Classification and overview of existing p2p protocols

Source: Internet
Author: User
Tags ftp site website server

Existing p2p protocol classification and introduction (I) Common p2p protocols 1. napster: the world's first large-scale p2p application network; centralized and collapsed. Napster, a popular sharing service at the time, is mainly used to find mp3 files. It has a server used to store the link location of mp3 files and provide retrieval, the real mp3 files are stored on thousands of PCs, and the searched files are directly shared among PCs through p2p. The disadvantage of this method is that a server is needed. In the age of the mp3 file copyright competition, napster soon became the target and was forced to close due to copyright infringement by many record companies. Of course, the server will no longer exist once it passes through napster. 2. gnutella and gnutella2 (gnutella2 is an improvement and extension of gnutella): Open source. The first truly non-central, non-structured p2p network, and file query adopts the flood mode. Gnutella learned from napster's failure and pushed the idea of p2p further: it does not have a central directory server, and all the information is stored on the PC. Once the software is installed, the user immediately changes his computer into a server capable of providing complete directory and file services, and will automatically search for other similar servers, thus forming a super server network composed of countless PCs. The server and client of the traditional network are redefined in front of it. 3. fasttrack: the first client is kazaa. The Protocol is similar to gnutella. The largest user network in-03 years, and the third place in 05 years. The reason for the decline is that this network cannot be used by many users at the same time, and there are Copyright Owners pollution and spyware problems. Imesh is also based on fasttrack protocol. 4. edonkey, overnet, and kad: When selfish people use p2p software, they are mostly willing to "get" rather than "share". The development of p2p has encountered a bottleneck of consciousness. However, a "donkey" quickly changed the game rules. This is the e-donkey-edonkey, which introduced the forced sharing mechanism. Edeonkey divides network nodes into server layer and customer layer, and blocks files to increase the download speed. The most popular p2p client programs in the edonkey network are edonkey2000 and emule. Emule is the successor of edonkey, but it is better. It uses dht to build the underlying network topology. Currently, it is very popular with p2p file sharing software. Overnet is designed to replace edonkey, which has no central server but has fewer users than edonkey. The kademlia protocol is called the kad network and uses udp for communication. Similar to overnet, it is used by almost only edonkey users. 5. bittorrent: uses a distributed server to provide a hybrid p2p network with shared file indexes for multipart download. The download speed is high and there is no search function. The seed has a timeliness. It combines the stability of the central directory server with optimized distributed file management. BitTorrent means pnp download, also called abnormal download. Bt download is an extension of p2p download and pp download. The two p Pairs in pnp refer to the personal computers of netizens and are abstracted as a point on the Internet. N is 1, 2, 3 ,...... N in n is infinite. Pnp means many-to-many connections between a PC and a PC over the network. Why is bt download commonly known as abnormal download? This is because this download method is different from the traditional method of relying solely on the website server as the download source. It adopts the idea that everyone's computer is a server. The more people download, the more people share, the faster the download speed is. The BitTorrent download tool is the latest P2P download tool. It adopts the Multi-Point-to-multi-point principle. Generally, BitTorrent is called abnormal download. This software is quite special. Generally, files or software are downloaded from the HTTP site or FTP site. If many people download the software at the same time, based on the factors of the server bandwidth, the speed slows down a lot, but the software is different. On the contrary, the more people you download at the same time, the faster you download, because it adopts the Multi-Point-to-multi-point transmission principle. 6. direct connect: a protocol commonly used in small networks and intra-university networks. It is applicable to small network environments. dc ++ is a common client. 7. ares: similar to the gnutella network. (2) main fields and development directions of existing p2p technologies (1) Provision of p2p networks for sharing files and other content, such as napster, gnotella, freenet, can, edonkey, emule, and bittorrent. (2) p2p-based collaborative processing and service sharing platforms, such as jxta, magi, groove, and. netmy service. (3) instant messaging, including icq, oicq, and yahoo messenger. (4) Secure p2p communication and information sharing. Leveraging p2p's decentralized features, it can provide new technical means for privacy protection and anonymous communication. For example, cliquenet, crowds, and onion routing. (5) Speech and streaming media: due to the use of p2p technology, a large number of users access streaming media servers at the same time, and the server will not be paralyzed due to heavy load. Skype and coolstream are typical examples. (6) grid computing, mining p2p distributed computing capabilities. P2p technology is used to replace "supercomputer" with idle cpu time segments, memory space, and hard disk space of computers connected to the network ". For example, seti @ home, avaki, popularpower, and distributed.net. The purpose of grid computing is to connect tens of thousands of computing nodes around the world through the high-speed internet and organize them into a giant system so that they can complete complex computing tasks transparently and efficiently. (7) ibm, Microsoft, and Arba are also working on a project named uddi to standardize B2B e-commerce (8) eazel is building the next generation of linux desktops. (9) jabber has developed an xml-based and open instant messaging standard. jabber is considered to be a standard for the future use of p2p data exchange. (10) groove created by developers of lotus notes tries to "help people communicate in a new way ". (11) intel is also promoting its p2p technology to help more effectively use the computing power of chips. (3) p2p resource locating is the first thing to solve in p2p networks. Generally, three methods are used: (1) Indexing each node in a centralized manner registers the shared content to one or more centralized directory servers. When searching for resources, first locate the resource through the server, and then directly communicate between the two nodes. For example, early napster. This type of network is easy to implement, but it often requires support from large directory servers, and the robustness of the system is not good. (2) The broadcast method does not have any index information. content submission and Content Search are directly broadcast and transmitted through adjacent nodes. For example, gnutella. In general, p2p networks using this method have high requirements on the bandwidth of participating nodes. (3) the dynamic hash table method the above two positioning methods can be selected based on different p2p application environments, but the dht (distributed hashtable) method is widely favored. To some extent, the dht-Based p2p network can directly locate the content. A conflicting problem is: if a node provides a shared content representation, the more complex the hash function is, the more complex the network topology is. However, if the content is simple, the content cannot be positioned based on the content. Currently, most p2p networks in dht mode provide a simple representation of the shared content provided by nodes, generally only file names.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.