New Applications for P2P

Size: px
Start display at page:

Download "New Applications for P2P"

Transcription

1 New Applications for P2P A Research Agenda Forschungsseminar, KIT, Benjamin Schiller, Thorsten Strufe Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 1

2 Peer-to-Peer Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 2

3 The Peer-to-Peer Problem Now where was that resource that I need? Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 3

4 P2P in a Nutshell Propertiesof (pure) P2P: All peersareequal no dedicated service, no central entity no a-priori knowledge/ structure/ hierarchy highly dynamic behavior of nodes Flat system architecture, flat namespace, unreliable service providers Main primary problems of P2P: Staying connected Resource lookup(name resolution, location of replica, especially selecting a good next hop for the delegation routing) Standard Solutions(p2p the executive summary) Connectivity: select enough fall-back servers Name resolution: unstructured P2P (flooding) or external search engine Resource location: registry and lookup in structured P2P (DHT!) Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 4

5 Peer-to-Peer(a Definition) Communication model: asynchronous(request-response) Rolemodel:a singlerole(?) symmetricbehavior, all peersin general(can) do thesame BUT: consideringan interactionthereisonerequestingand nrespondingpeers. Organisational model: completely unstructured( it s a mess! ) Otherthanbootstrappingno knowledgewhatsoeveraboutthecontext, no knowledge about the structure No Identifiers, only names all thisin order to do: File sharing, contentdistribution(bittorrent), sessioninitiation/chat/voip(skype, jabber), malware distribution/spam(botnets), Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 5

6 Our first claim: Peer-to-Peeriswell understoodand there s nothing fundamentally new to learn Butthen: aren t there more interesting things to do, with all the resources!? Can we leverage properties of this paradigm for other applications? Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 6

7 Some New Challenges Live multimedia streaming Anonymous communications Resistant communication infrastructures Distributing services Social networking services P2P-based Social IPTV Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 7

8 Social IPTV? Social TV Concept Advanced TV service efficiently integrating the legacy IPTV service and web-based social service including personal/group broadcasting, game, advertisement, shopping, telemedicine, etc. Participation & Sharing Experience, History, Relationship, Behavior, Habit, Social Network Service Social Media Social Game Social Ad Social Shopping Social Learning Advanced TV Service to Create a New Business Model using SNS-based Participation, Relationship, and Personalization over IPTV Infrastructure Social TV Digital TV PC IPTV Set-top Box IPTV Contents & Services Mobile Device Game Console Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 8

9 Collaborative IPTV with OSN Integration Friends watching this channel: chat chat Integration with Online Social Networks chat chat sandrestina Live Streaming of Users, Discussions Discussion Videos: Similar Channels: Support of ad-hoc collaborative applications Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 9

10 Social IPTV Content Providers Collab. viewing overlays, Service overlays media streams meta information mashups uploading content meta information additional services Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 10

11 Social IPTV Testbed in Darmstadt Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 11

12 Social IPTV Testbed in Darmstadt Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 12

13 Summarizing P2P Social IPTV Leverage the P2P paradigm for multiple new applications ALM / live streaming(decrease load of infrastructure) Collaborative interaction(the teleconf scenario ) Creating, deploying, running apps (P2P service distribution) A casefor Resistant/ resilient networking(commercialization) Privacy protection(direct identification of participants) Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 13

14 Decentralized Social Networking Services Simplified, walled-garden version of the Web : Easy to set-up pages ( profiles ) of individuals( and companies ) Links reflecting real-world relations between individuals Possibility to share user generated content including messaging Guest book / Wall (asynchronous broadcast) (asynchronous unicast) Chat (~ synchronous unicast) Collaborative applications / games Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 14

15 Target Audience / Application Domain Public and professional OSN (business-oriented) Private and personal OSN Special Purpose OSN Publish-Subscribe Posting ( Micro blogging ): Twitter Planning Business Trips: Dopplr, TripIT Location based achievement systems: foursquare, gowalla Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 15

16 Why Bother? Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 16

17 Generalized Architectural Model of SNS Distributed Environment Main SNS centralized Additional 3rd party application servers Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 17

18 Quest to Decentralize Issues of centralized architectures Centralized control Centralized data storage Full, centralized access to data Single Point of failure Taking back the web Breaking out of the walled gardens (again, cf. AOL) Re-democratizing the web Distribute the services! Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 18

19 Quest to Decentralize Issues of centralized architectures Centralized control Centralized data storage Full, centralized access to data Single Point of failure Taking back the web Breaking out of the walled gardens (again, cf. AOL) Re-democratizing the web Distribute the services! Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 19

20 Plethora P2P / Decentralized Social Services FOSS BuddyPress, CrabGrass, Cobs, DaisyChain, Diki, Elgg, FETHR, GNUNet, Gossple, Jappix, Lorea, Mycella, Movim, PeerScape, Pinax, StatusNet Commercial Approaches diaspora, wuala, LifeSocial Academia Friend-of-a-Friend, FriendStore, HelloWorld, LifeSocial, LotusNet(Likir), PeerSon, Safebook, SocialCircle, Tribler, Vis-a-Vis Focus on systems that implement social networking and publication functions Provide running software or a comprehensive protocol / system description Actually are decentralized Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 20

21 Selected Systems and Proposals diaspora Friend-of-a-Friend LifeSocial LotusNet/ Likir PeerSon Safebook Vis-A-Vis Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 21

22 Classifying Decentralized OSN Type of storage / service provision Infrastructure-based Dedicated Web-Servers Deployed in the cloud Peer-to-Peer-based Hybrid Granularity of service provision Replicating whole service Distributed storage of attributes Level of integration Stand alone system Extension of existing systems Resource sharing incentives None Social cooperation Payed premium services Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 22

23 Approach Type of Service Service Granulariy Integration Incentives diaspora web-based complete external Premium FoaF web-based complete external vis-à-vis Cloud complete external LotusNet P2P split stand alone PeerSon P2P split external Safebook P2P complete stand alone Social Coop LifeSocial hybrid split stand alone Premium Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 23

24 Our current approach : Privacy-Preserving Online Social Networking L. A. Cutillo, R. Molva, T. Strufe...and plenty of students :-) Partially funded by EU SOCIALNETS Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 24

25 Architecture 3 Trusted ID System ID Management 1 Matryoshka Data storage Cooperation Communication with privacy 2 Peer-to-peer substrate Lookup Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 25

26 Network view a Social network overlay b Trusted ID user id Peer to peer node id Internet ip address a Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 26

27 User i s Matryoshka Outer shell k e a Trust relationship for i c s friend Entry nodes Inner shell i c d j i s node l f b d friend of c c friend of i d friend of i Trust relationship for c User i s friends End to end privacy based on hop -Store by hop i s encrypted trust profile data Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 27

28 Finding it, using P2P: alooks for b a a b s profile req. DHT e hash(b s attribute) e d d c b s outer shell nodes b s profile c b k f b s outer shell: h(b), e h(b), f lookup alooks for b s entry nodes kprovides b s outer shell nodes data request asends profile data request to a b s entry node Data reply One of b s inner shell nodes answers Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 28

29 Summary P2P itself is boring UsingP2P fornewapplicationsisnot;-) Some of our current activities include Live multimedia streaming Anonymous communications Resistant communication infrastructures Distributing services Social networking services Which we integrate in our P2P-based Social IPTV platform Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 29

Leveraging Social Links for Trust and Privacy

Leveraging Social Links for Trust and Privacy Leveraging Social Links for Trust and Privacy Antonio Cutillo, Refik Molva, Melek Önen, Thorsten Strufe EURECOM Sophia Antipolis refik.molva@eurecom.fr Security and privacy issues in OSNs Threats Current

More information

Privacy-Preserving Decentralized Communications

Privacy-Preserving Decentralized Communications Privacy-Preserving Decentralized Communications A Research Agenda Sonja Buchegger, KTH CSC Online Privacy Problematic Current services (FB, GMail, GCal, Flickr, Pinterest) are free users pay with their

More information

A First Step Towards User Assisted Online Social Networks

A First Step Towards User Assisted Online Social Networks A First Step Towards User Assisted Online Social Networks Michal Kryczka IMDEA Networks michal.kryczka@imdea.org Eiko Yoneki University of Cambridge eiko.yoneki@cl.cam.ac.uk Ruben Cuevas Univ. Carlos III

More information

LifeSocial.KOM: A Secure and P2P-based Solution for Online Social Networks. In: IEEE International

LifeSocial.KOM: A Secure and P2P-based Solution for Online Social Networks. In: IEEE International Kalman Graffi, Christian Gross, Dominik Stingl, Daniel Hartung, Aleksandra Kovacevic, Ralf Steinmetz: LifeSocial.KOM: A Secure and PP-based Solution for Online Social Networks. In: IEEE International Conference

More information

P2P Social Networks With Broadcast Encryption Protected Privacy

P2P Social Networks With Broadcast Encryption Protected Privacy P2P Social Networks With Broadcast Encryption Protected Privacy Oleksandr Bodriagov, Sonja Buchegger School of Computer Science and Communication KTH - The Royal Institute of Technology Stockholm, Sweden

More information

FOSP. Towards a Federated Object Sharing Protocol that Unifies Operations on Social Content Felix Maurer June 16,

FOSP. Towards a Federated Object Sharing Protocol that Unifies Operations on Social Content Felix Maurer June 16, FOSP Towards a Federated Object Sharing Protocol that Unifies Operations on Social Content Felix Maurer June 16, 2014 FORSCHUNGSGRUPPE DEZENTRALE SYSTEME UND NETZDIENSTE KIT University of the State of

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

DHT Optimizations for mobile devices. Seminar Mobile Systems Supervisor: Thomas Bocek Student: Dario Nakic

DHT Optimizations for mobile devices. Seminar Mobile Systems Supervisor: Thomas Bocek Student: Dario Nakic DHT Optimizations for mobile devices Seminar Mobile Systems Supervisor: Thomas Bocek Student: Dario Nakic 05.11.2009 Agenda 1. Peer to Peer systems 2. Lookup problems in P2P systems 3. Distributed Hash

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

KEY BENEFITS OF A TIKILIVE NETWORK

KEY BENEFITS OF A TIKILIVE NETWORK EXTEND YOUR BRAND AND GENERATE REVENUE WITH TIKILIVE HD STREAMING COMMUNITY TIKILIVE.COM KEY BENEFITS OF A TIKILIVE NETWORK Easily brand connect, manage and monetize your HD content Realize immediate viewer

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma. Distributed and Agent Systems

Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma. Distributed and Agent Systems Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma Distributed and Agent Systems Peer-to-Peer Systems & JXTA Prof. Agostino Poggi What is Peer-to-Peer

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Ensuring β-availability in P2P Social Networks

Ensuring β-availability in P2P Social Networks Ensuring β-availability in P2P Social Networks Nashid Shahriar, Shihabur R. Chowdhury*, Mahfuza Sharmin**, Reaz Ahmed*, Raouf Boutaba*, and Bertrand Mathieu Dept. of CSE, Bangladesh University of Engineering

More information

How Alice and Bob meet if they don t like onions

How Alice and Bob meet if they don t like onions How Alice and Bob meet if they don t like onions Survey of Network Anonymisation Techniques Erik Sy 34th Chaos Communication Congress, Leipzig Agenda 1. Introduction to Anonymity Networks Anonymity Strategies

More information

Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack

Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Course 10995: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Page 1 of 1 Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Course 10995: 4 days; Instructor-Led Introduction

More information

Welcome to the. Migrating SQL Server Databases to Azure

Welcome to the. Migrating SQL Server Databases to Azure Welcome to the 1 Migrating SQL Server Databases to Azure Migrating SQL Server Databases to Azure Agenda Overview of SQL Server in Microsoft Azure Getting started with SQL Server in an Azure virtual machine

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

Resilient Networking. 6: Resilient Peer-to-Peer Networking Thorsten Strufe. What is P2P? Types of P2P Systems P2P Security

Resilient Networking. 6: Resilient Peer-to-Peer Networking Thorsten Strufe. What is P2P? Types of P2P Systems P2P Security 6: Resilient Peer-to-Peer Networking Thorsten Strufe What is P2P? Types of P2P Systems P2P Security How do you define peer-to-peer? 2 What do you consider to be the main problems? 3 What do you think are

More information

Peer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K.

Peer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K. Peer-to-peer T-110.7100 Applications and Services in Internet, Fall 2009 Jukka K. Nurminen 1 V1-Filename.ppt / 2008-10-22 / Jukka K. Nurminen Schedule Tue 15.9.2009 12-14 Tue 22.9.2009 12-14 Introduction

More information

P2P Networks - General

P2P Networks - General P2P Networks-General Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen 137/09/2013 Aalto University P2P

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large

More information

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Glossary A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A App See Application Application An application (sometimes known as an app ) is a computer program which allows the user to perform a specific

More information

System models for distributed systems

System models for distributed systems System models for distributed systems INF5040/9040 autumn 2010 lecturer: Frank Eliassen INF5040 H2010, Frank Eliassen 1 System models Purpose illustrate/describe common properties and design choices for

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

Security and Cryptography 1. Stefan Köpsell, Thorsten Strufe

Security and Cryptography 1. Stefan Köpsell, Thorsten Strufe Security and Cryptography 1 Stefan Köpsell, Thorsten Strufe Disclaimer: this course has been created with very valuable input from Dan Boneh (go check his videos!), Stefan Katzenbeisser, Mark Manulis,

More information

One-to-Many (Interactive Broadcast)

One-to-Many (Interactive Broadcast) Creating a 360 IP Video Strategy t John Shaw COO VBrick Systems Feb 1, 2011 IP Video Defined IP Video VC/ Telepresence Streaming Surveillance Desktop Roombased Consumer Corp, Edu, Gov t Media Building/

More information

Implementing Microsoft Azure Infrastructure Solutions (20533)

Implementing Microsoft Azure Infrastructure Solutions (20533) Implementing Microsoft Azure Infrastructure Solutions (20533) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing Azure architecture components, including

More information

Course Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack.

Course Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack. [MS20537]: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Azure Delivery Method : Instructor-led (Classroom)

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

IPTV / OTT End-to-end Solution. Launch, manage and monetize your interactive TV system

IPTV / OTT End-to-end Solution. Launch, manage and monetize your interactive TV system IPTV / OTT End-to-end Solution Launch, manage and monetize your interactive TV system 1 Telebreeze IPTV/OTT Platform Telebreeze provides professional technical solution for IPTV / OTT businesses. The Telebreeze

More information

Introduction Distributed Systems

Introduction Distributed Systems Introduction Distributed Systems Today Welcome Distributed systems definition, goals and challenges What is a distributed system? Very broad definition Collection of components, located at networked computers,

More information

Peer-to-peer & Energy Consumption

Peer-to-peer & Energy Consumption Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science

More information

Microsoft Advanced Technologies of SharePoint 2016

Microsoft Advanced Technologies of SharePoint 2016 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20339-2 Advanced Technologies of SharePoint 2016 Length 5 days Price $4290.00 (inc GST) Version A Overview This five-day course will teach you how to plan,

More information

A Case For OneSwarm. Tom Anderson University of Washington.

A Case For OneSwarm. Tom Anderson University of Washington. A Case For OneSwarm Tom Anderson University of Washington http://oneswarm.cs.washington.edu/ With: Jarret Falkner, Tomas Isdal, Alex Jaffe, John P. John, Arvind Krishnamurthy, Harsha Madhyastha and Mike

More information

Distributed Information Processing

Distributed Information Processing Distributed Information Processing 14 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2016 Eom, Hyeonsang All Rights Reserved Outline

More information

Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs

Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs ABSTRACT Amre Shakimov Duke University Durham, NC shan@cs.duke.edu Landon P. Cox Duke University Durham, NC lpcox@cs.duke.edu Online Social

More information

Functionality, Challenges and Architecture of Social Networks

Functionality, Challenges and Architecture of Social Networks Functionality, Challenges and Architecture of Social Networks INF 5370 Outline Social Network Services Functionality Business Model Current Architecture and Scalability Challenges Conclusion 1 Social Network

More information

ACCENTURE VIDEO SOLUTION END USER FEATURES. Enter

ACCENTURE VIDEO SOLUTION END USER FEATURES. Enter ACCENTURE VIDEO SOLUTION END USER FEATURES Enter WELCOME Engage your customers with innovative features and functionalities to retain and expand your audience, strengthen your brand and drive monetization.

More information

How to return control over user data back to the user The rethink framework

How to return control over user data back to the user The rethink framework How to return control over user data back to the user The rethink framework Anastasius Gavras Eurescom GmbH Online Webinar 21. June 2017 This project has received funding from the European Union s Horizon

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Presented by Max Fritz Senior Systems Consultant, Now Micro. Office 365 for Education What to Use When

Presented by Max Fritz Senior Systems Consultant, Now Micro. Office 365 for Education What to Use When Presented by Max Fritz Senior Systems Consultant, Now Micro Office 365 for Education What to Use When Max Fritz Senior Systems Consultant MCSA Office 365, MCSE Productivity Founder of Minnesota Office

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

The Internet. History & Current Applications

The Internet. History & Current Applications The Internet History & Current Applications Popescu 2012 1 Connecting computers to other computers Share data Join computing forces Ensure resiliency 2 Types of Communication Synchronous: sender and receiver

More information

Introducing COI: Chat over IMAP Modern Messaging over

Introducing COI: Chat over IMAP Modern Messaging over Introducing COI: Chat over IMAP Modern Messaging over Email Robert Virkus 2018-10-29 1 Vision 2 What s the Problem? Messaging silos lock us in Proprietary services operated by a single company, several

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

[MS20533]: Implementing Microsoft Azure Infrastructure Solutions

[MS20533]: Implementing Microsoft Azure Infrastructure Solutions [MS20533]: Implementing Microsoft Azure Infrastructure Solutions Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Microsoft Products Delivery Method : Instructor-led (Classroom)

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

An Offline Foundation for Accountable Pseudonyms

An Offline Foundation for Accountable Pseudonyms An Offline Foundation for Accountable Pseudonyms Bryan Ford MIT CSAIL Jacob Strauss SocialNets April 1, 2008 Introduction Anonymity is a cherished principle Traditional: voting, peer review Online: email,

More information

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication NETWORKING 1. ITDNW01 Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social 2. ITDNW02 Congestion Control for Background Data Transfers With Minimal Delay Impact 3. ITDNW03 Transient

More information

What is peer to peer?

What is peer to peer? 1 1 1 1 1 1 1 1 0 1 0 1 0 1 What is peer to peer? PP in some sense is decentralization moving away from monolithic central hub-spoke model to the decentralized device to device or service to service model.

More information

Cloud Computing. Contents. Vince DiNoto.

Cloud Computing. Contents. Vince DiNoto. Cloud Computing Vince DiNoto Vince.dinoto@kctcs.edu Contents Microsoft Live... 2 Connecting SkyDrive from Your Desktop... 4 Live Mesh... 5 Skype... 6 UStream... 6 SlideShare... 9 Flickr... 9 Jing... 10

More information

A Survey of Peer-to-Peer Content Distribution Technologies

A Survey of Peer-to-Peer Content Distribution Technologies A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview

More information

Mitel MiCollab. Keeping people connected and productive anytime, anywhere, on any device

Mitel MiCollab. Keeping people connected and productive anytime, anywhere, on any device Mitel MiCollab Keeping people connected and productive anytime, anywhere, on any device Effective collaboration among employees, partners and customers is a critical driver of any organization s success.

More information

Aviation Applications and GXTV

Aviation Applications and GXTV Aviation Applications and GXTV Adrian McAloon Director, Aviation Content and Applications Agenda Aviation applications The power of applications as a revenue driver $ Progress since October Aviation Applications

More information

PROVIDING COMMUNITY AND COLLABORATION SERVICES TO MMOG PLAYERS *

PROVIDING COMMUNITY AND COLLABORATION SERVICES TO MMOG PLAYERS * PROVIDING COMMUNITY AND COLLABORATION SERVICES TO MMOG PLAYERS * George Adam, Christos Bouras, Vaggelis Kapoulas, Andreas Papazois Computer Technology Institute & Press Diophantus N. Kazantzaki, Panepistimioupoli,

More information

Advanced Technologies of SharePoint 2016

Advanced Technologies of SharePoint 2016 Advanced Technologies of SharePoint 2016 20339-2; 5 Days; Instructor-led Course Description This five-day course will teach you how to plan, configure, and manage the advanced features in a SharePoint

More information

CompTIA Security+ Study Guide (SY0-501)

CompTIA Security+ Study Guide (SY0-501) CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes

More information

Planning and Administering SharePoint 2016

Planning and Administering SharePoint 2016 Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the

More information

Microsoft Planning and Deploying System Center 2012 Configuration Manager

Microsoft Planning and Deploying System Center 2012 Configuration Manager 1800 ULEARN (853 276) www.ddls.com.au Microsoft 10748 - Planning and Deploying System Center 2012 Configuration Manager Length 3 days Price $2750.00 (inc GST) Version C Overview Get detailed instruction

More information

Distributed Social Network in Browsers. Yang Ji Michael Puckett

Distributed Social Network in Browsers. Yang Ji Michael Puckett Distributed Social Network in Browsers Yang Ji Michael Puckett Problem Large scale personal data abuse and manipulation raises question to the cloud based architecture in social networks. Sensitive personal

More information

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -

More information

Current Status of Standardization on Digital Signage in ITU. Masahito Kawamori Rapporteur ITU-T SG16 Q13

Current Status of Standardization on Digital Signage in ITU. Masahito Kawamori Rapporteur ITU-T SG16 Q13 ITU Workshop on Digital Signage (Tokyo, Japan, 13-14 December 2011 ) Current Status of Standardization on Digital Signage in ITU Masahito Kawamori Rapporteur ITU-T SG16 Q13 ITU-T SG16 Q13 Question for

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04

Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 The Design and Implementation of a Next Generation Name Service for the Internet Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 Presenter: Saurabh Kadekodi Agenda DNS overview Current DNS Problems

More information

Lecture 2: January 24

Lecture 2: January 24 CMPSCI 677 Operating Systems Spring 2017 Lecture 2: January 24 Lecturer: Prashant Shenoy Scribe: Phuthipong Bovornkeeratiroj 2.1 Lecture 2 Distributed systems fall into one of the architectures teaching

More information

Introduction to Peer-to-Peer Networks

Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks The Story of Peer-to-Peer The Nature of Peer-to-Peer: Generals & Paradigms Unstructured Peer-to-Peer Systems Sample Applications 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt

More information

Upgrading Your Skills to MCSA Windows 8.1

Upgrading Your Skills to MCSA Windows 8.1 Upgrading Your Skills to MCSA Windows 8.1 Course 20689D - Three days - Instructor-led - Hands-on Introduction This three day course is designed primarily for IT Professionals who want to upgrade their

More information

Junction: A Decentralized Platform for Ad Hoc Social and Mobile Applications. Ben Dodson, Monica Lam, Chanh Nguyen, Te-Yuan Huang

Junction: A Decentralized Platform for Ad Hoc Social and Mobile Applications. Ben Dodson, Monica Lam, Chanh Nguyen, Te-Yuan Huang Junction: A Decentralized Platform for Ad Hoc Social and Mobile Applications Ben Dodson, Monica Lam, Chanh Nguyen, Te-Yuan Huang Motivation Motivation Ad Hoc Bring together devices with no previous contact

More information

A Meta Social Networking Approach Towards Decentralization

A Meta Social Networking Approach Towards Decentralization A Meta Social Networking Approach Towards Decentralization Pili Hu and Wing Cheong Lau Information Engieering Department Chinese University of Hong Kong Email: {hupili,wclau}@ie.cuhk.edu.hk Abstract There

More information

Chapter 2 ARCHITECTURES

Chapter 2 ARCHITECTURES DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 2 ARCHITECTURES Architectural Styles (1) DS should be composed of Components and Connectors.» How

More information

Overview of the Stateof-the-Art. Networks. Evolution of social network studies

Overview of the Stateof-the-Art. Networks. Evolution of social network studies Overview of the Stateof-the-Art in Social Networks INF5370 spring 2014 Evolution of social network studies 1950-1970: mathematical studies of networks formed by the actual human interactions Pandemics,

More information

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

SOCIAL MEDIA. Charles Murphy

SOCIAL MEDIA. Charles Murphy SOCIAL MEDIA Charles Murphy Social Media Overview 1. Introduction 2. Social Media Areas Blogging Bookmarking Deals Location-based Music Photo sharing Video 3. The Fab Four FaceBook Google+ Linked In Twitter

More information

Delivering on Cloud Transformation Infinite Solutions update. Presenter: Adam Davies, January 20 th, 2016

Delivering on Cloud Transformation Infinite Solutions update. Presenter: Adam Davies, January 20 th, 2016 Delivering on Cloud Transformation Infinite Solutions update Presenter: Adam Davies, January 20 th, 2016 Agenda Market Landscape, Opportunities and Challenges Update on Cisco Infinite Solutions Related

More information

Distributed Systems. Characteristics of Distributed Systems. Lecture Notes 1 Basic Concepts. Operating Systems. Anand Tripathi

Distributed Systems. Characteristics of Distributed Systems. Lecture Notes 1 Basic Concepts. Operating Systems. Anand Tripathi 1 Lecture Notes 1 Basic Concepts Anand Tripathi CSci 8980 Operating Systems Anand Tripathi CSci 8980 1 Distributed Systems A set of computers (hosts or nodes) connected through a communication network.

More information

Distributed Systems. Characteristics of Distributed Systems. Characteristics of Distributed Systems. Goals in Distributed System Designs

Distributed Systems. Characteristics of Distributed Systems. Characteristics of Distributed Systems. Goals in Distributed System Designs 1 Anand Tripathi CSci 8980 Operating Systems Lecture Notes 1 Basic Concepts Distributed Systems A set of computers (hosts or nodes) connected through a communication network. Nodes may have different speeds

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed

More information

to know about Microsoft Teams

to know about Microsoft Teams to know about Microsoft Teams If you have made significant investments in or are in the process of evaluating/deploying Skype for Business, what is your path forward in terms of migrating to Microsoft

More information

Skype for Business Users: 18 Things to Know about Microsoft Teams for 2018

Skype for Business Users: 18 Things to Know about Microsoft Teams for 2018 Skype for Business Users: 18 Things to Know about Microsoft Teams for 2018 If you have made significant investments in or are in the process of evaluating/deploying Skype for Business, what is your path

More information

Advanced Solutions of Microsoft SharePoint Server 2013 Course Contact Hours

Advanced Solutions of Microsoft SharePoint Server 2013 Course Contact Hours Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332 36 Contact Hours Course Overview This course examines how to plan, configure, and manage a Microsoft SharePoint Server 2013 environment.

More information

Advanced Solutions of Microsoft SharePoint 2013

Advanced Solutions of Microsoft SharePoint 2013 Course 20332A :Advanced Solutions of Microsoft SharePoint 2013 Page 1 of 9 Advanced Solutions of Microsoft SharePoint 2013 Course 20332A: 4 days; Instructor-Led About the Course This four-day course examines

More information

TikiLIVE Academic Platform

TikiLIVE Academic Platform TikiLIVE Academic Platform 1 Use any broadcaster of your choice TikiLIVE Network A TikiLIVE Broadcasting Network allows each broadcaster (Team) to operate independently inside the frame-work established

More information

Overlay Multicast. Application Layer Multicast. Structured Overlays Unstructured Overlays. CAN Flooding Centralised. Scribe/SplitStream Distributed

Overlay Multicast. Application Layer Multicast. Structured Overlays Unstructured Overlays. CAN Flooding Centralised. Scribe/SplitStream Distributed Overlay Multicast Application Layer Multicast Structured Overlays Unstructured Overlays CAN Flooding Centralised Scribe/SplitStream Distributed PeerCast 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt

More information

Ensuring β-availability in P2P Social Networks

Ensuring β-availability in P2P Social Networks Ensuring β-availability in P2P Social Networks Nashid Shahriar, Shihabur Rahman Chowdhury, Mahfuza Sharmin, Reaz Ahmed, Raouf Boutaba and Bertrand Mathieu Dept. of Comp. Sc. and Engg., Bangladesh University

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

A: Advanced Technologies of SharePoint 2016

A: Advanced Technologies of SharePoint 2016 Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com

More information

Using peer to peer. Marco Danelutto Dept. Computer Science University of Pisa

Using peer to peer. Marco Danelutto Dept. Computer Science University of Pisa Using peer to peer Marco Danelutto Dept. Computer Science University of Pisa Master Degree (Laurea Magistrale) in Computer Science and Networking Academic Year 2009-2010 Rationale Two common paradigms

More information

Slides for Chapter 10: Peer-to-Peer Systems. From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design

Slides for Chapter 10: Peer-to-Peer Systems. From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Slides for Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, Addison-Wesley 2012 Edited and supplemented by Jonne Itkonen,!

More information

Available online at ScienceDirect. Procedia Computer Science 40 (2014 ) Nantes, 5 ChronoCourse, France

Available online at   ScienceDirect. Procedia Computer Science 40 (2014 ) Nantes, 5 ChronoCourse, France Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 40 (2014 ) 129 134 Fourth International Conference on Selected Topics in Mobile & Wireless Networking (MoWNet 2014) C3PO:

More information

Course Content. This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification.

Course Content. This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification. Course Content Course Description: This five-day course will teach you how to plan, configure, and manage the advanced features in a environment. The special areas of focus for this course include implementing

More information

Premium Membership Package [N5, 000]

Premium Membership Package [N5, 000] NigeriaTrainingNetwork [NTN] and NigeriaTrainingCourses [NTC] are platforms that connects students, trainers and companies together. The platform comprises of private, work based, professional individuals,

More information

TIES for Microsoft CityNext Next-Generation Situational Awareness

TIES for Microsoft CityNext Next-Generation Situational Awareness BROCHURE A CLOSER LOOK AT! TIES for Microsoft CityNext Next-Generation Situational Awareness INTRODUCTION! TIES for Microsoft CityNext (TMCN) is an all-hazard threat monitoring and situation awareness

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Designing and Implementing a Server Infrastructure Duration: 5 Days Course Code: 20413 About this course Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows

More information

IT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved.

IT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved. IT Redefined Hans Timmerman CTO EMC Nederland 1 INDUSTRIES FACE STRUCTURAL CHANGE 2 More CEOs See IT As Driver Of Digital Business Innovation And Growth IT has the highest business priority in more than

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 70-533 Title : Implementing Microsoft Azure Infrastructure Solutions Vendor : Microsoft Version : DEMO Get

More information

Audience(s) : IT Professionals Level : 300 Technology : Microsoft System Center Configuration Manager Delivery Method : Instructor-led (Classroom)

Audience(s) : IT Professionals Level : 300 Technology : Microsoft System Center Configuration Manager Delivery Method : Instructor-led (Classroom) [MS10748]: Planning and Deploying System Center 2012 Configuration Length : 3 Days Audience(s) : IT Professionals Level : 300 Technology : System Center Configuration Delivery Method : Instructor-led (Classroom)

More information