Abstract
The aim of this chapter is to introduce first the basic concepts, terminology, and notation we use throughout this book. Although the term “structure” is central in our discussion on structured P2P networks, its definition is quite fuzzy in recent P2P literature. Secondly, the chapter aims at common understanding about intuition and reasons behind this term. The description is assisted with introduction to a set of challenging problems that the P2P networking faces today.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
We do not specify such details like “in the worst case”, “with high probability”, or “expected” since they are minor in this high-level discussion.
- 2.
- 3.
- 4.
- 5.
- 6.
References
Abraham, I., Malkhi, D., Manku, G.S.: Papillon: Greedy routing in rings. In: DISC ’05: Proceedings of 19th International Conference on Distributed Computing. Lecture Notes in Computer Science, vol. 3724, pp. 514–515. Springer, Berlin (2005)
Aperjis, C., Freedman, M.J., Johari, R.: Bilateral and multilateral exchanges for peer-assisted content distribution. IEEE/ACM Trans. Netw. (2011). doi: http://dx.doi.org/10.1109/TNET.2011.2114898 19(5):1290–1303
Artigas, M.S., Lopez, P.G., Ahullo, J.P., Skarmeta, A.F.G.: Cyclone: A novel design schema for hierarchical DHTs. In: IEEE P2P ’05: Proceedings of 5th International Conference on Peer-to-Peer Computing, pp. 49–56. IEEE Computer Society, USA (2005). doi: http://dx.doi.org/10.1109/P2P.2005.5
Aspnes, J., Shah, G.: Skip graphs. In: SODA ’03: Proceedings of 14th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 384–393. Society for Industrial and Applied Mathematics, USA (2003)
Balakrishnan, H., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I.: Looking up data in P2P systems. Commun. ACM, USA 46(2), 43–48 (2003). doi: http://doi.acm.org/10.1145/606272.606299
Bharambe, A.R., Herley, C., Padmanabhan, V.N.: Analyzing and improving a BitTorrent network’s performance mechanisms. In: Proceedings of IEEE INFOCOM’06, pp. 2884–2895. IEEE (2006)
Bickson, D., Malkhi, D.: A unifying framework of rating users and data items in peer-to-peer and social networks. Peer-to-Peer Netw. Appl. 1, 93–103 (2008)
Birman, K.P.: Reliable Distributed Systems: Technologies, Web Services, and Applications. Springer New York Inc., Secaucus (2005)
Buford, J.F., Yu, H., Lua, E.K.: P2P Networking and Applications. Elsevier, Amsterdam (2009)
Castro, M., Drushel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: Proceedings of 5th USENIX Symposium on Operating System Design and Implementation (OSDI 2002), pp. 299–314. ACM, Boston (2002)
Cohen, B.: Incentives build robustness in BitTorrent. In: Proceedings of 1st Workshop on Economics of Peer-to-Peer Systems (2003)
Feldman, M., Chuang, J.: Overcoming free-riding behavior in peer-to-peer systems. ACM SIGecom Exch. 5(4), 41–50 (2005). doi: http://doi.acm.org/10.1145/1120717.1120723
Fonseca, P., Rodrigues, R., Gupta, A., Liskov, B.: Full-information lookups for peer-to-peer overlays. IEEE Trans. Parallel Distrib. Syst. 20(9), 1339–1351 (2009)
Freedman, M.J., Mazières, D.: Sloppy hashing and self-organizing clusters. In: IPTPS ’03: Proceedings of 2nd International Workshop on Peer-to-Peer Systems. Lecture Notes in Computer Science, vol. 2735, pp. 45–55. Springer, Berlin (2003)
Gai, A.T., Viennot, L.: Broose: A practical distributed hashtable based on the De-Bruijn topology. In: Proceedings of IEEE 4th International Conference on Peer-to-Peer Computing (P2P’04), pp. 167–164. IEEE Computer Society, USA (2004). doi: http://dx.doi.org/10.1109/P2P.2004.10
Ganesan, P., Gummadi, K., Garcia-Molina, H.: Canon in G major: Designing DHTs with hierarchical structure. In: ICDCS ’04: Proceedings of 24th International Conference on Distributed Computing Systems, pp. 263–272. IEEE Computer Society (2004)
Garcés-Erice, L., Biersack, E., Felber, P.A., Ross, K.W., Urvoy-Keller, G.: Hierarchical peer-to-peer systems. In: Euro-Par 2003: Proceedings of ACM/IFIP International Conference on Parallel and Distributed Computing, ACM/IFIP pp. 643–657 (2003)
Garcés-Erice, L., Ross, K.W., Biersack, E.W., Felber, P., Urvoy-Keller, G.: Topology-centric look-up service. In: Proceedings of 5th International Conference on Group Communications and Charges (NGC 2003), Workshop on Networked Group Communication. Lecture Notes in Computer Science, vol. 2816, pp. 58–69. Springer, Berlin (2003)
Guisheng, Y., Jie, S., Xianghui, W.: Hierarchical small-world P2P networks. In: ICICSE ’08: Proceedings of International Conference on Internet Computing in Science and Engineering, pp. 452–458. IEEE Computer Society (2008). doi: http://dx.doi.org/10.1109/ICICSE.2008.94
Gummadi, K., Gummadi, R., Gribble, S., Ratnasamy, S., Shenker, S., Stoica, I.: The impact of DHT routing geometry on resilience and proximity. In: Proceedings of of ACM SIGCOMM’03, pp. 381–394. ACM, New York (2003). doi: http://doi.acm.org/10.1145/863955.863998
Gupta, A., Liskov, B., Rodrigues, R.: Efficient routing for peer-to-peer overlays. In: Proceedings of 1st Symposium on Networked Systems Design and Implementation (NSDI’04) (2004). URL: citeseer.ist.psu.edu/gupta04efficient.html
Gupta, I., Birman, K., Linga, P., Demers, A., van Renesse, R.: Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead. In: IPTPS ’03: Proceedings of 2nd International Workshop on Peer-to-Peer Systems. Lecture Notes in Computer Science, vol. 2735, pp. 160–169. Springer, New York (2003)
Harvey, N.J.A., Jones, M.B., Saroiu, S., Theimer, M., Wolman, A.: SkipNet: a scalable overlay network with practical locality properties. In: USITS’03: Proceedings of 4th USENIX Symposium on Internet Technologies and Systems. USENIX Association (2003)
Hildrum, K., Kubiatowicz, J.: Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks. In: Proceedings of 17th International Symposium on Distributed Computing (DISC ’03), Springer Berlin, Heidelberg, pp. 321–336 (2003)
Joung, Y.J., Wang, J.C.: Chord2: A two-layer chord for reducing maintenance overhead via heterogeneity. Comput. Commun. 51(3), 712–731 (2007)
Jun, S., Ahamad, M.: Incentives in BitTorrent induce free riding. In: Proceedings of 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, P2PECON ’05, pp. 116–121. ACM, New York (2005). doi: http://doi.acm.org/10.1145/1080192.1080199
Kaashoek, M.F., Karger, D.R.: Koorde: A simple degree-optimal distributed hash table. In: IPTPS ’03: Proceedings of 2nd International Workshop on Peer-to-Peer Systems. Lecture Notes in Computer Science, vol. 2735, pp. 98–107. Springer, Berlin (2003)
Karger, D., Lehman, E., Leighton, T., Panigrahy, R., Levine, M., Lewin, D.: Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web. In: STOC ’97: Proceedings of 29th Annual ACM Symposium on Theory of computing, pp. 654–663. ACM, New York (1997). doi: http://doi.acm.org/10.1145/258533.258660
Karger, D.R., Ruhl, M.: Diminished Chord: A protocol for heterogeneous subgroup formation in peer-to-peer networks. In: IPTPS ’04: Proceedings of 3rd International Workshop on Peer-to-Peer Systems. Lecture Notes in Computer Science, vol. 3279, pp. 288–297. Springer, Berlin (2004)
Kleinberg, J.M.: The small-world phenomenon: an algorithm perspective. In: Proceedings of 32nd Annual ACM Symposium Theory of Computing (STOC ’00), pp. 163–170. ACM, New York (2000). doi: http://doi.acm.org/10.1145/335305.335325
Korzun, D., Gurtov, A.: Survey on hierarchical routing schemes in “flat” distributed hash tables. Peer-to-Peer Netw. Appl. 4, 346–375 (2011). doi: http://dx.doi.org/10.1007/s12083-010-0093-z
Korzun, D., Nechaev, B., Gurtov, A.: Cyclic routing: Generalizing lookahead in peer-to-peer networks. In: AICCSA2009: Proceedings of 7th IEEE/ACS International Conference on Computer Systems and Applications, pp. 697–704. IEEE Computer Society (2009). doi: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2009.5069403
Krishnamurthy, B., Wang, J., Xie, Y.: Early measurements of a cluster-based architecture for P2P systems. In: IMW ’01: Proceedings of 1st ACM SIGCOMM Workshop on Internet Measurement, pp. 105–109. ACM, New York (2001). doi: http://doi.acm.org/10.1145/505202.505216
Leong, B., Liskov, B., Demaine, E.: Epichord: parallelizing the Chord lookup algorithm with reactive routing state management. In: ICON 2004: Proceedings of 12th International Conference on Networks, IEEE, pp. 270–276 (2004)
Levin, D., LaCurts, K., Spring, N., Bhattacharjee, B.: BitTorrent is an auction: analyzing and improving BitTorrent’s incentives. SIGCOMM Comput. Commun. Rev. 38, 243–254 (2008). doi: http://doi.acm.org/10.1145/1402946.1402987
Li, J., Stribling, J., Morris, R., Kaashoek, M.F., Gil, T.M.: A performance vs. cost framework for evaluating DHT design tradeoffs under churn. In: Proceedings of IEEE INFOCOM’05, vol. 1, pp. 225–236. IEEE (2005). doi:10.1109/INFCOM.2005.1497894
Liao, W.C., Papadopoulos, F., Psounis, K.: Performance analysis of BitTorrent-like systems with heterogeneous users. Perform. Eval. 64, 876–891 (2007). doi:10.1016/j.peva.2007.06.008
Loguinov, D., Kumar, A., Rai, V., Ganesh, S.: Graph-theoretic analysis of structured peer-to-peer systems: Routing distances and fault resilience. IEEE/ACM Trans. Netw. 13(5), 1107–1120 (2005)
Ma, R.T.B., Lee, S.C.M., Lui, J.C.S., Yau, D.K.Y.: Incentive and service differentiation in P2P networks: a game theoretic approach. IEEE/ACM Trans. Netw. 14(5), 978–991 (2006). doi: http://dx.doi.org/10.1109/TNET.2006.882904
Malkhi, D., Naor, M., Ratajczak, D.: Viceroy: a scalable and dynamic emulation of the butterfly. In: PODC ’02: Proceedings of 21st Annual Symposium on Principles of Distributed Computing, pp. 183–192. ACM, New York (2002). doi: http://doi.acm.org/10.1145/571825.571857
Manku, G.S., Bawa, M., Raghavan, P.: Symphony: distributed hashing in a small world. In: USITS’03: Proceedings of 4th USENIX Symposium on Internet Technologies and Systems, pp. 127–140. USENIX Association (2003)
Marti, S., Garcia-Molina, H.: Taxonomy of trust: categorizing P2P reputation systems. Comput. Netw. 50(4), 472–484 (2006). doi: http://dx.doi.org/10.1016/j.comnet.2005.07.011
Martinez-Yelmo, I., Bikfalvi, A., Guerrero, C., Rumin, R.C., Mauthe, A.: Enabling global multimedia distributed services based on hierarchical DHT overlay networks. Int. J. Internet Protoc. Technol. (IJIPT) 3(4), 234–244 (2008). doi: http://dx.doi.org/10.1504/IJIPT.2008.023772
Martinez-Yelmo, I., Cuevas, R., Guerrero, C., Mauthe, A.: Routing performance in a hierarchical DHT-based overlay network. In: PDP 2008: Proceedings of 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing, pp. 508–515. IEEE Computer Society (2008). doi: http://dx.doi.org/10.1109/PDP.2008.79
Martinez-Yelmo, I., Guerrero, C., Rumín, R.C., Mauthe, A.: A hierarchical P2PSIP architecture to support skype-like services. In: PDP 2009: Proceedings of 17th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, pp. 316–322. IEEE Computer Society (2009). doi: http://doi.ieeecomputersociety.org/10.1109/PDP.2009.27
Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: IPTPS ’02: Proceedings of 1st International Workshop on Peer-to-Peer Systems. Lecture Notes in Computer Science, vol. 2429, pp. 53–65. Springer, Berlin (2002)
Mekouar, L., Iraqi, Y., Boutaba, R.: A contribution-based service differentiation scheme for peer-to-peer systems. Peer-to-Peer Netw. Appl. 2, 146–163 (2009). doi: http://dx.doi.org/10.1007/s12083-008-0026-2
Mislove, A., Druschel, P.: Providing administrative control and autonomy in structured peer-to-peer overlays. In: IPTPS ’04: Proceedings of 3rd International Workshop on Peer-to-Peer Systems. Lecture Notes in Computer Science, vol. 3279, pp. 162–172. Springer, New York (2004)
Mizrak, A.T., Cheng, Y., Kumar, V., Savage, S.: Structured superpeers: Leveraging heterogeneity to provide constant-time lookup. In: WIAPP 2003: Proceedings of 3rd IEEE Workshop on Internet Applications, IEEE, pp. 104–111 (2003)
Ou, Z., Harjula, E., Koskela, T., Ylianttila, M.: GTPP: General truncated pyramid peer-to-peer architecture over structured DHT networks. Mob. Netw. Appl. 15, 729–749 (2010). doi:10.1007/s11036-009-0193-2
Park, K., Pack, S., Kwon, T.: Proximity based peer-to-peer overlay networks (P3ON) with load distribution. In: Proceedings of International Conference on Information Networking (ICOIN 2007). Towards Ubiquitous Networking and Services. Revised Selected Papers, pp. 234–243. Springer, Berlin (2008). doi: http://dx.doi.org/ 10.1007/978-3-540-89524-4_24
Plaxton, C.G., Rajaraman, R., Richa, A.W.: Accessing nearby copies of replicated objects in a distributed environment. In: Proceedings of 9th Annual Symposium on Parallel Algorithms and Architectures (SPAA ’97), pp. 311–320, ACM (1997)
Ramachandran, K.K., Sikdar, B.: A queuing model for evaluating the transfer latency of peer-to-peer systems. IEEE Trans. Parallel Distrib. Syst. 21, 367–378 (2010). doi: http://dx.doi.org/10.1109/TPDS.2009.69
Ratnasamy, S., Handley, P.F.M., Karp, R., Shenker, S.: A scalable content-addressable network. In: Proceedings of ACM SIGCOMM’01, pp. 161–172. ACM, New York (2001)
Risson, J., Moors, T.: Survey of research towards robust peer-to-peer networks: search methods. Comput. Netw. 50(17), 3485–3521 (2006). doi: http://dx.doi.org/10.1016/j.comnet.2006.02.001
Rowstron, A., Druschel, P.: Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In: Middleware’01: Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms. Lecture Notes in Computer Science, vol. 2218, pp. 329–350. Springer, New York (2001)
Seedorf, J., Muus, C.: Availability for structured overlay networks: considerations for simulation and a new bound on lookup success. In: Proceedings of 12th Nordic Workshop on Secure IT Systems, pp. 23–34 (2007)
Serbu, S., Bianchi, S., Kropf, P., Felber, P.: Dynamic load sharing in peer-to-peer systems: when some peers are more equal than others. IEEE Internet Comput. 11(4), 53–61 (2007). doi: http://dx.doi.org/10.1109/MIC.2007.81
Sherman, A., Nieh, J., Stein, C.: FairTorrent: bringing fairness to peer-to-peer systems. In: CoNEXT ’09: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 133–144. ACM, New York (2009). doi: http://doi.acm.org/10.1145/1658939.1658955
Singh, A., Liu, L.: A hybrid topology architecture for P2P systems. In: ICCCN 2004: Proceedings of 13th International Conference on Computer Communications and Networks, IEEE, pp. 475–480 (2004)
Srivatsa, M., Liu, L.: Vulnerabilities and security threats in structured overlay networks: a quantitative analysis. In: ACSAC ’04: Proceedings of 20th Annual Computer Security Applications Conference, pp. 252–261. IEEE Computer Society (2004). doi: http://dx.doi.org/10.1109/CSAC.2004.50
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for Internet applications. IEEE/ACM Trans. Netw. 11(1), 17–32 (2003)
Tang, C., Buco, M.J., Chang, R.N., Dwarkadas, S., Luan, L.Z., So, E., Ward, C.: Low traffic overlay networks with large routing tables. SIGMETRICS Perform. Eval. Rev. 33(1), 14–25 (2005). doi: http://doi.acm.org/10.1145/1071690.1064216
Tian, R., Xiong, Y., Zhang, Q., Li, B., Zhao, B.Y., Li, X.: Hybrid overlay structure based on random walks. In: IPTPS ’05: Proceedings of 4th International Workshop on Peer-to-Peer Systems. Lecture Notes in Computer Science, vol. 3640, pp. 152–162. Springer, Berlin (2005)
Vu, Q.H., Lupu, M., Ooi, B.C.: Peer-to-Peer Computing: Principles and Applications. Springer, Berlin (2010). doi:10.1007/978-3-642-03514-2
Wang, W., Li, B.: To play or to control: a game-based control-theoretic approach to peer-to-peer incentive engineering. In: Proceedings of 11th International Conference on Quality of service (IWQoS’03), pp. 174–192. Springer, Berlin (2003)
Wu, F., Zhang, L.: Proportional response dynamics leads to market equilibrium. In: STOC ’07: Proceedings of 29th annual ACM Symposium on Theory of Computing, pp. 354–363. ACM, New York (2007). doi: http://doi.acm.org/10.1145/1250790.1250844
Xu, J., Kumar, A., Yu, X.: On the fundamental tradeoffs between routing table size and network diameter in peer-to-peer networks. IEEE J. Sel. Areas Commun. 22(1), 151–163 (2004)
Xu, Z., Min, R., Hu, Y.: HIERAS: A DHT based hierarchical P2P routing algorithm. In: ICPP 2003: Proceedings of 32nd International Conference on Parallel Processing, pp. 187–194. IEEE Computer Society (2003)
Yang, B., Garcia-Molina, H.: Designing a super-peer network. In: ICDE’03: Proceedings of 19th International Conference on Data Engineering, pp. 49–60 (2003). doi: http://doi.ieeecomputersociety.org/10.1109/ICDE.2003.1260781
Yang, X., de Veciana, G.: Performance of peer-to-peer networks: service capacity and role of resource sharing policies. Perform. Eval. 63, 175–194 (2006). doi:10.1016/j.peva.2005.01.005
Zhang, X.M., Wang, Y.J., Li, Z.: Research of routing algorithm in hierarchy-adaptive P2P systems. In: ISPA 2007: Proceedings of 5th International Symposium Parallel and Distributed Processing and Applications. Lecture Notes in Computer Science, vol. 4742, pp. 728–739. Springer, New York (2007)
Zhang, Y., Li, D., Chen, L., Lu, X.: Flexible routing in grouped DHTs. In: IEEE P2P ’08: Proceedings of 8th International Conference on Peer-to-Peer Computing, pp. 109–118. IEEE Computer Society (2008). doi: http://dx.doi.org/10.1109/P2P.2008.43
Zhao, B.Q., Lui, J.C.S., Chiu, D.M.: Analysis of adaptive incentive protocols for P2P networks. In: Proceedings of IEEE INFOCOM’09, pp. 325–333. IEEE (2009)
Zhao, B.Y., Duan, Y., Huang, L., Joseph, A.D., Kubiatowicz, J.D.: Brocade: landmark routing on overlay networks. In: IPTPS ’02: Proceedings of 1st International Workshop on Peer-to-Peer Systems. Lecture Notes in Computer Science, vol. 2429, pp. 34–44. Springer, Berlin (2002)
Zhao, B.Y., Huang, L., Stribling, J., Joseph, A.D., Kubiatowicz, J.D.: Exploiting routing redundancy via structured peer-to-peer overlays. In: ICNP ’03: Proceedings of 11th IEEE International Conference on Network Protocols, IEEE, pp. 246–257 (2003)
Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.D.: Tapestry: A resilient global-scale overlay for service deployment. IEEE J. Sel. Areas Commun. 22(1), 41–53 (2004)
Zhu, Y., Wang, H., Hu, Y.: A super-peer based lookup in structured peer-to-peer systems. In: Proceedings of ISCA 16th International Conference on Parallel and Distributed Computing Systems (PDCS 2003), International Society for Computers and Their Applications (ISCA), pp. 465–470 (2003)
Zoels, S., Eichhorn, M., Tarlano, A., Kellerer, W.: Content-based hierarchies in DHT-based peer-to-peer systems. In: SAINT Workshops 2006: Proceedings of International Symposium Applications and the Internet Workshops, pp. 105–108. IEEE Computer Society (2006). doi: http://dx.doi.org/10.1109/SAINT-W.2006.12
Zoels, S., Despotovic, Z., Kellerer, W.: Cost-based analysis of hierarchical DHT design. In: IEEE P2P ’06: Proceedings of 6th International Conference on Peer-to-Peer Computing, pp. 233–239. IEEE Computer Society (2006). doi: http://dx.doi.org/10.1109/P2P.2006.13
Zoels, S., Despotovic, Z., Kellerer, W.: Load balancing in a hierarchical DHT-based P2P system. In: COLCOM ’07: Proceedings of 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 353–361. IEEE Computer Society (2007). doi: http://dx.doi.org/10.1109/COLCOM.2007.4553855
Zoels, S., Despotovic, Z., Kellerer, W.: On hierarchical DHT systems — an analytical approach for optimal designs. Comput. Commun. 31(3), 576–590 (2008). doi: http://dx.doi.org/10.1016/j.comcom.2007.08.033
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Korzun, D., Gurtov, A. (2013). Terminology, Problems, and Design Issues. In: Structured Peer-to-Peer Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5483-0_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5483-0_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5482-3
Online ISBN: 978-1-4614-5483-0
eBook Packages: Computer ScienceComputer Science (R0)