L13 P2P Overlay Networks: Theory
|
|
- Lora Hardy
- 7 years ago
- Views:
Transcription
1 L13 P2P Overlay Networks: Theory by T.S.R.K. Prasad EA C451 Internetworking Technologies
2 References / Acknowledgements Ch 6: Peer-to-Peer Content Networks, [Hoffman] Sec 2.6: Peer-to-Peer Applications, [Kurose] [Theotokis] Stephanos Androutsellis-Theotokis, A Survey of Peer-to-Peer File Sharing Technologies References
3 References / Acknowledgements [Ross-P2P] Keith W. Ross, and Dan Rubenstein, P2P Systems, Infocomm Tutorial [Kurose-P2P] Ch2: Applications, [Kurose] [Zhang-P2P] Prof. Zhi-Li Zhang, P2P, CSci5221: Foundations of Advanced Networking, Spring ( 2011/csci5221/index.php) [Rexford-P2P] Jennifer Rexford, Peer-to-Peer File Sharing, COS 461: Computer Networks ( References
4 References / Acknowledgements [Stoica-P2P] Ion Stoica, P2P Networks, EE122: Computer Networking, Dept of EECS, UCB, Fall (www-inst.eecs.berkeley.edu/~ee122/fa02) References
5 Optional Readings [Andersen] David G. Andersen, Hari Balakrishnan, M. Frans Kaashoek, and Robert Morris, Resilient Overlay Networks, SOPS [Lua] Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma and Steven Lim, A Survey and Comparison of Peer-to-Peer Overlay Network Schemes, IEEE Communications Survey and Tutorial, March [Rodrigues] Rodrigo Rodrigues, and Peter Druschel, Peer-to- Peer Systems Optional Reading
6 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline
7 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline
8 Client-Server Limitations Scalability is hard to achieve Presents a single point of failure Requires administration Unused resources at the network edge P2P systems try to address these limitations Introduction C/S Limitations
9 Defintion of P2P 1) Significant autonomy from central servers 2) Exploits resources at the edges of the Internet storage and content CPU cycles human presence 3) Resources at edge have intermittent connectivity, being added & removed Introduction Definition of P2P
10 It s a broad definition: P2P file sharing Napster, Gnutella, KaZaA, etc P2P communication Instant messaging P2P computation seti@home DHTs & their apps Chord, CAN, Pastry, Tapestry P2P apps built over emerging overlays PlanetLab Introduction Definition of P2P
11 Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change IP addresses Introduction Pure P2P Architecture
12 Characteristics of P2P Networks Clients are also servers and routers Nodes contribute content, storage, memory, CPU Nodes are autonomous (no administrative authority) Network is dynamic: nodes enter and leave the network frequently Nodes collaborate directly with each other (not through well-known servers) Nodes have widely varying capabilities Introduction Characteristics of P2P Networks
13 Benefits of P2P Networks Efficient use of resources Unused bandwidth, storage, processing power at the edge of the network Scalability Consumers of resources also donate resources Aggregate resources grow naturally with utilization Introduction Benefits of P2P Networks
14 Benefits of P2P Networks Reliability Replicas Geographic distribution No single point of failure Ease of administration Nodes self organize No need to deploy servers to satisfy demand (c.f. scalability) Built-in fault tolerance, replication, and load balancing Introduction Benefits of P2P Networks
15 Key Issues in P2P Networks Join/leave How do nodes join/leave? Who is allowed? Search and retrieval How to find content? How are metadata indexes built, stored, distributed? Content Distribution Where is content stored? How is it downloaded and retrieved? Introduction Key Issues P2P Networks
16 Four Key Primitives (APIs) Join How to enter/leave the P2P system? Publish How to advertise a file? Search how to find a file? Fetch how to download a file? Introduction Four Key Primitives
17 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline
18 File Distribution: Client-Server vs Peer-to-Peer Question: how much time to distribute file (size F) from one server to N peers? peer upload/download capacity is limited resource F bits Internet File Distribution Example The Problem
19 Server Distributing a Large File F bits d 4 upload rate u s Internet d 3 d 1 d 2 upload rates u i download rates d i File Distribution Example Server Distributing a Large File
20 Server Distributing a Large File Sending an F-bit file to N receivers Transmitting NF bits at rate u s takes at least NF/u s time Receiving the data at the slowest receiver Slowest receiver has download rate d min = min i {d i } takes at least F/d min time Download time: max{nf/u s, F/d min } File Distribution Example Server Distributing a Large File
21 Speeding Up the File Distribution Increase the server upload rate Higher link bandwidth at the server Multiple servers, each with their own link Alternative: have the receivers help Receivers get a copy of the data and redistribute to other receivers To reduce the burden on the server File Distribution Example Speeding up the File Distribution
22 Peers Help Distributing a Large File F bits d 4 upload rate u s Internet u 4 d 3 d 1 u 1 u 2 u 3 d 2 upload rates u i download 22 rates d i File Distribution Example Peer Helpout
23 Peers Help Distributing a Large File Components of distribution latency Server must send each bit: min time F/u s Slowest peer must receive each bit: min time F/d min Upload time using all upload resources Total number of bits: NF Total upload bandwidth u s + sum i (u i ) Total: max{f/u s, F/d min, NF/(u s +sum i (u i ))} 23 File Distribution Example Peer Helpout
24 Peer-to-Peer is Self-Scaling Download time grows slowly with N Client-server: max{nf/u s, F/d min } Peer-to-peer: max{f/u s, F/d min, NF/(u s +sum i (u i ))} But Peers may come and go Peers need to find each other Peers need to be willing to help each other 24 File Distribution Example P2P is Self-Scaling
25 Minimum Distribution Time Client-server vs. P2P: example client upload rate = u, F/u = 1 hour, u s = 10u, d min u s P2P Client-Server N File Distribution Example Comparison
26 P2P file distribution: BitTorrent file divided into 256Kb chunks peers in torrent send/receive file chunks tracker: tracks peers participating in torrent torrent: group of peers exchanging chunks of a file Alice arrives obtains list of peers from tracker and begins exchanging file chunks with peers in torrent File Distribution Example BitTorrent
27 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline
28 Overlay networks overlay edge Overlay Networks
29 Overlay graph Virtual edge TCP connection or simply a pointer to an IP address Overlay maintenance Periodically ping to make sure neighbor is still alive Or verify liveness while messaging If neighbor goes down, may want to establish new edge New node needs to bootstrap Overlay Networks Overlay Graph
30 Overlays: all in the application layer Tremendous design flexibility Topology, maintenance Message types Protocol Messaging over TCP or UDP Underlying physical net is transparent to developer But some overlays exploit proximity application transport network data link physical application transport network data link physical application transport network data link physical Overlay Networks Application Layer
31 Overlay Networks Normal View Overlay Networks Normal View
32 Overlay Networks Focus at the application level Overlay Networks Application Level View
33 Examples of overlays DNS BGP routers and their peering relationships Content distribution networks (CDNs) Application-level multicast economical way around barriers to IP multicast And P2P apps! Overlay Networks Examples of Overlays
34 More about overlays Unstructured overlays e.g., new node randomly chooses three existing nodes as neighbors Structured overlays e.g., edges arranged in restrictive structure Proximity Not necessarily taken into account Overlay Networks More about Overlays
35 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline
36 Unstructured P2P Networks Central Server / Directory (Napster) Flooding (Gnutella) Super Peers / Super Nodes (KaZaA) Swarming (BitTorrent) Unstructured P2P Networks Types
37 Central Server / Directory Join and Publish File list and IP address is uploaded A centralized directory 1 1 C 1 B Unstructured P2P Networks Central Server
38 Central Server / Directory Search (a) User requests file search at server (b) Server responds with list of hosts (IP addresses) containing the file. centralized directory 2b 2a Unstructured P2P Networks Central Server
39 Central Server / Directory Fetch (a) User pings the sources that have the data (Looks for host with best bandwidth) centralized directory Pings Pings Unstructured P2P Networks Central Server
40 Central Server / Directory Fetch (a) User pings the sources that have the data (Looks for host with best bandwidth) (b) Downloads the file centralized directory Downloads the file Unstructured P2P Networks Central Server
41 Pros and Cons of Central Server Pros: Simple Search scope is O(1) Controllable (pro or con?) Cons: Server maintains O(N) State Server does all processing Single point of failure Unstructured P2P Networks Central Server
42 Unstructured P2P Networks Central Server / Directory (Napster) Flooding (Gnutella) Super Peers / Super Nodes (KaZaA) Swarming (BitTorrent) Unstructured P2P Networks Types
43 Query Flooding Join contact a few nodes to become neighbors Publish no need! Search ask neighbors, who ask their neighbors Fetch get file directly from another node Unstructured P2P Networks Flooding
44 Search by Flooding xyz.mp3 search xyz.mp3? Flooding Unstructured P2P Networks Flooding
45 Search by Flooding xyz.mp3 xyz.mp3? search Flooding Unstructured P2P Networks Flooding
46 Search by Flooding transfer Unstructured P2P Networks Flooding
47 Flooding: Pros and Cons Advantages Fully decentralized Search cost distributed Processing per node permits powerful search semantics Disadvantages Search scope is O(N) Search time may be quite long High overhead, and nodes come and go often Unstructured P2P Networks Flooding
48 Unstructured P2P Networks Central Server / Directory (Napster) Flooding (Gnutella) Super Peers / Super Nodes (KaZaA) Swarming (BitTorrent) Unstructured P2P Networks Types
49 Super Node Hierarchy Join on start, the client contacts a super-node Publish client sends list of files to its super-node Search queries flooded among super-nodes Fetch get file directly from one or more peers Unstructured P2P Networks Super Nodes Hierarchy
50 Motivation for Super Nodes Query consolidation Many connected nodes may have only a few files Propagating query to a sub-node may take more time than for the super-node to answer itself Stability Super-node selection favors nodes with high uptime How long you ve been on is a good predictor of how long you ll be around in the future Unstructured P2P Networks Super Nodes Motivation
51 Super Node Architecture Each peer is either a super node or is assigned to a super node Each super node knows about many other super nodes (almost mesh overlay) supernodes Unstructured P2P Networks Super Nodes Architecture
52 Super Node Architecture: After Join and Publish supernodes H 3 xyz.mp3 H 1 H 3 xyz.mp3 abc.mp3 H 2 xyz.mp3 H 1 H 2 abc.mp3 xyz.mp3 Unstructured P2P Networks Super Nodes After Join and Publish
53 Super Node Architecture: Search Query Flooding xyz.mp3 H 3 xyz.mp3? supernodes H 1 H 3 xyz.mp3 abc.mp3 H 2 xyz.mp3 H 1 H 2 abc.mp3 xyz.mp3 Unstructured P2P Networks Super Nodes Query Flooding
54 Super Node Architecture: Search Query Responses xyz.mp3 H 3 xyz.mp3 available at H 1, H 2, H 3 H 1 supernodes H 3 xyz.mp3 abc.mp3 H 2 xyz.mp3 H 1 H 2 abc.mp3 xyz.mp3 Unstructured P2P Networks Super Nodes Query Response
55 Super Node Architecture: Search Fetch xyz.mp3 H 3 supernodes H 1 H 3 xyz.mp3 abc.mp3 H 2 xyz.mp3 H 1 H 2 abc.mp3 xyz.mp3 Parallel download of pieces of file possible Unstructured P2P Networks Super Nodes Fetch
56 Pros and Cons of Super Nodes Pros: Tries to take into account node heterogeneity: Bandwidth Host Computational Resources Host Availability (?) Can take into account network locality Cons: Mechanisms easy to circumvent Still no real guarantees on search scope or search time Unstructured P2P Networks Super Nodes
57 Unstructured P2P Networks Central Server / Directory (Napster) Flooding (Gnutella) Super Peers / Super Nodes (KaZaA) Swarming (BitTorrent) Unstructured P2P Networks Types
58 Swarming Swarming: Download from others who are downloading the same object at the same time Join contact centralized tracker server, get a list of peers. Publish Run a tracker server. Search Out-of-band. E.g., use Google to find a tracker for the file you want. Fetch Download chunks of the file from your peers. Upload chunks you have to them. Unstructured P2P Networks Swarming
59 BitTorrent: Publish/Join Tracker Unstructured P2P Networks Swarming Publish / Join
60 BitTorrent: Fetch Unstructured P2P Networks Swarming Fetch
61 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline
62 The Search (Routing) Problem N 1 N 2 N 3 Key= title Value=MP3 data Publisher Internet? Client Lookup( title ) N 4 N 5 N 6 Structured P2P Networks The Search Problem
63 Routed Queries in Structured P2P Networks Publisher Key= title Value=MP3 data N 4 N 1 N 2 N 3 Client Lookup( title ) N 6 N 9 N 7 N 8 In structured overlay networks, searching is equivalent to routing on the structure of the overlay. Structured P2P Networks Routing in Structured P2P Networks
64 Distributed Hash Tables Academic answer to p2p Goals Guatanteed lookup success Provable bounds on search time Provable scalability Makes some things harder Fuzzy queries / full-text search / etc. Read-write, not read-only Hot Topic in networking since introduction in ~2000/2001 Structured P2P Networks DHT
65 DHT: Overview Abstraction: a distributed hash-table (DHT) data structure: put(id, item); item = get(id); Implementation: nodes in system form a distributed data structure Can be Ring, Tree, Hypercube, Skip List, Butterfly Network,... Structured P2P Networks DHT Overview
66 DHT: Overview Structured Overlay Routing: Join: On startup, contact a bootstrap node and integrate yourself into the distributed data structure; get a node id Publish: Route publication for file id toward a close node id along the data structure Search: Route a query for file id toward a close node id. Data structure guarantees that query will meet the publication. Fetch: Two options: Publication contains actual file => fetch from where query stops Publication says I have file X => query tells you has X, use IP routing to get X from Structured P2P Networks DHT Overview
67 DHT as Library / Platform Distributed application put(key, data) Distributed hash table get (key) data node node. node DHT provides the information look up service for P2P applications. Nodes uniformly distributed across key space Nodes form an overlay network Nodes maintain list of neighbors in routing table Decoupled from physical network topology Structured P2P Networks DHT as Library
68 DHT Schemes for Structured P2P Networks Chord Pastry Tapestry Content Addressable Network (CAN) Structured P2P Networks DHT Schemes
69 Chord Overview Associate to each node and file a unique id in an unidimensional space (a Ring) E.g., pick from the range [0...2 m ] Usually the hash of the file or IP address Properties: Routing table size is O(log N), where N is the total number of nodes Guarantees that a file is found in O(log N) hops from MIT in 2001 Structured P2P Networks Chord Overview
70 Chord IDs Key identifier = SHA-1(key) Node identifier = SHA-1(IP address) Both are uniformly distributed Both exist in the same ID space How to map key IDs to node IDs? The heart of Chord protocol is consistent hashing Structured P2P Networks Chord Chord IDs
71 Chord API insert(key, value)à store key/value at r nodes lookup(key) update(key, newval) join(n) leave() Structured P2P Networks Chord Chord API
72 DHT: Consistent Hashing Node 105 Key 5 K5 N105 K20 Circular ID space N32 N90 K80 A key is stored at its successor: node with next higher ID Structured P2P Networks Chord Consistent Hashing
73 DHT: Chord Basic Lookup N105 N120 N10 Where is key 80? N90 has K80 N32 K80 N90 N60 Structured P2P Networks Chord Basic Lookup
74 Basic Chord Lookup (Routing) Algorithm Lookup(my-id, key-id) n = my successor if my-id < n < key-id Lookup(id) on node n /go to next hop/ else return my successor /found the correct node/ Correctness depends only on successors O(N) lookup time, but we can do better Structured P2P Networks Chord Basic Lookup Algorithm
75 DHT: Chord Finger Table 1/4 1/2 1/8 1/16 1/32 1/64 1/128 N80 Entry i in the finger table of node n is the first node that succeeds or equals n + 2 i In other words, the i th finger points 1/2 n-i way around the ring Structured P2P Networks Chord Finger Table
76 DHT: Chord Join Assume an identifier space [0..8] Node n1 joins Succ. Table i id+2 i succ Structured P2P Networks Chord Join
77 DHT: Chord Join Node n2 joins Succ. Table i id+2 i succ Succ. Table i id+2 i succ Structured P2P Networks Chord Join
78 DHT: Chord Join Nodes n0, n6 join Succ. Table i id+2 i succ Succ. Table Succ. Table i id+2 i succ i id+2 i succ Succ. Table i id+2 i succ Structured P2P Networks Chord Join
79 DHT: Chord Join Nodes: n1, n2, n0, n6 Succ. Table i id+2 i succ Items 7 Items: f7, f2 0 Succ. Table 7 1 i id+2 i succ Succ. Table 6 2 i id+2 i succ Succ. Table i id+2 i succ Items 1 Structured P2P Networks Chord Join
80 DHT: Chord Routing Upon receiving a query for item id, a node: Checks whether stores the item locally If not, forwards the query to the largest node in its successor table that does not exceed id Succ. Table i id+2 i succ Succ. Table 7 1 i id+2 i succ query(7) Succ. Table i id+2 i succ Items 7 Succ. Table i id+2 i succ Items 1 Structured P2P Networks Chord Routing
81 Chord Routing Algorithm Lookup(my-id, key-id) look in local finger table for highest node n such that my-id < n < key-id if n exists Lookup(id) on node n /go to next hop/ else return my successor /found the correct node/ Structured P2P Networks Chord Routing Algorithm
82 Node Joining in Chord Node n joins the system: n picks a random identifier, id n performs n = lookup(id) n->successor = n n ->predecessor = n Structured P2P Networks Chord Node Joining
83 State Maintenance: Stabilization Protocol Periodically node n Asks its successor, n, about its predecessor n If n is between n and n n->successor = n notify n that n is its predecessor When node n receives notification message from n If n is between n ->predecessor and n, then n ->predecessor = n Improve robustness Each node maintain a successor list(usually of size 2*log N) Structured P2P Networks Chord State Maintenance
84 DHT: Network Locality in Chord Nodes close on a ring can be far on the network Structured P2P Networks Chord Network Locality
85 DHT: Chord Summary Routing table size? Log N fingers Routing time? Each hop expects to 1/2 the distance to the desired id => expect O(log N) hops. Structured P2P Networks Chord Summary
86 DHT Schemes for Structured P2P Networks Chord Pastry Tapestry Content Addressable Network (CAN) Structured P2P Networks DHT Schemes
87 Pastry: Overview Similar interface to Chord Considers network locality to minimize hops messages travel New node needs to know a nearby node to achieve locality Each routing hop matches the destination identifier by one more digit Many choices in each hop (locality possible) Structured P2P Networks Pastry Overview
88 Object Distribution O objid Consistent hashing [Karger et al. 97] 128 bit circular id space nodeids (uniform random) nodeids objids (uniform random) Invariant: node with numerically closest nodeid maintains object Structured P2P Networks Pastry Object Distribution
89 Object Insertion/Lookup O X Msg with key X is routed to live node with nodeid closest to X Route(X) Problem: complete routing table not feasible Structured P2P Networks Pastry Object Insertion/Lookup
90 Routing (Lookup) in Pastry d46a1c d471f1 d467c4 d462ba d4213f 65a1fc Route(d46a1c) d13da3 Properties log 16 N steps O(log N) state Structured P2P Networks Pastry Routing
91 Node Addition in Pastry New node: d46a1c d46a1c d471f1 d467c4 d462ba d4213f Route(d46a1c) d13da3 65a1fc Structured P2P Networks Pastry Node Addition
92 DHT Schemes for Structured P2P Networks Chord Pastry Tapestry Content Addressable Network (CAN) Structured P2P Networks DHT Schemes
93 What is Tapestry? A prototype of a decentralized, scalable, fault-tolerant, adaptive location and routing infrastructure (Zhao, Kubiatowicz, Joseph et al. U.C. Berkeley) Network layer of OceanStore global storage system Suffix-based hypercube routing Core system inspired by Plaxton Algorithm (Plaxton, Rajamaran, Richa (SPAA97)) Core API: publishobject(objectid, [serverid]) sendmsgtoobject(objectid) sendmsgtonode(nodeid) Structured P2P Networks Tapestry Overview
94 Tapestry Uses plaxton mesh data structure allows nodes to locate objects and route messages to them across an arbitrary-sized network while using a small, constant-sized routing map at each hop route map is called neighborhood map Ideas similar to pastry Structured P2P Networks Tapestry Overview
95 Plaxton (Suffix) Routing Example from to destination path resolution order: xxxx7 xxx67 xx567 x x represents wild cards All the numbers are in base-10 Structured P2P Networks Tapestry Plaxton Routing
96 Example Neighborhood Map Suffix routing Each entry points to next node in the neighborhood A neighbor is a connected node to the present node Level corresponds to the number of matching digits Neighbor Map For 5712 (Octal) x012 x112 x212 x312 x412 x512 x xx xx22 xx32 xx42 xx52 xx62 xx72 2 Routing Levels xxx0 xxx xxx3 xxx4 xxx5 xxx6 xxx7 1 Structured P2P Networks Tapestry Neighborhood Map
97 Another Suffix Routing Example Example: Octal digits, 2 18 namespace, Structured P2P Networks Tapestry Plaxton Routing
98 DHT Schemes for Structured P2P Networks Chord Pastry Tapestry Content Addressable Network (CAN) Structured P2P Networks DHT Schemes
99 Content Addressable Network (CAN) Associate to each node and item a unique id in an d-dimensional space Properties Routing table size O(d) Guarantee that a file is found in at most d*n 1/d steps, where n is the total number of nodes Structured P2P Networks CAN Overview
100 CAN Example: Two Dimensional Space Space divided between nodes All nodes cover the entire space Each node covers either a square or a rectangular area of ratios 1:2 or 2:1 Example: Assume space size (8 x 8) Node n1:(1, 2) first node that joins cover the entire space n Structured P2P Networks CAN Example
101 CAN Example: Two Dimensional Space Node n2:(4, 2) joins space is divided between n1 and n n1 n Structured P2P Networks CAN Example
102 CAN Example: Two Dimensional Space Node n2:(4, 2) joins space is divided between n1 and n n n1 n Structured P2P Networks CAN Example
103 CAN Example: Two Dimensional Space Nodes n4:(5, 5) and n5:(6,6) join n3 n4 n n1 n Structured P2P Networks CAN Example
104 CAN Example: Two Dimensional Space Nodes: n1:(1, 2); n2:(4,2); n3:(3, 5); n4:(5,5);n5:(6,6) Items: f1:(2,3); f2:(5,1); f3:(2,1); f4:(7,5); n3 n4 n5 f f1 n1 n2 f3 f Structured P2P Networks CAN Example
105 CAN Example: Two Dimensional Space Each item is stored by the node who owns its mapping in the space n3 n4 n5 f f1 n1 n2 f3 f Structured P2P Networks CAN Example
106 CAN: Query Example Each node knows its neighbors in the d-space Forward query to the neighbor that is closest to the query id Example: assume n1 queries f n3 n4 n5 f f1 n1 n2 f3 f Structured P2P Networks CAN Example
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
More informationCSCI-1680 CDN & P2P Chen Avin
CSCI-1680 CDN & P2P Chen Avin Based partly on lecture notes by Scott Shenker and John Jannotti androdrigo Fonseca And Computer Networking: A Top Down Approach - 6th edition Last time DNS & DHT Today: P2P
More informationChord. A scalable peer-to-peer look-up protocol for internet applications
Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction
More informationP2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
More informationN6Lookup( title ) Client
CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding
More informationPlaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3
Uni Innsbruck Informatik Uni Innsbruck Informatik Peerto topeer Systems DHT examples, part (Pastry, Tapestry and Kademlia) Michael Welzl michael.welzl@uibk.ac.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg
More informationPEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
More informationA Survey and Comparison of Peer-to-Peer Overlay Network Schemes
% " #$! IEEE COMMUNICATIONS SURVEY AND TUTORIAL, MARCH 2004 1 A Survey and Comparison of Peer-to-Peer Overlay Network Schemes Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma and Steven Lim Abstract
More informationAcknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts:
Acknowledgements Peer to Peer File Storage Systems CS 699 Some of the followings slides are borrowed from a talk by Robert Morris (MIT) 1 2 P2P File Systems Target Uses File Sharing is one of the most
More informationLoad Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
More informationChord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
More informationVaralakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
More informationDistributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
More informationA PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationDistributed Hash Tables in P2P Systems - A literary survey
Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology tstanner@cc.hut.fi Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer
More informationCS5412: TIER 2 OVERLAYS
1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data
More informationHow To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
More informationCalto: A Self Sufficient Presence System for Autonomous Networks
Calto: A Self Sufficient Presence System for Autonomous Networks Abstract In recent years much attention has been paid to spontaneously formed Ad Hoc networks. These networks can be formed without central
More informationp2p: systems and applications Internet Avanzado, QoS, Multimedia 2006-2007 Carmen Guerrero carmen.guerrero@uc3m.es
p2p: systems and applications Internet Avanzado, QoS, Multimedia 2006-2007 Carmen Guerrero carmen.guerrero@uc3m.es Dpto. Ingeniería Telemática Index Introduction Taxonomy Classification of p2p overlay
More informationThe Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
More informationIPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha
IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand
More informationRESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationFile sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion
More informationP2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
More informationDiscovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany tim@c-lab.de Abstract. Network infrastructures are nowadays
More informationHW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
More informationMiddleware and Distributed Systems. Peer-to-Peer Systems. Martin v. Löwis. Montag, 30. Januar 12
Middleware and Distributed Systems Peer-to-Peer Systems Martin v. Löwis Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers)
More informationLOOKING UP DATA IN P2P SYSTEMS
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed
More informationArchitectures and protocols in Peer-to-Peer networks
Architectures and protocols in Peer-to-Peer networks Ing. Michele Amoretti [amoretti@ce.unipr.it] II INFN SECURITY WORKSHOP Parma 24-25 February 2004 Contents - Definition of Peer-to-Peer network - P2P
More informationA SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS
A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering anidathi@yahoo.co.in jkumaribharat@yahoo.com
More informationT he Electronic Magazine of O riginal Peer-Reviewed Survey Articles ABSTRACT
SECOND QUARTER 2005, VOLUME 7, NO. 2 IEEE C OMMUNICATIONS SURVEYS T he Electronic Magazine of O riginal -Reviewed Survey Articles www.comsoc.org/pubs/surveys A SURVEY AND COMPARISON OF PEER-TO-PEER OVERLAY
More informationP2P Networking - Advantages and Disadvantages of Virtualization
Are Virtualized Overlay Networks Too Much of a Good Thing? Pete Keleher, Bobby Bhattacharjee, Bujor Silaghi Department of Computer Science University of Maryland, College Park keleher@cs.umd.edu 1 Introduction
More information5. Peer-to-peer (P2P) networks
5. Peer-to-peer (P2P) networks PA191: Advanced Computer Networking I. Eva Hladká Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Autumn 2015 Eva Hladká (FI MU) 5. P2P networks Autumn 2015
More informationOptimizing and Balancing Load in Fully Distributed P2P File Sharing Systems
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems (Scalable and Efficient Keyword Searching) Anh-Tuan Gai INRIA Rocquencourt anh-tuan.gai@inria.fr Laurent Viennot INRIA Rocquencourt
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationA Survey of Peer-to-Peer File Sharing Technologies
Athens University of Economics and Business The ebusiness Centre (www.eltrun.gr) A Survey of Peer-to-Peer File Sharing Technologies White Paper Page 1 of 1 A Survey of Peer-to-Peer File Sharing Technologies
More informationTornado: A Capability-Aware Peer-to-Peer Storage Network
Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao hsiao@pads1.cs.nthu.edu.tw Chung-Ta King* king@cs.nthu.edu.tw Department of Computer Science National Tsing Hua University Hsinchu,
More informationEvolution of Peer-to-Peer Systems
EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor
More informationGISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes
More informationSUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER
SUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER R. Naga Priyadarsini, S. Suma and V. Dhanakoti Department of Computer Science Engineering, Valliammai Engineering College, Kanchipuram, India ABSTRACT
More informationP2P File Sharing: BitTorrent in Detail
ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2
More informationPeer-to-Peer Replication
Peer-to-Peer Replication Matthieu Weber September 13, 2002 Contents 1 Introduction 1 2 Database Replication 2 2.1 Synchronous Replication..................... 2 2.2 Asynchronous Replication....................
More informationquery enabled P2P networks 2009. 08. 27 Park, Byunggyu
Load balancing mechanism in range query enabled P2P networks 2009. 08. 27 Park, Byunggyu Background Contents DHT(Distributed Hash Table) Motivation Proposed scheme Compression based Hashing Load balancing
More informationApplication Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2
CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol
More informationNew Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
More informationPolitehnica University of Timisoara. Distributed Mailing System PhD Report I
Politehnica University of Timisoara PhD Report I Patrik Emanuel Mezo Prof. Dr. Ing. Mircea Vladutiu PhD Student PhD Coordinator ABSTRACT This PhD Report describes the research activity carried on as part
More informationLoad Balancing in Distributed Systems: A survey
Load Balancing in Distributed Systems: A survey Amit S Hanamakkanavar * and Prof. Vidya S.Handur # * (amitsh2190@gmail.com) Dept of Computer Science & Engg, B.V.B.College of Engg. & Tech, Hubli # (vidya_handur@bvb.edu)
More informationAdapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
More informationVoIP over P2P networks
VoIP over P2P networks Víctor Ramos UAM-Iztapalapa Redes y Telecomunicaciones Victor.Ramos@ieee.org http://laryc.izt.uam.mx/~vramos What is the Internet? The IP protocol suite and related mechanisms and
More informationDefinition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
More informationDecentralized supplementary services for Voice-over-IP telephony
Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.
More informationJoin and Leave in Peer-to-Peer Systems: The DASIS Approach
Join and Leave in Peer-to-Peer Systems: The DASIS Approach Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer {kenoa@inf, rarnold@inf, mgaehwil@student, wattenhofer@inf}.ethz.ch Department
More informationDNS and P2P File Sharing
Computer Networks DNS and P2P File Sharing Based on Computer Networking, 4 th Edition by Kurose and Ross DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers:
More informationSCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS *
SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS * Maha Abdallah LIP6, Université Paris 6, rue du Capitaine Scott 75015 Paris, France Maha.Abdallah@lip6.fr Hung Cuong Le
More informationLoad Balancing in Structured P2P Systems
1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica ananthar, karthik, sonesh, karp, istoica @cs.berkeley.edu Abstract Most P2P systems
More informationAsync: Secure File Synchronization
Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany vera.schaaber@stud.h-da.de
More informationProfessor Yashar Ganjali Department of Computer Science University of Toronto. yganjali@cs.toronto.edu http://www.cs.toronto.
Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Announcements Programming assignment 2 Extended Deadline: Fri.
More informationSecurity in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
More informationExploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS
Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble University of Washington Abstract: Despite
More informationTopic Communities in P2P Networks
Topic Communities in P2P Networks Joint work with A. Löser (IBM), C. Tempich (AIFB) SNA@ESWC 2006 Budva, Montenegro, June 12, 2006 Two opposite challenges when considering Social Networks Analysis Nodes/Agents
More informationUsing Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
More informationLOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,
More informationPeer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing
Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing (Research Proposal) Abhishek Agrawal (aagrawal@acis.ufl.edu) Abstract This proposal discusses details about Peer-VM which is a peer-to-peer
More informationMobile File-Sharing over P2P Networks
Category: P2P obile File-Sharing over P2P Networks Lu Yan Åbo Akademi, Finland INTRODUCTION Peer-to-peer (P2P) computing is a networking and distributed computing paradigm which allows the sharing of computing
More informationA Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications. Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu
A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu July 5, 2013 2 ABSTRACT Distributed Hash Table (DHT) plays an important
More informationChord: A Scalable Peer-to-peer Lookup Service for Internet Applications
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science chord@lcs.mit.edu
More informationOutline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
More informationThe p2pweb model: a glue for the Web
The p2pweb model: a glue for the Web Pedro García López, Marc Sánchez Artigas, Jordi Pujol Ahulló Universitat Rovira i Virgili Tarragona, Spain { pedro.garcia, marc.sanchez, jordi.pujol}@urv.cat Abstract
More informationA Survey of Data Management in Peer-to-Peer Systems
A Survey of Data Management in Peer-to-Peer Systems L. G. ALEX SUNG, NABEEL AHMED, ROLANDO BLANCO, HERMAN LI, MOHAMED ALI SOLIMAN, and DAVID HADALLER School of Computer Science, University of Waterloo
More informationAnonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
More informationScalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
More informationVulnerabilities of P2P Systems and a Critical Look at their Solutions
Vulnerabilities of P2P Systems and a Critical Look at their Solutions Marling Engle & Javed I. Khan {mengle javed}@cs.kent.edu Networking and Media Communications Research Laboratories Computer Science
More informationThe BitTorrent Protocol
The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions
More informationDG Forwarding Algorithm
DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router
More informationDDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
More informationPeer-to-Peer and Grid Computing. Chapter 4: Peer-to-Peer Storage
Peer-to-Peer and Grid Computing Chapter 4: Peer-to-Peer Storage Chapter Outline Using DHTs to build more complex systems How DHT can help? What problems DHTs solve? What problems are left unsolved? P2P
More informationPeer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
More informationDFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing
DFSgc Distributed File System for Multipurpose Grid Applications and Cloud Computing Introduction to DFSgc. Motivation: Grid Computing currently needs support for managing huge quantities of storage. Lacks
More informationPEER-TO-PEER (P2P) systems have emerged as an appealing
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 4, APRIL 2009 595 Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems Quang Hieu Vu, Member, IEEE, Beng Chin Ooi,
More informationNew Algorithms for Load Balancing in Peer-to-Peer Systems
New Algorithms for Load Balancing in Peer-to-Peer Systems David R. Karger Matthias Ruhl MIT Laboratory for Computer Science Cambridge, MA 02139, USA {karger, ruhl}@theory.lcs.mit.edu Abstract Load balancing
More informationA Survey of Peer-to-Peer Network Security Issues
1 of 8 1/9/2008 12:32 PM A Survey of Peer-to-Peer Network Security Issues James Li Abstract In recent years, peer-to-peer (P2P) networks have soared in popularity in the form of file sharing applications.
More informationPeer-to-Peer Networks Organization and Introduction 1st Week
Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/
More informationA P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
More informationChord: A Scalable Peer-to-peer Lookup Service for Internet Applications
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica Robert Morris David Liben-Nowell David Karger M. Frans Kaashoek Frank Dabek Hari Balakrishnan January 10, 2002 Abstract
More informationDecentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
More informationA Performance Comparison of Native IP Multicast and IP Multicast Tunneled through a Peer-to-Peer Overlay Network
A Performance Comparison of Native IP Multicast and IP Multicast Tunneled through a Peer-to-Peer Overlay Network Marc Brogle, Dragan Milic, Luca Bettosini, Torsten Braun Institute for Computer Science
More informationWide-area cooperative storage with CFS
Wide-area cooperative storage with CFS Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science chord@lcs.mit.edu http://pdos.lcs.mit.edu/chord/ Abstract
More informationDomain Name System for PeerHosting
Domain Name System for PeerHosting Arnav Aggarwal, B.Tech A dissertation submitted to the University of Dublin, in partial fulfilment of the requirements for degree of Master of Science in Computer Science
More informationMC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with
MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican
More informationUnit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
More informationOverlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.
Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support
More informationInternetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
More informationA Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
More informationObject Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
More informationApproximate Object Location and Spam Filtering on Peer-to-Peer Systems
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz University of California, Berkeley The Problem
More informationStorage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
More informationLecture 25: Security Issues in Structured Peer-to-Peer Networks. Lecture Notes on Computer and Network Security. by Avi Kak (kak@purdue.
Lecture 25: Security Issues in Structured Peer-to-Peer Networks Lecture Notes on Computer and Network Security by Avi Kak (kak@purdue.edu) April 16, 2015 10:33am c 2015 Avinash Kak, Purdue University Goals:
More informationContent Distribution over IP: Developments and Challenges
Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,
More information