Public Peer-To-Peer Filesharing Networks’ Evaluation

Total Page:16

File Type:pdf, Size:1020Kb

Public Peer-To-Peer Filesharing Networks’ Evaluation PUBLIC PEER-TO-PEER FILESHARING NETWORKS’ EVALUATION J. Lloret Mauri1, B. Molina Moreno2, C. Palau Salvador3, M. Esteve Domingo4 Department of Communications, Polytechnic University of Valencia Camino Vera s/n, Valencia, Spain [email protected], [email protected], [email protected], [email protected] ABSTRACT • Download speed: some internal P2P network, due to Since the recent appearance of P2P file-sharing networks, its internal behaviour, are optimal for downloading many Internet users have chosen this technology to search files of reduced size. Others, however, use for programs, films, songs, etc. Their number of users is multisplitting mechanisms and permit the download growing every day due to the attractive and interesting from multiple sources, making them suitable for content type that can be found and downloaded over these obtaining larger files. networks. In this article six public architectures are analyzed, Gnutella, FastTrack, Opennap, Edonkey, MP2P These parameters are responsible for an architecture and Soulseek, tracking their evolution during a week in becoming very popular or, on the other hand, terms of connected users, number of files and size of disappearing. The above factors can make a P2P network shared files per hour. The results will be compared and more attractive to users of a specific nation due to the discussed with previous measurements taken a year ago. utilization of a specific language or even social trends [7]. These data can be used to design new network models, to It is also interesting to distinguish between a P2P network calculate their performance or to optimize new network and P2P client, the development of which must not be parameters. necessarily parallel. If a P2P client changes its P2P network, all its community users will remain using it. As KEY WORDS an example, many users have remained ‘loyal’ to the Peer-To-Peer, Evaluation, Filesharing Networks. Morpheus P2P client throughout its evolution. Sometimes the reason for changing to another newly offered P2P 1. Introduction client is its ability to simultaneously contact several networks, such as Shareaza [8] and MLDonkey [9]. Since Internet became accessible to the world, the volume of connected users has been growing up in spectacular Due to the significant social impact of P2P file-sharing fashion. Recently, the number of Internet users is networks, both industry and academia are spending time estimated to be over 580 millions with a steady growth and money analyzing several aspects of these rate of 4% [1]. In the last years, Internet has sufficiently architectures. Probably the first considerations are the matured to catch market’s attention both at home and legality of the files that are being shared [10] and the enterprise level. Besides, the recent transition to potential risks that are running both home users [11] and broadband access networks, with a current amount of 40 industry with workers using their workstations as P2P million of users worldwide [2] allows multimedia clients [12]. Furthermore, most P2P networks have not services. been designed to address security issues (authentication, file permissions and file integrity); some P2P clients even P2P filesharing is one of the P2P variants with a large include addware or spyware. Moreover, as files are often number of supporters. Many users merely interact with downloaded from unknown users, they may include some this P2P network to download files without providing any, viruses or trojans inside the files. but there are many others with the intention to share their files with the whole community without caring about the Some ISPs have observed that their networks became person who is downloading them. Those who share files rapidly congested and sometimes P2P traffic reached often have a broadband always-on connection. There are nearly 60% of the total traffic [13]. Although not so many P2P public architectures; some of them are already striking, Internet2 administrators also computed relatively old, such as Gnutella [3], FastTrack [4] and impressive results on 16 February 2004 where 10.46% of OpenNap [5], whilst others are relatively new as is the the total traffic was originated by P2P file-sharing [14]. case of BitTorrent [6]. The success of a P2P network CAIDA (Cooperative Association for Internet Data inside a user community is determined by several factors: Analysis) also shows that Internet traffic is mainly dominated by P2P file-sharing protocols and HTTP [15]. • Simplicity: a P2P network with a graphical and easy- Some articles show the average number of connected to-use P2P is always welcome. users in some architecture [16] and, sometimes, even the • Language: a P2P client with multilanguage support maximum number of users. For example, Napster reached allows a broader deployment among world wide. the number of 20 million connected users with 1,5 billion of shared files in July 2000 [17]. Other studies focus their random events such as a sudden disconnection of a attention on P2P Instant Messaging and other fields of neighbor node, whose impact is considerable and P2P development. Some papers even study the economic measurable. The total number of on-line Gnutella users cost of downloading a file analyzing the required time has been decreasing continually, from 500.000 users on [18]. The manner in which the number of connected users April 2002 to about 110.000 users on October 2003. Since is calculated is sometimes deceptive if it is solely based that date it has been increasing again to a maximum of on the amount of users that download a certain client 300.000 users in April 2004 [28]. program for a P2P architecture [11, 12]. 2.1.2. FastTrack. This architecture is the one with most In Section 2 the architectures are characterized through users and shared data. As shown on Figure 2, which starts some parameters, such as number of users, shared files on a Friday, it has a waveform whose peaks are located and total size of shared information. These values are between 20:00 and 23:00 this corresponds with USA compared and discussed with those obtained a year ago. afternoon, as it is the country that mostly contributes in the number of users. Low values of the graph are timely 2. Measurements and analysis of the associated to a USA night. The average number of architectures connected users is 3.467.918, with a maximum value of 4.178.674 and a minimum value of 2.728.360, thus In order to measure P2P parameters, we have taken one characterized through a greatest fluctuation of 21,33%. totally decentralized architecture (Gnutella [3]) and four Between February and March 2003 the FastTrack partially decentralized architectures (FastTrack [4], architecture had an average number of connected users of OpenNap [5], eDonkey [19, 20] and MP2P [21]) and a 3.897.015, with a maximum of 4.585.549 and a minimum centralized architecture (SoulSeek [22]). For the purpose of 3.328.813. Hence it follows that the number of users of this article we took measurements between February has decreased about 11%. The possible reason for that is and March 2003 for the Gnutella, FastTrack, OpenNap the creation of new P2P networks that attract users from and eDonkey architectures. Later on, we measured the older architectures. The FastTrack graph does not reveal same parameters between November 2003 and February any significant appreciation between normal working 2004. This time, however, the MP2P and SoulSeek days and weekends. architectures were also analyzed due to the increment in the number of users that they were experiencing. All the 2.1.3. OpenNap. Figure 3 shows the number of on-line Figures correspond to the most significant ones amongst users during a week, starting on a Thursday. The average all obtained data. All time values are GMT+01:00 number of simultaneously connected users is 256.003 timezone. with upper and lower limits of 376.378 and 182.188 respectively, and a highest fluctuation of 42,02%. The To take measurements of the corresponding architectures, obtained graph is very irregular. Taking each day as the most adequate clients have been selected, bearing in independent, we observe that low values of connected mind those that would provide the most information on users are obtained at night (between 0:00 and 4:00) the architecture or the highest update frequency to whereas high values are located between 18:00 and 22:00. measure the parameters. The Gnutella architecture has The main peaks are located on weekends. Comparing the been analyzed with the Limewire client [23], which has above results with those obtained a year before (between been set up with a TTL value of seven. This is the reason February and March 2003) the average number of on-line why the number of users, files and size of shared data is users in the OpenNap architecture was 395.853 with a relatively low. In the FastTrack architecture, the maximum of 463.210 and a minimum of 357.382. We can measurements have been taken with the KaZaA Lite note a decrease of 35 %. The main reason is probably that client [24]. In order to analyze OpenNap architecture, the some users have migrated to other P2P networks. Napigator client [25] has been used. The eMule client [26] has been utilized to analyze the Edonkey 2.1.4. eDonkey. Figure 4 illustrates the number of architecture. The MP2P architecture has been analyzed by connected users during a week, starting on a Monday. The means of the Blubster client [21]. Finally it has been used average number of on-line users has a value of 1.428.175 the Nicotine [27] client in order to analyze the SoulSeek and the upper and low variation margins are 1.718.201 architecture.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • The Wealth of Networks How Social Production Transforms Markets and Freedom
    Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 3 # 3 The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press Ϫ1 New Haven and London 0 ϩ1 Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 4 # 4 Copyright ᭧ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be repro- duced, in whole or in part, including illustrations, in any form (beyond that copy- ing permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Traffic Recognition in Cellular Networks
    IT 09 010 Examensarbete 30 hp March 2009 Traffic Recognition in Cellular Networks Alexandros Tsourtis Institutionen för informationsteknologi Department of Information Technology Abstract Traffic Recognition in Cellular Networks Alexandros Tsourtis Teknisk- naturvetenskaplig fakultet UTH-enheten Traffic recognition is a powerful tool that could provide valuable information about the network to the network operator. The association of additional information Besöksadress: carried by control packets in the core cellular network would help identify the traffic Ångströmlaboratoriet Lägerhyddsvägen 1 that stem from each user and acquire statistics about the usage of the network Hus 4, Plan 0 resources and aid detecting problems that only one or a small group of users experience. The program used is called TAM and it operates only on Internet traffic. Postadress: The enhancements of the program included the support for the Gn and Gi interfaces Box 536 751 21 Uppsala of the cellular network where the control traffic is transferred via the GTP and RADIUS protocols respectively. Furthermore, the program output is verified using Telefon: two other tools that operate on the field with satisfactory results and weaknesses 018 – 471 30 03 were detected on all tools studied. Finally, the results of TAM were demonstrated Telefax: with conclusions being drawn about the statistics of the network. The thesis 018 – 471 30 00 concludes with suggestions for improving the program in the future. Hemsida: http://www.teknat.uu.se/student Handledare: Tord Westholm Ämnesgranskare: Ivan Christoff Examinator: Anders Jansson IT 09 010 Tryckt av: Reprocentralen ITC Acknowledgements My thanks goes first to my supervisor in Ericsson, Tord Westholm for sug- gesting valuable comments, helping to structure the work and the presenta- tion and allowing me to take decisions concerning the project direction.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Services for Microsoft Onedrive for Business
    Service Overview SERVICES FOR MICROSOFT ONEDRIVE FOR BUSINESS Simplify where workers go for content sharing and collaboration Business Challenge ESSENTIALS Dynamic teams are constantly collaborating, which means easily Dell Technologies Consulting Services can sharing personal and team documents is a must for todays’ help you gain the most from your OneDrive innovative workers. All too often organizations have multiple content for Business investment with: repositories without a single standard for the entire workforce which • Repeatable, mature methodologies can cause frustration and impact worker productivity. designed for delivery efficiency and Simplifying where your workers go to collaborate and share content quality accelerate content migrations can boost innovation, increase productivity and more importantly • Determining and delivering the optimal worker satisfaction. For organizations who have adopted Office 365, OneDrive client deployment model as OneDrive for Business is the logical choice. But how do you part of your Windows 10 and Office 365 efficiently migrate, retire and consolidate personal and team files ProPlus initiatives from overlapping content repositories to control costs? • Security and management tuning at the It’s easy with Dell Technologies Consulting Services. We are a Gold worker, device and application level Certified Microsoft Partner with experience migrating organizations of all sizes and verticals to Office 365. • Migration and consolidation of content from a wide variety of sources • The right mix of
    [Show full text]
  • Mercy College Student Handbook Each Year and on the College’S Intranet
    STUDENT HANDBOOK 2020-2021 w w TABLE OF CONTENTS MERCY COLLEGE Soliciting or Commercial Activity .................................... 22 A Message from the President .......................................... 2 Mercy College Policies .................................................... 22 History ............................................................................... 3 Code of Student Conduct ............................................... 23 Objectives .......................................................................... 3 Code of Conduct for Residential Life Students ............... 25 Accreditations.................................................................... 4 Residential Area Guest Policy ......................................... 27 Disclaimer .......................................................................... 4 Quiet Hours Policy .......................................................... 28 General Standards of Conduct .......................................... 5 Inspections ...................................................................... 28 Notice of Non-Discrimination ............................................ 5 Fire Safety ....................................................................... 28 Sanctions for Code of Conduct Violations ...................... 29 ACADEMIC SUPPORT AND OTHER COLLEGE SERVICES Student Judicial Process ................................................. 31 Academic Advising ............................................................. 6 Division of Student Affairs ................................................
    [Show full text]
  • FASTTRACK Through FUJITSU-DEV
    FASTTRACK through FUJITSU-DEV Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA FASTTRACK through FUJITSU-DEV FASTTRACK FASTTRACK Name/CLI Keyword fasttrack Full Name FastTrack Description FastTrack is a file sharing client software that is based on peer-to-peer connection. FastTrack is used by multiple file sharing applications such as Kazaa, Grokster, iMesh, and Morpheus. Initialization: Initial the connection with FastTrack server over HTTP. Search: Searching for files in FastTrack server. Download: Download request from FastTracker server. Reference http://developer.berlios.de/projects/gift-fasttrack/ Global ID L7:57 ID 57 Known Mappings UDP Port - TCP Port - IP Protocol - IP Version IPv4 Support Yes IPv6 Support Yes Application Group fasttrack-group Category file-sharing Sub Category p2p-networking P2P Technology Yes Encrypted No Tunnel No Underlying Protocols - 2 FASTTRACK through FUJITSU-DEV FASTTRACK-STATIC FASTTRACK-STATIC Name/CLI Keyword fasttrack-static Full Name fasttrack-static Description FastTrack Traffic - KaZaA Morpheus Grokster... Reference - Global ID L7:1322 ID 1322 Known Mappings UDP Port 1214 TCP Port 1214 IP Protocol - IP Version IPv4 Support Yes IPv6 Support Yes Application Group fasttrack-group Category file-sharing Sub Category p2p-networking P2P Technology Yes Encrypted No Tunnel No Underlying Protocols - 3 FASTTRACK through FUJITSU-DEV FATSERV FATSERV Name/CLI Keyword fatserv Full Name Fatmen Server Description Fatmen Server Reference - Global ID L4:305 ID 305 Known
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • A Study of Peer-To-Peer Systems
    A Study of Peer-to-Peer Systems JIA, Lu A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Master of Philosophy in Information Engineering The Chinese University of Hong Kong August 2009 Abstract of thesis entitled: A Study of Peer-to-Peer Systems Submitted by JIA, Lu for the degree of Master of Philosophy at The Chinese University of Hong Kong in June 2009 Peer-to-peer (P2P) systems have evolved rapidly and become immensely popular in Internet. Users in P2P systems can share resources with each other and in this way the server loading is reduced. P2P systems' good performance and scalability attract a lot of interest in the research community as well as in industry. Yet, P2P systems are very complicated systems. Building a P2P system requires carefully and repeatedly thinking and ex- amining architectural design issues. Instead of setting foot in all aspects of designing a P2P system, this thesis focuses on two things: analyzing reliability and performance of different tracker designs and studying a large-scale P2P file sharing system, Xun- lei. The "tracker" of a P2P system is used to lookup which peers hold (or partially hold) a given object. There are various designs for the tracker function, from a single-server tracker, to DHT- based (distributed hash table) serverless systems. In the first part of this thesis, we classify the different tracker designs, dis- cuss the different considerations for these designs, and provide simple models to evaluate the reliability of these designs. Xunlei is a new proprietary P2P file sharing protocol that has become very popular in China.
    [Show full text]