Comparative Study On Peer-to-Peer Architectural Styles
Comparative Study On Peer-to-Peer Architectural Styles
Page | 520
Mandhare, International Journal of Advanced Research in Computer Science and Software Engineering 4(9),
September - 2014, pp. 520-525
E. Networks are cheaper to build and maintain
The overall cost of building the system is comparatively less than a client-server system. This is because a single
party is not responsible for maintaining the central server and access control. Each user is client as well as server and
maintains his machine.
III.
DRAWBACKS OF PEER-TO-PEER STYLES
Peer-to-Peer networks also have certain drawbacks which raise concerns over their usage.
A. Access Control
The whole system is decentralized and is difficult to administer. Thus it becomes difficult to control the overall
accessibility of the entire system.
B. Security Issues
In these systems security is very less as malwares like, viruses, worms and other spywares can be easily transmitted
over the network. This may harm the system on which these malwares are being downloaded.
C. Copyright Issues
Due to the use of peer-to-peer networks, there is no central server where files are placed. As a result illegal sharing of
music files and video files take place violating the copyright rules. Also since there is no central server, this activity
cannot be tracked.
D. Data Recovery
Since there is no central server, data recovery and backup is very difficult. In these systems, each user needs to have
his own backup system.
IV. PEER-TO-PEER STYLES
Depending upon the way in which the peers interact with each other the different types of peer-to-peer styles are as
follows:
A. Hybrid Client-Server / Peer-to-Peer
This type of architectural style consists of a central server, known as peer and content directory. Each peer must first
register itself with the central server. While registering itself with the central server or logging in later, the peer informs
the server of its internet address and the files present with the peer which it is willing to share. A complete record of
which files are present and the server on which they are present is maintained by the peer and content directory.
Now when a peer needs to download a file from the network, it queries the server as to where on the internet can a
given file be obtained. The peer is then informed by the server about the locations where the file is present. The peer then
chooses a location and makes a call directly to that peer and downloads the file. Thus, architecturally the system can be
seen as a hybrid of client-server and pure peer-to-peer (P2P). The peers act as clients and the peer and content
directory act as server during the registration and querying process. Once the peer knows about the file location, the file
transfer takes place between the peers without further inclusion of the peer and content directory.
B. Pure Decentralized P2P
In this architectural style, there is no central server. All the peers are equal in capability. All of them share equal
responsibility. It ensures that a single central server does not have to bear the brunt of the entire network. This improves
performance and robustness. The peers use different ways to discover other peers which hold the requested file. This may
increase network traffic in some cases but, also improve robustness of the system. Failure of a single peer does not have
an adverse impact and the system can still continue to function without much deterioration in performance. Different
algorithms are used for searching the peers. In order to make searching efficient, time out mechanisms and hop count
limits are used. This ensures efficiency of the system.
C. Overlayed P2P
An overlay network is a layer of virtual network topology on top of the physical network, which directly interfaces to
users. With the rapid advancement of Internet and computing technology, much more aggregate information and
computing resources are available from clients or peers than from a limited number of centralized servers. Overlay
networks provide us with the following advantages and opportunities to better utilize the increasingly growing Internet
information and resources. Overlay networks allow both networking developers and application users to easily design
and implement their own communication environment and protocols on top of the Internet, such as data routing and file
sharing management.
Data routing in overlay networks can be very flexible, quickly detecting and avoiding network congestions by
adaptively selecting paths based on different metrics, such as probed latency. The end-nodes in overlay networks are
highly connected to each other due to flexible routing. As long as the physical network connections exist, one end-node
can always communicate to another end-node via overlay networks. Thus, scalability and robustness in overlay networks
2014, IJARCSSE All Rights Reserved
Page | 521
Mandhare, International Journal of Advanced Research in Computer Science and Software Engineering 4(9),
September - 2014, pp. 520-525
are two attractive features. The high connectivity of increasingly more end-nodes to join overlay networks enables
effective sharing of a huge amount of information and resources available in the Internet.
D. Resource Trading P2P
The main goal of resource trading p2p is to support speedy replication of large files on individual peers, upon demand.
It is an attempt to maximize use of all available resources in the network of interested peers and to minimize the burden
on any one participant. Thus it also promotes scalability. In this style, a file is distributed in parts to many peers. This
distributes both the processing and network load. A peer does not obtain a requested large file from a single resource,
rather it obtains pieces of the file from many peers. These pieces are then reassembled. In this style the requesting peer
does not only download the pieces, but is also responsible for uploading the portions of the file that it has, to other
interested peers. Thus, along with downloading pieces of a file, the peer also acts as a seed which uploads content for
other peers to download. The operating context is however one in which many peers are simultaneously interested in
obtaining a copy of the file.
V. APPLICATIONS USING EACH STYLE
A. Napster
In Napster, a large cluster of dedicated central servers maintain an index of the files that are currently being shared by
active peers. Each peer maintains a connection to one of the central servers, through which the file location queries are
sent. The servers then cooperate to process the query and return a list of matching files and locations to the user. On
receiving the results, the peer may then choose to initiate a file exchange directly from another peer. In addition to
maintaining an index of shared files, the centralized servers also monitor the state of each peer in the system, keeping
track of metadata such as the peers reported connection bandwidth and the duration that the peer has remained
connected to the system. This metadata is returned with the results of a query, so that the initiating peer has some
information to distinguish possible download sites.
Page | 522
Mandhare, International Journal of Advanced Research in Computer Science and Software Engineering 4(9),
September - 2014, pp. 520-525
Page | 523
Mandhare, International Journal of Advanced Research in Computer Science and Software Engineering 4(9),
September - 2014, pp. 520-525
D. Bit Torrent
Bit Torrent in itself is only a file-downloading protocol. In Bit Torrent, files are split up into chunks. These chunks
may amount to thousand per file. The downloaders of a file barter for chunks of it by uploading and downloading them in
a tit-for-tat-like manner to prevent parasitic behaviour. A parasitic node can exploit all members of the swarm, and
achieve download speeds far in excess of regular downloaders. Overall, tit-for-tat fails because each peer selfishly and
locally seeks to maximize its profits, without concern for the global good and often without conferring with other nodes.
Each peer is responsible for maximizing its own download rate by contacting suitable peers, and peers with high upload
rates will with high probability also be able to download with high speeds. After downloading of a file is complete, it
may act as a seed by staying online for a while and sharing the file for free, i.e., without bartering. Responsibility for the
discovery of content is outside the scope of Bit Torrent. To find a file in Bit Torrent, users access web sites which act as
global directories of available files. Some of these web sites acting as global directories include Suprnova.org,
Youceff.com , Piratebay.org.
Bit Torrent makes use of a machine called Tracker, in order to oversee the process by which a file is distributed to a
set of interested peers. However this tracker is not responsible for actually performing the file transfer. The peers interact
with the Tracker, to identify other peers with which they communicate to effect the download. The meta-data associated
with each file provides information about, how the file is pieced and also about the attributes of those pieces. It also tells
about the location of the tracker.
Each peer runs a Bit Torrent application. This application decides, what piece of the file should be downloaded next,
and from which peer to download. Several algorithms are used to facilitate this type of file sharing. The aim of these
algorithms is to maximize the use of resources available at all peers. However, Bit Torrent keeps a strict check, to ensure
that a peer is not manipulated. It may be possible that a peer is manipulated to only download content, and does not
participate in the uploading process. Such a peer is then penalized by other peers, through deprioritization of access to
the pieces it needs.
VI.
COMPARISON OF STYLES
Each of the P2P styles discussed above viz. Hybrid, Pure Decentralized, Overlayed P2P and Resource Trading P2P
have some advantages and drawbacks. The architectural cleanness of Napster (hybrid style) is also its downfall. If for
example a highly desirable file becomes available, the server will be swamped with requests seeking its location. Thus
there is a possibility of server going down. If the server goes down due technical or any legal matters, the peers lose the
ability to find other peers.
Gnutella (pure decentralized) is highly robust. Removal of one peer does not diminish the ability of remaining peers to
perform. The removal of a peer may make a specific resource unavailable if the peer was the unique source of that
resource. However if the resource is available with several sources, it is still conceivable from one of the sources. Thus
removal of many peers wont hamper the performance. However Gnutella has a few drawbacks like, when a new peer
comes to a network, how does it find peers to which its queries can be sent ? Also the peers lack global knowledge. They
have knowledge only about, the requests received, requests which they have issued or passed along. As a result the
system may continue to query for a long time even after the reply is received by the original peer who started the query.
If this is not properly handled, the system may as a whole become inefficient. However efficient time out mechanism
may prove to be a good solution, in improving the efficiency of this system. Another problem with Gnutella is that there
is no guarantee that the file received is not malicious. The downloaded file may turn out to be a virus or a worm.
Skype (overlayed P2P) addresses the problem of discovery of peer. Te network is not flooded with requests in order to
locate a buddy (peer) as it would in case of Gnutella. Also since the directories are replicated and distributed in the form
of supernodes, the problems of scalability and robustness as encountered in case of Napster are also solved. Also
encryption facility provides security to the calls made. Due to the Login Server which restricts the participants, malicious
clients can be prevented from entering the network. Bit Torrent (resource trading) style possesses all the qualities of a
good P2P style. It also accounts for the possibility of any given peer dropping out of the process at any time, thus
ensuring robustness.
VII.
CONCLUSIONS
This paper presents an overview of the research relating to P2P architectural styles. It has compared the various
advantages and drawbacks of these architectural styles. It has also stated the applications of each style. P2P is an
important technology that has already found its way into existing products and research projects. P2P network is factually
a network for distributed object storage, searching and sharing. It would emerge as a solution to certain inherent
problems in distributed systems. It may not be the only solution for such problems. Also, it may not be appropriate for all
problems, but it will continue to be a strong alternative for scalability, anonymity, and fault resilience requirements. P2P
architectural styles and the applications developed using them have an opportunity for deployment in the future
ACKNOWLEDGMENT
I express sincere regards to all the researchers who have done pioneering work in the field of Peer-to-Peer architectures.
It was the hard work and relentless efforts put by them, that today P2P architectures have become popular. I would also
like to thank all the authors whose papers have been taken as a reference and as a guidance material for this paper. Truly,
their research has proved to be of great value to this paper.
2014, IJARCSSE All Rights Reserved
Page | 524
Mandhare, International Journal of Advanced Research in Computer Science and Software Engineering 4(9),
September - 2014, pp. 520-525
REFERENCES
[1]
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning
Schulzrinne Department of Computer Science Columbia University, New York NY 10027 {salman,hgs}
@cs.columbia.edu September 15, 2004.
[2]
A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, Steven D.
Gribble {tzoompy, gummadi, gribbleg} @cs.washington.edu. Technical Report # UW-CSE-01-06-02
Department of Computer Science & Engineering University of Washington Seattle, WA, USA, 98195-2350
[3]
The Bit Torrent P2P File-Sharing System: Measurement And Analysis. J.A. Pouwelse, P. Garbacki, D.H.J.
Epema, H.J. Sips. Department of Computer Science, Delft University of Technology, the Netherlands,
[email protected].
Page | 525