1(11) Peer to peer networking

Size: px
Start display at page:

Download "1(11) Peer to peer networking"

Transcription

1 1(11) Peer to peer networking Carl Berg Chalmers 2005

2 2(11) Table of contents Introduction Abstract 3 History 4 Technical overview 5 Comparison to the client/server approach 6 Requirements of an effective P2P network 7 Problems with P2P networks 8 P2P security 9 Uses/Areas of P2P 10 Future of P2P 11 Conclusion 11 References 11

3 3(11) Introduction - Abstract P2P or Peer to peer is described by whatis.com as a communication model in which each party has the same capabilities and each party can initiate a communication session. This communication model differs a bit from the more traditional client/server communication model. The P2P model can be described as giving each node in a network both client and server capabilities. On the Internet, the P2P model can typically be used for a group of computers with the same software to connect with each other to share files and communicate within the group. Technically there is a distinction between P2P systems as centralized or decentralized systems. The centralized system is characterized by one or more main servers that keep information about the content of the network and where it's located. The server can then be queried by the nodes that can then find out where the information or data is located and then initialize a session with that node. The decentralized system does not use a central server to manage the network and nodes. In this model, a node entering the network has to make a connection to one of the nodes already in the network. Queries are then propagated through the network between neighboring nodes. There are also hybrids between these two models, for instance where some nodes may have more bandwidth and processing power, they can act as supernodes or servers for weaker nodes.

4 4(11) History P2P systems emerged in the late 1990's on a global scale with the flagship software called Napster. Napster was then a software used for file-sharing and instant messaging between nodes in a network. Napster's user friendly interface along with cheaper Internet connections made it very popular and provided home users to download music to their computers for free. Napster's popularity however became a big concern to record companies and in 2000, Napster was sued by the rock band Metallica. This started a costly legal battle between record companies and Napster. In 2001 they reached an agreement that Napster was to become a service for paying customers. The Napster network was then shut down until the new version of Napster was finished in The end of Napster as a free way to download music was thought to be the death of P2P systems, but actually caused a variety of new P2P file sharing software of different kinds to emerge like Kazaa, Gnutella, edonkey and more. In the last few years there has also emerged software for other uses than file sharing. Skype is a new and free P2P system for making phone calls over the Internet. Skype has quickly become a successful company and recently launched a service for making phone calls to the regular telecom-network from the Skype-program. The P2P evolution of file sharing software is often divided into three generations. The first generation with applications such as Napster used a centralized network with a few main servers keeping information of nodes and files in the network. This was a quite simple approach to P2P, where queries were made to the server which replied with files that matched the query on the nodes attached. This easily maintained model however made it easy for the network to be shut down, simply by shutting down the central servers. The second generation after Napster s demise with applications like Gnutella chose a different approach to P2P. These applications chose the de-centralized type of P2P networks, which could not be shut down through a few main servers. A new node connects to a certain number of hosts, already in the network, which would become your neighbors. Searching in this type of network would start with sending queries to the neighbors, who would propagate the query to their neighbors and so on. The main advantage of this would be that there is no need for a central server which could be shut down. The disadvantage of this is that searches could be very slow and sub-networks, without connection to the whole network, could be created. The third generation kept the idea of a de-centralized network, but created a few enhancements to the main idea, such as supernodes which means that certain nodes with good resources would act as a server for a part of the network. There are quite a few applications that use this kind of P2P model, such as Kazaa, Morpheus and Grokster which are all connected to the same network called Fasttrack. Fasttrack has also had a few legal problems but it still remains operational and may be the largest P2P network today.

5 5(11) Technical overview The Centralized P2P network (Napster) The centralized P2P network is not considered to be a pure P2P network as it uses the client/server model to some extent. The client/server model is often used to organize the network and storing tables or hash tables with the contents and information of the nodes with their corresponding IP-addresses. Connections or sessions can then be established directly between nodes in the network without a server needed. The main advantage of this kind of network is the simplicity. Nodes can easily be connected and disconnected from the network just by notifying the server. Searching in this kind of network is also an easy task as the server keeps all the necessary information about the network. The server can reply with information such as which nodes that have a certain file and their respective connection speed. The main drawback of this kind of network is the server. If the server is crashes or is shut down, the whole network is shut down and nodes have no means to contact each other. This makes the network vulnerable but from a legal and a security point of view. However, this is not a problem only for the P2P system, but comes more from the general client/server implementation. There can be improvements to the problem, such as having more than one server and potentially a hierarchical server system, but it is still more vulnerable than for example a pure de-centralized system. The De-Centralized P2P network (Gnutella) The de-centralized P2P network is considered to be pure P2P as no servers are involved. Every node in the network acts as its own client/server. Nodes can enter and leave the net without any server knowing about it. The main advantage of this kind of network is the lack of central which makes this it virtually impossible to shut down. The main drawback in this kind of system is its complexity. As no point of authority is given in the net, there s no way for nodes to know who has the information it needs. Therefore every searching node needs to propagate their searches through the network. The propagation of searches in this kind of network is called flooding. The query passes through every node in the network and every node has to function as a router for the query and pass it along. If the information queried for is found, a reply can be sent back using the same path as it had arrived. To avoid a broadcast-storm in the network, each search has a time-to-live counter that decreases with the hop count as it propagates throughout the network. The problem with the de-centralized network is that slow nodes with low bandwidth and slow computers can introduce choke-points in the network, slowing down the propagation of searches, and so far there has been no solution except for the introduction of supernodes, which would make the network a hybrid P2P.

6 6(11) Hybrid P2P network (Kazaa) The hybrid P2P network is generally considered to be a de-centralized network, as there are no fixed servers within the system. However, the hybrid P2P is not a pure P2P network as the network can allow certain nodes to act as local servers. These servers are called supernodes, and consist of regular nodes with high bandwidth and good processing capabilities, that acts as a local server for some nodes and also connects to other supernodes. The supernodes are not chosen beforehand, but as they enter the network, which makes the network very dynamic. This hybrid kind of network has the advantages of both centralized and decentralized network. Searches are more quickly propagated in the network as the introduction of supernodes can prevent choke-points from slowing down searches. The possible drawback is that this kind of network may not be as fast as a centralized network and the de-centralized model will cause more search-traffic in the network, but otherwise this kind of network has mainly the advantages centralized and de-centralized networking. Comparison to the Client/Server approach The client/server architecture is a very common architecture used heavily in networks and on the Internet. Despite the popularity of the architecture there are some problems evident. Some of these are: Robustness The services in a client/server based network are fragile. In a pure client/server network, the availability of a service relies on a server running on a single machine and one or a few communication-links that connect the server to the network. Resilience Scalability High demand If services become interrupted, they will remain unavailable until the faulty device has been replaced. As the client/server services grew more popular, the number of users being able to be serviced does not grow as fast. As the user request for services can vary depending on the time of day or month, sport events etc, the equipment can easily become overloaded. Vulnerability As a server poses as the single point of service in this kind of system, it will become vulnerable to attacks, especially denial of service, but also masquerading and data pollution. These problems are of course well known and have to some extent been solved. For example redundancy can be worked into the system to prevent a crash or device failure to cause the service to go down. Backup and information recovery systems exist to bring a service back quickly. Some servers can reside on machines that has been altered to give less functionality for anything else than service, thus preventing the machine from attacks. In comparison to the client/server server problems, the P2P architecture has the following characteristics: Dependency The P2P architecture is much less dependant on individual devices and the sub network, where a server would reside. Resilience Scalability The P2P architecture also has an improved resilience as sought after files exist in multiple copies. The scalability is also improved in comparison to client/server architecture. The service-capacity can grow close to proportionally to the number of users, as the users themselves can provide with resources.

7 7(11) High demand Vulnerability P2P systems are less vulnerable to high-peak demand. This is because the load is divided between different nodes and different physical locations. P2P systems are less vulnerable to attacks as an attacker would have to attack the whole network to be able to interrupt a service. Requirements of an effective P2P network For a P2P architecture to be constructed, a specification of the infrastructure and how the nodes in this structure should interact, has to be made. Some important issues here are: Network Protocols Name conventions Metadata Search mechanism Software A physical network with an appropriate scale has to exist. The Internet is an example of such a network with wide availability in which P2P services could be implemented. Protocols have to be implemented to provide a platform for communication between nodes in the network. There exists a few protocols today, and more are being researched. Nodes in the network needs to have ways of identifying themselves. For example the socket information (IP-address, port number etc) or an application-specific naming convention could be used. There would also be a need for naming of the digital information in the network. A common approach for this is to generate a hash-string of the binary data within the file. This would cause files with different names, but the same data to be identified as the same file. Files within the network would need some kind of describing data, for instance originator, publisher, title, date and version. When sharing information in a network, there would be a need for a way to search the network for the file or data you want. Searches can be implemented to stop when one matching file is found, or to stop when a certain number of hits has been accomplished. A software would be needed that would implement the client and server functions needed. There exist a lot of applications and often multiple applications within the same network, which would require the software to use common standards and protocols.

8 8(11) Participants For a network to be formed at all there has to be participants. There are various ways for a network to get participants. - Central provision: A school, university or company may choose to make their devices available. - Volunteer users: Users may choose to contribute with computer resources or memory space for a project. A project like this is seti@home, where users in the network contribute by letting their machines perform calculations and sending back the results. This is not really a P2P-network as the network mainly functions with a client server approach. - Service using: Users may join the network because they want to use the service provided by the network. This is currently the most common approach for getting participants to the network. Problems with P2P networks So far the main thing discussed in this report has been the advantages of P2P systems, but as with most technologies, there are drawbacks and problems. One of the main problems in the P2P systems today are attacks like masquerading, such as falsified files that don t match its descriptors, and pollution attacks, like altered versions of known files. There are solutions to these problems like hashing of file-content and digital signatures, much like client/server architectures use. However these solutions can produce a new set of issues like: Determinism Central control Security Client/server architectures embody determinism, whereas P2P systems behave more unpredictably and volatile in the locations of processing services and digital files. This can cause the following problems: - Attempts to revisit old locations of files that may not still be there. - Trust-based dealing with particular organizations may be difficult to achieve. The lack of central control can make it difficult to avoid chokepoints in the network. It is also difficult to establish authority in a P2P network and users are difficult to trace and be accounted for. Therefore some P2P networks will be used for purposes of violating copyright laws and such. As always, security flaws will emerge, and be dealt with over time as protocols and applications are modified to provide better security. Today, file sharing applications often embed different typed of spyware or adware in order to make money from software that otherwise is free.

9 9(11) P2P Security Security in P2P systems is perhaps the major drawback that prevents use of P2P in company networks. Misuse of a file sharing program could cause secret company information to become public for the rest of the world to see. With the use of file sharing P2P applications come a few security issues: Theft Bandwidth Bugs Encryption cracking Virus and Trojans Companies could potentially loose millions of dollars due to stolen property such as source code etc. For example; source code could be compressed in a zip-file and disguised as something else, a P2P application could share the file that could be downloaded by anyone within the same network. A file sharing application in a company or an organizational network could cause the system to slow down significantly. For example have school or campus networks become overloaded due to students using the quick internet connection in school for file-sharing. Bugs in unproven P2P applications could potentially crash a system with important services, causing a company to loose money. Distributed P2P processing is a well known type of use in P2P systems. In significant networks, this could cause a dangerous cracking mechanism. A brute force attack on encrypted systems can be an easy task if the network is large enough. In 1999 Distributed.Net and Electronic Frontier Foundation launched a brute force attack on the 56-bit DES encryption algorithm. The algorithm was broken within 24 hours and Distributed.Net was able to test 245 billion keys per second. At the time, the 56-bit DES algorithm was the strongest encryption the US government allowed for export. P2P applications and applications downloaded with P2P applications could easily contain viruses, trojans or backdoors. The modified applications could then be used for extracting information from the infected computer or giving an intruder access to your system. A hacked P2P program could also give access to files the user has not chosen to share.

10 10(11) Uses/Areas of P2P There are a few different areas in which P2P systems have become popular and useful. The architecture first became popular through the various file-sharing systems that have been discussed thoroughly throughout this report. There are however more areas where P2P systems can be used. Examples of a few different areas: File sharing Calculation Storage Instant Messaging Telephony This is a widely used type of P2P-system. Its main usage is to distribute files within a network. This might however also be a good idea for companies and workgroups to be able to share files. It could also be a forum for free publications. An example is the seti@home P2P system that uses computers within the network for calculation and analyze of data picked up from telescopes in the search for extra terrestrial life. This kind of network is used mainly for calculation of data and is not a pure P2P system, the data is sent to a server when analyzed, however it is an important example of a possible use of a P2P system. There also exist other calculation networks like code-cracking networks for testing different encrypting algorithms. Many computers today are connected to the Internet and have more storage capacity than they need to use. An idea would be to use a P2P system to be able to use extra storage capacity within a network. The storage would have to be redundantly distributed and well encrypted, but it might be a good idea to use extra storage available, just like the extra processing power that can be used in the calculation system, described above. P2P systems are often used within instant messaging (like icq, aol, yahoo, msn messenger). Centralized P2P-systems can successfully be used to initiate conversations, chats, file transfers, work presentations. A node or user can initiate contact with a central server who keeps track of all the users within the system who can establish contact and sessions with each other. An emerging use of P2P systems is internet telephone communication, where users can initiate contact and talk to each other. Like instant messaging, users will log into a central server who keeps track of users that are online and offline. Users can then, with help of their computers, headset or a connected telephone talk to other users. An application that provides this type of service is Skype (developed by Niklas Zennström who also has been working on the file sharing application Kazaa). Skype has evolved over a few years and also has a paying service where users can make phone calls to the regular phone network (Skype Out) as well as taking calls from the regular phone network (Skype In). Skype In is their latest addition to their list of services and is in the writing moment available in Sweden, Denmark, Finland, Great Britain, France, Hong Kong and USA. Internet telephony is an interesting new field in the P2P networks, and shows that there is also a commercial value in P2P networks.

11 11(11) Future of P2P It is fair to say that P2P systems are playing an important role in the use of the internet today. Even if file sharing possibly still is the largest use of P2P systems at this day, there exist other areas of use. In the near future it is likely that there will appear more use for P2P systems. P2P systems will never replace the client/server architecture, as some information will need authentication to be accessed and P2P systems are constantly victims of change and are still considered a bit unstable for important information. However the open source community have adapted more quickly to the use of P2P systems. Linux distribution and Linux application are often made accessible through P2P systems like bittorrent. This would be an advantage, not needing to have expensive high demand equipment to host files, but using a P2P system for distribution as there are likely other users with the files you want. Non commercial and free software will probably use P2P systems more frequently to reduce costs of hosting files themselves. So far only a few major organizations have developed or talked about P2P systems. A corporative use of P2P could be the share of information. Companies often try to open up their organization and share competence among its employees and P2P could be a tool for this. The P2P system is likely considered to be a too unstable platform of communication at this point. Another disadvantage is that P2P applications can slow a system down by using a lot of bandwidth and computational power processing searches and uploading files for instance. There is certainly a future for P2P systems although they need to be proven from a security point of view to be used also in the corporate world. Conclusions P2P is a potent architecture with interesting possibilities for the future. It is no replacement to the client/server architecture, but a good compliment. Its drawback of increasing bandwidth use is not an important issue to home users as high speed internet connections is becoming cheaper with time. System critical files distribution will probably always take place with a server/client architecture, as P2P architecture still is considered unstable and not secure enough, but P2P shows a lot of promise and security issues is constantly being dealt with. P2P systems will certainly be used in the future as well and probably in other areas of communication too. Even if file sharing is main usage today, there will probably emerge a lot of new technologies in the future using P2P. References 1. P2P Networks 2. Peer-to-Peer (P2P) - An Overview 3. Between rhizomes and trees: P2P Information Systems 4. Mac-P2P.com: Peer to Peer (P2P) Introduction and History 5. The P2P Report - Knowledge Management Research Center CIO

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically

More information

Peer-to-Peer Architectures and Signaling. Agenda

Peer-to-Peer Architectures and Signaling. Agenda Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

Peer-to-peer systems and overlay networks

Peer-to-peer systems and overlay networks Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems

More information

- Content Security in P2P

- Content Security in P2P Why Jenny can t share the content with Jane? - Content Security in P2P Heather Yu Huawei Technologies heathery@ieee.org Future of Networked Home A vision voice video text Data gaming IPTV streaming IM

More information

Peer-to-Peer Signalling. Agenda

Peer-to-Peer Signalling. Agenda Peer-to-Peer Signalling Marcin Matuszewski marcin@netlab.hut.fi S-38.115 Signalling Protocols Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction Peer-to-Peer (P2P) is a communications

More information

Filtering of Peer-to-peer traffic. Martin Gejke

Filtering of Peer-to-peer traffic. Martin Gejke Filtering of Peer-to-peer traffic Martin Gejke Table of Contents Filtering of Peer-to-peer traffic... 3 Peer-to-peer basics...3 Filtering...3 Position of the filter... 4 Methods of filtering... 4 Traffic

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Ossification of the Internet

Ossification of the Internet Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major

More information

Distributed Knowledge Organization and Peer-to-Peer Networks

Distributed Knowledge Organization and Peer-to-Peer Networks Knowledge Organization and Peer-to-Peer Networks Klaus Wehrle Group Chair of Computer Science IV RWTH Aachen University http://ds.cs.rwth-aachen.de 1 Organization of Information Essential challenge in?

More information

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play

More information

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week

More information

Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:

Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview: PP Lecture 1 Peer-to-Peer Model March 16, 005 Overview: centralized database: Napster query flooding: Gnutella intelligent query flooding: KaZaA swarming: BitTorrent unstructured overlay routing: Freenet

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Peer-to-Peer Applications Reading: 9.4

Peer-to-Peer Applications Reading: 9.4 Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Extreme Computing. BitTorrent and incentive-based overlay networks.

Extreme Computing. BitTorrent and incentive-based overlay networks. Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some

More information

Fast Traffic Tactics

Fast Traffic Tactics TRAFFIC TACTICS VOLUME #2: Fast Traffic Tactics Special Report (F): Peer-to-Peer Network Tactics Legal Notice: The Publisher has strived to be as accurate and complete as possible in the creation of this

More information

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Data Communication. Chapter # 5: Networking Threats. By: William Stalling Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals

More information

The early developers of ARPANET and the Internet allowed themselves to

The early developers of ARPANET and the Internet allowed themselves to 01 JXTA.qxd 7/15/02 2:25 PM Page 1 CHAPTER 1 Introduction to Peer-to-Peer The early developers of ARPANET and the Internet allowed themselves to dream about a day when computers around the world would

More information

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals. Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University

More information

Experimental Study of Skype. Skype Peer-to-Peer VoIP System

Experimental Study of Skype. Skype Peer-to-Peer VoIP System An Experimental Study of the Skype Peer-to-Peer VoIP System Saikat Guha (Cornell) Neil Daswani (Google) Ravi Jain (Google) IPTPS 2006 About Skype Voice over IP (VoIP) 50 million users Valued at $2.6 billion

More information

Peer-to-Peer Systems and Distributed Hash Tables

Peer-to-Peer Systems and Distributed Hash Tables Peer-to-Peer Systems and Distributed Hash Tables CS 240: Computing Systems and Concurrency Lecture 8 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Selected

More information

Today. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables

Today. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables Peer-to-Peer Systems and Distributed Hash Tables COS 418: Distributed Systems Lecture 7 Today 1. Peer-to-Peer Systems Napster, Gnutella, BitTorrent, challenges 2. Distributed Hash Tables 3. The Chord Lookup

More information

Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer

Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer evyncke@cisco.com 2002, Cisco Systems, Inc. All rights reserved. 1 Agenda Introduction to peer to peer

More information

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA. ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY 2005. PAPER ON THE STATE OF CYBERSECURITY IN UGANDA. BY : UGANDA COMMUNICATIONS COMMISSION 1.0: Background Uganda, like

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Peer-to-Peer Systems. Internet Computing Workshop Tom Chothia

Peer-to-Peer Systems. Internet Computing Workshop Tom Chothia Peer-to-Peer Systems Internet Computing Workshop Tom Chothia Plagiarism Reminder Plagiarism is a very serious offense. Never submit work by other people without clearly stating who wrote it. If you did

More information

ACN Peer-to-Peer Networks. Günther Langmann

ACN Peer-to-Peer Networks. Günther Langmann ACN 2007 Peer-to-Peer Networks Günther Langmann Content What are P2P Networks Properties of P2P Networks History of P2P Networks Classifications Comparison Unstructured and structured P2P Networks Advantages

More information

Distributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201

Distributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201 Distributed Systems ID2201 peer-to-peer Johan Montelius 1 Idéa use resources in edge of network computing storage communication 2 Computing 3 seti@home central server millions of clients hundred of thousands

More information

Peer to Peer Computing

Peer to Peer Computing Peer to Peer Computing These slides are based on the slides made available by the authors of Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Peer-to-Peer (P2P) Systems

Peer-to-Peer (P2P) Systems Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Peer-to-Peer Internet Applications: A Review

Peer-to-Peer Internet Applications: A Review Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation

More information

Computer Networks. Chapter 1 An Introduction to Networking

Computer Networks. Chapter 1 An Introduction to Networking Computer Networks Chapter 1 An Introduction to Networking Contents Why use network? Network history Types of networks By connecting methods By geographic areas By topologies By network model Why Use Networks?

More information

Peer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K.

Peer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K. Peer-to-peer T-110.7100 Applications and Services in Internet, Fall 2009 Jukka K. Nurminen 1 V1-Filename.ppt / 2008-10-22 / Jukka K. Nurminen Schedule Tue 15.9.2009 12-14 Tue 22.9.2009 12-14 Introduction

More information

Network+ Guide to Networks 5 th Edition. Chapter 1 An Introduction to Networking

Network+ Guide to Networks 5 th Edition. Chapter 1 An Introduction to Networking Network+ Guide to Networks 5 th Edition Chapter 1 An Introduction to Networking Goals of This Chapter List the advantages of networked computing relative to standalone computing Distinguish between client/server

More information

Content Search. Unstructured P2P. Jukka K. Nurminen

Content Search. Unstructured P2P. Jukka K. Nurminen Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Introduction on Peer to Peer systems

Introduction on Peer to Peer systems Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr dacosta@irit.fr 1/55 Goal of this Lecture What can P2P do, not only as a buzzword What it can't do Shows some examples & algorithms

More information

EE 122: Peer-to-Peer Networks

EE 122: Peer-to-Peer Networks EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

Content Search. Unstructured P2P

Content Search. Unstructured P2P Content Search Unstructured P2P Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University *Partly adapted from original slides provided

More information

6. Peer-to-peer (P2P) networks I.

6. Peer-to-peer (P2P) networks I. 6. Peer-to-peer (P2P) networks I. PA159: Net-Centric Computing I. Eva Hladká Faculty of Informatics Masaryk University Autumn 2010 Eva Hladká (FI MU) 6. P2P networks I. Autumn 2010 1 / 46 Lecture Overview

More information

VoIP/SIP: Economy and Mobility

VoIP/SIP: Economy and Mobility Nowadays VoIP-services become more and more popular all over the world. VoIP stands for Voice Over Internet Protocol, a communications protocol that allows for telephonic communication via the Internet.

More information

Georges Da Costa Introduction on Peer to Peer systems

Georges Da Costa Introduction on Peer to Peer systems Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr Goal of this Lecture What can P2P do, not only as a buzzword What it can t do Shows some examples & algorithms A Survey and Comparison

More information

Distributed Systems. Peer- to- Peer. Rik Sarkar James Cheney. University of Edinburgh Spring 2014

Distributed Systems. Peer- to- Peer. Rik Sarkar James Cheney. University of Edinburgh Spring 2014 Distributed Systems Peer- to- Peer Rik Sarkar James Cheney University of Edinburgh Spring 2014 Peer to Peer The common percepdon A system for distribudng (sharing?) files Using the computers of common

More information

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

Page 1. How Did it Start? Model Main Challenge CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth

More information

Darknet Technology and Anonymity

Darknet Technology and Anonymity Säkra Datorsystem Ht-07 Darknet Technology and Anonymity Robert Andersson, Patrik Åkerstrand,Björn Remius roan4801, paak7145, bjre4725 @ student.uu.se Contents Abstract... 3 Darknet... 3 Background...

More information

A Survey of Peer-to-Peer Content Distribution Technologies

A Survey of Peer-to-Peer Content Distribution Technologies A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview

More information

A Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation

A Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation A Security Model for Space Based Communication Thom Stone Computer Sciences Corporation Prolog Everything that is not forbidden is compulsory -T.H. White They are after you Monsters in the Closet Virus

More information

Stratos Idreos. A thesis submitted in fulfillment of the requirements for the degree of. Electronic and Computer Engineering

Stratos Idreos. A thesis submitted in fulfillment of the requirements for the degree of. Electronic and Computer Engineering P2P-DIET: A QUERY AND NOTIFICATION SERVICE BASED ON MOBILE AGENTS FOR RAPID IMPLEMENTATION OF P2P APPLICATIONS by Stratos Idreos A thesis submitted in fulfillment of the requirements for the degree of

More information

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Patrick Baier October 10, 2008 Contents 1 Introduction 1 1.1 Preamble.................................... 1 1.2 Definition....................................

More information

Foothill-De Anza Community College District Wireless Networking Guidelines. Problems Connecting to or Using the Wireless Network

Foothill-De Anza Community College District Wireless Networking Guidelines. Problems Connecting to or Using the Wireless Network Foothill-De Anza Community College District Wireless Networking Guidelines Problems Connecting to or Using the Wireless Network My login name and password are not working. HELP! There are different wireless

More information

THE COMPLETE FIELD GUIDE TO THE WAN

THE COMPLETE FIELD GUIDE TO THE WAN THE COMPLETE FIELD GUIDE TO THE WAN People interested in setting up a wide-area network (WAN) often have very specific reasons for wanting to do so. WANs are specialized technological tools that deliver

More information

Peer-to-peer & Energy Consumption

Peer-to-peer & Energy Consumption Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Introduction to Distributed * Systems

Introduction to Distributed * Systems Introduction to Distributed * Systems Outline about the course relationship to other courses the challenges of distributed systems distributed services *ility for distributed services about the course

More information

Chapter Nine. Networking and Telecommunication

Chapter Nine. Networking and Telecommunication Chapter Nine Networking and Telecommunication After reading this chapter, you should be able to: Describe the nature and function of local area networks and wide area networks Discuss the uses and implications

More information

CMSC 332 Computer Networks P2P and Sockets

CMSC 332 Computer Networks P2P and Sockets CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016 Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Pricing of Mobile Peer-to-Peer application

Pricing of Mobile Peer-to-Peer application Pricing of Mobile Peer-to-Peer application 20 March 2003 Yang Qiu Helsinki University of Technology yangqiu@cc.hut.fi Abstract This paper analyzes the pricing of fixed and mobile peer-to-peer application.

More information

CSE 486/586 Distributed Systems Peer-to-Peer Architectures

CSE 486/586 Distributed Systems Peer-to-Peer Architectures CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

Multi-vector DDOS Attacks

Multi-vector DDOS Attacks Multi-vector DDOS Attacks Detection and Mitigation Paul Mazzucco Chief Security Officer August 2015 Key Reasons for Cyber Attacks Money and more money Large number of groups From unskilled to advanced

More information

NETWORKING 3.0. Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING. Remarkably Simple

NETWORKING 3.0. Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING. Remarkably Simple NETWORKING 3.0 Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING Highly Available Remarkably Simple Radically Secure IP complexity is holding your business back As

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks Overview Handling Security Incidents Chapter 7 Lecturer: Pei-yih Ting Attacks Security Incidents Handling Security Incidents Incident management Methods and Tools Maintaining Incident Preparedness Standard

More information

ACN Premium Technical Support. 24/7/365 Remote Computer Support

ACN Premium Technical Support. 24/7/365 Remote Computer Support ACN Premium Technical Support 24/7/365 Remote Computer Support What is ACN Premium Technical Support? Premier provider of technical assistance for your computer and electronic devices 24/7/365 remote on-demand

More information

Distributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017

Distributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017 Distributed Systems 16. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2017 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

WAFA X3 Evolution Grade of Service. 13 October 2008

WAFA X3 Evolution Grade of Service. 13 October 2008 Evolution Grade of Service 13 October 2008 1 Grades of Service at a glance The following table (Figure 1) highlights the various Grades of Service that are available on the Evolution Service. It enables

More information

The Telephony Denial of Service (TDoS) Threat

The Telephony Denial of Service (TDoS) Threat The Telephony Denial of Service (TDoS) Threat An Analysis of the TDoS Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Telephony Denial-of-Service (TDoS) and The Public Voice

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway? HOW WORKS And Who Needs a Content Distribution Network Anyway? Efficient and Inefficient Networks If all networks were fast, efficient, and never suffered from congestion there wouldn t be any need for

More information

PEER-TO-PEER NETWORKS, DHTS, AND CHORD

PEER-TO-PEER NETWORKS, DHTS, AND CHORD PEER-TO-PEER NETWORKS, DHTS, AND CHORD George Porter May 25, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P? Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems

More information

FlowMon ADS implementation case study

FlowMon ADS implementation case study FlowMon ADS implementation case study Kamil Doležel Kamil.dolezel@advaict.com AdvaICT, a.s. Brno, Czech Republic Abstract FlowMon ADS implementation provides completely new insight into networks of all

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

CMSC 322 Computer Networks Applications and End-To- End

CMSC 322 Computer Networks Applications and End-To- End CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework

More information

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable? Introduction Controlling Information Systems When computer systems fail to work as required, firms that depend heavily on them experience a serious loss of business function. M7011 Peter Lo 2005 1 M7011

More information

Distributed Systems 26. Mobile Ad Hoc Mesh Networks

Distributed Systems 26. Mobile Ad Hoc Mesh Networks Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers

More information

MIS 300 Exam 2 Spring 2011

MIS 300 Exam 2 Spring 2011 MIS 300 Exam 2 Spring 2011 Name: Instructions Turn off your cell phone. Close your notes and book. Answer each question by selecting the best response. For True/False questions, select A for and B for.

More information

Optimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO,

Optimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO, Optimizing the Internet Quality of Service and Economics for the Digital Generation Dr. Lawrence Roberts President and CEO, lroberts@anagran.com Original Internet Design File Transfer and Remote Computing

More information

Scaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p?

Scaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p? Scaling Problem 15-441 Computer Networking Millions of clients server and network meltdown Lecture 23: Peer-Peer Systems Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 2 P2P System Why p2p?

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

File Sharing in Less structured P2P Systems

File Sharing in Less structured P2P Systems File Sharing in Less structured P2P Systems. Bhosale S.P. 1, Sarkar A.R. 2 Computer Science And Engg. Dept., SVERI s College of Engineering Pandharpur Solapur, India1 Asst.Prof, Computer Science And Engg.

More information

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 Security for Structured Peer-to-peer Overlay Networks By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 1 Acknowledgement Some of the following slides are borrowed from talks by Yun Mao

More information