Overlay and P2P Networks. Advanced topics and summary. Prof. Sasu Tarkoma
|
|
- Nickolas Ramsey
- 5 years ago
- Views:
Transcription
1 Overlay and P2P Networks Advanced topics and summary Prof. Sasu Tarkoma
2 Contents Advanced topics Security and BitCoin Bloom filters Publish/subscribe Synthesis
3 Key security issues Security is a weak point of many overlays and DHTs Not an issue with centrally managed system, but a significant concern for decentralized systems Freenet was our key example of a secure P2P system Also Skype with centralized login servers Overlays are vulnerable to the sybil attack One entity presents multiple identities for malicious intent.
4 Sybil attack Sybil attack (John Doceur, IPTPS '01) Problem: Malicious nodes overwhelm the network with identities Resolution: Without a central authority that certifies identifies (binding real-world person to nodeid) no realistic approach exists to completely stop the sybil attack With certain assumption sybil attacks can be mitigated Geometric distinctness certification (Bazzi & Konjevod, PODC 2005) Detect clock skew of the devices (Kohno, Broido, and claffy, UCSD, IEEE S&P 2005)
5 Eclipse attack A group of malicious nodes tries to dominate the neighbor set Start with Sybil and then neighbour discovery Adds malicious node identifiers to neighbour table For example: pick ids close to the target id Result: network partitions Solutions: Remember Freenet node identifier creation (the commitment protocol). Baseline: do not allow arbitary choice of node id.
6 Security Considerations Malicious nodes Attacker floods DHT with data Attacker returns incorrect data Attacker denies data or supplies incorrect routing info Basic solutions: rate limits and proof-of-work Self-authenticating data Redundancy k-redundant networks What if attackers have quorum? Need a way to control creation of node Ids Solution: secure node identifiers Use public keys
7 Security summary Wide-area overlay networks are vulnerable to sybil and eclipse attacks A production system typically utilizes centralized authentication Skype login servers Decentralized systems Freenet: verification to protect content, darknet for better protection Bitcoin: verification processes, proof-of-work If managed by one organization security becomes easier Dynamo: no security considerations
8 BitCoin Form of decentralized cryptographic currency Transaction system similar to credit card/google wallet Created by pseudonymous Satoshi Nakamoto in 2008 Maximum amount of bitcoins is 21 million Payment is broadcast in a signed message These are handled as blocks every ten minutes Added to public transaction record (block chain) Voting on transaction authentication Mining process for authenticating transactions and Discovering new bitcoins Validation based on proof of work Avoiding Sybil attack
9 BOB s private key Digital signature BOB s public key BOB Transaction BitCoin network ALICE ALICE s public key Transaction is signed by BOB so that the network can verify the transfer to ALICE. The signature is verified by BOB s public key. Signatures form a chain: previous owner signs and gives ownership to the new owner (public key). In our example BOB gives ownership to ALICE.
10 10 minutes of transactions are broadcast to miners Transactions Miners Block Miners create a block Block puzzle Miner solves a puzzle Proof of work Miner broadcasts solution to other miners Miners Miners verify the proof of work Verification Process starts again
11 BitCoin Network Steps from Satoshi s paper: 1) New transactions are broadcast to all nodes. 2) Each node collects new transactions into a block. 3) Each node works on finding a difficult proof-of-work for its block. 4) When a node finds a proof-of-work, it broadcasts the block to all nodes. 5) Nodes accept the block only if all transactions in it are valid and not already spent. 6) Nodes express their acceptance of the block by working on creating the next block in the chain, using the hash of the accepted block as the previous hash.
12 BitCoin Network A nonce in a block is incremented until the block s hash gives the required number of prefix zero bits (typical proof-of-work from Hashcash) Time to compute hash collision is exponential with the number of zero bits This is easy to verify, but any modification to block requires recomputation Blocks are chained and hence transaction history is relatively safe BitCoin increases the difficulty to keep block generation constant
13 BitCoin Anonymity BitCoin is not anonymous The block chain is public and contains public keys Transactions can be traced with two networks: The transaction network represents the flow of Bitcoins between transactions over time t1 and t2 à t3 à t4 The user network represents the flow of Bitcoins between users over time u1 à u3 à u3 and u4 If user to public key mapping is known, it is possible to trace user s transactions Reference:
14 A Short Primer on Bloom Filters
15 Bloom filters in Gnutella v0.7 Bloom filters are probabilistic structures used to store dictionaries A bit-vector that supports constant time querying of keywords Easy to merge two filters Many variants If space is at premium Number of hash functions (k) Size of filter (m) Number of elements in the inserted set (n) Decrease Less computation Higher false positive rate Smaller space requirements Higher false positive rate Lower false positive rate Increase More computation Lower false positive rate More space is needed Lower false positive rate Higher false positive rate
16 Bloom Filters Source: Tarkoma et al. Theory and Practice of Bloom Filters for distributed Systems
17 Example Bloom filter x y z
18
19
20 BF False positive probability is given by: ( 1 ( 1 1 m) kn ) k ( 1 e kn/m) k. kn/m Bit not All set bit to one positions are set to After one inserting for k hash n elements functions with k opt = m k hash 9m functions ln 2 n 13n. the bit is still zero Optimal number of hash functions k: Size of filter given optimal number of hash functions: ivenby ( ) m = n ln p (ln 2) 2. Details in the survey paper available on course page.
21 BF False positive probability is given by: ( 1 ( 1 1 m) kn ) k ( 1 e kn/m) k. kn/m Optimal number of hash functions k: k opt = m n ln 2 9m 13n. Size of filter given optimal number of hash functions: ivenby ( ) m = n ln p (ln 2) 2. Details in the survey paper available on course page.
22 If false positive rate is fixed, the filter size grows linearly with inserted elements.
23 Filter Key feature C D P FN Output Standard Bloom filter Is element x in set S? N N N N Boolean Adaptive Bloom filter Frequency by increasing number of hash functions Y N N N Boolean Bloomier filter Frequency and function value Y N N N Freq., f(x) Compressed Bloom filter Compress filter for transmission N N N N Boolean Counting Bloom filter Element frequency queries and deletion Y Y N M Boolean or freq. Decaying Bloom filter Time-window Y Y N N Boolean Deletable Bloom filter Probabilistic element removal N Y N N Boolean Distance-sensitive Bloom filters Is x close to an item in S? N N N Y Boolean Dynamic Bloom filter Dynamic growth of the filter Y Y N N Boolean Filter Bank Mapping to elements and sets Y Y M N x, set, freq. Generalized Bloom filter Two set of hash functions to code x with 1s and 0s N N N Y Boolean Hierarchical Bloom filter String matching N N N N Boolean Memory-optimized Bloom filter Multiple-choice single hash function N N N N Boolean Popularity conscious Bloom filter Popularity-awareness with off-line tuning N N Y N Boolean Retouched Bloom filter Allow some false negatives for better false positive rate N N N Y Boolean Scalable Bloom filter Dynamic growth of the filter N N N N Boolean Secure Bloom filters Privacy-preserving cryptographic filters N N N N Boolean Space Code Bloom filter Frequency queries Y N M N Frequency Spectral Bloom filter Element frequency queries Y Y N M Frequency Split Bloom filter Set cardinality optimized multi-bf construct N N N N Boolean Stable Bloom filter Has element x been seen before? N Y N Y Boolean Variable-length Signature filter Popularity-aware with on-line tuning Y Y Y Y Boolean Weighted Bloom filter Assign more bits to popular elements N N Y N Boolean Source: Tarkoma et al. Theory and Practice of Bloom Filters for distributed Systems
24 Source: Tarkoma et al. Theory and Practice of Bloom Filters for distributed Systems
25 Worked Example Gnutella uses Bloom filters to store and disseminate keyword indexes 1-hop replication in the flat ultranode layer, much improved design over flooding An ultrapeer maintains about 30 leafs and thus 30 Bloom filters, one for each leaf One leaf has about 1000 keywords in our example Assuming false positive rate of 0.1, for 1000 keywords we need 4793 bits. For keywords we need bits. There is overlap (some keywords are popular)! Gnutella uses 2**16 (65536) bits that is sufficient even when aggregating leaf BFs Experiments report ultrapeer BF 65% full and leaf BF 3% full Today having hundreds of KBs in the BF is not a problem, Gnutella design is old and today s networks are much faster Linear growth if p is fixed! ivenby m = n ln p (ln 2) 2.
26 Pub/Sub Systems
27 Event-based Systems and Publish/subscribe Event delivery from publishers to subscribers Event is a message with content One-to-many, many-to-many Builds on messaging systems and store-and-forward A frequently used communication paradigm Decoupling in space and time Solutions from local operation to wide-area networking Proposed for mobile/pervasive computing The event service is a logically centralized service Basic primitives: subscribe, unsubscribe, publish Various routing topologies and semantics
28 A) Space decoupling Publish Notify Subscriber Publisher Event Notification Service Notify Subscriber Publisher Publish B) Time decoupling Subscriber Event Notification Service Publisher Buffering Notify Subscriber C) Sychronization decoupling Publisher Publish Subscriber Event Notification Service Buffering Notify
29 Subscriptions Subscriptions are described using filters Filter: a stateless Boolean function Defines a subspace of the content space A single event is a point in the content space Selects a subset of published events Expressive interest definition and contentmatching Content model is typically typed tuples or XML
30 Pub/Sub Service Subscriber Notification Consumer Receives notifications Subscriptions Notify Notification Engine Matches and sends notification to the appropriate consumers Notifications message instances Publisher Situation Subscription Manager Subscription management on behalf of the Publisher Subscriptions
31 Event Systems I Traditional MoM systems are message queue based (one-to-one) Event systems and publish/subscribe are one-to-many or many-tomany One object monitors another object Reacts to changes in the object Multiple objects can be notified about changes Events address problems with synchronous operation and polling In distributed environments a logically centralized service mediates events anonymous communication expressive semantics using filtering
32 Event Systems II Push versus Pull May be implemented using RPC, unicast, multicast, broadcast,.. Three main patterns Observer design pattern Used in Java / Jini Notifier architectural pattern Used by many research systems Event channel Used in CORBA Event/Notification Service Filtering improves scalability / accuracy Research topic: content-based routing
33 Event Message Flooding Subscription Flooding 2 F: X<4 1 F: X<4 1 2 X=2 X=2
34 Filter propagation Rendezvous routing F: X<4 F: X<4 X=2 1 X=
35 Example of Siena-style Content-based Routing Publisher I want to publish information C Overlay Routing infrastructure I want information that matches my interests. A Subscriber B
36 Tuple Spaces Tuple-based model of coordination The shared tuple space is global and persistent Communication is decoupled in space and time implicit and content-based Primitives In, atomically read and removes a tuple Rd, non-destructive read Out, produce a tuple Eval, creates a process to evaluate tuples Examples: Linda, Lime, JavaSpaces, TSpaces
37 Research Examples
38 Pub/sub on network layer Idea to build a new network architecture based on pub/sub PSIRP and PURSUIT projects at HIIT Open source implementation Connect publishers and subscribers through a rendezvous interconnect (overlay) In-packet Bloom filters for stateless forwarding elements 38
39 Scope-specific Rendezvous core Scope X home Rendezvous Network D 1. Scope X is advertised in the Rendezvous interconnect pointer for scope X is stored in a rendezvous no Hierarchical DHT Rendezvous interconnect Scope X home Local Rendezvous Network A Local Rendezvous Network B Local Rendezvous Network C 2. A set of potential Rids for a scope is Advertised in the HRN of the scope Topology node Topology node Topology node 3.Subscriber rendezvous with the Sid: Rid 4. Join message along control links sets up a graphlet and accumulates the needed Fids Service container Control node Control node Control node Client Forwarding node Forwarding node Forwarding node Forwarding node Forwarding node Domain A Domain B Domain C 5. Payload communication takes place using Fids in the newly created graphlet
40 P2P Video-on-Demand delivery Joint work with Samuli Aalto and Pasi Lassila (Aalto University) Idea to add windowing mechanism to BitTorrent P2P Video-on-Demand analysis Implementation (cluster, PlanetLab) Simulation Analytical models (stochastic, fluid model) A model for understanding the evolution of the system Articles in Globecom 2008 and 2010, ITC 22, MAMA 2011, and ACM Perf. Eval. Review
41 Towards Optimal Keywordbased Content Dissemination in DHT P2P Networks Weixiong Rao Roman Vitenberg Sasu Tarkoma University of Helsinki, Finland {weixiong.rao, University of Oslo, Norway Faculty of Science Department of 4 1 December 2011
42 Keywords-based content dissemination in DHTs doc A B C D E High doc. publication cost A doc contains tens and even thousands of terms. Disseminating the doc to the home node of each term takes O(logN) hops The total hop count is O( d logn) Our contribution is reduction in the doc pub. cost. D E B C F A G H I K Home Node of Term K Real data sets show that a filter contains 2-3 J keywords. The registration cost is low. B E A B filter-2 DHT P2P networ ks filter-1
43 Comparisons
44 Unstructured or semi structured networks BitTorrent Freenet v0.7 Gnutella v0.4 Gnutella v0.7 Decentralization Centralized model Similar to DHTs, two modes (darknet and opennet), two tiers Foundation Tracker Keywords and text strings are used to identify data objects. Assumes small world structure for efficiency Routing function Tracker Clustering using node location and file identifier. Path folding optimization (opennet). Location swapping (darknet). Routing performance Guarantee to locate data, good performance for popular data Search based on Hop-To- Live, no guarantee to locate data. With small world property O(log(n) 2 ) hops are required, where n is the number of nodes. Flat topology (random graph), equal peers Flooding mechanism Flooding mechanism Search until Time-To-Live expires, no guarantee to locate data Random graph with two tiers. Two kinds of nodes, regular and ulta nodes. Ultra nodes are connectivity hubs Selective flooding using the ultra nodes Selective flooding mechanism Search until Time-To-Live expires, second tier improves efficiency, no guarantee to locate data Routing state Constant, choking may occur With small world property O(log(n) 2 ) Constant (reverse path state, max rate and TTL determine max state) Constant (regular to ultra, ultra to ultra). Ultra nodes have to manage leaf node state. Reliability Tracker keeps track of the peers and pieces No central point of failure Performance degrades when the number of peer grows. No central point. Performance degrades when the number of peer grows. Hubs are central points that can be taken out.
45 Structured networks CAN Chord Kademlia Koorde Pastry Tapestry Viceroy Foundation Multi-dimensional space (ddimensional torus) Circular space XOR metric de Bruijn graph Plaxton-style mesh Plaxton-style mesh Butterfly network Routing function Maps (key,value) pairs to coordinate space Matching key and nodeid Matching key and nodeid Matching key and nodeid Matching key and prefix in nodeid Suffix matching Routing using levels of tree, vicinity search System parameters Number of peers N, number of dimensions d Number of peers N Number of peers N, base of peer identifier B Number of peers N Number of peers N, base of peer identifier B Number of peers N, base of peer identifier B Number of peers N Routing performance O(dN 1/d ) O(log N) O(log B N) + small constant Between O(log log N) and O(log N), depending on state Routing state 2d log N Blog B N + B From constant to log N O(log B N) O(log B N) O(log N) 2Blog B N log B N Constant Joins/leaves 2d (log N) 2 log B N + small constant log N log B N log B N log N
46 Summary of Datastores and Related Systems Name Type Data placement Dynamo 1-hop DHT Keyà node, consistent hashing Chord PAST Wide-area DHT Wide-area DHT Keyà node, based on consistent hashing Keyà node, based on Plaxton mesh Freenet P2P Keyà closest node, approximate small world routing table Data can be located Yes Replication Yes, clockwise nodes Stabilization Eventual consistency: anti-entropy, gossip Yes Add-on Stabilization mechanism Yes No guarantee Yes, close-by nodes Yes, reversepath Part of Pastry routing Path folding (opennet) and location swapping (darknet) Gnutella P2P Client No guarantee No No (ultranode layer in principle)
47 Current research involving overlays Virtualized cloud systems and data centers Cluster-based data analytics and processing Information centric networking (ICN) Software defined networking (SDN) Social networks Data dissemination (live video, subscriptions)
48 Overview of current landscape
49 Google CDN The Cloud Yahoo Planetlab Amazon
50 DB SDN P2P/ DHT App DHT DHT Google P2P- CDN DB SDN CDN The Cloud DHT DHT Yahoo DB CH SDN P2P/ DHT App DHT DHT DHT PlanetLab Amazon DHT DB SDN DB DHT SDN DHT P2P/ DHT App Services span multiple sites and regions
51 SDN is about control/data separation and management of networks Enabler for new network applications ICN is a fundamental change to networking: named data items as first class citizens CDN-like behaviour in the network OpenFlow, Controllers, PSIRP, CCN, SDN ICN Virtualization Overlays Clean-slate
52 Synthesis We have covered building blocks for decentralized distributed systems Unstructured: Bittorrent, flooding, limited flooding, Bloom filter summaries, depth-first search with backtracking, layered Structured: consistent hashing and DHTs, small world and location swapping, network proximity, content placement, rendezvous Security: asymmetric and symmetric techniques, Sybil attack Additional techniques: gossip, anti-entropy, vector clocks, Applications: Search, file exchange, secure and high performance storage, multicast, DNS replacement, CDN, Future Internet?
53 Rendezvous, replication, multicast, Titfor-tat Track er Layered Bloom Filt. Limited flooding Flooding Node id clustering Location swapping Depth first Ring Hybrids Trees/ cubes Consistent hashing Proximity Coral Kademlia XOR BT Gnutella Freenet DHTs Random Unstructured Small world Structured N/A Internet (TCP/IP)
54 Consistent hashing alleviates network problems and eventual consistency can be achieved through replication and synchronization Example: Dynamo Replication, Gossip, etc. Selective flooding Consistent hash (O(1) DHT) Good for arbitrary data and search functions, can aggregate routing info, structure improves scalability Examples: Gnutella and Freenet Limited flooding / depth first / Bloom filters Example: BitTorrent Tracker Good for name/value data, note flat address space, one node is responsible, churn is a concern Examples: Lookup: Chord, CAN, Kademlia Storage: PAST Rendezvous: Scribe (for multicast), i3 DHT Search Storage Rendezvous Search Storage Rendezvous Search Storage Rendezvous Cluster Wide-area (unstructured) Internet (TCP/IP) Wide-area (structured)
55 Discussion Overlays as fundamental building blocks Web backends Distributed storage systems Cloud systems CDNs Network management platforms Cellular network control planes CDN federation is now in progress SDN federation? DHT federation?
56 Grading Course grading will be based on the final exam and the assignments/exercises. Course exam :00 B123 Separate exam on :00 in B123 You can use the exercise score with the first separate exam
57 Exam material: additional articles Article: G. DeCandia et al. Dynamo: Amazon s Highly Available Key-value Store. SOSP Article: Theory and Practice of Bloom Filters for Distributed Systems. IEEE Surveys and Tutorials Slideset: Modeling and Analysis of Anonymous-Communication Systems. J. Feigenbaum. Presentation at WITS General idea of MIX and Onion Routing are part of the exam material. Article: R. Cohen et al. Resilience of the Internet to Random Breakdowns. Phys. Rev. Lett. 85, (2000). Background info and derivation of the resiliency formula (power law lectures). Additional details not part of exam material. Article: D. Kreutz, F. M. V. Ramos, P. Verissimo, C. E. Rothenberg, S. Azodolmolky, S. Uhlig. Software-defined Networking: A Comprehensive Survey. Sections I,II, V and VI are part of the exam material. Proceedings of the IEEE, Vol. 103, Issue 1, Jan
58 Exam Four essay questions, answer three, 18 max points, max 6 points per answer (4 bonus points from exercises) Example questions: Q1: A) Compare Gnutella and Kademlia. What are the key differences and similarities of the systems. B) Consider the structure and routing functions of the systems. C) How is content placed on the overlay nodes in these two systems? Q2: A) What problem does BitTorrent solve? B) Compare BitTorrent to HTTP. C) What are the key metrics in BitTorrent data delivery? Briefly consider the significance of each metric.
59 Main theme Prerequisites Approaches learning goals Meets learning goals Deepens learning goals Overlay and peerto-peer networks: definitions and systems Basics of data communications and distributed systems (Introduction to Data Communications, Distributed Systems) Knowledge of how to define the concepts of overlay and peer-topeer networks, and state their central features Ability to describe at least one system in detail Ability of being able to compare different overlay and p2p networks in a qualitative manner Ability to assess the suitability of different systems to different use cases Ability to give one s own definition of the central concepts and discuss the key design and deployment issues Distributed hash tables Basics of data communications and distributed systems (Introduction to Data Communications, Distributed Systems) Big-O-notation and basics of algorithmic complexity Knowledge of the concepts of structured and unstructured networks and the ability to classify solutions into these two categories Knowledge of the basics of distributed hash tables Ability to describe at least one distributed hash table algorithm in detail Ability of being able to compare different distributed hash table algorithms Ability of designing distributed hash table-based applications Knowledge of key performance issues of distributed hash table systems and the ability to analyze these systems The knowledge of choosing a suitable distributed hash table design for a problem Familiarity with the state of the art Reliability and performance modelling Content distribution Basics of probability theory Basics of reliability in distributed systems Introduction to Data Communications Ability to model and assess the reliability of overlay and peer-topeer networks by using probability theory Knowledge of the most important factors pertaining to reliability Knowledge of the basic content distribution solutions Ability to describe at least one overlay and p2p network based content distribution solution Security Basics of computer security Knowledge of the basic security issues with overlay and p2p networks Knowledge of the sybil attack concept Ability of analytically analyzing the reliability and performance of overlay and peer-to-peer networks Understanding of the design issues that are pertinent for reliable systems Knowledge of different content distribution systes and the ability to compare them in detail Knowledge of several content distribution techniques Ability to discuss how security problems and limitations can be solved Knowledge of how to prevent sybil attacks Familiarity with the state of the art Familiarity with the state of the art Knowledge of how to prevent sybil attacks Familiarity with the state of the art
60 Course Development General feedback More hands-on assignments? Separate programming task for more credits? MOOC based questions?
61 Have a nice Spring! Remember course feedback
Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 12.1.2015 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 13.1.2014 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 14.1.2013 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationOverlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen
Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationOverlay and P2P Networks. Unstructured networks: Freenet. Dr. Samu Varjonen
Overlay and P2P Networks Unstructured networks: Freenet Dr. Samu Varjonen 1.2.2015 Contents Last week Napster Skype Gnutella BitTorrent and analysis This week: Freenet Introduction to structured networks
More informationCIS 700/005 Networking Meets Databases
Announcements CIS / Networking Meets Databases Boon Thau Loo Spring Lecture Paper summaries due at noon today. Office hours: Wed - pm ( Levine) Project proposal: due Feb. Student presenter: rd Jan: A Scalable
More informationPage 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"
How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationLecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011
Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared
More informationLecture 2: January 24
CMPSCI 677 Operating Systems Spring 2017 Lecture 2: January 24 Lecturer: Prashant Shenoy Scribe: Phuthipong Bovornkeeratiroj 2.1 Lecture 2 Distributed systems fall into one of the architectures teaching
More informationOverlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma
Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 6.2.2014 Contents Today Semantic free indexing Consistent Hashing Distributed Hash Tables (DHTs) Thursday (Dr. Samu Varjonen) DHTs
More informationPeer-to-Peer Internet Applications: A Review
Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation
More informationIntroduction to Peer-to-Peer Systems
Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed
More informationToday. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables COS 418: Distributed Systems Lecture 7 Today 1. Peer-to-Peer Systems Napster, Gnutella, BitTorrent, challenges 2. Distributed Hash Tables 3. The Chord Lookup
More informationToday. Architectural Styles
Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed
More informationPeer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today
Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become
More informationDISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES
DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application
More informationCSCI-1680 P2P Rodrigo Fonseca
CSCI-1680 P2P Rodrigo Fonseca Based partly on lecture notes by Ion Stoica, Sco5 Shenker, Joe Hellerstein Today Overlay networks and Peer-to-Peer Motivation Suppose you want to write a routing protocol
More informationPeer-to-peer systems and overlay networks
Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems
More informationToday. Architectural Styles
Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [MESSAGING SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Distributed Servers Security risks
More informationPeer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables CS 240: Computing Systems and Concurrency Lecture 8 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Selected
More informationArchitectures for distributed systems (Chapter 2)
Today Architectures for distributed systems (Chapter 2) Architectural styles Client-server architectures Decentralized and peer-to-peer architectures Lecture 2, page!1 Module 1: Architectural Styles Important
More informationP2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili
P2P Network Structured Networks: Distributed Hash Tables Pedro García López Universitat Rovira I Virgili Pedro.garcia@urv.net Index Introduction to DHT s Origins of structured overlays Case studies Chord
More informationCS514: Intermediate Course in Computer Systems
Distributed Hash Tables (DHT) Overview and Issues Paul Francis CS514: Intermediate Course in Computer Systems Lecture 26: Nov 19, 2003 Distributed Hash Tables (DHT): Overview and Issues What is a Distributed
More informationA Survey of Peer-to-Peer Content Distribution Technologies
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview
More informationEE 122: Peer-to-Peer Networks
EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationArchitectures for Distributed Systems
Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced
More informationOverlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma
Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 2.2.2015 Contents Today Geometries revisited Distributed Hash Tables (DHTs) Thursday Power-law networks Geometries revisited The
More informationPeer-To-Peer Techniques
PG DynaSearch Markus Benter 31th October, 2013 Introduction Centralized P2P-Networks Unstructured P2P-Networks Structured P2P-Networks Misc 1 What is a Peer-to-Peer System? Definition Peer-to-peer systems
More informationMarch 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE
for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized
More informationMaking Gnutella-like P2P Systems Scalable
Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems
More informationPeer-to-Peer (P2P) Systems
Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed
More informationEECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations
EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley
More informationFlooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9
Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication
More informationScalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou
Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization
More informationOverlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example
Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization
More informationOverlay and P2P Networks. Applications. Prof. Sasu Tarkoma and
Overlay and P2P Networks Applications Prof. Sasu Tarkoma 10.2.2015 and 12.2.2015 Contents Monday 9.2. Applications I BitTorrent Mainline DHT Scribe and PAST Thursday 12.2. Applications II P2PSIP Internet
More informationIndirect Communication
Indirect Communication To do q Today q q Space and time (un)coupling Common techniques q Next time: Overlay networks xkdc Direct coupling communication With R-R, RPC, RMI Space coupled Sender knows the
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /
More informationDistributed Hash Tables
Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi 1/34 Outline 1 2 Smruti R. Sarangi 2/34 Normal Hashtables Hashtable : Contains a set of
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationAdvanced Computer Networks
Advanced Computer Networks P2P Systems Jianping Pan Summer 2007 5/30/07 csc485b/586b/seng480b 1 C/S vs P2P Client-server server is well-known server may become a bottleneck Peer-to-peer everyone is a (potential)
More informationMotivation for peer-to-peer
Peer-to-peer systems INF 5040 autumn 2015 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Ø Inherent restrictions of the standard client/ server model
More informationDistributed Hash Tables
Distributed Hash Tables CS6450: Distributed Systems Lecture 11 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University.
More informationL3S Research Center, University of Hannover
, University of Hannover Structured Peer-to to-peer Networks Wolf-Tilo Balke and Wolf Siberski 3..6 *Original slides provided by K. Wehrle, S. Götz, S. Rieche (University of Tübingen) Peer-to-Peer Systems
More informationContent Overlays. Nick Feamster CS 7260 March 12, 2007
Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not
More informationCourse Curriculum for Master Degree in Network Engineering and Security
Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science
More information15-744: Computer Networking P2P/DHT
15-744: Computer Networking P2P/DHT Overview P2P Lookup Overview Centralized/Flooded Lookups Routed Lookups Chord Comparison of DHTs 2 Peer-to-Peer Networks Typically each member stores/provides access
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationPeer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006
Peer-to-Peer Protocols and Systems TA: David Murray 15-441 Spring 2006 4/19/2006 P2P - Outline What is P2P? P2P System Types 1) File-sharing 2) File distribution 3) Streaming Uses & Challenges 2 Problem:
More informationPeer-to-peer computing research a fad?
Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node
More informationComputer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019
Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationElectronic Payment Systems (1) E-cash
Electronic Payment Systems (1) Payment systems based on direct payment between customer and merchant. a) Paying in cash. b) Using a check. c) Using a credit card. Lecture 24, page 1 E-cash The principle
More informationFutureNet IV Fourth International Workshop on the Network of the Future, in conjunction with IEEE ICC
Sasu Tarkoma, Dmitriy Kuptsov, and Petri Savolainen Helsinki Institute for Information Technology University of Helsinki and Aalto University Pasi Sarolahti Aalto University FutureNet IV Fourth International
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 25 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer peer-to-peer systems overview
More informationProblems in Reputation based Methods in P2P Networks
WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics
More informationPeer- Peer to -peer Systems
Peer-to-peer Systems Brian Nielsen bnielsen@cs.aau.dk Client-Server Centralized Bottleneck Functional specialization Single point of failure Central administration NFS Client NFS Client NFS Server NFS
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer
More informationOverlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.
Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationCS 268: DHTs. Page 1. How Did it Start? Model. Main Challenge. Napster. Other Challenges
How Did it Start? CS : DHTs A killer application: Naptser - Free music over the Internet Key idea: share the content, storage and bandwidth of individual (home) users Scott Shenker and Ion Stoica April,
More information*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.
More informationLECT-05, S-1 FP2P, Javed I.
A Course on Foundations of Peer-to-Peer Systems & Applications LECT-, S- FPP, javed@kent.edu Javed I. Khan@8 CS /99 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer
More informationSearching for Shared Resources: DHT in General
1 ELT-53206 Peer-to-Peer Networks Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original
More informationSearching for Shared Resources: DHT in General
1 ELT-53207 P2P & IoT Systems Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original
More informationDynamo. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Motivation System Architecture Evaluation
Dynamo Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Leader Election 1/20 Outline Motivation 1 Motivation 2 3 Smruti R. Sarangi Leader
More informationThe Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla
The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -
More informationIndirect Communication
Indirect Communication Today l Space and time (un)coupling l Group communication, pub/sub, message queues and shared memory Next time l Distributed file systems xkdc Indirect communication " Indirect communication
More informationDistributed Knowledge Organization and Peer-to-Peer Networks
Knowledge Organization and Peer-to-Peer Networks Klaus Wehrle Group Chair of Computer Science IV RWTH Aachen University http://ds.cs.rwth-aachen.de 1 Organization of Information Essential challenge in?
More informationScalable P2P architectures
Scalable P2P architectures Oscar Boykin Electrical Engineering, UCLA Joint work with: Jesse Bridgewater, Joseph Kong, Kamen Lozev, Behnam Rezaei, Vwani Roychowdhury, Nima Sarshar Outline Introduction to
More informationDistributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017
Distributed Systems 16. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2017 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can
More informationEarly Measurements of a Cluster-based Architecture for P2P Systems
Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella
More informationCS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017
CS 43: Computer Networks BitTorrent & Content Distribution Kevin Webb Swarthmore College September 28, 2017 Agenda BitTorrent Cooperative file transfers Briefly: Distributed Hash Tables Finding things
More informationSecurity for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818
Security for Structured Peer-to-peer Overlay Networks By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 1 Acknowledgement Some of the following slides are borrowed from talks by Yun Mao
More informationHorizontal or vertical scalability? Horizontal scaling is challenging. Today. Scaling Out Key-Value Storage
Horizontal or vertical scalability? Scaling Out Key-Value Storage COS 418: Distributed Systems Lecture 8 Kyle Jamieson Vertical Scaling Horizontal Scaling [Selected content adapted from M. Freedman, B.
More informationIntroduction to P2P Computing
Introduction to P2P Computing Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Introduction A. Peer-to-Peer vs. Client/Server B. Overlay Networks 2. Common Topologies 3. Data Location 4. Gnutella
More informationLecture 8: Application Layer P2P Applications and DHTs
Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2018 Networking Laboratory P2P Applications Traditional P2P applications: for file sharing BitTorrent, Emule
More informationDistributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016
Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can
More informationL3S Research Center, University of Hannover
, University of Hannover Dynamics of Wolf-Tilo Balke and Wolf Siberski 21.11.2007 *Original slides provided by S. Rieche, H. Niedermayer, S. Götz, K. Wehrle (University of Tübingen) and A. Datta, K. Aberer
More informationLECTURE 3: CONCURRENT & DISTRIBUTED ARCHITECTURES
LECTURE 3: CONCURRENT & DISTRIBUTED ARCHITECTURES 1 Contents Introduction Flynn s Taxonomy MIMD: Tight & Loose Coupling Software Architectures for Distributed Systems: Layered, Object-/Event-based, Shared
More informationA Case For OneSwarm. Tom Anderson University of Washington.
A Case For OneSwarm Tom Anderson University of Washington http://oneswarm.cs.washington.edu/ With: Jarret Falkner, Tomas Isdal, Alex Jaffe, John P. John, Arvind Krishnamurthy, Harsha Madhyastha and Mike
More informationP2PNS: A Secure Distributed Name Service for P2PSIP
P2PNS: A Secure Distributed Name Service for P2PSIP Mobile P2P 2008, Hong Kong, China Outline Decentralized VoIP (P2PSIP) Peer-to-Peer name service (P2PNS) Architecture Two-stage name resolution P2PNS
More informationLarge-Scale Data Stores and Probabilistic Protocols
Distributed Systems 600.437 Large-Scale Data Stores & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Large-Scale Data Stores and Probabilistic Protocols Lecture 11
More informationDistributed Hash Table
Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationChord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications
: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashock, Frank Dabek, Hari Balakrishnan March 4, 2013 One slide
More informationPeer to Peer Systems and Probabilistic Protocols
Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good
More informationAn Expresway over Chord in Peer-to-Peer Systems
An Expresway over Chord in Peer-to-Peer Systems Hathai Tanta-ngai Technical Report CS-2005-19 October 18, 2005 Faculty of Computer Science 6050 University Ave., Halifax, Nova Scotia, B3H 1W5, Canada An
More informationAddressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?
Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems
More informationGNUnet Distributed Data Storage
GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview
More information