Notes - MIECT
Redes E Sistemas Autónomos
Notes - MIECT
Redes E Sistemas Autónomos
  • Redes e Sistemas Autónomos
  • Peer-to-Peer Systems and Networks
    • Content Distribution Networks
    • Peer-to-peer networks
      • Types
    • Structured vs Unstructured
    • Fully Decentralized Information System
    • FastTrack/KaZaA
    • OpenNAP/Napster
    • BitTorrent
  • InterPlanetary File System (IPFS)
    • IPFS
      • Bitswap
    • Connecting an IPFS node to the P2P network
    • Searching in DHTs (Structured)
    • File Search
    • Security
  • Ad-Hoc Networks
    • Mobile Ad-hoc networks
    • Application Scenarios
    • Routing
      • AODV - Ad Hoc On-Demand Distance Vector Routing
      • OLSR - Optimized Link State Routing Protocol
      • LAR – Location Aided Routing
      • Batman
    • IP Address Assignment
  • Self-organized systems: Data, learning and decisions
    • Use Cases and Data
    • Machine Learning
      • Supervised Learning
      • Neural Networks
      • Reinforcement Learning
      • Unsupervised Learning: K-means
    • Learning
  • Vehicular Networks
    • Vehicular Ad Hoc Networks
    • How do they work?
    • SPAT: Signal Phase And Timing
    • MAP: MAP
    • Manoeuvre Coordination Message (MCM)
    • Communication Technologies
  • QoS and Security
    • TCP- and UDP-based applications
      • TCP-Cubic
    • QUIC
    • TCP-Vegas
    • Classification of Transport protocols
    • Exploiting Buffering Capabilities
    • QoS in UDP: trade-offs
    • Transmission Quality (Batman v.3)
    • QoS-OLSR
    • Security
      • Key Management
      • RSA (Rivest-Shamir-Adleman) Key
      • Key Management in ad-hoc networks
      • Self-organized public key management (SOPKM)
      • Self-securing ad-hoc wireless networks (SSAWN)
Powered by GitBook
On this page
  • The Web Model
  • The P2P Model
  • Advantages
  • Applications
  • Challenges
  1. Peer-to-Peer Systems and Networks

Peer-to-peer networks

PreviousContent Distribution NetworksNextTypes

Last updated 2 years ago

Exploits diverse connectivity between participants in a network.

Exploits the cumulative bandwidth of network participants.

Typically used for connecting nodes via large ad-hoc connections.

  • Sharing content files containing audio, video, and data.

  • Even real-time data, such as telephony traffic, is also passed using P2P technology.

Pure peer-to-peer network.

  • There is no notion of clients or servers.

  • Equal peer nodes that simultaneously work as both "clients" and "servers" to the other nodes on the network.

The Web Model

Contact a server and download a web page.

The server has all the resources and capabilities.

The P2P Model

A peer’s resources are similar to the resources of the other participants.

P2P – peers communicating directly with other peers and sharing resources.

P2P services.

  • Distributed Computing.

  • File Sharing.

  • Collaboration.

Advantages

Clients provide resources, including bandwidth, storage space, and computing power.

As nodes arrive and demand on the system increases, the total capacity of the system also increases.

Distributed nature also increases robustness in case of failures by replicating data over multiple peers.

  • Enable peers to find the data without relying on a centralized index server.

Applications

  • File sharing

    • Using application layer protocols.

      • DirectConnect (centralized), Gnutella (flooding), BitTorrent (hybrid)

  • VoIP

    • Using application layer protocols.

      • SIP

  • Streaming media.

  • Instant messaging.

  • Software publication and distribution.

  • Media publication and distribution.

  • Radio, video.

Challenges

Peer discovery and group management.

Data location, searching, and placement.

  • Search and routing.

Reliable and efficient file delivery.

Security/privacy/anonymity/trust.