(C) Chukiat Worasucheep 1

Size: px
Start display at page:

Download "(C) Chukiat Worasucheep 1"

Transcription

1 Slides for Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Pearson Education 2005 Contents Motivations & characteristics P2P Applications Napster, Gnutella, Kazaa BitTorrent, Skype, MMOG P2P Architecture P2P Middleware Routing overlays Summary Distributed Information Systems Page 1 Distributed Information Systems Page 2 P2P Motivation Motivations Image courtesy of Traditional client-server systems provide access to resources located on a single server computer or a small cluster of tightly-coupled servers. Expanding service on a large scale is limited when all hosts must be owned and managed by service provider. Scale of service is limited by server hardware capcbility and network connectivity. With centralized design, few decisions are required about the placement and subsequent retrieval of the resources. Peer-to-peer systems provide access to computing resources (storage, cycles, content) available in personal computers and workstations on the Internet. The design aims to deliver service that is fully decentralized, selforganizing, and dynamically balancing storage and processing loads. Distributed Information Systems Page 3 Distributed Information Systems Page 4 (C) Chukiat Worasucheep 1

2 Characteristics (1/2) Each user contributes resources to the system. Although the contributed resources may differ, all the nodes have the same functional capabilities and responsibilities. System operation does not depend on any centrally administrative system. Characteristics (2/2) System operation may offer limited degree of anonymity to providers and users of resources. Efficiency relies on the algorithm for placement of data across many hosts and subsequent access in a manner that balances workload. Access individual resource cannot be guarantees as availability of the processes and computers is unpredictable. But the system can be designed to make probability of failure small. Distributed Information Systems Page 5 Distributed Information Systems Page 6 Contents Motivations & characteristics P2P Applications Napster, Gnutella, Kazaa BitTorrent, Skype, MMOG P2P Architecture P2P Middleware Routing overlays Summary Peer-to-Peer Applications Deployment of peer-to-peer service emerged when users had acquired always-on, broadband connections to the network, making their computers suitable platforms for resource sharing. P2P File Sharing the most popular application of P2P systems. Made P2P popular Napster music exchange service Gnutella, BitTorrent Distributed Information Systems Page 7 Distributed Information Systems Page 8 (C) Chukiat Worasucheep 2

3 Napster music exchange service Began in MP3, Copyright infringement. Napster Architecture Concept Based on central index server (farm) User register and give list of files to share Searching based on keywords Results: List of files with additional information, e.g. peer s bandwidth, encoding rate, file size. on Mac OS 9 Distributed Information Systems Page 9 Distributed Information Systems Page 10 Napster Architecture Diagram peers Napster server Index 1. File location request 2. List of peers offering the file 5. Index update 3. File request 4. File delivered Figure 10.2 Napster server Index Distributed Information Systems Page 11 Napster Architecture Insight Napster considered network locality the number of hops between client and server when allocating a server to a clients. Characteristics of music application simplified the design: Requirement on consistency among replicas was not strong so this did not hamper performance. Replicas of the unified index of all music files Replicas of the music files; files are never updated Availability of files was not a serious concern; files could be downloaded again later. Knowledge of the locations of resources should be partitioned and distributed throughout the network. Each node maintains location information in its responsibility and the knowledge of the topology of the entire resources name space. Distributed Information Systems Page 12 (C) Chukiat Worasucheep 3

4 Napster Termination Napster was shut down because of the infringement of the copyright ownership. Although copying process was performed entirely between users machines, the index servers were an essential part of the process and at a well-known address. Their operators were unable to remain anonymous and then targeted in lawsuits. Anonymity for the receivers and providers is a legitimate concern for designs of peer-to-peer systems to be able to deny responsibility for holding or supplying resources. Napster Strengths and Weaknesses Strengths Fast and efficient overall search Consistent view of network Weaknesses Central server is single point of failure expensive to maintain server Distributed Information Systems Page 13 Distributed Information Systems Page 14 Gnuttela (2000+, peak in ) Gnuttela Addresses some of Napster s weaknesses and introduces its own problems Originally developed at Nullsoft (AOL) Accidentally released on their website Open protocol specifications Idea Share any types of files (not just music) You ask your neighbors for files of interest. Neighbors ask their neighbors, and so on. TTL field quenches messages after a number of hops Users with matching files reply to you Distributed Information Systems Page 15 Distributed Information Systems Page 16 (C) Chukiat Worasucheep 4

5 Gnuttela - Concept Gnuttela - Architecture Image courtesy of Fully distributed Based on an overlay network All peers are fully equal A peer needs to know another peer, that is already in the network, to join Searching based on flooding Direct downloads Distributed Information Systems Page 17 Distributed Information Systems Page 18 Gnuttela Diagram Gnuttela Strengths and Weaknesses Image courtesy of SlideShare Decentralized No single point of failure Not as susceptible to denial of service Cannot ensure correct results Flooding queries Search is now distributed but still not scalable Distributed Information Systems Page 19 Distributed Information Systems Page 20 (C) Chukiat Worasucheep 5

6 Kazaa A music file sharing application, , based on FastTrack protocols. ( 2nd generation P2P Hybrid of centralized Napster and decentralized Gnutella Super-nodes act as local search hubs Each super-node is similar to a Napster server for a small portion of the network Super-nodes are automatically chosen by the system based on their capacities (storage, bandwidth, etc.) and availability (connection time) Super-peers periodically exchange file lists Kazaa FastTrack Protocol Each installed Kazaa client comes coded with a list of supernodes. Every time the Kazaa application is launched, the client computer registers with the central server, and then chooses from a list of currently active supernodes. The client request is funneled through the supernode. The supernode communicates with other supernodes, which in turn connect to regular nodes that in turn connect to even more regular nodes, to fulfill the request until the Time to Live (TTL) of 7 runs out. Once the correct file has been located, it is transferred directly from the file owner to the requester using HTTP. It doesn't have to go through a supernode. Distributed Information Systems Page 21 Distributed Information Systems Page 22 Kazaa UI Kazaa Strenghts and Weaknesses Strength Combined good points of Napster and Gnutella Weakness Still no overall search Security? Distributed Information Systems Page 23 Distributed Information Systems Page 24 (C) Chukiat Worasucheep 6

7 Contents Motivations & characteristics P2P Applications Napster, Gnutella, Kazaa BitTorrent, Skype, MMOG P2P Architecture BitTorrent Developed by Bram Cohen in 2001 Goal: Quickly replicate one file to a large number of clients New approach for sharing large files More appropriately called P2P content distribution instead of filesharing P2P Middleware Routing overlays Summary Distributed Information Systems Page 25 Distributed Information Systems Page 26 How BitTorrent Works How BitTorrent Works Based on decentralized network Files are divided into pieces or blocks Pieces can be of size from 64 kb to 4 MB Build a network for each file to distribute A torrent file metadata about files and folders to be distributed, and usually also a list of the network locations of trackers. Trackers are computers that help participants find each other and form efficient distribution groups called swarms. Distributed Information Systems Page 27 Distributed Information Systems Page 28 (C) Chukiat Worasucheep 7

8 BitTorrent Download Client gets torrent file from somewhere Client contacts tracker, gets lists of peers Client contacts other peers directly for download of specific chunks Tit-for-tat principle Encourages cooperation, discourages free-riding A peer serves peers that serve it Peers download rarest chunks first makes them attractive to other peers, they can then download in return also prevents chunks from disappearing BitTorrent Strengths and Weaknesses Strengths Works quite well, only slow in the beginning Efficient distribution mechanism Enforces contribution, discourages free-riding Weaknesses No searching Files have to be large Everyone must contribute Distributed Information Systems Page 29 Distributed Information Systems Page 30 Skype Developed by the same people as KaZaA > 600 Million users in Million concurrent users (in 2012) Bought by Microsoft in 2011 for $8.5 billions Very similar to KaZaA s architecture Supernodes and ordinary nodes Central server for login and billing Proprietary and encrypted protocol Source code is closed Executable uses a lot of mechanisms to protect against reverse engineering Anti-debugger code Partly encrypted Skype How Skype goes through Firewalls Skype server plays mediator takes IP addresses and UDP ports forwards them to other side Both clients start connections Firewalls think that packets from the other side are responses to started connections Distributed Information Systems Page 31 Distributed Information Systems Page 32 (C) Chukiat Worasucheep 8

9 Joost Brought to you by the guys who made KaZaA and Skype, in 2007 Uses P2P video streaming technology Tries to merge the best of TV with the best of the Internet Advertisement based, View on demand Beta test was running 2012, service is suspended! Massively multiplayer online game (MMO or MMOG) Rogue on Unix on PDP11 machine, 1980 Distributed Information Systems Page 33 Distributed Information Systems Page 34 Massively multiplayer online game (MMO or MMOG) P2P Support for Multiplayer online game On the design of multiplayer video game MMORPG Contents Motivations & characteristics P2P Applications Napster, Gnutella, Kazaa BitTorrent, Skype, MMOG P2P Architecture P2P Middleware Routing overlays Summary Distributed Information Systems Page 35 Distributed Information Systems Page 36 (C) Chukiat Worasucheep 9

10 Architecture of P2P P2P Architecture based on file listing P2P Architecture Centralized (Hybrid) File listing exists on central server All peers connect to this central server Examples: Napster, ICQ Based on file listing Centralized Decentralized (hybrid) Based on node connection Unstructured Structured Decentralized No Central Server Each node connected to many other nodes May be pure Peer-to-Peer or with Super Peers Examples: Gnutella, BitTorrent Distributed Information Systems Page 37 Distributed Information Systems Page 38 P2P Architecture based on node connection Unstructured Nodes created arbitrarily Each node copies link information from other connected nodes Simple, however not efficient Examples: FastTrack, Gnutella Structured Implements algorithms to ensure connection between nodes. Scalable guarantees on numbers of hops to answer a query. Maintain all other P2P properties (load balance, self-organization, dynamic nature) Efficient, however complex algorithms involved Examples: DHT, Chord, CAN, Tapestry, and Pastry model. Contents Motivations & characteristics P2P Applications Napster, Gnutella, Kazaa BitTorrent, Skype, MMOG P2P Architecture P2P Middleware Routing overlays Summary Distributed Information Systems Page 39 Distributed Information Systems Page 40 (C) Chukiat Worasucheep 10

11 is a class of a decentralized distributed lookup service similar to a hash table. (key, value) pairs are stored in a DHT, and any participating node can efficiently retrieve the value associated with a given key. The mapping from keys to values is distributed among the nodes, in such a way that a change in the set of participants causes a minimal amount of disruption. Highly scalable to extremely large numbers of nodes. Able to handle continual node arrivals, departures, and failures. Courtesy of wikipedia Distributed Information Systems Page 41 Distributed Information Systems Page 42 DHT Properties Keys should mapped evenly to all nodes in the network (load balance) Each node should maintain information about only a few other nodes (scalability, low update cost) Messages should be routed to a node efficiently (small number of hops) Node arrival/departures should only affect a few nodes DHT Implementation DHT is a generic interface There are several implementations of this interface Chord [MIT], 2001 Pastry [Microsoft Research UK, Rice University], 2001 Tapestry [UC Berkeley], 2003 Content Addressable Network (CAN) [UC Berkeley] SkipNet [Microsoft Research US, Univ. of Washington] Kademlia [New York University] Viceroy [Israel, UC Berkeley] P-Grid [EPFL Switzerland] Distributed Information Systems Page 43 Distributed Information Systems Page 44 (C) Chukiat Worasucheep 11

12 Looking up data in P2P systems (MIT Lab, Balakrishnan et al., 2003) Looking up data in P2P systems (MIT Lab, Balakrishnan et al., 2003) Distributed Information Systems Page 45 Distributed Information Systems Page 46 Contents Motivations & characteristics P2P Applications Napster, Gnutella, Kazaa BitTorrent, Skype, MMOG P2P Architecture P2P Middleware Routing overlays Peer-to-peer middleware (1/4) Application-independent management Automatic placement of resources (data, objects, files) on computers Holding information about locations of resources Routing of messages to computers Taking account of the availability of computers, their trustworthiness, and requirements for load balancing and locality of information storage and use Summary Distributed Information Systems Page 47 Distributed Information Systems Page 48 (C) Chukiat Worasucheep 12

13 Peer-to-peer middleware (2/4) A key problem in the design of P2P applications is to provide a mechanism to enable clients to access resources quickly and dependably wherever they are in the network. Napster provided a unified index of available files 2 nd generation P2P file storage systems, such Gnutella and Freenet employ partitioned and distributed indexes, but the algorithms used are specific to each system. Peer-to-peer middleware (3/4) P2P middleware are designed for Functional requirements Simplify the construction of services across many hosts enabling clients to locate and access resources even though the resources are widely distributed amongst the hosts. Ability to add new resources and to remove them at will as well as add and remove hosts to the service. Non-functional requirements (Kubiatowicz 2003) (next page ) Distributed Information Systems Page 49 Distributed Information Systems Page 50 Peer-to-peer middleware (4/4) Functional requirements (previous page) Non-functional requirements (Kubiatowicz 2003) Global scalable access millions of objects on hundreds of thousands of hosts. Load balancing with use of replicas of heavily-used resources. Optimization for local interactions between neighboring peers to reduce impacts from the latency due to network distance between nodes. Accommodating to highly dynamic host availability most P2P allows hosts to freely join or leave the system. Security of data in an environment with heterogeneous trust. Anonymity, deniability and resistance to censorship Contents Motivations & characteristics P2P Applications Napster, Gnutella, Kazaa BitTorrent, Skype, MMOG P2P Architecture P2P Middleware Routing overlays Summary Distributed Information Systems Page 51 Distributed Information Systems Page 52 (C) Chukiat Worasucheep 13

14 Routing overlays (1/2) The development of P2P middleware has been an active research topic since 1997 (Plaxton, Rajaraman & Richa 1997). A routing overlay takes responsibility for locating nodes and objects. Any node access any object by routing each request through a sequence of nodes, exploiting knowledge of at each of them to locate the destination object. The overlay maintains knowledge of the locations of all the available replicas and delivers requests to the nearest live node (i.e. one that has not failed) that has a copy of the relevant object. It s called overlay since it implements a routing mechanism in the application layer, which is over the IP layer Routing overlays (2/2) GUID is used to identified each object in the overlay. GUIDs are also known as opaque identifiers, since they reveal nothing about the locations of the objects to which hey refer. Routing overlays take responsibilities for: A client wishing to invoke an operation on an object submits a request including the object s GUID to the routing overlay, which routes the request to a node at which a replica of the object resides. A node wishing to make a new object available to a peer-to-peer service computes a GUID for the object and announces it to the routing overlay, which then ensures that the object is reachable by all other clients. Make the removed objects (by clients) unavailable. Nodes may join and leave the services. Distributed Information Systems Page 53 Distributed Information Systems Page 54 Figure 10.3: Distribution of information in a routing overlay Some routing overlays A s routing knowledge D s routing knowledge Pastry (Rowstron and Druschel 2001, Castro et al. 2002) is a message routing infrastructure, based on distributed hash table (DHT), and deployed in several applications e.g. C PAST (2001) an immutable file storage system implemented as a distributed hash table (DHT) A D Squirrel (Iyer et al. 2002) a web caching service on local networks of PCs Tapestry (Dabek et al. 2003, Zhao et al. 2004) conceals DHT behind Distributed Object Location and Routing (DOLR) Object: Node: B B s routing knowledge C s routing knowledge OceanStore (Kubiatowicz et al. 2000) a very large scale, incrementally-scaled persistent storage facility for mutable data objects with long term persistence and reliability in a constantly changing network and resources Ivy file system (Muthitachareon 2002) similar to OceanStore, but emulates a Sun NFS srver Distributed Information Systems Page 55 Distributed Information Systems Page 56 (C) Chukiat Worasucheep 14

15 Figure 10.4: Basic programming interface for a distributed hash table (DHT) as implemented by the API over Pastry GUID is generated from the object s values using a hash function (e.g. SHA-1). Thus the overlay is sometimes called distributed hash tables (DHT). Basic APIs to access objects are as follows. put(guid, data) The data is stored in replicas at all nodes responsible for the object identified by GUID. remove(guid) Deletes all references to GUID and the associated data. value = get(guid) The data associated with GUID is retrieved from one of the nodes responsible it. Figure 10.5: Basic programming interface for distributed object location and routing (DOLR) as implemented by Tapestry publish(guid ) GUID can be computed from the object (or some part of it, e.g. its name). This function makes the node performing a publish operation the host for the object corresponding to GUID. unpublish(guid) Makes the object corresponding to GUID inaccessible. sendtoobj(msg, GUID, [n]) Following the object-oriented paradigm, an invocation message is sent to an object in order to access it. This might be a request to open a TCP connection for data transfer or to return a message containing all or part of the object s state. The final optional parameter [n], if present, requests the delivery of the same message to n replicas of the object. Figure 10.9: Pastry s routing algorithm Figure 10.10: Tapestry routing From [Zhao et al. 2004] To handle a message M addressed to a node D (where R[p,i] is the element at column i, row p of the routing table): 1. If (L -l < D < L l ) { // the destination is within the leaf set or is the current node 2. Forward M to the element L i of the leaf set with GUID closest D to or the current node A. 3. } else { // use the routing table to despatch M to a node with a closer GUID 4. find p, the length of the longest common prefix D of and A. and i, the (p+1) th hexadecimal digit of D. 5. If (R[p,i] null) forward M to R[p,i] // route M to a node with a longer common prefix. 6. else { // there is no entry in the routing table 7. Forward M to any node in L or R with a common prefix of length i, but a GUID that is numerically closer. } } Instructor s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 4 Pearson Education 2005 Tapestry routings for 4377 publish path Location mapping for 4378 Routes actually taken by send(4378) Phil s Books E FE 4B4F EC 4377 (Root for 4378) 4A6D 437A AA Phil s Books Replicas of the file Phil s Books (G=4378) are hosted at nodes 4228 and AA93. Node 4377 is the root nod for object The Tapestry routings shown are some of the entries in routing tables. The publish path routes followed by the publish messages laying down cached location mappings for object The loc mappings are subsequently used to route messages sent to Instructor s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 4 Pearson Education 2005 (C) Chukiat Worasucheep 15

16 Figure 10.14: Ivy system architecture Applications of P2P Ivy node Many file sharing networks Napster, Freenet Application Application DHash server Gnutella, Kazaa Bittorrent DHash server Peer-to-Peer Content Delivery Networks (P2P-CDN) Squirrel web caching service, based on Pastry Ivy server DHash server OceanStore and Ivy file stores DHash server Modifled NFS Client module Kernel DHash server Massively Multiplayer Online Games (MMOG) Centralized/P2P/Hybrid? Instructor s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 4 Pearson Education 2005 Distributed Information Systems Page 62 Research Study Conduct a brief/review research of any P2P applications or routing overlays or any other related issues. Sources: online DB IEEE, ACM, ScienceDirect, SpringerLink online DBs en.wiki.pedia.com Make a professional presentation of up to (strictly) 20 min. long per group in next month. Provide a 4-or-6-slide-per-page handouts before the presentation. Present its background, key concepts, and future work direction. Don t forget to cite your references appropriately. Topic must be different to other groups. Distributed Information Systems Page 63 (C) Chukiat Worasucheep 16

Chapter 10: Peer-to-Peer Systems

Chapter 10: Peer-to-Peer Systems Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Introduction To enable the sharing of data and resources

More information

Slides for Chapter 10: Peer-to-Peer Systems

Slides for Chapter 10: Peer-to-Peer Systems Slides for Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, Addison-Wesley 2012 Overview of Chapter Introduction Napster

More information

Slides for Chapter 10: Peer-to-Peer Systems. From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design

Slides for Chapter 10: Peer-to-Peer Systems. From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Slides for Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, Addison-Wesley 2012 Edited and supplemented by Jonne Itkonen,!

More information

Distributed Systems Peer-to-Peer Systems

Distributed Systems Peer-to-Peer Systems Distributed Systems Peer-to-Peer Systems [2] P2P Systems - Goals and Definition Goal: to enable sharing of data and resources on a very large scale by eliminating any requirement for separately-managed

More information

Lecture 13: P2P Distributed Systems

Lecture 13: P2P Distributed Systems Lecture 13: P2P Distributed Systems Behzad Bordbar School of Computer Science, University of Birmingham, UK Lecture 13 1 Outline Characteristics of P2P How Napster works? Limitation of Napster and P2P

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Distributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201

Distributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201 Distributed Systems ID2201 peer-to-peer Johan Montelius 1 Idéa use resources in edge of network computing storage communication 2 Computing 3 seti@home central server millions of clients hundred of thousands

More information

Peer-to-Peer Internet Applications: A Review

Peer-to-Peer Internet Applications: A Review Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 25 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer peer-to-peer systems overview

More information

Middleware and Distributed Systems. Peer-to-Peer Systems. Peter Tröger

Middleware and Distributed Systems. Peer-to-Peer Systems. Peter Tröger Middleware and Distributed Systems Peer-to-Peer Systems Peter Tröger Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers) Each

More information

Motivation for peer-to-peer

Motivation for peer-to-peer Peer-to-peer systems INF 5040 autumn 2015 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Ø Inherent restrictions of the standard client/ server model

More information

Peer-to-peer computing research a fad?

Peer-to-peer computing research a fad? Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

CS6601 DISTRIBUTED SYSTEM / 2 MARK

CS6601 DISTRIBUTED SYSTEM / 2 MARK UNIT III PEER TO PEER SERVICE AND FILE SYSTEM 1. Define Peer-Peer System. Part A - Questions Peer-to-peer system is a paradigm for the construction of distributed system and application in which data and

More information

Peer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006

Peer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006 Peer-to-Peer Protocols and Systems TA: David Murray 15-441 Spring 2006 4/19/2006 P2P - Outline What is P2P? P2P System Types 1) File-sharing 2) File distribution 3) Streaming Uses & Challenges 2 Problem:

More information

12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics

12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics // Topics Peer to Peer Systems Introduction Client-server vs peer to peer Peer-to-peer networks Routing Overlays Structured vs unstructured Example PP Systems Skype login server Peer-to-peer - definitions

More information

Peer- Peer to -peer Systems

Peer- Peer to -peer Systems Peer-to-peer Systems Brian Nielsen bnielsen@cs.aau.dk Client-Server Centralized Bottleneck Functional specialization Single point of failure Central administration NFS Client NFS Client NFS Server NFS

More information

Chapter 10 Peer-to-Peer Systems

Chapter 10 Peer-to-Peer Systems CSF661 Distributed Systems 分散式系統 Chapter 10 Peer-to-Peer Systems 吳俊興 國立高雄大學資訊工程學系 Chapter 10 Peer-to-Peer Systems 10.1 Introduction 10.2 Napster and its legacy 10.3 Peer-to-peer middleware 10.4 Routing

More information

Distributed Information Processing

Distributed Information Processing Distributed Information Processing 14 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2016 Eom, Hyeonsang All Rights Reserved Outline

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

Peer to Peer Networks

Peer to Peer Networks Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Peer-to-Peer (P2P) Systems

Peer-to-Peer (P2P) Systems Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed

More information

INF5071 Performance in distributed systems: Distribution Part III

INF5071 Performance in distributed systems: Distribution Part III INF5071 Performance in distributed systems: Distribution Part III 5 November 2010 Client-Server Traditional distributed computing Successful architecture, and will continue to be so (adding proxy servers)

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Peer-to-peer systems and overlay networks

Peer-to-peer systems and overlay networks Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems

More information

Peer-to-Peer Applications Reading: 9.4

Peer-to-Peer Applications Reading: 9.4 Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

A Survey of Peer-to-Peer Content Distribution Technologies

A Survey of Peer-to-Peer Content Distribution Technologies A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview

More information

Peer-to-Peer Systems and Distributed Hash Tables

Peer-to-Peer Systems and Distributed Hash Tables Peer-to-Peer Systems and Distributed Hash Tables CS 240: Computing Systems and Concurrency Lecture 8 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Selected

More information

Lecture 8: Application Layer P2P Applications and DHTs

Lecture 8: Application Layer P2P Applications and DHTs Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:

Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview: PP Lecture 1 Peer-to-Peer Model March 16, 005 Overview: centralized database: Napster query flooding: Gnutella intelligent query flooding: KaZaA swarming: BitTorrent unstructured overlay routing: Freenet

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

Page 1. How Did it Start? Model Main Challenge CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth

More information

DISTRIBUTED SYSTEMS CSCI 4963/ /4/2015

DISTRIBUTED SYSTEMS CSCI 4963/ /4/2015 1 DISTRIBUTED SYSTEMS CSCI 4963/6963 12/4/2015 2 Info Quiz 7 on Tuesday. Project 2 submission URL is posted on the web site Submit your source code and project report (PDF!!!) in a single zip file. If

More information

Outline. Peer-to-Peer. P2p file-sharing. Wither p2p? What s out there? The p2p challenge C1: Search(human s goals) -> file

Outline. Peer-to-Peer. P2p file-sharing. Wither p2p? What s out there? The p2p challenge C1: Search(human s goals) -> file Outline Peer-to-Peer - pp file sharing techniques Downloading: Whole-file vs. chunks Searching Centralized index (Napster, etc.) Flooding (Gnutella, etc.) Smarter flooding (KaZaA, ) Routing (Freenet, etc.)

More information

Scaling Problem Millions of clients! server and network meltdown. Peer-to-Peer. P2P System Why p2p?

Scaling Problem Millions of clients! server and network meltdown. Peer-to-Peer. P2P System Why p2p? Scaling Problem Millions of clients! server and network meltdown Peer-to-Peer 15-441 2 P2P System Why p2p? Leverage the resources of client machines (peers) Computation, storage, bandwidth Scaling: Create

More information

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming

More information

Scaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p?

Scaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p? Scaling Problem 15-441 Computer Networking Millions of clients server and network meltdown Lecture 23: Peer-Peer Systems Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 2 P2P System Why p2p?

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

Distributed Knowledge Organization and Peer-to-Peer Networks

Distributed Knowledge Organization and Peer-to-Peer Networks Knowledge Organization and Peer-to-Peer Networks Klaus Wehrle Group Chair of Computer Science IV RWTH Aachen University http://ds.cs.rwth-aachen.de 1 Organization of Information Essential challenge in?

More information

Peer-to-peer systems

Peer-to-peer systems Prof. Dr. Claudia Müller-Birn Institute for Computer Science, Networked Information Systems Peer-to-peer systems Netzprogrammierung (lgorithmen und Programmierung V) Where are we on our topic map? Descriptive

More information

Peer to Peer Systems and Probabilistic Protocols

Peer to Peer Systems and Probabilistic Protocols Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good

More information

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs

More information

Distributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017

Distributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017 Distributed Systems 16. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2017 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically

More information

Today. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables

Today. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables Peer-to-Peer Systems and Distributed Hash Tables COS 418: Distributed Systems Lecture 7 Today 1. Peer-to-Peer Systems Napster, Gnutella, BitTorrent, challenges 2. Distributed Hash Tables 3. The Chord Lookup

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Scaling Problem Millions of clients! server and network meltdown. Peer-to-Peer. P2P System Why p2p?

Scaling Problem Millions of clients! server and network meltdown. Peer-to-Peer. P2P System Why p2p? Peer-to-Peer Scaling Problem Millions of clients! server and network meltdown 15-441 2 P2P System Why p2p? Leverage the resources of client machines (peers) Computation, storage, bandwidth 3 Scaling: Create

More information

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals. Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University

More information

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play

More information

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9 Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication

More information

CSE 486/586 Distributed Systems Peer-to-Peer Architectures

CSE 486/586 Distributed Systems Peer-to-Peer Architectures CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How

More information

CMSC 332 Computer Networks P2P and Sockets

CMSC 332 Computer Networks P2P and Sockets CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that

More information

Peer to Peer Networks

Peer to Peer Networks Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2018 Networking Laboratory P2P Applications Traditional P2P applications: for file sharing BitTorrent, Emule

More information

Chapter 10 Peer-to-Peer Systems

Chapter 10 Peer-to-Peer Systems CSD511 Distributed Systems 分散式系統 Chapter 10 Peer-to-Peer Systems 吳俊興 國立高雄大學資訊工程學系 Chapter 10 Peer-to-Peer Systems 10.1 Introduction 10.2 Napster and its legacy 10.3 Peer-to-peer middleware 10.4 Routing

More information

Content Search. Unstructured P2P

Content Search. Unstructured P2P Content Search Unstructured P2P Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University *Partly adapted from original slides provided

More information

EE 122: Peer-to-Peer Networks

EE 122: Peer-to-Peer Networks EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer

More information

Content Search. Unstructured P2P. Jukka K. Nurminen

Content Search. Unstructured P2P. Jukka K. Nurminen Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd

More information

Subway : Peer-To-Peer Clustering of Clients for Web Proxy

Subway : Peer-To-Peer Clustering of Clients for Web Proxy Subway : Peer-To-Peer Clustering of Clients for Web Proxy Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute

More information

Introduction on Peer to Peer systems

Introduction on Peer to Peer systems Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr dacosta@irit.fr 1/55 Goal of this Lecture What can P2P do, not only as a buzzword What it can't do Shows some examples & algorithms

More information

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall

More information

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016 Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80

More information

INF5070 media storage and distribution systems. to-peer Systems 10/

INF5070 media storage and distribution systems. to-peer Systems 10/ INF5070 Media Storage and Distribution Systems: Peer-to to-peer Systems 10/11 2003 Client-Server! Traditional distributed computing! Successful architecture, and will continue to be so (adding proxy servers)!

More information

CSCI-1680 P2P Rodrigo Fonseca

CSCI-1680 P2P Rodrigo Fonseca CSCI-1680 P2P Rodrigo Fonseca Based partly on lecture notes by Ion Stoica, Sco5 Shenker, Joe Hellerstein Today Overlay networks and Peer-to-Peer Motivation Suppose you want to write a routing protocol

More information

P2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili

P2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili P2P Network Structured Networks: Distributed Hash Tables Pedro García López Universitat Rovira I Virgili Pedro.garcia@urv.net Index Introduction to DHT s Origins of structured overlays Case studies Chord

More information

Chapter 6 PEER-TO-PEER COMPUTING

Chapter 6 PEER-TO-PEER COMPUTING Chapter 6 PEER-TO-PEER COMPUTING Distributed Computing Group Computer Networks Winter 23 / 24 Overview What is Peer-to-Peer? Dictionary Distributed Hashing Search Join & Leave Other systems Case study:

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks P2P Systems Jianping Pan Summer 2007 5/30/07 csc485b/586b/seng480b 1 C/S vs P2P Client-server server is well-known server may become a bottleneck Peer-to-peer everyone is a (potential)

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved. BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks

More information

Unit background and administrivia. Foundations of Peer-to- Peer Applications & Systems

Unit background and administrivia. Foundations of Peer-to- Peer Applications & Systems A Course on Foundations of Peer-to-Peer Systems & Applications CS 6/75995 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer Science www.cs.kent.edu/~javed/class-p2p08/

More information

Distributed Hash Tables: Chord

Distributed Hash Tables: Chord Distributed Hash Tables: Chord Brad Karp (with many slides contributed by Robert Morris) UCL Computer Science CS M038 / GZ06 12 th February 2016 Today: DHTs, P2P Distributed Hash Tables: a building block

More information

Overview Computer Networking Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste

Overview Computer Networking Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste Overview 15-441 15-441 Computer Networking 15-641 Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste Fall 2014 www.cs.cmu.edu/~prs/15-441-f14 Web Consistent hashing Peer-to-peer Motivation

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2 416 Distributed Systems Mar 3, Peer-to-Peer Part 2 Scaling Problem Millions of clients server and network meltdown 2 P2P System Leverage the resources of client machines (peers) Traditional: Computation,

More information

Extreme Computing. BitTorrent and incentive-based overlay networks.

Extreme Computing. BitTorrent and incentive-based overlay networks. Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some

More information

Handling Churn in a DHT

Handling Churn in a DHT Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get

More information

15-744: Computer Networking P2P/DHT

15-744: Computer Networking P2P/DHT 15-744: Computer Networking P2P/DHT Overview P2P Lookup Overview Centralized/Flooded Lookups Routed Lookups Chord Comparison of DHTs 2 Peer-to-Peer Networks Typically each member stores/provides access

More information

PEER-TO-PEER NETWORKS, DHTS, AND CHORD

PEER-TO-PEER NETWORKS, DHTS, AND CHORD PEER-TO-PEER NETWORKS, DHTS, AND CHORD George Porter May 25, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

Challenges in the Wide-area. Tapestry: Decentralized Routing and Location. Global Computation Model. Cluster-based Applications

Challenges in the Wide-area. Tapestry: Decentralized Routing and Location. Global Computation Model. Cluster-based Applications Challenges in the Wide-area Tapestry: Decentralized Routing and Location System Seminar S 0 Ben Y. Zhao CS Division, U. C. Berkeley Trends: Exponential growth in CPU, b/w, storage Network expanding in

More information

Distributed Hash Tables

Distributed Hash Tables Distributed Hash Tables CS6450: Distributed Systems Lecture 11 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University.

More information

EE 122: Peer-to-Peer (P2P) Networks. Ion Stoica November 27, 2002

EE 122: Peer-to-Peer (P2P) Networks. Ion Stoica November 27, 2002 EE 122: Peer-to-Peer (P2P) Networks Ion Stoica November 27, 22 How Did it Start? A killer application: Naptser - Free music over the Internet Key idea: share the storage and bandwidth of individual (home)

More information

CIS 700/005 Networking Meets Databases

CIS 700/005 Networking Meets Databases Announcements CIS / Networking Meets Databases Boon Thau Loo Spring Lecture Paper summaries due at noon today. Office hours: Wed - pm ( Levine) Project proposal: due Feb. Student presenter: rd Jan: A Scalable

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information