment

Peer to Peer Networking

In a peer-to-peer architecture, each workstation works as a client as well as a server.... The network technology has completely transformed all the fields of life.... In addition, when the organizations apply specific techniques on a computer network, they can follow and make use of information to facilitate make the business run efficiently (Nash, 2000, p.... The fundamental aim of this research is to provide detailed analysis and different aspects of the two most popular network technologies establishment in small construction businesses....
8 Pages (2000 words) Research Paper

What Are Bonnets and How They Work

How they Work Bonnets are formed by an assortment of bots, which are controlled by one command and control (C & C) network.... This paper "What Are Bonnets and how They Work" explores more on bonnet, their classification, how the security threat they pose has changed over the past five years....
9 Pages (2250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us