New Applications for P2P
|
|
- Melissa Ball
- 5 years ago
- Views:
Transcription
1 New Applications for P2P A Research Agenda Forschungsseminar, KIT, Benjamin Schiller, Thorsten Strufe Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 1
2 Peer-to-Peer Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 2
3 The Peer-to-Peer Problem Now where was that resource that I need? Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 3
4 P2P in a Nutshell Propertiesof (pure) P2P: All peersareequal no dedicated service, no central entity no a-priori knowledge/ structure/ hierarchy highly dynamic behavior of nodes Flat system architecture, flat namespace, unreliable service providers Main primary problems of P2P: Staying connected Resource lookup(name resolution, location of replica, especially selecting a good next hop for the delegation routing) Standard Solutions(p2p the executive summary) Connectivity: select enough fall-back servers Name resolution: unstructured P2P (flooding) or external search engine Resource location: registry and lookup in structured P2P (DHT!) Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 4
5 Peer-to-Peer(a Definition) Communication model: asynchronous(request-response) Rolemodel:a singlerole(?) symmetricbehavior, all peersin general(can) do thesame BUT: consideringan interactionthereisonerequestingand nrespondingpeers. Organisational model: completely unstructured( it s a mess! ) Otherthanbootstrappingno knowledgewhatsoeveraboutthecontext, no knowledge about the structure No Identifiers, only names all thisin order to do: File sharing, contentdistribution(bittorrent), sessioninitiation/chat/voip(skype, jabber), malware distribution/spam(botnets), Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 5
6 Our first claim: Peer-to-Peeriswell understoodand there s nothing fundamentally new to learn Butthen: aren t there more interesting things to do, with all the resources!? Can we leverage properties of this paradigm for other applications? Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 6
7 Some New Challenges Live multimedia streaming Anonymous communications Resistant communication infrastructures Distributing services Social networking services P2P-based Social IPTV Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 7
8 Social IPTV? Social TV Concept Advanced TV service efficiently integrating the legacy IPTV service and web-based social service including personal/group broadcasting, game, advertisement, shopping, telemedicine, etc. Participation & Sharing Experience, History, Relationship, Behavior, Habit, Social Network Service Social Media Social Game Social Ad Social Shopping Social Learning Advanced TV Service to Create a New Business Model using SNS-based Participation, Relationship, and Personalization over IPTV Infrastructure Social TV Digital TV PC IPTV Set-top Box IPTV Contents & Services Mobile Device Game Console Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 8
9 Collaborative IPTV with OSN Integration Friends watching this channel: chat chat Integration with Online Social Networks chat chat sandrestina Live Streaming of Users, Discussions Discussion Videos: Similar Channels: Support of ad-hoc collaborative applications Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 9
10 Social IPTV Content Providers Collab. viewing overlays, Service overlays media streams meta information mashups uploading content meta information additional services Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 10
11 Social IPTV Testbed in Darmstadt Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 11
12 Social IPTV Testbed in Darmstadt Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 12
13 Summarizing P2P Social IPTV Leverage the P2P paradigm for multiple new applications ALM / live streaming(decrease load of infrastructure) Collaborative interaction(the teleconf scenario ) Creating, deploying, running apps (P2P service distribution) A casefor Resistant/ resilient networking(commercialization) Privacy protection(direct identification of participants) Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 13
14 Decentralized Social Networking Services Simplified, walled-garden version of the Web : Easy to set-up pages ( profiles ) of individuals( and companies ) Links reflecting real-world relations between individuals Possibility to share user generated content including messaging Guest book / Wall (asynchronous broadcast) (asynchronous unicast) Chat (~ synchronous unicast) Collaborative applications / games Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 14
15 Target Audience / Application Domain Public and professional OSN (business-oriented) Private and personal OSN Special Purpose OSN Publish-Subscribe Posting ( Micro blogging ): Twitter Planning Business Trips: Dopplr, TripIT Location based achievement systems: foursquare, gowalla Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 15
16 Why Bother? Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 16
17 Generalized Architectural Model of SNS Distributed Environment Main SNS centralized Additional 3rd party application servers Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 17
18 Quest to Decentralize Issues of centralized architectures Centralized control Centralized data storage Full, centralized access to data Single Point of failure Taking back the web Breaking out of the walled gardens (again, cf. AOL) Re-democratizing the web Distribute the services! Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 18
19 Quest to Decentralize Issues of centralized architectures Centralized control Centralized data storage Full, centralized access to data Single Point of failure Taking back the web Breaking out of the walled gardens (again, cf. AOL) Re-democratizing the web Distribute the services! Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 19
20 Plethora P2P / Decentralized Social Services FOSS BuddyPress, CrabGrass, Cobs, DaisyChain, Diki, Elgg, FETHR, GNUNet, Gossple, Jappix, Lorea, Mycella, Movim, PeerScape, Pinax, StatusNet Commercial Approaches diaspora, wuala, LifeSocial Academia Friend-of-a-Friend, FriendStore, HelloWorld, LifeSocial, LotusNet(Likir), PeerSon, Safebook, SocialCircle, Tribler, Vis-a-Vis Focus on systems that implement social networking and publication functions Provide running software or a comprehensive protocol / system description Actually are decentralized Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 20
21 Selected Systems and Proposals diaspora Friend-of-a-Friend LifeSocial LotusNet/ Likir PeerSon Safebook Vis-A-Vis Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 21
22 Classifying Decentralized OSN Type of storage / service provision Infrastructure-based Dedicated Web-Servers Deployed in the cloud Peer-to-Peer-based Hybrid Granularity of service provision Replicating whole service Distributed storage of attributes Level of integration Stand alone system Extension of existing systems Resource sharing incentives None Social cooperation Payed premium services Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 22
23 Approach Type of Service Service Granulariy Integration Incentives diaspora web-based complete external Premium FoaF web-based complete external vis-à-vis Cloud complete external LotusNet P2P split stand alone PeerSon P2P split external Safebook P2P complete stand alone Social Coop LifeSocial hybrid split stand alone Premium Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 23
24 Our current approach : Privacy-Preserving Online Social Networking L. A. Cutillo, R. Molva, T. Strufe...and plenty of students :-) Partially funded by EU SOCIALNETS Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 24
25 Architecture 3 Trusted ID System ID Management 1 Matryoshka Data storage Cooperation Communication with privacy 2 Peer-to-peer substrate Lookup Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 25
26 Network view a Social network overlay b Trusted ID user id Peer to peer node id Internet ip address a Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 26
27 User i s Matryoshka Outer shell k e a Trust relationship for i c s friend Entry nodes Inner shell i c d j i s node l f b d friend of c c friend of i d friend of i Trust relationship for c User i s friends End to end privacy based on hop -Store by hop i s encrypted trust profile data Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 27
28 Finding it, using P2P: alooks for b a a b s profile req. DHT e hash(b s attribute) e d d c b s outer shell nodes b s profile c b k f b s outer shell: h(b), e h(b), f lookup alooks for b s entry nodes kprovides b s outer shell nodes data request asends profile data request to a b s entry node Data reply One of b s inner shell nodes answers Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 28
29 Summary P2P itself is boring UsingP2P fornewapplicationsisnot;-) Some of our current activities include Live multimedia streaming Anonymous communications Resistant communication infrastructures Distributing services Social networking services Which we integrate in our P2P-based Social IPTV platform Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 29
Leveraging Social Links for Trust and Privacy
Leveraging Social Links for Trust and Privacy Antonio Cutillo, Refik Molva, Melek Önen, Thorsten Strufe EURECOM Sophia Antipolis refik.molva@eurecom.fr Security and privacy issues in OSNs Threats Current
More informationPrivacy-Preserving Decentralized Communications
Privacy-Preserving Decentralized Communications A Research Agenda Sonja Buchegger, KTH CSC Online Privacy Problematic Current services (FB, GMail, GCal, Flickr, Pinterest) are free users pay with their
More informationA First Step Towards User Assisted Online Social Networks
A First Step Towards User Assisted Online Social Networks Michal Kryczka IMDEA Networks michal.kryczka@imdea.org Eiko Yoneki University of Cambridge eiko.yoneki@cl.cam.ac.uk Ruben Cuevas Univ. Carlos III
More informationLifeSocial.KOM: A Secure and P2P-based Solution for Online Social Networks. In: IEEE International
Kalman Graffi, Christian Gross, Dominik Stingl, Daniel Hartung, Aleksandra Kovacevic, Ralf Steinmetz: LifeSocial.KOM: A Secure and PP-based Solution for Online Social Networks. In: IEEE International Conference
More informationP2P Social Networks With Broadcast Encryption Protected Privacy
P2P Social Networks With Broadcast Encryption Protected Privacy Oleksandr Bodriagov, Sonja Buchegger School of Computer Science and Communication KTH - The Royal Institute of Technology Stockholm, Sweden
More informationFOSP. Towards a Federated Object Sharing Protocol that Unifies Operations on Social Content Felix Maurer June 16,
FOSP Towards a Federated Object Sharing Protocol that Unifies Operations on Social Content Felix Maurer June 16, 2014 FORSCHUNGSGRUPPE DEZENTRALE SYSTEME UND NETZDIENSTE KIT University of the State of
More informationUnit 8 Peer-to-Peer Networking
Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System
More informationPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
More informationDHT Optimizations for mobile devices. Seminar Mobile Systems Supervisor: Thomas Bocek Student: Dario Nakic
DHT Optimizations for mobile devices Seminar Mobile Systems Supervisor: Thomas Bocek Student: Dario Nakic 05.11.2009 Agenda 1. Peer to Peer systems 2. Lookup problems in P2P systems 3. Distributed Hash
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationKEY BENEFITS OF A TIKILIVE NETWORK
EXTEND YOUR BRAND AND GENERATE REVENUE WITH TIKILIVE HD STREAMING COMMUNITY TIKILIVE.COM KEY BENEFITS OF A TIKILIVE NETWORK Easily brand connect, manage and monetize your HD content Realize immediate viewer
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationAgent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma. Distributed and Agent Systems
Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma Distributed and Agent Systems Peer-to-Peer Systems & JXTA Prof. Agostino Poggi What is Peer-to-Peer
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationEnsuring β-availability in P2P Social Networks
Ensuring β-availability in P2P Social Networks Nashid Shahriar, Shihabur R. Chowdhury*, Mahfuza Sharmin**, Reaz Ahmed*, Raouf Boutaba*, and Bertrand Mathieu Dept. of CSE, Bangladesh University of Engineering
More informationHow Alice and Bob meet if they don t like onions
How Alice and Bob meet if they don t like onions Survey of Network Anonymisation Techniques Erik Sy 34th Chaos Communication Congress, Leipzig Agenda 1. Introduction to Anonymity Networks Anonymity Strategies
More informationConfiguring and Operating a Hybrid Cloud with Microsoft Azure Stack
Course 10995: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Page 1 of 1 Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Course 10995: 4 days; Instructor-Led Introduction
More informationWelcome to the. Migrating SQL Server Databases to Azure
Welcome to the 1 Migrating SQL Server Databases to Azure Migrating SQL Server Databases to Azure Agenda Overview of SQL Server in Microsoft Azure Getting started with SQL Server in an Azure virtual machine
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationDISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES
DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application
More informationResilient Networking. 6: Resilient Peer-to-Peer Networking Thorsten Strufe. What is P2P? Types of P2P Systems P2P Security
6: Resilient Peer-to-Peer Networking Thorsten Strufe What is P2P? Types of P2P Systems P2P Security How do you define peer-to-peer? 2 What do you consider to be the main problems? 3 What do you think are
More informationPeer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K.
Peer-to-peer T-110.7100 Applications and Services in Internet, Fall 2009 Jukka K. Nurminen 1 V1-Filename.ppt / 2008-10-22 / Jukka K. Nurminen Schedule Tue 15.9.2009 12-14 Tue 22.9.2009 12-14 Introduction
More informationP2P Networks - General
P2P Networks-General Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen 137/09/2013 Aalto University P2P
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large
More informationA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Glossary A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A App See Application Application An application (sometimes known as an app ) is a computer program which allows the user to perform a specific
More informationSystem models for distributed systems
System models for distributed systems INF5040/9040 autumn 2010 lecturer: Frank Eliassen INF5040 H2010, Frank Eliassen 1 System models Purpose illustrate/describe common properties and design choices for
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.
More informationSecurity and Cryptography 1. Stefan Köpsell, Thorsten Strufe
Security and Cryptography 1 Stefan Köpsell, Thorsten Strufe Disclaimer: this course has been created with very valuable input from Dan Boneh (go check his videos!), Stefan Katzenbeisser, Mark Manulis,
More informationOne-to-Many (Interactive Broadcast)
Creating a 360 IP Video Strategy t John Shaw COO VBrick Systems Feb 1, 2011 IP Video Defined IP Video VC/ Telepresence Streaming Surveillance Desktop Roombased Consumer Corp, Edu, Gov t Media Building/
More informationImplementing Microsoft Azure Infrastructure Solutions (20533)
Implementing Microsoft Azure Infrastructure Solutions (20533) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing Azure architecture components, including
More informationCourse Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack.
[MS20537]: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Azure Delivery Method : Instructor-led (Classroom)
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationIPTV / OTT End-to-end Solution. Launch, manage and monetize your interactive TV system
IPTV / OTT End-to-end Solution Launch, manage and monetize your interactive TV system 1 Telebreeze IPTV/OTT Platform Telebreeze provides professional technical solution for IPTV / OTT businesses. The Telebreeze
More informationIntroduction Distributed Systems
Introduction Distributed Systems Today Welcome Distributed systems definition, goals and challenges What is a distributed system? Very broad definition Collection of components, located at networked computers,
More informationPeer-to-peer & Energy Consumption
Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science
More informationMicrosoft Advanced Technologies of SharePoint 2016
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20339-2 Advanced Technologies of SharePoint 2016 Length 5 days Price $4290.00 (inc GST) Version A Overview This five-day course will teach you how to plan,
More informationA Case For OneSwarm. Tom Anderson University of Washington.
A Case For OneSwarm Tom Anderson University of Washington http://oneswarm.cs.washington.edu/ With: Jarret Falkner, Tomas Isdal, Alex Jaffe, John P. John, Arvind Krishnamurthy, Harsha Madhyastha and Mike
More informationDistributed Information Processing
Distributed Information Processing 14 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2016 Eom, Hyeonsang All Rights Reserved Outline
More informationPrivacy, Cost, and Availability Tradeoffs in Decentralized OSNs
Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs ABSTRACT Amre Shakimov Duke University Durham, NC shan@cs.duke.edu Landon P. Cox Duke University Durham, NC lpcox@cs.duke.edu Online Social
More informationFunctionality, Challenges and Architecture of Social Networks
Functionality, Challenges and Architecture of Social Networks INF 5370 Outline Social Network Services Functionality Business Model Current Architecture and Scalability Challenges Conclusion 1 Social Network
More informationACCENTURE VIDEO SOLUTION END USER FEATURES. Enter
ACCENTURE VIDEO SOLUTION END USER FEATURES Enter WELCOME Engage your customers with innovative features and functionalities to retain and expand your audience, strengthen your brand and drive monetization.
More informationHow to return control over user data back to the user The rethink framework
How to return control over user data back to the user The rethink framework Anastasius Gavras Eurescom GmbH Online Webinar 21. June 2017 This project has received funding from the European Union s Horizon
More informationAssignment 5. Georgia Koloniari
Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last
More informationPresented by Max Fritz Senior Systems Consultant, Now Micro. Office 365 for Education What to Use When
Presented by Max Fritz Senior Systems Consultant, Now Micro Office 365 for Education What to Use When Max Fritz Senior Systems Consultant MCSA Office 365, MCSE Productivity Founder of Minnesota Office
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationThe Internet. History & Current Applications
The Internet History & Current Applications Popescu 2012 1 Connecting computers to other computers Share data Join computing forces Ensure resiliency 2 Types of Communication Synchronous: sender and receiver
More informationIntroducing COI: Chat over IMAP Modern Messaging over
Introducing COI: Chat over IMAP Modern Messaging over Email Robert Virkus 2018-10-29 1 Vision 2 What s the Problem? Messaging silos lock us in Proprietary services operated by a single company, several
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More information[MS20533]: Implementing Microsoft Azure Infrastructure Solutions
[MS20533]: Implementing Microsoft Azure Infrastructure Solutions Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Microsoft Products Delivery Method : Instructor-led (Classroom)
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationAn Offline Foundation for Accountable Pseudonyms
An Offline Foundation for Accountable Pseudonyms Bryan Ford MIT CSAIL Jacob Strauss SocialNets April 1, 2008 Introduction Anonymity is a cherished principle Traditional: voting, peer review Online: email,
More informationNETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication
NETWORKING 1. ITDNW01 Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social 2. ITDNW02 Congestion Control for Background Data Transfers With Minimal Delay Impact 3. ITDNW03 Transient
More informationWhat is peer to peer?
1 1 1 1 1 1 1 1 0 1 0 1 0 1 What is peer to peer? PP in some sense is decentralization moving away from monolithic central hub-spoke model to the decentralized device to device or service to service model.
More informationCloud Computing. Contents. Vince DiNoto.
Cloud Computing Vince DiNoto Vince.dinoto@kctcs.edu Contents Microsoft Live... 2 Connecting SkyDrive from Your Desktop... 4 Live Mesh... 5 Skype... 6 UStream... 6 SlideShare... 9 Flickr... 9 Jing... 10
More informationA Survey of Peer-to-Peer Content Distribution Technologies
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview
More informationMitel MiCollab. Keeping people connected and productive anytime, anywhere, on any device
Mitel MiCollab Keeping people connected and productive anytime, anywhere, on any device Effective collaboration among employees, partners and customers is a critical driver of any organization s success.
More informationAviation Applications and GXTV
Aviation Applications and GXTV Adrian McAloon Director, Aviation Content and Applications Agenda Aviation applications The power of applications as a revenue driver $ Progress since October Aviation Applications
More informationPROVIDING COMMUNITY AND COLLABORATION SERVICES TO MMOG PLAYERS *
PROVIDING COMMUNITY AND COLLABORATION SERVICES TO MMOG PLAYERS * George Adam, Christos Bouras, Vaggelis Kapoulas, Andreas Papazois Computer Technology Institute & Press Diophantus N. Kazantzaki, Panepistimioupoli,
More informationAdvanced Technologies of SharePoint 2016
Advanced Technologies of SharePoint 2016 20339-2; 5 Days; Instructor-led Course Description This five-day course will teach you how to plan, configure, and manage the advanced features in a SharePoint
More informationCompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the
More informationMicrosoft Planning and Deploying System Center 2012 Configuration Manager
1800 ULEARN (853 276) www.ddls.com.au Microsoft 10748 - Planning and Deploying System Center 2012 Configuration Manager Length 3 days Price $2750.00 (inc GST) Version C Overview Get detailed instruction
More informationDistributed Social Network in Browsers. Yang Ji Michael Puckett
Distributed Social Network in Browsers Yang Ji Michael Puckett Problem Large scale personal data abuse and manipulation raises question to the cloud based architecture in social networks. Sensitive personal
More informationThe Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla
The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -
More informationCurrent Status of Standardization on Digital Signage in ITU. Masahito Kawamori Rapporteur ITU-T SG16 Q13
ITU Workshop on Digital Signage (Tokyo, Japan, 13-14 December 2011 ) Current Status of Standardization on Digital Signage in ITU Masahito Kawamori Rapporteur ITU-T SG16 Q13 ITU-T SG16 Q13 Question for
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationVenugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04
The Design and Implementation of a Next Generation Name Service for the Internet Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 Presenter: Saurabh Kadekodi Agenda DNS overview Current DNS Problems
More informationLecture 2: January 24
CMPSCI 677 Operating Systems Spring 2017 Lecture 2: January 24 Lecturer: Prashant Shenoy Scribe: Phuthipong Bovornkeeratiroj 2.1 Lecture 2 Distributed systems fall into one of the architectures teaching
More informationIntroduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks The Story of Peer-to-Peer The Nature of Peer-to-Peer: Generals & Paradigms Unstructured Peer-to-Peer Systems Sample Applications 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt
More informationUpgrading Your Skills to MCSA Windows 8.1
Upgrading Your Skills to MCSA Windows 8.1 Course 20689D - Three days - Instructor-led - Hands-on Introduction This three day course is designed primarily for IT Professionals who want to upgrade their
More informationJunction: A Decentralized Platform for Ad Hoc Social and Mobile Applications. Ben Dodson, Monica Lam, Chanh Nguyen, Te-Yuan Huang
Junction: A Decentralized Platform for Ad Hoc Social and Mobile Applications Ben Dodson, Monica Lam, Chanh Nguyen, Te-Yuan Huang Motivation Motivation Ad Hoc Bring together devices with no previous contact
More informationA Meta Social Networking Approach Towards Decentralization
A Meta Social Networking Approach Towards Decentralization Pili Hu and Wing Cheong Lau Information Engieering Department Chinese University of Hong Kong Email: {hupili,wclau}@ie.cuhk.edu.hk Abstract There
More informationChapter 2 ARCHITECTURES
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 2 ARCHITECTURES Architectural Styles (1) DS should be composed of Components and Connectors.» How
More informationOverview of the Stateof-the-Art. Networks. Evolution of social network studies
Overview of the Stateof-the-Art in Social Networks INF5370 spring 2014 Evolution of social network studies 1950-1970: mathematical studies of networks formed by the actual human interactions Pandemics,
More informationProtecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series
Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationSOCIAL MEDIA. Charles Murphy
SOCIAL MEDIA Charles Murphy Social Media Overview 1. Introduction 2. Social Media Areas Blogging Bookmarking Deals Location-based Music Photo sharing Video 3. The Fab Four FaceBook Google+ Linked In Twitter
More informationDelivering on Cloud Transformation Infinite Solutions update. Presenter: Adam Davies, January 20 th, 2016
Delivering on Cloud Transformation Infinite Solutions update Presenter: Adam Davies, January 20 th, 2016 Agenda Market Landscape, Opportunities and Challenges Update on Cisco Infinite Solutions Related
More informationDistributed Systems. Characteristics of Distributed Systems. Lecture Notes 1 Basic Concepts. Operating Systems. Anand Tripathi
1 Lecture Notes 1 Basic Concepts Anand Tripathi CSci 8980 Operating Systems Anand Tripathi CSci 8980 1 Distributed Systems A set of computers (hosts or nodes) connected through a communication network.
More informationDistributed Systems. Characteristics of Distributed Systems. Characteristics of Distributed Systems. Goals in Distributed System Designs
1 Anand Tripathi CSci 8980 Operating Systems Lecture Notes 1 Basic Concepts Distributed Systems A set of computers (hosts or nodes) connected through a communication network. Nodes may have different speeds
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed
More informationto know about Microsoft Teams
to know about Microsoft Teams If you have made significant investments in or are in the process of evaluating/deploying Skype for Business, what is your path forward in terms of migrating to Microsoft
More informationSkype for Business Users: 18 Things to Know about Microsoft Teams for 2018
Skype for Business Users: 18 Things to Know about Microsoft Teams for 2018 If you have made significant investments in or are in the process of evaluating/deploying Skype for Business, what is your path
More informationAdvanced Solutions of Microsoft SharePoint Server 2013 Course Contact Hours
Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332 36 Contact Hours Course Overview This course examines how to plan, configure, and manage a Microsoft SharePoint Server 2013 environment.
More informationAdvanced Solutions of Microsoft SharePoint 2013
Course 20332A :Advanced Solutions of Microsoft SharePoint 2013 Page 1 of 9 Advanced Solutions of Microsoft SharePoint 2013 Course 20332A: 4 days; Instructor-Led About the Course This four-day course examines
More informationTikiLIVE Academic Platform
TikiLIVE Academic Platform 1 Use any broadcaster of your choice TikiLIVE Network A TikiLIVE Broadcasting Network allows each broadcaster (Team) to operate independently inside the frame-work established
More informationOverlay Multicast. Application Layer Multicast. Structured Overlays Unstructured Overlays. CAN Flooding Centralised. Scribe/SplitStream Distributed
Overlay Multicast Application Layer Multicast Structured Overlays Unstructured Overlays CAN Flooding Centralised Scribe/SplitStream Distributed PeerCast 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt
More informationEnsuring β-availability in P2P Social Networks
Ensuring β-availability in P2P Social Networks Nashid Shahriar, Shihabur Rahman Chowdhury, Mahfuza Sharmin, Reaz Ahmed, Raouf Boutaba and Bertrand Mathieu Dept. of Comp. Sc. and Engg., Bangladesh University
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /
More informationA: Advanced Technologies of SharePoint 2016
Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com
More informationUsing peer to peer. Marco Danelutto Dept. Computer Science University of Pisa
Using peer to peer Marco Danelutto Dept. Computer Science University of Pisa Master Degree (Laurea Magistrale) in Computer Science and Networking Academic Year 2009-2010 Rationale Two common paradigms
More informationSlides for Chapter 10: Peer-to-Peer Systems. From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design
Slides for Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, Addison-Wesley 2012 Edited and supplemented by Jonne Itkonen,!
More informationAvailable online at ScienceDirect. Procedia Computer Science 40 (2014 ) Nantes, 5 ChronoCourse, France
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 40 (2014 ) 129 134 Fourth International Conference on Selected Topics in Mobile & Wireless Networking (MoWNet 2014) C3PO:
More informationCourse Content. This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification.
Course Content Course Description: This five-day course will teach you how to plan, configure, and manage the advanced features in a environment. The special areas of focus for this course include implementing
More informationPremium Membership Package [N5, 000]
NigeriaTrainingNetwork [NTN] and NigeriaTrainingCourses [NTC] are platforms that connects students, trainers and companies together. The platform comprises of private, work based, professional individuals,
More informationTIES for Microsoft CityNext Next-Generation Situational Awareness
BROCHURE A CLOSER LOOK AT! TIES for Microsoft CityNext Next-Generation Situational Awareness INTRODUCTION! TIES for Microsoft CityNext (TMCN) is an all-hazard threat monitoring and situation awareness
More informationDesigning and Implementing a Server Infrastructure
Designing and Implementing a Server Infrastructure Duration: 5 Days Course Code: 20413 About this course Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows
More informationIT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved.
IT Redefined Hans Timmerman CTO EMC Nederland 1 INDUSTRIES FACE STRUCTURAL CHANGE 2 More CEOs See IT As Driver Of Digital Business Innovation And Growth IT has the highest business priority in more than
More informationReal4Test. Real IT Certification Exam Study materials/braindumps
Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 70-533 Title : Implementing Microsoft Azure Infrastructure Solutions Vendor : Microsoft Version : DEMO Get
More informationAudience(s) : IT Professionals Level : 300 Technology : Microsoft System Center Configuration Manager Delivery Method : Instructor-led (Classroom)
[MS10748]: Planning and Deploying System Center 2012 Configuration Length : 3 Days Audience(s) : IT Professionals Level : 300 Technology : System Center Configuration Delivery Method : Instructor-led (Classroom)
More information