Outline. P2P and Content Distribution. P2P Definitions. More Definitions. P2P is not new. P2P Definitions. P2P Overview P2P systems P2P and DRM
|
|
- Deborah Anthony
- 6 years ago
- Views:
Transcription
1 P2P and Content Distribution ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University Outline P2P Overview P2P systems P2P and DRM Some slides of this talk are provided by Dr. Songqing Chen from GMU 2 P2P Definitions A class of systems and applications that employ distributed resources to perform a function in a decentralized manner. The resources encompass computing power, data (storage and content), network bandwidth, and presence (computers, human, and other resources) - by Milojicic et al. Any network that does not have fixed clients and servers, but a number of peer nodes that function as both clients and servers to the other nodes on the network - wikipedia 3 More Definitions the sharing of computer resources and services by direct exchange between systems. - Intel P2P working group SETI@home: the computers at the edge provide power and those in the middle of the network are there only to coordinate them - David Anderson Clay Shirky of O Reilly and Associate A class of applications that takes advantage of resources available at the edges of the Internet. Because accessing these decentralized resources means operating in an environment of unstable connectivity and unpredictable IP addresses, P2P nodes must operate outside the DNS system and have significant or total autonomy from central servers 4 P2P Definitions Sharing Contribution Incentive of sharing and contribution Collaboration As reported in June 2004, P2P trafficmakes up 80% traffic on the Internet, in which the share of BitTorrent is 53%. Others are edonkey, Gnutella, FastTrack, etc. 5 P2P is not new ARPANET, late 60 s Usenet Since 1979 UUCP (Unix to Unix copy protocol), NNTP (network news transport protocol) Copies files between computers without central control At the beginning, only UNC and Duke Later, using news server and ISP s server DNS Mix of p2p and hierarchical model Early Internet: Hosts.txt includes a set of names and IP addresses and copied around the Internet periodically In 1983, DNS was developed for better scalability Hierarchical DNS names Windows workgroups Network File system 6
2 Back to P2P in 21 st century (?) Napster music file sharing Powerful home computing resources High Bandwidth networking Negative views on P2P Illegal copy on copyrighted materials Too much bandwidth consumption of existing networks Too much uncontrolled/inaccurate/junk contents Distributed Resources in P2P Replicable Content files (e.g., MP3, avi) No loss of original contents Replenishable Bandwidth, CPU cycle Cannot be saved for future use Cannot be used-up for future use 7 8 P2P Applications and Functionality Distributed computing SETI@home (compute-intensive), 1996 SETI: Search for Extraterrestrial Intelligence Using computing power of home PCs to search for radio signals from extraterrestrial civilizations Data/content sharing Napster, Gnutella, FreeNet, etc. Communication and collaboration Instant Messaging (ICQ, AIM), discussion board (Groove), games (Dooms), VOIP (skype) Computing System Taxonomy Centralized systems (Mainframes) Flat Computer systems Distributed systems Client-Server Hierarchical -to- Pure Hybrid 9 10 P2P vs. Client-server Server 1 st generation of P2P networks Napster Gnutella Super DHT s Clients 11 12
3 Napster Example Hybrid P2P Bob Directory server Alice When a peer (Bob) connects to Napster, it informs center server with its IP address and song titles 2. Alice queries for a song, then central server returns bob s address 3. Alice request the song to bob and download a copy directly 13 What is Gnutella? Many hybrid application of decentralized and centralized systems Usenet (backbone or heavy-duty peers) DNS (built in hierarchy) ICQ (direct client-to client communication with backup of a server) Napster (decentralized file sharing with centralized file directory) Dramatically reduced latency Better search engine Not for illegal objects distribution 14 Overlay Networks and Gnutella Gnutella is a fully decentralized peer-to-peer protocol for locating resources Standard, not a program. There are many implementations of Gnutella (BearShare, LimeWire, Morpheus) Each member of the network may act as a client, looking for data, or a server, sharing that data Server Serv A network on top of a network Used only for the search aspect of Gnutella Actual transfer of files is not performed with the overlay network Client ent 15 Connecting to the Network Horizon example When you start the application, need to first connect to a node - bootstrapping No set way to do this. Protocol is silent on the issue 16 TTL = Node Cache contact a well known node that maintains a list of nodes Node Web Page lists locations of nodes to bootstrap and get started
4 Ping and Pong After knowing where to go to join a network, a servent uses Ping and Pong to locate other nodes to connect to Originally, Ping message sent to the node connected to, which forwarded to all neighbors All those servents willing to connect to the sender respond with Pong Pongs convey IP, Port, Files shared, and distance (hops) PING PING PING PING PING PING 23 24
5 PONG PONG PONG PONG PONG
6 Queries in Gnutella Queries work very much like the original Ping/Pong scheme Send a Query to neighbors, with TTL=7 and Hops=0 This defines the default horizon for reaching servents. As TTL increases, so does the horizon, and the number of hosts that can be reached, improving odds of a hit 31 Queries in Gnutella, Continued Send Query to neighbors, who send to their neighbors Decrement TTL, increase Hops when you receive Continue forwarding while TTL!= 0 If you have the requested file, return a Query Hit message Generates lots of messages. Called flood search 32 Query Example Transferring Data File I is need requested a out of band. guitar song Query Message Query Hit Message 33 When a file is located using the Gnutella protocol, the Query Hit message returns a host/port to contact to obtain the file The connection to get data is made using HTTP Usually (but not always) same host/port as used for Gnutella traffic Default is 6364 Problems occur when servent is behind firewall The Gnutella network is only used to locate the nodes sharing those resources. 34 Problems with Flood Query Traditional Gnutella flood query has a number of problems Very large number of packets generated to fulfill queries most searches on Gnutella can be satisfied with a search that visits fewer nodes Essentially, just a Breadth First Search (BFS) Some proposals attempt to address this Alternatives to Flood Query Iterative Deepening Directed BFS Local Indices Random Walkers with alternate schemes for searching 35 36
7 Issues Several alternatives (Local Indices, Iterative Deepening) require a global policy to be understood by all nodes Sharing information about file index (Local Indices) or even statistics (Directed BFS) leads to possible security risks Most, require at least some modification Outline Gnutella Super DHT to the servents What are Super s? High-end nodes, with better relative network bandwidth and cpu power than other nodes, that act as a centralized server to a subset of clients (leaf nodes); act as an equal in a network of superpeers; maintain an index of its clients data, answering queries on their behalf. Also called supernodes, ultrapeers. Supers Network characteristics Superpeers are equals in search. All peers are equals in download. Any query results found provides 1 response to client with all the results included. Degenerate superpeer network: clustersize=1 (pure p2p, no superpeers) A well-known example is KaZaA (Morpheus) Super Node based P2P: KaZaA (Morpheus) Super Node based P2P: KaZaA (Morpheus) super peer file get query answer leaf node queries its superpeer; superpeer answers that another leaf has the result; the peer gets its file from the local peer in the cluster; the query never traverses the network 41 super peer flooding query If superpeer doesn t have the result within the cluster, supernode sends flooding query to its supernode neighbors; leaf nodes never see or 42 process the query
8 Super Infrastructure Two-layer hierarchy Super s Clients/Leaf Nodes Cluster a superpeer and its clients Super Selection Can do at bootstrap, and during network operation Make sure it s fair, random Hosts determine whether they re eligible Ultrapeer Capable Uptime Not firewalled Suitable OS Linux, 2000/NT/XP, OS/X good - sockets Not 95/98/ME, Mac Classic Bandwidth 15KB/s downstream; 10KB/sec upstream Redundancy No Redundancy simple example Improves availability and reliability for clients. Reduces load on any single superpeer. Leaf nodes connect to at least 2 ultrapeers; default is 3; NEVER more than 10. Superpeer partners in a cluster form a virtual superpeer. Partners connect to every client, keeps a full index of each, and keeps its partners data Redundancy Super Summary Superpeers provide a balance between centralized search s inherent efficiency, and distributed search s autonomy, load balancing, and robustness. Superpeers take advantage of nodes heterogeneity of capabilities, to place the load where it is best handled. In the case where better query results may be found outside a leaf s cluster even though the query can be satisfied within the cluster, an option to extend the query beyond the cluster s superpeer may be beneficial. Would a three-tiered approach work even better? 47 48
9 Outline Gnutella Super DHT Distributed Hash Table DHT is like having a file cabinet distributed over numerous servers, explained Frans Kaashoek, a professor of Computer Science and Engineering at MIT. Interpretation: 1. It s a hash table: an efficient data structure for key lookup 2. It s distributed : each node stores part of info DHT -- An Interface From Hash Table to DHT Distributed application put(key, data) get (key) Distributed hash table data node node. node k v? K V (k1,v1) K V K V K V DHT provides the information look up service for large-scale distributed applications. Scalable, robust, self-organizing, load-balancing, secure K V Retrive(k1) The shared distributed infrastructure: relieve burdens of individual apps Insert(k1, v1) 51 a. Hash table b. Distributed hash table 52 From Hash Table to DHT (cont) Core questions when introducing distributed : How to divide a whole hash table to multiple distributed hash tables? How to reach the hash table who has the key I want, if I cannot find it from the local hash table? Requirements: Data should be identified using unique numeric keys using hash function such as SHA-1 Nodes should be willing to store keys for each other. Applications of DHT Distributed file systems Multicast overlay networks Event notification systems Distributed query processing Structured P2P systems Other distributed applications 53 54
10 Case Study: CAN CAN: Content-Addressable Network Basic Data Structure: d- dimensional Cartesian coordinate space Every key (k) is mapped to a point (x,y) in the coordinate space x = h1(k), y = h2(k); The coordinate space = key space K1 K2 K3 K4 Zone: Answer to Q1 This coordinate space is partitioned into distinct zones. Every node holds a distinct zone A node should store all keys that fall into the zone it owns K1 1 3 K2 K3 2 4 K Routing: Answer to Q2 Every node only maintains the states of its neighbors Forward lookup request to a neighbor closer to the key in the coordinate space Greedy forwarding Node A wants to lookup k3 A K1 K2 B K3 K4 57 Insertion & Retrieval in CAN 1. Node A inserts (k3, v3) 2. x3=h1(k3), y3=h2(k3) 3. Route Insertion request to (x3,y3) y3 4. (x3, y3) is in the zone of node B, so node B should store (k3,v3) in its hash table 5. Node C retrieves k3 6. Computes x3, y3 like A does 7. Route lookup request to (x3,y3) 8. Node B receives lookup request, and retrieves (k3, v3) from its hash table C A K1 K2 B K3 x3 K4 58 Join Departure Bootstrap The new node find a node already in the CAN Finding a zone Find a node randomly whose zone will be split JOIN request message Splitting Hand over part of (key, value) pairs 1 s coordinate neighbor set = {2, 3, 4, 7} 1 s coordinate neighbor set {2, 3, 4, 5} The neighbors of the 7 s coordinate neighbor set = {1, 2, 4, 5} split zone is notified so that routing can include the new node 59 Joining the routing 1.P 7 K1 2 K2 8 6 K3 K Node 5 is leaving 60
11 Departure Departure Node 7 is leaving K1 2 K2 K3 4 1 K1 2 K2 K K K Multiple Hash Functions Use k different hash functions to map a single key onto k points in the coordinate space, then k replicas Choose to retrieve an entry closest in the coordinate space, then reducing path latency 2 nd Generation of P2P Network BitTorrent Motivation How to alleviate the load & bandwidth costs of central server? Flash crowds Scalability Reliability Napster, Gnutella and DHT solved part of the problem Enabled searching over peers Weakly concern for downloading speed up 65 Motivation (2) Problems of traditional P2P network: Limited bandwidth for most peers s download queue is always full, which causes long start time for other to downloading Also causes low downloading speed Solution by BitTorrent: Using parallel downloading! Problem: how can we download from other peers having incomplete files? Key: split file into many pieces! Data integrity is important here 66
12 Motivation (3) There re large portion of free riders exist: The downloading speed is limited by the peers who are willing to upload How to encourage every peer to contribute to the content distribution? Tit-for-tat: choking those who re not or slowly uploading to you Background BitTorrent invented by Bram Cohen The first usable version of BitTorrent appeared in October 2002 BitTorrent traffic: Was negligible in May 2003 Accounted for over 9% of the sampled traffic by October 2003 [Stanislav Shalunov, Internet2 netflow weekly reports, 2003] BitTorrent s Basic Idea To best utilize parallel downloading, file is treated as many pieces: Using SHA-1 to ensure every piece s data integrity Using rarest first strategy for piece selection to speed up distribution Using a tit-for-tat algorithm (choking for the lowest speed uploader) to encourage uploading 69 Basic Framework Typically there re Web servers to serve.torrent metainfo file Tracker: maintain all peers IP/port information, so each peer can find others Downloaders (leecher/seed) as peers connected to each other 70 Illustration One seed in the central, others are leechers: Content Distribution Content Publisher Original File(s) Computing using CompleteDir.torrent file (containing a valid tracker address) Distribute.torrent file: Post.torrent file to any web server for people to download Running BitTorrent Downloader with the.torrent file Serving as a seed as long as possible 71 72
13 Overall Architecture Web Server Tracker Overall Architecture Web Server Tracker Web page with link to.torrent Web page with link to.torrent.torrent Get-announce A B C [Seed] A B C [Seed] Downloader Downloader US 73 US 74 Overall Architecture Web Server Tracker Overall Architecture Web Server Tracker Web page with link to.torrent Web page with link to.torrent A Response-peer list B C [Seed] A Shake-hand Shake-hand B C [Seed] Downloader Downloader US 75 US 76 Overall Architecture Web Server Tracker Overall Architecture Web Server Tracker Web page with link to.torrent Web page with link to.torrent A pieces B pieces C [Seed] A pieces pieces B pieces C [Seed] Downloader Downloader US 77 US 78
14 Overall Architecture Web Server Tracker Tracker s Functions Web page with link to.torrent A pieces pieces Get-announce Response-peer list B pieces C [Seed] When peers come, get the info_hash as the ID for each.torrent file For each.torrent file, tracker will maintain List of all peers who involving this file IP, port, peer_id Returns random list of peers State information Completed Downloading Downloader US Bencoding Metainfo file (.torrent) and tracker responses are in bencoding: Strings: 4:spam corresponds to 'spam' Integers: i3e corresponds to 3 Lists: l4:spam4:eggse corresponds to ['spam', 'eggs'] Dictionaries: d3:cow3:moo4:spam4:eggse corresponds to {'cow': 'moo', 'spam': 'eggs'} d4:spaml1:a1:bee corresponds to {'spam': ['a', 'b']} Metainfo files (.torrent) announce: The URL of the tracker info (a dictionary that describes the file(s) of the torrent): name: the suggested name to save the file (or directory) piece length: most commonly 2 18 = 256 K pieces: a string whose length is a multiple of 20. Every 20 bytes is the SHA1 hash of the piece at the corresponding index 83 Metainfo files (.torrent) (2) (for single file) length: the length of the file in bytes (for multi-file) files (list of dictionary): length: the same path: a list of strings corresponding to subdirectory names, the last of which is the actual file name 84
15 Tracker send: HTTP GET info_hash: 20-byte SHA1 hash of the value of the info key from the Metainfo file peer_id: 20-byte string used as a unique ID for the client (will be used in peer to peer handshake for security reason) port: The port number that the client is listening on, typically uploaded, downloaded: The total amount uploaded / downloaded so far, encoded in base ten ASCII left: The number of bytes this client still has to download event: If specified: started, completed, or stopped ip: Optional. The true IP address of the client machine. numwant: Optional. Number of peers to receive from the tracker. If omitted, typically defaults to 50 peers. 85 Tracker (2) Tracker response ("text/plain"): failure reason: A human-readable error message as to why the request failed OR -- interval: the client should wait between sending regular requests to the tracker peers: a list of dictionaries, each with the following keys: peer_id: peer's self-selected ID ip: peer's IP address (either IPv6 or IPv4) or DNS name (string) port: peer's port number (integer) 86 Tracker s Merits Light load The bandwidth overhead of the tracker is about a thousandth the total amount of bandwidth used Some minor protocol extensions will probably get it down to a ten thousandth. Can ensure the peer list contains hosts which can accept incoming connections (not firewalled): Reverse connect to newcomer And the misclassified rate is low 87 Tracker s Limits Bottleneck(?) The scalability of BitTorrent largely depends on the bandwidth of the tracker Single point of failure: When a tracker fails: no longer possible for new peers to join or for existing peers to discover each other 88 Tracker Improvement Protocol extension: announce-list: list many tracker addresses in one.torrent file So if one tracker fails, peers still can find each other Problem increase the traffic between trackers and peers Each tracker still have many clients to serve Further Improvement: Using Gnutella/DHT instead of tracker? 89 Merits of BitTorrent Speed up the content distribution Less load on the original seed (content publisher) Scalable to thousands of peers (If tracker doesn t fail) 90
16 Limits of BitTorrent (2) Random write will cause many disk fragments & even damage to disk? Random read will cause no locality for disk accessing? Attacks to BitTorrent Seed only attack If a peer connects only to seeds, it need not contribute anything to the file-sharing network. Minimal upload attack It is possible for a peer to estimate other connected peers download rate by observing the frequency of the have messages So a peer can upload minimal enough to stay within the preferred list of as many peers as possible Attacks to BitTorrent (2) Anti-snubbing attack Since the snub time is large (60 seconds by default), a peer can schedule to satisfy just one request, by uploading a chunk of a piece requested (usually 16kB), every 60 seconds and avoid getting snubbed. Malicious upload attack a peer does not download a complete piece from a single remote peer, and the hash verification is performed only after the complete piece Hence a malicious peer can upload a wrong content when requested for a chunk of the piece. But the attacked peer doesn t have any means of identifying the malicious peer. 93 P2P and DRM P2P P2P networks are good for distribution of unprotected files. Uniformed copies obtained by different peers Difficult to define rights More difficult to enforce >90% of files in P2P are unauthorized. Leveraging P2P for legal content distribution is a new problem. Current Situations P2P networks are popular. Mainly for unauthorized copies of IP Fighting between content owners/ manufactures/providers and P2P users/developers Recent Supreme Court has ruled that developers can be held responsible for the copyright infringement that their P2P file sharing products allow
17 Early DRM with Internet Content syndications Affiliate programs DRM Basic requirements of DRM: Package, publish, and protect object content Expression of digital rights Authentication of user/devices and Authorization to access/use the content Enforcement mechanisms Client side Payment integration DRM Common Architecture P2P vs. DRM Content Repository Product Info Encryption Keys Content Server DRM Packager Financial Transaction License Server DRM Rights License Generator Identities Content Package Encryption Content Metadata DRM Controller Encryption Keys Rights License Client Rendering Application Identity 99 To IP owner: P2P offers open invitations to copyright infringement and IP theft. DRM is the way to protect their revenue on Internet. To end users/consumers: P2P is the open functionality of the Internet, and provides freedom of information era. DRM restricts user behaviors. 100 P2P vs. DRM P2P and DRM As a technical issue, P2P supports many new business models with DRM P2P streaming Paid access with controlled sharing itunes Integration of DRM into P2P network Embracing the functionality of P2P Maintaining control over IP Multiple vendors in value chain: P2P publisher, IP owner, license agent, payment agent, etc
18 DRM Technology Features for P2P Networks (Rosenblatt) Reasonable usage support for users: Use on any devices Space shifting Interoperability of identity schemes for both users and devices Format conversions or transcoding DRM Technology Features for P2P Networks (Rosenblatt) Lightweight superdistribution User-defined business models and easy to implement DRM Technology Features for P2P Networks (Rosenblatt) Standards Support Rights Expression Languages Define rights for peers Network Identification Universal or interoperable identity schemes for users and devices.net Passport Liberty Alliance (Federated id) Web Services Services for DRM schemes authentication, payment, license, etc. Minimize cost and complexity for peers in P2P DRM Technology Features for P2P Networks (Rosenblatt) User Experience: Installation of the DRM has to be seamless Use cross-platform technologies (Java, XML, etc) Payment process should be integrated with ISP and other service providers. E.g., cell phone SP Content usage track should respect user privacy Gaps in Existing DRM Cost-related functionality limitations Device Tethering A content object only can be supported on a specific device. Lack of superdistribution support Complexity of integration P2P Architecture for DRM Hybrid P2P Decentralized content distribution Centralized management: License, authentication, payment, etc
19 What are Digital Containers? DigitalContainers Hybrid P2P File Trading All transactions tracked No bottlenecks DRM E-commerce Great use of resources DigitalContainers wrap files in a secure multimedia digital shell that can only be opened with a key. Simple as a password Unique as an individual s fingerprint (Biometric) Created and delivered in a patented process in which the container talks to remote authorization authorities Any combination of the above: Multi-Factor Authentication The containers are tracked perpetually as their content is passed securely from person to person, with only authorized individuals being able to access the protected content. Who, Why, Where, When, How Much? Credit/Debit/Phone card payments From Secure File Delivery System for Consumer and Enterprise -to- Networks, DigitalContainer Inc Basic Container Structure Basic P2P Business Model Basic P2P Business Model Sample P2P Integration Scheme Packager widely available and easy to use Content owners package digital goods in Digital Container They register content, set price, and agree to payment terms P2P network provider gets percentage Content owner gets percentage People get paid all along the value chain
20 External Control-based DRM Separated distribution of content and meta information Control set (or rules, policies) are distributed separated from content Service-oriented architecture for authentication, control, payment, etc DRM and P2P Pure P2P networks: trust management in P2P Web of trust Datta et al, Beyond web of trust : Enabling P2p E-commerce, IEEE International Conf. on E-Commerce,2003. Reputation management in P2P ebay
Peer-to-Peer Applications Reading: 9.4
Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationLecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:
PP Lecture 1 Peer-to-Peer Model March 16, 005 Overview: centralized database: Napster query flooding: Gnutella intelligent query flooding: KaZaA swarming: BitTorrent unstructured overlay routing: Freenet
More informationCSE 486/586 Distributed Systems Peer-to-Peer Architectures
CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationBitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.
BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and
More informationChapter 2: Application layer
Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming
More informationCMSC 332 Computer Networks P2P and Sockets
CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that
More informationIntroduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks The Story of Peer-to-Peer The Nature of Peer-to-Peer: Generals & Paradigms Unstructured Peer-to-Peer Systems Sample Applications 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationLecture 17: Peer-to-Peer System and BitTorrent
CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and
More informationMiddleware and Distributed Systems. Peer-to-Peer Systems. Peter Tröger
Middleware and Distributed Systems Peer-to-Peer Systems Peter Tröger Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers) Each
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationIntroduction to P P Networks
Introduction to P P Networks B Sc Florian Adamsky florianadamsky@iemthmde http://florianadamskyit/ cbd Internet Protocols and Applications SS B Sc Florian Adamsky IPA / Outline Introduction What is P P?
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 25 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer peer-to-peer systems overview
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationPeer-to-Peer (P2P) Systems
Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed
More informationOverview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste
Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall
More informationPage 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"
How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth
More informationPeer-to-Peer Internet Applications: A Review
Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation
More informationDistributed Hash Table
Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80
More informationP2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems
P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically
More informationEECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations
EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley
More informationPeer-to-Peer Architectures and Signaling. Agenda
Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction
More informationEE 122: Peer-to-Peer Networks
EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer
More informationOverlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.
Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University
More informationLast Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1
Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks
More informationBitTorrent. Internet Technologies and Applications
BitTorrent Internet Technologies and Applications Aims and Contents Aims Show benefits of P2P for file downloads Explain concepts of BitTorrent as a P2P file sharing application Show how BitTorrent protocol
More informationLECT-01, S-1 IAD99S, Javed I.
A Course on Foundations of Peer-to-Peer Systems & Applications LECT-01, S-1 CS 6/75995 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer Science www.cs.kent.edu/~javed/class-p2p08/
More informationPeer to Peer Computing
Peer to Peer Computing These slides are based on the slides made available by the authors of Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
More information12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics
// Topics Peer to Peer Systems Introduction Client-server vs peer to peer Peer-to-peer networks Routing Overlays Structured vs unstructured Example PP Systems Skype login server Peer-to-peer - definitions
More informationGeorges Da Costa Introduction on Peer to Peer systems
Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr Goal of this Lecture What can P2P do, not only as a buzzword What it can t do Shows some examples & algorithms A Survey and Comparison
More informationMaking Gnutella-like P2P Systems Scalable
Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems
More informationA Survey of Peer-to-Peer Content Distribution Technologies
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview
More informationLecture 8: Application Layer P2P Applications and DHTs
Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationInternet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!
Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams
More informationPeer to Peer Systems and Probabilistic Protocols
Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good
More informationUnit 8 Peer-to-Peer Networking
Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationOverlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen
Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationExtreme Computing. BitTorrent and incentive-based overlay networks.
Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some
More informationDISTRIBUTED SYSTEMS CSCI 4963/ /4/2015
1 DISTRIBUTED SYSTEMS CSCI 4963/6963 12/4/2015 2 Info Quiz 7 on Tuesday. Project 2 submission URL is posted on the web site Submit your source code and project report (PDF!!!) in a single zip file. If
More informationContent Distribution and BitTorrent [Based on slides by Cosmin Arad]
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying
More informationAdvanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems
Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems
More informationPeer-peer and Application-level Networking. CS 218 Fall 2003
Peer-peer and Application-level Networking CS 218 Fall 2003 Multicast Overlays P2P applications Napster, Gnutella, Robust Overlay Networks Distributed Hash Tables (DHT) Chord CAN Much of this material
More informationDISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES
DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application
More informationScaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p?
Scaling Problem 15-441 Computer Networking Millions of clients server and network meltdown Lecture 23: Peer-Peer Systems Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 2 P2P System Why p2p?
More informationPeer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006
Peer-to-Peer Protocols and Systems TA: David Murray 15-441 Spring 2006 4/19/2006 P2P - Outline What is P2P? P2P System Types 1) File-sharing 2) File distribution 3) Streaming Uses & Challenges 2 Problem:
More informationFlooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9
Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication
More informationCC451 Computer Networks
CC451 Computer Networks Lecture 4 Application Layer (cont d) Application Layer 1 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3,
More informationP2P content distribution
P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer
More informationCSC 4900 Computer Networks: P2P and Sockets
CSC 4900 Computer Networks: P2P and Sockets Professor Henry Carter Fall 2017 Recap SMTP is the language that mail servers use to exchange messages. SMTP is push-based... why? You can run SMTP from a telnet
More informationBitTorrent and CoolStreaming
BitTorrent and CoolStreaming Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen Aalto University P2P Networks BitTorrent
More informationAssignment 5. Georgia Koloniari
Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last
More informationIntroduction on Peer to Peer systems
Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr dacosta@irit.fr 1/55 Goal of this Lecture What can P2P do, not only as a buzzword What it can't do Shows some examples & algorithms
More informationPeer-to-Peer Networks
Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week
More informationP2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies
P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play
More informationIntroduction to Peer-to-Peer Systems
Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed
More informationPeer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf
Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems - Chapter 2 Unstructured P2P Overlays Main Search Principles Centralized
More informationPeer- to- Peer and Social Networks. An overview of Gnutella
Peer- to- Peer and Social Networks An overview of Gnutella Overlay networks Overlay networks are logical networks defined on top of a physical network. The nodes (peers) are a subset of the real nodes
More informationP2P content distribution Jukka K. Nurminen
P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient
More informationPeer-to-Peer Signalling. Agenda
Peer-to-Peer Signalling Marcin Matuszewski marcin@netlab.hut.fi S-38.115 Signalling Protocols Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction Peer-to-Peer (P2P) is a communications
More informationFirst and Second Generation Peer to Peer Networks
First and Second Generation Peer to Peer Networks and Department of Computer Science Indian Institute of Technology New Delhi, India Outline 1 2 Overview Details 3 History of The mp3 format was the first
More informationDistributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016
Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can
More informationStratos Idreos. A thesis submitted in fulfillment of the requirements for the degree of. Electronic and Computer Engineering
P2P-DIET: A QUERY AND NOTIFICATION SERVICE BASED ON MOBILE AGENTS FOR RAPID IMPLEMENTATION OF P2P APPLICATIONS by Stratos Idreos A thesis submitted in fulfillment of the requirements for the degree of
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationMain Challenge. Other Challenges. How Did it Start? Napster. Model. EE 122: Peer-to-Peer Networks. Find where a particular file is stored
Main hallenge ind where a particular file is stored : Peer-to-Peer Networks Ion Stoica (and righten Godfrey) Ts: Lucian Popa, avid Zats and Ganesh nanthanarayanan http://inst.eecs.berkeley.edu/~ee/ (Materials
More informationPeer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today
Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /
More informationAdvanced Computer Networks
Advanced Computer Networks P2P Systems Jianping Pan Summer 2007 5/30/07 csc485b/586b/seng480b 1 C/S vs P2P Client-server server is well-known server may become a bottleneck Peer-to-peer everyone is a (potential)
More informationDistributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201
Distributed Systems ID2201 peer-to-peer Johan Montelius 1 Idéa use resources in edge of network computing storage communication 2 Computing 3 seti@home central server millions of clients hundred of thousands
More informationPeer-to-peer computing research a fad?
Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node
More informationWeb caches (proxy server) Applications (part 3) Applications (part 3) Caching example (1) More about Web caching
By the end of this lecture, you should be able to. Explain the idea of edge delivery Explain the operation of CDNs Explain the operation of P2P file sharing systems such as Napster and Gnutella Web caches
More informationDesigning Peer-to-Peer Systems for Business-to-Business Environments
Designing Peer-to-Peer Systems for Business-to-Business Environments Davide Carboni, Massimo Deriu, Cristian Lai and Antonio Pintus CRS4 (Center for Advanced Studies, Research and Development in Sardinia)
More informationPeer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer
Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer evyncke@cisco.com 2002, Cisco Systems, Inc. All rights reserved. 1 Agenda Introduction to peer to peer
More informationAddressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?
Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer
More informationApplication Layer: P2P File Distribution
Application Layer: P2P File Distribution EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP
More informationReti P2P per file distribution: BitTorrent
Reti P2P per file distribution: BitTorrent Corso di Applicazioni Telematiche A.A. 2008-09 Lezione n.22 Prof. Roberto Canonico Università degli Studi di Napoli Federico II Facoltà di Ingegneria P2p file-sharing
More informationToday. Architectural Styles
Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed
More informationScaling Problem Millions of clients! server and network meltdown. Peer-to-Peer. P2P System Why p2p?
Scaling Problem Millions of clients! server and network meltdown Peer-to-Peer 15-441 2 P2P System Why p2p? Leverage the resources of client machines (peers) Computation, storage, bandwidth Scaling: Create
More informationDistributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018
Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance
More informationPeer-to-peer & Energy Consumption
Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science
More informationInternet Services & Protocols
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Content Distribution Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de
More informationApplication-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks
COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example
More informationCSCI-1680 P2P Rodrigo Fonseca
CSCI-1680 P2P Rodrigo Fonseca Based partly on lecture notes by Ion Stoica, Sco5 Shenker, Joe Hellerstein Today Overlay networks and Peer-to-Peer Motivation Suppose you want to write a routing protocol
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.
More informationINF5071 Performance in distributed systems: Distribution Part III
INF5071 Performance in distributed systems: Distribution Part III 5 November 2010 Client-Server Traditional distributed computing Successful architecture, and will continue to be so (adding proxy servers)
More informationContent Search. Unstructured P2P. Jukka K. Nurminen
Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd
More informationContent distribution networks
Content distribution networks v challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? v option 2: store/serve multiple copies of videos at
More information6. Peer-to-peer (P2P) networks I.
6. Peer-to-peer (P2P) networks I. PA159: Net-Centric Computing I. Eva Hladká Faculty of Informatics Masaryk University Autumn 2010 Eva Hladká (FI MU) 6. P2P networks I. Autumn 2010 1 / 46 Lecture Overview
More informationOutline. Peer-to-Peer. P2p file-sharing. Wither p2p? What s out there? The p2p challenge C1: Search(human s goals) -> file
Outline Peer-to-Peer - pp file sharing techniques Downloading: Whole-file vs. chunks Searching Centralized index (Napster, etc.) Flooding (Gnutella, etc.) Smarter flooding (KaZaA, ) Routing (Freenet, etc.)
More information