ACN Peer-to-Peer Networks. Günther Langmann

Size: px
Start display at page:

Download "ACN Peer-to-Peer Networks. Günther Langmann"

Transcription

1 ACN 2007 Peer-to-Peer Networks Günther Langmann

2 Content What are P2P Networks Properties of P2P Networks History of P2P Networks Classifications Comparison Unstructured and structured P2P Networks Advantages of P2P Networks Attacks on P2P Networks Networks, Protocols and Applications Multi-Network Applications Problems of P2P Networks P2P Networks 2

3 What are P2P Networks A P2P Network differs from the client-server model. The peer nodes can be both clients and servers to the other nodes on the network. P2P networks are typically used for connecting nodes via largely ad hoc connections. The most important P2P applications depends on Sharing content files which containing audio, video or data. Real-time data, such as telephony traffic, is also passed using P2P technology. P2P Networks 3

4 Properties of P2P Networks Direct data exchange between peers Peers have both: client and server functionality Self-government about data disposition P2P Networks 4

5 History of P2P Networks Earliest widespread P2P Network: Usenet news server System. Napster (1999) -> download of the Year P2P Network with central data Gnutella Every peer has a list of its neighbours Better, because no central data needed Bittorrent No search function... P2P Networks 5

6 Classifications I according to their degree of centralization Pure or decentralized P2P Networks: The peers acts as equal No central server will be found for managing the network No central router e.g. KaZaA P2P Networks 6

7 Classifications II Hybrid P2P Networks: The information about the peers is kept from an central server which responds to requests for that information As the central server does not have the information about hosting the available resources the peers are responsible for letting the server know what resources they want to share. A set of indices provides the absolute address to the route terminals. e.g. JXTR P2P Networks 7

8 Classifications III Centralised P2P Networks: The information about where to get the resources is provided by a server e.g. Napster P2P Networks 8

9 Comparison What are the advantages and disadvantages? P2P Networks 9

10 Unstructured and structured P2P Networks I The P2P Overlay Network consists of all nodes in the network. There are links between all the nodes. Based on the organisation of the links they can be classified in unstructured and structured P2P networks. unstructured P2P networks: the overlay links are established arbitrarily to join such a network a new peer has only to copy the information about existing links and form its own link over time to find data in the network, the query has to be flooded through the network and will not always be resolved popular data can be found easily but the search for rare data is often unsuccessful P2P Networks 10

11 Unstructured and structured P2P Networks II structured P2P networks: structured P2P networks use a globally consistent protocol they also find extremely rare data most common type is the distributed hash table (DHT) P2P Networks 11

12 Advantages of P2P Networks All peers provides resources: Bandwidth Storage space Computing power Every new peer which merge to the network make it stronger and bigger In pure P2P Networks there is no single point of failure P2P Networks 12

13 Attacks on P2P Networks I P2P network are under constant attack. The motives of the attackers varies. poisoning attacks: providing files whose contents are different from the description polluting attacks: inserting "bad" chunks/packets into an otherwise valid file on the network defection attacks: The use of the network by users or software without sharing resources with it P2P Networks 13

14 Attacks on P2P Networks II virus attack: insertion of viruses or other malware to carried data malware attack: malware in the peer-to-peer network software itself (e.g. distributed software may contain spyware) denial of service attacks: these attacks may make the network very slow filtering attacks: prevent data from being carried P2P Networks 14

15 Attacks on P2P Networks III identity attacks: tracking down the users of the network and attacking them spamming attack: sending unsolicited information across the network P2P Networks 15

16 Networks, Protocols and Applications I Many different networks, protocols and applications some applications work with more than one network P2P Networks 16

17 Networks, Protocols and Applications II Ares BitTorrent Cspace Direct Connect Domain Name System Edonkey FastTrack Freenet GNUnet Gnutella Network or Protocol Applications Ares Galaxy, Warez P2P ABC, AllPeers, Azureus, BitComet, BitLord, BitSpirit, BitTornado, BitTorrent, Burst!, FlashGet, G3 Torrent, Halite, KTorrent, MLDonkey, mlmac, Opera, QTorrent, Shareaza, Transmission, Tribler, µtorrent a peer-to-peer based communications system DC++, NeoModus Direct Connect, BCDC++, ApexDC++, StrongDC++ abc, AllPeers, Azureus, BitComet, BitLord, BitSpirit, BitTornado, BitTorrent, Burst!, FlashGet, G3 Torrent, Halite, KTorrent, MLDonkey, mlmac, Opera, QTorrent, Shareaza, Transmission, Tribler, µtorrent gift, Grokster, imesh (and its variants stripped of adware including imesh Light), Kazaa (and its variants stripped of adware such as Kazaa Lite), KCeasy, Mammoth, MLDonkey, mlmac, Poisoned Entropy (on its own network), Freenet GNUnet, (GNUnet-gtk) Acquisition, BearShare, Cabos, Gnucleus, Grokster, imesh, gtk-gnutella, Kiwi Alpha, LimeWire, FrostWire, MLDonkey, mlmac, Morpheus, Phex, Poisoned, Swapper, Shareaza, XoloX P2P Networks 17

18 Networks, Protocols and Applications III Network or Protocol Gnutella2 Kad Network MANOLITO/MP2P Krawler MFPnet Napster P2PTV Peercasting Retroshare Usenet Windows Peer-to- Peer WPNP Applications Adagio, Caribou, Gnucleus, imesh, Kiwi Alpha, MLDonkey, mlmac, Morpheus, Shareaza, TrustyFiles amule, emule, MLDonkey Blubster, Piolet Krawler[x] Amicina Napigator, OpenNap, WinMX TVUPlayer, Joost, CoolStreaming, Cybersky-TV, TVants, PPLive PeerCast, IceShare, FreeCast, PeerStream, Rawflow Retroshare serverless Filesharing with Chat Messenger Many different news clients Advanced Networking Pack for Windows XP,Windows XP SP2,Windows Vista WinMX P2P Networks 18

19 Multi-Network Applications Applications Network or Protocol Operating systems License amule edonkey network, FastTrack, Gnutella Cross-platform GPL emule edonkey network, Kad network Windows GPL FileScope edonkey network, Gnutella, Gnutella2, OpenNAP Cross-platform GPL gift edonkey network, FastTrack, Gnutella Cross-platform GPL Gnucleus Gnutella, Gnutella2 Windows GPL imesh FastTrack, edonkey network, Gnutella, Gnutella2 Windows KCeasy Ares, FastTrack, Gnutella, OpenFT Windows GPL Kiwi Alpha Gnutella, Gnutella2 Windows MLDonkey BitTorrent, Direct Connect, edonkey network, FastTrack, Gnutella, Gnutella2, Kad Network, Cross-platform GPL OpenNap, SoulSeek, HTTP/FTP Morpheus NEO Network, Gnutella, Gnutella2, BitTorrent Windows Napshare Key network, MUTE network Linux, Windows GPL Shareaza BitTorrent, edonkey, Gnutella, Gnutella2 Windows GPL Zultrax Gnutella, ZEPP Windows P2P Networks 19

20 Problems of P2P Networks many applications and networks legality problems (copyright infringement) many attacks are possible security problems P2P Networks 20

21 Questions Explain the Classifications of P2P Network. What attacks against P2P Networks to you know? P2P Networks 21

22 Thank you for your attention! P2P Networks 22

If you need further assistance in disabling file sharing or your software isn t listed below please contact the IT Help Desk at ext

If you need further assistance in disabling file sharing or your software isn t listed below please contact the IT Help Desk at ext Use these instructions as a guide for disabling your client. The only way to ensure total compliance with copyright laws is to completely uninstall sharing applications. Use peer-to-peer (P2P) software

More information

12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics

12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics // Topics Peer to Peer Systems Introduction Client-server vs peer to peer Peer-to-peer networks Routing Overlays Structured vs unstructured Example PP Systems Skype login server Peer-to-peer - definitions

More information

Peer-to-Peer Internet Applications: A Review

Peer-to-Peer Internet Applications: A Review Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation

More information

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall Table of Contents Blocking Peer to Peer File Sharing Programs with the PIX Firewall...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...2 PIX Configuration...2 Blubster/Piolet

More information

Pricing of Mobile Peer-to-Peer application

Pricing of Mobile Peer-to-Peer application Pricing of Mobile Peer-to-Peer application 20 March 2003 Yang Qiu Helsinki University of Technology yangqiu@cc.hut.fi Abstract This paper analyzes the pricing of fixed and mobile peer-to-peer application.

More information

Peer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K.

Peer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K. Peer-to-peer T-110.7100 Applications and Services in Internet, Fall 2009 Jukka K. Nurminen 1 V1-Filename.ppt / 2008-10-22 / Jukka K. Nurminen Schedule Tue 15.9.2009 12-14 Tue 22.9.2009 12-14 Introduction

More information

BitTorrent. Internet Technologies and Applications

BitTorrent. Internet Technologies and Applications BitTorrent Internet Technologies and Applications Aims and Contents Aims Show benefits of P2P for file downloads Explain concepts of BitTorrent as a P2P file sharing application Show how BitTorrent protocol

More information

INTERNET USAGE GUIDE. Revised 08/12/15

INTERNET USAGE GUIDE. Revised 08/12/15 INTERNET USAGE GUIDE Revised 08/12/15 Introduction Your building is being supplied with Internet connectivity. We hope you will enjoy the always-on Internet connection. This connectivity is not meant to

More information

Taxonomy of P2P Applications

Taxonomy of P2P Applications Taxonomy of P2P Applications E.H.T.B. Brands and G. Karagiannis University of Twente, the Netherlands e.h.t.b.brands@student.utwente.nl, g.karagiannis@utwente.nl Abstract Peer-to-peer (p2p) networks have

More information

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University CPSC / PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet

More information

Preventing Illegal Peer-to-Peer (P2P) Traffic Using SafeMedia s Clouseau

Preventing Illegal Peer-to-Peer (P2P) Traffic Using SafeMedia s Clouseau Preventing Illegal Peer-to-Peer (P2P) Traffic Using SafeMedia s Clouseau A WHITE PAPER Perambur Neelakanta, PhD., C.Eng., Fellow IEE Mahesh Neelakanta, M.S. Abstract: The global presence of Peer-to-Peer

More information

INTERNET USAGE GUIDE. CIC Phone Number:

INTERNET USAGE GUIDE. CIC Phone Number: INTERNET USAGE GUIDE CIC Phone Number: 734-531-0148 http://www.collegeic.net http://twitter.com/collegeic Revised 11/16/2016 Introduction Many of the Prime Student Housing, Inc. buildings are being supplied

More information

Keywords p2p, applications, taxonomy, characteristics

Keywords p2p, applications, taxonomy, characteristics Taxonomy of p2p applications E.H.T.B. Brands Faculty of Management and Governance University of Twente, the Netherlands e.h.t.b.brands@student.utwente.nl ABSTRACT Peer-to-peer (p2p) networks have gained

More information

ForeScout CounterACT. Endpoint Support Compatibility Matrix. Updated: October 2018

ForeScout CounterACT. Endpoint Support Compatibility Matrix. Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility... 3

More information

Content Search. Unstructured P2P

Content Search. Unstructured P2P Content Search Unstructured P2P Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University *Partly adapted from original slides provided

More information

CounterACT HPS Applications Plugin

CounterACT HPS Applications Plugin CounterACT HPS Applications Plugin Version 2.1.4 Table of Contents About the HPS Applications Plugin... 3 Requirements... 3 Installation... 4 Configuration... 4 Working with Endpoint Information... 4 Detect

More information

River Rain Apartments INTERNET USAGE GUIDE. Revised 12/09/15

River Rain Apartments INTERNET USAGE GUIDE. Revised 12/09/15 River Rain Apartments INTERNET USAGE GUIDE Revised 12/09/15 Introduction The River Rain Apartment buildings are being supplied with Internet connectivity. We hope you will enjoy the always-on Internet

More information

1(11) Peer to peer networking

1(11) Peer to peer networking 1(11) Peer to peer networking Carl Berg calle.berg@gmail.com Chalmers 2005 2(11) Table of contents Introduction Abstract 3 History 4 Technical overview 5 Comparison to the client/server approach 6 Requirements

More information

Unit background and administrivia. Foundations of Peer-to- Peer Applications & Systems

Unit background and administrivia. Foundations of Peer-to- Peer Applications & Systems A Course on Foundations of Peer-to-Peer Systems & Applications CS 6/75995 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer Science www.cs.kent.edu/~javed/class-p2p08/

More information

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University CPSC 4/5 PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet

More information

Content Search. Unstructured P2P. Jukka K. Nurminen

Content Search. Unstructured P2P. Jukka K. Nurminen Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd

More information

Localhost: A browsable peer-to-peer file sharing system

Localhost: A browsable peer-to-peer file sharing system Localhost: A browsable peer-to-peer file sharing system Aaron Harwood and Thomas Jacobs December 17, 2005 Abstract Peer-to-peer (P2P) file sharing is increasing in use on the Internet. This thesis proposes

More information

Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:

Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview: PP Lecture 1 Peer-to-Peer Model March 16, 005 Overview: centralized database: Napster query flooding: Gnutella intelligent query flooding: KaZaA swarming: BitTorrent unstructured overlay routing: Freenet

More information

Excogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks

Excogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks Excogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks Bollimuntha Kishore Babu #1, Divya Vadlamudi #2, Movva

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

Advanced Internet Architectures

Advanced Internet Architectures Advanced Internet Architectures Carlos Borrego Iglesias Carlos.Borrego@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Tecnologies avançades d

More information

Peer-to-peer & Energy Consumption

Peer-to-peer & Energy Consumption Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science

More information

Peer-to-Peer Behaviour Detection by TCP Flows Analysis

Peer-to-Peer Behaviour Detection by TCP Flows Analysis UNIVERSITY OF LIÈGE Faculty of Applied Sciences Peer-to-Peer Behaviour Detection by TCP Flows Analysis CYRIL SOLDANI Academic year 2003 2004 Peer-to-Peer Behaviour Detection by TCP Flows Analysis CYRIL

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Study and analysis on Optimal scheduling Data-Driven Peer-to-Peer Streaming

Study and analysis on Optimal scheduling Data-Driven Peer-to-Peer Streaming Study and analysis on Optimal scheduling Data-Driven Peer-to-Peer Streaming 1 B.Kundan 2 D.Jamuna Abstract: We propose a new architecture for on-demand media streaming centered around the peer-to-peer

More information

Peer-to-peer systems and overlay networks

Peer-to-peer systems and overlay networks Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems

More information

BitTorrent and CoolStreaming

BitTorrent and CoolStreaming BitTorrent and CoolStreaming Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen Aalto University P2P Networks BitTorrent

More information

CPSC156a: The Internet Co-Evolution of Technology and Society

CPSC156a: The Internet Co-Evolution of Technology and Society CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing Napster Client-Server Client 1 MP3-file 1 MP3-file 2 MP3-file n Interaction hello ack

More information

Peer-to-Peer Applications Reading: 9.4

Peer-to-Peer Applications Reading: 9.4 Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

P2P content distribution

P2P content distribution P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Distributed Knowledge Organization and Peer-to-Peer Networks

Distributed Knowledge Organization and Peer-to-Peer Networks Knowledge Organization and Peer-to-Peer Networks Klaus Wehrle Group Chair of Computer Science IV RWTH Aachen University http://ds.cs.rwth-aachen.de 1 Organization of Information Essential challenge in?

More information

- Content Security in P2P

- Content Security in P2P Why Jenny can t share the content with Jane? - Content Security in P2P Heather Yu Huawei Technologies heathery@ieee.org Future of Networked Home A vision voice video text Data gaming IPTV streaming IM

More information

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking

More information

Peer to Peer Networks

Peer to Peer Networks Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2018 Networking Laboratory P2P Applications Traditional P2P applications: for file sharing BitTorrent, Emule

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis March 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

File Sharing in Less structured P2P Systems

File Sharing in Less structured P2P Systems File Sharing in Less structured P2P Systems. Bhosale S.P. 1, Sarkar A.R. 2 Computer Science And Engg. Dept., SVERI s College of Engineering Pandharpur Solapur, India1 Asst.Prof, Computer Science And Engg.

More information

Distributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201

Distributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201 Distributed Systems ID2201 peer-to-peer Johan Montelius 1 Idéa use resources in edge of network computing storage communication 2 Computing 3 seti@home central server millions of clients hundred of thousands

More information

of viruses, spywares, ad ware, malware through file sharing applications.

of viruses, spywares, ad ware, malware through file sharing applications. An Efficient Architecture for Consistency Maintenance and Peer Synchronization in Distributed Systems Bollimuntha Kishore Babu 1 and Attaluri Rajesh 2 M.Tech (CNS), Green Fields, K.L.Univerisity, Vijayawada,

More information

Peer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006

Peer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006 Peer-to-Peer Protocols and Systems TA: David Murray 15-441 Spring 2006 4/19/2006 P2P - Outline What is P2P? P2P System Types 1) File-sharing 2) File distribution 3) Streaming Uses & Challenges 2 Problem:

More information

A Resource Exchange Architecture for Peer-to-Peer File Sharing Applications

A Resource Exchange Architecture for Peer-to-Peer File Sharing Applications The Computer Journal Vol. 48 No. 1 The British Computer Society 2005; all rights reserved DOI:10.1093/comjnl/bxh055 A Resource Exchange Architecture for -to- File Sharing Applications Chung-Ming Huang

More information

Today s Objec2ves. Kerberos. Kerberos Peer To Peer Overlay Networks Final Projects

Today s Objec2ves. Kerberos. Kerberos Peer To Peer Overlay Networks Final Projects Today s Objec2ves Kerberos Peer To Peer Overlay Networks Final Projects Nov 27, 2017 Sprenkle - CSCI325 1 Kerberos Trusted third party, runs by default on port 88 Security objects: Ø Ticket: token, verifying

More information

P2P content distribution Jukka K. Nurminen

P2P content distribution Jukka K. Nurminen P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient

More information

Peer-to-Peer Systems. Internet Computing Workshop Tom Chothia

Peer-to-Peer Systems. Internet Computing Workshop Tom Chothia Peer-to-Peer Systems Internet Computing Workshop Tom Chothia Plagiarism Reminder Plagiarism is a very serious offense. Never submit work by other people without clearly stating who wrote it. If you did

More information

P2P Networks - General

P2P Networks - General P2P Networks-General Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen 137/09/2013 Aalto University P2P

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer

Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer evyncke@cisco.com 2002, Cisco Systems, Inc. All rights reserved. 1 Agenda Introduction to peer to peer

More information

Public Domain P2P File-sharing Networks Measurements and Modeling

Public Domain P2P File-sharing Networks Measurements and Modeling Public Domain PP File-sharing Networks Measurements and ing Jaime Lloret 1, Juan R. Diaz, Jose M. Jimenez 3 and Fernando Boronat 4 Department of Communications, Polytechnic University of Valencia (Spain)

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

Outline. Peer-to-Peer. P2p file-sharing. Wither p2p? What s out there? The p2p challenge C1: Search(human s goals) -> file

Outline. Peer-to-Peer. P2p file-sharing. Wither p2p? What s out there? The p2p challenge C1: Search(human s goals) -> file Outline Peer-to-Peer - pp file sharing techniques Downloading: Whole-file vs. chunks Searching Centralized index (Napster, etc.) Flooding (Gnutella, etc.) Smarter flooding (KaZaA, ) Routing (Freenet, etc.)

More information

Scaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p?

Scaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p? Scaling Problem 15-441 Computer Networking Millions of clients server and network meltdown Lecture 23: Peer-Peer Systems Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 2 P2P System Why p2p?

More information

The Index Poisoning. Sharing Systems Mehmet Aslan Hacettepe Üniversitesi

The Index Poisoning. Sharing Systems Mehmet Aslan Hacettepe Üniversitesi The Index Poisoning Attack in P2P File Sharing Systems Mehmet Aslan Hacettepe Üniversitesi mehmetaslan@cs.hacettepe.edu.tr Introduction Pollution attack corrupt target content, make unusable, share 50%-80%

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals. Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University

More information

A Study on Anonymous P2P Networks and their Vulnerabilities

A Study on Anonymous P2P Networks and their Vulnerabilities DEPARTMENT OF APPLIED PHYSICS AND ELECTRONICS UMEÅ UNIVERISTY, SWEDEN DIGITAL MEDIA LAB A Study on Anonymous P2P Networks and their Vulnerabilities Dharma Reddy Manda e-mail: dhma0001@student.umu.se SUPERVISOR:

More information

Topic # 06. Software Architectural Design. (Ch. 9)

Topic # 06. Software Architectural Design. (Ch. 9) Topic # 06 Software Architectural Design (Ch. 9) 1 The goal of the architectural model is to allow the software engineer to view and evaluate the system as a whole (as a single unit) before moving to component

More information

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall

More information

CPS 214: Computer Networks and Distributed Systems Networked Environments: Grid and P2P systems

CPS 214: Computer Networks and Distributed Systems Networked Environments: Grid and P2P systems CPS 214: Computer Networks and Distributed Systems Networked Environments: Grid and P2P systems Anda Iamnitchi anda@cs.duke.edu Class Objectives Start thinking of computer networking issue from the perspective

More information

Extreme Computing. BitTorrent and incentive-based overlay networks.

Extreme Computing. BitTorrent and incentive-based overlay networks. Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some

More information

Resilient Networking. 6: Resilient Peer-to-Peer Networking Thorsten Strufe. What is P2P? Types of P2P Systems P2P Security

Resilient Networking. 6: Resilient Peer-to-Peer Networking Thorsten Strufe. What is P2P? Types of P2P Systems P2P Security 6: Resilient Peer-to-Peer Networking Thorsten Strufe What is P2P? Types of P2P Systems P2P Security How do you define peer-to-peer? 2 What do you consider to be the main problems? 3 What do you think are

More information

Content Filtering. Multiple Subnet

Content Filtering. Multiple Subnet RS-2500 Dual WAN Security Gateway Web / SSL Server IPSec / PPTP Server Application Blocking for IM, P2P, Webmail, Video/Audio, Game, Tunnel and Remote Control applications Content Blocking for URL, Scripts,

More information

Peer-to-Peer Data Management. Hans-Dieter Ehrich Institut für Informationssysteme Technische Universität Braunschweig

Peer-to-Peer Data Management. Hans-Dieter Ehrich Institut für Informationssysteme Technische Universität Braunschweig Peer-to-Peer Data Management Hans-Dieter Ehrich Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 7. Unstructured P2P Networks The transparencies of this

More information

IJITKM Special Issue (ICFTEM-2014) May 2014 pp (ISSN )

IJITKM Special Issue (ICFTEM-2014) May 2014 pp (ISSN ) Security Enhancement Technique In Peer to Peer Network: A Review Varun Chanana 1, Sandeep Kumar 2, Ravikat Jaiswal 3 1,2,3 Department of CSE,Ganpati Institute of Technology and Management,Bilaspur,Yamunanagar

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

GNUnet Distributed Data Storage

GNUnet Distributed Data Storage GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview

More information

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Patrick Baier October 10, 2008 Contents 1 Introduction 1 1.1 Preamble.................................... 1 1.2 Definition....................................

More information

Peer-to-Peer Overlays: Issues and Trends

Peer-to-Peer Overlays: Issues and Trends International Journal of Computer Applications (9 888) International Conference on Computing and information Technology (ICIT-) Peer-to-Peer Overlays: Issues and Trends P. Arockia Mary Department of Information

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks

More information

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play

More information

A reputation system for BitTorrent peer-to-peer filesharing

A reputation system for BitTorrent peer-to-peer filesharing University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2006 A reputation system for BitTorrent peer-to-peer filesharing

More information

Intrusion Detection and Prevention System (IPS) Technology, Applications, and Trend

Intrusion Detection and Prevention System (IPS) Technology, Applications, and Trend Intrusion Detection and Prevention System (IPS) Technology, Applications, and Trend Dr. Nen-Fu (Fred) Huang Professor, Department of Computer Science, National Tsing Hua University, Taiwan President, Broadweb

More information

Peer-to-Peer (P2P) Systems

Peer-to-Peer (P2P) Systems Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed

More information

Peer-to-Peer Architectures and Signaling. Agenda

Peer-to-Peer Architectures and Signaling. Agenda Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction

More information

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

Outline. P2P and Content Distribution. P2P Definitions. More Definitions. P2P is not new. P2P Definitions. P2P Overview P2P systems P2P and DRM

Outline. P2P and Content Distribution. P2P Definitions. More Definitions. P2P is not new. P2P Definitions. P2P Overview P2P systems P2P and DRM P2P and Content Distribution ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Outline P2P Overview P2P systems P2P and DRM Some slides of this talk are provided

More information

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9 Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication

More information

Peer to Peer Networks

Peer to Peer Networks Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer

More information

Peer-to-Peer Botnet Detection Using NetFlow. Connor Dillon

Peer-to-Peer Botnet Detection Using NetFlow. Connor Dillon Peer-to-Peer Botnet Detection Using NetFlow Connor Dillon System and Network Engineering University of Amsterdam Master thesis presentation, July 3 rd 2014 Supervisor: Pepijn Janssen RedSocks Botnets Large

More information

Ossification of the Internet

Ossification of the Internet Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major

More information

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically

More information

The use of rare key indexing for distributed web search. MSc thesis by Koen Tinselboer

The use of rare key indexing for distributed web search. MSc thesis by Koen Tinselboer The use of rare key indexing for distributed web search MSc thesis by Koen Tinselboer Abstract In the last few years we have seen a rise in the of peer-to-peer applications in areas like file sharing [1][2][3].

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

NetEnforcer E5.7.0 AC-400/800 Series

NetEnforcer E5.7.0 AC-400/800 Series Software Release Notes Version 1 NetEnforcer E5.7.0 AC-400/800 Series P/N D211047 This document details new features, known issues and clarifications concerning NetEnforcer software version E5.7.0. This

More information

Middleware and Distributed Systems. Peer-to-Peer Systems. Peter Tröger

Middleware and Distributed Systems. Peer-to-Peer Systems. Peter Tröger Middleware and Distributed Systems Peer-to-Peer Systems Peter Tröger Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers) Each

More information

Fast Traffic Tactics

Fast Traffic Tactics TRAFFIC TACTICS VOLUME #2: Fast Traffic Tactics Special Report (F): Peer-to-Peer Network Tactics Legal Notice: The Publisher has strived to be as accurate and complete as possible in the creation of this

More information

Introduction on Peer to Peer systems

Introduction on Peer to Peer systems Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr dacosta@irit.fr 1/55 Goal of this Lecture What can P2P do, not only as a buzzword What it can't do Shows some examples & algorithms

More information