Comparative Analysis of Peer To Peer Networks
Comparative Analysis of Peer To Peer Networks
st nd rd
1 Stage 2 Stage 3 Stage
II. RELATED WORK networks a new system named Gossip Trust is presented in
By analyzing the literature, one can say that huge work has [34]. An approach proposes a new experimental weighting
been done in the field of P2P networks. The enormous method for picking the best-expected route to create a role
growth of P2Pnetworks is proving the fact that they are centered trust series. They put on past profound heuristics
becoming the most important tool in the prospect of file to measure the route complication and to measure the
sharing [21]. Communication among the different nodes connecting competence [35]. Hybrid search in P2P
and peers together with providing security and privacy is networks is presented in [36]. Range query processing is
another important prospect in this regard [22]. one of the major applications in the domain of P2P
Configuration management of P2P networks is one of the networks; an approach handling this prospect is presented
main concepts that can be applied to a number of different in [37]. An improved Hybrid P2P approach that proposes
systems one [23]. Distribution of live streaming among the and controls the concept of boot net in P2P networks and
nodes or peers is another major field of P2P networks. the results showed that this approach is much harder to
Tree management algorithm for this purpose is proposed shutdown [38]. The concept of clustering through the use
and developed in [24].Phoenix is another approach in P2P of k-mean approach in P2P networks is presented in
networks that generates low-diameter irrepressible P2P [39].Liu et al. in[40]offered a principal approach intended
overlay network [25]. The service of lookup in P2P over for the topology discrepancy problem among unstructured
random topology can be analyzed in [26] that mainly P2P systems. The problem of resolving the mismatch
describe a search methodology deprived of obvious problem can be analyzed [41].P2P streaming through a
control of overly systems. A system named zigzag in the distributed protocol is presented in [42]. Management of
prospect of media streaming in P2P networks is another multidimensional past data in unstructured P2P networks
important area in P2P systems [27]. Another application procedure through a novel method is presented in [43].
includes evaluation of ascendable solicitation level The concept of probabilistic flooding in generalized form
multicast built through the use of P2P networks [28]. File in unstructured P2P networks is presented in [44].
sharing is the major functionality of P2Pnetworks. Heterogeneous search in the P2P networks can be
Modeling P2P networks on a number of diverse systems analyzed in [45].The structured P2P networks show a
structure is presented in [29]. Evaluation and modeling of more efficient response to the fact of fault tolerance [46].
the flexibility of P2P networks can be analyzed in [30]. The design and analysis of a protocol named Ulysses can
The analysis technique for adaptive selection centered be analyzed in [47]. The analysis of P2P network
procedures for the estimated replying of ad hoc, mobile ad properties through the use of a graph is presented in [48].
hoc and wireless ad hoc [103-105] combination inquiries Analysis of P2Psystems in the prospect of error recovery
in P2P databases is presented in [31]. Analysis of file is another important factor in the prospect of P2P networks
sharing mechanism, its modeling and improvement in Bit [49]. The impact of free riding in P2P networks resulted
Torrent can be analyzed in [32]. Another technique that, with the presence of free riding concept, P2P
presents an estimated native system aimed at categorizing networks operates more efficiently [50]. Routing or
upper liner products between sets of feature vectors in an direction finding with secure parameters in structured P2P
enormous asynchronous dispersed atmosphere like a P2P networks is presented in [51].The analysis of the
network [33]. For firm standing accumulation in P2P contribution of each peer in P2P networks is important, an
Int. J. Advanced Networking and Applications 3480
Volume: 09 Issue: 04 Pages: 3477-3491(2018) ISSN: 0975-0290
2. Decentralized
Here in decentralized there exist no central server; instead B. Depending on how the nodes are connected
each peer or node is connected to a number of different If P2P system is analyzed based on how the nodes are
nodes to get the proper services. In other words they are connected then P2P networks can be classified into two
the pure peers or super peers [62]. In Fig 4, an example of broad categories, which are structured P2P networks and
decentralized P2P network is shown. Examples: Gnutella, unstructured P2P networks. Here is a brief overview of
Bit Torrent each of the category.
i. Structured
It uses to implement algorithms in order to provide
connection surely among the nodes. The structured
systems are complex in structure but provide efficiency
[63]. Examples: DHT and Hyper Cup. The architecture of
the structured P2P network is shown in Fig 5:
2. Unstructured
It involves the arbitrary creation of nodes and each node Pure P2P Hybrid P2P Mix P2P
involved in this case has the ability to copy the
information on the link between other connected nodes Fig 7: Types of P2PNetworks
[64]. Examples in this regard involve Fast Track, A. Pure P2P Networks
Gnutella. The architecture of the unstructured P2P All nodes perform equally, it replies that there is no
network is shown in Fig 6: devoted server, all nodes act likewise. It means that all the
participating peers or nodes in a pure P2P network are
equal in logic that each node or peer act as both i.e. as a
client andas a server. There exists no central server.
Examples of pure P2P networks are Gnutella and Freenet.
The concept of pure P2P network in the Freenet
architecture can be analyzed in the Fig8:
eDonkey
Limewire Bearshare 2000
MLDonkey
eDonkey Clients
Cabos Shareaza eMule
Gnutella
Clients
aMule
Fig 11: Gnutella Clients
Fig 13: eDonkey Clients
ii. Gnutella: Analysis and Improvement
Tractability 5 Bit Torrent
Enactment & Immovability The structure of BT is centered on decentralized
Consistency architecture [76]. The files in this structure are divided
into blocks or pieces where pieces size vary from 64 KB to
3. Fast Track 4MB and provides the way to further segment out these
The structure of Fast Track is centered on Hybrid sections into 16KB blocks[77].
architecture [70]. This P2P network is controlled using The three major components of BT involve:
two tiers which are first tier and second tier. The first tier Trackers –the responsibility of this component is
basically connects nodes or peer to the super peers to track seeders, leechers and different pieces of
whereas in the second tier the super peers are connected to files from diverse users.
each other. It provides the capability to download a file Seeders – This component comprises files in
from multiple users [71]. order to share with the other nodes or peers.
Leechers – This unit has the responsibility for
i. FastTrack Clients downloading files from other nodes or peers.
The clients of Fast Track involve:
i. Features of Bit Torrent
Grokster Consumers take. Torrent files which comprise meta-
data evidence.
FastTrack iMesh Torrent collections can ensure one or numerous
followers.
Clients
Morpheus Files are taken in fragments or chunks.
Outfits file allocation equality.
Kazaa
6. Skype
Fig 12: FastTrack Clients Skype was developed by a team of software developers
including Janus Friis and NiklasZennström [78]. This
4. eDonkey structure of P2P network provides the facility of instant
It is centered on decentralized architecture [72]. It also messaging, chat, conferences, file sharing and transfer and
comprises of two tiers [73]. The first tier contains a central connects directly to the user [79].
server in order to maintain a list of files whereas the
second tier handles the file transfer property of the 7. Freenet
network. EServer and MetaMachine are the two server Freenet is a P2P podium intended for robust
software’s supported by eDonkey [74]. communication. Its structure is decentralized and in order
to hold and store data files it works with a group of free
i.eDonkey Protocol Features software. Jan Clarke designed the structure of Freenet
It uses the mechanism of Metadata in order to search together with its basic tools and designed Freenet with the
data or contents including the size of the file, the objective of offering liberty of communication with robust
available number of sources, bit rate, artist etc. [75]. privacy safeguard [80].
Provides the facility to download the same file from
numerous peers simultaneously. 8. Direct Connect
It is capable of partial data or files sharing together Direct Connect was basically written by Neo-Modus. It is
with that handle and detects the corrupted data file allocation application. The major application used in
contents within a file. Direct Connect is today. It is a centralized structure where
in order to download a file users are connected to a central
ii.eDonkey Clients hub and have the ability to download from one another.
The clients of eDonley involve: Hubs offer a variety of clients that are connected to them
Int. J. Advanced Networking and Applications 3484
Volume: 09 Issue: 04 Pages: 3477-3491(2018) ISSN: 0975-0290
[81]. Users here can chat and download files from the terminated P2P network of linked internet masses [87].
other users connected to the central hub. The procedure is bootstrapped by means of providing it
through the IP discourse of a node previously in the
B. StructuredP2P networks system and from then on via the direction-finding counter
In structured P2P networks the overlay is organized into a which is animatedly constructed and renovated. For the
specific topology, and the protocol ensures that any node reason that of its dismissed and dispersed environment,
can work efficiently. Some major systems are given there is no solitary fact of disaster and any solo node can
below. dispense the system at any period deprived of cautioning
and with slight or no chance of statistics loss. The
1. Chord procedure is similarly talented of consuming a direction-
Chord is a procedure and system designed finding metric provided by an external suite, such
forP2P dispersed hash table. A distributed hash table as chick or smidgeon way, to regulate the finest ways to
supplies fundamental consequence sets by conveying keys collect in its routing table [88].
to diverse PCs (nodes); a node will collect the principles
on behalf of all the keys for which it is accountable. Chord VI. APPLICATIONS OF P2P NETWORKS
postulates in what way keys are allotted to nodes, and by
what means a node may discern the worth aimed at a There are a number of different P2P networks
specified key through first discovering the node applications. Some of the major application involves:
accountable on behalf of that key [82].
A. File Sharing
2. CAN (Content Addressable Network) The exchange of contents, files and data are the major and
CAN is a dispersed and scattered P2P organization that most supreme zones of P2P application areas. The peer
delivers the feature of the hash table on an Internet. CAN within the network provides the surety of file sharing
was among the supreme innovative for dispersed hash focusing on storing and retrieving data to and from other
table suggestions, familiarized simultaneously by way peers within the network. Kazza and Emule are the
of Tapestry, CAD, and Pastry. optimal examples in this context [89].
Similar further dispersed hash tables, CAN are intended to
be ascendable, error accepting, and self-establishing. The B. Distributed Computing
structural scheme is a simulated Cartesian coordinate The major task is carried out by the member of the
cosmos with various dimensions and is a category of drape network which offers the resources. The application works
system on a multi-torus [83]. by providing the idle cycles to the peer or node in the
network which requires extra time for the purpose of
3. Tapestry computation. One of the best examples of such application
Tapestry is a P2P overlay network which delivers is SETI@home [90].
a dispersed hash table, direction-finding
and multicasting organization intended for dispersed C. Communication and Collaboration
applications. The Tapestry P2P structure is proposal Another major application of P2P networks is the
effectual, ascendable, and self-mending, position collaboration and communication that aims at providing a
conscious and direction-finding to neighboring system for users to communicate with each other. The
possessions [84]. application provides chat instant messaging, shared apps
and online games [91]. These applications can be used in
4.Kademlia various domains including home atmosphere, industry,
Kademlia is a dispersed hash counter on behalf of a and education. The major examples in this domain include
dispersed P2P computer systems intended by David Jabber and Groove.
Mazières and PetarMaymounkov in 2002. It states the
assembly of the system and the interchange of statistics D. Network
through the peer lookups. Kademliapeers converse among This application provides a mechanism for networking
them by means of UDP. A simulated or overlap system is such as Dales which is a P2Pweb cache for LANs, Voice
molded through the contributing peers. Every peer is Peering Fabric and Open Garden [92].
recognized by a symbol or peer ID. The ID of the
peer assists not merely as identification; however the E. Science
Kademlia process utilizes the peer ID to trace standard. In The application of P2P networks in the category of
fact, the peer ID offers a straight plot to file hashes and bioscience include biometrics and identification of drug
that peer accounts statistics on where to acquire the file or candidate lastly, there is a science net P2P search engine
resource [86]. as well [93].
5. Pastry F. Search
The pastry is a drape and direction-finding system aimed P2P also provides with some P2P architecture based
at the enactment of a dispersed hash table (DHT) search engines which include yahoo, google, ask etc. [94].
like Chord. The key-value sets are deposited in a
Int. J. Advanced Networking and Applications 3485
Volume: 09 Issue: 04 Pages: 3477-3491(2018) ISSN: 0975-0290
[10] Nazario, J., &Holz, T. "As the net churns: Fast- comparison of two popular Peer-to-Peer
flux botnet observations. In Malicious and protocols". Universidade de Victoria, 11.
Unwanted Software", 2008. MALWARE 2008. (2000).
3rd International Conference on (pp. 24-31). [22] Saboori, E., &Mohammadi, S. "Anonymous
IEEE. (2008, October). Communication in Peer-to-Peer Networks for
[11] Wang, Y., &Vassileva, J. "Trust-based providing more Privacy and Security". arXiv
community formation in peer-to-peer file preprint arXiv:1208.3192. (2012).
sharing networks". In Proceedings of the 2004 [23] Burgess, M., &Canright, G. "Scalability of peer
IEEE/WIC/ACM International Conference on configuration management in partially reliable
Web Intelligence (pp. 341-348). IEEE Computer and ad hoc networks". In Integrated Network
Society. (2004, September). Management, 2003. IFIP/IEEE Eighth
[12] Rahbar, A. G. P., & Yang, O. "Powertrust: A International Symposium on (pp. 293-305). IEEE.
robust and scalable reputation system for trusted (2003, March).
peer-to-peer computing. Parallel and Distributed [24] Padmanabhan, V. N., Wang, H. J., & Chou, P. A.
Systems", IEEE Transactions on, 18(4), 460- "Resilient peer-to-peer streaming". In Network
473. (2007). Protocols, 2003. Proceedings. 11th IEEE
[13] Zhou, R., & Hwang, K. "Gossip-based International Conference on (pp. 16-27). IEEE.
reputation aggregation for unstructured peer-to- (2003, November).
peer networks". In Parallel and Distributed [25] Wouhaybi, R. H., & Campbell, A. T. "Phenix:
Processing Symposium, 2007. IPDPS 2007. Supporting resilient low-diameter peer-to-peer
IEEE International (pp. 1-10). IEEE. (2007, topologies". In INFOCOM 2004. Twenty-third
March). AnnualJoint Conference of the IEEE Computer
[14] Lou, X., & Hwang, K. "Proactive Content and Communications Societies(Vol. 1). IEEE.
Poisoning To Prevent Collusive Piracy in P2P (2004, March).
File Sharing" IEEE Transactions on Computers [26] Ganesan, P., Sun, Q., & Garcia-Molina, H.
TC 2008. (2008). "Yappers: A peer-to-peer lookup service over
[15] J. Hu and R. Klefstad, “Decentralized Load arbitrary topology". In INFOCOM 2003. Twenty-
Balancing onUnstructured Peer-to-Peer Second Annual Joint Conference of the IEEE
Computing Grids,”Proc. Fifth IEEEInt’lSymp. Computer and Communications. IEEE
Network Computing and Applications (NCA Societies (Vol. 2, pp. 1250-1260). IEEE. (2003,
’06), July 2006. March).
[16] Zhou, R., Hwang, K., &Cai, M. "Gossiptrust for [27] Tran, D. A., Hua, K. A., & Do, T. "Zigzag: An
fast reputation aggregation in peer-to-peer efficient peer-to-peer scheme for media
networks". Knowledge and Data Engineering, streaming". In INFOCOM 2003. Twenty-Second
IEEE Transactions on, 20(9), 1282-1295. Annual Joint Conference of the IEEE Computer
(2008). and Communications. IEEE Societies (Vol. 2, pp.
[17] Antoniadis, P., & Le Grand, B."Incentives for 1283-1292). IEEE. (2003, March).
resource sharing in self-organized communities: [28] Castro, M., Jones, M. B., Kermarrec, A. M.,
From economics to social psychology". Rowstron, A., Theimer, M., Wang, H., &
In Digital Information Management, 2007. Wolman, A. (2003, April). An evaluation of
ICDIM'07. 2nd International Conference scalable application-level multicast built using
on(Vol. 2, pp. 756-761). IEEE. (2007, October). peer-to-peer overlays. In INFOCOM 2003.
[18] Mislove, A., Marcon, M., Gummadi, K. P., Twenty-Second Annual Joint Conference of the
Druschel, P., &Bhattacharjee, B. "Measurement IEEE Computer and Communications. IEEE
and analysis of online social networks". Societies(Vol. 2, pp. 1510-1520). IEEE.
InProceedings of the 7th ACM SIGCOMM [29] Ge, Z., Figueiredo, D. R., Jaiswal, S., Kurose, J.,
conference on Internet measurement(pp. 29-42). &Towsley, D. (2003, March). Modeling peer-
ACM. (2007, October). peer file sharing systems. In INFOCOM 2003.
[19] Yang, S. J., Zhang, J., Lin, L., & Tsai, J. J. " Twenty-Second Annual Joint Conference of the
Improving peer-to-peer search performance IEEE Computer and Communications. IEEE
through intelligent social search". Expert Societies (Vol. 3, pp. 2188-2198). IEEE.
Systems with Applications, 36(7), 10312-10324. [30] Van Ruitenbeek, E.; Sanders, W.H., "Modeling
(2009). Peer-to-Peer Botnets," Quantitative Evaluation
[20] Kourtellis, N., Finnis, J., Anderson, P., of Systems, 2008. QEST '08. Fifth International
Blackburn, J., Borcea, C., &Iamnitchi, A. Conference on , vol., no., pp.307,316, 14-17
"Prometheus: User-controlled P2P social data Sept. 2008 doi: 10.1109/QEST.2008.43
management for socially-aware applications". [31] Arai, B., Das, G., Gunopulos, D., &Kalogeraki,
In Middleware 2010 (pp. 212-231). Springer V. (2007). Efficient approximate query
Berlin Heidelberg. (2010). processing in peer-to-peer networks. Knowledge
[21] Howe, A. J. "Napster and Gnutella: a and Data Engineering, IEEE Transactions
Int. J. Advanced Networking and Applications 3488
Volume: 09 Issue: 04 Pages: 3477-3491(2018) ISSN: 0975-0290