A Survey of Peer-to-Peer File Sharing Technologies

Legal Notices The information in this document is subject to change without notice. ELTRUN makes no warranty of any kind with regard to this document, including, but not limited to, the implied warranties of merchantability and fitness for its particular purpose. ELTRUN shall not be held liable for errors contained herein or direct, indirect, special, incidental or consequential damages in connection with the furnishing, performance, or use of this material. In the recent years, the evolution of a new wave of innovative network architectures labeled " peer-to-peer (p2p) " has been witnessed. Such architectures and systems are characterized by direct access between peer computers, rather than through a centralized server. The recently formed Peer-to-Peer Working Group, a consortium including industry leaders aiming at the advancement of infrastructures and best-known practices for peer-to-peer computing, defines p2p as the " sharing of computer resources by direct exchange ". Apart from resources, p2p offers a way of decentralizing administration (as well as cost). File sharing is the dominant p2p application on the Internet, allowing users to easily contribute, search and obtain content. Grid computing, which has emerged as a field distinguished from conventional computing by its focus on wide area distributed computing, large-scale resource sharing and problem solving is closely related to p2p. It is expected that there will be an even stronger convergence between them as p2p technologies become more sophisticated. P2p file sharing architectures can be classified by their " degree of centralization " , i.e. to what extent they rely to one or more servers to facilitate the interaction between peers. Three categories are identified: Purely decentralized, partially centralized and hybrid decentralized. Furthermore, highly dynamic p2p networks of peers with complex topology can be differentiated by the degree to which they contain some structure or are created ad-hoc. By structure we refer to the way in which the content of the network is located: Is there a way of directly knowing which peers contain some specific content, or does one need to " randomly " search the entire network to locate it? Three categories of systems are examined: Structured, loosely structured and unstructured. Various p2p architectures from these categories are examined with focus on the way they operate and how successfully they address issues such as scalability, network latency, security, privacy, anonymity and others. The shortcomings of these systems and the latest variations, developments and trends in p2p file sharing …

[1]  Stephen E. Deering,et al.  Host extensions for IP multicasting , 1986, RFC.

[2]  Ian H. Witten,et al.  Managing Gigabytes: Compressing and Indexing Documents and Images , 1999 .

[3]  Rajmohan Rajaraman,et al.  Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1997, SPAA '97.

[4]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[5]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[6]  Ian Foster Internet Computing and the Emerging Grid , 2000 .

[7]  Ben Y. Zhao,et al.  An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .

[8]  Stefan Saroiu,et al.  A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .

[9]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[10]  Mihajlo A. Jovanović,et al.  Modeling Large-scale Peer-to-Peer Networks and a Case Study of Gnutella , 2001 .

[11]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[12]  Ian T. Foster,et al.  Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems , 2002, IPTPS.

[13]  Scott Shenker,et al.  Can Heterogeneity Make Gnutella Scalable? , 2002, IPTPS.

[14]  Andrei Serjantov,et al.  Anonymizing Censorship Resistant Systems , 2002, IPTPS.

[15]  Ian Clarke,et al.  Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..

[16]  Randy H. Katz,et al.  SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network , 2002, Pervasive.

[17]  Steven Hazel,et al.  Achord: A Variant of the Chord Lookup Service for Use in Censorship Resistant Peer-to-Peer Publishing Systems , 2002 .

[18]  David R. Karger,et al.  Observations on the Dynamic Evolution of Peer-to-Peer Networks , 2002, IPTPS.

[19]  Robert Tappan Morris,et al.  Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer , 2002, IPTPS.

[20]  Edith Cohen,et al.  Search and replication in unstructured peer-to-peer networks , 2002, ICS '02.

[21]  Timothy Roscoe,et al.  Mnemosyne: Peer-to-Peer Steganographic Storage , 2002, IPTPS.

[22]  Hector Garcia-Molina,et al.  Peer-to-Peer Resource Trading in a Reliable Distributed System , 2002, IPTPS.

[23]  Krishna P. Gummadi,et al.  Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS , 2002, IPTPS.

[24]  Magnus Karlsson,et al.  Turning heterogeneity into an advantage in overlay routing , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[25]  Steven Tuecke,et al.  The Anatomy of the Grid , 2003 .