[p2prg] draft list of initial topics for different challenge areas in P2P research

sanghamitra de <still.dedes3@gmail.com> Sat, 14 July 2012 17:46 UTC

Return-Path: <still.dedes3@gmail.com>
X-Original-To: p2prg@ietfa.amsl.com
Delivered-To: p2prg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2FE721F8627 for <p2prg@ietfa.amsl.com>; Sat, 14 Jul 2012 10:46:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level:
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iylSCLzE7BtF for <p2prg@ietfa.amsl.com>; Sat, 14 Jul 2012 10:46:52 -0700 (PDT)
Received: from mail-yx0-f182.google.com (mail-yx0-f182.google.com [209.85.213.182]) by ietfa.amsl.com (Postfix) with ESMTP id 69F7E21F8554 for <p2prg@irtf.org>; Sat, 14 Jul 2012 10:46:51 -0700 (PDT)
Received: by yenl8 with SMTP id l8so5019507yen.13 for <p2prg@irtf.org>; Sat, 14 Jul 2012 10:47:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=XNCOtf3HNw6WIhxGo6qJsqUGrzgjKTPOBtUhpBSMjuY=; b=hW7xbcMgFAXog3Y/Ea/ccV0p4MN+4lFg7ah5jlSlG7XXrVVYkJVwWic/UxpWWTxWRK wELWtR/5c1Sah2WzamBD6TpCNYqHXiSUS2azetlmP1q6xN0XKjReEp7Tfhdlbs1vRY5m kvBDlrxwbtt22hPIzBS7SO4+71BRdbxGPcVt26zjSQ+K0KV7zmcnygBawtCRFeWK/TTU QzicbvM+bxH8Hd5cKtvUbtVqhf+rayMxBMT5yX9eG5cm3SUuH+pl9zLVHMjMMhrh2kWm 3IJP4UmeCJ1WMt20j6gOBnQl3E7w+BEeTVOvmho4dcv+44L7F0kAO9/hr7eMLlqEuWqL YADw==
MIME-Version: 1.0
Received: by 10.50.181.225 with SMTP id dz1mr1916626igc.2.1342288050162; Sat, 14 Jul 2012 10:47:30 -0700 (PDT)
Received: by 10.231.206.78 with HTTP; Sat, 14 Jul 2012 10:47:30 -0700 (PDT)
Date: Sat, 14 Jul 2012 23:17:30 +0530
Message-ID: <CAFnsHVyMU4s6pDa0_CVQ3xgm_BpS85WtLhicpV2R4wOdtv8eyg@mail.gmail.com>
From: sanghamitra de <still.dedes3@gmail.com>
To: p2prg@irtf.org
Content-Type: multipart/alternative; boundary="14dae93409816a8cf704c4cdcab9"
Subject: [p2prg] draft list of initial topics for different challenge areas in P2P research
X-BeenThere: p2prg@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Peer-to-Peer Research Group <p2prg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/p2prg>, <mailto:p2prg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/p2prg>
List-Post: <mailto:p2prg@irtf.org>
List-Help: <mailto:p2prg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/p2prg>, <mailto:p2prg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Jul 2012 18:04:22 -0000

Greetings,
In the work proposals, I found a proposed *draft* list of initial topics
the P2PRG should address in the area of new methods for optimizing P2P
application overlays, performing routing and peer selection decisions,
managing traffic and discovering resources. The initial topics listed were:

   - A deliverable on taxonomizing the uses of P2P applications: file
   sharing applications (BitTorrent?, eMule, eDonkey, etc.), interactive
   communications-oriented applications (p2psip, Skype), media relaying
   systems (Joost), patch distribution systems, social networks, replacing
   critical infrastructure (CoDNS), global persistent storage (CFS,
   OceanStore?).
   - An empirical study of peer distributions in BitTorrent? swarms.
   - A survey of peer selection optimization solutions currently proposed
   for P2P applications.
   - Impact of peer selection strategies on cross-ISP fairness.
   - Peer-selection for P2P streaming.

 .
Are there similar draft lists for other challenge areas in P2P research
like:

   - storage, reliability, and information retrieval in P2P systems
   - security, privacy, anonymity and trust in P2P network.
   - P2P systems deployed to measure, monitor and characterize P2P
   applications
   - requirements of new applications (e.g., real-time P2P applications or
   P2P applications for wireless networks) on the P2P technologies used

Thanks
S. De