Peer-to-Peer Systems. Internet Computing Workshop Tom Chothia
|
|
- Tracy Walton
- 5 years ago
- Views:
Transcription
1 Peer-to-Peer Systems Internet Computing Workshop Tom Chothia
2 Plagiarism Reminder Plagiarism is a very serious offense. Never submit work by other people without clearly stating who wrote it. If you did this in a workplace you would be fired, and possibly prosecuted.
3 Getting Help with the Exercises Lab sessions: Get 1-1 help from a tutor. These are not being used: tutors are sitting in the labs waiting to help you. Your tutor at weekly meetings. Marco is running help sessions on Thursday at 12:30pm in Room 245 Reminder: you should be spending 20 hours a week on this module.
4 Today s Lecture Peer to Peer Systems Peer to Peer designs Napster Gnutella Bittorrent Smart Phone Programming Setting up Eclipse for Android.
5 Client Server Client-Server model: Works very well most of the time. But: Puts all the load on one server. If the server fails, so does everything else. Client Client Client Client Client Client Client Client Client
6 Peer to Peer No central server. Each peer acts as both a client and a server. Spreads the load. Many different kinds of P2P.
7 Types of P2P Network: Centralised / De-Centralised Centralized P2P has a coordinator that directs the activity of the peers. Using the coordinator makes starting and searching the network easy. The coordinator may control the network. Single point of failure. E.g. Napster, BBC iplayer (P2P version).
8 Types of P2P Network: Centralised / De-Centralised Decentralized P2P networks do not have a single coordinator. Much harder to set up. No single point of failure Better Privacy E.g. Gnutella
9 Types of P2P Network: Fully Connected Nodes connect to all other nodes. Makes message passing easy. Does not scalable.
10 Types of P2P Network: Not Fully Connected Nodes only connects to a few others. Most common. Scalable. Easy to maintain. Not as efficient.
11 File Sharing P2P Networks Napster: The first big file sharing network. Online between Central coordinator. Gnutella: Most popular file-sharing network in mid 2000s. No central coordinator. Unstructured Network. BitTorrent: Lots of little P2P networks. Single tracker coordinates each download. Rewards up-loaders.
12 Napster I Peer A asks the database for x. F x C x? A,E E H G E D B x? A x? x The database tells A which peer has the file. A downloads the file from that peer. A tells the database it has the file. Other peers can then download the file from A x? I have x
13 Napster User Figures
14 Gnutella First truly decentralised file-sharing network. Developed by Nullsoft in One day after launch Nullsoft parent company (AOL) stop the download. Many clients, including Limewire, Morpheus, BearShare, Limewire shut down by court order on Oct. 26 th 2010.
15 Original Gnutella In Gnutella, peers record the IP address of other peers. A searcher sends a request to all of its neighbours. A This is forwarded to all of there neighbours, up to a fixed number of hops.
16 Original Gnutella The search request includes A s IP address. Any peer with the requested file contacts A directly. A Peer A may then request the file.
17 Ultrapeers (UPs) Searches slow for huge networks. Nodes assigned as: Ultrapeers: 10s of connections to Ups Leaves: ~3 connections to Ups Ultrapeers maintain a Query Routing Table popular Queries can be sent directly to the right node.
18 Dealing with NAT/Firewalls One issue with any P2P networks is that many users are behind NAT or Firewalls. These users cannot accept incoming connections. In most home P2P networks only a small number peers accept incoming connections.
19 BitTorrent: Setting Up Tracker A Web Server T Peer A wants to share a find. A must find a tracker to coordinate the download. A T A makes a torrent file, The name of the file. The hash of the data. The IP address of the tracker. A must put the torrent somewhere people can find it. E.g., on a web server. A tells the tracker is wants to share the file.
20 BitTorrent: Sharing Tracker A,B Web Server T Peer B finds the torrent file. B finds the tracker IP and connects to it. T B A A The tracker: tells B the IP of the file sharers. And adds B address to the list of sharers B connects to A and then gets some pieces of the file.
21 BitTorrent: Sharing Tracker A, B,C Web Server T Peer C connects in the same way. A will try to hand out different copies of the file. T B A A may disconnect. T C A,B T D B,C A C may get the rest of the file from B. D can connect and the sharing continues without A.
22 Monitoring of file sharer Bittorrent is largely used for illegal file sharing. Some firms monitor torrents to find the IP address of the file sharers. Indirect monitoring: ask the tracker Direct monitoring: connect to a peer then record their IP
23 Indirect Monitoring Trackers will give out IP address Monitor repeatedly asks tracker for maximum number of peers Very unreliable Piatek et al. got a take down notice sent to their printer. Rumor that some trackers add random IP addresses.
24 Direct Monitoring Connecting directly to a peer provides some evidence that it really is file sharing. Monitors can be detected and therefore blocked. Ask TA Chris Novakovic, if you want more information.
25 Case Study: BBC s iplayer The BBC wants to provide TV programs via the Web. Streaming all that data costs a lot. Therefore the BBC tried out a peer-to-peer system for downloads. They used a centrally controlled coordinator and digital rights management.
26 Case Study: BBC s iplayer The idea is: If I m only downloading then I cost the BBC money (they pay for bandwidth). If I upload as much as I download then I cost the BBC very little. If I upload more than I download then I am providing a service for the BBC. In theory, a company can save millions.
27 Case Study: BBC s iplayer In fact: iplayer users like to stream TV, not download. The P2P system can t provide the exact information at the exact time to watch live. In December 2008 the BBC changed their download service to direct download via HTTP. Key point: P2P has great potential, but it has it s problems
28 Skype Skype uses private P2P system. Voice over IP system (VoIP). Where possible user connect directly to each other. Allows Skype to have over 500 million users. Skype clients for all major operating systems and smart phones.
29 Why Smart Phone Programming? Smart Phones many peoples main connection to the Internet. Smart phone apps are going to be big business. Good area for your M.Sc. projects.
30 Android vs. iphone Android: Open source smart phone platform from Google et al. Program in Java. Easy to get started. Open App store Most apps free iphone Closed source owned by Apple. Uses GUI tools and Objective C Need a certificate to run code on phones Apple controlled app store People pay for apps.
31 Other phone platforms Blackberry, Very secure, used by business, not much third party support. Windows Mobile Not very popular Symbian, Intelligent System Architecture (Nokia OS), Java ME Not so smart phones
32 Developing for Android Get Eclipse Get Android SDK index.html Install and configure the Eclipse Android plugin
Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:
PP Lecture 1 Peer-to-Peer Model March 16, 005 Overview: centralized database: Napster query flooding: Gnutella intelligent query flooding: KaZaA swarming: BitTorrent unstructured overlay routing: Freenet
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationFoothill-De Anza Community College District Wireless Networking Guidelines. Problems Connecting to or Using the Wireless Network
Foothill-De Anza Community College District Wireless Networking Guidelines Problems Connecting to or Using the Wireless Network My login name and password are not working. HELP! There are different wireless
More informationPEER-TO-PEER NETWORKS, DHTS, AND CHORD
PEER-TO-PEER NETWORKS, DHTS, AND CHORD George Porter May 25, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license
More informationPeer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables CS 240: Computing Systems and Concurrency Lecture 8 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Selected
More informationToday. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables COS 418: Distributed Systems Lecture 7 Today 1. Peer-to-Peer Systems Napster, Gnutella, BitTorrent, challenges 2. Distributed Hash Tables 3. The Chord Lookup
More informationLecture 17: Peer-to-Peer System and BitTorrent
CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and
More informationContent Search. Unstructured P2P
Content Search Unstructured P2P Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University *Partly adapted from original slides provided
More informationPeer-to-Peer Networks
Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week
More informationPeer-to-Peer Applications Reading: 9.4
Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,
More informationP2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies
P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play
More informationContent Search. Unstructured P2P. Jukka K. Nurminen
Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationPeer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006
Peer-to-Peer Protocols and Systems TA: David Murray 15-441 Spring 2006 4/19/2006 P2P - Outline What is P2P? P2P System Types 1) File-sharing 2) File distribution 3) Streaming Uses & Challenges 2 Problem:
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80
More informationScaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p?
Scaling Problem 15-441 Computer Networking Millions of clients server and network meltdown Lecture 23: Peer-Peer Systems Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 2 P2P System Why p2p?
More informationP2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems
P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationToday. Architectural Styles
Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationCMSC 332 Computer Networks P2P and Sockets
CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that
More informationChapter 2: Application layer
Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming
More informationCPSC156a: The Internet Co-Evolution of Technology and Society
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing Napster Client-Server Client 1 MP3-file 1 MP3-file 2 MP3-file n Interaction hello ack
More informationDistributed Hash Tables
Distributed Hash Tables CS6450: Distributed Systems Lecture 11 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University.
More informationArchitectures for distributed systems (Chapter 2)
Today Architectures for distributed systems (Chapter 2) Architectural styles Client-server architectures Decentralized and peer-to-peer architectures Lecture 2, page!1 Module 1: Architectural Styles Important
More informationUsing peer to peer. Marco Danelutto Dept. Computer Science University of Pisa
Using peer to peer Marco Danelutto Dept. Computer Science University of Pisa Master Degree (Laurea Magistrale) in Computer Science and Networking Academic Year 2009-2010 Rationale Two common paradigms
More informationDistributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201
Distributed Systems ID2201 peer-to-peer Johan Montelius 1 Idéa use resources in edge of network computing storage communication 2 Computing 3 seti@home central server millions of clients hundred of thousands
More informationToday. Architectural Styles
Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed
More informationCSCI-1680 P2P Rodrigo Fonseca
CSCI-1680 P2P Rodrigo Fonseca Based partly on lecture notes by Ion Stoica, Sco5 Shenker, Joe Hellerstein Today Overlay networks and Peer-to-Peer Motivation Suppose you want to write a routing protocol
More information3.2 COMMUNICATION AND INTERNET TECHNOLOGIES
3.2 COMMUNICATION AND INTERNET TECHNOLOGIES 3.2.1 PROTOCOLS PROTOCOL Protocol a set of rules governing the way that devices communicate with each other. With networks and the Internet, we need to allow
More informationExtreme Computing. BitTorrent and incentive-based overlay networks.
Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some
More informationEE 122: Peer-to-Peer Networks
EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer
More informationPeer-to-Peer Internet Applications: A Review
Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation
More informationVoIP/SIP: Economy and Mobility
Nowadays VoIP-services become more and more popular all over the world. VoIP stands for Voice Over Internet Protocol, a communications protocol that allows for telephonic communication via the Internet.
More informationOutline. Peer-to-Peer. P2p file-sharing. Wither p2p? What s out there? The p2p challenge C1: Search(human s goals) -> file
Outline Peer-to-Peer - pp file sharing techniques Downloading: Whole-file vs. chunks Searching Centralized index (Napster, etc.) Flooding (Gnutella, etc.) Smarter flooding (KaZaA, ) Routing (Freenet, etc.)
More information12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics
// Topics Peer to Peer Systems Introduction Client-server vs peer to peer Peer-to-peer networks Routing Overlays Structured vs unstructured Example PP Systems Skype login server Peer-to-peer - definitions
More informationDistributed Systems. 25. Distributed Caching & Some Peer-to-Peer Systems Paul Krzyzanowski. Rutgers University. Fall 2017
Distributed Systems 25. Distributed Caching & Some Peer-to-Peer Systems Paul Krzyzanowski Rutgers University Fall 2017 1 Caching Purpose of a cache Temporary storage to increase data access speeds Increase
More informationLast Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1
Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking
More informationCPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University
CPSC / PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet
More informationPage 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"
How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks
More informationUnit background and administrivia. Foundations of Peer-to- Peer Applications & Systems
A Course on Foundations of Peer-to-Peer Systems & Applications CS 6/75995 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer Science www.cs.kent.edu/~javed/class-p2p08/
More informationBitTorrent and CoolStreaming
BitTorrent and CoolStreaming Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen Aalto University P2P Networks BitTorrent
More informationAdvanced Computer Networks
Advanced Computer Networks P2P Systems Jianping Pan Summer 2007 5/30/07 csc485b/586b/seng480b 1 C/S vs P2P Client-server server is well-known server may become a bottleneck Peer-to-peer everyone is a (potential)
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 14.1.2013 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationSpotify Behind the Scenes
A Eulogy to P2P (?) Spotify gkreitz@spotify.com KTH, May 7 2014 What is Spotify? Lightweight on-demand streaming Large catalogue, over 20 million tracks 1 Available in 28 countries. Over 24 million active
More information17655: Discussion: The New z/os Interface for the Touch Generation
17655: Discussion: The New z/os Interface for the Touch Generation Thursday, August 13, 2015: 12:30 PM-1:30 PM Europe 2 (Walt Disney World Dolphin ) Speaker: Geoff Smith(IBM Corporation) 1 Trademarks The
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.
More informationFire Stick: The Ultimate Fire Stick User Guide - Learn How To Start Using Fire Stick, Plus Little-Known Tips And Tricks! (Streaming...
Fire Stick: The Ultimate Fire Stick User Guide - Learn How To Start Using Fire Stick, Plus Little-Known Tips And Tricks! (Streaming... TV Stick User Guide, How To Use Fire Stick) Ebooks Free Fire Stick
More informationManual Iphone 5 Bluetooth Not Working With Macbook Via
Manual Iphone 5 Bluetooth Not Working With Macbook Via Version 5. 13944 Views. Last Modified: Nov 17, 2014 4:50 PM. Bluetooth supports many different "Profiles", or methods of connecting BlueTooth The
More informationLocalhost: A browsable peer-to-peer file sharing system
Localhost: A browsable peer-to-peer file sharing system Aaron Harwood and Thomas Jacobs December 17, 2005 Abstract Peer-to-peer (P2P) file sharing is increasing in use on the Internet. This thesis proposes
More informationP2P content distribution
P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer
More informationGame Theory. Presented by Hakim Weatherspoon
Game Theory Presented by Hakim Weatherspoon Game Theory Main Question: Can we cheat (and get away with it)? BitTorrent P2P file distribution tool designed with incentives for contribution Users contribute
More informationFile Transfer: Basics and Best Practices. Joon Kim. Ph.D. PICSciE. Research Computing 09/07/2018
File Transfer: Basics and Best Practices Joon Kim. Ph.D. PICSciE Research Computing Workshop @Chemistry 09/07/2018 Our goal today Learn about data transfer basics Pick the right tool for your job Know
More informationOverlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen
Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationDistributed Systems COMP 212. Lecture 14 Othon Michail
Distributed Systems COMP 212 Lecture 14 Othon Michail Architectures & Processes 2/31 Client-Server Model 3/31 Clients and Servers Processes are divided into Servers: implementing a specific service e.g.,
More informationUseNet and Gossip Protocol
CPSC 426/526 UseNet and Gossip Protocol Ennan Zhai Computer Science Department Yale University Recall: Lec-1 Understanding: - Distributed systems vs. decentralized systems - Why we need both? red P2P network
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 13.1.2014 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationIan Clarke Oskar Sandberg
Ian Clarke is the architect and coordinator of The Freenet Project, and the Chief Executive Officer of Cematics Ltd, a company he founded to realise commercial applications for the Freenet technology.
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer
More informationImplementation of the Gnutella Protocol
ENSC 427: COMMUNICATION NETWORKS FINAL PROJECT PRESENTATIONS Spring 2010 Implementation of the Gnutella Protocol Group #7 Zhiyu Hu Yuyuan Liu Email: yla41@sfu.ca zyh@sfu.ca Webpage: http://www.sfu.ca/~yla41/
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationIntroduction Data Structures Nick Smallbone
Introduction Data Structures Nick Smallbone Course organisation Lecturer: Nick Smallbone (me) nicsma@chalmers.se Course assistants: Nachiappan Valliappan (nacval@chalmers.se) Adi Hrustic (hrustic@student.chalmers.se)
More informationInternet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!
Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams
More informationENSC 835: HIGH-PERFORMANCE NETWORKS CMPT 885: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS. Scalability and Robustness of the Gnutella Protocol
ENSC 835: HIGH-PERFORMANCE NETWORKS CMPT 885: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Scalability and Robustness of the Gnutella Protocol Spring 2006 Final course project report Eman Elghoneimy http://www.sfu.ca/~eelghone
More informationComputer Basics: Step-by-Step Guide (Session 2)
Table of Contents Computer Basics: Step-by-Step Guide (Session 2) ABOUT PROGRAMS AND OPERATING SYSTEMS... 2 THE WINDOWS 7 DESKTOP... 3 TWO WAYS TO OPEN A PROGRAM... 4 DESKTOP ICON... 4 START MENU... 5
More informationCS December 2017
Caching Distributed Systems 25. Distributed Caching & Some Peer-to-Peer Systems Paul Krzyzanowski Rutgers University Fall 2017 Purpose of a cache Temporary storage to increase data access speeds Increase
More informationData Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi.
Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 18 Tries Today we are going to be talking about another data
More informationLecture 8: Application Layer P2P Applications and DHTs
Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationAzureus Plugin for Facebook Integration
Azureus Plugin for Facebook Integration Mike House-Vording, 100300955 mhvordin@connect.carleton.ca 1. Introduction This project seeks to integrate two major trends currently taking place on the internet:
More informationMobile OS Landscape. Agenda. October Competitive Landscape Operating Systems. iphone BlackBerry Windows Mobile Android Symbian
Mobile OS Landscape October 2008 Agenda Competitive Landscape Operating Systems iphone BlackBerry Windows Mobile Android Symbian 2 Smartphone OS Competitive Landscape iphone OS (Apple) BlackBerry OS (RIM)
More informationHow Do I Delete Multiple Text Messages On My
How Do I Delete Multiple Text Messages On My Iphone 5 Oct 4, 2014. I have reset all settings and rebooted multiple times. The only resolution I have found is to shut my phone down and restart it, but this
More informationOutside the Box: Networks and The Internet
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationPeer to Peer Systems and Probabilistic Protocols
Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good
More informationBut in the absence of a campus-wide solution, we have to get creative about how we do it.
HOW TO SESSION : Creating weekly audio and/or video journals for students to track progress Overview How great would it be for students to have a record of their language learning (audio or video) from
More informationWhat Is Voice SEO and Why Should My Site Be Optimized For Voice Search?
What Is Voice SEO and Why Should My Site Be Optimized For Voice Search? Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a
More informationPeer-to-Peer (P2P) Systems
Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed
More informationDiploma Thesis Collaborative Data Processing on Mobile Handsets Jan Kettner. Examiner: Prof. Dr. Mesut Günes Tutor: Georg Wittenburg, M. Sc.
Diploma Thesis Collaborative Data Processing on Mobile Handsets Jan Kettner Examiner: Prof. Dr. Mesut Günes Tutor: Georg Wittenburg, M. Sc. 04.10.2010 Overview Motivation Smartphone OS (Android) Peer-to-Peer
More informationInside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More information1(11) Peer to peer networking
1(11) Peer to peer networking Carl Berg calle.berg@gmail.com Chalmers 2005 2(11) Table of contents Introduction Abstract 3 History 4 Technical overview 5 Comparison to the client/server approach 6 Requirements
More informationComputer Science 461 Final Exam May 22, :30-3:30pm
NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationCS Paul Krzyzanowski
Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide
More informationA Take Phone Contact Dialer
A Take Phone Contact Dialer search Fast & atakephone changes the way you use your phone - T9 smart search, easy favorites, call-log and a dial-by-photo! Accu Dial An ultimate dialer with Google Voice dialing
More informationIntroduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks The Story of Peer-to-Peer The Nature of Peer-to-Peer: Generals & Paradigms Unstructured Peer-to-Peer Systems Sample Applications 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt
More informationIphone Setting Privacy Microphone Viber Set To On >>>CLICK HERE<<<
Iphone Setting Privacy Microphone Viber Set To On In privacy setting i don't find facetime accessing microphone. iphone 4S Again while using viber, if I set it to loud speaker, rare end doesn't hear my
More informationPeer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today
Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become
More informationOverlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example
Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization
More informationCSC 4900 Computer Networks: P2P and Sockets
CSC 4900 Computer Networks: P2P and Sockets Professor Henry Carter Fall 2017 Recap SMTP is the language that mail servers use to exchange messages. SMTP is push-based... why? You can run SMTP from a telnet
More informationIntroduction to Computer Networks
Introduction to Computer Networks Tian Song ( 嵩天 ), Ph.D., Assoc. Prof. songtian@bit.edu.cn Introduction to Computer Networks P2P, CDN, DTN and Overlay Tian Song ( 嵩天 ), Ph.D., Assoc. Prof. songtian@bit.edu.cn
More informationPeer-to-Peer Signalling. Agenda
Peer-to-Peer Signalling Marcin Matuszewski marcin@netlab.hut.fi S-38.115 Signalling Protocols Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction Peer-to-Peer (P2P) is a communications
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 12.1.2015 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationPeer-to-Peer Architectures and Signaling. Agenda
Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction
More informationProfile Can't Be Found Jenkins
Iphone Books Code Sign Error Provisioning Profile Can't Be Found Jenkins Code signing is required for product type Unit Test Bundle in SDK ios 8.0 profile accordingly, installed both, but can't get past
More informationPeer-to-peer & Energy Consumption
Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science
More informationPeer-to-Peer Secure Update for Heterogeneous Edge Devices
Peer-to-Peer Secure Update for Heterogeneous Edge Devices E. Band, H. Herry, C. Perkins, J. Singer School of Computing Science University of Glasgow 1 FRµIT: Federated RaspberryPi µ-infrastructure Testbed
More informationIntroduction to Peer-to-Peer Systems
Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed
More information