Peer-to-Peer Networks

Author(s):  
Nicolas Christin

Peer-to-peer networks are one of the main sources of Internet traffic, and yet remain very controversial. On the one hand, they have a number of extremely beneficial uses, such as open source software distribution, and censorship resilience. On the other hand, peer-to-peer networks pose considerable ethical and legal challenges, for instance allowing exchanges of large volumes of copyrighted materials. This chapter argues that the ethical quandaries posed by peer-to-peer networks are rooted in a conflicting set of incentives among several entities ranging from end-users to consumer electronics manufacturers. The discussion then turns to the legal, economic, and technological remedies that have been proposed, and the difficulties faced in applying them. The last part of the chapter expands the scope of ethical issues linked to peer-to-peer networks, and examines whether existing laws and technology can mitigate new threats such as inadvertent confidential information leaks in peer-to-peer networks.

2005 ◽  
Vol 114 (1) ◽  
pp. 30-39 ◽  
Author(s):  
Kate Crawford

The media debate surrounding music downloading has reached a point of unproductive polarisation. Much of the commentary from peer-to-peer companies on one hand, and from the music industry on the other, has been highly customised rhetoric. This rhetoric commonly uses a discourse of ‘us versus them’ as the limited frame of reference: industry versus pirates, or legitimate practices versus illegitimate practices. Such claims deny the complexity of both the music-sharing phenomenon and the copyright developments related to it, effectively obscuring any legal, philosophical and technical intricacies and masking the networked interrelationships between the production and consumption of creative works. This paper seeks to move beyond these oppositional terms to consider the emerging ‘technological ecologies’ of peer-to-peer networks, the role of encryption, copyright recontextualisation and the ‘mash-up’, and the emergence of what media theorist Bernard Schütze calls ‘remix culture’.


Author(s):  
Arpana George

Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. Structured peer-to-peer networks usually can provide efficient and accurate services but need to spend a lot of effort in maintaining the regular topology. On the other hand, unstructured peer-to-peer networks are extremely resilient to the frequent peer joining and leaving but this is usually achieved at the expense of efficiency. The objective of this work is to design a hybrid peer-to-peer system for distributed data sharing which combines the advantages of both types of peer-to-peer networks and minimizes their disadvantages. Also a caching scheme is proposed for the hybrid peer-to-peer system to improve the system performance.


Author(s):  
Zoltán Czirkos ◽  
Gábor Hosszú

Communication in computer networks can be organized in two different ways, according to the client/ server model and the peer-to-peer model (Spinellis & Androutsellis-Theotokis, 2004). In the client/server model, the network is centralized. There is one host on the network, the server, which provides services to its clients. Its network address is usually well-known. On the other hand, in the peer-to-peer model, there is no central point in the network. Hosts participating are sometimes called “servents” (Gnutella, 2006), as they act both as servers and as clients at the same time: they provide services to other servents, while they also use the services of others. Nodes in unstructured peer-to-peer networks usually communicate via message flooding. For example, a search request for a given file in the Gnutella network is sent to all neighboring servents. However, this solution is not scalable, and it generates a lot of unnecessary network traffic.


2008 ◽  
Vol 19 (9) ◽  
pp. 2376-2388 ◽  
Author(s):  
Zhen-Hua LI ◽  
Gui-Hai CHEN ◽  
Tong-Qing QIU

2014 ◽  
Vol 36 (7) ◽  
pp. 1456-1464 ◽  
Author(s):  
Da-Peng QU ◽  
Xing-Wei WANG ◽  
Min HUANG

2010 ◽  
Vol 33 (2) ◽  
pp. 345-355 ◽  
Author(s):  
Chun-Qi TIAN ◽  
Jian-Hui JIANG ◽  
Zhi-Guo HU ◽  
Feng LI

2012 ◽  
Vol 27 (5) ◽  
pp. 412-429 ◽  
Author(s):  
Yuanyuan Xu ◽  
Ce Zhu ◽  
Wenjun Zeng ◽  
Xue Jun Li

Sign in / Sign up

Export Citation Format

Share Document