{"id":28,"date":"2007-02-28T02:20:59","date_gmt":"2007-02-28T02:20:59","guid":{"rendered":"http:\/\/shirishranjit.com\/blog1?page_id=28"},"modified":"2015-07-25T09:19:41","modified_gmt":"2015-07-25T13:19:41","slug":"peer-to-peer-p2p-networking","status":"publish","type":"page","link":"https:\/\/shirishranjit.com\/blog1\/big-data\/peer-to-peer-p2p-networking","title":{"rendered":"Peer-to-Peer (P2P) Networking"},"content":{"rendered":"<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Peer-to-Peer (P2P) Networking<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">By Shirish Ranjit<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Peer-to-Peer Networking has been a topic of research in the networking community focusing on networking for collaborative use of computing resources. The collaborations include file sharing, storage resource sharing, and CPU resource sharing.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">The Communications of the ACM devoted the first half of the February 2003 issue on the P2P Networking articles. This is an indication of the importance of the topic in the industry. The special issue had viewpoints, survey articles, and a few technical articles. We discuss few of those articles below.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">The viewpoint by <span style=\"color: #231f20;\">Schoder and Fischbach presented P2P networking and also raised issues of network control, costs, security, interoperability, and metadata. In the paper, we raise those issues and discuss mitigating strategies.<\/span><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Agre discussed socio-economic and political impacts due to the use of P2P networking. Agre presented four theories of relationship between political institutions, socio-economic structures, and information technology. He especially cited <span style=\"color: #231f20;\">Thorstein Veblen, a Norweigian-American economist, and Friedrich Hayek, an Austrian economist, in presenting his arguments on changes that can be brought about by P2P computing. It is conceivable that the P2P architecture can not only revolutionize how information is managed but also revolutionize our socio-economic and political institutions.<\/span><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Kubiatowicz discussed perils and problems associated with P2P computing. He drew a parallel with thermodynamic system design. He made an argument that the P2P system seemed chaotic as a thermodynamic system but it is manageable as long as we solve the issues relating to P2P systems such as latency, security, scalability, and availability. Those are the central issues in any P2P system, and we also discuss them in our design and implementation chapters.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<p class=\"MsoBodyText\"><span style=\"font-size: 10pt; font-family: Verdana;\">Balakrishnan et al. were working to develop algorithmic building blocks for P2P systems. They discussed their own and other researchers\u00e2\u20ac\u2122 algorithms for performing distributed lookup. P2P file sharing and storing systems\u00e2\u20ac\u2122 designers can use these algorithms with assurance about scalability of the lookup function compared to non-scaling approaches in some grass-roots P2P implementations. The implementation of these algorithms was made easier by the authors\u00e2\u20ac\u2122 pointers to reference implementation toolkits. <\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">In a Peer-to-Peer networks article, Geoffrey gave an overview of P2P networking, describing P2P features, technologies, and challenges. The article gave examples including Napster, <a href=\"mailto:SETI@HOME\">SETI@HOME<\/a>, and Instant-messengers. The article contained many pointers to P2P sites for file sharing and P2P resource sites.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">The article presents architecture of an infrastructure for a P2P computing environment. It discusses a common P2P middleware architecture. First, the article presents basic requirements:<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<ul style=\"margin-top: 0in;\" type=\"disc\">\n<li class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Lack of trust: Access must be granted to members.<\/span><\/li>\n<li class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Hardware heterogeneity: Hardware is of different types.<\/span><\/li>\n<li class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Software heterogeneity: The infrastructure should be able to integrate any type of software.<\/span><\/li>\n<li class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Network heterogeneity: The networks connecting peers differ in bandwidth and latency.<\/span><\/li>\n<li class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Scale: Members can be as few as two or as many as millions.<\/span><\/li>\n<li class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Intermittency: The systems and configuration are not fixed and static.<\/span><\/li>\n<li class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Location: Location of peers does not matter.<\/span><\/li>\n<li class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Autonomy: Peers do not have to know about each other to achieve a goal.<\/span><\/li>\n<li class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Local policies: A sub-group of peers may create policies to protect information.<\/span><\/li>\n<li class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">Distance: Geographical distance is not an issue in the community.<\/span><\/li>\n<\/ul>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">The article explains how the basic requirements give rise to a common architecture for a P2P networking. It makes the case by discussing the application and issues with each category of P2P application. <\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Verdana;\">\u00c2\u00a0<\/span><\/p>\n<div class=\"twttr_buttons\"><div class=\"twttr_twitter\">\n\t\t\t\t\t<a href=\"http:\/\/twitter.com\/share?text=Peer-to-Peer+%28P2P%29+Networking\" class=\"twitter-share-button\" data-via=\"\" data-hashtags=\"\"  data-size=\"default\" data-url=\"https:\/\/shirishranjit.com\/blog1\/big-data\/peer-to-peer-p2p-networking\"  data-related=\"\" target=\"_blank\">Tweet<\/a>\n\t\t\t\t<\/div><div class=\"twttr_followme\">\n\t\t\t\t\t\t<a href=\"https:\/\/twitter.com\/shiranjit\" class=\"twitter-follow-button\" data-size=\"default\"  data-show-screen-name=\"false\"  target=\"_blank\">Follow me<\/a>\n\t\t\t\t\t<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Peer-to-Peer (P2P) Networking \u00c2\u00a0 By Shirish Ranjit \u00c2\u00a0 Peer-to-Peer Networking has been a topic of research in the networking community focusing on networking for collaborative use of computing resources. The collaborations include file sharing, storage resource sharing, and CPU resource &hellip; <a href=\"https:\/\/shirishranjit.com\/blog1\/big-data\/peer-to-peer-p2p-networking\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":396,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-28","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/shirishranjit.com\/blog1\/wp-json\/wp\/v2\/pages\/28"}],"collection":[{"href":"https:\/\/shirishranjit.com\/blog1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/shirishranjit.com\/blog1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/shirishranjit.com\/blog1\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shirishranjit.com\/blog1\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":1,"href":"https:\/\/shirishranjit.com\/blog1\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"predecessor-version":[{"id":1009,"href":"https:\/\/shirishranjit.com\/blog1\/wp-json\/wp\/v2\/pages\/28\/revisions\/1009"}],"up":[{"embeddable":true,"href":"https:\/\/shirishranjit.com\/blog1\/wp-json\/wp\/v2\/pages\/396"}],"wp:attachment":[{"href":"https:\/\/shirishranjit.com\/blog1\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}