Social networking in P2P systems
The first generation peer-to-peer file sharing networks, such as Napster, relied on a central database to co-ordinate look ups on the network. The second generation peer to-peer networks such as Gnutella used flooding to locate files, searching every node on the network. Third generation peer-to-pee...
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
2011
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/44178 |
_version_ | 1826121193058467840 |
---|---|
author | Kalra, Ritesh |
author2 | Anwitaman Datta |
author_facet | Anwitaman Datta Kalra, Ritesh |
author_sort | Kalra, Ritesh |
collection | NTU |
description | The first generation peer-to-peer file sharing networks, such as Napster, relied on a central database to co-ordinate look ups on the network. The second generation peer to-peer networks such as Gnutella used flooding to locate files, searching every node on the network. Third generation peer-to-peer networks use Distributed Hash Tables to look up files in the network. Distributed Hash Tables store resource locations throughout the network. A major criterion for these protocols is locating the desired nodes quickly. Various structured and unstructured DHT protocols are used in the implementation of P2P network. Some of them are Tapestry, Chord, Pastry, Kademlia etc. |
first_indexed | 2024-10-01T05:28:41Z |
format | Final Year Project (FYP) |
id | ntu-10356/44178 |
institution | Nanyang Technological University |
language | English |
last_indexed | 2024-10-01T05:28:41Z |
publishDate | 2011 |
record_format | dspace |
spelling | ntu-10356/441782023-03-03T20:28:32Z Social networking in P2P systems Kalra, Ritesh Anwitaman Datta School of Computer Engineering DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks The first generation peer-to-peer file sharing networks, such as Napster, relied on a central database to co-ordinate look ups on the network. The second generation peer to-peer networks such as Gnutella used flooding to locate files, searching every node on the network. Third generation peer-to-peer networks use Distributed Hash Tables to look up files in the network. Distributed Hash Tables store resource locations throughout the network. A major criterion for these protocols is locating the desired nodes quickly. Various structured and unstructured DHT protocols are used in the implementation of P2P network. Some of them are Tapestry, Chord, Pastry, Kademlia etc. Bachelor of Engineering (Computer Science) 2011-05-27T06:29:26Z 2011-05-27T06:29:26Z 2011 2011 Final Year Project (FYP) http://hdl.handle.net/10356/44178 en Nanyang Technological University 96 p. application/pdf |
spellingShingle | DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks Kalra, Ritesh Social networking in P2P systems |
title | Social networking in P2P systems |
title_full | Social networking in P2P systems |
title_fullStr | Social networking in P2P systems |
title_full_unstemmed | Social networking in P2P systems |
title_short | Social networking in P2P systems |
title_sort | social networking in p2p systems |
topic | DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks |
url | http://hdl.handle.net/10356/44178 |
work_keys_str_mv | AT kalraritesh socialnetworkinginp2psystems |