L13 P2P Overlay Networks: Theory

Size: px
Start display at page:

Download "L13 P2P Overlay Networks: Theory"

Transcription

1 L13 P2P Overlay Networks: Theory by T.S.R.K. Prasad EA C451 Internetworking Technologies

2 References / Acknowledgements Ch 6: Peer-to-Peer Content Networks, [Hoffman] Sec 2.6: Peer-to-Peer Applications, [Kurose] [Theotokis] Stephanos Androutsellis-Theotokis, A Survey of Peer-to-Peer File Sharing Technologies References

3 References / Acknowledgements [Ross-P2P] Keith W. Ross, and Dan Rubenstein, P2P Systems, Infocomm Tutorial [Kurose-P2P] Ch2: Applications, [Kurose] [Zhang-P2P] Prof. Zhi-Li Zhang, P2P, CSci5221: Foundations of Advanced Networking, Spring ( 2011/csci5221/index.php) [Rexford-P2P] Jennifer Rexford, Peer-to-Peer File Sharing, COS 461: Computer Networks ( References

4 References / Acknowledgements [Stoica-P2P] Ion Stoica, P2P Networks, EE122: Computer Networking, Dept of EECS, UCB, Fall (www-inst.eecs.berkeley.edu/~ee122/fa02) References

5 Optional Readings [Andersen] David G. Andersen, Hari Balakrishnan, M. Frans Kaashoek, and Robert Morris, Resilient Overlay Networks, SOPS [Lua] Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma and Steven Lim, A Survey and Comparison of Peer-to-Peer Overlay Network Schemes, IEEE Communications Survey and Tutorial, March [Rodrigues] Rodrigo Rodrigues, and Peter Druschel, Peer-to- Peer Systems Optional Reading

6 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline

7 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline

8 Client-Server Limitations Scalability is hard to achieve Presents a single point of failure Requires administration Unused resources at the network edge P2P systems try to address these limitations Introduction C/S Limitations

9 Defintion of P2P 1) Significant autonomy from central servers 2) Exploits resources at the edges of the Internet storage and content CPU cycles human presence 3) Resources at edge have intermittent connectivity, being added & removed Introduction Definition of P2P

10 It s a broad definition: P2P file sharing Napster, Gnutella, KaZaA, etc P2P communication Instant messaging P2P computation seti@home DHTs & their apps Chord, CAN, Pastry, Tapestry P2P apps built over emerging overlays PlanetLab Introduction Definition of P2P

11 Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change IP addresses Introduction Pure P2P Architecture

12 Characteristics of P2P Networks Clients are also servers and routers Nodes contribute content, storage, memory, CPU Nodes are autonomous (no administrative authority) Network is dynamic: nodes enter and leave the network frequently Nodes collaborate directly with each other (not through well-known servers) Nodes have widely varying capabilities Introduction Characteristics of P2P Networks

13 Benefits of P2P Networks Efficient use of resources Unused bandwidth, storage, processing power at the edge of the network Scalability Consumers of resources also donate resources Aggregate resources grow naturally with utilization Introduction Benefits of P2P Networks

14 Benefits of P2P Networks Reliability Replicas Geographic distribution No single point of failure Ease of administration Nodes self organize No need to deploy servers to satisfy demand (c.f. scalability) Built-in fault tolerance, replication, and load balancing Introduction Benefits of P2P Networks

15 Key Issues in P2P Networks Join/leave How do nodes join/leave? Who is allowed? Search and retrieval How to find content? How are metadata indexes built, stored, distributed? Content Distribution Where is content stored? How is it downloaded and retrieved? Introduction Key Issues P2P Networks

16 Four Key Primitives (APIs) Join How to enter/leave the P2P system? Publish How to advertise a file? Search how to find a file? Fetch how to download a file? Introduction Four Key Primitives

17 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline

18 File Distribution: Client-Server vs Peer-to-Peer Question: how much time to distribute file (size F) from one server to N peers? peer upload/download capacity is limited resource F bits Internet File Distribution Example The Problem

19 Server Distributing a Large File F bits d 4 upload rate u s Internet d 3 d 1 d 2 upload rates u i download rates d i File Distribution Example Server Distributing a Large File

20 Server Distributing a Large File Sending an F-bit file to N receivers Transmitting NF bits at rate u s takes at least NF/u s time Receiving the data at the slowest receiver Slowest receiver has download rate d min = min i {d i } takes at least F/d min time Download time: max{nf/u s, F/d min } File Distribution Example Server Distributing a Large File

21 Speeding Up the File Distribution Increase the server upload rate Higher link bandwidth at the server Multiple servers, each with their own link Alternative: have the receivers help Receivers get a copy of the data and redistribute to other receivers To reduce the burden on the server File Distribution Example Speeding up the File Distribution

22 Peers Help Distributing a Large File F bits d 4 upload rate u s Internet u 4 d 3 d 1 u 1 u 2 u 3 d 2 upload rates u i download 22 rates d i File Distribution Example Peer Helpout

23 Peers Help Distributing a Large File Components of distribution latency Server must send each bit: min time F/u s Slowest peer must receive each bit: min time F/d min Upload time using all upload resources Total number of bits: NF Total upload bandwidth u s + sum i (u i ) Total: max{f/u s, F/d min, NF/(u s +sum i (u i ))} 23 File Distribution Example Peer Helpout

24 Peer-to-Peer is Self-Scaling Download time grows slowly with N Client-server: max{nf/u s, F/d min } Peer-to-peer: max{f/u s, F/d min, NF/(u s +sum i (u i ))} But Peers may come and go Peers need to find each other Peers need to be willing to help each other 24 File Distribution Example P2P is Self-Scaling

25 Minimum Distribution Time Client-server vs. P2P: example client upload rate = u, F/u = 1 hour, u s = 10u, d min u s P2P Client-Server N File Distribution Example Comparison

26 P2P file distribution: BitTorrent file divided into 256Kb chunks peers in torrent send/receive file chunks tracker: tracks peers participating in torrent torrent: group of peers exchanging chunks of a file Alice arrives obtains list of peers from tracker and begins exchanging file chunks with peers in torrent File Distribution Example BitTorrent

27 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline

28 Overlay networks overlay edge Overlay Networks

29 Overlay graph Virtual edge TCP connection or simply a pointer to an IP address Overlay maintenance Periodically ping to make sure neighbor is still alive Or verify liveness while messaging If neighbor goes down, may want to establish new edge New node needs to bootstrap Overlay Networks Overlay Graph

30 Overlays: all in the application layer Tremendous design flexibility Topology, maintenance Message types Protocol Messaging over TCP or UDP Underlying physical net is transparent to developer But some overlays exploit proximity application transport network data link physical application transport network data link physical application transport network data link physical Overlay Networks Application Layer

31 Overlay Networks Normal View Overlay Networks Normal View

32 Overlay Networks Focus at the application level Overlay Networks Application Level View

33 Examples of overlays DNS BGP routers and their peering relationships Content distribution networks (CDNs) Application-level multicast economical way around barriers to IP multicast And P2P apps! Overlay Networks Examples of Overlays

34 More about overlays Unstructured overlays e.g., new node randomly chooses three existing nodes as neighbors Structured overlays e.g., edges arranged in restrictive structure Proximity Not necessarily taken into account Overlay Networks More about Overlays

35 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline

36 Unstructured P2P Networks Central Server / Directory (Napster) Flooding (Gnutella) Super Peers / Super Nodes (KaZaA) Swarming (BitTorrent) Unstructured P2P Networks Types

37 Central Server / Directory Join and Publish File list and IP address is uploaded A centralized directory 1 1 C 1 B Unstructured P2P Networks Central Server

38 Central Server / Directory Search (a) User requests file search at server (b) Server responds with list of hosts (IP addresses) containing the file. centralized directory 2b 2a Unstructured P2P Networks Central Server

39 Central Server / Directory Fetch (a) User pings the sources that have the data (Looks for host with best bandwidth) centralized directory Pings Pings Unstructured P2P Networks Central Server

40 Central Server / Directory Fetch (a) User pings the sources that have the data (Looks for host with best bandwidth) (b) Downloads the file centralized directory Downloads the file Unstructured P2P Networks Central Server

41 Pros and Cons of Central Server Pros: Simple Search scope is O(1) Controllable (pro or con?) Cons: Server maintains O(N) State Server does all processing Single point of failure Unstructured P2P Networks Central Server

42 Unstructured P2P Networks Central Server / Directory (Napster) Flooding (Gnutella) Super Peers / Super Nodes (KaZaA) Swarming (BitTorrent) Unstructured P2P Networks Types

43 Query Flooding Join contact a few nodes to become neighbors Publish no need! Search ask neighbors, who ask their neighbors Fetch get file directly from another node Unstructured P2P Networks Flooding

44 Search by Flooding xyz.mp3 search xyz.mp3? Flooding Unstructured P2P Networks Flooding

45 Search by Flooding xyz.mp3 xyz.mp3? search Flooding Unstructured P2P Networks Flooding

46 Search by Flooding transfer Unstructured P2P Networks Flooding

47 Flooding: Pros and Cons Advantages Fully decentralized Search cost distributed Processing per node permits powerful search semantics Disadvantages Search scope is O(N) Search time may be quite long High overhead, and nodes come and go often Unstructured P2P Networks Flooding

48 Unstructured P2P Networks Central Server / Directory (Napster) Flooding (Gnutella) Super Peers / Super Nodes (KaZaA) Swarming (BitTorrent) Unstructured P2P Networks Types

49 Super Node Hierarchy Join on start, the client contacts a super-node Publish client sends list of files to its super-node Search queries flooded among super-nodes Fetch get file directly from one or more peers Unstructured P2P Networks Super Nodes Hierarchy

50 Motivation for Super Nodes Query consolidation Many connected nodes may have only a few files Propagating query to a sub-node may take more time than for the super-node to answer itself Stability Super-node selection favors nodes with high uptime How long you ve been on is a good predictor of how long you ll be around in the future Unstructured P2P Networks Super Nodes Motivation

51 Super Node Architecture Each peer is either a super node or is assigned to a super node Each super node knows about many other super nodes (almost mesh overlay) supernodes Unstructured P2P Networks Super Nodes Architecture

52 Super Node Architecture: After Join and Publish supernodes H 3 xyz.mp3 H 1 H 3 xyz.mp3 abc.mp3 H 2 xyz.mp3 H 1 H 2 abc.mp3 xyz.mp3 Unstructured P2P Networks Super Nodes After Join and Publish

53 Super Node Architecture: Search Query Flooding xyz.mp3 H 3 xyz.mp3? supernodes H 1 H 3 xyz.mp3 abc.mp3 H 2 xyz.mp3 H 1 H 2 abc.mp3 xyz.mp3 Unstructured P2P Networks Super Nodes Query Flooding

54 Super Node Architecture: Search Query Responses xyz.mp3 H 3 xyz.mp3 available at H 1, H 2, H 3 H 1 supernodes H 3 xyz.mp3 abc.mp3 H 2 xyz.mp3 H 1 H 2 abc.mp3 xyz.mp3 Unstructured P2P Networks Super Nodes Query Response

55 Super Node Architecture: Search Fetch xyz.mp3 H 3 supernodes H 1 H 3 xyz.mp3 abc.mp3 H 2 xyz.mp3 H 1 H 2 abc.mp3 xyz.mp3 Parallel download of pieces of file possible Unstructured P2P Networks Super Nodes Fetch

56 Pros and Cons of Super Nodes Pros: Tries to take into account node heterogeneity: Bandwidth Host Computational Resources Host Availability (?) Can take into account network locality Cons: Mechanisms easy to circumvent Still no real guarantees on search scope or search time Unstructured P2P Networks Super Nodes

57 Unstructured P2P Networks Central Server / Directory (Napster) Flooding (Gnutella) Super Peers / Super Nodes (KaZaA) Swarming (BitTorrent) Unstructured P2P Networks Types

58 Swarming Swarming: Download from others who are downloading the same object at the same time Join contact centralized tracker server, get a list of peers. Publish Run a tracker server. Search Out-of-band. E.g., use Google to find a tracker for the file you want. Fetch Download chunks of the file from your peers. Upload chunks you have to them. Unstructured P2P Networks Swarming

59 BitTorrent: Publish/Join Tracker Unstructured P2P Networks Swarming Publish / Join

60 BitTorrent: Fetch Unstructured P2P Networks Swarming Fetch

61 Presentation Overview Structured P2P Networks Unstructured P2P Networks Overlay Networks File Distribution Example Introduction Lecture Outline

62 The Search (Routing) Problem N 1 N 2 N 3 Key= title Value=MP3 data Publisher Internet? Client Lookup( title ) N 4 N 5 N 6 Structured P2P Networks The Search Problem

63 Routed Queries in Structured P2P Networks Publisher Key= title Value=MP3 data N 4 N 1 N 2 N 3 Client Lookup( title ) N 6 N 9 N 7 N 8 In structured overlay networks, searching is equivalent to routing on the structure of the overlay. Structured P2P Networks Routing in Structured P2P Networks

64 Distributed Hash Tables Academic answer to p2p Goals Guatanteed lookup success Provable bounds on search time Provable scalability Makes some things harder Fuzzy queries / full-text search / etc. Read-write, not read-only Hot Topic in networking since introduction in ~2000/2001 Structured P2P Networks DHT

65 DHT: Overview Abstraction: a distributed hash-table (DHT) data structure: put(id, item); item = get(id); Implementation: nodes in system form a distributed data structure Can be Ring, Tree, Hypercube, Skip List, Butterfly Network,... Structured P2P Networks DHT Overview

66 DHT: Overview Structured Overlay Routing: Join: On startup, contact a bootstrap node and integrate yourself into the distributed data structure; get a node id Publish: Route publication for file id toward a close node id along the data structure Search: Route a query for file id toward a close node id. Data structure guarantees that query will meet the publication. Fetch: Two options: Publication contains actual file => fetch from where query stops Publication says I have file X => query tells you has X, use IP routing to get X from Structured P2P Networks DHT Overview

67 DHT as Library / Platform Distributed application put(key, data) Distributed hash table get (key) data node node. node DHT provides the information look up service for P2P applications. Nodes uniformly distributed across key space Nodes form an overlay network Nodes maintain list of neighbors in routing table Decoupled from physical network topology Structured P2P Networks DHT as Library

68 DHT Schemes for Structured P2P Networks Chord Pastry Tapestry Content Addressable Network (CAN) Structured P2P Networks DHT Schemes

69 Chord Overview Associate to each node and file a unique id in an unidimensional space (a Ring) E.g., pick from the range [0...2 m ] Usually the hash of the file or IP address Properties: Routing table size is O(log N), where N is the total number of nodes Guarantees that a file is found in O(log N) hops from MIT in 2001 Structured P2P Networks Chord Overview

70 Chord IDs Key identifier = SHA-1(key) Node identifier = SHA-1(IP address) Both are uniformly distributed Both exist in the same ID space How to map key IDs to node IDs? The heart of Chord protocol is consistent hashing Structured P2P Networks Chord Chord IDs

71 Chord API insert(key, value)à store key/value at r nodes lookup(key) update(key, newval) join(n) leave() Structured P2P Networks Chord Chord API

72 DHT: Consistent Hashing Node 105 Key 5 K5 N105 K20 Circular ID space N32 N90 K80 A key is stored at its successor: node with next higher ID Structured P2P Networks Chord Consistent Hashing

73 DHT: Chord Basic Lookup N105 N120 N10 Where is key 80? N90 has K80 N32 K80 N90 N60 Structured P2P Networks Chord Basic Lookup

74 Basic Chord Lookup (Routing) Algorithm Lookup(my-id, key-id) n = my successor if my-id < n < key-id Lookup(id) on node n /go to next hop/ else return my successor /found the correct node/ Correctness depends only on successors O(N) lookup time, but we can do better Structured P2P Networks Chord Basic Lookup Algorithm

75 DHT: Chord Finger Table 1/4 1/2 1/8 1/16 1/32 1/64 1/128 N80 Entry i in the finger table of node n is the first node that succeeds or equals n + 2 i In other words, the i th finger points 1/2 n-i way around the ring Structured P2P Networks Chord Finger Table

76 DHT: Chord Join Assume an identifier space [0..8] Node n1 joins Succ. Table i id+2 i succ Structured P2P Networks Chord Join

77 DHT: Chord Join Node n2 joins Succ. Table i id+2 i succ Succ. Table i id+2 i succ Structured P2P Networks Chord Join

78 DHT: Chord Join Nodes n0, n6 join Succ. Table i id+2 i succ Succ. Table Succ. Table i id+2 i succ i id+2 i succ Succ. Table i id+2 i succ Structured P2P Networks Chord Join

79 DHT: Chord Join Nodes: n1, n2, n0, n6 Succ. Table i id+2 i succ Items 7 Items: f7, f2 0 Succ. Table 7 1 i id+2 i succ Succ. Table 6 2 i id+2 i succ Succ. Table i id+2 i succ Items 1 Structured P2P Networks Chord Join

80 DHT: Chord Routing Upon receiving a query for item id, a node: Checks whether stores the item locally If not, forwards the query to the largest node in its successor table that does not exceed id Succ. Table i id+2 i succ Succ. Table 7 1 i id+2 i succ query(7) Succ. Table i id+2 i succ Items 7 Succ. Table i id+2 i succ Items 1 Structured P2P Networks Chord Routing

81 Chord Routing Algorithm Lookup(my-id, key-id) look in local finger table for highest node n such that my-id < n < key-id if n exists Lookup(id) on node n /go to next hop/ else return my successor /found the correct node/ Structured P2P Networks Chord Routing Algorithm

82 Node Joining in Chord Node n joins the system: n picks a random identifier, id n performs n = lookup(id) n->successor = n n ->predecessor = n Structured P2P Networks Chord Node Joining

83 State Maintenance: Stabilization Protocol Periodically node n Asks its successor, n, about its predecessor n If n is between n and n n->successor = n notify n that n is its predecessor When node n receives notification message from n If n is between n ->predecessor and n, then n ->predecessor = n Improve robustness Each node maintain a successor list(usually of size 2*log N) Structured P2P Networks Chord State Maintenance

84 DHT: Network Locality in Chord Nodes close on a ring can be far on the network Structured P2P Networks Chord Network Locality

85 DHT: Chord Summary Routing table size? Log N fingers Routing time? Each hop expects to 1/2 the distance to the desired id => expect O(log N) hops. Structured P2P Networks Chord Summary

86 DHT Schemes for Structured P2P Networks Chord Pastry Tapestry Content Addressable Network (CAN) Structured P2P Networks DHT Schemes

87 Pastry: Overview Similar interface to Chord Considers network locality to minimize hops messages travel New node needs to know a nearby node to achieve locality Each routing hop matches the destination identifier by one more digit Many choices in each hop (locality possible) Structured P2P Networks Pastry Overview

88 Object Distribution O objid Consistent hashing [Karger et al. 97] 128 bit circular id space nodeids (uniform random) nodeids objids (uniform random) Invariant: node with numerically closest nodeid maintains object Structured P2P Networks Pastry Object Distribution

89 Object Insertion/Lookup O X Msg with key X is routed to live node with nodeid closest to X Route(X) Problem: complete routing table not feasible Structured P2P Networks Pastry Object Insertion/Lookup

90 Routing (Lookup) in Pastry d46a1c d471f1 d467c4 d462ba d4213f 65a1fc Route(d46a1c) d13da3 Properties log 16 N steps O(log N) state Structured P2P Networks Pastry Routing

91 Node Addition in Pastry New node: d46a1c d46a1c d471f1 d467c4 d462ba d4213f Route(d46a1c) d13da3 65a1fc Structured P2P Networks Pastry Node Addition

92 DHT Schemes for Structured P2P Networks Chord Pastry Tapestry Content Addressable Network (CAN) Structured P2P Networks DHT Schemes

93 What is Tapestry? A prototype of a decentralized, scalable, fault-tolerant, adaptive location and routing infrastructure (Zhao, Kubiatowicz, Joseph et al. U.C. Berkeley) Network layer of OceanStore global storage system Suffix-based hypercube routing Core system inspired by Plaxton Algorithm (Plaxton, Rajamaran, Richa (SPAA97)) Core API: publishobject(objectid, [serverid]) sendmsgtoobject(objectid) sendmsgtonode(nodeid) Structured P2P Networks Tapestry Overview

94 Tapestry Uses plaxton mesh data structure allows nodes to locate objects and route messages to them across an arbitrary-sized network while using a small, constant-sized routing map at each hop route map is called neighborhood map Ideas similar to pastry Structured P2P Networks Tapestry Overview

95 Plaxton (Suffix) Routing Example from to destination path resolution order: xxxx7 xxx67 xx567 x x represents wild cards All the numbers are in base-10 Structured P2P Networks Tapestry Plaxton Routing

96 Example Neighborhood Map Suffix routing Each entry points to next node in the neighborhood A neighbor is a connected node to the present node Level corresponds to the number of matching digits Neighbor Map For 5712 (Octal) x012 x112 x212 x312 x412 x512 x xx xx22 xx32 xx42 xx52 xx62 xx72 2 Routing Levels xxx0 xxx xxx3 xxx4 xxx5 xxx6 xxx7 1 Structured P2P Networks Tapestry Neighborhood Map

97 Another Suffix Routing Example Example: Octal digits, 2 18 namespace, Structured P2P Networks Tapestry Plaxton Routing

98 DHT Schemes for Structured P2P Networks Chord Pastry Tapestry Content Addressable Network (CAN) Structured P2P Networks DHT Schemes

99 Content Addressable Network (CAN) Associate to each node and item a unique id in an d-dimensional space Properties Routing table size O(d) Guarantee that a file is found in at most d*n 1/d steps, where n is the total number of nodes Structured P2P Networks CAN Overview

100 CAN Example: Two Dimensional Space Space divided between nodes All nodes cover the entire space Each node covers either a square or a rectangular area of ratios 1:2 or 2:1 Example: Assume space size (8 x 8) Node n1:(1, 2) first node that joins cover the entire space n Structured P2P Networks CAN Example

101 CAN Example: Two Dimensional Space Node n2:(4, 2) joins space is divided between n1 and n n1 n Structured P2P Networks CAN Example

102 CAN Example: Two Dimensional Space Node n2:(4, 2) joins space is divided between n1 and n n n1 n Structured P2P Networks CAN Example

103 CAN Example: Two Dimensional Space Nodes n4:(5, 5) and n5:(6,6) join n3 n4 n n1 n Structured P2P Networks CAN Example

104 CAN Example: Two Dimensional Space Nodes: n1:(1, 2); n2:(4,2); n3:(3, 5); n4:(5,5);n5:(6,6) Items: f1:(2,3); f2:(5,1); f3:(2,1); f4:(7,5); n3 n4 n5 f f1 n1 n2 f3 f Structured P2P Networks CAN Example

105 CAN Example: Two Dimensional Space Each item is stored by the node who owns its mapping in the space n3 n4 n5 f f1 n1 n2 f3 f Structured P2P Networks CAN Example

106 CAN: Query Example Each node knows its neighbors in the d-space Forward query to the neighbor that is closest to the query id Example: assume n1 queries f n3 n4 n5 f f1 n1 n2 f3 f Structured P2P Networks CAN Example

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

CSCI-1680 CDN & P2P Chen Avin

CSCI-1680 CDN & P2P Chen Avin CSCI-1680 CDN & P2P Chen Avin Based partly on lecture notes by Scott Shenker and John Jannotti androdrigo Fonseca And Computer Networking: A Top Down Approach - 6th edition Last time DNS & DHT Today: P2P

More information

Chord. A scalable peer-to-peer look-up protocol for internet applications

Chord. A scalable peer-to-peer look-up protocol for internet applications Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

N6Lookup( title ) Client

N6Lookup( title ) Client CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding

More information

Plaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3

Plaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3 Uni Innsbruck Informatik Uni Innsbruck Informatik Peerto topeer Systems DHT examples, part (Pastry, Tapestry and Kademlia) Michael Welzl michael.welzl@uibk.ac.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

A Survey and Comparison of Peer-to-Peer Overlay Network Schemes

A Survey and Comparison of Peer-to-Peer Overlay Network Schemes % " #$! IEEE COMMUNICATIONS SURVEY AND TUTORIAL, MARCH 2004 1 A Survey and Comparison of Peer-to-Peer Overlay Network Schemes Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma and Steven Lim Abstract

More information

Acknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts:

Acknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts: Acknowledgements Peer to Peer File Storage Systems CS 699 Some of the followings slides are borrowed from a talk by Robert Morris (MIT) 1 2 P2P File Systems Target Uses File Sharing is one of the most

More information

Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se

Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous

More information

Chord - A Distributed Hash Table

Chord - A Distributed Hash Table Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P) Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...

More information

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Distributed Hash Tables in P2P Systems - A literary survey

Distributed Hash Tables in P2P Systems - A literary survey Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology tstanner@cc.hut.fi Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer

More information

CS5412: TIER 2 OVERLAYS

CS5412: TIER 2 OVERLAYS 1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data

More information

How To Create A P2P Network

How To Create A P2P Network Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised

More information

Calto: A Self Sufficient Presence System for Autonomous Networks

Calto: A Self Sufficient Presence System for Autonomous Networks Calto: A Self Sufficient Presence System for Autonomous Networks Abstract In recent years much attention has been paid to spontaneously formed Ad Hoc networks. These networks can be formed without central

More information

p2p: systems and applications Internet Avanzado, QoS, Multimedia 2006-2007 Carmen Guerrero carmen.guerrero@uc3m.es

p2p: systems and applications Internet Avanzado, QoS, Multimedia 2006-2007 Carmen Guerrero carmen.guerrero@uc3m.es p2p: systems and applications Internet Avanzado, QoS, Multimedia 2006-2007 Carmen Guerrero carmen.guerrero@uc3m.es Dpto. Ingeniería Telemática Index Introduction Taxonomy Classification of p2p overlay

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

File sharing using IP-Multicast

File sharing using IP-Multicast File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion

More information

P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung

P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths

More information

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany tim@c-lab.de Abstract. Network infrastructures are nowadays

More information

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009 HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer

More information

Middleware and Distributed Systems. Peer-to-Peer Systems. Martin v. Löwis. Montag, 30. Januar 12

Middleware and Distributed Systems. Peer-to-Peer Systems. Martin v. Löwis. Montag, 30. Januar 12 Middleware and Distributed Systems Peer-to-Peer Systems Martin v. Löwis Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers)

More information

LOOKING UP DATA IN P2P SYSTEMS

LOOKING UP DATA IN P2P SYSTEMS LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed

More information

Architectures and protocols in Peer-to-Peer networks

Architectures and protocols in Peer-to-Peer networks Architectures and protocols in Peer-to-Peer networks Ing. Michele Amoretti [amoretti@ce.unipr.it] II INFN SECURITY WORKSHOP Parma 24-25 February 2004 Contents - Definition of Peer-to-Peer network - P2P

More information

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering anidathi@yahoo.co.in jkumaribharat@yahoo.com

More information

T he Electronic Magazine of O riginal Peer-Reviewed Survey Articles ABSTRACT

T he Electronic Magazine of O riginal Peer-Reviewed Survey Articles ABSTRACT SECOND QUARTER 2005, VOLUME 7, NO. 2 IEEE C OMMUNICATIONS SURVEYS T he Electronic Magazine of O riginal -Reviewed Survey Articles www.comsoc.org/pubs/surveys A SURVEY AND COMPARISON OF PEER-TO-PEER OVERLAY

More information

P2P Networking - Advantages and Disadvantages of Virtualization

P2P Networking - Advantages and Disadvantages of Virtualization Are Virtualized Overlay Networks Too Much of a Good Thing? Pete Keleher, Bobby Bhattacharjee, Bujor Silaghi Department of Computer Science University of Maryland, College Park keleher@cs.umd.edu 1 Introduction

More information

5. Peer-to-peer (P2P) networks

5. Peer-to-peer (P2P) networks 5. Peer-to-peer (P2P) networks PA191: Advanced Computer Networking I. Eva Hladká Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Autumn 2015 Eva Hladká (FI MU) 5. P2P networks Autumn 2015

More information

Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems

Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems (Scalable and Efficient Keyword Searching) Anh-Tuan Gai INRIA Rocquencourt anh-tuan.gai@inria.fr Laurent Viennot INRIA Rocquencourt

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

A Survey of Peer-to-Peer File Sharing Technologies

A Survey of Peer-to-Peer File Sharing Technologies Athens University of Economics and Business The ebusiness Centre (www.eltrun.gr) A Survey of Peer-to-Peer File Sharing Technologies White Paper Page 1 of 1 A Survey of Peer-to-Peer File Sharing Technologies

More information

Tornado: A Capability-Aware Peer-to-Peer Storage Network

Tornado: A Capability-Aware Peer-to-Peer Storage Network Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao hsiao@pads1.cs.nthu.edu.tw Chung-Ta King* king@cs.nthu.edu.tw Department of Computer Science National Tsing Hua University Hsinchu,

More information

Evolution of Peer-to-Peer Systems

Evolution of Peer-to-Peer Systems EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor

More information

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes

More information

SUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER

SUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER SUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER R. Naga Priyadarsini, S. Suma and V. Dhanakoti Department of Computer Science Engineering, Valliammai Engineering College, Kanchipuram, India ABSTRACT

More information

P2P File Sharing: BitTorrent in Detail

P2P File Sharing: BitTorrent in Detail ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2

More information

Peer-to-Peer Replication

Peer-to-Peer Replication Peer-to-Peer Replication Matthieu Weber September 13, 2002 Contents 1 Introduction 1 2 Database Replication 2 2.1 Synchronous Replication..................... 2 2.2 Asynchronous Replication....................

More information

query enabled P2P networks 2009. 08. 27 Park, Byunggyu

query enabled P2P networks 2009. 08. 27 Park, Byunggyu Load balancing mechanism in range query enabled P2P networks 2009. 08. 27 Park, Byunggyu Background Contents DHT(Distributed Hash Table) Motivation Proposed scheme Compression based Hashing Load balancing

More information

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2 CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol

More information

New Structured P2P Network with Dynamic Load Balancing Scheme

New Structured P2P Network with Dynamic Load Balancing Scheme New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,

More information

Politehnica University of Timisoara. Distributed Mailing System PhD Report I

Politehnica University of Timisoara. Distributed Mailing System PhD Report I Politehnica University of Timisoara PhD Report I Patrik Emanuel Mezo Prof. Dr. Ing. Mircea Vladutiu PhD Student PhD Coordinator ABSTRACT This PhD Report describes the research activity carried on as part

More information

Load Balancing in Distributed Systems: A survey

Load Balancing in Distributed Systems: A survey Load Balancing in Distributed Systems: A survey Amit S Hanamakkanavar * and Prof. Vidya S.Handur # * (amitsh2190@gmail.com) Dept of Computer Science & Engg, B.V.B.College of Engg. & Tech, Hubli # (vidya_handur@bvb.edu)

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

VoIP over P2P networks

VoIP over P2P networks VoIP over P2P networks Víctor Ramos UAM-Iztapalapa Redes y Telecomunicaciones Victor.Ramos@ieee.org http://laryc.izt.uam.mx/~vramos What is the Internet? The IP protocol suite and related mechanisms and

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

Decentralized supplementary services for Voice-over-IP telephony

Decentralized supplementary services for Voice-over-IP telephony Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.

More information

Join and Leave in Peer-to-Peer Systems: The DASIS Approach

Join and Leave in Peer-to-Peer Systems: The DASIS Approach Join and Leave in Peer-to-Peer Systems: The DASIS Approach Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer {kenoa@inf, rarnold@inf, mgaehwil@student, wattenhofer@inf}.ethz.ch Department

More information

DNS and P2P File Sharing

DNS and P2P File Sharing Computer Networks DNS and P2P File Sharing Based on Computer Networking, 4 th Edition by Kurose and Ross DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers:

More information

SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS *

SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS * SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS * Maha Abdallah LIP6, Université Paris 6, rue du Capitaine Scott 75015 Paris, France Maha.Abdallah@lip6.fr Hung Cuong Le

More information

Load Balancing in Structured P2P Systems

Load Balancing in Structured P2P Systems 1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica ananthar, karthik, sonesh, karp, istoica @cs.berkeley.edu Abstract Most P2P systems

More information

Async: Secure File Synchronization

Async: Secure File Synchronization Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany vera.schaaber@stud.h-da.de

More information

Professor Yashar Ganjali Department of Computer Science University of Toronto. yganjali@cs.toronto.edu http://www.cs.toronto.

Professor Yashar Ganjali Department of Computer Science University of Toronto. yganjali@cs.toronto.edu http://www.cs.toronto. Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Announcements Programming assignment 2 Extended Deadline: Fri.

More information

Security in Structured P2P Systems

Security in Structured P2P Systems P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in

More information

Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS

Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble University of Washington Abstract: Despite

More information

Topic Communities in P2P Networks

Topic Communities in P2P Networks Topic Communities in P2P Networks Joint work with A. Löser (IBM), C. Tempich (AIFB) SNA@ESWC 2006 Budva, Montenegro, June 12, 2006 Two opposite challenges when considering Social Networks Analysis Nodes/Agents

More information

Using Peer to Peer Dynamic Querying in Grid Information Services

Using Peer to Peer Dynamic Querying in Grid Information Services Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information

More information

LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM

LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,

More information

Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing

Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing (Research Proposal) Abhishek Agrawal (aagrawal@acis.ufl.edu) Abstract This proposal discusses details about Peer-VM which is a peer-to-peer

More information

Mobile File-Sharing over P2P Networks

Mobile File-Sharing over P2P Networks Category: P2P obile File-Sharing over P2P Networks Lu Yan Åbo Akademi, Finland INTRODUCTION Peer-to-peer (P2P) computing is a networking and distributed computing paradigm which allows the sharing of computing

More information

A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications. Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu

A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications. Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu July 5, 2013 2 ABSTRACT Distributed Hash Table (DHT) plays an important

More information

Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications

Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science chord@lcs.mit.edu

More information

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

The p2pweb model: a glue for the Web

The p2pweb model: a glue for the Web The p2pweb model: a glue for the Web Pedro García López, Marc Sánchez Artigas, Jordi Pujol Ahulló Universitat Rovira i Virgili Tarragona, Spain { pedro.garcia, marc.sanchez, jordi.pujol}@urv.cat Abstract

More information

A Survey of Data Management in Peer-to-Peer Systems

A Survey of Data Management in Peer-to-Peer Systems A Survey of Data Management in Peer-to-Peer Systems L. G. ALEX SUNG, NABEEL AHMED, ROLANDO BLANCO, HERMAN LI, MOHAMED ALI SOLIMAN, and DAVID HADALLER School of Computer Science, University of Waterloo

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

Vulnerabilities of P2P Systems and a Critical Look at their Solutions

Vulnerabilities of P2P Systems and a Critical Look at their Solutions Vulnerabilities of P2P Systems and a Critical Look at their Solutions Marling Engle & Javed I. Khan {mengle javed}@cs.kent.edu Networking and Media Communications Research Laboratories Computer Science

More information

The BitTorrent Protocol

The BitTorrent Protocol The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions

More information

DG Forwarding Algorithm

DG Forwarding Algorithm DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router

More information

DDoS Vulnerability Analysis of Bittorrent Protocol

DDoS Vulnerability Analysis of Bittorrent Protocol DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number

More information

Peer-to-Peer and Grid Computing. Chapter 4: Peer-to-Peer Storage

Peer-to-Peer and Grid Computing. Chapter 4: Peer-to-Peer Storage Peer-to-Peer and Grid Computing Chapter 4: Peer-to-Peer Storage Chapter Outline Using DHTs to build more complex systems How DHT can help? What problems DHTs solve? What problems are left unsolved? P2P

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing

DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing DFSgc Distributed File System for Multipurpose Grid Applications and Cloud Computing Introduction to DFSgc. Motivation: Grid Computing currently needs support for managing huge quantities of storage. Lacks

More information

PEER-TO-PEER (P2P) systems have emerged as an appealing

PEER-TO-PEER (P2P) systems have emerged as an appealing IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 4, APRIL 2009 595 Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems Quang Hieu Vu, Member, IEEE, Beng Chin Ooi,

More information

New Algorithms for Load Balancing in Peer-to-Peer Systems

New Algorithms for Load Balancing in Peer-to-Peer Systems New Algorithms for Load Balancing in Peer-to-Peer Systems David R. Karger Matthias Ruhl MIT Laboratory for Computer Science Cambridge, MA 02139, USA {karger, ruhl}@theory.lcs.mit.edu Abstract Load balancing

More information

A Survey of Peer-to-Peer Network Security Issues

A Survey of Peer-to-Peer Network Security Issues 1 of 8 1/9/2008 12:32 PM A Survey of Peer-to-Peer Network Security Issues James Li Abstract In recent years, peer-to-peer (P2P) networks have soared in popularity in the form of file sharing applications.

More information

Peer-to-Peer Networks Organization and Introduction 1st Week

Peer-to-Peer Networks Organization and Introduction 1st Week Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/

More information

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,

More information

Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications

Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica Robert Morris David Liben-Nowell David Karger M. Frans Kaashoek Frank Dabek Hari Balakrishnan January 10, 2002 Abstract

More information

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

More information

A Performance Comparison of Native IP Multicast and IP Multicast Tunneled through a Peer-to-Peer Overlay Network

A Performance Comparison of Native IP Multicast and IP Multicast Tunneled through a Peer-to-Peer Overlay Network A Performance Comparison of Native IP Multicast and IP Multicast Tunneled through a Peer-to-Peer Overlay Network Marc Brogle, Dragan Milic, Luca Bettosini, Torsten Braun Institute for Computer Science

More information

Wide-area cooperative storage with CFS

Wide-area cooperative storage with CFS Wide-area cooperative storage with CFS Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science chord@lcs.mit.edu http://pdos.lcs.mit.edu/chord/ Abstract

More information

Domain Name System for PeerHosting

Domain Name System for PeerHosting Domain Name System for PeerHosting Arnav Aggarwal, B.Tech A dissertation submitted to the University of Dublin, in partial fulfilment of the requirements for degree of Master of Science in Computer Science

More information

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican

More information

Unit 3 - Advanced Internet Architectures

Unit 3 - Advanced Internet Architectures Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma

More information

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004. Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction

More information

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz University of California, Berkeley The Problem

More information

Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann

Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies

More information

Lecture 25: Security Issues in Structured Peer-to-Peer Networks. Lecture Notes on Computer and Network Security. by Avi Kak (kak@purdue.

Lecture 25: Security Issues in Structured Peer-to-Peer Networks. Lecture Notes on Computer and Network Security. by Avi Kak (kak@purdue. Lecture 25: Security Issues in Structured Peer-to-Peer Networks Lecture Notes on Computer and Network Security by Avi Kak (kak@purdue.edu) April 16, 2015 10:33am c 2015 Avinash Kak, Purdue University Goals:

More information

Content Distribution over IP: Developments and Challenges

Content Distribution over IP: Developments and Challenges Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,

More information