1(11) Peer to peer networking
|
|
- Jared Perkins
- 5 years ago
- Views:
Transcription
1 1(11) Peer to peer networking Carl Berg Chalmers 2005
2 2(11) Table of contents Introduction Abstract 3 History 4 Technical overview 5 Comparison to the client/server approach 6 Requirements of an effective P2P network 7 Problems with P2P networks 8 P2P security 9 Uses/Areas of P2P 10 Future of P2P 11 Conclusion 11 References 11
3 3(11) Introduction - Abstract P2P or Peer to peer is described by whatis.com as a communication model in which each party has the same capabilities and each party can initiate a communication session. This communication model differs a bit from the more traditional client/server communication model. The P2P model can be described as giving each node in a network both client and server capabilities. On the Internet, the P2P model can typically be used for a group of computers with the same software to connect with each other to share files and communicate within the group. Technically there is a distinction between P2P systems as centralized or decentralized systems. The centralized system is characterized by one or more main servers that keep information about the content of the network and where it's located. The server can then be queried by the nodes that can then find out where the information or data is located and then initialize a session with that node. The decentralized system does not use a central server to manage the network and nodes. In this model, a node entering the network has to make a connection to one of the nodes already in the network. Queries are then propagated through the network between neighboring nodes. There are also hybrids between these two models, for instance where some nodes may have more bandwidth and processing power, they can act as supernodes or servers for weaker nodes.
4 4(11) History P2P systems emerged in the late 1990's on a global scale with the flagship software called Napster. Napster was then a software used for file-sharing and instant messaging between nodes in a network. Napster's user friendly interface along with cheaper Internet connections made it very popular and provided home users to download music to their computers for free. Napster's popularity however became a big concern to record companies and in 2000, Napster was sued by the rock band Metallica. This started a costly legal battle between record companies and Napster. In 2001 they reached an agreement that Napster was to become a service for paying customers. The Napster network was then shut down until the new version of Napster was finished in The end of Napster as a free way to download music was thought to be the death of P2P systems, but actually caused a variety of new P2P file sharing software of different kinds to emerge like Kazaa, Gnutella, edonkey and more. In the last few years there has also emerged software for other uses than file sharing. Skype is a new and free P2P system for making phone calls over the Internet. Skype has quickly become a successful company and recently launched a service for making phone calls to the regular telecom-network from the Skype-program. The P2P evolution of file sharing software is often divided into three generations. The first generation with applications such as Napster used a centralized network with a few main servers keeping information of nodes and files in the network. This was a quite simple approach to P2P, where queries were made to the server which replied with files that matched the query on the nodes attached. This easily maintained model however made it easy for the network to be shut down, simply by shutting down the central servers. The second generation after Napster s demise with applications like Gnutella chose a different approach to P2P. These applications chose the de-centralized type of P2P networks, which could not be shut down through a few main servers. A new node connects to a certain number of hosts, already in the network, which would become your neighbors. Searching in this type of network would start with sending queries to the neighbors, who would propagate the query to their neighbors and so on. The main advantage of this would be that there is no need for a central server which could be shut down. The disadvantage of this is that searches could be very slow and sub-networks, without connection to the whole network, could be created. The third generation kept the idea of a de-centralized network, but created a few enhancements to the main idea, such as supernodes which means that certain nodes with good resources would act as a server for a part of the network. There are quite a few applications that use this kind of P2P model, such as Kazaa, Morpheus and Grokster which are all connected to the same network called Fasttrack. Fasttrack has also had a few legal problems but it still remains operational and may be the largest P2P network today.
5 5(11) Technical overview The Centralized P2P network (Napster) The centralized P2P network is not considered to be a pure P2P network as it uses the client/server model to some extent. The client/server model is often used to organize the network and storing tables or hash tables with the contents and information of the nodes with their corresponding IP-addresses. Connections or sessions can then be established directly between nodes in the network without a server needed. The main advantage of this kind of network is the simplicity. Nodes can easily be connected and disconnected from the network just by notifying the server. Searching in this kind of network is also an easy task as the server keeps all the necessary information about the network. The server can reply with information such as which nodes that have a certain file and their respective connection speed. The main drawback of this kind of network is the server. If the server is crashes or is shut down, the whole network is shut down and nodes have no means to contact each other. This makes the network vulnerable but from a legal and a security point of view. However, this is not a problem only for the P2P system, but comes more from the general client/server implementation. There can be improvements to the problem, such as having more than one server and potentially a hierarchical server system, but it is still more vulnerable than for example a pure de-centralized system. The De-Centralized P2P network (Gnutella) The de-centralized P2P network is considered to be pure P2P as no servers are involved. Every node in the network acts as its own client/server. Nodes can enter and leave the net without any server knowing about it. The main advantage of this kind of network is the lack of central which makes this it virtually impossible to shut down. The main drawback in this kind of system is its complexity. As no point of authority is given in the net, there s no way for nodes to know who has the information it needs. Therefore every searching node needs to propagate their searches through the network. The propagation of searches in this kind of network is called flooding. The query passes through every node in the network and every node has to function as a router for the query and pass it along. If the information queried for is found, a reply can be sent back using the same path as it had arrived. To avoid a broadcast-storm in the network, each search has a time-to-live counter that decreases with the hop count as it propagates throughout the network. The problem with the de-centralized network is that slow nodes with low bandwidth and slow computers can introduce choke-points in the network, slowing down the propagation of searches, and so far there has been no solution except for the introduction of supernodes, which would make the network a hybrid P2P.
6 6(11) Hybrid P2P network (Kazaa) The hybrid P2P network is generally considered to be a de-centralized network, as there are no fixed servers within the system. However, the hybrid P2P is not a pure P2P network as the network can allow certain nodes to act as local servers. These servers are called supernodes, and consist of regular nodes with high bandwidth and good processing capabilities, that acts as a local server for some nodes and also connects to other supernodes. The supernodes are not chosen beforehand, but as they enter the network, which makes the network very dynamic. This hybrid kind of network has the advantages of both centralized and decentralized network. Searches are more quickly propagated in the network as the introduction of supernodes can prevent choke-points from slowing down searches. The possible drawback is that this kind of network may not be as fast as a centralized network and the de-centralized model will cause more search-traffic in the network, but otherwise this kind of network has mainly the advantages centralized and de-centralized networking. Comparison to the Client/Server approach The client/server architecture is a very common architecture used heavily in networks and on the Internet. Despite the popularity of the architecture there are some problems evident. Some of these are: Robustness The services in a client/server based network are fragile. In a pure client/server network, the availability of a service relies on a server running on a single machine and one or a few communication-links that connect the server to the network. Resilience Scalability High demand If services become interrupted, they will remain unavailable until the faulty device has been replaced. As the client/server services grew more popular, the number of users being able to be serviced does not grow as fast. As the user request for services can vary depending on the time of day or month, sport events etc, the equipment can easily become overloaded. Vulnerability As a server poses as the single point of service in this kind of system, it will become vulnerable to attacks, especially denial of service, but also masquerading and data pollution. These problems are of course well known and have to some extent been solved. For example redundancy can be worked into the system to prevent a crash or device failure to cause the service to go down. Backup and information recovery systems exist to bring a service back quickly. Some servers can reside on machines that has been altered to give less functionality for anything else than service, thus preventing the machine from attacks. In comparison to the client/server server problems, the P2P architecture has the following characteristics: Dependency The P2P architecture is much less dependant on individual devices and the sub network, where a server would reside. Resilience Scalability The P2P architecture also has an improved resilience as sought after files exist in multiple copies. The scalability is also improved in comparison to client/server architecture. The service-capacity can grow close to proportionally to the number of users, as the users themselves can provide with resources.
7 7(11) High demand Vulnerability P2P systems are less vulnerable to high-peak demand. This is because the load is divided between different nodes and different physical locations. P2P systems are less vulnerable to attacks as an attacker would have to attack the whole network to be able to interrupt a service. Requirements of an effective P2P network For a P2P architecture to be constructed, a specification of the infrastructure and how the nodes in this structure should interact, has to be made. Some important issues here are: Network Protocols Name conventions Metadata Search mechanism Software A physical network with an appropriate scale has to exist. The Internet is an example of such a network with wide availability in which P2P services could be implemented. Protocols have to be implemented to provide a platform for communication between nodes in the network. There exists a few protocols today, and more are being researched. Nodes in the network needs to have ways of identifying themselves. For example the socket information (IP-address, port number etc) or an application-specific naming convention could be used. There would also be a need for naming of the digital information in the network. A common approach for this is to generate a hash-string of the binary data within the file. This would cause files with different names, but the same data to be identified as the same file. Files within the network would need some kind of describing data, for instance originator, publisher, title, date and version. When sharing information in a network, there would be a need for a way to search the network for the file or data you want. Searches can be implemented to stop when one matching file is found, or to stop when a certain number of hits has been accomplished. A software would be needed that would implement the client and server functions needed. There exist a lot of applications and often multiple applications within the same network, which would require the software to use common standards and protocols.
8 8(11) Participants For a network to be formed at all there has to be participants. There are various ways for a network to get participants. - Central provision: A school, university or company may choose to make their devices available. - Volunteer users: Users may choose to contribute with computer resources or memory space for a project. A project like this is seti@home, where users in the network contribute by letting their machines perform calculations and sending back the results. This is not really a P2P-network as the network mainly functions with a client server approach. - Service using: Users may join the network because they want to use the service provided by the network. This is currently the most common approach for getting participants to the network. Problems with P2P networks So far the main thing discussed in this report has been the advantages of P2P systems, but as with most technologies, there are drawbacks and problems. One of the main problems in the P2P systems today are attacks like masquerading, such as falsified files that don t match its descriptors, and pollution attacks, like altered versions of known files. There are solutions to these problems like hashing of file-content and digital signatures, much like client/server architectures use. However these solutions can produce a new set of issues like: Determinism Central control Security Client/server architectures embody determinism, whereas P2P systems behave more unpredictably and volatile in the locations of processing services and digital files. This can cause the following problems: - Attempts to revisit old locations of files that may not still be there. - Trust-based dealing with particular organizations may be difficult to achieve. The lack of central control can make it difficult to avoid chokepoints in the network. It is also difficult to establish authority in a P2P network and users are difficult to trace and be accounted for. Therefore some P2P networks will be used for purposes of violating copyright laws and such. As always, security flaws will emerge, and be dealt with over time as protocols and applications are modified to provide better security. Today, file sharing applications often embed different typed of spyware or adware in order to make money from software that otherwise is free.
9 9(11) P2P Security Security in P2P systems is perhaps the major drawback that prevents use of P2P in company networks. Misuse of a file sharing program could cause secret company information to become public for the rest of the world to see. With the use of file sharing P2P applications come a few security issues: Theft Bandwidth Bugs Encryption cracking Virus and Trojans Companies could potentially loose millions of dollars due to stolen property such as source code etc. For example; source code could be compressed in a zip-file and disguised as something else, a P2P application could share the file that could be downloaded by anyone within the same network. A file sharing application in a company or an organizational network could cause the system to slow down significantly. For example have school or campus networks become overloaded due to students using the quick internet connection in school for file-sharing. Bugs in unproven P2P applications could potentially crash a system with important services, causing a company to loose money. Distributed P2P processing is a well known type of use in P2P systems. In significant networks, this could cause a dangerous cracking mechanism. A brute force attack on encrypted systems can be an easy task if the network is large enough. In 1999 Distributed.Net and Electronic Frontier Foundation launched a brute force attack on the 56-bit DES encryption algorithm. The algorithm was broken within 24 hours and Distributed.Net was able to test 245 billion keys per second. At the time, the 56-bit DES algorithm was the strongest encryption the US government allowed for export. P2P applications and applications downloaded with P2P applications could easily contain viruses, trojans or backdoors. The modified applications could then be used for extracting information from the infected computer or giving an intruder access to your system. A hacked P2P program could also give access to files the user has not chosen to share.
10 10(11) Uses/Areas of P2P There are a few different areas in which P2P systems have become popular and useful. The architecture first became popular through the various file-sharing systems that have been discussed thoroughly throughout this report. There are however more areas where P2P systems can be used. Examples of a few different areas: File sharing Calculation Storage Instant Messaging Telephony This is a widely used type of P2P-system. Its main usage is to distribute files within a network. This might however also be a good idea for companies and workgroups to be able to share files. It could also be a forum for free publications. An example is the seti@home P2P system that uses computers within the network for calculation and analyze of data picked up from telescopes in the search for extra terrestrial life. This kind of network is used mainly for calculation of data and is not a pure P2P system, the data is sent to a server when analyzed, however it is an important example of a possible use of a P2P system. There also exist other calculation networks like code-cracking networks for testing different encrypting algorithms. Many computers today are connected to the Internet and have more storage capacity than they need to use. An idea would be to use a P2P system to be able to use extra storage capacity within a network. The storage would have to be redundantly distributed and well encrypted, but it might be a good idea to use extra storage available, just like the extra processing power that can be used in the calculation system, described above. P2P systems are often used within instant messaging (like icq, aol, yahoo, msn messenger). Centralized P2P-systems can successfully be used to initiate conversations, chats, file transfers, work presentations. A node or user can initiate contact with a central server who keeps track of all the users within the system who can establish contact and sessions with each other. An emerging use of P2P systems is internet telephone communication, where users can initiate contact and talk to each other. Like instant messaging, users will log into a central server who keeps track of users that are online and offline. Users can then, with help of their computers, headset or a connected telephone talk to other users. An application that provides this type of service is Skype (developed by Niklas Zennström who also has been working on the file sharing application Kazaa). Skype has evolved over a few years and also has a paying service where users can make phone calls to the regular phone network (Skype Out) as well as taking calls from the regular phone network (Skype In). Skype In is their latest addition to their list of services and is in the writing moment available in Sweden, Denmark, Finland, Great Britain, France, Hong Kong and USA. Internet telephony is an interesting new field in the P2P networks, and shows that there is also a commercial value in P2P networks.
11 11(11) Future of P2P It is fair to say that P2P systems are playing an important role in the use of the internet today. Even if file sharing possibly still is the largest use of P2P systems at this day, there exist other areas of use. In the near future it is likely that there will appear more use for P2P systems. P2P systems will never replace the client/server architecture, as some information will need authentication to be accessed and P2P systems are constantly victims of change and are still considered a bit unstable for important information. However the open source community have adapted more quickly to the use of P2P systems. Linux distribution and Linux application are often made accessible through P2P systems like bittorrent. This would be an advantage, not needing to have expensive high demand equipment to host files, but using a P2P system for distribution as there are likely other users with the files you want. Non commercial and free software will probably use P2P systems more frequently to reduce costs of hosting files themselves. So far only a few major organizations have developed or talked about P2P systems. A corporative use of P2P could be the share of information. Companies often try to open up their organization and share competence among its employees and P2P could be a tool for this. The P2P system is likely considered to be a too unstable platform of communication at this point. Another disadvantage is that P2P applications can slow a system down by using a lot of bandwidth and computational power processing searches and uploading files for instance. There is certainly a future for P2P systems although they need to be proven from a security point of view to be used also in the corporate world. Conclusions P2P is a potent architecture with interesting possibilities for the future. It is no replacement to the client/server architecture, but a good compliment. Its drawback of increasing bandwidth use is not an important issue to home users as high speed internet connections is becoming cheaper with time. System critical files distribution will probably always take place with a server/client architecture, as P2P architecture still is considered unstable and not secure enough, but P2P shows a lot of promise and security issues is constantly being dealt with. P2P systems will certainly be used in the future as well and probably in other areas of communication too. Even if file sharing is main usage today, there will probably emerge a lot of new technologies in the future using P2P. References 1. P2P Networks 2. Peer-to-Peer (P2P) - An Overview 3. Between rhizomes and trees: P2P Information Systems 4. Mac-P2P.com: Peer to Peer (P2P) Introduction and History 5. The P2P Report - Knowledge Management Research Center CIO
Introduction to Peer-to-Peer Systems
Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed
More informationPeer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today
Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become
More informationP2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems
P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically
More informationPeer-to-Peer Architectures and Signaling. Agenda
Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationPeer-to-peer systems and overlay networks
Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems
More information- Content Security in P2P
Why Jenny can t share the content with Jane? - Content Security in P2P Heather Yu Huawei Technologies heathery@ieee.org Future of Networked Home A vision voice video text Data gaming IPTV streaming IM
More informationPeer-to-Peer Signalling. Agenda
Peer-to-Peer Signalling Marcin Matuszewski marcin@netlab.hut.fi S-38.115 Signalling Protocols Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction Peer-to-Peer (P2P) is a communications
More informationFiltering of Peer-to-peer traffic. Martin Gejke
Filtering of Peer-to-peer traffic Martin Gejke Table of Contents Filtering of Peer-to-peer traffic... 3 Peer-to-peer basics...3 Filtering...3 Position of the filter... 4 Methods of filtering... 4 Traffic
More informationUnit 8 Peer-to-Peer Networking
Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationOssification of the Internet
Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major
More informationDistributed Knowledge Organization and Peer-to-Peer Networks
Knowledge Organization and Peer-to-Peer Networks Klaus Wehrle Group Chair of Computer Science IV RWTH Aachen University http://ds.cs.rwth-aachen.de 1 Organization of Information Essential challenge in?
More informationP2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies
P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play
More informationOverview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste
Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationPeer-to-Peer Networks
Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week
More informationLecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:
PP Lecture 1 Peer-to-Peer Model March 16, 005 Overview: centralized database: Napster query flooding: Gnutella intelligent query flooding: KaZaA swarming: BitTorrent unstructured overlay routing: Freenet
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationOverlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen
Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationEECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations
EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley
More informationPeer-to-Peer Applications Reading: 9.4
Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationExtreme Computing. BitTorrent and incentive-based overlay networks.
Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some
More informationFast Traffic Tactics
TRAFFIC TACTICS VOLUME #2: Fast Traffic Tactics Special Report (F): Peer-to-Peer Network Tactics Legal Notice: The Publisher has strived to be as accurate and complete as possible in the creation of this
More informationData Communication. Chapter # 5: Networking Threats. By: William Stalling
Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals
More informationThe early developers of ARPANET and the Internet allowed themselves to
01 JXTA.qxd 7/15/02 2:25 PM Page 1 CHAPTER 1 Introduction to Peer-to-Peer The early developers of ARPANET and the Internet allowed themselves to dream about a day when computers around the world would
More informationOverlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.
Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University
More informationExperimental Study of Skype. Skype Peer-to-Peer VoIP System
An Experimental Study of the Skype Peer-to-Peer VoIP System Saikat Guha (Cornell) Neil Daswani (Google) Ravi Jain (Google) IPTPS 2006 About Skype Voice over IP (VoIP) 50 million users Valued at $2.6 billion
More informationPeer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables CS 240: Computing Systems and Concurrency Lecture 8 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Selected
More informationToday. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables COS 418: Distributed Systems Lecture 7 Today 1. Peer-to-Peer Systems Napster, Gnutella, BitTorrent, challenges 2. Distributed Hash Tables 3. The Chord Lookup
More informationPeer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer
Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer evyncke@cisco.com 2002, Cisco Systems, Inc. All rights reserved. 1 Agenda Introduction to peer to peer
More informationITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.
ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY 2005. PAPER ON THE STATE OF CYBERSECURITY IN UGANDA. BY : UGANDA COMMUNICATIONS COMMISSION 1.0: Background Uganda, like
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationPeer-to-Peer Systems. Internet Computing Workshop Tom Chothia
Peer-to-Peer Systems Internet Computing Workshop Tom Chothia Plagiarism Reminder Plagiarism is a very serious offense. Never submit work by other people without clearly stating who wrote it. If you did
More informationACN Peer-to-Peer Networks. Günther Langmann
ACN 2007 Peer-to-Peer Networks Günther Langmann Content What are P2P Networks Properties of P2P Networks History of P2P Networks Classifications Comparison Unstructured and structured P2P Networks Advantages
More informationDistributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201
Distributed Systems ID2201 peer-to-peer Johan Montelius 1 Idéa use resources in edge of network computing storage communication 2 Computing 3 seti@home central server millions of clients hundred of thousands
More informationPeer to Peer Computing
Peer to Peer Computing These slides are based on the slides made available by the authors of Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationPeer-to-Peer (P2P) Systems
Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationPeer-to-Peer Internet Applications: A Review
Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation
More informationComputer Networks. Chapter 1 An Introduction to Networking
Computer Networks Chapter 1 An Introduction to Networking Contents Why use network? Network history Types of networks By connecting methods By geographic areas By topologies By network model Why Use Networks?
More informationPeer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K.
Peer-to-peer T-110.7100 Applications and Services in Internet, Fall 2009 Jukka K. Nurminen 1 V1-Filename.ppt / 2008-10-22 / Jukka K. Nurminen Schedule Tue 15.9.2009 12-14 Tue 22.9.2009 12-14 Introduction
More informationNetwork+ Guide to Networks 5 th Edition. Chapter 1 An Introduction to Networking
Network+ Guide to Networks 5 th Edition Chapter 1 An Introduction to Networking Goals of This Chapter List the advantages of networked computing relative to standalone computing Distinguish between client/server
More informationContent Search. Unstructured P2P. Jukka K. Nurminen
Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd
More informationChapter 11: Networks
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
More informationIntroduction on Peer to Peer systems
Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr dacosta@irit.fr 1/55 Goal of this Lecture What can P2P do, not only as a buzzword What it can't do Shows some examples & algorithms
More informationEE 122: Peer-to-Peer Networks
EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer
More informationAdvanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering
More informationContent Search. Unstructured P2P
Content Search Unstructured P2P Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University *Partly adapted from original slides provided
More information6. Peer-to-peer (P2P) networks I.
6. Peer-to-peer (P2P) networks I. PA159: Net-Centric Computing I. Eva Hladká Faculty of Informatics Masaryk University Autumn 2010 Eva Hladká (FI MU) 6. P2P networks I. Autumn 2010 1 / 46 Lecture Overview
More informationVoIP/SIP: Economy and Mobility
Nowadays VoIP-services become more and more popular all over the world. VoIP stands for Voice Over Internet Protocol, a communications protocol that allows for telephonic communication via the Internet.
More informationGeorges Da Costa Introduction on Peer to Peer systems
Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr Goal of this Lecture What can P2P do, not only as a buzzword What it can t do Shows some examples & algorithms A Survey and Comparison
More informationDistributed Systems. Peer- to- Peer. Rik Sarkar James Cheney. University of Edinburgh Spring 2014
Distributed Systems Peer- to- Peer Rik Sarkar James Cheney University of Edinburgh Spring 2014 Peer to Peer The common percepdon A system for distribudng (sharing?) files Using the computers of common
More informationPage 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"
How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth
More informationDarknet Technology and Anonymity
Säkra Datorsystem Ht-07 Darknet Technology and Anonymity Robert Andersson, Patrik Åkerstrand,Björn Remius roan4801, paak7145, bjre4725 @ student.uu.se Contents Abstract... 3 Darknet... 3 Background...
More informationA Survey of Peer-to-Peer Content Distribution Technologies
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview
More informationA Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation
A Security Model for Space Based Communication Thom Stone Computer Sciences Corporation Prolog Everything that is not forbidden is compulsory -T.H. White They are after you Monsters in the Closet Virus
More informationStratos Idreos. A thesis submitted in fulfillment of the requirements for the degree of. Electronic and Computer Engineering
P2P-DIET: A QUERY AND NOTIFICATION SERVICE BASED ON MOBILE AGENTS FOR RAPID IMPLEMENTATION OF P2P APPLICATIONS by Stratos Idreos A thesis submitted in fulfillment of the requirements for the degree of
More informationPeer-to-peer networks: pioneers, self-organisation, small-world-phenomenons
Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Patrick Baier October 10, 2008 Contents 1 Introduction 1 1.1 Preamble.................................... 1 1.2 Definition....................................
More informationFoothill-De Anza Community College District Wireless Networking Guidelines. Problems Connecting to or Using the Wireless Network
Foothill-De Anza Community College District Wireless Networking Guidelines Problems Connecting to or Using the Wireless Network My login name and password are not working. HELP! There are different wireless
More informationTHE COMPLETE FIELD GUIDE TO THE WAN
THE COMPLETE FIELD GUIDE TO THE WAN People interested in setting up a wide-area network (WAN) often have very specific reasons for wanting to do so. WANs are specialized technological tools that deliver
More informationPeer-to-peer & Energy Consumption
Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationIntroduction to Distributed * Systems
Introduction to Distributed * Systems Outline about the course relationship to other courses the challenges of distributed systems distributed services *ility for distributed services about the course
More informationChapter Nine. Networking and Telecommunication
Chapter Nine Networking and Telecommunication After reading this chapter, you should be able to: Describe the nature and function of local area networks and wide area networks Discuss the uses and implications
More informationCMSC 332 Computer Networks P2P and Sockets
CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that
More informationDISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES
DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application
More informationDistributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016
Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can
More informationChapter 11: It s a Network. Introduction to Networking
Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting
More informationPricing of Mobile Peer-to-Peer application
Pricing of Mobile Peer-to-Peer application 20 March 2003 Yang Qiu Helsinki University of Technology yangqiu@cc.hut.fi Abstract This paper analyzes the pricing of fixed and mobile peer-to-peer application.
More informationCSE 486/586 Distributed Systems Peer-to-Peer Architectures
CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationMulti-vector DDOS Attacks
Multi-vector DDOS Attacks Detection and Mitigation Paul Mazzucco Chief Security Officer August 2015 Key Reasons for Cyber Attacks Money and more money Large number of groups From unskilled to advanced
More informationNETWORKING 3.0. Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING. Remarkably Simple
NETWORKING 3.0 Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING Highly Available Remarkably Simple Radically Secure IP complexity is holding your business back As
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationOverview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks
Overview Handling Security Incidents Chapter 7 Lecturer: Pei-yih Ting Attacks Security Incidents Handling Security Incidents Incident management Methods and Tools Maintaining Incident Preparedness Standard
More informationACN Premium Technical Support. 24/7/365 Remote Computer Support
ACN Premium Technical Support 24/7/365 Remote Computer Support What is ACN Premium Technical Support? Premier provider of technical assistance for your computer and electronic devices 24/7/365 remote on-demand
More informationDistributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017
Distributed Systems 16. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2017 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can
More informationWAFA X3 Evolution Grade of Service. 13 October 2008
Evolution Grade of Service 13 October 2008 1 Grades of Service at a glance The following table (Figure 1) highlights the various Grades of Service that are available on the Evolution Service. It enables
More informationThe Telephony Denial of Service (TDoS) Threat
The Telephony Denial of Service (TDoS) Threat An Analysis of the TDoS Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Telephony Denial-of-Service (TDoS) and The Public Voice
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationHOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?
HOW WORKS And Who Needs a Content Distribution Network Anyway? Efficient and Inefficient Networks If all networks were fast, efficient, and never suffered from congestion there wouldn t be any need for
More informationPEER-TO-PEER NETWORKS, DHTS, AND CHORD
PEER-TO-PEER NETWORKS, DHTS, AND CHORD George Porter May 25, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license
More informationInternet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!
Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams
More informationAddressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?
Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems
More informationFlowMon ADS implementation case study
FlowMon ADS implementation case study Kamil Doležel Kamil.dolezel@advaict.com AdvaICT, a.s. Brno, Czech Republic Abstract FlowMon ADS implementation provides completely new insight into networks of all
More informationAssignment 5. Georgia Koloniari
Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last
More informationCMSC 322 Computer Networks Applications and End-To- End
CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework
More informationIntroduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?
Introduction Controlling Information Systems When computer systems fail to work as required, firms that depend heavily on them experience a serious loss of business function. M7011 Peter Lo 2005 1 M7011
More informationDistributed Systems 26. Mobile Ad Hoc Mesh Networks
Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers
More informationMIS 300 Exam 2 Spring 2011
MIS 300 Exam 2 Spring 2011 Name: Instructions Turn off your cell phone. Close your notes and book. Answer each question by selecting the best response. For True/False questions, select A for and B for.
More informationOptimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO,
Optimizing the Internet Quality of Service and Economics for the Digital Generation Dr. Lawrence Roberts President and CEO, lroberts@anagran.com Original Internet Design File Transfer and Remote Computing
More informationScaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p?
Scaling Problem 15-441 Computer Networking Millions of clients server and network meltdown Lecture 23: Peer-Peer Systems Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 2 P2P System Why p2p?
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationFile Sharing in Less structured P2P Systems
File Sharing in Less structured P2P Systems. Bhosale S.P. 1, Sarkar A.R. 2 Computer Science And Engg. Dept., SVERI s College of Engineering Pandharpur Solapur, India1 Asst.Prof, Computer Science And Engg.
More informationSecurity for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818
Security for Structured Peer-to-peer Overlay Networks By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 1 Acknowledgement Some of the following slides are borrowed from talks by Yun Mao
More information