skip to main content
research-article
Free Access

Peer-to-peer systems

Published:01 October 2010Publication History
Skip Abstract Section

Abstract

Within a decade, P2P has proven to be a technology that enables innovative new services and is used by millions of people every day.

References

  1. }}About Skype: 100 Billion Skype-to-Skype Minutes Served; http://about.skype.com/2008/02/100_billion_skypetoskype_minut.html.Google ScholarGoogle Scholar
  2. }}Adar, E. and Huberman, B.A. Free riding on Gnutella. First Monday 5,10 (Oct. 2000).Google ScholarGoogle ScholarCross RefCross Ref
  3. }}Anderson, D.P. BOINC: A system for public-resource computing and storage. In Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing (2004), 4--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. }}BBC News. One million viewers use iPlayer, http://news.bbc.co.uk/2/hi/technology/7187967.stm.Google ScholarGoogle Scholar
  5. }}Bittorrent (protocol). Wikipedia; http://en.wikipedia.org/wiki/BitTorrent_(protocol)#Adoption.Google ScholarGoogle Scholar
  6. }}Blake, C. and Rodrigues, R. High availability, scalable storage, dynamic peer networks: Pick two. In Proceedings of the 9th Workshop on Hot Topics in Operating Systems (May 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}Castro, M., Druschel, P., Ganesh, A., Rowstron, A. and Wallach, D.S. Security for structured peer-to-peer overlay networks. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (Dec. 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}Christin, N., Weigend, A.S. and Chuang, J. Content availability, pollution and poisoning in file sharing peer-to-peer networks. In Proceedings of the 6th ACM Conference on Electronic Commerce (June 2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. }}Clarke, I., Sandberg, O., Wiley, B. and Hong, T.W. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the Designing Privacy Enhancing Technologies---International Workshop on Design Issues in Anonymity and Unobservability (July 2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. }}Cohen, B. Incentives build robustness in BitTorrent. In Proceedings of the 1st International Workshop on Economics of P2P Systems (June 2003).Google ScholarGoogle Scholar
  11. }}Cox, L.P. Murray, C.D. and Noble, B.D. Pastiche: Making backup cheap and easy. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (Dec. 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. }}Cox, L.P. and Noble, B.D. Samsara: honor among thieves in peer-to-peer storage. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (Oct. 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. }}DeCandia, G., Hastorun, D., Jampani, M., Kakulapati G., Lakshman, A., Pilchin, A., Sivasubramanian, S., Vosshall, P. and Vogels, W. Dynamo: Amazon's highly available key-value store. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (Oct. 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}Dischinger, M., Mislove, A. Haeberlen, A. and Gummadi, K.P. Detecting BitTorrent blocking. In Proceedings of the 8th Internet Measurement Conference (Oct. 2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}Douceur, J. The Sybil attack. In Proceedings of the First International Workshop on Peer-to-Peer Systems (Mar. 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. }}Freedman, M.J., Freudenthal, E. and Mazières, D. Democratizing content publication with Coral. In Proceedings of the 1st USENIX Symposium on Networked Systems Design and Implementation (Mar. 2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. }}Hei, X., Liang, C., Liang, J., Liu, Y. and Ross, K.W. Insights into PPLive: A measurement study of a large-scale P2P IPTV system. In Proceedings of the 15th International World Wide Web Conference, IPTV Workshop (May 2006).Google ScholarGoogle Scholar
  18. }}Hildrum, K., Kubiatowicz, J.D., Rao, S. and Zhao, B.Y. Distributed object location in a dynamic network. In Proceedings of the 14th Annual ACM Symposium on Parallel Algorithms and Architectures (2002), 41--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}Huebsch, R., Hellerstein, J.M., Lanham, N., Loo, B.T, Shenker, S. and Stoica, I. Querying the Internet with PIER. In Proceedings of the 29th International Conference on Very Large Data Bases (Sept. 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. }}Karagiannis, T., Rodriguez, P., and Papagiannaki, K. Should Internet service providers fear peer-assisted content distribution? In Proceedings of the Internet Measurement Conference (Oct. 2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. }}Li, B., Xie, S., Qu, Y., Keung, G., Lin, C., Liu, J. and Zhang, X. Inside the new coolstreaming: Principles, measurements and performance implications. In Proceedings of INFOCOM (2008).Google ScholarGoogle ScholarCross RefCross Ref
  22. }}Liang, J., Kumar, R., Xi, Y. and Ross, K.W. Pollution in P2P file sharing systems. In Proceedings of INFOCOM (Mar. 2005).Google ScholarGoogle ScholarCross RefCross Ref
  23. }}Maniatis, P., Roussopoulos, M., Giuli, T.J., Rosenthal, D.S.H. and Baker, M. The LOCKSS peer-to-peer digital preservation system. ACM Transactions on Computer Systems 23,1 (2005), 2--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. }}Mislove, A. Post, A. Haeberlen, A. and Druschel P. Experiences in building and operating ePOST, a reliable peer-to-peer application. In Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems (Apr. 2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. }}Nandi, A., Ngan, T-W.J, Singh, A., Druschel, P. and Wallach, D.S. Scrivener: Providing incentives in cooperative content distribution systems.In Proceedings of the ACM/IFIP/USENIX 6th International Middleware Conference (Nov. 2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. }}Renesse, R.V, Birman, K.P. and Vogels, W. Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining. ACM Transactions on Computer Systems 21, 2 (2003), 164--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. }}Rowstron, A. and Druschel, P. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms (Nov. 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. }}Saroiu, S., Gummadi, P.K., and Gribble, S.D. A measurement study of peer-to-peer file sharing systems. In Proceedings of the SPIE/ ACM Conference Multimedia Computing and Networking (Jan. 2002).Google ScholarGoogle Scholar
  29. }}Skinkers: Enterprise communication management; http://www.skinkers.com/About_us/About_Skinkers.Google ScholarGoogle Scholar
  30. }}Skype: What happened on August 16; http://heartbeat.skype.com/2007/08/what_happened_on_august_16.html.Google ScholarGoogle Scholar
  31. }}Steiner, M., Biersack, E.W. and Ennajjary, T. Actively monitoring peers in KAD. In Proceedings of the 6th International Workshop on Peer-to-Peer Systems (Feb. 2007).Google ScholarGoogle Scholar
  32. }}Stoica, I., Morris, R., Karger, D., Kaashoek, M.F. and Balakrishnan, H. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proceedings of SIGCOMM '01, (Aug. 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. }}Stribling, J. Li, J., Councill, I.G., Kaashoek, M.F. and Morris, R. Overcite: A distributed, cooperative citeseer. In Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (May 2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. }}Walsh, K. and Sirer, E.G. Experience with an object reputation system for peer-to-peer filesharing. In Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (May 2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. }}Wang, L., Park, K., Pang, R., Pai, V.S., and Peterson, L. Reliability and security in the CoDeeN content distribution network. In Proceedings of the USENIX 2004 Annual Technical Conference (June 2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. }}Wilcox-O'Hearn, B. Experiences deploying a large-scale emergent network. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (Mar. 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. }}Yalagandula, P. and Dahlin, M. A scalable distributed information management system. In Proceedings of SIGCOMM '04 (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. }}Zhang, X., Liu, J., Li, B. and Yum, T-S.P. CoolStreaming/DONet: A data-driven overlay network for peer-to-peer live media streaming. In Proceedings of INFOCOM '05 (2005).Google ScholarGoogle Scholar

Index Terms

  1. Peer-to-peer systems

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 53, Issue 10
              October 2010
              96 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/1831407
              Issue’s Table of Contents

              Copyright © 2010 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 October 2010

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format