P2P computing technology can be attributed to a special distributed computing technology. Therefore, many problems faced by P2P computing technology can be solved using the research results of the current distributed computing technology, problems faced by basic distributed systems such as concurrency control and transaction processing. However, many problems have their own characteristics in the P2P system. At present, we generally study and solve the problems faced by P2P from the following perspectives.
1. Research on P2P network topology
The topological structure refers to the physical or logical interconnection between computing units in a distributed system. The Topological Structure between nodes has always been an important basis for determining the system type, currently, centralized and hierarchical topologies are widely used in interconnection networks. The Internet itself is the world's largest non-centralized interconnection network, however, some network application systems established in 1990s are completely centralized, and many web applications run on centralized server systems. The centralized topology system is currently faced with some difficult problems, such as excessive storage load and DoS attacks. Hierarchical topology is a widely used distributed topology. The DNS system is the most typical application. In P2P systems, we usually need to construct a high-risk, high-risk, and low-risk, high-risk, and low-risk, high-risk, and high-risk anti-virus system. are you surprised to raise the funds? /Font>
The latest results are distributed searches and routes based on DHT (Distributed Hash table ).AlgorithmThe Distributed Hash function uniquely maps the input keywords to a node, and establishes a connection with the node through some routing algorithms. Typical P2P network topology models include can, Chord, pastry, tapestry, and grid.
2. Data Indexing, searching, locating, routing, and access paths
In a typical P2P network, data resources are distributed on various independent nodes. How to efficiently index, search, locate, and access these data information resources is another important issue that requires attention, in distributed systems, these problems are also hot issues under research. URL is the most common information location policy on the web, and DNS provides a hierarchical search mechanism, generally, in P2P shared applications, the retrieval method is to use keywords to query the information resources they need, at the same time, people expect to store the index information of data resources on every node in the system rather than on the central server like Napster. The routing mechanism refers to the message transmission path for communications between nodes. A suitable routing mechanism can fully utilize network bandwidth resources and make the system highly fault tolerant and scalable, currently, the routing mechanism in many systems is closely related to the logical topology of these systems. In the data access process, it is expected that the data access speed can be accelerated by using the stream, parallel or transmission path.
3. Metadata organization and representation
P2P networks are oriented to heterogeneous networks and operating systems. In this way, data resources need to be exchanged between these systems, but because the data representation of these systems is not the same, in this way, a general metadata representation scheme can be determined between multiple systems. The organization of metadata includes the representation of data resources, messaging protocols, etc. Many systems support protocols such as soap or XML-RPC.
4. Support for anonymity
Support for anonymity is an important feature of many P2P systems. The so-called anonymity refers to the protection of the privacy of Information Resource operators in the system, this includes the privacy of the author, publisher, reader, and information server, storage location, and user behavior retrieved. This function is supported in systems such as Freenet and Free Haven.
5. P2P Network Support Technology
With the development of Internet technology, devices connected to the Internet are no longer limited to computers. In P2P computing environments, any device can be easily added to the environment anywhere, the so-called computing devices include both wired and wireless devices. Therefore, many network transmission technologies are required to support various devices to connect to the entire P2P network. Bluetooth and Jini are both P2P network technologies currently studied and used.
6. P2P network security issues
Security is an important issue that has always accompanied the development of the Internet. Security issues include many related issues, such as preventing others from controlling the entire system and increasing malicious information, at the same time, the system should be able to ensure the correctness of information resources in the system. In P2P systems, system security also faces huge challenges. P2P systems need to provide tools for identity authentication and authorization, as well as secure storage, digital signature, encryption, and secure transmission of data without a central node, meanwhile, P2P systems must be able to defend against excessive storage loads, DoS attacks, and other attacks.