p2p: systems and applications Internet Avanzado, QoS, Multimedia Carmen Guerrero
|
|
- Marilyn Richard
- 7 years ago
- Views:
Transcription
1 p2p: systems and applications Internet Avanzado, QoS, Multimedia Carmen Guerrero Dpto. Ingeniería Telemática Index Introduction Taxonomy Classification of p2p overlay networks Applications Voip in p2p -> p2psip Estandardization Bibliography Work proposals 2 1
2 Introduction P2p overlay nets are: Distributed systems in nature Without any hierarchical organization Without any centralized control Features: Robust wide-area rounting architecture Efficient search of data items Selection of nearby peers Redundant storage Hierarchical naming Trust and authentication Anonymity Massive scalability Fault tolerant Self organization 3 Abstract p2p overlay network architecture Fuente: [Survey05] 4 2
3 First classification of p2p overlay nets Structured Topology tightly controlled Content is not located randomly but at specific peers That means more efficient queries How? DHT (Distributed Hash Tables) Data object location information is placed deterministically at the peers with IDs corresponding to the data object s unique key Assigned uniform random peerid Large space of identifiers Data objects are assigned unique identifiers called keys Keys are mapped to a unique live peer in the overlay net Scalable storage and retrieval of {key,value} Each peer maintains a small routing table consisting of its neighboring peer Differente DHTs: data organization, key space and routing strategies. Efficiently locate rare items More overhead than unstructured p2p for popular content 5 First classification of p2p overlay nets Unstructured Napster (1999).- p2p file sharing and a centralized file search facility Self scaling: more peers, more aggregate download capability It does not requiere much bandwidth for the central server Single point of failure Gnutella (2001). Decentralized system. Both search and download capabilities First example of unstructure p2p No topology Flooding messages When a peer receives a query, it responds with the list of content that maches the query Effective for locating high replicated items Resilent to peer joining/leaving the peer the system Not suited for locating rare items, better for popular content Not scalable: load of each peer grows linearly with the queries and nº of peers Peer readily become overloaded Today, decentralized unstructured p2p network are commonly used over Internet. Recent effort on KBR (Key Based Routing) versus ad-hoc nature in unstructure p2p. 6 3
4 Taxonomy Decentralization Architecture Lookup protocol Systems parameters Routing performance Routing state Peer join and leave Security Reliability and fault resiliency 7 Structured CAN (2000) Chord (2003) Tapestry (2004) Pastry (2001) Kademlia (2002) Viceroy (2002) 8 4
5 CAN Content Addressable Network Hash-table functionality to an Internet-like scale Scalable, fault-tolerant and self-organizing Architectural design: Virtual d-dimensional cartesian coordinate space The entire coordinate space is dynamically partitioned among all the peers (N peers) Every peer possesses its individual, distinct zone within the overall space A CAN peer maintains a routing table: IP address and virtual coordinate zone of each of its neighbours in the coordinate space. A peer routes a message toward destinatipn forwarding to the neighbor peer that is closest to the destination coordinates Routing performance ofθ(d x N 1/d ) Routing state 2 x d bound 9 CAN Fuente: [Survey05] 10 5
6 CAN The virtual coordinate 2-d space is used to store {key K, value V} Key K is deterministically mapped onto a point P in the coordinate space using a uniform hash function The lookup protocol retrieves an entry corresponding to key K, and any peer can apply the same deterministic hash functionto map K onto a point P and then retrieve the corresponding value V from the point P. If the requesting peer or its inmediate neighbour to not own the poing P, the request must be routed through the CAN infraestructure until it reaches the peer where P lays. A peer maintains the IP addresses of those peers that hold coordinate zones adjoining its zone. A new peer that joins the systems must have its own portion of the coordinate space allocated. By splitting an existing peer zone in half 11 CAN CAN has an associated DNS domain name that is resolved into the IP address of one or more CAN bootstrap peers (which maintain a partial list of CAN peers) A new peer to join, it looks up in the DNS of a CAN domain to retrieve a bootstrap peer s IP address The bootstrap peer supplies the IP address of some randomly choosen peer in the system The new peer randomly chooses a point P and send a JOIN request destinated for the point P Each CAN peer uses the routing mechanism to forward the message until it reaches the peer in which zone P lies. The current peer in zone P then split its zone in half and assigns the other half to the new peer. 12 6
7 CAN When a peer leaves, a takeover algorithm updated the allocation of peer in zone. The number of neighbor a peer maintains depends only on the dimensionality of the coordination space (i.e. 2 x d) and it is independent of the total number of peers in the system 13 CAN Improvement of CAN Reality Multiple, independent coordinate spaces A CAN with r realities, a single peer is assigned r coordinate zones with r independent neighbor sets The content of the hash table is replicated on each reality, improving data availability K different hash functions to map a given key onto k points in teh coordinate space This is a replication of a single {key,value} pair at k distinct peers in the system Queries for a particular hash table entry could be forwarded to all k peers in parallel, reducing the average query latency Reliability and fault resiliency properties are enhanced too 14 7
8 CAN Examples of application of CAN OceanStore architecture for global-scale persistent storage (2002) Farsite Serverless distribute file system deployed on a existing set of desktop pcs (2000) Publius Robust, censorship-resistant web publishing (2000) Construction of a wide-area name resolution services that decople the naming scheme for the name resolution process. This enables an arbitrary and locationindependent naming scheme 15 Chord Consistenf hashing to assign keys to its peers. Peers enter and leave the network with minimal interruption Tends to balance the load on the system, since each peer receives roughly the same number of keys, and there is a little movement of keys when peers join and leave the system Routing performance ofθ(d x N 1/d ) Routing stateθ( log N) 16 8
9 Chord The consistent hash function assign peers and data keys an m-identifier using SHA-1 Peer identifier = H (peer`s IP address) Key identifier = H (data key) The lenght of m identifier must be large enough Identifiers are ordered on a circle modulo 2m (from 0 to 2m-1). Chord Ring Key k is assigned to the first peer whose identifier is equal to or follows k in the identifies space. Sucessor (k) Sucessor (k) is the first peer clockwise from k 17 Chord When a peer n joins the network, certain keys previously assigned to n successors now need to be reasigned to n. When peer n leaves the network, all of its assigned keys are reassigned to n s sucessor. Peers join and leave the network (logn) 2 performance No other changes on key assignment needed 18 9
10 Chord Fuente: [Survey05] 19 Chord Chord ring m= 6 10 peers Store 5 keys The sucessor of the identifier 10 is peer 14, so key 10 will be located at NodeID 14 If a peer were to join with identifier 26, it would store the key with identifier 24 from the peer with identifier 32 Each peer maintains a routing table with up to m entries: finger table (chord id, IP) 20 10
11 Chord Peers store information only of a few number of other peers, and know more about peer closely following it on the circle. Also, a peer s finger table does not contain enough information to directly determine the sucessor of an arbitrary key k Whe a peer join, the sucessor pointers need to be updated by a stabilization protocol running periodically. Each peer is aware of its sucessor When a peer fail, it is possible that a peer does not know its new sucessor, and it has no chance to learn about it. To avoid this, each peer maintains a successor lists of r peers whic contains the peer s first r sucessors If a successor peer doesn t respond, the peer contacts the next peer in the sucessor list. Increasing r makes the system more robust 21 Chord Examples of applications of Chord: Cooperative mirroring or coorperative files systems (CFS). Multiple providers of content cooperate to store and serve each other s data Each participant need to provide capacity only for the average load, not for the peak load Chord-base DNS Lookup service Host name -> keys IP address -> values Rely on root servers not needed Advantages.. > work proposal 22 11
12 Structured CAN (2000) Chord (2003) Tapestry (2004) Pastry (2001) Kademlia (2002) Viceroy (2002) 23 Discussion about Structured p2p DHT-based systems have a few problems in terms of data object lookup latency: For each overlay hop, peers route a message to the next intermediate peer that can be located very far away with regard to physical topology or the underlying IP network It is assumed that all peers equally participate in hosting published data objects or their location information. Bottleneck of low-capacity peers DHT-based systems do not capture the semantic object relationship between name and its content or metadata Not widely deployed 24 12
13 Discussion about Structured p2p Security A malicious peer return wrong data objects to the lookup queries Criptographic techniques for data authenticity.. NodeID assignment Peer selection in routing Cross checking using random queries Avoiding single points of responsability Taxonomy of attacks -> work proposal Analysis of techniques for secure peer joining, routing table maintenance, robust message forwarding in the case of a set of malicious peers (Eclipse attack) 25 Unstructured Overlay networks organize peers in a random graph in a flat or hierarchical manner (ie Super-Peers layer) Use flooding or random walks or expanding-ring TTL search Each peer will support complex queries Inefficient becaus queries for content that are not widely replicated must be sent to a large fraction of peers There is no coupling between topology and data item s location 26 13
14 Unstructured Freenet Gnutella FastTrack/KazaA BitTorrent Work proposal.- Description of more common unstructured p2p overlay networks 27 Discussion of Unstructured p2p More efficient in a mass-market file sharing Because DHT-based solutions are not widely deployed, researh work is trying to improve unstructured solutions to include flow control, dynamic geometric topology adaptation, one-hop replication, peer heterogeneity 28 14
15 Future in p2p research How the p2p virtual topology maps in to the physical network infrastructure Quantitative evaluation on p2p overlay applications and Internet topology matching Scalability of p2p by the efficient use of the undelying physical network resources Self-regulatory auditing and accounting behaviour for resource sharing Economic and game theories for p2p collaboration is crutial to create a economy of equilibrium Trust and reputation Cross-application of Internet p2p overlay networking models in mobile, wireless, ad-hoc networks 29 Applications Voip in p2p Skype DHT-based solutions p2psip 30 15
16 p2p and SIP INVITE REGISTER => user_a at peer_1 Contact: uc3m.es user_b at peer_ Client-serve Model=> maintenance, configuration, controlled infrastructure INVITE user_b P2P overlay REGISTER user_b P2P Model => No central server (search latency) 31 p2p and SIP SIP-using-P2P, replace SIP location service by a p2p protocol P2P-over-SIP, implementation of p2p using SIP signaling FIND P2P network INVITE sip:user_b@ INSERT user_b INVITE user_b P2P-SIP overlay REGISTER user_b
17 SIP-using-P2P Reusing optimized and well-defined external P2P network Defining P2P location service interface to be used in SIP Extends to other signaling protocols 33 P2P-over-SIP P2P algorithm over SIP without change in semantics No dependence on external P2P network Study how to built-in NAT/media relays 34 17
18 P2P-SIP scenarios Non server-based architecture Non propietary architecture (skype) Robust and efficient lookup using DHT DHT can use SIP communication Hybrid scenario: lookup SIP and DHT Applications: use p2p-sip as an outbound proxy P2P vs server-based SIP P2P for smaller scenarios: community network Server-based for bigger scenarios: carriers Federated systems: multiple p2p systems, identified by DNS domain name with gateway nodes 35 P2P-SIP scenarios P2P vs server-based SIP P2P for smaller scenarios: community network Server-based for bigger scenarios: carriers Federated systems: multiple p2p systems, identified by DNS domain name with gateway nodes P Q R S server based company.com E A G D content.eu H uc3m.es C F B P2P-SIP nodes X uc.pt Z Y P2P-SIP nodes 36 18
19 Standardization IRTF P2P Research Group prg P2P-SIP A P2P Approach to SIP Registration (draft) 37 Bibliografía [Survey05] A survey and comparision of peer-to-peer overlay network schemes Eng Keong Lua, J. Crowcroft and M. Pias. IEEE Communications Survey, 2nd Quarter Vol 7. No. 2 Peer-to-Peer Systems and Applications R. Steinmetz and K. Wehrle. State of the art survey. LNCS Springer
20 Trabajos propuestos p2psip. Análisis de la arquitectura Aspectos de seguridad Ejemplos de KBR APIs: OpenDHT (open public accesible DHT service) Soluciones de p2p para movilidad de redes Infraestructura para descubrimiento de HA Servicios básicos de Internet en p2p: Chord-based DNS What p2p-based DNS? Análisis de seguridad en DHT-based p2p Taxonomy of attacks Description of more common unstructured p2p overlay networks 39 20
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
More informationA Survey and Comparison of Peer-to-Peer Overlay Network Schemes
% " #$! IEEE COMMUNICATIONS SURVEY AND TUTORIAL, MARCH 2004 1 A Survey and Comparison of Peer-to-Peer Overlay Network Schemes Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma and Steven Lim Abstract
More informationT he Electronic Magazine of O riginal Peer-Reviewed Survey Articles ABSTRACT
SECOND QUARTER 2005, VOLUME 7, NO. 2 IEEE C OMMUNICATIONS SURVEYS T he Electronic Magazine of O riginal -Reviewed Survey Articles www.comsoc.org/pubs/surveys A SURVEY AND COMPARISON OF PEER-TO-PEER OVERLAY
More informationRESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
More informationChord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
More informationPEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
More informationUsing Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
More informationA SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS
A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering anidathi@yahoo.co.in jkumaribharat@yahoo.com
More informationAdapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationVaralakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
More informationP2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationChord. A scalable peer-to-peer look-up protocol for internet applications
Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction
More information5. Peer-to-peer (P2P) networks
5. Peer-to-peer (P2P) networks PA191: Advanced Computer Networking I. Eva Hladká Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Autumn 2015 Eva Hladká (FI MU) 5. P2P networks Autumn 2015
More informationHow To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
More informationDistributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
More informationA Survey of Peer-to-Peer File Sharing Technologies
Athens University of Economics and Business The ebusiness Centre (www.eltrun.gr) A Survey of Peer-to-Peer File Sharing Technologies White Paper Page 1 of 1 A Survey of Peer-to-Peer File Sharing Technologies
More informationPeer-to-Peer Networks Organization and Introduction 1st Week
Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/
More informationLoad Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
More informationLOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,
More informationLOOKING UP DATA IN P2P SYSTEMS
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed
More informationDecentralized supplementary services for Voice-over-IP telephony
Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.
More informationPeer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology hanguyen@cc.hut.fi Abstract In the last few years, the success of the Napster online music sharing program
More informationMapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer
More informationA Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications. Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu
A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu July 5, 2013 2 ABSTRACT Distributed Hash Table (DHT) plays an important
More informationA PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
More informationSecurity in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
More informationAcknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts:
Acknowledgements Peer to Peer File Storage Systems CS 699 Some of the followings slides are borrowed from a talk by Robert Morris (MIT) 1 2 P2P File Systems Target Uses File Sharing is one of the most
More informationP2P Characteristics and Applications
P2P Characteristics and Applications Lecture for the Project Group A Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi Email: graffi@mail.upb.de Fachgruppe Theorie verteilter Systeme Fakultät
More informationIPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha
IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand
More informationUnit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
More informationArchitectures and protocols in Peer-to-Peer networks
Architectures and protocols in Peer-to-Peer networks Ing. Michele Amoretti [amoretti@ce.unipr.it] II INFN SECURITY WORKSHOP Parma 24-25 February 2004 Contents - Definition of Peer-to-Peer network - P2P
More informationAnonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
More informationP2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
More informationPSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries
PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries Jyoti Ahuja, Jun-Hong Cui, Shigang Chen, Li Lao jyoti@engr.uconn.edu, jcui@cse.uconn.edu, sgchen@cise.ufl.edu, llao@cs.ucla.edu
More informationFile sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion
More informationDecentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
More informationMethods & Tools Peer-to-Peer Jakob Jenkov
Methods & Tools Peer-to-Peer Jakob Jenkov Peer-to-Peer (P2P) Definition(s) Potential Routing and Locating Proxy through firewalls and NAT Searching Security Pure P2P There is no central server or router.
More informationA Scalable Content-Addressable Network
A Scalable Content-Addressable Network Sylvia Ratnasamy 1 2 Paul Francis 2 Mark Handley 2 Richard Karp 1 2 Scott Shenker 2 1 Dept. of Electrical Eng. & Comp. Sci. 2 ACIRI University of California, Berkeley
More informationDistributed Hash Tables in P2P Systems - A literary survey
Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology tstanner@cc.hut.fi Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer
More informationEvolution of Peer-to-Peer Systems
EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor
More informationPeer-to-Peer Computing
Quang Hieu Vu Mihai Lupu Beng Chin Ooi Peer-to-Peer Computing Principles and Applications Springer 1 Introduction 1 1.1 Peer-to-Peer Computing 1 1.2 Potential, Benefits, and Applications 3 1.3 Challenges
More informationDomain Name System for PeerHosting
Domain Name System for PeerHosting Arnav Aggarwal, B.Tech A dissertation submitted to the University of Dublin, in partial fulfilment of the requirements for degree of Master of Science in Computer Science
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationPeer to peer networks: sharing between peers. Trond Aspelund
Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server
More informationRaddad Al King, Abdelkader Hameurlain, Franck Morvan
Raddad Al King, Abdelkader Hameurlain, Franck Morvan Institut de Recherche en Informatique de Toulouse (IRIT), Université Paul Sabatier 118, route de Narbonne, F-31062 Toulouse Cedex 9, France E-mail:
More informationQuantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature
A Thesis for the degree of Master Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature Chang-Hwan Lee School of Engineering Information and Communications University 2008 i Quantitative
More informationAn Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn
More informationMiddleware and Distributed Systems. Peer-to-Peer Systems. Martin v. Löwis. Montag, 30. Januar 12
Middleware and Distributed Systems Peer-to-Peer Systems Martin v. Löwis Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers)
More informationA Review on Efficient File Sharing in Clustered P2P System
A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,
More informationquery enabled P2P networks 2009. 08. 27 Park, Byunggyu
Load balancing mechanism in range query enabled P2P networks 2009. 08. 27 Park, Byunggyu Background Contents DHT(Distributed Hash Table) Motivation Proposed scheme Compression based Hashing Load balancing
More informationNew Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
More informationChord: A Scalable Peer-to-peer Lookup Service for Internet Applications
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science chord@lcs.mit.edu
More informationAttacks Against Peer-to-peer Networks and Countermeasures
Attacks Against Peer-to-peer Networks and Countermeasures Lin Wang Helsinki University of Technology lwang@cc.hut.fi Abstract Peer-to-peer (P2P) networks have many distinct aspects that are different from
More informationA P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
More informationThe Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
More informationMobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland marcin.matuszewski@nokia.com, esko.kokkonen@nokia.com Abstract This
More informationCS5412: TIER 2 OVERLAYS
1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data
More informationPEER-TO-PEER (P2P) systems have emerged as an appealing
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 4, APRIL 2009 595 Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems Quang Hieu Vu, Member, IEEE, Beng Chin Ooi,
More informationTornado: A Capability-Aware Peer-to-Peer Storage Network
Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao hsiao@pads1.cs.nthu.edu.tw Chung-Ta King* king@cs.nthu.edu.tw Department of Computer Science National Tsing Hua University Hsinchu,
More informationRVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN)
RVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN) Luca Bettosini Universität Bern Outline > Goals / Motivation ( CAN ) > Content Addressable Network > CAN Multicast
More informationCalto: A Self Sufficient Presence System for Autonomous Networks
Calto: A Self Sufficient Presence System for Autonomous Networks Abstract In recent years much attention has been paid to spontaneously formed Ad Hoc networks. These networks can be formed without central
More informationGISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes
More informationPlaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3
Uni Innsbruck Informatik Uni Innsbruck Informatik Peerto topeer Systems DHT examples, part (Pastry, Tapestry and Kademlia) Michael Welzl michael.welzl@uibk.ac.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg
More informationA Comparative Study of the DNS Design with DHT-Based Alternatives
A Comparative Study of the DNS Design with DHT-Based Alternatives Vasileios Pappas Computer Science Department UCLA Email: vpappas@cs.ucla.edu Dan Massey Computer Science Department Colorado State University
More informationP2P-Enabling for Critical Infrastructure Protection
AUTONOMICS 2009 P2P-Enabling for Critical Infrastructure Protection Abdelmajid Khelil, Hamza Ghani, Daniel Germanus and Neeraj Suri Technische Universität Darmstadt, Germany Cyprus, Sept. 10, 2009 Dependable
More informationInformation Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
More informationLawful Interception in P2Pbased
Lawful Interception in P2Pbased VoIP Systems Jan Seedorf (jan.seedorf_at_nw.neclab.eu) NEC Laboratories Europe Heidelberg, Germany July Page 2008 1-1 IPTCOMM 2008 Heidelberg, Germany Outline 1.
More informationInternet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr
Internet Architecture for Robust Mobility Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Contents Introduction IETF Activity Home Agent Reliability Protocol P2P-based Approaches ROAM and SAMP
More informationRELOAD Usages for P2P Data Storage and Discovery
RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf Alexander.Knauf@Haw-Hamburg.de Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference
More informationN6Lookup( title ) Client
CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding
More informationBalanced Reputation Detective System (BREDS): Proposed Algorithm
Balanced Reputation Detective System (BREDS): Proposed Algorithm Pallavi Bansal 1, Narender Singh 2 1,2Computer science &Engineering department, G.I.T.M, Bilaspur, Yamunanagar, Haryana ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationTools for Peer-to-Peer Network Simulation
Tools for Peer-to-Peer Network Simulation draft-irtf-p2prg-core-simulators-00.txt Alan Brown and Mario Kolberg University of Stirling, UK IETF65 P2PRG - March 24, 2006 1 Overview Provide survey of tools
More informationPeer-to-peer (P2P) telephony and communications
02jennings/bryan-p36 4/21/06 9:42 AM Page 2 P2P For Communications: Beyond File Sharing Cullen Jennings and David A. Bryan Dr. Cullen Jennings is a Distinguished Engineer with Cisco Systems specializing
More informationSuperViz: An Interactive Visualization of Super-Peer P2P Network
SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu pqyu@cs.ubc.ca Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes
More informationMIDAS: Multi-Attribute Indexing for Distributed Architecture Systems
MIDAS: Multi-Attribute Indexing for Distributed Architecture Systems George Tsatsanifos (NTUA) Dimitris Sacharidis (R.C. Athena ) Timos Sellis (NTUA, R.C. Athena ) 12 th International Symposium on Spatial
More informationPeer-to-Peer and Grid Computing. Chapter 4: Peer-to-Peer Storage
Peer-to-Peer and Grid Computing Chapter 4: Peer-to-Peer Storage Chapter Outline Using DHTs to build more complex systems How DHT can help? What problems DHTs solve? What problems are left unsolved? P2P
More informationStorage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
More informationContent Distribution over IP: Developments and Challenges
Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,
More informationA Scalable Architecture for SIP Infrastructure using Content Addressable Networks
A Scalable Architecture for Infrastructure using Content Addressable Networks Ramrajprabu Balasubramanian Injong Rhee Jaewoo Kang Department of Computer Science North Carolina State University Raleigh,
More informationWide-area cooperative storage with CFS
Wide-area cooperative storage with CFS Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science chord@lcs.mit.edu http://pdos.lcs.mit.edu/chord/ Abstract
More informationNaming vs. Locating Entities
Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address
More informationJoin and Leave in Peer-to-Peer Systems: The DASIS Approach
Join and Leave in Peer-to-Peer Systems: The DASIS Approach Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer {kenoa@inf, rarnold@inf, mgaehwil@student, wattenhofer@inf}.ethz.ch Department
More informationResearch on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
More informationSCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS *
SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS * Maha Abdallah LIP6, Université Paris 6, rue du Capitaine Scott 75015 Paris, France Maha.Abdallah@lip6.fr Hung Cuong Le
More informationSimple Solution for a Location Service. Naming vs. Locating Entities. Forwarding Pointers (2) Forwarding Pointers (1)
Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address
More information8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
More informationObject Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
More informationHow To Build A Training System On A Network Of Nodes
BACKUP AND RECOVERY MECHANISM FOR A DISTRIBUTED E-LEARNING SYSTEM Takao KAWAMURA, Syungo KINOSHITA, Shinichi MOTOMURA, and Kazunori SUGAHARA Department of Information and Knowledge Engineering Tottori
More informationA distributed system is defined as
A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency
More informationPeer-to-Peer File Sharing Across Private Networks Using Proxy Servers
Peer-to-Peer File Sharing Across Private Networks Using Proxy Servers by Shruti Dube DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING INDIAN INSTITUTE OF TECHNOLOGY, KANPUR May 2008 Peer-to-Peer File Sharing
More informationThe p2pweb model: a glue for the Web
The p2pweb model: a glue for the Web Pedro García López, Marc Sánchez Artigas, Jordi Pujol Ahulló Universitat Rovira i Virgili Tarragona, Spain { pedro.garcia, marc.sanchez, jordi.pujol}@urv.cat Abstract
More informationEfficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Kunwadee Sripanidkulchai Bruce Maggs Hui Zhang Carnegie Mellon University, Pittsburgh, PA 15213 {kunwadee,bmm,hzhang}@cs.cmu.edu
More informationPolitehnica University of Timisoara. Distributed Mailing System PhD Report I
Politehnica University of Timisoara PhD Report I Patrik Emanuel Mezo Prof. Dr. Ing. Mircea Vladutiu PhD Student PhD Coordinator ABSTRACT This PhD Report describes the research activity carried on as part
More informationClient/server and peer-to-peer models: basic concepts
Client/server and peer-to-peer models: basic concepts Dmitri Moltchanov Department of Communications Engineering Tampere University of Technology moltchan@cs.tut.fi September 04, 2013 Slides provided by
More informationPeer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta
More informationDiscovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany tim@c-lab.de Abstract. Network infrastructures are nowadays
More informationWeb Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)
1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication
More informationApproximate Object Location and Spam Filtering on Peer-to-Peer Systems
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz University of California, Berkeley The Problem
More information