Outline. P2P and Content Distribution. P2P Definitions. More Definitions. P2P is not new. P2P Definitions. P2P Overview P2P systems P2P and DRM

Size: px
Start display at page:

Download "Outline. P2P and Content Distribution. P2P Definitions. More Definitions. P2P is not new. P2P Definitions. P2P Overview P2P systems P2P and DRM"

Transcription

1 P2P and Content Distribution ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University Outline P2P Overview P2P systems P2P and DRM Some slides of this talk are provided by Dr. Songqing Chen from GMU 2 P2P Definitions A class of systems and applications that employ distributed resources to perform a function in a decentralized manner. The resources encompass computing power, data (storage and content), network bandwidth, and presence (computers, human, and other resources) - by Milojicic et al. Any network that does not have fixed clients and servers, but a number of peer nodes that function as both clients and servers to the other nodes on the network - wikipedia 3 More Definitions the sharing of computer resources and services by direct exchange between systems. - Intel P2P working group SETI@home: the computers at the edge provide power and those in the middle of the network are there only to coordinate them - David Anderson Clay Shirky of O Reilly and Associate A class of applications that takes advantage of resources available at the edges of the Internet. Because accessing these decentralized resources means operating in an environment of unstable connectivity and unpredictable IP addresses, P2P nodes must operate outside the DNS system and have significant or total autonomy from central servers 4 P2P Definitions Sharing Contribution Incentive of sharing and contribution Collaboration As reported in June 2004, P2P trafficmakes up 80% traffic on the Internet, in which the share of BitTorrent is 53%. Others are edonkey, Gnutella, FastTrack, etc. 5 P2P is not new ARPANET, late 60 s Usenet Since 1979 UUCP (Unix to Unix copy protocol), NNTP (network news transport protocol) Copies files between computers without central control At the beginning, only UNC and Duke Later, using news server and ISP s server DNS Mix of p2p and hierarchical model Early Internet: Hosts.txt includes a set of names and IP addresses and copied around the Internet periodically In 1983, DNS was developed for better scalability Hierarchical DNS names Windows workgroups Network File system 6

2 Back to P2P in 21 st century (?) Napster music file sharing Powerful home computing resources High Bandwidth networking Negative views on P2P Illegal copy on copyrighted materials Too much bandwidth consumption of existing networks Too much uncontrolled/inaccurate/junk contents Distributed Resources in P2P Replicable Content files (e.g., MP3, avi) No loss of original contents Replenishable Bandwidth, CPU cycle Cannot be saved for future use Cannot be used-up for future use 7 8 P2P Applications and Functionality Distributed computing SETI@home (compute-intensive), 1996 SETI: Search for Extraterrestrial Intelligence Using computing power of home PCs to search for radio signals from extraterrestrial civilizations Data/content sharing Napster, Gnutella, FreeNet, etc. Communication and collaboration Instant Messaging (ICQ, AIM), discussion board (Groove), games (Dooms), VOIP (skype) Computing System Taxonomy Centralized systems (Mainframes) Flat Computer systems Distributed systems Client-Server Hierarchical -to- Pure Hybrid 9 10 P2P vs. Client-server Server 1 st generation of P2P networks Napster Gnutella Super DHT s Clients 11 12

3 Napster Example Hybrid P2P Bob Directory server Alice When a peer (Bob) connects to Napster, it informs center server with its IP address and song titles 2. Alice queries for a song, then central server returns bob s address 3. Alice request the song to bob and download a copy directly 13 What is Gnutella? Many hybrid application of decentralized and centralized systems Usenet (backbone or heavy-duty peers) DNS (built in hierarchy) ICQ (direct client-to client communication with backup of a server) Napster (decentralized file sharing with centralized file directory) Dramatically reduced latency Better search engine Not for illegal objects distribution 14 Overlay Networks and Gnutella Gnutella is a fully decentralized peer-to-peer protocol for locating resources Standard, not a program. There are many implementations of Gnutella (BearShare, LimeWire, Morpheus) Each member of the network may act as a client, looking for data, or a server, sharing that data Server Serv A network on top of a network Used only for the search aspect of Gnutella Actual transfer of files is not performed with the overlay network Client ent 15 Connecting to the Network Horizon example When you start the application, need to first connect to a node - bootstrapping No set way to do this. Protocol is silent on the issue 16 TTL = Node Cache contact a well known node that maintains a list of nodes Node Web Page lists locations of nodes to bootstrap and get started

4 Ping and Pong After knowing where to go to join a network, a servent uses Ping and Pong to locate other nodes to connect to Originally, Ping message sent to the node connected to, which forwarded to all neighbors All those servents willing to connect to the sender respond with Pong Pongs convey IP, Port, Files shared, and distance (hops) PING PING PING PING PING PING 23 24

5 PONG PONG PONG PONG PONG

6 Queries in Gnutella Queries work very much like the original Ping/Pong scheme Send a Query to neighbors, with TTL=7 and Hops=0 This defines the default horizon for reaching servents. As TTL increases, so does the horizon, and the number of hosts that can be reached, improving odds of a hit 31 Queries in Gnutella, Continued Send Query to neighbors, who send to their neighbors Decrement TTL, increase Hops when you receive Continue forwarding while TTL!= 0 If you have the requested file, return a Query Hit message Generates lots of messages. Called flood search 32 Query Example Transferring Data File I is need requested a out of band. guitar song Query Message Query Hit Message 33 When a file is located using the Gnutella protocol, the Query Hit message returns a host/port to contact to obtain the file The connection to get data is made using HTTP Usually (but not always) same host/port as used for Gnutella traffic Default is 6364 Problems occur when servent is behind firewall The Gnutella network is only used to locate the nodes sharing those resources. 34 Problems with Flood Query Traditional Gnutella flood query has a number of problems Very large number of packets generated to fulfill queries most searches on Gnutella can be satisfied with a search that visits fewer nodes Essentially, just a Breadth First Search (BFS) Some proposals attempt to address this Alternatives to Flood Query Iterative Deepening Directed BFS Local Indices Random Walkers with alternate schemes for searching 35 36

7 Issues Several alternatives (Local Indices, Iterative Deepening) require a global policy to be understood by all nodes Sharing information about file index (Local Indices) or even statistics (Directed BFS) leads to possible security risks Most, require at least some modification Outline Gnutella Super DHT to the servents What are Super s? High-end nodes, with better relative network bandwidth and cpu power than other nodes, that act as a centralized server to a subset of clients (leaf nodes); act as an equal in a network of superpeers; maintain an index of its clients data, answering queries on their behalf. Also called supernodes, ultrapeers. Supers Network characteristics Superpeers are equals in search. All peers are equals in download. Any query results found provides 1 response to client with all the results included. Degenerate superpeer network: clustersize=1 (pure p2p, no superpeers) A well-known example is KaZaA (Morpheus) Super Node based P2P: KaZaA (Morpheus) Super Node based P2P: KaZaA (Morpheus) super peer file get query answer leaf node queries its superpeer; superpeer answers that another leaf has the result; the peer gets its file from the local peer in the cluster; the query never traverses the network 41 super peer flooding query If superpeer doesn t have the result within the cluster, supernode sends flooding query to its supernode neighbors; leaf nodes never see or 42 process the query

8 Super Infrastructure Two-layer hierarchy Super s Clients/Leaf Nodes Cluster a superpeer and its clients Super Selection Can do at bootstrap, and during network operation Make sure it s fair, random Hosts determine whether they re eligible Ultrapeer Capable Uptime Not firewalled Suitable OS Linux, 2000/NT/XP, OS/X good - sockets Not 95/98/ME, Mac Classic Bandwidth 15KB/s downstream; 10KB/sec upstream Redundancy No Redundancy simple example Improves availability and reliability for clients. Reduces load on any single superpeer. Leaf nodes connect to at least 2 ultrapeers; default is 3; NEVER more than 10. Superpeer partners in a cluster form a virtual superpeer. Partners connect to every client, keeps a full index of each, and keeps its partners data Redundancy Super Summary Superpeers provide a balance between centralized search s inherent efficiency, and distributed search s autonomy, load balancing, and robustness. Superpeers take advantage of nodes heterogeneity of capabilities, to place the load where it is best handled. In the case where better query results may be found outside a leaf s cluster even though the query can be satisfied within the cluster, an option to extend the query beyond the cluster s superpeer may be beneficial. Would a three-tiered approach work even better? 47 48

9 Outline Gnutella Super DHT Distributed Hash Table DHT is like having a file cabinet distributed over numerous servers, explained Frans Kaashoek, a professor of Computer Science and Engineering at MIT. Interpretation: 1. It s a hash table: an efficient data structure for key lookup 2. It s distributed : each node stores part of info DHT -- An Interface From Hash Table to DHT Distributed application put(key, data) get (key) Distributed hash table data node node. node k v? K V (k1,v1) K V K V K V DHT provides the information look up service for large-scale distributed applications. Scalable, robust, self-organizing, load-balancing, secure K V Retrive(k1) The shared distributed infrastructure: relieve burdens of individual apps Insert(k1, v1) 51 a. Hash table b. Distributed hash table 52 From Hash Table to DHT (cont) Core questions when introducing distributed : How to divide a whole hash table to multiple distributed hash tables? How to reach the hash table who has the key I want, if I cannot find it from the local hash table? Requirements: Data should be identified using unique numeric keys using hash function such as SHA-1 Nodes should be willing to store keys for each other. Applications of DHT Distributed file systems Multicast overlay networks Event notification systems Distributed query processing Structured P2P systems Other distributed applications 53 54

10 Case Study: CAN CAN: Content-Addressable Network Basic Data Structure: d- dimensional Cartesian coordinate space Every key (k) is mapped to a point (x,y) in the coordinate space x = h1(k), y = h2(k); The coordinate space = key space K1 K2 K3 K4 Zone: Answer to Q1 This coordinate space is partitioned into distinct zones. Every node holds a distinct zone A node should store all keys that fall into the zone it owns K1 1 3 K2 K3 2 4 K Routing: Answer to Q2 Every node only maintains the states of its neighbors Forward lookup request to a neighbor closer to the key in the coordinate space Greedy forwarding Node A wants to lookup k3 A K1 K2 B K3 K4 57 Insertion & Retrieval in CAN 1. Node A inserts (k3, v3) 2. x3=h1(k3), y3=h2(k3) 3. Route Insertion request to (x3,y3) y3 4. (x3, y3) is in the zone of node B, so node B should store (k3,v3) in its hash table 5. Node C retrieves k3 6. Computes x3, y3 like A does 7. Route lookup request to (x3,y3) 8. Node B receives lookup request, and retrieves (k3, v3) from its hash table C A K1 K2 B K3 x3 K4 58 Join Departure Bootstrap The new node find a node already in the CAN Finding a zone Find a node randomly whose zone will be split JOIN request message Splitting Hand over part of (key, value) pairs 1 s coordinate neighbor set = {2, 3, 4, 7} 1 s coordinate neighbor set {2, 3, 4, 5} The neighbors of the 7 s coordinate neighbor set = {1, 2, 4, 5} split zone is notified so that routing can include the new node 59 Joining the routing 1.P 7 K1 2 K2 8 6 K3 K Node 5 is leaving 60

11 Departure Departure Node 7 is leaving K1 2 K2 K3 4 1 K1 2 K2 K K K Multiple Hash Functions Use k different hash functions to map a single key onto k points in the coordinate space, then k replicas Choose to retrieve an entry closest in the coordinate space, then reducing path latency 2 nd Generation of P2P Network BitTorrent Motivation How to alleviate the load & bandwidth costs of central server? Flash crowds Scalability Reliability Napster, Gnutella and DHT solved part of the problem Enabled searching over peers Weakly concern for downloading speed up 65 Motivation (2) Problems of traditional P2P network: Limited bandwidth for most peers s download queue is always full, which causes long start time for other to downloading Also causes low downloading speed Solution by BitTorrent: Using parallel downloading! Problem: how can we download from other peers having incomplete files? Key: split file into many pieces! Data integrity is important here 66

12 Motivation (3) There re large portion of free riders exist: The downloading speed is limited by the peers who are willing to upload How to encourage every peer to contribute to the content distribution? Tit-for-tat: choking those who re not or slowly uploading to you Background BitTorrent invented by Bram Cohen The first usable version of BitTorrent appeared in October 2002 BitTorrent traffic: Was negligible in May 2003 Accounted for over 9% of the sampled traffic by October 2003 [Stanislav Shalunov, Internet2 netflow weekly reports, 2003] BitTorrent s Basic Idea To best utilize parallel downloading, file is treated as many pieces: Using SHA-1 to ensure every piece s data integrity Using rarest first strategy for piece selection to speed up distribution Using a tit-for-tat algorithm (choking for the lowest speed uploader) to encourage uploading 69 Basic Framework Typically there re Web servers to serve.torrent metainfo file Tracker: maintain all peers IP/port information, so each peer can find others Downloaders (leecher/seed) as peers connected to each other 70 Illustration One seed in the central, others are leechers: Content Distribution Content Publisher Original File(s) Computing using CompleteDir.torrent file (containing a valid tracker address) Distribute.torrent file: Post.torrent file to any web server for people to download Running BitTorrent Downloader with the.torrent file Serving as a seed as long as possible 71 72

13 Overall Architecture Web Server Tracker Overall Architecture Web Server Tracker Web page with link to.torrent Web page with link to.torrent.torrent Get-announce A B C [Seed] A B C [Seed] Downloader Downloader US 73 US 74 Overall Architecture Web Server Tracker Overall Architecture Web Server Tracker Web page with link to.torrent Web page with link to.torrent A Response-peer list B C [Seed] A Shake-hand Shake-hand B C [Seed] Downloader Downloader US 75 US 76 Overall Architecture Web Server Tracker Overall Architecture Web Server Tracker Web page with link to.torrent Web page with link to.torrent A pieces B pieces C [Seed] A pieces pieces B pieces C [Seed] Downloader Downloader US 77 US 78

14 Overall Architecture Web Server Tracker Tracker s Functions Web page with link to.torrent A pieces pieces Get-announce Response-peer list B pieces C [Seed] When peers come, get the info_hash as the ID for each.torrent file For each.torrent file, tracker will maintain List of all peers who involving this file IP, port, peer_id Returns random list of peers State information Completed Downloading Downloader US Bencoding Metainfo file (.torrent) and tracker responses are in bencoding: Strings: 4:spam corresponds to 'spam' Integers: i3e corresponds to 3 Lists: l4:spam4:eggse corresponds to ['spam', 'eggs'] Dictionaries: d3:cow3:moo4:spam4:eggse corresponds to {'cow': 'moo', 'spam': 'eggs'} d4:spaml1:a1:bee corresponds to {'spam': ['a', 'b']} Metainfo files (.torrent) announce: The URL of the tracker info (a dictionary that describes the file(s) of the torrent): name: the suggested name to save the file (or directory) piece length: most commonly 2 18 = 256 K pieces: a string whose length is a multiple of 20. Every 20 bytes is the SHA1 hash of the piece at the corresponding index 83 Metainfo files (.torrent) (2) (for single file) length: the length of the file in bytes (for multi-file) files (list of dictionary): length: the same path: a list of strings corresponding to subdirectory names, the last of which is the actual file name 84

15 Tracker send: HTTP GET info_hash: 20-byte SHA1 hash of the value of the info key from the Metainfo file peer_id: 20-byte string used as a unique ID for the client (will be used in peer to peer handshake for security reason) port: The port number that the client is listening on, typically uploaded, downloaded: The total amount uploaded / downloaded so far, encoded in base ten ASCII left: The number of bytes this client still has to download event: If specified: started, completed, or stopped ip: Optional. The true IP address of the client machine. numwant: Optional. Number of peers to receive from the tracker. If omitted, typically defaults to 50 peers. 85 Tracker (2) Tracker response ("text/plain"): failure reason: A human-readable error message as to why the request failed OR -- interval: the client should wait between sending regular requests to the tracker peers: a list of dictionaries, each with the following keys: peer_id: peer's self-selected ID ip: peer's IP address (either IPv6 or IPv4) or DNS name (string) port: peer's port number (integer) 86 Tracker s Merits Light load The bandwidth overhead of the tracker is about a thousandth the total amount of bandwidth used Some minor protocol extensions will probably get it down to a ten thousandth. Can ensure the peer list contains hosts which can accept incoming connections (not firewalled): Reverse connect to newcomer And the misclassified rate is low 87 Tracker s Limits Bottleneck(?) The scalability of BitTorrent largely depends on the bandwidth of the tracker Single point of failure: When a tracker fails: no longer possible for new peers to join or for existing peers to discover each other 88 Tracker Improvement Protocol extension: announce-list: list many tracker addresses in one.torrent file So if one tracker fails, peers still can find each other Problem increase the traffic between trackers and peers Each tracker still have many clients to serve Further Improvement: Using Gnutella/DHT instead of tracker? 89 Merits of BitTorrent Speed up the content distribution Less load on the original seed (content publisher) Scalable to thousands of peers (If tracker doesn t fail) 90

16 Limits of BitTorrent (2) Random write will cause many disk fragments & even damage to disk? Random read will cause no locality for disk accessing? Attacks to BitTorrent Seed only attack If a peer connects only to seeds, it need not contribute anything to the file-sharing network. Minimal upload attack It is possible for a peer to estimate other connected peers download rate by observing the frequency of the have messages So a peer can upload minimal enough to stay within the preferred list of as many peers as possible Attacks to BitTorrent (2) Anti-snubbing attack Since the snub time is large (60 seconds by default), a peer can schedule to satisfy just one request, by uploading a chunk of a piece requested (usually 16kB), every 60 seconds and avoid getting snubbed. Malicious upload attack a peer does not download a complete piece from a single remote peer, and the hash verification is performed only after the complete piece Hence a malicious peer can upload a wrong content when requested for a chunk of the piece. But the attacked peer doesn t have any means of identifying the malicious peer. 93 P2P and DRM P2P P2P networks are good for distribution of unprotected files. Uniformed copies obtained by different peers Difficult to define rights More difficult to enforce >90% of files in P2P are unauthorized. Leveraging P2P for legal content distribution is a new problem. Current Situations P2P networks are popular. Mainly for unauthorized copies of IP Fighting between content owners/ manufactures/providers and P2P users/developers Recent Supreme Court has ruled that developers can be held responsible for the copyright infringement that their P2P file sharing products allow

17 Early DRM with Internet Content syndications Affiliate programs DRM Basic requirements of DRM: Package, publish, and protect object content Expression of digital rights Authentication of user/devices and Authorization to access/use the content Enforcement mechanisms Client side Payment integration DRM Common Architecture P2P vs. DRM Content Repository Product Info Encryption Keys Content Server DRM Packager Financial Transaction License Server DRM Rights License Generator Identities Content Package Encryption Content Metadata DRM Controller Encryption Keys Rights License Client Rendering Application Identity 99 To IP owner: P2P offers open invitations to copyright infringement and IP theft. DRM is the way to protect their revenue on Internet. To end users/consumers: P2P is the open functionality of the Internet, and provides freedom of information era. DRM restricts user behaviors. 100 P2P vs. DRM P2P and DRM As a technical issue, P2P supports many new business models with DRM P2P streaming Paid access with controlled sharing itunes Integration of DRM into P2P network Embracing the functionality of P2P Maintaining control over IP Multiple vendors in value chain: P2P publisher, IP owner, license agent, payment agent, etc

18 DRM Technology Features for P2P Networks (Rosenblatt) Reasonable usage support for users: Use on any devices Space shifting Interoperability of identity schemes for both users and devices Format conversions or transcoding DRM Technology Features for P2P Networks (Rosenblatt) Lightweight superdistribution User-defined business models and easy to implement DRM Technology Features for P2P Networks (Rosenblatt) Standards Support Rights Expression Languages Define rights for peers Network Identification Universal or interoperable identity schemes for users and devices.net Passport Liberty Alliance (Federated id) Web Services Services for DRM schemes authentication, payment, license, etc. Minimize cost and complexity for peers in P2P DRM Technology Features for P2P Networks (Rosenblatt) User Experience: Installation of the DRM has to be seamless Use cross-platform technologies (Java, XML, etc) Payment process should be integrated with ISP and other service providers. E.g., cell phone SP Content usage track should respect user privacy Gaps in Existing DRM Cost-related functionality limitations Device Tethering A content object only can be supported on a specific device. Lack of superdistribution support Complexity of integration P2P Architecture for DRM Hybrid P2P Decentralized content distribution Centralized management: License, authentication, payment, etc

19 What are Digital Containers? DigitalContainers Hybrid P2P File Trading All transactions tracked No bottlenecks DRM E-commerce Great use of resources DigitalContainers wrap files in a secure multimedia digital shell that can only be opened with a key. Simple as a password Unique as an individual s fingerprint (Biometric) Created and delivered in a patented process in which the container talks to remote authorization authorities Any combination of the above: Multi-Factor Authentication The containers are tracked perpetually as their content is passed securely from person to person, with only authorized individuals being able to access the protected content. Who, Why, Where, When, How Much? Credit/Debit/Phone card payments From Secure File Delivery System for Consumer and Enterprise -to- Networks, DigitalContainer Inc Basic Container Structure Basic P2P Business Model Basic P2P Business Model Sample P2P Integration Scheme Packager widely available and easy to use Content owners package digital goods in Digital Container They register content, set price, and agree to payment terms P2P network provider gets percentage Content owner gets percentage People get paid all along the value chain

20 External Control-based DRM Separated distribution of content and meta information Control set (or rules, policies) are distributed separated from content Service-oriented architecture for authentication, control, payment, etc DRM and P2P Pure P2P networks: trust management in P2P Web of trust Datta et al, Beyond web of trust : Enabling P2p E-commerce, IEEE International Conf. on E-Commerce,2003. Reputation management in P2P ebay

Peer-to-Peer Applications Reading: 9.4

Peer-to-Peer Applications Reading: 9.4 Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:

Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview: PP Lecture 1 Peer-to-Peer Model March 16, 005 Overview: centralized database: Napster query flooding: Gnutella intelligent query flooding: KaZaA swarming: BitTorrent unstructured overlay routing: Freenet

More information

CSE 486/586 Distributed Systems Peer-to-Peer Architectures

CSE 486/586 Distributed Systems Peer-to-Peer Architectures CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved. BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming

More information

CMSC 332 Computer Networks P2P and Sockets

CMSC 332 Computer Networks P2P and Sockets CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that

More information

Introduction to Peer-to-Peer Networks

Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks The Story of Peer-to-Peer The Nature of Peer-to-Peer: Generals & Paradigms Unstructured Peer-to-Peer Systems Sample Applications 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

Lecture 17: Peer-to-Peer System and BitTorrent

Lecture 17: Peer-to-Peer System and BitTorrent CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and

More information

Middleware and Distributed Systems. Peer-to-Peer Systems. Peter Tröger

Middleware and Distributed Systems. Peer-to-Peer Systems. Peter Tröger Middleware and Distributed Systems Peer-to-Peer Systems Peter Tröger Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers) Each

More information

CS 3516: Computer Networks

CS 3516: Computer Networks Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer

More information

Introduction to P P Networks

Introduction to P P Networks Introduction to P P Networks B Sc Florian Adamsky florianadamsky@iemthmde http://florianadamskyit/ cbd Internet Protocols and Applications SS B Sc Florian Adamsky IPA / Outline Introduction What is P P?

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 25 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer peer-to-peer systems overview

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

Peer-to-Peer (P2P) Systems

Peer-to-Peer (P2P) Systems Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed

More information

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall

More information

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

Page 1. How Did it Start? Model Main Challenge CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth

More information

Peer-to-Peer Internet Applications: A Review

Peer-to-Peer Internet Applications: A Review Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80

More information

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Peer-to-Peer Architectures and Signaling. Agenda

Peer-to-Peer Architectures and Signaling. Agenda Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction

More information

EE 122: Peer-to-Peer Networks

EE 122: Peer-to-Peer Networks EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer

More information

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals. Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University

More information

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks

More information

BitTorrent. Internet Technologies and Applications

BitTorrent. Internet Technologies and Applications BitTorrent Internet Technologies and Applications Aims and Contents Aims Show benefits of P2P for file downloads Explain concepts of BitTorrent as a P2P file sharing application Show how BitTorrent protocol

More information

LECT-01, S-1 IAD99S, Javed I.

LECT-01, S-1 IAD99S, Javed I. A Course on Foundations of Peer-to-Peer Systems & Applications LECT-01, S-1 CS 6/75995 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer Science www.cs.kent.edu/~javed/class-p2p08/

More information

Peer to Peer Computing

Peer to Peer Computing Peer to Peer Computing These slides are based on the slides made available by the authors of Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics

12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics // Topics Peer to Peer Systems Introduction Client-server vs peer to peer Peer-to-peer networks Routing Overlays Structured vs unstructured Example PP Systems Skype login server Peer-to-peer - definitions

More information

Georges Da Costa Introduction on Peer to Peer systems

Georges Da Costa Introduction on Peer to Peer systems Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr Goal of this Lecture What can P2P do, not only as a buzzword What it can t do Shows some examples & algorithms A Survey and Comparison

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

A Survey of Peer-to-Peer Content Distribution Technologies

A Survey of Peer-to-Peer Content Distribution Technologies A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview

More information

Lecture 8: Application Layer P2P Applications and DHTs

Lecture 8: Application Layer P2P Applications and DHTs Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

Peer to Peer Systems and Probabilistic Protocols

Peer to Peer Systems and Probabilistic Protocols Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

Extreme Computing. BitTorrent and incentive-based overlay networks.

Extreme Computing. BitTorrent and incentive-based overlay networks. Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some

More information

DISTRIBUTED SYSTEMS CSCI 4963/ /4/2015

DISTRIBUTED SYSTEMS CSCI 4963/ /4/2015 1 DISTRIBUTED SYSTEMS CSCI 4963/6963 12/4/2015 2 Info Quiz 7 on Tuesday. Project 2 submission URL is posted on the web site Submit your source code and project report (PDF!!!) in a single zip file. If

More information

Content Distribution and BitTorrent [Based on slides by Cosmin Arad]

Content Distribution and BitTorrent [Based on slides by Cosmin Arad] ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying

More information

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems

More information

Peer-peer and Application-level Networking. CS 218 Fall 2003

Peer-peer and Application-level Networking. CS 218 Fall 2003 Peer-peer and Application-level Networking CS 218 Fall 2003 Multicast Overlays P2P applications Napster, Gnutella, Robust Overlay Networks Distributed Hash Tables (DHT) Chord CAN Much of this material

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

Scaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p?

Scaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p? Scaling Problem 15-441 Computer Networking Millions of clients server and network meltdown Lecture 23: Peer-Peer Systems Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 2 P2P System Why p2p?

More information

Peer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006

Peer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006 Peer-to-Peer Protocols and Systems TA: David Murray 15-441 Spring 2006 4/19/2006 P2P - Outline What is P2P? P2P System Types 1) File-sharing 2) File distribution 3) Streaming Uses & Challenges 2 Problem:

More information

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9 Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication

More information

CC451 Computer Networks

CC451 Computer Networks CC451 Computer Networks Lecture 4 Application Layer (cont d) Application Layer 1 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3,

More information

P2P content distribution

P2P content distribution P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer

More information

CSC 4900 Computer Networks: P2P and Sockets

CSC 4900 Computer Networks: P2P and Sockets CSC 4900 Computer Networks: P2P and Sockets Professor Henry Carter Fall 2017 Recap SMTP is the language that mail servers use to exchange messages. SMTP is push-based... why? You can run SMTP from a telnet

More information

BitTorrent and CoolStreaming

BitTorrent and CoolStreaming BitTorrent and CoolStreaming Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen Aalto University P2P Networks BitTorrent

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Introduction on Peer to Peer systems

Introduction on Peer to Peer systems Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr dacosta@irit.fr 1/55 Goal of this Lecture What can P2P do, not only as a buzzword What it can't do Shows some examples & algorithms

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week

More information

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems - Chapter 2 Unstructured P2P Overlays Main Search Principles Centralized

More information

Peer- to- Peer and Social Networks. An overview of Gnutella

Peer- to- Peer and Social Networks. An overview of Gnutella Peer- to- Peer and Social Networks An overview of Gnutella Overlay networks Overlay networks are logical networks defined on top of a physical network. The nodes (peers) are a subset of the real nodes

More information

P2P content distribution Jukka K. Nurminen

P2P content distribution Jukka K. Nurminen P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient

More information

Peer-to-Peer Signalling. Agenda

Peer-to-Peer Signalling. Agenda Peer-to-Peer Signalling Marcin Matuszewski marcin@netlab.hut.fi S-38.115 Signalling Protocols Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction Peer-to-Peer (P2P) is a communications

More information

First and Second Generation Peer to Peer Networks

First and Second Generation Peer to Peer Networks First and Second Generation Peer to Peer Networks and Department of Computer Science Indian Institute of Technology New Delhi, India Outline 1 2 Overview Details 3 History of The mp3 format was the first

More information

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016 Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

Stratos Idreos. A thesis submitted in fulfillment of the requirements for the degree of. Electronic and Computer Engineering

Stratos Idreos. A thesis submitted in fulfillment of the requirements for the degree of. Electronic and Computer Engineering P2P-DIET: A QUERY AND NOTIFICATION SERVICE BASED ON MOBILE AGENTS FOR RAPID IMPLEMENTATION OF P2P APPLICATIONS by Stratos Idreos A thesis submitted in fulfillment of the requirements for the degree of

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Main Challenge. Other Challenges. How Did it Start? Napster. Model. EE 122: Peer-to-Peer Networks. Find where a particular file is stored

Main Challenge. Other Challenges. How Did it Start? Napster. Model. EE 122: Peer-to-Peer Networks. Find where a particular file is stored Main hallenge ind where a particular file is stored : Peer-to-Peer Networks Ion Stoica (and righten Godfrey) Ts: Lucian Popa, avid Zats and Ganesh nanthanarayanan http://inst.eecs.berkeley.edu/~ee/ (Materials

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks P2P Systems Jianping Pan Summer 2007 5/30/07 csc485b/586b/seng480b 1 C/S vs P2P Client-server server is well-known server may become a bottleneck Peer-to-peer everyone is a (potential)

More information

Distributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201

Distributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201 Distributed Systems ID2201 peer-to-peer Johan Montelius 1 Idéa use resources in edge of network computing storage communication 2 Computing 3 seti@home central server millions of clients hundred of thousands

More information

Peer-to-peer computing research a fad?

Peer-to-peer computing research a fad? Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node

More information

Web caches (proxy server) Applications (part 3) Applications (part 3) Caching example (1) More about Web caching

Web caches (proxy server) Applications (part 3) Applications (part 3) Caching example (1) More about Web caching By the end of this lecture, you should be able to. Explain the idea of edge delivery Explain the operation of CDNs Explain the operation of P2P file sharing systems such as Napster and Gnutella Web caches

More information

Designing Peer-to-Peer Systems for Business-to-Business Environments

Designing Peer-to-Peer Systems for Business-to-Business Environments Designing Peer-to-Peer Systems for Business-to-Business Environments Davide Carboni, Massimo Deriu, Cristian Lai and Antonio Pintus CRS4 (Center for Advanced Studies, Research and Development in Sardinia)

More information

Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer

Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer evyncke@cisco.com 2002, Cisco Systems, Inc. All rights reserved. 1 Agenda Introduction to peer to peer

More information

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P? Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems

More information

Peer to Peer Networks

Peer to Peer Networks Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer

More information

Application Layer: P2P File Distribution

Application Layer: P2P File Distribution Application Layer: P2P File Distribution EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP

More information

Reti P2P per file distribution: BitTorrent

Reti P2P per file distribution: BitTorrent Reti P2P per file distribution: BitTorrent Corso di Applicazioni Telematiche A.A. 2008-09 Lezione n.22 Prof. Roberto Canonico Università degli Studi di Napoli Federico II Facoltà di Ingegneria P2p file-sharing

More information

Today. Architectural Styles

Today. Architectural Styles Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed

More information

Scaling Problem Millions of clients! server and network meltdown. Peer-to-Peer. P2P System Why p2p?

Scaling Problem Millions of clients! server and network meltdown. Peer-to-Peer. P2P System Why p2p? Scaling Problem Millions of clients! server and network meltdown Peer-to-Peer 15-441 2 P2P System Why p2p? Leverage the resources of client machines (peers) Computation, storage, bandwidth Scaling: Create

More information

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

Peer-to-peer & Energy Consumption

Peer-to-peer & Energy Consumption Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science

More information

Internet Services & Protocols

Internet Services & Protocols Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Content Distribution Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de

More information

Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks

Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example

More information

CSCI-1680 P2P Rodrigo Fonseca

CSCI-1680 P2P Rodrigo Fonseca CSCI-1680 P2P Rodrigo Fonseca Based partly on lecture notes by Ion Stoica, Sco5 Shenker, Joe Hellerstein Today Overlay networks and Peer-to-Peer Motivation Suppose you want to write a routing protocol

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

INF5071 Performance in distributed systems: Distribution Part III

INF5071 Performance in distributed systems: Distribution Part III INF5071 Performance in distributed systems: Distribution Part III 5 November 2010 Client-Server Traditional distributed computing Successful architecture, and will continue to be so (adding proxy servers)

More information

Content Search. Unstructured P2P. Jukka K. Nurminen

Content Search. Unstructured P2P. Jukka K. Nurminen Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd

More information

Content distribution networks

Content distribution networks Content distribution networks v challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? v option 2: store/serve multiple copies of videos at

More information

6. Peer-to-peer (P2P) networks I.

6. Peer-to-peer (P2P) networks I. 6. Peer-to-peer (P2P) networks I. PA159: Net-Centric Computing I. Eva Hladká Faculty of Informatics Masaryk University Autumn 2010 Eva Hladká (FI MU) 6. P2P networks I. Autumn 2010 1 / 46 Lecture Overview

More information

Outline. Peer-to-Peer. P2p file-sharing. Wither p2p? What s out there? The p2p challenge C1: Search(human s goals) -> file

Outline. Peer-to-Peer. P2p file-sharing. Wither p2p? What s out there? The p2p challenge C1: Search(human s goals) -> file Outline Peer-to-Peer - pp file sharing techniques Downloading: Whole-file vs. chunks Searching Centralized index (Napster, etc.) Flooding (Gnutella, etc.) Smarter flooding (KaZaA, ) Routing (Freenet, etc.)

More information