Towards a Formal MultipathP2P Protocol

Towards a Formal MultipathP2P Protocol

Ryma Abassi, Mohamed Amine Riahla, Karim Tamine, Sihem Goumiri
DOI: 10.4018/IJBDCN.344416
Article PDF Download
Open access articles are freely available for download

Abstract

Peer-To-Peer networks are becoming increasingly common as a mean of transferring files over Internet. In this paper, we describe, first, the design and implementation of our P2P system (MultiPathP2P). This latter is based on the social networks concepts where nodes are identified through their virtual addresses, we have designed our protocol based on 1) An architecture exploiting the principle of social networks where nodes are identified by virtual addresses and are able to randomly change their neighbors 2) A process of data request and file sharing differing from those supported in other P2P networks. Second, we present a formal validation of our proposal in order to prove its optimality and completeness.
Article Preview
Top

P2P internet data transfer is a longstanding goal of the research community, and our protocol uses in part some existing ideas.

The performance of P2P protocols largely depends on the characteristics of underlying physical network or query distribution for the efficient query response time and minimum resource consumption (Heo et al., 2021; Shin et al., 2020; Sim et al., 2021; Tushar et al., 2021). Unstructured P2P networks, which do not rely on a global index, have traditionally used flooding methods and random walk schemes to distribute object queries in the network. However, these approaches present disadvantages in terms of network overhead and scalability (Khatibi & Sharifi, 2021).

Meanwhile, structured P2P networks have emerged as an organized alternative to unstructured P2P networks. These networks utilize data structures such as Distributed Hash Tables (DHTs) to organize resources coherently and facilitate efficient searches (Augustine et al., 2022; Yu et al., 2020).

Regarding existing protocols, well-established systems such as GNUTELLA (Gopal et al., 2016), OneSwarm (Isdal et al., 2010), Tor (Feigenbaum et al., 2012) and Bittorrent (Torres-Cruz et al., 2017). continue to play a prominent role in file sharing on the Internet. However, these protocols face persistent challenges in terms of performance and security, such as efficient query management in highly dynamic environments and mitigating security and privacy risks.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2025): Forthcoming, Available for Pre-Order
Volume 19: 1 Issue (2024)
Volume 18: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 17: 2 Issues (2021)
Volume 16: 2 Issues (2020)
Volume 15: 2 Issues (2019)
Volume 14: 2 Issues (2018)
Volume 13: 2 Issues (2017)
Volume 12: 2 Issues (2016)
Volume 11: 2 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing