Peer-to-Peer (P2P) Architecture Quiz

Q1. Alice is designing a P2P system with a structured DHT overlay, while Bob opts for an unstructured network where peers connect arbitrarily. Which outcome is likely as their networks grow?




Q2. In a Chord distributed hash table, each node maintains a finger table. What is the purpose of this finger table?




Q3. Alice notices her BitTorrent client downloading different pieces of a file from multiple peers at once and that her download speeds up when she uploads to others. Which P2P techniques are at play in this scenario?




Q4. Peer X and Peer Y are both behind NAT routers and want to establish a direct P2P connection. Which technique can allow them to connect without routing all traffic through a server?




Q5. A file-sharing network relies on a handful of super-nodes to index content and route searches for all peers. What is a major risk of this design?




Q6. In a P2P key-value store, each data item is replicated on multiple peers. Nodes periodically exchange their data checksums and update any missing or out-of-date entries on each other. What is this background process called, enabling eventual consistency?




Q7. A malicious actor floods a decentralized network with hundreds of new nodes under its control, hoping to outweigh honest participants and influence protocol outcomes. What kind of attack is this scenario an example of?




Q8. Node Z joins a blockchain’s P2P network but unknowingly connects only to attacker-controlled peers. Those peers filter and alter the information Z receives, effectively cutting Z off from the honest network. What attack is Node Z a victim of?




Q9. New decentralized storage networks like Filecoin reward users with blockchain tokens for sharing disk space. Classic P2P networks like BitTorrent lacked such tokens – how did BitTorrent motivate peers to contribute uploads?




Q10. A large P2P cluster uses an epidemic gossip protocol to disseminate membership and state updates. Which statement describes a key property of such gossip-based updates?




Q11. A distributed DHT has to operate under high churn (nodes frequently joining and leaving). What is a likely effect if the system isn’t designed to handle this churn?




Q12. Two peers are behind symmetric NATs, which assign new random ports for each external host. The peers find that UDP hole punching via STUN fails to connect them. What can be used as a fallback to enable communication?




Q13. BitTorrent’s Mainline DHT uses the Kademlia algorithm. Suppose your client is looking up a key in this Kademlia DHT. How does it home in on the node responsible for that key?




Q14. In a geo-distributed P2P database, Node A updates a record, but Node B (a replica) doesn’t reflect the change for a short while. What do we call this delay where Node B serves stale data?




Q15. To counter Sybil attacks in a P2P network, the protocol makes joining identities “expensive.” Which approach reflects this strategy?




software-architecture