Advances in Multimedia

Advances in Multimedia / 2007 / Article
Special Issue

Toward the Next-Generation Peer-to-Peer Services

View this Special Issue

Research Article | Open Access

Volume 2007 |Article ID 027958 | https://doi.org/10.1155/2007/27958

Mo Zhou, Yafei Dai, Xiaoming Li, "A Measurement Study of the Structured Overlay Network in P2P File-Sharing Systems", Advances in Multimedia, vol. 2007, Article ID 027958, 9 pages, 2007. https://doi.org/10.1155/2007/27958

A Measurement Study of the Structured Overlay Network in P2P File-Sharing Systems

Academic Editor: Yi Cui
Received30 Jan 2007
Revised20 May 2007
Accepted04 Jul 2007
Published30 Aug 2007

Abstract

The architecture of P2P file-sharing applications has been developing to meet the needs of large scale demands. The structured overlay network, also known as DHT, has been used in these applications to improve the scalability, and robustness of the system, and to make it free from single-point failure. We believe that the measurement study of the overlay network used in the real file-sharing P2P systems can provide guidance for the designing of such systems, and improve the performance of the system. In this paper, we perform the measurement in two different aspects. First, a modified client is designed to provide view to the overlay network from a single-user vision. Second, the instances of crawler programs deployed in many nodes managed to crawl the user information of the overlay network as much as possible. We also find a vulnerability in the overlay network, combined with the character of the DNS service, a more serious DDoS attack can be launched.

References

  1. B. Cohen, “Incentives build robustness in bitTorrent,” in Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley, Calif, USA, June 2003. View at: Google Scholar
  2. napster, http://www.napster.com/.
  3. gnutella, http://www.gnutella.com/.
  4. eMule, http://www.emule-project.net/.
  5. Y. Zhao, X. Hou, M. Yang, and Y. Dai, “Measurement study and application of social network in the maze P2P file-sharing system,” in Proceedings of the 1st International Conference on Scalable Information Systems (InfoScale '06), p. 57, ACM Press, Hong Kong, May 2006. View at: Publisher Site | Google Scholar
  6. Pplive, http://www.pplive.com/.
  7. D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer, “SETI@home: an experiment in public-resource computing,” Communications of the ACM, vol. 45, no. 11, pp. 56–61, 2002. View at: Publisher Site | Google Scholar
  8. I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, “Chord: a scalable peer-to-peer lookup service for internet applications,” in Proceedings of the International Conference on Applications, Technologies, Architectures, and Protocols for Computers Communications (SIGCOMM '01), pp. 149–160, ACM Press, San Diego, Calif, USA, August 2001. View at: Google Scholar
  9. A. I. T. Rowstron and P. Druschel, “Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems,” in Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg (Middleware '01), pp. 329–350, Springer, Heidelberg, Germany, November 2001. View at: Google Scholar
  10. B. Zhao, L. Huang, J. Stribling, S. Rhea, A. Joseph, and J. Kubiatowicz, “Tapestry: a resilient global-scale overlay for service deployment,” IEEE Journal on Selected Areas in Communications, vol. 22, no. 1, pp. 41–53, 2004. View at: Publisher Site | Google Scholar
  11. P. Maymounkov and D. Mazieres, “Kademlia: a peer-to-peer information system based on the XOR metric,” in Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), pp. 53–62, Cambridge, Mass, USA, March 2002. View at: Google Scholar
  12. S. Saroiu, P. K. Gummadi, and S. D. Gribble, “A measurement study of peer-to-peer file sharing systems,” in Multimedia Computing and Networking (MMCN '02), vol. 4673 of Proceedings of SPIE, pp. 156–170, San Jose, Calif, USA, January 2002. View at: Publisher Site | Google Scholar
  13. Y. Qiao and F. E. Bustamante, “Structured and unstructured overlays under the microscope: a measurement-based view of two P2P systems that people use,” in Proceedings of USENIX Annual Technical Conference, pp. 341–355, Boston, Mass, USA, May-June 2006. View at: Google Scholar
  14. Overnet, http://en.wikipedia.org/wiki/Overnet/.
  15. eDonkey, http://en.wikipedia.org/wiki/Edonkey2000.
  16. Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker, “Search and replication in unstructured peer-to-peer networks,” in Proceedings of the 16th International Conference on Supercomputing (ICS '02), pp. 84–95, ACM Press, New York, NY, USA, June 2002. View at: Publisher Site | Google Scholar
  17. K. Sripanidkulchai, B. Maggs, and H. Zhang, “Efficient content location using interest-based locality in peer-to-peer systems,” in Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), vol. 3, pp. 2166–2176, San Francisco, Calif, USA, March-April 2003. View at: Google Scholar
  18. R. Bhagwan, S. Savage, and G. Voelker, “Understanding availability,” in Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), pp. 256–267, Berkeley, Calif, USA, February 2003. View at: Google Scholar
  19. J. Yang, H. Ma, W. Song, J. Cui, and C. Zhou, “Crawling the eDonkey network,” in Proceedings of the 5th International Conference on Grid and Cooperative Computing Workshops (GCCW '06), pp. 133–136, Hunan, China, October 2006. View at: Publisher Site | Google Scholar
  20. K. Tutschku, “A measurement-based traffic profile of the eDonkey filesharing service,” in Proceedings of the 5th anuual Passive and Active Measurement Workshop (PAM '04), pp. 12–21, Antibes Juanles-Pins, France, April 2004. View at: Google Scholar
  21. D. Stutzbach and R. Rejaie, “Improving lookup performance over a widely-deployed DHT,” in Proceedings of the 25th IEEE Conference on Computer Communications (INFOCOM '06), pp. 1–12, Barcelona, Spain, April 2006. View at: Publisher Site | Google Scholar
  22. M. Zhou, Y. Dai, and X. Li, “A measurement study of the structured overlay network in P2P file-sharing applications,” in Proceedings of the 8th IEEE International Symposium on Multimedia (ISM '06), pp. 621–628, San Diego, Calif, USA, December 2006. View at: Publisher Site | Google Scholar
  23. B. Chun, D. Culler, T. Roscoe et al., “PlanetLab: an overlay testbed for broad-coverage services,” ACM SIGCOMM Computer Communication Review, vol. 33, no. 3, pp. 3–12, 2003. View at: Publisher Site | Google Scholar
  24. amule, http://www.amule.org/.
  25. Rfc1034, http://www.ietf.org/rfc/rfc1034.txt.
  26. Rfc1035, http://www.ietf.org/rfc/rfc1035.txt.
  27. N. Naoumov and K. Ross, “Exploiting P2P systems for DDoS attacks,” in Proceedings of the 1st International Conference on Scalable Information Systems (InfoScale '06), vol. 152, p. 47, ACM Press, Hong Kong, May-June 2006. View at: Publisher Site | Google Scholar
  28. J. Liang, N. Naoumov, and K. W. Ross, “The index poisoning attack in P2P file sharing systems,” in Proceedings of the 25th IEEE Conference on Computer Communications (INFOCOM '06), pp. 1–12, Barcelona, Spain, April 2006. View at: Publisher Site | Google Scholar

Copyright © 2007 Mo Zhou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

 PDF Download Citation Citation
 Order printed copiesOrder
Views250
Downloads839
Citations

Related articles

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.