Abstract
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge how suitable a P2P solution might be for a particular problem. It is based on characteristics of a wide range of P2P systems from the literature, both proposed and deployed. These include budget, resource relevance, trust, rate of system change, and criticality.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Andersen, D., Balakrishnan, H., Kaashoek, F., Morris, R.: Resilient Overlay Networks. In: SOSP (2001)
Bansal, S., Baker, M.: Observation-based Cooperation Enforcement in Ad Hoc Networks. Technical report, Stanford University (2003)
Burleigh, S., Fall, K., Cerf, V., Durst, R., Scott, K., Weiss, H., Torgerson, L., Hooke, A.: Delay-Tolernat Networking: An Approach to Interplanetary Internet. IEEE Communications Magazine (June 2003)
Buttyán, L., Hubaux, J.-P.: Stimulating Cooperation in Self-organizing Mobile Ad hoc Networks. Mobile Networks and Applications (2003)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2) (1981)
Chun, B., Culler, D., Roscoe, T., Bavier, A., Peterson, L., Wawrzoniak, M., Bowman, M.: PlanetLab: An Overlay Testbed for Broad-Coverage Services. ACM Computer Communication Review 33(3), 3–12 (2003)
Clarke, O., Sandberg, B.: Wiley, and T. W. Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Workshop on Design Issues in Anonymity and Unobservability (2000)
Cohen, B.: Incentives Build Robustness in BitTorrent. In: P2P Econ Workshop (2003)
Cox, L.P., Noble, B.D.: Samsara: Honor Among Thieves in Peer-to-Peer Storage. In: SOSP (2003)
Dabek, F., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I.: Wide-area Cooperative Storage with CFS. In: SOSP (2001)
Fomenkov, M., Keys, K., Moore, D.: k. Claffy. Longitudinal study of Internet traffic from (1998–2003), http://www.caida.org/outreach/papers/2003/nlanr/
Gummadi, K., Gummadi, R., Gribble, S., Ratnasamy, S., Shenker, S., Stoica, I.: The Impact of DHT Routing Geometry on Resilience and Proximity. In: SIGCOMM (2003)
Haber, S., Stornetta, W.S.: How to Time-stamp a Digital Document. Journal of Cryptology: the Journal of the Intl. Association for Cryptologic Research 3(2), 99–111 (1991)
Hardin, G.: The Tragedy of the Commons. Science 162 (1968)
HiveCache, Inc. Distributed disk-based backups, Available at http://www.hivecache.com/
Huebsch, R., Hellerstein, J.M., Lanham, N., Loo, B.T., Shenker, S., Stoica, I.: Querying the Internet with PIER. In: VLDB (2003)
Kostić, D., Rodriguez, A., Albrecht, J., Vahdat, A.: Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh. In: SOSP (2003)
Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: An Architecture for Global-Scale Persistent Storage. In: ASPLOS (2000)
Labovitz, C., Ahuja, A., Abose, A., Jahanian, F.: Delayed Internet Routing Convergence. In: SIGCOMM (2000)
Li, J., Loo, B.T., Hellerstein, J., Kaashoek, F., Karger, D.R., Morris, R.: On the Feasibility of Peer-to-Peer Web Indexing and Search. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, Springer, Heidelberg (2003)
Lougheed, K., Rekhter, Y.: RFC 1267: Border Gateway Protocol 3 (October 1991)
Malkhi, D., Naor, M., Ratajczak, D.: Viceroy: A Scalable and Dynamic Emulation of the Butterfly. In: CHI (1989)
Maniatis, P., Baker, M.: Secure History Preservation Through Timeline Entanglement. In: USENIX Security (2002)
Maniatis, P., Roussopoulos, M., Giuli, T.J., Rosenthal, D.S.H., Baker, M., Muliadi, Y.: Preserving Peer Replicas By Rate-Limited Sampled Voting. In: SOSP (2003)
McCoy, J.: Lessons Learned from MojoNation. Personal Communication (April 2002)
Milojičić, D.S., Kalogeraki, V., Lukose, R., Nagaraja, K., Pruyne, J., Richard, B., Rollins, S., Xu, Z.: Peer-to-Peer Computing. Technical Report HPL-2002-57, HP Labs (2002)
Rowstron, T., Kermarrec, A.-M., Castro, M., Druschel, P.: SCRIBE: The design of a large-scale event notification infrastructure. In: Networked Group Communication (2001)
Stading, T., Maniatis, P., Baker, M.: Peer-to-Peer Caching Schemes to Address Flash Crowds. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 203. Springer, Heidelberg (2002)
Stavrou, A., Rubenstein, D., Sahu, S.: A Lightweight, Robust P2P System to Handle Flash Crowds. In: ICNP (2002)
Stoica, I., Adkins, D., Zhuang, S., Shenker, S., Surana, S.: Internet Indirection Infrastructure. In: SIGCOMM (2002)
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: SIGCOMM (2001)
Waldman, M., Mazières, D.: Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements. In: ACM Conf. on Computer and Communications Security (2001)
Wallach, D.: A Survey of Peer-to-Peer Security Issues. In: Intl. Symposium on Software Security (2002)
Wolman, A., Voelker, G., Sharma, N., Cardwell, N., Karlin, A., Levy, H.: On the Scale and Performance of Cooperative Web Proxy Caching. In: SOSP (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roussopoulos, M., Baker, M., Rosenthal, D.S.H., Giuli, T.J., Maniatis, P., Mogul, J. (2005). 2 P2P or Not 2 P2P?. In: Voelker, G.M., Shenker, S. (eds) Peer-to-Peer Systems III. IPTPS 2004. Lecture Notes in Computer Science, vol 3279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30183-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-30183-7_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24252-9
Online ISBN: 978-3-540-30183-7
eBook Packages: Computer ScienceComputer Science (R0)