ACN Peer-to-Peer Networks. Günther Langmann
|
|
- Christiana Clark
- 5 years ago
- Views:
Transcription
1 ACN 2007 Peer-to-Peer Networks Günther Langmann
2 Content What are P2P Networks Properties of P2P Networks History of P2P Networks Classifications Comparison Unstructured and structured P2P Networks Advantages of P2P Networks Attacks on P2P Networks Networks, Protocols and Applications Multi-Network Applications Problems of P2P Networks P2P Networks 2
3 What are P2P Networks A P2P Network differs from the client-server model. The peer nodes can be both clients and servers to the other nodes on the network. P2P networks are typically used for connecting nodes via largely ad hoc connections. The most important P2P applications depends on Sharing content files which containing audio, video or data. Real-time data, such as telephony traffic, is also passed using P2P technology. P2P Networks 3
4 Properties of P2P Networks Direct data exchange between peers Peers have both: client and server functionality Self-government about data disposition P2P Networks 4
5 History of P2P Networks Earliest widespread P2P Network: Usenet news server System. Napster (1999) -> download of the Year P2P Network with central data Gnutella Every peer has a list of its neighbours Better, because no central data needed Bittorrent No search function... P2P Networks 5
6 Classifications I according to their degree of centralization Pure or decentralized P2P Networks: The peers acts as equal No central server will be found for managing the network No central router e.g. KaZaA P2P Networks 6
7 Classifications II Hybrid P2P Networks: The information about the peers is kept from an central server which responds to requests for that information As the central server does not have the information about hosting the available resources the peers are responsible for letting the server know what resources they want to share. A set of indices provides the absolute address to the route terminals. e.g. JXTR P2P Networks 7
8 Classifications III Centralised P2P Networks: The information about where to get the resources is provided by a server e.g. Napster P2P Networks 8
9 Comparison What are the advantages and disadvantages? P2P Networks 9
10 Unstructured and structured P2P Networks I The P2P Overlay Network consists of all nodes in the network. There are links between all the nodes. Based on the organisation of the links they can be classified in unstructured and structured P2P networks. unstructured P2P networks: the overlay links are established arbitrarily to join such a network a new peer has only to copy the information about existing links and form its own link over time to find data in the network, the query has to be flooded through the network and will not always be resolved popular data can be found easily but the search for rare data is often unsuccessful P2P Networks 10
11 Unstructured and structured P2P Networks II structured P2P networks: structured P2P networks use a globally consistent protocol they also find extremely rare data most common type is the distributed hash table (DHT) P2P Networks 11
12 Advantages of P2P Networks All peers provides resources: Bandwidth Storage space Computing power Every new peer which merge to the network make it stronger and bigger In pure P2P Networks there is no single point of failure P2P Networks 12
13 Attacks on P2P Networks I P2P network are under constant attack. The motives of the attackers varies. poisoning attacks: providing files whose contents are different from the description polluting attacks: inserting "bad" chunks/packets into an otherwise valid file on the network defection attacks: The use of the network by users or software without sharing resources with it P2P Networks 13
14 Attacks on P2P Networks II virus attack: insertion of viruses or other malware to carried data malware attack: malware in the peer-to-peer network software itself (e.g. distributed software may contain spyware) denial of service attacks: these attacks may make the network very slow filtering attacks: prevent data from being carried P2P Networks 14
15 Attacks on P2P Networks III identity attacks: tracking down the users of the network and attacking them spamming attack: sending unsolicited information across the network P2P Networks 15
16 Networks, Protocols and Applications I Many different networks, protocols and applications some applications work with more than one network P2P Networks 16
17 Networks, Protocols and Applications II Ares BitTorrent Cspace Direct Connect Domain Name System Edonkey FastTrack Freenet GNUnet Gnutella Network or Protocol Applications Ares Galaxy, Warez P2P ABC, AllPeers, Azureus, BitComet, BitLord, BitSpirit, BitTornado, BitTorrent, Burst!, FlashGet, G3 Torrent, Halite, KTorrent, MLDonkey, mlmac, Opera, QTorrent, Shareaza, Transmission, Tribler, µtorrent a peer-to-peer based communications system DC++, NeoModus Direct Connect, BCDC++, ApexDC++, StrongDC++ abc, AllPeers, Azureus, BitComet, BitLord, BitSpirit, BitTornado, BitTorrent, Burst!, FlashGet, G3 Torrent, Halite, KTorrent, MLDonkey, mlmac, Opera, QTorrent, Shareaza, Transmission, Tribler, µtorrent gift, Grokster, imesh (and its variants stripped of adware including imesh Light), Kazaa (and its variants stripped of adware such as Kazaa Lite), KCeasy, Mammoth, MLDonkey, mlmac, Poisoned Entropy (on its own network), Freenet GNUnet, (GNUnet-gtk) Acquisition, BearShare, Cabos, Gnucleus, Grokster, imesh, gtk-gnutella, Kiwi Alpha, LimeWire, FrostWire, MLDonkey, mlmac, Morpheus, Phex, Poisoned, Swapper, Shareaza, XoloX P2P Networks 17
18 Networks, Protocols and Applications III Network or Protocol Gnutella2 Kad Network MANOLITO/MP2P Krawler MFPnet Napster P2PTV Peercasting Retroshare Usenet Windows Peer-to- Peer WPNP Applications Adagio, Caribou, Gnucleus, imesh, Kiwi Alpha, MLDonkey, mlmac, Morpheus, Shareaza, TrustyFiles amule, emule, MLDonkey Blubster, Piolet Krawler[x] Amicina Napigator, OpenNap, WinMX TVUPlayer, Joost, CoolStreaming, Cybersky-TV, TVants, PPLive PeerCast, IceShare, FreeCast, PeerStream, Rawflow Retroshare serverless Filesharing with Chat Messenger Many different news clients Advanced Networking Pack for Windows XP,Windows XP SP2,Windows Vista WinMX P2P Networks 18
19 Multi-Network Applications Applications Network or Protocol Operating systems License amule edonkey network, FastTrack, Gnutella Cross-platform GPL emule edonkey network, Kad network Windows GPL FileScope edonkey network, Gnutella, Gnutella2, OpenNAP Cross-platform GPL gift edonkey network, FastTrack, Gnutella Cross-platform GPL Gnucleus Gnutella, Gnutella2 Windows GPL imesh FastTrack, edonkey network, Gnutella, Gnutella2 Windows KCeasy Ares, FastTrack, Gnutella, OpenFT Windows GPL Kiwi Alpha Gnutella, Gnutella2 Windows MLDonkey BitTorrent, Direct Connect, edonkey network, FastTrack, Gnutella, Gnutella2, Kad Network, Cross-platform GPL OpenNap, SoulSeek, HTTP/FTP Morpheus NEO Network, Gnutella, Gnutella2, BitTorrent Windows Napshare Key network, MUTE network Linux, Windows GPL Shareaza BitTorrent, edonkey, Gnutella, Gnutella2 Windows GPL Zultrax Gnutella, ZEPP Windows P2P Networks 19
20 Problems of P2P Networks many applications and networks legality problems (copyright infringement) many attacks are possible security problems P2P Networks 20
21 Questions Explain the Classifications of P2P Network. What attacks against P2P Networks to you know? P2P Networks 21
22 Thank you for your attention! P2P Networks 22
If you need further assistance in disabling file sharing or your software isn t listed below please contact the IT Help Desk at ext
Use these instructions as a guide for disabling your client. The only way to ensure total compliance with copyright laws is to completely uninstall sharing applications. Use peer-to-peer (P2P) software
More information12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics
// Topics Peer to Peer Systems Introduction Client-server vs peer to peer Peer-to-peer networks Routing Overlays Structured vs unstructured Example PP Systems Skype login server Peer-to-peer - definitions
More informationPeer-to-Peer Internet Applications: A Review
Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation
More informationTable of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall
Table of Contents Blocking Peer to Peer File Sharing Programs with the PIX Firewall...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...2 PIX Configuration...2 Blubster/Piolet
More informationPricing of Mobile Peer-to-Peer application
Pricing of Mobile Peer-to-Peer application 20 March 2003 Yang Qiu Helsinki University of Technology yangqiu@cc.hut.fi Abstract This paper analyzes the pricing of fixed and mobile peer-to-peer application.
More informationPeer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K.
Peer-to-peer T-110.7100 Applications and Services in Internet, Fall 2009 Jukka K. Nurminen 1 V1-Filename.ppt / 2008-10-22 / Jukka K. Nurminen Schedule Tue 15.9.2009 12-14 Tue 22.9.2009 12-14 Introduction
More informationBitTorrent. Internet Technologies and Applications
BitTorrent Internet Technologies and Applications Aims and Contents Aims Show benefits of P2P for file downloads Explain concepts of BitTorrent as a P2P file sharing application Show how BitTorrent protocol
More informationINTERNET USAGE GUIDE. Revised 08/12/15
INTERNET USAGE GUIDE Revised 08/12/15 Introduction Your building is being supplied with Internet connectivity. We hope you will enjoy the always-on Internet connection. This connectivity is not meant to
More informationTaxonomy of P2P Applications
Taxonomy of P2P Applications E.H.T.B. Brands and G. Karagiannis University of Twente, the Netherlands e.h.t.b.brands@student.utwente.nl, g.karagiannis@utwente.nl Abstract Peer-to-peer (p2p) networks have
More informationCPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University
CPSC / PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet
More informationPreventing Illegal Peer-to-Peer (P2P) Traffic Using SafeMedia s Clouseau
Preventing Illegal Peer-to-Peer (P2P) Traffic Using SafeMedia s Clouseau A WHITE PAPER Perambur Neelakanta, PhD., C.Eng., Fellow IEE Mahesh Neelakanta, M.S. Abstract: The global presence of Peer-to-Peer
More informationINTERNET USAGE GUIDE. CIC Phone Number:
INTERNET USAGE GUIDE CIC Phone Number: 734-531-0148 http://www.collegeic.net http://twitter.com/collegeic Revised 11/16/2016 Introduction Many of the Prime Student Housing, Inc. buildings are being supplied
More informationKeywords p2p, applications, taxonomy, characteristics
Taxonomy of p2p applications E.H.T.B. Brands Faculty of Management and Governance University of Twente, the Netherlands e.h.t.b.brands@student.utwente.nl ABSTRACT Peer-to-peer (p2p) networks have gained
More informationForeScout CounterACT. Endpoint Support Compatibility Matrix. Updated: October 2018
ForeScout CounterACT Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility... 3
More informationContent Search. Unstructured P2P
Content Search Unstructured P2P Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University *Partly adapted from original slides provided
More informationCounterACT HPS Applications Plugin
CounterACT HPS Applications Plugin Version 2.1.4 Table of Contents About the HPS Applications Plugin... 3 Requirements... 3 Installation... 4 Configuration... 4 Working with Endpoint Information... 4 Detect
More informationRiver Rain Apartments INTERNET USAGE GUIDE. Revised 12/09/15
River Rain Apartments INTERNET USAGE GUIDE Revised 12/09/15 Introduction The River Rain Apartment buildings are being supplied with Internet connectivity. We hope you will enjoy the always-on Internet
More information1(11) Peer to peer networking
1(11) Peer to peer networking Carl Berg calle.berg@gmail.com Chalmers 2005 2(11) Table of contents Introduction Abstract 3 History 4 Technical overview 5 Comparison to the client/server approach 6 Requirements
More informationUnit background and administrivia. Foundations of Peer-to- Peer Applications & Systems
A Course on Foundations of Peer-to-Peer Systems & Applications CS 6/75995 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer Science www.cs.kent.edu/~javed/class-p2p08/
More informationCPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University
CPSC 4/5 PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet
More informationContent Search. Unstructured P2P. Jukka K. Nurminen
Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd
More informationLocalhost: A browsable peer-to-peer file sharing system
Localhost: A browsable peer-to-peer file sharing system Aaron Harwood and Thomas Jacobs December 17, 2005 Abstract Peer-to-peer (P2P) file sharing is increasing in use on the Internet. This thesis proposes
More informationLecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:
PP Lecture 1 Peer-to-Peer Model March 16, 005 Overview: centralized database: Napster query flooding: Gnutella intelligent query flooding: KaZaA swarming: BitTorrent unstructured overlay routing: Freenet
More informationExcogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks
Excogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks Bollimuntha Kishore Babu #1, Divya Vadlamudi #2, Movva
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.
More informationAdvanced Internet Architectures
Advanced Internet Architectures Carlos Borrego Iglesias Carlos.Borrego@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Tecnologies avançades d
More informationPeer-to-peer & Energy Consumption
Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science
More informationPeer-to-Peer Behaviour Detection by TCP Flows Analysis
UNIVERSITY OF LIÈGE Faculty of Applied Sciences Peer-to-Peer Behaviour Detection by TCP Flows Analysis CYRIL SOLDANI Academic year 2003 2004 Peer-to-Peer Behaviour Detection by TCP Flows Analysis CYRIL
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationStudy and analysis on Optimal scheduling Data-Driven Peer-to-Peer Streaming
Study and analysis on Optimal scheduling Data-Driven Peer-to-Peer Streaming 1 B.Kundan 2 D.Jamuna Abstract: We propose a new architecture for on-demand media streaming centered around the peer-to-peer
More informationPeer-to-peer systems and overlay networks
Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems
More informationBitTorrent and CoolStreaming
BitTorrent and CoolStreaming Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen Aalto University P2P Networks BitTorrent
More informationCPSC156a: The Internet Co-Evolution of Technology and Society
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing Napster Client-Server Client 1 MP3-file 1 MP3-file 2 MP3-file n Interaction hello ack
More informationPeer-to-Peer Applications Reading: 9.4
Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /
More informationP2P content distribution
P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationDistributed Knowledge Organization and Peer-to-Peer Networks
Knowledge Organization and Peer-to-Peer Networks Klaus Wehrle Group Chair of Computer Science IV RWTH Aachen University http://ds.cs.rwth-aachen.de 1 Organization of Information Essential challenge in?
More information- Content Security in P2P
Why Jenny can t share the content with Jane? - Content Security in P2P Heather Yu Huawei Technologies heathery@ieee.org Future of Networked Home A vision voice video text Data gaming IPTV streaming IM
More informationLast Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1
Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2018 Networking Laboratory P2P Applications Traditional P2P applications: for file sharing BitTorrent, Emule
More informationSecurity Industry Market Share Analysis
Security Industry Market Share Analysis March 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes
More informationUnit 8 Peer-to-Peer Networking
Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System
More informationFile Sharing in Less structured P2P Systems
File Sharing in Less structured P2P Systems. Bhosale S.P. 1, Sarkar A.R. 2 Computer Science And Engg. Dept., SVERI s College of Engineering Pandharpur Solapur, India1 Asst.Prof, Computer Science And Engg.
More informationDistributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201
Distributed Systems ID2201 peer-to-peer Johan Montelius 1 Idéa use resources in edge of network computing storage communication 2 Computing 3 seti@home central server millions of clients hundred of thousands
More informationof viruses, spywares, ad ware, malware through file sharing applications.
An Efficient Architecture for Consistency Maintenance and Peer Synchronization in Distributed Systems Bollimuntha Kishore Babu 1 and Attaluri Rajesh 2 M.Tech (CNS), Green Fields, K.L.Univerisity, Vijayawada,
More informationPeer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006
Peer-to-Peer Protocols and Systems TA: David Murray 15-441 Spring 2006 4/19/2006 P2P - Outline What is P2P? P2P System Types 1) File-sharing 2) File distribution 3) Streaming Uses & Challenges 2 Problem:
More informationA Resource Exchange Architecture for Peer-to-Peer File Sharing Applications
The Computer Journal Vol. 48 No. 1 The British Computer Society 2005; all rights reserved DOI:10.1093/comjnl/bxh055 A Resource Exchange Architecture for -to- File Sharing Applications Chung-Ming Huang
More informationToday s Objec2ves. Kerberos. Kerberos Peer To Peer Overlay Networks Final Projects
Today s Objec2ves Kerberos Peer To Peer Overlay Networks Final Projects Nov 27, 2017 Sprenkle - CSCI325 1 Kerberos Trusted third party, runs by default on port 88 Security objects: Ø Ticket: token, verifying
More informationP2P content distribution Jukka K. Nurminen
P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient
More informationPeer-to-Peer Systems. Internet Computing Workshop Tom Chothia
Peer-to-Peer Systems Internet Computing Workshop Tom Chothia Plagiarism Reminder Plagiarism is a very serious offense. Never submit work by other people without clearly stating who wrote it. If you did
More informationP2P Networks - General
P2P Networks-General Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen 137/09/2013 Aalto University P2P
More informationEECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations
EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley
More informationPeer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer
Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer evyncke@cisco.com 2002, Cisco Systems, Inc. All rights reserved. 1 Agenda Introduction to peer to peer
More informationPublic Domain P2P File-sharing Networks Measurements and Modeling
Public Domain PP File-sharing Networks Measurements and ing Jaime Lloret 1, Juan R. Diaz, Jose M. Jimenez 3 and Fernando Boronat 4 Department of Communications, Polytechnic University of Valencia (Spain)
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationOutline. Peer-to-Peer. P2p file-sharing. Wither p2p? What s out there? The p2p challenge C1: Search(human s goals) -> file
Outline Peer-to-Peer - pp file sharing techniques Downloading: Whole-file vs. chunks Searching Centralized index (Napster, etc.) Flooding (Gnutella, etc.) Smarter flooding (KaZaA, ) Routing (Freenet, etc.)
More informationScaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p?
Scaling Problem 15-441 Computer Networking Millions of clients server and network meltdown Lecture 23: Peer-Peer Systems Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 2 P2P System Why p2p?
More informationThe Index Poisoning. Sharing Systems Mehmet Aslan Hacettepe Üniversitesi
The Index Poisoning Attack in P2P File Sharing Systems Mehmet Aslan Hacettepe Üniversitesi mehmetaslan@cs.hacettepe.edu.tr Introduction Pollution attack corrupt target content, make unusable, share 50%-80%
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationOverlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.
Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University
More informationA Study on Anonymous P2P Networks and their Vulnerabilities
DEPARTMENT OF APPLIED PHYSICS AND ELECTRONICS UMEÅ UNIVERISTY, SWEDEN DIGITAL MEDIA LAB A Study on Anonymous P2P Networks and their Vulnerabilities Dharma Reddy Manda e-mail: dhma0001@student.umu.se SUPERVISOR:
More informationTopic # 06. Software Architectural Design. (Ch. 9)
Topic # 06 Software Architectural Design (Ch. 9) 1 The goal of the architectural model is to allow the software engineer to view and evaluate the system as a whole (as a single unit) before moving to component
More informationOverview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste
Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall
More informationCPS 214: Computer Networks and Distributed Systems Networked Environments: Grid and P2P systems
CPS 214: Computer Networks and Distributed Systems Networked Environments: Grid and P2P systems Anda Iamnitchi anda@cs.duke.edu Class Objectives Start thinking of computer networking issue from the perspective
More informationExtreme Computing. BitTorrent and incentive-based overlay networks.
Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some
More informationResilient Networking. 6: Resilient Peer-to-Peer Networking Thorsten Strufe. What is P2P? Types of P2P Systems P2P Security
6: Resilient Peer-to-Peer Networking Thorsten Strufe What is P2P? Types of P2P Systems P2P Security How do you define peer-to-peer? 2 What do you consider to be the main problems? 3 What do you think are
More informationContent Filtering. Multiple Subnet
RS-2500 Dual WAN Security Gateway Web / SSL Server IPSec / PPTP Server Application Blocking for IM, P2P, Webmail, Video/Audio, Game, Tunnel and Remote Control applications Content Blocking for URL, Scripts,
More informationPeer-to-Peer Data Management. Hans-Dieter Ehrich Institut für Informationssysteme Technische Universität Braunschweig
Peer-to-Peer Data Management Hans-Dieter Ehrich Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 7. Unstructured P2P Networks The transparencies of this
More informationIJITKM Special Issue (ICFTEM-2014) May 2014 pp (ISSN )
Security Enhancement Technique In Peer to Peer Network: A Review Varun Chanana 1, Sandeep Kumar 2, Ravikat Jaiswal 3 1,2,3 Department of CSE,Ganpati Institute of Technology and Management,Bilaspur,Yamunanagar
More informationPeer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today
Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become
More informationGNUnet Distributed Data Storage
GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview
More informationPeer-to-peer networks: pioneers, self-organisation, small-world-phenomenons
Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Patrick Baier October 10, 2008 Contents 1 Introduction 1 1.1 Preamble.................................... 1 1.2 Definition....................................
More informationPeer-to-Peer Overlays: Issues and Trends
International Journal of Computer Applications (9 888) International Conference on Computing and information Technology (ICIT-) Peer-to-Peer Overlays: Issues and Trends P. Arockia Mary Department of Information
More informationIntroduction to Peer-to-Peer Systems
Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks
More informationP2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies
P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play
More informationA reputation system for BitTorrent peer-to-peer filesharing
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2006 A reputation system for BitTorrent peer-to-peer filesharing
More informationIntrusion Detection and Prevention System (IPS) Technology, Applications, and Trend
Intrusion Detection and Prevention System (IPS) Technology, Applications, and Trend Dr. Nen-Fu (Fred) Huang Professor, Department of Computer Science, National Tsing Hua University, Taiwan President, Broadweb
More informationPeer-to-Peer (P2P) Systems
Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed
More informationPeer-to-Peer Architectures and Signaling. Agenda
Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction
More informationAdvanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems
Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems
More informationDISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES
DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application
More informationOutline. P2P and Content Distribution. P2P Definitions. More Definitions. P2P is not new. P2P Definitions. P2P Overview P2P systems P2P and DRM
P2P and Content Distribution ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Outline P2P Overview P2P systems P2P and DRM Some slides of this talk are provided
More informationOverlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen
Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationFlooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9
Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer
More informationPeer-to-Peer Botnet Detection Using NetFlow. Connor Dillon
Peer-to-Peer Botnet Detection Using NetFlow Connor Dillon System and Network Engineering University of Amsterdam Master thesis presentation, July 3 rd 2014 Supervisor: Pepijn Janssen RedSocks Botnets Large
More informationOssification of the Internet
Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major
More informationP2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems
P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically
More informationThe use of rare key indexing for distributed web search. MSc thesis by Koen Tinselboer
The use of rare key indexing for distributed web search MSc thesis by Koen Tinselboer Abstract In the last few years we have seen a rise in the of peer-to-peer applications in areas like file sharing [1][2][3].
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationMaking Gnutella-like P2P Systems Scalable
Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems
More informationOverlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q
Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationNetEnforcer E5.7.0 AC-400/800 Series
Software Release Notes Version 1 NetEnforcer E5.7.0 AC-400/800 Series P/N D211047 This document details new features, known issues and clarifications concerning NetEnforcer software version E5.7.0. This
More informationMiddleware and Distributed Systems. Peer-to-Peer Systems. Peter Tröger
Middleware and Distributed Systems Peer-to-Peer Systems Peter Tröger Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers) Each
More informationFast Traffic Tactics
TRAFFIC TACTICS VOLUME #2: Fast Traffic Tactics Special Report (F): Peer-to-Peer Network Tactics Legal Notice: The Publisher has strived to be as accurate and complete as possible in the creation of this
More informationIntroduction on Peer to Peer systems
Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr dacosta@irit.fr 1/55 Goal of this Lecture What can P2P do, not only as a buzzword What it can't do Shows some examples & algorithms
More information