P2P networks, free riding, and counter-mechanisms

Size: px
Start display at page:

Download "P2P networks, free riding, and counter-mechanisms"

Transcription

1 P2P networks,, and counter-mechanisms İbrahim Körpeoğlu Department Computer Engineering Bilkent University Seminar Place: Department Electrical and Electronics Engineering Bilkent University, Ankara Date: October 19, Outline the talk Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella İbrahim Körpeoğlu, Bilkent University 2

2 Outline Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella İbrahim Körpeoğlu, Bilkent University 3 Internet and accessing content Internet is full interesting content (objects). HTML pages document files (.pdf,.doc,.ps, ) music files (mp3,.). video files (.mpg, ). images (.gif,.jpg). programs There are content provides and content consumers. There are various ways for content consumers to access and use the content. İbrahim Körpeoğlu, Bilkent University 4

3 Content providers and users Who are the content provides Companies Institutions Individuals Governments Who are the content consumers Individual users Companies Institutions. Groups.. content (object) content providers Internet content consumers/users İbrahim Körpeoğlu, Bilkent University 5 Ways to download content: pure client-server architecture Use client server architecture and associated protocols. Put content in servers. Clients can download the content via an Internet protocol FTP, or HTTP Servers can become bottleneck points. Reliability and performance problems. clients Internet FTP Get FTP Data server content HTTP request (GET) HTTP response İbrahim Körpeoğlu, Bilkent University 6

4 Ways to download content: web caching Install web caches (web proxies) in between clients and servers. Requests are first directed to the proxy. If a requested object is in the cache, it is satisfied from there, otherwise from the origin server. Better performance. client HTTP request HTTP reply HTTP request HTTP request Better reliability. client HTTP reply cache HTTP reply server İbrahim Körpeoğlu, Bilkent University 7 Web caching: where can we install the proxies Proxies can be installed on network boundaries A campus edge A department edge A country edge. We may have a hierarchy caches. Update caches is required when content changes. cache campus A backbone cache campus B origin server with the use caches, we can have better response time, better scalability, and better reliability. İbrahim Körpeoğlu, Bilkent University 8

5 Outline Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella İbrahim Körpeoğlu, Bilkent University 9 Ways to download content: P2P file sharing Content is stored directly on edge devices: PCs. They are called peers. A peer can be both a client and server. Call it a SERVENT An important problem is how to locate the content? content peer P2P Network peer content peer content İbrahim Körpeoğlu, Bilkent University 10

6 P2P network features Decentralized architecture An application level network self-organizing network No central control Consists autonomous and anonymous peers Router Peer P2P Network Internet Backbone Logical links Physical links A peer may be connected to one or more other peers İbrahim Körpeoğlu, Bilkent University 11 Example use P2P services Peer X wants a file F. X invokes a search operation in the P2P network for file F. P2P network returns the location file F, i.e. the address a peer Y holding the file. Peer X downloads the file directly from peer Y. search F X Y = location F. download F P2P Network Internet Y file F İbrahim Körpeoğlu, Bilkent University 12

7 Closer look to downloads Peer X P2P Network Peer Y Object F P2P App HTTP HTTP request HTTP reply with file P2P App HTTP Object F TCP IP LL TCP connection Internet TCP IP LL transient web server İbrahim Körpeoğlu, Bilkent University 13 P2P network architecture and protocols How is a P2P network designed to perform two functions: 1) locate a desired file X. 2) download the desired file X. There are several P2P architectures that can realize these services. The scheme to locate the content usually directly affects the properties the architecture. P2P Network Architectures Centralized P2P networks Super-Peer based P2P networks Unstructured P2P networks DHT based P2P networks We will not cover in this talk! İbrahim Körpeoğlu, Bilkent University 14

8 Centralized architecture There is a central directory server which stores location information (index) for files shared. A peer that wants to download a file consults to this server for the location the file. Disadvantages: Single point failure Performance bottleneck Legal issues. peer index F F is in Y X X Where is F? central directory HTTP request File F Y HTTP response (the file X) İbrahim Körpeoğlu, Bilkent University 15 Centralized architecture: connection/disconnection to the network Disconnections When a peer disconnects from the network, this fact has to be detected by the central server. Periodic probing The server then deletes all location information for files stored in this peer. When a new peer connects to the network, it has to upload information about its shared files to the central server. central directory probe upload file info Peer X İbrahim Körpeoğlu, Bilkent University 16

9 Hierarchical overlay architecture (super-peer architecture) Location directory (index) is distributed. Peers are organized into groups Two types peers: Normal peers. Group leaders (super peers) A group leader keeps the location information for files in its peer group. A peer has connection to only to its group leader. peers group leader (super peer) peers İbrahim Körpeoğlu, Bilkent University 17 Outline the talk Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella İbrahim Körpeoğlu, Bilkent University 18

10 Unstructured P2P architecture and Gnutella Totally decentralized architecture Flat topology Each peer has equal responsibility. A peer is both a server and client: servlet No directory maintained. Location is found by flooding a location query through the P2P network. servent servent servent servent Gnutella is a P2P network with this architecture. İbrahim Körpeoğlu, Bilkent University 19 Gnutella connection (i.e. Gnutella link) A peer is connected to the P2P network through one or more peers (neighbors). A connection to another peer is done using TCP sockets. Reliable delivery Gnutella protocol messages between peers. Gnutella connections go over TCP connections. peer P2P Network peer peer peer peer TCP connection TCP sockets İbrahim Körpeoğlu, Bilkent University 20

11 Gnutella stware and TCP connections A Gnutella servlet running on a machine is just an application level stware. Uses TCP to connect to other peers Implements HTTP protocol and uses that during downloads. Gnutella P2P network peer TCP IP LL TCP connection peer TCP connection Internet Infrastructure peer TCP IP LL İbrahim Körpeoğlu, Bilkent University 21 How does a peer initially know which peer(s) to connect to? Use host caches A peer consults to a host cache machine. A host cache is a special server that knows the IP addresses some active peers. A list IP addresses active peers can be downloaded from the host cache. TCP connection peer select and try an IP address Host cache list IP addresses TCP connection P2P Network İbrahim Körpeoğlu, Bilkent University 22

12 How does a peer learn more about other peers? Ping/Pong messages A peer can use its neighbors to learn about other peers. It sends Ping messages to its neighbors. Pong messages will be returned as replies A Pong message includes one IP address ( the peer or a peer). Peer X Peer Y knows the IP addresses its neighbors TCP connection TCP connections Peer A Peer B Peer Y TCP connection Peer C Ping Pong (A) Pong (B) Pong (C) A: B: C: IP addresses İbrahim Körpeoğlu, Bilkent University 23 How does a peer learn more about other peers? Ping messages Ping messages can be relayed through more than one hop. A peer receiving a Ping message may forward it to all its neighbors. If time-to-live (TTL) value Ping has reached to zero, no forwarding is done. Peer X Ping Ping Peer Y Ping Ping Peer A Peer B Peer C İbrahim Körpeoğlu, Bilkent University 24

13 How does a peer learn more about other peers? Pong messages Pong messages will follow the reverse path Ping messages. Pong message includes also a port number besides the IP address. The (port number, IP address) pair can be used to establish a TCP connection to the machine holding that IP address. Peer X Pong(A) Pong(B) Pong(C) Peer Y Pong(A) Pong(B) Pong(C) Peer A Peer B Peer C İbrahim Körpeoğlu, Bilkent University 25 Message Format Gnutellla 16 bytes 1 bytes 1 bytes 1 bytes 4 bytes Variable size Message ID Type TTL Hops Message Header Payload Length Each Gnutella message starts with a header. Payload is different for each message type: Ping message Pong message message Hit message Push message Payload İbrahim Körpeoğlu, Bilkent University 26

14 ing Message ID Type Length 0x80 TTL 0 X Min Speed (Search) Keywords A peer prepares a message and sends it to each its neighbors. Each neighbor forwards the to their neighbors. TTL limits the flooding. Peer Peer Peer Peer Peer Peer Peer İbrahim Körpeoğlu, Bilkent University 27 ing: vertical view Peer Peer Peer P2P network TCP IP LL TCP IP LL Internet TCP IP LL one or more physical hops Internet İbrahim Körpeoğlu, Bilkent University 28

15 message generation at a peer Generate ( Q) Create an empty message Q; Q.QID = select a unique 16 byte number ; Q.TTL = a predefied value, say 7; Q.Hops = 0; Q.Type = 0x80; Originator Q O Q X Q.Minspeed = minimum required speed an answering peer. Q.Keywords = search keywords received from the user. Create an entry for query Q in the query table. Send the query to all the neighbors. İbrahim Körpeoğlu, Bilkent University 29 message processing at a peer Process ( Q received from a peer P) If (Q.QID has been seen earlier) Drop the Q. Else Create an entry E in table queries E.QID = Q. QID; E.PreviousPeer = P; Local search for match. If (match found) Send back Hit Decrement Q.TTL increment Q.Hops If (Q.TTL == 0) Drop the Q. Else Send the Q to all neighbors excluding the query sender. peer X O Q X table ID Previous Peer. İbrahim Körpeoğlu, Bilkent University 30

16 Hit message processing at a peer match Process (Hit QH received from a peer P) If (the corresponding is generated at this node) display the results in the hit to user; Else Search for the table entry E matching the QH.QID Pv = E.PreviousPeer; E.NextPeer = P. Send the Hit to previous peer Pv. O Hit QH Hit QH X table Y ID Previous Peer NextPeer İbrahim Körpeoğlu, Bilkent University 31 Gnutella search in action B A D B G D J G I and J have the file. A Does search A C E B H D K H L K F C I E QUERY QUERY HIT A will get two replies. İbrahim Körpeoğlu, Bilkent University 32

17 Outline the talk Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella İbrahim Körpeoğlu, Bilkent University 33 What is? Free means exploiting P2P network resources, but not contributing to the P2P network at desirable levels. A rider may do search and download operations, but: May not share any content May not share any interesting content. May not forward protocol messages, etc. peer rider consumes a lot P2P Network contributes little or none İbrahim Körpeoğlu, Bilkent University 34

18 Why peers ride? The peer may not want to share and contribute because: the peer has security concerns. the peers doesn t want to consume its network connection s bandwidth. the peer doesn t want to consume its local storage and processing resources. İbrahim Körpeoğlu, Bilkent University 35 Why is not desired? Good peers will be overloaded. Available content will decrease in time if only few people share. Fault tolerance will degrade If good peers get down, content will not be reachable. Search horizon will effectively shrink if too many riders exist in the network. query TTL=4 good peers P2P Network riders İbrahim Körpeoğlu, Bilkent University 36

19 Free in Gnutella* all gnutella peers content requested 30 % shares some files 37 % 63 % content never-requested riders sharing uninteresting content 70 % shares nothing riders sharing nothing (*) Source: Eytan Adar and Bernardo Huberman, Free Riding in Gnutella. FirstMonday, 5(10), October About only 10 % peers provide content that is searched for and downloaded. İbrahim Körpeoğlu, Bilkent University 37 Outline the talk Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella A scheme to detect and discourage riders. İbrahim Körpeoğlu, Bilkent University 38

20 A distributed scheme against Designed for Gnutella Works in a distributed manner. No central control and management Based on monitoring protocol messages and updating counters. A proposal for: Detecting riders. Applying discouraging counter-actions against riders. İbrahim Körpeoğlu, Bilkent University 39 The approach B D G J Peer I will control its neighboring peers E, F, H, and K. A E H L C K F I The approach is based on having each peer control its direct neighbors. İbrahim Körpeoğlu, Bilkent University 40

21 The approach D G A B J Is I Free Rider? E H L E will control I and I will control E. C K F I Is E Free Rider? Neighboring peers will control each other. İbrahim Körpeoğlu, Bilkent University 41 Free Riding Types We classify behavior into three groups. A rider peer can behave as a: 1) Non-Contributor 2) Consumer 3) Dropper A rider may exhibit one or more these behaviors. İbrahim Körpeoğlu, Bilkent University 42

22 What is a non-contributor? Peer X P2P Network Hit Hit P2P Network It may forward others and Hits x No Hit Hit It never answers queries. It may generate Queries and can get Hits İbrahim Körpeoğlu, Bilkent University 43 What is a consumer Peer X P2P Network P2P Network Hit Hit It may forward others Queries and Hits Hit Peer consumes more that it contributes. Hit It answers Queries. It generates Queries and gets Hits İbrahim Körpeoğlu, Bilkent University 44

23 What is a dropper Peer X P2P Network P2P Network Hit x x Hit It does not forward other peers and/or Hits Hit It may answer Queries. It does not act as an intermediate P2P network node. Hit It may generate Queries and get Hits İbrahim Körpeoğlu, Bilkent University 45 How do we decide about and its type in the context Gnutella? Count the protocol messages received from and sent to neighboring peers. Update counters in tables maintained for each neighbor. N1 tables for neighbors controlling peer N2 N3 İbrahim Körpeoğlu, Bilkent University 46

24 Counters Monitoring peer Controlled peer Q RQ TQ Hit QH Hit Hit RQH Hit Hit Hit SQH Hit İbrahim Körpeoğlu, Bilkent University 47 Detecting a non-contributor Monitoring Peer X Controlled Peer Y Queries transmitted towards the neighbor Hit TQ QH Hit hits originated from the neighbor If (QH / TQ) < Threshold NONCONTRIBUTOR then Peer Y is Non-Contributor İbrahim Körpeoğlu, Bilkent University 48

25 Detecting a consumer Monitoring Peer X Controlled Peer Y Hit Hit QH hits generated by the neighbor SQH Hit Hit hits destined to the neighbor If (QH / SQH) < Threshold CONSUMER then Peer Y is Consumer İbrahim Körpeoğlu, Bilkent University 49 Detecting a dropper Monitoring Peer X Controlled Peer Y Queries received through the neighbor RQ TQ Queries sent towards the neighbor hits received through the neighbor Hit Hit RQH Hit If ( [RQ + RQH] / TQ) < Threshold DROPPER then Peer Y is Dropper İbrahim Körpeoğlu, Bilkent University 50

26 Actions We define three levels discouraging counteractions that can be applied against neighboring riders. Level 1: Decrement the TTL value in Queries Decrease the search horizon the rider Level 2: Ignore Queries partially Free rider will not be able to search through this neighbor Level 3 actions: Disconnect the peer. Free rider has to try to connect through another peer if it still wants to use the P2P network services İbrahim Körpeoğlu, Bilkent University 51 Level 1 action: decrement TTL rider Y (TTL = N) Action decrease TTL by M (TTL = N-M) M can be 1 or more. This will cause the horizon for the neighbor to shrink İbrahim Körpeoğlu, Bilkent University 52

27 Level 2 action: ignore requests rider Y Action: drop, or reduce probability forwarding İbrahim Körpeoğlu, Bilkent University 53 Level 3 action: disconnect peer x rider Y Action: disconnect İbrahim Körpeoğlu, Bilkent University 54

28 Exactly Exactly one one type type is is Normal No No types types is is Exactly Exactly two two types types are are Decr. TTL TTL Exactly Exactly two two types types are are Ignore Reqs. All All three three types types are are Exactly Exactly one one type type is is All All three three types types are are Disconnect All All three three types types are are İbrahim Körpeoğlu, Bilkent University 55 Summary and Future Work Great amount is in Gnutella network. Free has adverse affects on the proper operation P2P networks. We described a distributed and measurement based scheme to: Detect riders in a Gnutella network Take discouraging actions against riders in a Gnutella network. We are currently working on a simulation tool that is simulating on a Gnutella network model. The simulator will be used to evaluate the described scheme. İbrahim Körpeoğlu, Bilkent University 56

Counteracting free riding in Peer-to-Peer networks q

Counteracting free riding in Peer-to-Peer networks q Available online at www.sciencedirect.com Computer Networks 52 (2008) 675 694 www.elsevier.com/locate/comnet Counteracting free riding in Peer-to-Peer networks q Murat Karakaya *, _ Ibrahim Körpeoğlu,

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

Analysis of the Traffic on the Gnutella Network

Analysis of the Traffic on the Gnutella Network Analysis of the Traffic on the Gnutella Network Kelsey Anderson University of California, San Diego CSE222 Final Project March 21 Abstract The Gnutella network is an overlay network

More information

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

Improving Gnutella Protocol: Protocol Analysis And Research Proposals

Improving Gnutella Protocol: Protocol Analysis And Research Proposals Improving Gnutella Protocol: Protocol Analysis And Research Proposals Igor Ivkovic Software Architecture Group (SWAG) Department of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1 Canada

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

The Gnutella Protocol Specification v0.4

The Gnutella Protocol Specification v0.4 The Gnutella Protocol Specification v0.4 Clip2 Distributed Search Services http://dss.clip2.com dss-protocols@clip2.com Gnutella (pronounced "newtella") is a protocol for distributed search. Although the

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

Interoperability of Peer-To-Peer File Sharing Protocols

Interoperability of Peer-To-Peer File Sharing Protocols Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and

More information

HollyShare: Peer-to-Peer File Sharing Application

HollyShare: Peer-to-Peer File Sharing Application HollyShare: Peer-to-Peer File Sharing Application ICS 243A Class Project Songmei Han Bijit Hore Ilya Issenin Sean McCarthy Shannon Tauro HollyShare Project: Final Report 1 INTRODUCTION...3 SURVEY...5 Architecture

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004. Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009 HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta

More information

Communications and Networking

Communications and Networking Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer CPSC 360 Network Programming Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer Systems Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu

More information

A Measurement Study of Peer-to-Peer File Sharing Systems

A Measurement Study of Peer-to-Peer File Sharing Systems CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

ICP. Cache Hierarchies. Squid. Squid Cache ICP Use. Squid. Squid

ICP. Cache Hierarchies. Squid. Squid Cache ICP Use. Squid. Squid Caching & CDN s 15-44: Computer Networking L-21: Caching and CDNs HTTP APIs Assigned reading [FCAB9] Summary Cache: A Scalable Wide- Area Cache Sharing Protocol [Cla00] Freenet: A Distributed Anonymous

More information

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2 CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol

More information

CS 360 Internet Programming

CS 360 Internet Programming Peer-to-Peer Networking File Sharing, and Computer Science Brigham Young University 1 Peer-to-Peer File Sharing with Ultrapeers Overview Peer-to-Peer File Sharing with Ultrapeers peer-to-peer peers exchange

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

Peer-to-Peer Networks for Content Sharing

Peer-to-Peer Networks for Content Sharing Peer-to-Peer Networks for Content Sharing Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering,

More information

Peer-to-Peer File Sharing

Peer-to-Peer File Sharing The Effects of File Sharing on a Service Provider's Network An Industry White Paper Copyright July 2002, Sandvine Incorporated www.sandvine.com 408 Albert Street Waterloo, Ontario Canada N2L 3V3 Executive

More information

Title: P2P Networks for Content Sharing

Title: P2P Networks for Content Sharing Title: P2P Networks for Content Sharing Authors: Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering,

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

Evolution of Peer-to-Peer Systems

Evolution of Peer-to-Peer Systems EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor

More information

DNS and P2P File Sharing

DNS and P2P File Sharing Computer Networks DNS and P2P File Sharing Based on Computer Networking, 4 th Edition by Kurose and Ross DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers:

More information

Interconnecting Unstructured P2P File Sharing Networks

Interconnecting Unstructured P2P File Sharing Networks Interconnecting Unstructured P2P File Sharing Networks Jaime Lloret Department of Communications, Polytechnic University of Valencia Camino de Vera s/n 46020 Valencia (Spain) Phone: +34 609549043 Fax:

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

architecture: what the pieces are and how they fit together names and addresses: what's your name and number? Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

CSCI-1680 CDN & P2P Chen Avin

CSCI-1680 CDN & P2P Chen Avin CSCI-1680 CDN & P2P Chen Avin Based partly on lecture notes by Scott Shenker and John Jannotti androdrigo Fonseca And Computer Networking: A Top Down Approach - 6th edition Last time DNS & DHT Today: P2P

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

Peer-to-Peer Networks Organization and Introduction 1st Week

Peer-to-Peer Networks Organization and Introduction 1st Week Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/

More information

Using OSPF in an MPLS VPN Environment

Using OSPF in an MPLS VPN Environment Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest

More information

12. Firewalls Content

12. Firewalls Content Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

NQA Technology White Paper

NQA Technology White Paper NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics

More information

A methodology for workload characterization of file-sharing peer-to-peer networks

A methodology for workload characterization of file-sharing peer-to-peer networks A methodology for workload characterization of file-sharing peer-to-peer networks Diêgo Nogueira, Leonardo Rocha, Juliano Santos, Paulo Araújo, Virgílio Almeida, Wagner Meira Jr. Department of Computer

More information

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:

More information

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

A distributed system is defined as

A distributed system is defined as A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

NETWORKS AND THE INTERNET

NETWORKS AND THE INTERNET NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place

More information

File sharing using IP-Multicast

File sharing using IP-Multicast File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion

More information

2015 Internet Traffic Analysis

2015 Internet Traffic Analysis 2015 Internet Traffic nalysis Computer Networks Sandvine s Global Internet Phenomena Report: https://www.sandvine.com/trends/global-internet-phenomena/ Lecture 8: Content Delivery Infrastructure: Peer-to-Peer

More information

TORA : Temporally Ordered Routing Algorithm

TORA : Temporally Ordered Routing Algorithm TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control

More information

Peer to peer networks: sharing between peers. Trond Aspelund

Peer to peer networks: sharing between peers. Trond Aspelund Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server

More information

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters

More information

DG Forwarding Algorithm

DG Forwarding Algorithm DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router

More information

Outline. Outline. Outline

Outline. Outline. Outline Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather

More information

Internet Protocol Address

Internet Protocol Address SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

20. Switched Local Area Networks

20. Switched Local Area Networks 20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Using Peer to Peer Dynamic Querying in Grid Information Services

Using Peer to Peer Dynamic Querying in Grid Information Services Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information

More information

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Chakchai So-In, Ph.D.

Chakchai So-In, Ph.D. Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

Decentralized supplementary services for Voice-over-IP telephony

Decentralized supplementary services for Voice-over-IP telephony Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.

More information

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Professor Yashar Ganjali Department of Computer Science University of Toronto. yganjali@cs.toronto.edu http://www.cs.toronto.

Professor Yashar Ganjali Department of Computer Science University of Toronto. yganjali@cs.toronto.edu http://www.cs.toronto. Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Announcements Programming assignment 2 Extended Deadline: Fri.

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 Important: No cheating will be tolerated. No extension. CS 5480 total points = 32 CS 6480 total

More information

Architectures and protocols in Peer-to-Peer networks

Architectures and protocols in Peer-to-Peer networks Architectures and protocols in Peer-to-Peer networks Ing. Michele Amoretti [amoretti@ce.unipr.it] II INFN SECURITY WORKSHOP Parma 24-25 February 2004 Contents - Definition of Peer-to-Peer network - P2P

More information

SANE: A Protection Architecture For Enterprise Networks

SANE: A Protection Architecture For Enterprise Networks Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol

More information

Exercise 4 MPLS router configuration

Exercise 4 MPLS router configuration Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.

More information

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 02/25/15 Solution!! 1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

N6Lookup( title ) Client

N6Lookup( title ) Client CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding

More information

Simple Solution for a Location Service. Naming vs. Locating Entities. Forwarding Pointers (2) Forwarding Pointers (1)

Simple Solution for a Location Service. Naming vs. Locating Entities. Forwarding Pointers (2) Forwarding Pointers (1) Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address

More information

PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries

PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries Jyoti Ahuja, Jun-Hong Cui, Shigang Chen, Li Lao jyoti@engr.uconn.edu, jcui@cse.uconn.edu, sgchen@cise.ufl.edu, llao@cs.ucla.edu

More information

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT) Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate

More information

Client/server and peer-to-peer models: basic concepts

Client/server and peer-to-peer models: basic concepts Client/server and peer-to-peer models: basic concepts Dmitri Moltchanov Department of Communications Engineering Tampere University of Technology moltchan@cs.tut.fi September 04, 2013 Slides provided by

More information

Networks and the Internet A Primer for Prosecutors and Investigators

Networks and the Internet A Primer for Prosecutors and Investigators Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()

More information