Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf
|
|
- Gordon Murphy
- 8 years ago
- Views:
Transcription
1 Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf
2 Peer-to-Peer Systems Chapter 13 Online Social Networks Introduction to Online Social Networks Safebook P2P Framework for Social Networks This slide set is partially based on the lecture Peer-to-Peer Networks" of Prof. Dr. Thorsten Strufe at TU Darmstadt
3 Facebook, Twitter & Co. (Online Social Networks) Online Social Networks (Social Networking Services) web-based services that allow individuals to construct a public or semi-public profile within a bounded system, articulate a list of other users with whom they share a connection, and view and traverse their list of connections and those made by others within the system. Is this really all? the communication of participants through message exchange, commenting on the profiles of others (or previous interactions, e.g. in recommendations), which merely is a message exchange with the aim to annotate the addressed profile, and the wealth of applications (starting from simple ``poking'' mechanisms to a variety of ``gift'' and ``likeness'' applications for interactions between users) Source1: Boyd et al.: Social Network Sites Source2: Cutillo et al.: Privacy Preserving Social Networking through Decentralization 3
4 Online Social Networks Simplified, walled-garden version of the Web : Easy to set-up pages ( profiles ) of individuals ( and companies ) Links reflecting real-world relations between individuals Possibility to share user generated content including messaging Guest book / Wall (asynchronous broadcast) (asynchronous unicast) Chat (~ synchronous unicast) Collaborative applications / games Different target audience / application domain Private and personal OSN Public and professional OSN (business-oriented) 4
5 Target Audience and Domain Professional business services Private and personal services Niche/tailored services Micro blogging : Twitter Business trips and meeting service: Dopplr, TripIT Location-based achievement systems: foursquare, gowalla Slide based on lecture slides of Prof. Dr. Thorsten Strufe, TU Darmstadt, Peer -to-peer Networks, WS
6 Why Bother? 6
7 Goals and Motivations of Users and Providers Users want Storing / searching for content Profiles, friend lists, Pictures, shared Wall editing, User to user interaction Chatting, VoIP, Games Security Access control on their data Secure, confidential communication à Fun! System providers want High profit Many users Personalized advertisements Low operational costs For servers, electricity, cooling For personnel, legal issues Controlled Quality of Service To attract and keep users Providing reliable, high quality services à Money! 7
8 Security Objectives in OSNs Availability Of data and services Robust against censorship But you do not want to have childporn profile pictures Prevent from seizure or hijacking of identities Privacy / Confidentiality Users want to define access control rights on Personal information Communication traces Possibility to hide any data about any user Integrity Protect user data from unauthorized modification and tampering Ensure the link between OSN accounts and people 8
9 Generalized Architectural Model of SNS Distributed Environment Main SNS centralized Additional 3rd party application servers 9
10 Centrally hosted SNS Web-based solution Centrally hosted data Benefits for the provider Data used for marketing Issues Costs / scalability Trust in provider You cannot delete your account, only deactivate (Facebook) Limited application scope No real user-to-user interaction Wide community focus Must share information with the world Although only meant for family» Google+ addresses this with circles 10
11 Quest to Decentralize Issues of centralized architectures Centralized control Centralized data storage Full, centralized access to data Single Point of Failure ( and the legendary twitter whale) Taking back the web Breaking out of the walled gardens (again, cf. AOL) Re-democratizing the web Distribute the services! 11
12 Peer-to-Peer Systems Online Social Networks Decentralized Approaches for OSN This slide set is partially based on the lecture Peer-to-Peer Networks" of Prof. Dr. Thorsten Strufe at TU Darmstadt
13 Plethora P2P / Decentralized Social Services Free and open source software Diaspora, BuddyPress, CrabGrass, Cobs, DaisyChain, Diki, Elgg, FETHR, GNUNet, Gossple, Jappix, Lorea, Mycella, Movim, PeerScape, Pinax, StatusNet Academia Friend-of-a-Friend, FriendStore, HelloWorld, LifeSocial, LotusNet (Likir), PeerSon, Safebook, SocialCircle, Tribler, vis-à-vis, wuala, LifeSocial Focus on systems that implement social networking and publication functions Provide running software or a comprehensive protocol / system description Actually are decentralized 13
14 Decentralized Social Networking Approaches Centralized Idea: host your own OSN Social networks: BuddyPress, CrabGrass Federation of webservers Idea: link (private) webservers via standard protocols Social networks: Diaspora, Hello World Network, Fethr (Twitter), Diki 14
15 Decentralized Social Networking Approaches Centralized index, Storage on clients Idea: server manages index of users, storage of users is used Social networks: Daisychain, COBS, Gossple P2P-based social networks Idea: client devices form p2p network to store and find data Social networks: LibreSocial Motivated through: CPU power & bandwidth grow Privacy - awareness 15
16 1.2 Decentralized Social Networking Approaches Centralized Idea: host your own OSN Social networks: BuddyPress, CrabGrass Federation of (private) webservers Idea: link (private) webservers via standard protocols (FOAF, XMPP, PSYC) Social networks: Diaspora, Hello World Network, Fethr (Twitter), Diki Centralized index, storage on clients Idea: server manages index of users, storage of users is used Social networks: Daisychain, COBS, Gossple P2P applications with social aspects Idea: add to traditional p2p applications social aspects Social networks: Tribler, Wuala P2P-based social networks 16
17 Some Words on these Solutions Friend-of-a-Friend Data-centric, similar to yellow pages Federation of private webservers Store your data on your own / trusted friends webserver BUT: do you have a webserver? No real user-user interaction HelloWorld Network Won a startup prize Not existent anymore Diaspora Great marketing, $ for a promise Buggy and bad code Similar to Friend-of-a-Friend Now ~ users 17
18 Challenges for P2P OSN Let s use P2P to increase privacy in OSN! How could we proceed? Which challenges are we about to encounter? Performance Properties: P2P à filesharing! OSN: small, short lived objects Extreme heterogeneity (friends, uploaded content, resources) User behaviour / sessions (diurnal patterns, session- and inter session times) Incentives Mobile users vs. p2p / recursive routing, etc Security How can we guarantee availability? How do you search for somebody? Key management!? Identification services (we don t want fake accounts!) 18
19 Requirements for a (DHT-based) OSN Functionality Like Facebook Extendible through apps / plugins Different to typical p2p applications à Platform to host a wide set of applications General platform Core functionality as a basis Communication patterns? Extendible out of the box App-functionality, app-market? Data access patterns Read: Independent whether friends are online Write: create new content Update: update previous data Consistently for all copies of the data Delete: securely remove data Community-enforced deletion of illegal content 19
20 Requirements for a (DHT-based) OSN Suitable distributed data structures Security Supporting a wide range of apps Heterogeneous peer capacities and data access patterns Root of trust, user authentication Confidential, integer, auth. communication Access control: read/write/delete rights How to address attackers? Controlled Quality of Service Guarantees on system behavior? Response time, availability Self-adaptive behavior Several hands-on challenges How to implement Various search mechanisms Bootstrapping, NAT-handling An extendible graphical user interface 20
21 Peer-to-Peer Systems Online Social Networks Safebook This slide set is partially based on the lecture Peer-to-Peer Networks" of Jun.-Prof. Dr. Thorsten Strufe at TU Darmstadt
22 Safebook Developed at Eurecom & TU- Darmstadt Main idea: Use only friends in overlay Social topology Results in some security Main issue: Performance Requires large friend base per user 22
23 Design Principles Decentralization - P2P architecture Cooperation enforcement - Friends cooperate Leveraging existing Trust - Social trust trusted link - Friend = neighbor Privacy - Simple anonymous routing - Based on trusted links - Group Encryption 23
24 Architecture 3 Trusted ID System ID Management Contrast 1 Matryoshka Data storage Cooperation Communication with privacy 2 Peer- to- peer dht Lookup Different views of the network 24
25 Network View Social network overlay Trusted ID user id Peer to peer node id ip address 25
26 User i s Matryoshka Entry nodes Outer shell k e a Trust relabonship for i c s friend Inner shell i c d j b i s node d friend of c c friend of i d friend of i l f Trust relabonship for c User i s friends: store i s encrypted profile data End to end privacy based on hop by hop trust 26
27 Finding it, using P2P: a looks for b a e a b s profile req. DHT hash(b s afribute) e d c b s outer shell nodes b s profile d c b k f b s outer shell: h(b), e h(b), f lookup a looks for b s entry nodes k provides b s outer shell nodes data request a sends profile data request to a b s entry node Data reply One of b s inner shell nodes answers 27
28 Role of P2P system x Hop- by- hop trust User 1 u Node Privacy Hide requester s id Hide ids identities Hide requests statistics Integrity No msg forging No id manipulation H(User2) List of entrypoints Availability No DOS P2P system Tradeoff y Entrypoint z Performance Low Delays Lookup key redundancy v Mirror User 2 User2 s Matryoshka 28
29 Evaluation of the scheme (1) Privacy Friendship relations hidden through Matryoshkas Untraceability through pseudonymity and anonymous routing Cloning prevention Dos prevention Access control Availability ID management Key management Data replication at friends nodes 29
30 Performance - Reachability Number of contacts in the inner shell 80 to 250+ contacts required to be reachable at 90% with 3 or 4 hops 30% online probability (Skype data) Too many contacts? 30
31 Performance Reachability Incr. Spanning Ratio Number of contacts in the inner shell 30% online probability (Skype data) 15 to 25 contacts required to be reachable at 90% with 3 or 4 hops 31
32 Performance - Delay Further 1 st Lookup Lookups delay delay CDF CDF for a for 4 shell a 4 shell matryoshka matryoshka (*) (*) 90 th percentile: 90 th percentile: 5,42 s 13,49 s Total data lookup Bme: T dl = T DHT + T Mat Median: Median: 1,73 s 8,04 s Further lookups: T DHT =0 thanks to caching Average: 9,17 2,71 s Time [ms] (*) Data computed by applying the Monte Carlo sampling technique on single hop delay measurements and on delay measurement for a successful DHT key lookup in KAD (Biersack..) 32
33 Summary on Safebook P2P topology matches social topology Social storage, security through trust relations Some critical remarks Performance may be an issue Onion routing of messages Delay: median 1.73s, average 2.71s à in real life probably more Bandwidth: Retrieval of a 100kb picture à generates a multitude of load + delay Bootstrapping problems How to handle users with only few friends? Where to store data if friends are offline? Security issues Do you trust your friends? Conclusion Very interesting attempt, hopefully successful soon 2012: Sold to a startup 33
LifeSocial A P2P-based Online Social Network
LifeSocial A P2P-based Online Social Network Project Group A Distributed Framework for Social Networks www.p2pframework.com UPB SS2011 PG-Framework Lecture-05 LifeSocial-a-P2P-based-OSN.ppt Dr.-Ing. Kalman
More informationDistributed Framework for Social Networks
Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi graffi@mail.upb.de Tel. +49 5251 606730 Fachgebiet Multimedia Kommunikation Prof. Dr. Christian Scheideler Fakultät für Elektrotechnik,
More informationPeer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf
Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Organizational Information Organisational matters Lecturer Jun.-Prof.
More informationSafebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust
1 Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust Leucio Antonio Cutillo Refik Molva Thorsten Strufe Institut Eurécom Sophia Antipolis France {cutillo, molva}@eurecom.fr
More informationDecentralizing Social Networking Services
Decentralizing Social Networking Services Thomas Paul, Sonja Buchegger, Thorsten Strufe Abstract Online Social Networks (OSN) of today represent centralized repositories of personally idenfiable information
More informationResilient Networks. 00. Preliminaries. Who is who. Organizational Issues. P2P, TK What do we do. Exercise course Rough time line Examination
Resilient Networks 00. Preliminaries Who is who P2P, TK What do we do Organizational Issues Exercise course Rough time line Examination 23.04.2013 Fachbereich Informatik P2P Group and Telecooperation Group
More informationDecentralized Online Social Networks
Decentralized Online Social Networks Anwitaman Datta 1,SonjaBuchegger 2,LeHungVu 3,ThorstenStrufe 4,and Krzysztof Rzadca 1 2 1 NTU Singapore, anwitaman@ntu.edu.sg, krzadca@gmail.com Royal Institute of
More informationA taxonomy of decentralized online social networks
DOI 10.1007/s12083-014-0258-2 A taxonomy of decentralized online social networks Shihabur Rahman Chowdhury Arup Raton Roy Maheen Shaikh Khuzaima Daudjee Received: 27 January 2013 / Accepted: 27 February
More informationPrivacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik
Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer
More informationP2P Characteristics and Applications
P2P Characteristics and Applications Lecture for the Project Group A Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi Email: graffi@mail.upb.de Fachgruppe Theorie verteilter Systeme Fakultät
More informationMeasurement Study of Wuala, a Distributed Social Storage Service
Measurement Study of Wuala, a Distributed Social Storage Service Thomas Mager - Master Thesis Advisors: Prof. Ernst Biersack Prof. Thorsten Strufe Prof. Pietro Michiardi Illustration: Maxim Malevich 15.12.2010
More informationSANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
More informationOnline Social Networks and Network Layers
Online Social Networks and Network Layers Lecture for the Project Group A Distributed Framework for Social Networks UPB SS2011 PG-Framework Lecture-01 Online-Social-Networks-Network-Layer.ppt Dr.-Ing.
More informationLotusNet: tunable privacy for distributed online social network services
LotusNet: tunable privacy for distributed online social network services Luca Maria Aiello, Giancarlo Ruffo Computer Science Department - Università degli Studi di Torino Corso Svizzera 185, 10149 Turin,
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationPeer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology hanguyen@cc.hut.fi Abstract In the last few years, the success of the Napster online music sharing program
More informationPeer-to-Peer Networks Organization and Introduction 1st Week
Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/
More informationLOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,
More informationLawful Interception in P2Pbased
Lawful Interception in P2Pbased VoIP Systems Jan Seedorf (jan.seedorf_at_nw.neclab.eu) NEC Laboratories Europe Heidelberg, Germany July Page 2008 1-1 IPTCOMM 2008 Heidelberg, Germany Outline 1.
More informationInternet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr
Internet Architecture for Robust Mobility Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Contents Introduction IETF Activity Home Agent Reliability Protocol P2P-based Approaches ROAM and SAMP
More informationNetwork Security. Chapter 14. Security Aspects of Mobile Communications
Network Security Chapter 14 Security Aspects of Mobile Communications Network Security (WS 2002): 14 Security Aspects of Mobile Communications 1 Security Aspects of Mobile Communication Mobile communication
More informationEvolution of Peer-to-Peer Systems
EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor
More informationDECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION
DECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION Yoonho Nam, Changhoon Lee, Youngman Jung, Woongryul Jeon and Dongho Won Information Security Group, Sungkyunkwan
More informationAnonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
More informationPeer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
More informationAdapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
More informationDistributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
More informationDistributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationSkype characteristics
Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications
More informationDistributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationIntroduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
More informationPeer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta
More informationDecentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
More informationHow To Make A Network Overlay More Efficient
Corporate Technology Service Layer Components for Resource Management in Distributed Applications Fabian Stäber Siemens Corporate Technology, Information and Communications Copyright Siemens AG 2007. Alle
More informationDistributed and Secure Social Network Mobile Application with Id-based crypto and Cloud storage service. Tien Dat Le
Distributed and Secure Social Network Mobile Application with Id-based crypto and Cloud storage service Tien Dat Le Outline Introduction Contribution Methodology Implementation Evaluation Conclusion Future
More informationWeb Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)
1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication
More informationA PEER-TO-PEER ARCHITECTURE FOR SOCIAL NETWORKING APPLICATIONS
A PEER-TO-PEER ARCHITECTURE FOR SOCIAL NETWORKING APPLICATIONS By PIERRE ST. JUSTE A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
More informationDefinition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
More informationAn Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
More informationAuthenticating Out-of-Band Communication Over Social Links
Authenticating Out-of-Band Communication Over Social Links Anirudh Ramachandran and Nick Feamster School of Computer Science, Georgia Tech {avr,feamster}@cc.gatech.edu Motivating Application: Secured Web
More informationData protection at affilinet
at affilinet Rev. 04/03/2014 at affilinet Content at affilinet 1 1. Collection and processing of personal data and other data when visiting our Web pages 1 2. Collection and processing of our customers
More informationIntroduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February
More informationN6Lookup( title ) Client
CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding
More informationWireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
More informationAttacks Against Peer-to-peer Networks and Countermeasures
Attacks Against Peer-to-peer Networks and Countermeasures Lin Wang Helsinki University of Technology lwang@cc.hut.fi Abstract Peer-to-peer (P2P) networks have many distinct aspects that are different from
More informationAn Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Written by: Salman A. Baset and Henning G. Schulzrinne (Colombia University, NY) CIS 6000 Distributed Systems Benjamin Ferriman bferrima@uoguelph.ca
More informationP2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
More informationBit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationKick starting science...
Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep
More informationHealthy P2P Systems Overview
Monitoring and Management of Peer-to-Peer Systems Project Group A Distributed Framework for Social Networks www.p2pframework.com UPB SS2011 PG-Framework Lecture-04 Monitoring-and-Management.ppt Dr.-Ing.
More informationbcp for a large scale carrier level VoIP system
bcp for a large scale carrier level VoIP system using p2psip draft zhang p2psip bcp 04 Yunfei.Zhang Gang.Li Jin.Peng Baohong.He Shihui.Duan Wei.Zhu {zhangyunfei,ligangyf,pengjin}@chinamobile.com {hebaohong,duanshihui,zhuwei}@catr.cn
More information8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
More informationA Reputation Management System in Structured Peer-to-Peer Networks
A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology
More informationEstimating user interaction strength in online networks
Delft University of Technology Parallel and Distributed Systems Report Series Estimating user interaction strength in online networks Adele L. Jia, Boudewijn Schoon, Johan A. Pouwelse, Dick H.J. Epema
More informationData Storage Solutions for Decentralized Online Social Networks
Data Storage Solutions for Decentralized Online Social Networks Anwitaman Datta S* Aspects of Networked & Distributed Systems (SANDS)! School of Computer Engineering NTU Singapore isocial Summer School,
More informationUnit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
More informationOn the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016
On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT
More informationSession Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
More informationCS5412: TIER 2 OVERLAYS
1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data
More informationPersonal Containers: Yurts for Digital Nomads 1
Personal Containers: Yurts for Digital Nomads 1 Malte Schwarzkopf, Anil Madhavapeddy, Theodore Hong, Richard Mortier University of Cambridge Computer Laboratory 15 JJ Thomson Avenue Cambridge CB3 0FD firstname.lastname@cl.cam.ac.uk
More informationInter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking & Distributed Systems
Brochure More information from http://www.researchandmarkets.com/reports/2172101/ Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking
More informationChord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
More informationHow To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
More informationRESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
More informationPeer-to-Peer Computing
Quang Hieu Vu Mihai Lupu Beng Chin Ooi Peer-to-Peer Computing Principles and Applications Springer 1 Introduction 1 1.1 Peer-to-Peer Computing 1 1.2 Potential, Benefits, and Applications 3 1.3 Challenges
More informationCassandra A Decentralized, Structured Storage System
Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922
More informationLeonardo Hotels Group Page 1
Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes
More informationour darknet and its bright spots building connections for spaces and people
our darknet and its bright spots building connections for spaces and people Overview Who are we? What are we talking about? Why should you care? Where are we going with this? When can I join? Who are we?
More informationThe Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationRealizing a Vision Interesting Student Projects
Realizing a Vision Interesting Student Projects Do you want to be part of a revolution? We are looking for exceptional students who can help us realize a big vision: a global, distributed storage system
More informationVirtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001
Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001 Virtual routing is a software design method used to provide multiple independent routers that share
More informationSoftware Concepts. Uniprocessor Operating Systems. System software structures. CIS 505: Software Systems Architectures of Distributed Systems
CIS 505: Software Systems Architectures of Distributed Systems System DOS Software Concepts Description Tightly-coupled operating system for multiprocessors and homogeneous multicomputers Main Goal Hide
More informationPeer-to-Peer Networks
Peer-to-Peer Networks Chapter 1: Introduction Jussi Kangasharju Chapter Outline Course outline and practical matters Peer-to-peer (P2P) overview Definition of P2P What is P2P and how it is different from
More informationThe Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
More informationMobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland marcin.matuszewski@nokia.com, esko.kokkonen@nokia.com Abstract This
More informationJXTA Overview. Mathieu Jan IRISA Rennes Projet Paris
JXTA Overview Mathieu Jan IRISA Rennes Projet Paris Plan Why peer-to-peer (P2P)? Introduction to JXTA Goals Basic concepts Protocols JXTA 2.0 Loosely-Consistent DHT Conclusion 2 Why peer-to-peer (P2P)?
More informationNetwork Architecture and Topology
1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end
More informationApproximate Object Location and Spam Filtering on Peer-to-Peer Systems
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz University of California, Berkeley The Problem
More informationBloom Filter based Inter-domain Name Resolution: A Feasibility Study
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN
More informationOutline. 15-744: Computer Networking. Narrow Waist of the Internet Key to its Success. NSF Future Internet Architecture
Outline 15-744: Computer Networking L-15 Future Internet Architecture 2 Motivation and discussion Some proposals: CCN Nebula Mobility First XIA XIA overview AIP Scion 2 NSF Future Internet Architecture
More informationAsync: Secure File Synchronization
Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany vera.schaaber@stud.h-da.de
More informationStorage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
More informationPeer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
More informationVaralakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
More informationSoNet Privacy and Replication in Federated Online Social Networks
SoNet Privacy and Replication in Federated Online Social Networks Lorenz Schwittmann, Christopher Boelmann, Matthäus Wander, Torben Weis University of Duisburg-Essen Duisburg, Germany wimi@vs.uni-due.de
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationSecurity in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
More informationHigh Throughput Computing on P2P Networks. Carlos Pérez Miguel carlos.perezm@ehu.es
High Throughput Computing on P2P Networks Carlos Pérez Miguel carlos.perezm@ehu.es Overview High Throughput Computing Motivation All things distributed: Peer-to-peer Non structured overlays Structured
More informationScalable Internet Services and Load Balancing
Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and
More informationThreats to be considered (1) ERSTE GROUP
VoIP-Implementation Lessons Learned Philipp Schaumann Erste Group Bank AG Group IT-Security philipp.schaumann@erstegroup.com http://sicherheitskultur.at/ Seite 1 Threats to be considered (1) Eavesdropping
More informationPeer-to-peer (P2P) telephony and communications
02jennings/bryan-p36 4/21/06 9:42 AM Page 2 P2P For Communications: Beyond File Sharing Cullen Jennings and David A. Bryan Dr. Cullen Jennings is a Distinguished Engineer with Cisco Systems specializing
More informationRADOS: A Scalable, Reliable Storage Service for Petabyte- scale Storage Clusters
RADOS: A Scalable, Reliable Storage Service for Petabyte- scale Storage Clusters Sage Weil, Andrew Leung, Scott Brandt, Carlos Maltzahn {sage,aleung,scott,carlosm}@cs.ucsc.edu University of California,
More informationScalable Internet Services and Load Balancing
Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and
More informationSecuring Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture
IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton
More informationOverlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.
Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support
More informationP2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
More informationLimitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
More information