Надіслати статтю
вул. Інститутська 11, м. Хмельницький, 29016

АНАЛІЗ ТЕНДЕНЦІЙ РОЗВИТКУ ПІРИНГОВИХ МЕРЕЖ

ANALYSIS OF PEER-TO-PEER NETWORKS TRENDS

Сторінки: 25-29. Номер: №4, 2021 (299)
Автори:
Л.М. КУПЕРШТЕЙН
Вінницький національний технічний університет
ORCID ID: 0000-0001-6737-7134
e-mail: kupershtein.lm@gmail.com
М.Д. КРЕНЦІН
Вінницький національний технічний університет
ORCID ID: 0000-0002-1792-9401
e-mail: mishatron98@gmail.com
LEONID M. KUPERSHTEIN
Vinnytsia National Technical University
MYKHAILO D. KRENTSIN
Vinnytsia National Technical University
DOI: https://www.doi.org/10.31891/2307-5732-2021-299-4-26-29
Рецензія/Peer review : 08.08.2021 р.
Надрукована/Printed : 26.08.2021 р.

Анотація мовою оригіналу

Проаналізовано поняття  та природу пірингових мереж, досліджено та представлено коротку історію їх розвитку. Розглянуто покоління пірингових мереж та їх архітектурні особливості. Досліджено основні переваги та недоліки однорангових мереж. Виконано порівняльний аналіз однорангових та багаторангових мереж. Досліджено найбільш відомі на сьогодні практики використання пірингових мереж. Визначено перспективні напрямки досліджень та розвитку пірингової технології обміну інформацією.
Ключові слова: пірингова мережа; децентралізована архітектура; однорангова мережа; розподілені обчислення.

Розширена анотація англійською мовою

The concept and nature of peer-to-peer networks are analyzed, a short history of their development is researched and presented. The first network of this type (Usenet), its features and prerequisites are described. Three types of peer-to-peer network architectures are considered – pure, federal and hybrid; advantages and disadvantages of each. The hybrid architecture is the most widely used today, as using a central server to connect nodes is a promising approach. Three generations of peer-to-peer networks are considered and their architectural features are presented. The first generation involved only file sharing, its feature was the use of a central server, which had information about which node contains which file. The second generation was characterized by the absence of a central server, but there was no indexing of nodes and data, which caused long delays in finding a node to connect. The third generation is more advanced, because it provides storage in each node of hash tables with information about other network members. The main advantages and disadvantages of peer-to-peer network architectures are investigated. A comparative analysis of peer-to-peer and multi-peer networks is performed. It is determined that it is more expedient to use decentralized networks in comparison with centralized ones, especially in cases where anonymity, confidentiality, fault tolerance and scalability are a priority. The most known directions of practical use of peer-to-peer networks are investigated. Today they are used in chat systems, banks, cryptocurrency systems, video communication systems. Decentralized systems are also used when working with digital wallets, because it makes online payments more effective.
Keywords: peer-to-peer network; decentralized architecture; distributed computing.

References

  1. Martyniuk T. B. Analiz tendentsii rozvytku suchasnykh kompiuternykh system / T. B. Martyniuk, A. V. Kozhemiako, L. M. Kupershtein // Optyko-elektronni informatsiino-enerhetychni tekhnolohii. – 2016. – № 2. – S. 5–13.
  2. Skachivaem filmy, muzyku i programmy iz interneta. piringovye seti: eDONKEY BitTorrent, KaZaA, DirectConnect / pod red. M. V. Finkova ; per. s chesh. – SPb : Nauka i Tehnika, 2006. – 272 s. – (Seriya «Prosto o slozhnom»).
  3. Gurkin Yu.N. Fajloobmennye seti R2R: osnovnye principy, protokoly, bezopasnost / Yu.N. Gurkin, Yu.A. Semenov // Seti i sistemy svyazi, – 2006. – № 11. – S. 62.
  4. Secure Peer-to-peer Networks for Trusted Collaboration [Elektronnij resurs]. – Rezhim dostupu : https://core.ac.uk/download/pdf/192229218.pdf.
  5. Cisco Systems, “Cisco Visual Networking Index: Forecast and Methodology, 2009-2014” White Paper. 2010. R. 17.
  6. Lande D.V. Internetika: Navigaciya v slozhnyh setyah: modeli i algoritmy / Lande D.V., Snarskij A.A., Bezsudnov I.A. – M. : Librokom, 2009. – 264 c.
  7. Michael Hauben, Ronda Hauben, Thomas Truscott. Netizens: On the History and Impact of Usenet and the Internet (Perspectives). Wiley-IEEE Computer Society P. ISBN 978-0-8186-7706-9
  8. P2P Networking. URL: https://nakamoto.com/p2p-networking/
  9. Zhang, H. Architecture of Network and Client-Server model. arXiv:1307.6665
  10. Giesler, Marku., Consumer Gift Systems. Consumer Research. 2006. P. 283–290.
  11. Gnutella Protocol Development. URL: http://rfc-gnutella.sourceforge.net/src/rfc-0_6-draft.html.
  12. Saddi W., Guillemin F. Measurement based modeling of edonkey peer-to-peer file sharing system. International Teletraffic Congress. 2007. P. 974–985.
  13. Tanenbaum E. Kompyuternye seti / Tanenbaum E., Uezeroll D. – SPb : Piter, 2020. – 960 s.
  14. Datar, M. Butterflies and peer-to-peer networks. ESA 2002, 10th Annual European Symposium. 2002, P. 310–320.
  15. Peer-To-Peer VOiP. URL: https://www.tmcnet.com/voip/0907/feature-articles-peer-to-peer-voip.htm.
  16. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2009. P. 9.
  17. Voytovych O.P. Investigation of denial-of-service attacks / O.P. Voytovych, L.M. Kupershtein, E.I. Kolibabchuk // Herald of Khmelnytskyi National University. – 2016. − № – P. 129−133.
  18. King S. and S. Nadal, Ppcoin. Peer-to-peer crypto-currency with proof-of-stake. 2019. P. 6.
  19. PayPal vs. Google Pay vs. Venmo vs. Cash App vs. Apple Pay Cash | Digital Trends. URL: https://www.digitaltrends.com/mobile/paypal-vs-google-wallet-vs-venmo-vs-square-cash/
  20. Ruffo G., Schifanella R. A peer-to-peer recommender system based on spontaneous affinities. ACM Trans. Internet Technol, 2009. P. 1–34.
  21. Balfe S., Lakhani A. D. and Paterson K. G. Trusted computing: providing security for peer-to-peer networks. Fifth IEEE International Conference on Peer-to-Peer Computing (P2P’05). 2005. P. 117–124, DOI: 10.1109/P2P.2005.40.
  22. Trends in P2P Networks and Computing. Wittenburg. URL: http://page.mi. fuberlin.de/wittenbu/studies/p2ptrends.pdf
  23. Shah M., M. Shaikh, V. Mishra and G. Tuscano. Decentralized Cloud Storage Using Blockchain. 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI) (48184). 2020, P. 384–389.

 

Post Author: npetliaks

Translate