<p> </p><p>1 Introduction 1</p><p>11 Peer to Peer Content Distribution Networks (P2P CDN) 1</p><p>12 Characteristic features of P2P CDNs 3</p><p>13 BitTorrent: P2P file sharing protocol 4</p><div>14 Private and Global Networks<p></p><p>6</p></div><p>15 An Overview of the Thesis 8</p><p>16 Organization of the Thesis 8</p><p>2 Literature Survey 10</p><p>21 Hierarchical Networks 10</p><p>211 Unstructured P2P Networks 11</p><p>212 Structured P2P Networks 13</p><p>22 Hole Punching: Overcoming NATs 14</p><p>23 Motivation 16</p><p>3 Proposed Model: Usage of Proxies 18</p><p>31 Challenges 18</p><p>32 System Model Assumptions and Configuration 19</p><p>33 System Design and Architecture 20</p><p>331 Private P2P network 20</p><p>3311 BitTorrent Clients 20</p><p>3312 BitTorrent Tracker 21</p><p>34 Global P2P Network of Proxies 23</p><div><p>341 Peers 23</p><p>342 FTPNP – File Transfer Protocol for Network of Proxies 23</p><p>3421 Packet Architecture of FTPNP 25</p><p>3422 Communication Protocol Specification 26</p><p>35 Credit Management System 32</p><p>351 Design Issues 32</p><p>352 Components of the Credit Management System 34</p><p>36 Working of the Hierarchical P2P Network 36</p><p>361 File Sharing 36</p><p>362 File Download 38</p><p>3621 Requested file is in the same private network 38</p><p>3622 Requested file is in another private network 38</p><p>37 Components of the proxy 42</p><p>38 Features of the Hierarchical P2P Network 44</p><p>4 Implementation and Results 46</p><p>41 Private P2P Network 46</p><p>42 Global P2P Network of Proxies 47</p><p>43 File Transfer across two Private Networks 48</p><p>431 Setup Topology 48</p><p>432 Test Details 48</p><p>44 Credit Management System 49</p><p>441 Test Details 49</p><p>442 Results and Inferences 50</p><p>4421 Single Peer Case 50</p><p>4422 Two Peer Case 51</p><p>5 Conclusion and Future Work 60</p></div><div><p>List of Figures</p><p>11 Server-client architecture and Content Distribution Network 2</p><p>12 The Peer to Peer (P2P) architecture 3</p><p>13 Working of the BitTorrent protocol 6</p><p>14 The global and private IP address domains 7</p><p>31 The proposed hierarchical P2P network comprising private networks and</p><p>proxies 21</p><p>32 High level overview of the steps in the FTPNP 24</p><p>33 Fields in a FTPNP packet 25</p><p>34 Sequence of control and data messages in FTPNP 27</p><p>35 Algorithm to share a file 37</p><p>36 (a)The structure of the Credit Records at each Proxy (b)The updation</p><p>of credit records when file transfer occurs between two proxies 41</p><p>37 Downloading a file not present in the same private network 42</p><p>38 Components of the proxy 43</p><p>41 Experimental testbed 48</p><p>42 Download time for the desired file vs size of content shared 51</p><p>43 Download time for the desired file vs size of content shared 52</p><p>44 Dependence of the time to download a file on the size of the content</p><p>shared 54</p><p>45 Dependence of the time to download a file on the size of the content</p><p>shared 55</p></div> <br><p></p>
The Internet today is commonly used as a medium to share large size multimedia
content. This sharing is carried out, a number of times, through the Peer to Peer
sharing architecture rather than the conventional server-client model. The paucity
of network addresses in the Internet has led to the emergence of private and global
networks. Because the identity of peers in a private network remains hidden behind
their global endpoint, P2P applications cannot run between two peers in separate
private networks. Techniques such as hole-punching require the use of a centralized
entity which serves as a bottleneck to the P2P application.
We have proposed a hierarchical P2P network of private and global networks. Here, the
lower tier is formed by the peers in each private network, while the upper tier is formed
by the global endpoints (called proxies) of each of these private networks. We have
designed a new file sharing protocol, FTPNP, between these proxies which preserves
the identities of the actual endpoints of the file transfer, present in separate private
networks. We have also created a Credit Management System in order to ensure fairness
and incentive to share in the designed hierarchical P2P system. We have implemented
all the above proposed features and tested them to ensure the preservation of the
essential features of a P2P network.
📚 Over 50,000 Project Materials
📱 100% Offline: No internet needed
📝 Over 98 Departments
🔍 Software coding and Machine construction
🎓 Postgraduate/Undergraduate Research works
📥 Instant Whatsapp/Email Delivery
The project topic, "Predicting Disease Outbreaks Using Machine Learning and Data Analysis," focuses on utilizing advanced computational techniques to ...
The project on "Implementation of a Real-Time Facial Recognition System using Deep Learning Techniques" aims to develop a sophisticated system that ca...
The project topic "Applying Machine Learning for Network Intrusion Detection" focuses on utilizing machine learning algorithms to enhance the detectio...
The project topic "Analyzing and Improving Machine Learning Model Performance Using Explainable AI Techniques" focuses on enhancing the effectiveness ...
The project topic "Applying Machine Learning Algorithms for Predicting Stock Market Trends" revolves around the application of cutting-edge machine le...
The project topic, "Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems," focuses on the integration of machine learn...
Anomaly detection in Internet of Things (IoT) networks using machine learning algorithms is a critical research area that aims to enhance the security and effic...
Anomaly detection in network traffic using machine learning algorithms is a crucial aspect of cybersecurity that aims to identify unusual patterns or behaviors ...
Predictive maintenance is a proactive maintenance strategy that aims to predict equipment failures before they occur, thereby reducing downtime and maintenance ...