P2P Networking and Applications

Hardcover (Print)
Buy New
Buy New from BN.com
Used and New from Other Sellers
Used and New from Other Sellers
from $35.70
Usually ships in 1-2 business days
(Save 57%)
Other sellers (Hardcover)
  • All (5) from $35.70   
  • New (2) from $69.16   
  • Used (3) from $35.70   


Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a viable multimillion dollar business model for the distribution of information, telecommunications, and social networking. Written at an accessible level for any reader familiar with fundamental Internet protocols, the book explains the conceptual operations and architecture underlying basic P2P systems using well-known commercial systems as models and also provides the means to improve upon these models with innovations that will better performance, security, and flexibility. Peer-to-Peer Networking and Applications is thus both a valuable starting point and an important reference to those practitioners employed by any of the 200 companies with approximately $400 million invested in this new and lucrative technology.
  • Uses well-known commercial P2P systems as models, thus demonstrating real-world applicability.
  • Discusses how current research trends in wireless networking, high-def content, DRM, etc. will intersect with P2P, allowing readers to account for future developments in their designs.
  • Provides online access to the Overlay Weaver P2P emulator, an open-source tool that supports a number of peer-to-peer applications with which readers can practice.
Read More Show Less

Editorial Reviews

From the Publisher
* Uses well-known commercial P2P systems as models, thus demonstrating real-world applicability.
* Discusses how current research trends in wireless networking, high-def content, DRM, etc. will intersect with P2P, allowing readers to account for future developments in their designs.
* Provides online access to the Overlay Weaver P2P emulator, an open source tool that supports a number of peer-to-peer applications with which readers can practice.
Read More Show Less

Product Details

  • ISBN-13: 9780123742148
  • Publisher: Elsevier Science
  • Publication date: 12/26/2008
  • Edition description: New Edition
  • Pages: 408
  • Product dimensions: 7.60 (w) x 9.30 (h) x 1.30 (d)

Meet the Author

Dr. Heather Yu is a Senior Scientist at Panasonic Information and Networking Technologies Laboratory. She received her B.S. degree from Peking University, her M.A. and Ph.D. degrees from Princeton University each in Electrical Engineering.
Read More Show Less

Read an Excerpt

P2P Networking and Applications

By John F. Buford Heather Yu Eng Keong Lua


Copyright © 2009 Elsevier Inc.
All right reserved.

ISBN: 978-0-08-092119-8

Chapter One


Our discussion of peer-to-peer (P2P) concepts starts with an overview of the key applications and their emergence as mainstream services for millions of users. The chapter then examines the relationship of P2P with the Internet and its distinctive features compared to other service architectures. A review of P2P economics, business models, social impact, and related technology trends concludes the chapter.


The Rise of P2P File-Sharing Applications

Nearly 10 years after the World Wide Web became available for use on the Internet, decentralized peer-to-peer file-sharing applications supplanted the server-based Napster application, which had popularized the concept of file sharing. Napster's centralized directories were its Achilles' heel because, as it was argued in court, Napster had the means, through its servers, to detect and prevent registration of copyrighted content in its service, but it failed to do so. Napster was subsequently found liable for copyright infringement, dealing a lethal blow to its business model.

As Napster was consumed in legal challenges, second-generation protocols such as Gnutella, FastTrack, and BitTorrent adopted a peer-to-peer architecture in which there is no central directory and all file searches and transfers are distributed among the corresponding peers. Other systems such as FreeNet also incorporated mechanisms for client anonymity, including routing requests indirectly through other clients and encrypting messages between peers. Meanwhile, the top labels in the music industry, which have had arguably the most serious revenue loss due to the emergence of file sharing, have continued to pursue legal challenges to these systems and their users.

Regardless of the outcome of these court cases, the social perception of the acceptability and benefits of content distribution through P2P applications has been irrevocably altered. In the music industry prior to P2P file sharing, audio CDs were the dominant distribution mechanism. Web portals for online music were limited in terms of the size of their catalogs, and downloads were expensive. Although P2P file sharing became widely equated with content piracy, it also showed that consumers were ready to replace the CD distribution model with an online experience if it could provide a large portfolio of titles and artists and if it included features such as a search, previews, transfer to CD and personal music players, and individual track purchase. As portals such as iTunes emerged with these properties, a tremendous growth in the online music business resulted.

In a typical P2P file-sharing application, a user has digital media files he or she wants to share with others. These files are registered by the user using the local application according to properties such as title, artist, date, and format. Later, other users anywhere on the Internet can search for these media files by providing a query in terms of some combination of the same attributes. As we discuss in detail in later chapters, the query is sent to other online peers in the network. A peer that has local media files matching the query will return information on how to retrieve the files. It may also forward the query to other peers. Users may receive multiple successful responses to their query and can then select the files they want to retrieve. The files are then downloaded from the remote peer to the local machine. Examples of file-sharing client user interfaces are shown in Figures 1.1 and 1.2.

Despite their popularity, P2P file-sharing systems have been plagued by several problems for users. First, some of the providers of leading P2P applications earn revenue from third parties by embedding spyware and malware into the applications. Users then find their computers infected with such software immediately after installing the P2P application. Second, a large amount of polluted or corrupted content has been published in file-sharing systems, and it is difficult for a user to distinguish such content from the original digital content they seek. It is generally felt that pollution attacks on file-sharing systems are intended to discourage the distribution of copyrighted material. A user downloading a polluted music file might find, for example, noise, gaps, and abbreviated content.

A third type of problem affecting the usability of P2P file-sharing applications is the free-rider problem. A free rider is a peer that uses the file-sharing application to access content from others but does not contribute content to the same degree to the community of peers. Various techniques for addressing the free-rider problem by offering incentives or monitoring use are discussed later in the book. A related issue is that of peer churn. A peer's content can only be accessed by other peers if that peer is online. When a peer goes offline, it takes time for other peers to be alerted to the change in status. Meanwhile, content queries may go unanswered and time out.

The leading P2P file-sharing systems have not adopted mechanisms to protect licensed content or collect payment for transfers on behalf of copyright owners. Several ventures seek to legitimize P2P file sharing for licensed content by incorporating techniques for digital rights management (DRM) and superdistribution into P2P distribution architectures. In such systems, content is encrypted, and though it can be freely distributed, a user must separately purchase an encrypted license file to render the media. Through the use of digital signatures, such license files are not easily transferred to other users. See this book's Website for links to current P2P file-sharing proposals for DRM-based approaches.

Other ventures such as QTrax, SpiralFrog, and TurnItUp are proposing an ad-based model for free music distribution. The user can freely download the music file, which in some models is protected with DRM, but must listen to or watch an ad during download or playback. In these schemes, the advertiser instead of the user is paying the content licensing costs. Questions remain about this model, such as whether it will undercut existing music download business models and whether the advertising revenue is sufficient to match the licensing revenue from existing music download sites.

Voice over P2P (VoP2P)

Desktop VoIP (voice over IP) clients began to appear in the mid-1990s and offered free desktop-to-desktop voice and video calls. These applications, though economically attractive and technically innovative, didn't attract a large following due to factors such as lack of voice quality and limited availability of broadband access in the consumer market. In addition, the initially small size of the network community limited the potential of such applications to supplant conventional telephony. This continues to be a practical issue facing new types of P2P applications—how to create a community of users that can reach the critical mass needed to provide the value proposition that comes with scale.

Starting in 1996 with the launch of ICQ, a number of instant-message and presence (IMP) applications became widely popular. The leading IMP systems, such as AIM, Microsoft Messenger, Yahoo! Messenger, and Jabber, all use client/server architectures. Although several of these systems have subsequently included telephony capabilities, their telephony features have not drawn a large user community.

Skype is a VoP2P client launched in 2003 that has reached more than 10 million concurrent users. The VoP2P technology of Skype is discussed in Chapter 11. Compared to earlier VoIP clients, Skype offers both free desktop-to-desktop calls and low-cost desktop-to-public switched telephone network (PSTN) calls, including international calls. The call quality is high, generally attributed to the audio codec Skype uses and today's wide use of broadband access networks to reach the Internet. In addition, Skype includes features from IMP applications, including buddy lists, instant messaging, and presence. Unlike the file-sharing systems, Skype promises a no spyware policy.

The Skype user interface is shown in Figure 1.3. It includes a buddy list that shows other buddies and their online status. The user can select buddies to initiate free chat, voice, and group conference sessions. The user can also enter PSTN numbers to call, and these calls are charged.


The success of P2P file sharing and VoP2P motivated use of P2P for streaming video applications. P2PTV delivery often follows a channel organization in which content is organized and accessed according to a directory of programs and movies. Unlike file-sharing systems in which a media file is first downloaded to the user's computer and then played locally, video-streaming applications must provide a real-time stream transfer rate to each peer that equals the video playback rate. Thus if a media stream is encoded at 1.5 Mbps and there is a single peer acting as the source for the stream, the path from the source peer to the playback peer must provide a data transfer rate of 1.5 Mbps on average. Some variation in the playback rate along the path can be accommodated by prebuffering a sufficient number of video frames. Then if the transfer rate temporarily drops, the extra content in the buffer is used to prevent dropouts at the rendering side.

An attractive feature of peer-to-peer architectures for delivery of video streams is their self-scaling property. Each additional peer added to the P2P system adds additional capacity to the overall resources. Even powerful server farms are limited to the maximum number of simultaneous video streams that they can deliver. In a P2P network, any peer receiving a video stream can also forward it to a few other peers. If D > 1 peers are directly connected to the source peer and each peer can in turn support D peers, then up to D2 + D peers can receive a video stream within two hops from the source. Likewise, if each of the second-tier D peers can in turn support D peers, up to D3 + D2 + D peers can receive the video stream in three hops. Note that each hop adds a small forwarding delay, which is usually not a problem in one-way video-streaming applications.

This simple model is good if all peers watching the specific video stream are viewing the same position in the stream close to simultaneously, equivalent to a broadcast television channel. However, in video-on-demand type applications, peers start viewing a stream at arbitrary times, and those peers that start viewing a stream concurrently may soon diverge in stream position due to user actions such as pause or rewind. To avoid transferring complete copies of video files to peers at playback, a method is needed for a peer to locate the next chunk of video in its playback schedule from some other peers in the P2P system. One technique used in BitTorrent 243 is for the source of the content to seed other peers with chunks of the content. These peers then access the torrent created by the source to identify each other and retrieve the content chunks directly from other peers. Such a group of peers exchanging chunks is called a swarm.

As is the case with other P2P applications, the volatility of peers could cause gaps in stream playback if the peer that is the source of the next segment of video suddenly leaves the P2P system. Since peers are user-controlled end systems, unpredictable and unannounced departures are an assumed hazard. Most P2P networks have specific protocols to recognize such departures and to continually locate new peers that are joining the P2P system. For video-streaming applications, mitigating the departure of a source peer can involve periodically searching for redundant sources (which are also volatile) and providing a sufficient buffer to reduce the impact on the user's viewing experience when a source peer departure does occur.


Excerpted from P2P Networking and Applications by John F. Buford Heather Yu Eng Keong Lua Copyright © 2009 by Elsevier Inc. . Excerpted by permission of MORGAN KAUFMANN. All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Read More Show Less

Table of Contents

Ch1: Introduction
Ch2: Peer-to-Peer Concepts
Ch3: Unstructured Overlays
Ch4: Structured Overlays—Geometry and Routing
Ch5: Overlay Dynamics
Ch6: Peer-to-Peer in Practice
Ch7: Search
Ch8: Peer-to-Peer Content Delivery
Ch9: Peercasting and Overlay Multicasting
Ch10: Measurement
Ch11: Service Overlays
Ch12: Voice over Peer-to-Peer
Ch13: Mobility
Ch14: Security
Ch15: Managed Overlays
Read More Show Less

Customer Reviews

Average Rating 3
( 2 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Posted January 27, 2011



    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted May 13, 2012

    No text was provided for this review.

Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)