Unit 8 Peer-to-Peer Networking

Similar documents
Chapter 2: Application layer

Telecommunication Services Engineering Lab. Roch H. Glitho

CMSC 332 Computer Networks P2P and Sockets

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

internet technologies and standards

Telematics Chapter 9: Peer-to-Peer Networks

Peer-to-Peer Architectures and Signaling. Agenda

A Survey of Peer-to-Peer Content Distribution Technologies

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Networks

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example

Introduction to P2P systems

Peer-to-Peer Internet Applications: A Review

Lecture 8: Application Layer P2P Applications and DHTs

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

Overlay Networks in ScaleNet

Goal and A sample Network App

Introduction to P2P Computing

Distributed Knowledge Organization and Peer-to-Peer Networks

Chapter 6 PEER-TO-PEER COMPUTING

Peer-to-peer computing research a fad?

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

6. Peer-to-peer (P2P) networks I.

CS 3516: Advanced Computer Networks

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

Introduction on Peer to Peer systems

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Distributed hash table - Wikipedia, the free encyclopedia

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q

From POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno

Peer to Peer Networks

INF5070 media storage and distribution systems. to-peer Systems 10/

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

Peer-to-Peer (P2P) Systems

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Overlays and P2P Networks

Peer-to-Peer Signalling. Agenda

Introduction to the Application Layer. Computer Networks Term B14

Introduction to Peer-to-Peer Systems

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

MASTER DEGREE COMPUTER SCIENCE COMPUTER SCIENCE AND NETWORKING. Peer to Peer Systems LAURA RICCI 2/5/2011

Unit background and administrivia. Foundations of Peer-to- Peer Applications & Systems

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016

Content Search. Unstructured P2P. Jukka K. Nurminen

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

EE 122: Peer-to-Peer (P2P) Networks. Ion Stoica November 27, 2002

Georges Da Costa Introduction on Peer to Peer systems

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.

Introduction to Peer-to-Peer Networks

Peer to Peer Systems and Probabilistic Protocols

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

Content Search. Unstructured P2P

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Motivation for peer-to-peer

Content distribution networks

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems

CMSC 322 Computer Networks Applications and End-To- End

CC451 Computer Networks

Overlay networks. T o do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. q q q. Turtles all the way down

Overlay and P2P Networks. Unstructured networks I. Prof. Sasu Tarkoma

Today s Objec2ves. Kerberos. Kerberos Peer To Peer Overlay Networks Final Projects

Assignment 5. Georgia Koloniari

RELOAD P2P Overlay Access Protocol. Younghan Kim Soongsil University

CDNs and Peer-to-Peer

CIS 700/005 Networking Meets Databases

Distributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017

Internet Services & Protocols

CSE 124 Finding objects in distributed systems: Distributed hash tables and consistent hashing. March 8, 2016 Prof. George Porter

Kademlia: A P2P Informa2on System Based on the XOR Metric

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

Making Gnutella-like P2P Systems Scalable

12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics

Peer- Peer to -peer Systems

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

Peer to Peer Computing

08 Distributed Hash Tables

EE 122: Peer-to-Peer Networks

Content Overlays. Nick Feamster CS 7260 March 12, 2007

CSE 5306 Distributed Systems

P2PNS: A Secure Distributed Name Service for P2PSIP

Distributed Meta-data Servers: Architecture and Design. Sarah Sharafkandi David H.C. Du DISC

15-744: Computer Networking P2P/DHT

Using peer to peer. Marco Danelutto Dept. Computer Science University of Pisa

Chapter 10: Peer-to-Peer Systems

Middleware and Distributed Systems. Peer-to-Peer Systems. Peter Tröger

Advanced Computer Networks

Architectures for Distributed Systems

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report

Latest Peer-to-Peer Technologies II Artjom Lind 1

Scalable overlay Networks

GNUnet Distributed Data Storage

Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma. Distributed and Agent Systems

CSE 5306 Distributed Systems. Naming

Experimental Study of Skype. Skype Peer-to-Peer VoIP System

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Peer to Peer Networks

Transcription:

Unit 8 Peer-to-Peer Networking

P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority.

Client/Server System Web Server FTP Server Media Server Database Server Application Server Every entity has its dedicated different role (Client/Server)

Pure P2P architecture no always-on server end systems directly communicate peer-peer Introduction Application 2-4

P2P Applications

P2P Applications P2P Search, File Sharing and Content spreading Napster, Gnutella, Kazaa, edonkey, BitTorrent Chord, CAN, Pastry/Tapestry, Kademlia, Bullet, SplitStream, CREW, FareCAST P2P Communications MSN, Skype, Social Networking Apps P2P Storage OceanStore/POND, CFS (Collaborative FileSystems),TotalRecall, FreeNet, Wuala

Peer to Peer File Sharing Introduction 1-7

P2P Communication Instant Messaging Skype is a VoIP P2P system Alice runs IM client application on her notebook computer Intermittently connects to Internet Alice initiates direct TCP connection with P Bob, then chats 2 Gets new IP address for each connection Register herself with system Learns from system that Bob in her buddy list is active

Characteristics of P2P Systems Exploit edge resources. Significant autonomy from any centralized authority. Storage, content, CPU, Human presence. Each node can act as a Client as well as a Server. Resources at edge have intermittent connectivity, constantly being added & removed.

Promising properties of P2P Self-organizing Massive scalability Autonomy : non single point of failure Resilience to Denial of Service Load distribution

Overlay Network A P2P network is an overlay network. Each link between peers consists of one or more IP links.

Overlays : All in the application layer Tremendous design flexibility Topology, maintenance Message types Protocol Messaging over TCP or UDP Underlying physical network is transparent to developer But some overlays exploit proximity

Overlay Graph Virtual edge TCP connection or simply a pointer to an IP address Overlay maintenance Periodically ping to make sure neighbor is still alive Or verify aliveness while messaging If neighbor goes down, may want to establish new edge New incoming node needs to bootstrap

Distributed Hash Table (DHT) A distributed hash table (DHT) is a class of a decentralized distributed system that provides a lookup service similar to a hash table: (key, value) pairs are stored in a DHT, and any participating node can efficiently retrieve the value associated with a given key. Responsibility for maintaining the mapping from keys to values is distributed among the nodes, in such a way that a change in the set of participants causes a minimal amount of disruption. This allows a DHT to scale to extremely large numbers of nodes and to handle continual node arrivals, departures, and failures. DHTs form an infrastructure that can be used to build more complex services, such as anycast, cooperative Web caching, distributed file systems, domain name services, instant messaging, multicast, and also peer-to-peer file sharing and content distribution systems.

DHTs characteristically emphasize the following properties: Autonomy and decentralization: the nodes collectively form the system without any central coordination. Fault tolerance: the system should be reliable (in some sense) even with nodes continuously joining, leaving, and failing. Scalability: the system should function efficiently even with thousands or millions of nodes.

P2P Case study: Skype inherently P2P: pairs of users communicate. proprietary Skype application-layer login server protocol (inferred via reverse engineering) hierarchical overlay with SNs Index maps usernames to IP addresses; distributed over SNs Skype clients (SC) Supernode (SN) Application 2-17