Overlay and P2P Networks. Advanced topics and summary. Prof. Sasu Tarkoma

Size: px
Start display at page:

Download "Overlay and P2P Networks. Advanced topics and summary. Prof. Sasu Tarkoma"

Transcription

1 Overlay and P2P Networks Advanced topics and summary Prof. Sasu Tarkoma

2 Contents Advanced topics Security and BitCoin Bloom filters Publish/subscribe Synthesis

3 Key security issues Security is a weak point of many overlays and DHTs Not an issue with centrally managed system, but a significant concern for decentralized systems Freenet was our key example of a secure P2P system Also Skype with centralized login servers Overlays are vulnerable to the sybil attack One entity presents multiple identities for malicious intent.

4 Sybil attack Sybil attack (John Doceur, IPTPS '01) Problem: Malicious nodes overwhelm the network with identities Resolution: Without a central authority that certifies identifies (binding real-world person to nodeid) no realistic approach exists to completely stop the sybil attack With certain assumption sybil attacks can be mitigated Geometric distinctness certification (Bazzi & Konjevod, PODC 2005) Detect clock skew of the devices (Kohno, Broido, and claffy, UCSD, IEEE S&P 2005)

5 Eclipse attack A group of malicious nodes tries to dominate the neighbor set Start with Sybil and then neighbour discovery Adds malicious node identifiers to neighbour table For example: pick ids close to the target id Result: network partitions Solutions: Remember Freenet node identifier creation (the commitment protocol). Baseline: do not allow arbitary choice of node id.

6 Security Considerations Malicious nodes Attacker floods DHT with data Attacker returns incorrect data Attacker denies data or supplies incorrect routing info Basic solutions: rate limits and proof-of-work Self-authenticating data Redundancy k-redundant networks What if attackers have quorum? Need a way to control creation of node Ids Solution: secure node identifiers Use public keys

7 Security summary Wide-area overlay networks are vulnerable to sybil and eclipse attacks A production system typically utilizes centralized authentication Skype login servers Decentralized systems Freenet: verification to protect content, darknet for better protection Bitcoin: verification processes, proof-of-work If managed by one organization security becomes easier Dynamo: no security considerations

8 BitCoin Form of decentralized cryptographic currency Transaction system similar to credit card/google wallet Created by pseudonymous Satoshi Nakamoto in 2008 Maximum amount of bitcoins is 21 million Payment is broadcast in a signed message These are handled as blocks every ten minutes Added to public transaction record (block chain) Voting on transaction authentication Mining process for authenticating transactions and Discovering new bitcoins Validation based on proof of work Avoiding Sybil attack

9 BOB s private key Digital signature BOB s public key BOB Transaction BitCoin network ALICE ALICE s public key Transaction is signed by BOB so that the network can verify the transfer to ALICE. The signature is verified by BOB s public key. Signatures form a chain: previous owner signs and gives ownership to the new owner (public key). In our example BOB gives ownership to ALICE.

10 10 minutes of transactions are broadcast to miners Transactions Miners Block Miners create a block Block puzzle Miner solves a puzzle Proof of work Miner broadcasts solution to other miners Miners Miners verify the proof of work Verification Process starts again

11 BitCoin Network Steps from Satoshi s paper: 1) New transactions are broadcast to all nodes. 2) Each node collects new transactions into a block. 3) Each node works on finding a difficult proof-of-work for its block. 4) When a node finds a proof-of-work, it broadcasts the block to all nodes. 5) Nodes accept the block only if all transactions in it are valid and not already spent. 6) Nodes express their acceptance of the block by working on creating the next block in the chain, using the hash of the accepted block as the previous hash.

12 BitCoin Network A nonce in a block is incremented until the block s hash gives the required number of prefix zero bits (typical proof-of-work from Hashcash) Time to compute hash collision is exponential with the number of zero bits This is easy to verify, but any modification to block requires recomputation Blocks are chained and hence transaction history is relatively safe BitCoin increases the difficulty to keep block generation constant

13 BitCoin Anonymity BitCoin is not anonymous The block chain is public and contains public keys Transactions can be traced with two networks: The transaction network represents the flow of Bitcoins between transactions over time t1 and t2 à t3 à t4 The user network represents the flow of Bitcoins between users over time u1 à u3 à u3 and u4 If user to public key mapping is known, it is possible to trace user s transactions Reference:

14 A Short Primer on Bloom Filters

15 Bloom filters in Gnutella v0.7 Bloom filters are probabilistic structures used to store dictionaries A bit-vector that supports constant time querying of keywords Easy to merge two filters Many variants If space is at premium Number of hash functions (k) Size of filter (m) Number of elements in the inserted set (n) Decrease Less computation Higher false positive rate Smaller space requirements Higher false positive rate Lower false positive rate Increase More computation Lower false positive rate More space is needed Lower false positive rate Higher false positive rate

16 Bloom Filters Source: Tarkoma et al. Theory and Practice of Bloom Filters for distributed Systems

17 Example Bloom filter x y z

18

19

20 BF False positive probability is given by: ( 1 ( 1 1 m) kn ) k ( 1 e kn/m) k. kn/m Bit not All set bit to one positions are set to After one inserting for k hash n elements functions with k opt = m k hash 9m functions ln 2 n 13n. the bit is still zero Optimal number of hash functions k: Size of filter given optimal number of hash functions: ivenby ( ) m = n ln p (ln 2) 2. Details in the survey paper available on course page.

21 BF False positive probability is given by: ( 1 ( 1 1 m) kn ) k ( 1 e kn/m) k. kn/m Optimal number of hash functions k: k opt = m n ln 2 9m 13n. Size of filter given optimal number of hash functions: ivenby ( ) m = n ln p (ln 2) 2. Details in the survey paper available on course page.

22 If false positive rate is fixed, the filter size grows linearly with inserted elements.

23 Filter Key feature C D P FN Output Standard Bloom filter Is element x in set S? N N N N Boolean Adaptive Bloom filter Frequency by increasing number of hash functions Y N N N Boolean Bloomier filter Frequency and function value Y N N N Freq., f(x) Compressed Bloom filter Compress filter for transmission N N N N Boolean Counting Bloom filter Element frequency queries and deletion Y Y N M Boolean or freq. Decaying Bloom filter Time-window Y Y N N Boolean Deletable Bloom filter Probabilistic element removal N Y N N Boolean Distance-sensitive Bloom filters Is x close to an item in S? N N N Y Boolean Dynamic Bloom filter Dynamic growth of the filter Y Y N N Boolean Filter Bank Mapping to elements and sets Y Y M N x, set, freq. Generalized Bloom filter Two set of hash functions to code x with 1s and 0s N N N Y Boolean Hierarchical Bloom filter String matching N N N N Boolean Memory-optimized Bloom filter Multiple-choice single hash function N N N N Boolean Popularity conscious Bloom filter Popularity-awareness with off-line tuning N N Y N Boolean Retouched Bloom filter Allow some false negatives for better false positive rate N N N Y Boolean Scalable Bloom filter Dynamic growth of the filter N N N N Boolean Secure Bloom filters Privacy-preserving cryptographic filters N N N N Boolean Space Code Bloom filter Frequency queries Y N M N Frequency Spectral Bloom filter Element frequency queries Y Y N M Frequency Split Bloom filter Set cardinality optimized multi-bf construct N N N N Boolean Stable Bloom filter Has element x been seen before? N Y N Y Boolean Variable-length Signature filter Popularity-aware with on-line tuning Y Y Y Y Boolean Weighted Bloom filter Assign more bits to popular elements N N Y N Boolean Source: Tarkoma et al. Theory and Practice of Bloom Filters for distributed Systems

24 Source: Tarkoma et al. Theory and Practice of Bloom Filters for distributed Systems

25 Worked Example Gnutella uses Bloom filters to store and disseminate keyword indexes 1-hop replication in the flat ultranode layer, much improved design over flooding An ultrapeer maintains about 30 leafs and thus 30 Bloom filters, one for each leaf One leaf has about 1000 keywords in our example Assuming false positive rate of 0.1, for 1000 keywords we need 4793 bits. For keywords we need bits. There is overlap (some keywords are popular)! Gnutella uses 2**16 (65536) bits that is sufficient even when aggregating leaf BFs Experiments report ultrapeer BF 65% full and leaf BF 3% full Today having hundreds of KBs in the BF is not a problem, Gnutella design is old and today s networks are much faster Linear growth if p is fixed! ivenby m = n ln p (ln 2) 2.

26 Pub/Sub Systems

27 Event-based Systems and Publish/subscribe Event delivery from publishers to subscribers Event is a message with content One-to-many, many-to-many Builds on messaging systems and store-and-forward A frequently used communication paradigm Decoupling in space and time Solutions from local operation to wide-area networking Proposed for mobile/pervasive computing The event service is a logically centralized service Basic primitives: subscribe, unsubscribe, publish Various routing topologies and semantics

28 A) Space decoupling Publish Notify Subscriber Publisher Event Notification Service Notify Subscriber Publisher Publish B) Time decoupling Subscriber Event Notification Service Publisher Buffering Notify Subscriber C) Sychronization decoupling Publisher Publish Subscriber Event Notification Service Buffering Notify

29 Subscriptions Subscriptions are described using filters Filter: a stateless Boolean function Defines a subspace of the content space A single event is a point in the content space Selects a subset of published events Expressive interest definition and contentmatching Content model is typically typed tuples or XML

30 Pub/Sub Service Subscriber Notification Consumer Receives notifications Subscriptions Notify Notification Engine Matches and sends notification to the appropriate consumers Notifications message instances Publisher Situation Subscription Manager Subscription management on behalf of the Publisher Subscriptions

31 Event Systems I Traditional MoM systems are message queue based (one-to-one) Event systems and publish/subscribe are one-to-many or many-tomany One object monitors another object Reacts to changes in the object Multiple objects can be notified about changes Events address problems with synchronous operation and polling In distributed environments a logically centralized service mediates events anonymous communication expressive semantics using filtering

32 Event Systems II Push versus Pull May be implemented using RPC, unicast, multicast, broadcast,.. Three main patterns Observer design pattern Used in Java / Jini Notifier architectural pattern Used by many research systems Event channel Used in CORBA Event/Notification Service Filtering improves scalability / accuracy Research topic: content-based routing

33 Event Message Flooding Subscription Flooding 2 F: X<4 1 F: X<4 1 2 X=2 X=2

34 Filter propagation Rendezvous routing F: X<4 F: X<4 X=2 1 X=

35 Example of Siena-style Content-based Routing Publisher I want to publish information C Overlay Routing infrastructure I want information that matches my interests. A Subscriber B

36 Tuple Spaces Tuple-based model of coordination The shared tuple space is global and persistent Communication is decoupled in space and time implicit and content-based Primitives In, atomically read and removes a tuple Rd, non-destructive read Out, produce a tuple Eval, creates a process to evaluate tuples Examples: Linda, Lime, JavaSpaces, TSpaces

37 Research Examples

38 Pub/sub on network layer Idea to build a new network architecture based on pub/sub PSIRP and PURSUIT projects at HIIT Open source implementation Connect publishers and subscribers through a rendezvous interconnect (overlay) In-packet Bloom filters for stateless forwarding elements 38

39 Scope-specific Rendezvous core Scope X home Rendezvous Network D 1. Scope X is advertised in the Rendezvous interconnect pointer for scope X is stored in a rendezvous no Hierarchical DHT Rendezvous interconnect Scope X home Local Rendezvous Network A Local Rendezvous Network B Local Rendezvous Network C 2. A set of potential Rids for a scope is Advertised in the HRN of the scope Topology node Topology node Topology node 3.Subscriber rendezvous with the Sid: Rid 4. Join message along control links sets up a graphlet and accumulates the needed Fids Service container Control node Control node Control node Client Forwarding node Forwarding node Forwarding node Forwarding node Forwarding node Domain A Domain B Domain C 5. Payload communication takes place using Fids in the newly created graphlet

40 P2P Video-on-Demand delivery Joint work with Samuli Aalto and Pasi Lassila (Aalto University) Idea to add windowing mechanism to BitTorrent P2P Video-on-Demand analysis Implementation (cluster, PlanetLab) Simulation Analytical models (stochastic, fluid model) A model for understanding the evolution of the system Articles in Globecom 2008 and 2010, ITC 22, MAMA 2011, and ACM Perf. Eval. Review

41 Towards Optimal Keywordbased Content Dissemination in DHT P2P Networks Weixiong Rao Roman Vitenberg Sasu Tarkoma University of Helsinki, Finland {weixiong.rao, University of Oslo, Norway Faculty of Science Department of 4 1 December 2011

42 Keywords-based content dissemination in DHTs doc A B C D E High doc. publication cost A doc contains tens and even thousands of terms. Disseminating the doc to the home node of each term takes O(logN) hops The total hop count is O( d logn) Our contribution is reduction in the doc pub. cost. D E B C F A G H I K Home Node of Term K Real data sets show that a filter contains 2-3 J keywords. The registration cost is low. B E A B filter-2 DHT P2P networ ks filter-1

43 Comparisons

44 Unstructured or semi structured networks BitTorrent Freenet v0.7 Gnutella v0.4 Gnutella v0.7 Decentralization Centralized model Similar to DHTs, two modes (darknet and opennet), two tiers Foundation Tracker Keywords and text strings are used to identify data objects. Assumes small world structure for efficiency Routing function Tracker Clustering using node location and file identifier. Path folding optimization (opennet). Location swapping (darknet). Routing performance Guarantee to locate data, good performance for popular data Search based on Hop-To- Live, no guarantee to locate data. With small world property O(log(n) 2 ) hops are required, where n is the number of nodes. Flat topology (random graph), equal peers Flooding mechanism Flooding mechanism Search until Time-To-Live expires, no guarantee to locate data Random graph with two tiers. Two kinds of nodes, regular and ulta nodes. Ultra nodes are connectivity hubs Selective flooding using the ultra nodes Selective flooding mechanism Search until Time-To-Live expires, second tier improves efficiency, no guarantee to locate data Routing state Constant, choking may occur With small world property O(log(n) 2 ) Constant (reverse path state, max rate and TTL determine max state) Constant (regular to ultra, ultra to ultra). Ultra nodes have to manage leaf node state. Reliability Tracker keeps track of the peers and pieces No central point of failure Performance degrades when the number of peer grows. No central point. Performance degrades when the number of peer grows. Hubs are central points that can be taken out.

45 Structured networks CAN Chord Kademlia Koorde Pastry Tapestry Viceroy Foundation Multi-dimensional space (ddimensional torus) Circular space XOR metric de Bruijn graph Plaxton-style mesh Plaxton-style mesh Butterfly network Routing function Maps (key,value) pairs to coordinate space Matching key and nodeid Matching key and nodeid Matching key and nodeid Matching key and prefix in nodeid Suffix matching Routing using levels of tree, vicinity search System parameters Number of peers N, number of dimensions d Number of peers N Number of peers N, base of peer identifier B Number of peers N Number of peers N, base of peer identifier B Number of peers N, base of peer identifier B Number of peers N Routing performance O(dN 1/d ) O(log N) O(log B N) + small constant Between O(log log N) and O(log N), depending on state Routing state 2d log N Blog B N + B From constant to log N O(log B N) O(log B N) O(log N) 2Blog B N log B N Constant Joins/leaves 2d (log N) 2 log B N + small constant log N log B N log B N log N

46 Summary of Datastores and Related Systems Name Type Data placement Dynamo 1-hop DHT Keyà node, consistent hashing Chord PAST Wide-area DHT Wide-area DHT Keyà node, based on consistent hashing Keyà node, based on Plaxton mesh Freenet P2P Keyà closest node, approximate small world routing table Data can be located Yes Replication Yes, clockwise nodes Stabilization Eventual consistency: anti-entropy, gossip Yes Add-on Stabilization mechanism Yes No guarantee Yes, close-by nodes Yes, reversepath Part of Pastry routing Path folding (opennet) and location swapping (darknet) Gnutella P2P Client No guarantee No No (ultranode layer in principle)

47 Current research involving overlays Virtualized cloud systems and data centers Cluster-based data analytics and processing Information centric networking (ICN) Software defined networking (SDN) Social networks Data dissemination (live video, subscriptions)

48 Overview of current landscape

49 Google CDN The Cloud Yahoo Planetlab Amazon

50 DB SDN P2P/ DHT App DHT DHT Google P2P- CDN DB SDN CDN The Cloud DHT DHT Yahoo DB CH SDN P2P/ DHT App DHT DHT DHT PlanetLab Amazon DHT DB SDN DB DHT SDN DHT P2P/ DHT App Services span multiple sites and regions

51 SDN is about control/data separation and management of networks Enabler for new network applications ICN is a fundamental change to networking: named data items as first class citizens CDN-like behaviour in the network OpenFlow, Controllers, PSIRP, CCN, SDN ICN Virtualization Overlays Clean-slate

52 Synthesis We have covered building blocks for decentralized distributed systems Unstructured: Bittorrent, flooding, limited flooding, Bloom filter summaries, depth-first search with backtracking, layered Structured: consistent hashing and DHTs, small world and location swapping, network proximity, content placement, rendezvous Security: asymmetric and symmetric techniques, Sybil attack Additional techniques: gossip, anti-entropy, vector clocks, Applications: Search, file exchange, secure and high performance storage, multicast, DNS replacement, CDN, Future Internet?

53 Rendezvous, replication, multicast, Titfor-tat Track er Layered Bloom Filt. Limited flooding Flooding Node id clustering Location swapping Depth first Ring Hybrids Trees/ cubes Consistent hashing Proximity Coral Kademlia XOR BT Gnutella Freenet DHTs Random Unstructured Small world Structured N/A Internet (TCP/IP)

54 Consistent hashing alleviates network problems and eventual consistency can be achieved through replication and synchronization Example: Dynamo Replication, Gossip, etc. Selective flooding Consistent hash (O(1) DHT) Good for arbitrary data and search functions, can aggregate routing info, structure improves scalability Examples: Gnutella and Freenet Limited flooding / depth first / Bloom filters Example: BitTorrent Tracker Good for name/value data, note flat address space, one node is responsible, churn is a concern Examples: Lookup: Chord, CAN, Kademlia Storage: PAST Rendezvous: Scribe (for multicast), i3 DHT Search Storage Rendezvous Search Storage Rendezvous Search Storage Rendezvous Cluster Wide-area (unstructured) Internet (TCP/IP) Wide-area (structured)

55 Discussion Overlays as fundamental building blocks Web backends Distributed storage systems Cloud systems CDNs Network management platforms Cellular network control planes CDN federation is now in progress SDN federation? DHT federation?

56 Grading Course grading will be based on the final exam and the assignments/exercises. Course exam :00 B123 Separate exam on :00 in B123 You can use the exercise score with the first separate exam

57 Exam material: additional articles Article: G. DeCandia et al. Dynamo: Amazon s Highly Available Key-value Store. SOSP Article: Theory and Practice of Bloom Filters for Distributed Systems. IEEE Surveys and Tutorials Slideset: Modeling and Analysis of Anonymous-Communication Systems. J. Feigenbaum. Presentation at WITS General idea of MIX and Onion Routing are part of the exam material. Article: R. Cohen et al. Resilience of the Internet to Random Breakdowns. Phys. Rev. Lett. 85, (2000). Background info and derivation of the resiliency formula (power law lectures). Additional details not part of exam material. Article: D. Kreutz, F. M. V. Ramos, P. Verissimo, C. E. Rothenberg, S. Azodolmolky, S. Uhlig. Software-defined Networking: A Comprehensive Survey. Sections I,II, V and VI are part of the exam material. Proceedings of the IEEE, Vol. 103, Issue 1, Jan

58 Exam Four essay questions, answer three, 18 max points, max 6 points per answer (4 bonus points from exercises) Example questions: Q1: A) Compare Gnutella and Kademlia. What are the key differences and similarities of the systems. B) Consider the structure and routing functions of the systems. C) How is content placed on the overlay nodes in these two systems? Q2: A) What problem does BitTorrent solve? B) Compare BitTorrent to HTTP. C) What are the key metrics in BitTorrent data delivery? Briefly consider the significance of each metric.

59 Main theme Prerequisites Approaches learning goals Meets learning goals Deepens learning goals Overlay and peerto-peer networks: definitions and systems Basics of data communications and distributed systems (Introduction to Data Communications, Distributed Systems) Knowledge of how to define the concepts of overlay and peer-topeer networks, and state their central features Ability to describe at least one system in detail Ability of being able to compare different overlay and p2p networks in a qualitative manner Ability to assess the suitability of different systems to different use cases Ability to give one s own definition of the central concepts and discuss the key design and deployment issues Distributed hash tables Basics of data communications and distributed systems (Introduction to Data Communications, Distributed Systems) Big-O-notation and basics of algorithmic complexity Knowledge of the concepts of structured and unstructured networks and the ability to classify solutions into these two categories Knowledge of the basics of distributed hash tables Ability to describe at least one distributed hash table algorithm in detail Ability of being able to compare different distributed hash table algorithms Ability of designing distributed hash table-based applications Knowledge of key performance issues of distributed hash table systems and the ability to analyze these systems The knowledge of choosing a suitable distributed hash table design for a problem Familiarity with the state of the art Reliability and performance modelling Content distribution Basics of probability theory Basics of reliability in distributed systems Introduction to Data Communications Ability to model and assess the reliability of overlay and peer-topeer networks by using probability theory Knowledge of the most important factors pertaining to reliability Knowledge of the basic content distribution solutions Ability to describe at least one overlay and p2p network based content distribution solution Security Basics of computer security Knowledge of the basic security issues with overlay and p2p networks Knowledge of the sybil attack concept Ability of analytically analyzing the reliability and performance of overlay and peer-to-peer networks Understanding of the design issues that are pertinent for reliable systems Knowledge of different content distribution systes and the ability to compare them in detail Knowledge of several content distribution techniques Ability to discuss how security problems and limitations can be solved Knowledge of how to prevent sybil attacks Familiarity with the state of the art Familiarity with the state of the art Knowledge of how to prevent sybil attacks Familiarity with the state of the art

60 Course Development General feedback More hands-on assignments? Separate programming task for more credits? MOOC based questions?

61 Have a nice Spring! Remember course feedback

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 12.1.2015 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 13.1.2014 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 14.1.2013 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Overlay and P2P Networks. Unstructured networks: Freenet. Dr. Samu Varjonen

Overlay and P2P Networks. Unstructured networks: Freenet. Dr. Samu Varjonen Overlay and P2P Networks Unstructured networks: Freenet Dr. Samu Varjonen 1.2.2015 Contents Last week Napster Skype Gnutella BitTorrent and analysis This week: Freenet Introduction to structured networks

More information

CIS 700/005 Networking Meets Databases

CIS 700/005 Networking Meets Databases Announcements CIS / Networking Meets Databases Boon Thau Loo Spring Lecture Paper summaries due at noon today. Office hours: Wed - pm ( Levine) Project proposal: due Feb. Student presenter: rd Jan: A Scalable

More information

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

Page 1. How Did it Start? Model Main Challenge CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

Lecture 2: January 24

Lecture 2: January 24 CMPSCI 677 Operating Systems Spring 2017 Lecture 2: January 24 Lecturer: Prashant Shenoy Scribe: Phuthipong Bovornkeeratiroj 2.1 Lecture 2 Distributed systems fall into one of the architectures teaching

More information

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 6.2.2014 Contents Today Semantic free indexing Consistent Hashing Distributed Hash Tables (DHTs) Thursday (Dr. Samu Varjonen) DHTs

More information

Peer-to-Peer Internet Applications: A Review

Peer-to-Peer Internet Applications: A Review Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

Today. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables

Today. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables Peer-to-Peer Systems and Distributed Hash Tables COS 418: Distributed Systems Lecture 7 Today 1. Peer-to-Peer Systems Napster, Gnutella, BitTorrent, challenges 2. Distributed Hash Tables 3. The Chord Lookup

More information

Today. Architectural Styles

Today. Architectural Styles Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

CSCI-1680 P2P Rodrigo Fonseca

CSCI-1680 P2P Rodrigo Fonseca CSCI-1680 P2P Rodrigo Fonseca Based partly on lecture notes by Ion Stoica, Sco5 Shenker, Joe Hellerstein Today Overlay networks and Peer-to-Peer Motivation Suppose you want to write a routing protocol

More information

Peer-to-peer systems and overlay networks

Peer-to-peer systems and overlay networks Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems

More information

Today. Architectural Styles

Today. Architectural Styles Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [MESSAGING SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Distributed Servers Security risks

More information

Peer-to-Peer Systems and Distributed Hash Tables

Peer-to-Peer Systems and Distributed Hash Tables Peer-to-Peer Systems and Distributed Hash Tables CS 240: Computing Systems and Concurrency Lecture 8 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Selected

More information

Architectures for distributed systems (Chapter 2)

Architectures for distributed systems (Chapter 2) Today Architectures for distributed systems (Chapter 2) Architectural styles Client-server architectures Decentralized and peer-to-peer architectures Lecture 2, page!1 Module 1: Architectural Styles Important

More information

P2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili

P2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili P2P Network Structured Networks: Distributed Hash Tables Pedro García López Universitat Rovira I Virgili Pedro.garcia@urv.net Index Introduction to DHT s Origins of structured overlays Case studies Chord

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems Distributed Hash Tables (DHT) Overview and Issues Paul Francis CS514: Intermediate Course in Computer Systems Lecture 26: Nov 19, 2003 Distributed Hash Tables (DHT): Overview and Issues What is a Distributed

More information

A Survey of Peer-to-Peer Content Distribution Technologies

A Survey of Peer-to-Peer Content Distribution Technologies A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview

More information

EE 122: Peer-to-Peer Networks

EE 122: Peer-to-Peer Networks EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 2.2.2015 Contents Today Geometries revisited Distributed Hash Tables (DHTs) Thursday Power-law networks Geometries revisited The

More information

Peer-To-Peer Techniques

Peer-To-Peer Techniques PG DynaSearch Markus Benter 31th October, 2013 Introduction Centralized P2P-Networks Unstructured P2P-Networks Structured P2P-Networks Misc 1 What is a Peer-to-Peer System? Definition Peer-to-peer systems

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

Peer-to-Peer (P2P) Systems

Peer-to-Peer (P2P) Systems Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9 Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization

More information

Overlay and P2P Networks. Applications. Prof. Sasu Tarkoma and

Overlay and P2P Networks. Applications. Prof. Sasu Tarkoma and Overlay and P2P Networks Applications Prof. Sasu Tarkoma 10.2.2015 and 12.2.2015 Contents Monday 9.2. Applications I BitTorrent Mainline DHT Scribe and PAST Thursday 12.2. Applications II P2PSIP Internet

More information

Indirect Communication

Indirect Communication Indirect Communication To do q Today q q Space and time (un)coupling Common techniques q Next time: Overlay networks xkdc Direct coupling communication With R-R, RPC, RMI Space coupled Sender knows the

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

Distributed Hash Tables

Distributed Hash Tables Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi 1/34 Outline 1 2 Smruti R. Sarangi 2/34 Normal Hashtables Hashtable : Contains a set of

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks P2P Systems Jianping Pan Summer 2007 5/30/07 csc485b/586b/seng480b 1 C/S vs P2P Client-server server is well-known server may become a bottleneck Peer-to-peer everyone is a (potential)

More information

Motivation for peer-to-peer

Motivation for peer-to-peer Peer-to-peer systems INF 5040 autumn 2015 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Ø Inherent restrictions of the standard client/ server model

More information

Distributed Hash Tables

Distributed Hash Tables Distributed Hash Tables CS6450: Distributed Systems Lecture 11 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University.

More information

L3S Research Center, University of Hannover

L3S Research Center, University of Hannover , University of Hannover Structured Peer-to to-peer Networks Wolf-Tilo Balke and Wolf Siberski 3..6 *Original slides provided by K. Wehrle, S. Götz, S. Rieche (University of Tübingen) Peer-to-Peer Systems

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

15-744: Computer Networking P2P/DHT

15-744: Computer Networking P2P/DHT 15-744: Computer Networking P2P/DHT Overview P2P Lookup Overview Centralized/Flooded Lookups Routed Lookups Chord Comparison of DHTs 2 Peer-to-Peer Networks Typically each member stores/provides access

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Peer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006

Peer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006 Peer-to-Peer Protocols and Systems TA: David Murray 15-441 Spring 2006 4/19/2006 P2P - Outline What is P2P? P2P System Types 1) File-sharing 2) File distribution 3) Streaming Uses & Challenges 2 Problem:

More information

Peer-to-peer computing research a fad?

Peer-to-peer computing research a fad? Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

Electronic Payment Systems (1) E-cash

Electronic Payment Systems (1) E-cash Electronic Payment Systems (1) Payment systems based on direct payment between customer and merchant. a) Paying in cash. b) Using a check. c) Using a credit card. Lecture 24, page 1 E-cash The principle

More information

FutureNet IV Fourth International Workshop on the Network of the Future, in conjunction with IEEE ICC

FutureNet IV Fourth International Workshop on the Network of the Future, in conjunction with IEEE ICC Sasu Tarkoma, Dmitriy Kuptsov, and Petri Savolainen Helsinki Institute for Information Technology University of Helsinki and Aalto University Pasi Sarolahti Aalto University FutureNet IV Fourth International

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 25 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer peer-to-peer systems overview

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

Peer- Peer to -peer Systems

Peer- Peer to -peer Systems Peer-to-peer Systems Brian Nielsen bnielsen@cs.aau.dk Client-Server Centralized Bottleneck Functional specialization Single point of failure Central administration NFS Client NFS Client NFS Server NFS

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Peer to Peer Networks

Peer to Peer Networks Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer

More information

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals. Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

CS 268: DHTs. Page 1. How Did it Start? Model. Main Challenge. Napster. Other Challenges

CS 268: DHTs. Page 1. How Did it Start? Model. Main Challenge. Napster. Other Challenges How Did it Start? CS : DHTs A killer application: Naptser - Free music over the Internet Key idea: share the content, storage and bandwidth of individual (home) users Scott Shenker and Ion Stoica April,

More information

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.

More information

LECT-05, S-1 FP2P, Javed I.

LECT-05, S-1 FP2P, Javed I. A Course on Foundations of Peer-to-Peer Systems & Applications LECT-, S- FPP, javed@kent.edu Javed I. Khan@8 CS /99 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer

More information

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General 1 ELT-53206 Peer-to-Peer Networks Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original

More information

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General 1 ELT-53207 P2P & IoT Systems Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original

More information

Dynamo. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Motivation System Architecture Evaluation

Dynamo. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Motivation System Architecture Evaluation Dynamo Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Leader Election 1/20 Outline Motivation 1 Motivation 2 3 Smruti R. Sarangi Leader

More information

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -

More information

Indirect Communication

Indirect Communication Indirect Communication Today l Space and time (un)coupling l Group communication, pub/sub, message queues and shared memory Next time l Distributed file systems xkdc Indirect communication " Indirect communication

More information

Distributed Knowledge Organization and Peer-to-Peer Networks

Distributed Knowledge Organization and Peer-to-Peer Networks Knowledge Organization and Peer-to-Peer Networks Klaus Wehrle Group Chair of Computer Science IV RWTH Aachen University http://ds.cs.rwth-aachen.de 1 Organization of Information Essential challenge in?

More information

Scalable P2P architectures

Scalable P2P architectures Scalable P2P architectures Oscar Boykin Electrical Engineering, UCLA Joint work with: Jesse Bridgewater, Joseph Kong, Kamen Lozev, Behnam Rezaei, Vwani Roychowdhury, Nima Sarshar Outline Introduction to

More information

Distributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017

Distributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017 Distributed Systems 16. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2017 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

CS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017

CS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017 CS 43: Computer Networks BitTorrent & Content Distribution Kevin Webb Swarthmore College September 28, 2017 Agenda BitTorrent Cooperative file transfers Briefly: Distributed Hash Tables Finding things

More information

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 Security for Structured Peer-to-peer Overlay Networks By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 1 Acknowledgement Some of the following slides are borrowed from talks by Yun Mao

More information

Horizontal or vertical scalability? Horizontal scaling is challenging. Today. Scaling Out Key-Value Storage

Horizontal or vertical scalability? Horizontal scaling is challenging. Today. Scaling Out Key-Value Storage Horizontal or vertical scalability? Scaling Out Key-Value Storage COS 418: Distributed Systems Lecture 8 Kyle Jamieson Vertical Scaling Horizontal Scaling [Selected content adapted from M. Freedman, B.

More information

Introduction to P2P Computing

Introduction to P2P Computing Introduction to P2P Computing Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Introduction A. Peer-to-Peer vs. Client/Server B. Overlay Networks 2. Common Topologies 3. Data Location 4. Gnutella

More information

Lecture 8: Application Layer P2P Applications and DHTs

Lecture 8: Application Layer P2P Applications and DHTs Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Peer to Peer Networks

Peer to Peer Networks Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2018 Networking Laboratory P2P Applications Traditional P2P applications: for file sharing BitTorrent, Emule

More information

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016 Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

L3S Research Center, University of Hannover

L3S Research Center, University of Hannover , University of Hannover Dynamics of Wolf-Tilo Balke and Wolf Siberski 21.11.2007 *Original slides provided by S. Rieche, H. Niedermayer, S. Götz, K. Wehrle (University of Tübingen) and A. Datta, K. Aberer

More information

LECTURE 3: CONCURRENT & DISTRIBUTED ARCHITECTURES

LECTURE 3: CONCURRENT & DISTRIBUTED ARCHITECTURES LECTURE 3: CONCURRENT & DISTRIBUTED ARCHITECTURES 1 Contents Introduction Flynn s Taxonomy MIMD: Tight & Loose Coupling Software Architectures for Distributed Systems: Layered, Object-/Event-based, Shared

More information

A Case For OneSwarm. Tom Anderson University of Washington.

A Case For OneSwarm. Tom Anderson University of Washington. A Case For OneSwarm Tom Anderson University of Washington http://oneswarm.cs.washington.edu/ With: Jarret Falkner, Tomas Isdal, Alex Jaffe, John P. John, Arvind Krishnamurthy, Harsha Madhyastha and Mike

More information

P2PNS: A Secure Distributed Name Service for P2PSIP

P2PNS: A Secure Distributed Name Service for P2PSIP P2PNS: A Secure Distributed Name Service for P2PSIP Mobile P2P 2008, Hong Kong, China Outline Decentralized VoIP (P2PSIP) Peer-to-Peer name service (P2PNS) Architecture Two-stage name resolution P2PNS

More information

Large-Scale Data Stores and Probabilistic Protocols

Large-Scale Data Stores and Probabilistic Protocols Distributed Systems 600.437 Large-Scale Data Stores & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Large-Scale Data Stores and Probabilistic Protocols Lecture 11

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashock, Frank Dabek, Hari Balakrishnan March 4, 2013 One slide

More information

Peer to Peer Systems and Probabilistic Protocols

Peer to Peer Systems and Probabilistic Protocols Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good

More information

An Expresway over Chord in Peer-to-Peer Systems

An Expresway over Chord in Peer-to-Peer Systems An Expresway over Chord in Peer-to-Peer Systems Hathai Tanta-ngai Technical Report CS-2005-19 October 18, 2005 Faculty of Computer Science 6050 University Ave., Halifax, Nova Scotia, B3H 1W5, Canada An

More information

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P? Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems

More information

GNUnet Distributed Data Storage

GNUnet Distributed Data Storage GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview

More information