scholarly journals A Survey of Search Algorithms for Peer-to-Peer File Sharing Applications in Mobile Computing Infrastructure

Author(s):  
Ajay Arunachalam ◽  
vinayakumar R

Peer-to-Peer (P2P) Networking have a lot of practical applicability’s over the years. File storage and resource sharing are few key areas among the others where such peered network architecture is widely successful. The common building block for P2P networking is to store or locate an identifiable resource, for which there are basically 3 approaches namely (1) local storage/broadcast search (2) global storage/local search (3) distributed storage/distributed search. With the development of mobile hardware and wireless technology, it further became feasible to use mobile devices in these P2P networks. This computing architecture is widely used in Mobile Ad-hoc Network (MANET) for building content sharing applications. Search algorithm and file transfer schemes are the basic components of such content sharing systems. In this article, we provide a brief overview of the resource discovery approaches for peer-to-peer file sharing applications over MANET. We analyze and classify the search techniques into 4 broad schemes, mainly the flooding-based schemes, Distributed Hash Table (DHT) based schemes, advertisement-based schemes, and social network-based schemes. The pros and cons of each technique is summarized. Further, a one-to-one comparison is done across the classes for quick interpretation. We also outline the various issues, and complications that should be taken into consideration while designing any resource discovery algorithm. Further, we briefly discuss the security threats, and present state-of-the-art countermeasures for it. Also, we highlight some important guidelines that need to be focused while designing efficient file sharing applications and services in Mobile Edge Computing (MEC) enabled networks. Comprehensive and in-depth assessments of the related approaches are presented providing clear insights for the future research directions.

2021 ◽  
Author(s):  
Ajay Arunachalam ◽  
vinayakumar R

Peer-to-Peer (P2P) Networking have a lot of practical applicability’s over the years. File storage and resource sharing are few key areas among the others where such peered network architecture is widely successful. The common building block for P2P networking is to store or locate an identifiable resource, for which there are basically 3 approaches namely (1) local storage/broadcast search (2) global storage/local search (3) distributed storage/distributed search. With the development of mobile hardware and wireless technology, it further became feasible to use mobile devices in these P2P networks. This computing architecture is widely used in Mobile Ad-hoc Network (MANET) for building content sharing applications. Search algorithm and file transfer schemes are the basic components of such content sharing systems. In this article, we provide a brief overview of the resource discovery approaches for peer-to-peer file sharing applications over MANET. We analyze and classify the search techniques into 4 broad schemes, mainly the flooding-based schemes, Distributed Hash Table (DHT) based schemes, advertisement-based schemes, and social network-based schemes. The pros and cons of each technique is summarized. Further, a one-to-one comparison is done across the classes for quick interpretation. We also outline the various issues, and complications that should be taken into consideration while designing any resource discovery algorithm. Further, we briefly discuss the security threats, and present state-of-the-art countermeasures for it. Also, we highlight some important guidelines that need to be focused while designing efficient file sharing applications and services in Mobile Edge Computing (MEC) enabled networks. Comprehensive and in-depth assessments of the related approaches are presented providing clear insights for the future research directions.


2011 ◽  
pp. 28-65 ◽  
Author(s):  
Choon Hoong Ding ◽  
Sarana Nutanong ◽  
Rajkumar Buyya

Peer-to-peer (P2P) systems are popularly used as “file swapping” networks to support distributed content sharing. A number of P2P networks for file sharing have been developed and deployed. Napster, Gnutella, and Fasttrack are three popular P2P systems. This chapter presents a broad overview of P2P computing and focuses on content sharing networks and technologies. It also emphasizes on the analysis of network topologies used in popular P2P systems. In addition, this chapter also identifies and describes architecture models and compares various characteristics of four P2P systems—Napster, Gnutella, Fasttrack, and OpenFT.


Author(s):  
Ricci S.C. Ieong ◽  
Pierre K.Y. Lai ◽  
K. P. Chow ◽  
Michael Y.K. Kwan ◽  
Frank Y.W. Law

The community of peer-to-peer (P2P) file-sharing networks has been expanding swiftly since the appearance of the very first P2P application (Napster) in 2001. These networks are famous for their excellent file transfer rates and adversely, the flooding of copyright-infringed digital materials. Recently, a number of documents containing personal data or sensitive information have been shared in an unbridled manner over the Foxy network (a popular P2P network in Chinese regions). These incidents have urged the authors to develop an investigation model for tracing suspicious P2P activities. Unfortunately, hindered by the distributed design and anonymous nature of these networks, P2P investigation can be practically difficult and complicated. In this chapter, the authors briefly review the characteristics of current P2P networks. By observing the behaviors of these networks, they propose some heuristic rules for identifying the first uploader of a shared file. Also, the rules have been demonstrated to be applicable to some simulated cases. The authors believe their findings provide a foundation for future development in P2P file-sharing networks investigation.


Author(s):  
Jerald Hughes ◽  
Karl Reiner Lang

In 1999, exchanges of digital media objects, especially files of music, came to constitute a significant portion of Internet traffic, thanks to a new set of technologies known as peer-to-peer (P2P) file-sharing systems. The networks created by software applications such as Napster and Kazaa have made it possible for millions of users to gain access to an extraordinary range of multimedia files. However, the digital product characteristics of portability and replicability have posed great challenges for businesses that have in the past controlled the markets for image and sound recordings. ‘Peer-to-peer’ is a type of network architecture in which the various nodes may communicate directly with other nodes, without having to pass messages through any central controlling node (Whinston, Parameswaran, & Susarla, 2001). The basic infrastructure of the Internet relies on this principle for fault tolerance; if any single node ceases to operate, messages can still reach their destination by rerouting through other still-functioning nodes. The Internet today consists of a complex mixture of peer-to-peer and client-server relationships, but P2P file-sharing systems operate as overlay networks (Gummadi, Saroiu, & Gribble, 2002) upon that basic Internet structure. P2P file-sharing systems are software applications which enable direct communications between nodes in the network. They share this definition with other systems used for purposes other than file sharing, such as instant messaging, distributed computing, and media streaming. What these P2P technologies have in common is the ability to leverage the combined power of many machines in a network to achieve results that are difficult or impossible for single machines to accomplish. However, such networks also open up possibilities for pooling the interests and actions of the users so that effects emerge which were not necessarily anticipated when the network technology was originally created (Castells, 2000). In a narrow sense, P2P file-sharing systems refer to applications that exchange content over computer networks where the nodes act both as client and server machines, requesting and serving files (e.g., Kazaa, BitTorrent). In a wider sense, P2P file-sharing systems also include any application that lets peer users exchange digital content among themselves (e.g., YouTube, Flickr).


2021 ◽  
Author(s):  
Ajay Arunachalam ◽  
vinayakumar R

Resource discovery is an important fundamental aspect and a crucial task in Mobile Peer-to-Peer Networks (MP2P). To compliment network dynamics and churn, the unstructured search architecture is widely used. The key goal of an efficient search scheme is to find the required resource with minimal search latency, low overhead, and low power consumption to better suit the nature of mobile nodes where resource constraints are the major bottleneck. Resource discovery thus becomes an integral part of the distributed architecture and resource sharing systems. In the past, many resource discovery strategies are proposed for Mobile P2P networks. A schematic and tabular classification of these systems enables one to review the existing works under one umbrella. This article presents an overview of such several different schemes for performing resource discovery in the MP2P network broadly classified under six different categories, i.e., centralized, unstructured, structured, super node based, hybrid, and other general lookup schemes. We also give a brief comparison of P2P, MANET, and P2P MANETs. Further, we discuss various routing schemes in such an evolving network. In this survey, we study and review the existing resource discovery techniques in MP2P systems. The classification of each scheme with their advantages and disadvantages are discussed. We highlight a few open research issues, and brief the role of network topology and its structure on the performance of the resource search protocols. Further, we also glimpse on the security threats in MP2P networks and suggest their countermeasures. And, finally, a summary of each method is given, along with their lookup complexities.


Author(s):  
Norihiro Ishikawa ◽  
Hiromitsu Sumino ◽  
Takeshi Kato ◽  
Johan Hjelm ◽  
Shingo Murakami ◽  
...  

Compared with traditional Internet technologies, peer-to-peer technologies has functions to realize resource discovery, resource sharing, and load balancing in a highly distributed manner. In addition to the Internet, new networks such as home network, ad-hoc network and sensor network are emerging. An easy prediction is the emergence of a new environment in which many sensors, people, and many different kinds of devices coexist, move, and communicate with one another over such heterogeneous networks. Peer-to-peer technology is one of the most important and suitable technologies for such ubiquitous networking since it supports discovery mechanisms, simple one-to-one communication, free and extensible distribution of resources, and distributed search to handle the enormous number of resources. The authors have designed and implemented a peer-to-peer networking platform for realizing applications, which include various applications for mobile phones. This chapter presents their peer-to-peer networking architecture, protocols, and applications for mobile phones.


2011 ◽  
pp. 225-243
Author(s):  
Vladimir Soroka ◽  
Michal Jacovi ◽  
Yoelle S. Maarek

Peer-to-peer (P2P) technology has spread through the Web over the last few years through several incarnations, ranging from search for extraterrestrial intelligence to multimedia file sharing, or resource sharing in the general sense. Collaboration systems, expert finding systems and recommender systems are all examples of resource sharing tools where the basic resource is “knowledge,” yet they are not viewed as peer-to-peer due to their centralized architecture. We claim that the process of knowledge sharing in such systems is ofter P2P, regardless of their architecture. This chapter analyzes knowledge sharing and collaboration models through the prism of P2P technology. We propose a framework for determining when knowledge sharing systems follow a P2P model, review existing collaboration and knowledge sharing systems, and verify whether they qualify as P2P under the criteria we define. We then introduce our “Second-Degree Peer-to-Peer” model for knowledge sharing and illustrate it with ReachOut, a tool for peer support and community building developed at the IBM Haifa Research Lab.


2021 ◽  
Author(s):  
Ajay Arunachalam ◽  
vinayakumar R

Resource discovery is an important fundamental aspect and a crucial task in Mobile Peer-to-Peer Networks (MP2P). To compliment network dynamics and churn, the unstructured search architecture is widely used. The key goal of an efficient search scheme is to find the required resource with minimal search latency, low overhead, and low power consumption to better suit the nature of mobile nodes where resource constraints are the major bottleneck. Resource discovery thus becomes an integral part of the distributed architecture and resource sharing systems. In the past, many resource discovery strategies are proposed for Mobile P2P networks. A schematic and tabular classification of these systems enables one to review the existing works under one umbrella. This article presents an overview of such several different schemes for performing resource discovery in the MP2P network broadly classified under six different categories, i.e., centralized, unstructured, structured, super node based, hybrid, and other general lookup schemes. We also give a brief comparison of P2P, MANET, and P2P MANETs. Further, we discuss various routing schemes in such an evolving network. In this survey, we study and review the existing resource discovery techniques in MP2P systems. The classification of each scheme with their advantages and disadvantages are discussed. We highlight a few open research issues, and brief the role of network topology and its structure on the performance of the resource search protocols. Further, we also glimpse on the security threats in MP2P networks and suggest their countermeasures. And, finally, a summary of each method is given, along with their lookup complexities.


2011 ◽  
Vol 7 (5) ◽  
pp. 16-21
Author(s):  
G.V. Poryev ◽  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document