Editorial: Peer-to-Peer networking and applications, Volume 3, Issue 4
Peer-to-Peer Netw. Appl.
Editorial: Peer-to-Peer networking and applications, Volume 3, Issue 4
Xuemin (Sherman) Shen 0 1
Heather Yu 0 1
0 H. Yu Huawei Technologies , Bridgewater, NJ , USA
1 X. (Sherman) Shen (
In this issue of the Peer-to-Peer Networking and Applications, after the survey on Peer-to-Peer Session Initiation Protocol based Communication Systems, six original research works are presented to study the interesting and important problems on document preservation, video on demand, common standard model and development platform, service oriented architectures, and semantic networks. Due to the simplicity, extensibility and flexibility, more and more applications are being developed on the top of Session Initiation Protocol (SIP). To facilitate robustness and fault tolerance, several P2P-based SIP solutions have been proposed. In the survey paper, “A Survey on Peer-to-Peer SIP based Communication Systems”, Zheng and Oleshchuk thoroughly investigate the development on P2P-based SIP by detailing P2PSIP requirements, Chord-based overlays, session initiation services, NAT traversal, and message routing. They also introduce different security problems in P2PSIP and provide possible solutions. Computer and Internet technologies have been pushing our daily lives from paper-based documents to digital documents. In addition to contacts, photographs, movies, music, conversations, and Web-sites, publishers and libraries are also moving towards digital documents. Thus, long-term preservation of these digital documents are becoming crucial. A Peer-to-Peer
-
document preservation system, called LOCKSS (Lots
of Copies Keep Stuff Safe), is developed and put
in use by many libraries around the world. In the
second paper of this issue, “Stealth Modif ication
versus Nuisance Attacks in the LOCKSS Peer-to-Peer
Digital Preservation System”, Roussopoulos et al.
identify and characterize vulnerability of the system
against adversaries attempting stealth modification of
preserved contents. They propose a modification to the
system protocol to handle threat arising from stealth
modification, and at the same time, preserving the
defense mechanism of the original protocol.
User dynamics, upload bandwidth capacity, state of
firewall in between users and Internet, and network
conditions play very important roles in determining
performance of P2P video broadcast networks. In the
third paper, “On-Demand Waypoints for Live P2P
Video Broadcasting”, Ganjam et al. develop a new
P2Pbased video broadcast architecture which can
adaptively utilize idle participants to increase performance
of video broadcast networks.
For many computational/communication problems,
agreements on functionality often result in reusable
models and implementations, such as TCP stack, and
CORBA. Though some efforts have been put to come
up with similar solutions for P2P data management
applications, they are limited to low level P2P services. In
the paper “A Conceptual Model for Data Management
and Distribution in Peer-to-Peer Systems”, Aygün et al.
propose a high level conceptual model for data
management and distribution in P2P systems. Various research
techniques on data management and distribution are
studied and classified according to the proposed model.
To support heterogeneity, distributed applications in
general adapt service oriented computing architectures.
A typical service oriented architecture (SOA) consists
of centralized service registries and service brokers
components which are prone to unreliability and poor
performance. In the paper “Decentralising a
ServiceOriented Architecture”, Sacha et al. introduce a P2P
solution to decentralize these key components of SOA
to increase reliability, scalability and performance.
Although empirical studies of P2P networks are
important, very limited research has been done so far. In
the paper “An Experimental Analysis of Joost
Peer-toPeer VoD Service”, Lei et al. present a comprehensive
analytical and experimental study on Joost, a P2P video
on demand (VoD) application. With the results in hand,
they also propose potential ways to construct more
efficient P2P VoD systems.
Availability of a reliable semantic Peer-to-Peer
(SP2P) network is one of the fundamental
requirements for many P2P systems. Most of the existing works
on SP2P focus on reliability and scalability of the P2P
networks, and ignore the disconnection failures arising
from temporary mapping faults. In the last paper of this
issue, “From P2P to Reliable Semantic P2P Systems”,
Mawlood-Yunis et al. propose an adaptive query
routing technique which sustains temporary mapping faults
to resolve disconnection failures in SP2P networks.
In closing, we would like to acknowledge the
contributions of the authors who submitted their works
and the reviewers who provided their expert opinions
and constructive and helpful comments. We would also
like to extend our sincere thanks to Melissa Fearon, the
Senior Editor, and Cristina Chua of Springer, (...truncated)