2005
DOI: 10.1109/comst.2005.1610546
|View full text |Cite
|
Sign up to set email alerts
|

A survey and comparison of peer-to-peer overlay network schemes

Abstract: Abstract-Over the Internet today, computing and communications environments are significantly more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. There has been much interest in emerging Peer-to-Peer (P2P) network overlays because they provide a good substrate for creating large-scale data sharing, content distribution and application-level multicast applications. These P2P networks try to provide a long list of features such as: selection … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
118
0
14

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 1,038 publications
(132 citation statements)
references
References 88 publications
(77 reference statements)
0
118
0
14
Order By: Relevance
“…In sum, BT networks natively supports resource sharing, which requires self organization, load balancing, redundant storage, efficient search of data items, data guarantees, trust and authentication, massive scalability properties and fault-tolerance (i.e., if one peer on the network fails the whole network is not compromised) [5]. These characteristics are thus imported to our implementation, meeting many of the requirements of cloud storage services.…”
Section: Bucket and Object Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…In sum, BT networks natively supports resource sharing, which requires self organization, load balancing, redundant storage, efficient search of data items, data guarantees, trust and authentication, massive scalability properties and fault-tolerance (i.e., if one peer on the network fails the whole network is not compromised) [5]. These characteristics are thus imported to our implementation, meeting many of the requirements of cloud storage services.…”
Section: Bucket and Object Managementmentioning
confidence: 99%
“…Nowadays, BitTorrent is actually one of the most popular protocols for transferring large files, with over 150 million active users 5 .…”
Section: Overall System Architecturementioning
confidence: 99%
“…This peer is called the successor peer of key k, denoted by successor(k). To maintain consistent hashing mapping when a peer n joins the network, certain keys whose IDs are equal or less than the ID of the joined node that were previously assigned to n's successor now need to be reassigned to n. When peer n leaves the Chord ring, all of its assigned keys are reassigned to n's successor and its become responsible for theses keys [4,5].…”
Section: Consistent Hashingmentioning
confidence: 99%
“…Early systems such as Gnutella and Freenet, as well as research systems including Chord, CAN, Tapestry, and Pastry, proposed algorithms for distributing information across a network of peers, and then allowing decentralized searches to proceed by routing queries to the appropriate content [16].…”
Section: Introductionmentioning
confidence: 99%