Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2020

21.12.2019

Next level peer-to-peer overlay networks under high churns: a survey

verfasst von: Ashika R. Naik, Bettahally N. Keshavamurthy

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Peer-to-Peer (P2P) technology has seen a remarkable progress due to its decentralized and distributed approach. A wide range of applications such as social networking, file sharing, long range interpersonal communication etc. are carried out with ease by employing P2P protocol candidates. There exists a huge span of such P2P protocols. In this paper, we review advanced protocols like ZeroNet, Dat, Ares Galaxy, Accordion etc. evolved from classic peer-to-peer (P2P) overlay networks. We utilize term classic to allude protocols like Chord, Pastry, Tapestry, Kademlia, BitTorrent, Gnutella, Gia, NICE etc. While coming to their design, several challenges existed with classic approach under high churn environment with growing network communication rate. To address these multifaceted network issues with classic P2P systems, novel approaches evolved which helped researchers to built new application layer networks on existing P2P networks. We contribute in this paper by systematically characterizing next-level P2P (NL P2P) and examining their key concepts. Arrangement of distributed networks is completed by numerous analysts, which incorporates classic P2P systems. In this work, we therefore aim to make a further stride by deliberately talking about protocols created from classic P2P systems, and their performance comparison in dynamically changing environment. Different aspects of P2P overlay frameworks like routing, security, query, adaptation to non-critical failure and so forth dependent on developed conventions are additionally examined. Further, based on our review and study we put forward some of the exploring challenges with NL P2P frameworks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ktari S, Hecker A (2011) A peer-to-peer social network overlay for efficient information retrieval and diffusion. In: Park JJ, Yang LT, Lee C (eds) Future information technology. Communications in Computer and Information Science, vol 185. Springer, Berlin, Heidelberg Ktari S, Hecker A (2011) A peer-to-peer social network overlay for efficient information retrieval and diffusion. In: Park JJ, Yang LT, Lee C (eds) Future information technology. Communications in Computer and Information Science, vol 185. Springer, Berlin, Heidelberg
2.
Zurück zum Zitat Popescu A (2005) routing in overlay networks: developments and challenges. IEEE Global Communication Letter, IEEE Communications Magazine 43(8) Popescu A (2005) routing in overlay networks: developments and challenges. IEEE Global Communication Letter, IEEE Communications Magazine 43(8)
3.
Zurück zum Zitat Kamel M, Scoglio C, Easton T (2007) Optimal Topology Design for Overlay Networks. In: Akyildiz IF, Sivakumar R, Ekici E, Oliveira JC, McNair J (eds) Networking. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet. Lecture Notes in Computer Science, vol 4479. Springer, Berlin, Heidelberg Kamel M, Scoglio C, Easton T (2007) Optimal Topology Design for Overlay Networks. In: Akyildiz IF, Sivakumar R, Ekici E, Oliveira JC, McNair J (eds) Networking. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet. Lecture Notes in Computer Science, vol 4479. Springer, Berlin, Heidelberg
5.
Zurück zum Zitat Malatras A (2015) State-of-the-art survey on P2P overlay networks in pervasive computing environments. J Netw Comput Appl 55:1-23CrossRef Malatras A (2015) State-of-the-art survey on P2P overlay networks in pervasive computing environments. J Netw Comput Appl 55:1-23CrossRef
8.
Zurück zum Zitat Kunzmann G (2005) “Iterative or Recursive Routing? Hybrid!,” In KIVS, Kurzbeiträge und Workshop der 14. GI/ITG- Fachtagung in Kaiserslautern, vol. P-61 of Lecture Notes in Informatics (LNI) Kunzmann G (2005) “Iterative or Recursive Routing? Hybrid!,” In KIVS, Kurzbeiträge und Workshop der 14. GI/ITG- Fachtagung in Kaiserslautern, vol. P-61 of Lecture Notes in Informatics (LNI)
9.
Zurück zum Zitat Cohen B (2003) Incentives build robustness in BitTorrent. Workshop on economics of PeertoPeer systems.6 Cohen B (2003) Incentives build robustness in BitTorrent. Workshop on economics of PeertoPeer systems.6
14.
Zurück zum Zitat Rowstron A, Druschel P (2001) Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui R (ed) Middleware. Lecture notes in computer science, vol 2218. Springer, Berlin, Heidelberg Rowstron A, Druschel P (2001) Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui R (ed) Middleware. Lecture notes in computer science, vol 2218. Springer, Berlin, Heidelberg
15.
Zurück zum Zitat Maymounkov P, Mazières D (2002) Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel P, Kaashoek F, Rowstron A (eds) Peer-to-peer systems. Lecture notes in computer science, vol 2429. Springer, Berlin, Heidelberg Maymounkov P, Mazières D (2002) Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel P, Kaashoek F, Rowstron A (eds) Peer-to-peer systems. Lecture notes in computer science, vol 2429. Springer, Berlin, Heidelberg
17.
Zurück zum Zitat Urdaneta G et al (2011) A survey of DHT security techniques. ACM Comput Survey (CSUR) 43:8:1-8:49CrossRef Urdaneta G et al (2011) A survey of DHT security techniques. ACM Comput Survey (CSUR) 43:8:1-8:49CrossRef
18.
Zurück zum Zitat Swamy N, Frangiadakis N, Bitsakos K (2019) A Distributed Algorithm for Constructing a Generalization of de Bruijn Graphs Swamy N, Frangiadakis N, Bitsakos K (2019) A Distributed Algorithm for Constructing a Generalization of de Bruijn Graphs
19.
Zurück zum Zitat Richa A, Scheideler C, Stevens P (2011) Self-stabilizing De Bruijn networks. In: Défago X, Petit F, Villain V (eds) Stabilization, safety, and security of distributed systems. SSS. Lecture notes in computer science, vol 6976. Springer, Berlin, Heidelberg Richa A, Scheideler C, Stevens P (2011) Self-stabilizing De Bruijn networks. In: Défago X, Petit F, Villain V (eds) Stabilization, safety, and security of distributed systems. SSS. Lecture notes in computer science, vol 6976. Springer, Berlin, Heidelberg
20.
Zurück zum Zitat Zhang J, Su J, Wu D (2017), Poster: A Novel P2P-over-Zeronet Anonymous Communication Platform, 38th IEEE Symposium on Security and Privacy Zhang J, Su J, Wu D (2017), Poster: A Novel P2P-over-Zeronet Anonymous Communication Platform, 38th IEEE Symposium on Security and Privacy
25.
Zurück zum Zitat Kolenbrander F, Le-Khac N-A, Kechadi T (2016) Forensic analysis of Ares galaxy peer-to-peer network, 11th annual adfsl conference on digital forensics, Security and Law At: Florida, USA Kolenbrander F, Le-Khac N-A, Kechadi T (2016) Forensic analysis of Ares galaxy peer-to-peer network, 11th annual adfsl conference on digital forensics, Security and Law At: Florida, USA
28.
Zurück zum Zitat Dori A (2016) “The future of Ransomware-ZeroNet protocol” threat intelligence and research Dori A (2016) “The future of Ransomware-ZeroNet protocol” threat intelligence and research
29.
Zurück zum Zitat Belzarena P, Sena GG, Amigo I, Vaton S: SDN-based overlay networks for qos-aware routing. In: proceedings of the 2016 workshop on fostering Latin-American research in data communication networks, LANCOMM ‘16, pp. 19-21. ACM, New York, NY, USA. https://doi.org/10.1145/2940116.2940121 Belzarena P, Sena GG, Amigo I, Vaton S: SDN-based overlay networks for qos-aware routing. In: proceedings of the 2016 workshop on fostering Latin-American research in data communication networks, LANCOMM ‘16, pp. 19-21. ACM, New York, NY, USA. https://​doi.​org/​10.​1145/​2940116.​2940121
30.
Zurück zum Zitat Kaashoek MF, Karger DR (2003) Koorde: a simple degree-optimal distributed hash table. In: Kaashoek MF, Stoica I (eds) Peer-to-peer systems II. IPTPS. Lecture notes in computer science, vol 2735. Springer, Berlin, Heidelberg Kaashoek MF, Karger DR (2003) Koorde: a simple degree-optimal distributed hash table. In: Kaashoek MF, Stoica I (eds) Peer-to-peer systems II. IPTPS. Lecture notes in computer science, vol 2735. Springer, Berlin, Heidelberg
32.
Zurück zum Zitat Li J, Stribling J, Morris R, Frans Kaashoek M (2005). Bandwidth-efficient Management of DHT Routing Tables. Proceeding NSDI’05 Proceedings of the 2nd conference on Symposuim on Networked systems Design & Implementation -Volume 2 pp 99-114 Li J, Stribling J, Morris R, Frans Kaashoek M (2005). Bandwidth-efficient Management of DHT Routing Tables. Proceeding NSDI’05 Proceedings of the 2nd conference on Symposuim on Networked systems Design & Implementation -Volume 2 pp 99-114
38.
Zurück zum Zitat J. Chen, S. Grottke, J. Sablatnig, R. Seiler and A. Wolisz, "Scalability of a distributed virtual environment based on a structured peer-to-peer architecture," 2011 Third International Conference on Communication Systems and Networks (COMSNETS), Bangalore, 2011, pp.1-8. https://doi.org/10.1109/COMSNETS.2011.5716424 J. Chen, S. Grottke, J. Sablatnig, R. Seiler and A. Wolisz, "Scalability of a distributed virtual environment based on a structured peer-to-peer architecture," 2011 Third International Conference on Communication Systems and Networks (COMSNETS), Bangalore, 2011, pp.1-8. https://​doi.​org/​10.​1109/​COMSNETS.​2011.​5716424
40.
Zurück zum Zitat Gai A-T, Viennot L. Broose: A Practical Distributed Hash table Based on the De-Brujin Topology. [Research Report] RR- 5238, INRIA. 2004, pp.16. <inria-00070760> Gai A-T, Viennot L. Broose: A Practical Distributed Hash table Based on the De-Brujin Topology. [Research Report] RR- 5238, INRIA. 2004, pp.16. <inria-00070760>
41.
Zurück zum Zitat Bhagwan R, Savage S, Voelker GM (2003) Understanding Availability. In: Kaashoek MF, Stoica I (eds) Peer-to-Peer Systems II. IPTPS 2003. Lecture notes in computer science, vol 2735. Springer, Berlin, Heidelberg Bhagwan R, Savage S, Voelker GM (2003) Understanding Availability. In: Kaashoek MF, Stoica I (eds) Peer-to-Peer Systems II. IPTPS 2003. Lecture notes in computer science, vol 2735. Springer, Berlin, Heidelberg
44.
Zurück zum Zitat Qiao Y, Bustamante FE (2006) “Structured and unstructured overlays under the microscope: a measurement-based view of two P2P systems that people use.” USENIX Annual Technical Conference, General Track Qiao Y, Bustamante FE (2006) “Structured and unstructured overlays under the microscope: a measurement-based view of two P2P systems that people use.” USENIX Annual Technical Conference, General Track
48.
Zurück zum Zitat GauthierDickey C, Lo V, Zappala D (2005) “Using n-trees for scalable event ordering in peer-to-peer games”, Proceedings of the international workshop on Network and operating systems support for digital audio and video, Stevenson, Washington, USA. https://doi.org/10.1145/1065983.1066005 GauthierDickey C, Lo V, Zappala D (2005) “Using n-trees for scalable event ordering in peer-to-peer games”, Proceedings of the international workshop on Network and operating systems support for digital audio and video, Stevenson, Washington, USA. https://​doi.​org/​10.​1145/​1065983.​1066005
51.
Zurück zum Zitat Backhaus H, Krause S (2007) Voronoi-based adaptive scalable transfer revisited: gain and loss of a Voronoi-based peer-to- peer approach for MMOG. 49-54. 6th ACM SIGCOMM workshop on Network and system support for games (NetGames0, Melbourne, Australia. https://doi.org/10.1145/1326257.1326266 Backhaus H, Krause S (2007) Voronoi-based adaptive scalable transfer revisited: gain and loss of a Voronoi-based peer-to- peer approach for MMOG. 49-54. 6th ACM SIGCOMM workshop on Network and system support for games (NetGames0, Melbourne, Australia. https://​doi.​org/​10.​1145/​1326257.​1326266
55.
Zurück zum Zitat Srivatsa M, Liu L (2004) Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In ACSAC ‘04: Proc. 20th Annual Computer Security Applications Conf., pages 252-261. IEEE Computer Society Srivatsa M, Liu L (2004) Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In ACSAC ‘04: Proc. 20th Annual Computer Security Applications Conf., pages 252-261. IEEE Computer Society
Metadaten
Titel
Next level peer-to-peer overlay networks under high churns: a survey
verfasst von
Ashika R. Naik
Bettahally N. Keshavamurthy
Publikationsdatum
21.12.2019
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00839-8

Weitere Artikel der Ausgabe 3/2020

Peer-to-Peer Networking and Applications 3/2020 Zur Ausgabe