P2P networks, free riding, and counter-mechanisms
|
|
- Calvin Andrews
- 7 years ago
- Views:
Transcription
1 P2P networks,, and counter-mechanisms İbrahim Körpeoğlu Department Computer Engineering Bilkent University Seminar Place: Department Electrical and Electronics Engineering Bilkent University, Ankara Date: October 19, Outline the talk Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella İbrahim Körpeoğlu, Bilkent University 2
2 Outline Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella İbrahim Körpeoğlu, Bilkent University 3 Internet and accessing content Internet is full interesting content (objects). HTML pages document files (.pdf,.doc,.ps, ) music files (mp3,.). video files (.mpg, ). images (.gif,.jpg). programs There are content provides and content consumers. There are various ways for content consumers to access and use the content. İbrahim Körpeoğlu, Bilkent University 4
3 Content providers and users Who are the content provides Companies Institutions Individuals Governments Who are the content consumers Individual users Companies Institutions. Groups.. content (object) content providers Internet content consumers/users İbrahim Körpeoğlu, Bilkent University 5 Ways to download content: pure client-server architecture Use client server architecture and associated protocols. Put content in servers. Clients can download the content via an Internet protocol FTP, or HTTP Servers can become bottleneck points. Reliability and performance problems. clients Internet FTP Get FTP Data server content HTTP request (GET) HTTP response İbrahim Körpeoğlu, Bilkent University 6
4 Ways to download content: web caching Install web caches (web proxies) in between clients and servers. Requests are first directed to the proxy. If a requested object is in the cache, it is satisfied from there, otherwise from the origin server. Better performance. client HTTP request HTTP reply HTTP request HTTP request Better reliability. client HTTP reply cache HTTP reply server İbrahim Körpeoğlu, Bilkent University 7 Web caching: where can we install the proxies Proxies can be installed on network boundaries A campus edge A department edge A country edge. We may have a hierarchy caches. Update caches is required when content changes. cache campus A backbone cache campus B origin server with the use caches, we can have better response time, better scalability, and better reliability. İbrahim Körpeoğlu, Bilkent University 8
5 Outline Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella İbrahim Körpeoğlu, Bilkent University 9 Ways to download content: P2P file sharing Content is stored directly on edge devices: PCs. They are called peers. A peer can be both a client and server. Call it a SERVENT An important problem is how to locate the content? content peer P2P Network peer content peer content İbrahim Körpeoğlu, Bilkent University 10
6 P2P network features Decentralized architecture An application level network self-organizing network No central control Consists autonomous and anonymous peers Router Peer P2P Network Internet Backbone Logical links Physical links A peer may be connected to one or more other peers İbrahim Körpeoğlu, Bilkent University 11 Example use P2P services Peer X wants a file F. X invokes a search operation in the P2P network for file F. P2P network returns the location file F, i.e. the address a peer Y holding the file. Peer X downloads the file directly from peer Y. search F X Y = location F. download F P2P Network Internet Y file F İbrahim Körpeoğlu, Bilkent University 12
7 Closer look to downloads Peer X P2P Network Peer Y Object F P2P App HTTP HTTP request HTTP reply with file P2P App HTTP Object F TCP IP LL TCP connection Internet TCP IP LL transient web server İbrahim Körpeoğlu, Bilkent University 13 P2P network architecture and protocols How is a P2P network designed to perform two functions: 1) locate a desired file X. 2) download the desired file X. There are several P2P architectures that can realize these services. The scheme to locate the content usually directly affects the properties the architecture. P2P Network Architectures Centralized P2P networks Super-Peer based P2P networks Unstructured P2P networks DHT based P2P networks We will not cover in this talk! İbrahim Körpeoğlu, Bilkent University 14
8 Centralized architecture There is a central directory server which stores location information (index) for files shared. A peer that wants to download a file consults to this server for the location the file. Disadvantages: Single point failure Performance bottleneck Legal issues. peer index F F is in Y X X Where is F? central directory HTTP request File F Y HTTP response (the file X) İbrahim Körpeoğlu, Bilkent University 15 Centralized architecture: connection/disconnection to the network Disconnections When a peer disconnects from the network, this fact has to be detected by the central server. Periodic probing The server then deletes all location information for files stored in this peer. When a new peer connects to the network, it has to upload information about its shared files to the central server. central directory probe upload file info Peer X İbrahim Körpeoğlu, Bilkent University 16
9 Hierarchical overlay architecture (super-peer architecture) Location directory (index) is distributed. Peers are organized into groups Two types peers: Normal peers. Group leaders (super peers) A group leader keeps the location information for files in its peer group. A peer has connection to only to its group leader. peers group leader (super peer) peers İbrahim Körpeoğlu, Bilkent University 17 Outline the talk Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella İbrahim Körpeoğlu, Bilkent University 18
10 Unstructured P2P architecture and Gnutella Totally decentralized architecture Flat topology Each peer has equal responsibility. A peer is both a server and client: servlet No directory maintained. Location is found by flooding a location query through the P2P network. servent servent servent servent Gnutella is a P2P network with this architecture. İbrahim Körpeoğlu, Bilkent University 19 Gnutella connection (i.e. Gnutella link) A peer is connected to the P2P network through one or more peers (neighbors). A connection to another peer is done using TCP sockets. Reliable delivery Gnutella protocol messages between peers. Gnutella connections go over TCP connections. peer P2P Network peer peer peer peer TCP connection TCP sockets İbrahim Körpeoğlu, Bilkent University 20
11 Gnutella stware and TCP connections A Gnutella servlet running on a machine is just an application level stware. Uses TCP to connect to other peers Implements HTTP protocol and uses that during downloads. Gnutella P2P network peer TCP IP LL TCP connection peer TCP connection Internet Infrastructure peer TCP IP LL İbrahim Körpeoğlu, Bilkent University 21 How does a peer initially know which peer(s) to connect to? Use host caches A peer consults to a host cache machine. A host cache is a special server that knows the IP addresses some active peers. A list IP addresses active peers can be downloaded from the host cache. TCP connection peer select and try an IP address Host cache list IP addresses TCP connection P2P Network İbrahim Körpeoğlu, Bilkent University 22
12 How does a peer learn more about other peers? Ping/Pong messages A peer can use its neighbors to learn about other peers. It sends Ping messages to its neighbors. Pong messages will be returned as replies A Pong message includes one IP address ( the peer or a peer). Peer X Peer Y knows the IP addresses its neighbors TCP connection TCP connections Peer A Peer B Peer Y TCP connection Peer C Ping Pong (A) Pong (B) Pong (C) A: B: C: IP addresses İbrahim Körpeoğlu, Bilkent University 23 How does a peer learn more about other peers? Ping messages Ping messages can be relayed through more than one hop. A peer receiving a Ping message may forward it to all its neighbors. If time-to-live (TTL) value Ping has reached to zero, no forwarding is done. Peer X Ping Ping Peer Y Ping Ping Peer A Peer B Peer C İbrahim Körpeoğlu, Bilkent University 24
13 How does a peer learn more about other peers? Pong messages Pong messages will follow the reverse path Ping messages. Pong message includes also a port number besides the IP address. The (port number, IP address) pair can be used to establish a TCP connection to the machine holding that IP address. Peer X Pong(A) Pong(B) Pong(C) Peer Y Pong(A) Pong(B) Pong(C) Peer A Peer B Peer C İbrahim Körpeoğlu, Bilkent University 25 Message Format Gnutellla 16 bytes 1 bytes 1 bytes 1 bytes 4 bytes Variable size Message ID Type TTL Hops Message Header Payload Length Each Gnutella message starts with a header. Payload is different for each message type: Ping message Pong message message Hit message Push message Payload İbrahim Körpeoğlu, Bilkent University 26
14 ing Message ID Type Length 0x80 TTL 0 X Min Speed (Search) Keywords A peer prepares a message and sends it to each its neighbors. Each neighbor forwards the to their neighbors. TTL limits the flooding. Peer Peer Peer Peer Peer Peer Peer İbrahim Körpeoğlu, Bilkent University 27 ing: vertical view Peer Peer Peer P2P network TCP IP LL TCP IP LL Internet TCP IP LL one or more physical hops Internet İbrahim Körpeoğlu, Bilkent University 28
15 message generation at a peer Generate ( Q) Create an empty message Q; Q.QID = select a unique 16 byte number ; Q.TTL = a predefied value, say 7; Q.Hops = 0; Q.Type = 0x80; Originator Q O Q X Q.Minspeed = minimum required speed an answering peer. Q.Keywords = search keywords received from the user. Create an entry for query Q in the query table. Send the query to all the neighbors. İbrahim Körpeoğlu, Bilkent University 29 message processing at a peer Process ( Q received from a peer P) If (Q.QID has been seen earlier) Drop the Q. Else Create an entry E in table queries E.QID = Q. QID; E.PreviousPeer = P; Local search for match. If (match found) Send back Hit Decrement Q.TTL increment Q.Hops If (Q.TTL == 0) Drop the Q. Else Send the Q to all neighbors excluding the query sender. peer X O Q X table ID Previous Peer. İbrahim Körpeoğlu, Bilkent University 30
16 Hit message processing at a peer match Process (Hit QH received from a peer P) If (the corresponding is generated at this node) display the results in the hit to user; Else Search for the table entry E matching the QH.QID Pv = E.PreviousPeer; E.NextPeer = P. Send the Hit to previous peer Pv. O Hit QH Hit QH X table Y ID Previous Peer NextPeer İbrahim Körpeoğlu, Bilkent University 31 Gnutella search in action B A D B G D J G I and J have the file. A Does search A C E B H D K H L K F C I E QUERY QUERY HIT A will get two replies. İbrahim Körpeoğlu, Bilkent University 32
17 Outline the talk Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella İbrahim Körpeoğlu, Bilkent University 33 What is? Free means exploiting P2P network resources, but not contributing to the P2P network at desirable levels. A rider may do search and download operations, but: May not share any content May not share any interesting content. May not forward protocol messages, etc. peer rider consumes a lot P2P Network contributes little or none İbrahim Körpeoğlu, Bilkent University 34
18 Why peers ride? The peer may not want to share and contribute because: the peer has security concerns. the peers doesn t want to consume its network connection s bandwidth. the peer doesn t want to consume its local storage and processing resources. İbrahim Körpeoğlu, Bilkent University 35 Why is not desired? Good peers will be overloaded. Available content will decrease in time if only few people share. Fault tolerance will degrade If good peers get down, content will not be reachable. Search horizon will effectively shrink if too many riders exist in the network. query TTL=4 good peers P2P Network riders İbrahim Körpeoğlu, Bilkent University 36
19 Free in Gnutella* all gnutella peers content requested 30 % shares some files 37 % 63 % content never-requested riders sharing uninteresting content 70 % shares nothing riders sharing nothing (*) Source: Eytan Adar and Bernardo Huberman, Free Riding in Gnutella. FirstMonday, 5(10), October About only 10 % peers provide content that is searched for and downloaded. İbrahim Körpeoğlu, Bilkent University 37 Outline the talk Content sharing and distribution in Internet P2P networks and architectures Gnutella architecture and protocol Free and Gnutella Preventing in Gnutella A scheme to detect and discourage riders. İbrahim Körpeoğlu, Bilkent University 38
20 A distributed scheme against Designed for Gnutella Works in a distributed manner. No central control and management Based on monitoring protocol messages and updating counters. A proposal for: Detecting riders. Applying discouraging counter-actions against riders. İbrahim Körpeoğlu, Bilkent University 39 The approach B D G J Peer I will control its neighboring peers E, F, H, and K. A E H L C K F I The approach is based on having each peer control its direct neighbors. İbrahim Körpeoğlu, Bilkent University 40
21 The approach D G A B J Is I Free Rider? E H L E will control I and I will control E. C K F I Is E Free Rider? Neighboring peers will control each other. İbrahim Körpeoğlu, Bilkent University 41 Free Riding Types We classify behavior into three groups. A rider peer can behave as a: 1) Non-Contributor 2) Consumer 3) Dropper A rider may exhibit one or more these behaviors. İbrahim Körpeoğlu, Bilkent University 42
22 What is a non-contributor? Peer X P2P Network Hit Hit P2P Network It may forward others and Hits x No Hit Hit It never answers queries. It may generate Queries and can get Hits İbrahim Körpeoğlu, Bilkent University 43 What is a consumer Peer X P2P Network P2P Network Hit Hit It may forward others Queries and Hits Hit Peer consumes more that it contributes. Hit It answers Queries. It generates Queries and gets Hits İbrahim Körpeoğlu, Bilkent University 44
23 What is a dropper Peer X P2P Network P2P Network Hit x x Hit It does not forward other peers and/or Hits Hit It may answer Queries. It does not act as an intermediate P2P network node. Hit It may generate Queries and get Hits İbrahim Körpeoğlu, Bilkent University 45 How do we decide about and its type in the context Gnutella? Count the protocol messages received from and sent to neighboring peers. Update counters in tables maintained for each neighbor. N1 tables for neighbors controlling peer N2 N3 İbrahim Körpeoğlu, Bilkent University 46
24 Counters Monitoring peer Controlled peer Q RQ TQ Hit QH Hit Hit RQH Hit Hit Hit SQH Hit İbrahim Körpeoğlu, Bilkent University 47 Detecting a non-contributor Monitoring Peer X Controlled Peer Y Queries transmitted towards the neighbor Hit TQ QH Hit hits originated from the neighbor If (QH / TQ) < Threshold NONCONTRIBUTOR then Peer Y is Non-Contributor İbrahim Körpeoğlu, Bilkent University 48
25 Detecting a consumer Monitoring Peer X Controlled Peer Y Hit Hit QH hits generated by the neighbor SQH Hit Hit hits destined to the neighbor If (QH / SQH) < Threshold CONSUMER then Peer Y is Consumer İbrahim Körpeoğlu, Bilkent University 49 Detecting a dropper Monitoring Peer X Controlled Peer Y Queries received through the neighbor RQ TQ Queries sent towards the neighbor hits received through the neighbor Hit Hit RQH Hit If ( [RQ + RQH] / TQ) < Threshold DROPPER then Peer Y is Dropper İbrahim Körpeoğlu, Bilkent University 50
26 Actions We define three levels discouraging counteractions that can be applied against neighboring riders. Level 1: Decrement the TTL value in Queries Decrease the search horizon the rider Level 2: Ignore Queries partially Free rider will not be able to search through this neighbor Level 3 actions: Disconnect the peer. Free rider has to try to connect through another peer if it still wants to use the P2P network services İbrahim Körpeoğlu, Bilkent University 51 Level 1 action: decrement TTL rider Y (TTL = N) Action decrease TTL by M (TTL = N-M) M can be 1 or more. This will cause the horizon for the neighbor to shrink İbrahim Körpeoğlu, Bilkent University 52
27 Level 2 action: ignore requests rider Y Action: drop, or reduce probability forwarding İbrahim Körpeoğlu, Bilkent University 53 Level 3 action: disconnect peer x rider Y Action: disconnect İbrahim Körpeoğlu, Bilkent University 54
28 Exactly Exactly one one type type is is Normal No No types types is is Exactly Exactly two two types types are are Decr. TTL TTL Exactly Exactly two two types types are are Ignore Reqs. All All three three types types are are Exactly Exactly one one type type is is All All three three types types are are Disconnect All All three three types types are are İbrahim Körpeoğlu, Bilkent University 55 Summary and Future Work Great amount is in Gnutella network. Free has adverse affects on the proper operation P2P networks. We described a distributed and measurement based scheme to: Detect riders in a Gnutella network Take discouraging actions against riders in a Gnutella network. We are currently working on a simulation tool that is simulating on a Gnutella network model. The simulator will be used to evaluate the described scheme. İbrahim Körpeoğlu, Bilkent University 56
Counteracting free riding in Peer-to-Peer networks q
Available online at www.sciencedirect.com Computer Networks 52 (2008) 675 694 www.elsevier.com/locate/comnet Counteracting free riding in Peer-to-Peer networks q Murat Karakaya *, _ Ibrahim Körpeoğlu,
More informationAn Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
More informationAnalysis of the Traffic on the Gnutella Network
Analysis of the Traffic on the Gnutella Network Kelsey Anderson University of California, San Diego CSE222 Final Project March 21 Abstract The Gnutella network is an overlay network
More informationDecentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
More informationThe Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
More informationMapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer
More informationNapster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
More informationImproving Gnutella Protocol: Protocol Analysis And Research Proposals
Improving Gnutella Protocol: Protocol Analysis And Research Proposals Igor Ivkovic Software Architecture Group (SWAG) Department of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1 Canada
More informationP2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
More informationThe Gnutella Protocol Specification v0.4
The Gnutella Protocol Specification v0.4 Clip2 Distributed Search Services http://dss.clip2.com dss-protocols@clip2.com Gnutella (pronounced "newtella") is a protocol for distributed search. Although the
More informationAnonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
More information1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
More informationPEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
More informationInteroperability of Peer-To-Peer File Sharing Protocols
Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and
More informationHollyShare: Peer-to-Peer File Sharing Application
HollyShare: Peer-to-Peer File Sharing Application ICS 243A Class Project Songmei Han Bijit Hore Ilya Issenin Sean McCarthy Shannon Tauro HollyShare Project: Final Report 1 INTRODUCTION...3 SURVEY...5 Architecture
More informationA Network Monitoring System with a Peer-to-Peer Architecture
A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The
More informationOverlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.
Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationHW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationPeer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta
More informationCommunications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More informationApplications & Application-Layer Protocols: The Domain Name System and Peerto-Peer
CPSC 360 Network Programming Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer Systems Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu
More informationA Measurement Study of Peer-to-Peer File Sharing Systems
CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationUsing IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
More informationTrace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic
Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationICP. Cache Hierarchies. Squid. Squid Cache ICP Use. Squid. Squid
Caching & CDN s 15-44: Computer Networking L-21: Caching and CDNs HTTP APIs Assigned reading [FCAB9] Summary Cache: A Scalable Wide- Area Cache Sharing Protocol [Cla00] Freenet: A Distributed Anonymous
More informationApplication Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2
CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol
More informationCS 360 Internet Programming
Peer-to-Peer Networking File Sharing, and Computer Science Brigham Young University 1 Peer-to-Peer File Sharing with Ultrapeers Overview Peer-to-Peer File Sharing with Ultrapeers peer-to-peer peers exchange
More informationCSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
More informationPeer-to-Peer Networks for Content Sharing
Peer-to-Peer Networks for Content Sharing Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering,
More informationPeer-to-Peer File Sharing
The Effects of File Sharing on a Service Provider's Network An Industry White Paper Copyright July 2002, Sandvine Incorporated www.sandvine.com 408 Albert Street Waterloo, Ontario Canada N2L 3V3 Executive
More informationTitle: P2P Networks for Content Sharing
Title: P2P Networks for Content Sharing Authors: Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering,
More informationRESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
More informationEvolution of Peer-to-Peer Systems
EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor
More informationDNS and P2P File Sharing
Computer Networks DNS and P2P File Sharing Based on Computer Networking, 4 th Edition by Kurose and Ross DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers:
More informationInterconnecting Unstructured P2P File Sharing Networks
Interconnecting Unstructured P2P File Sharing Networks Jaime Lloret Department of Communications, Polytechnic University of Valencia Camino de Vera s/n 46020 Valencia (Spain) Phone: +34 609549043 Fax:
More informationSSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
More informationIntroduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationarchitecture: what the pieces are and how they fit together names and addresses: what's your name and number?
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More informationCSCI-1680 CDN & P2P Chen Avin
CSCI-1680 CDN & P2P Chen Avin Based partly on lecture notes by Scott Shenker and John Jannotti androdrigo Fonseca And Computer Networking: A Top Down Approach - 6th edition Last time DNS & DHT Today: P2P
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More information1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
More informationSingle Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationPeer-to-Peer Networks Organization and Introduction 1st Week
Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/
More informationUsing OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
More information12. Firewalls Content
Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationNQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
More informationA methodology for workload characterization of file-sharing peer-to-peer networks
A methodology for workload characterization of file-sharing peer-to-peer networks Diêgo Nogueira, Leonardo Rocha, Juliano Santos, Paulo Araújo, Virgílio Almeida, Wagner Meira Jr. Department of Computer
More informationPeer to peer networking: Main aspects and conclusions from the view of Internet service providers
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:
More informationDynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
More informationFirst Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationA distributed system is defined as
A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency
More informationAn Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems
More informationNETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
More informationFile sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion
More information2015 Internet Traffic Analysis
2015 Internet Traffic nalysis Computer Networks Sandvine s Global Internet Phenomena Report: https://www.sandvine.com/trends/global-internet-phenomena/ Lecture 8: Content Delivery Infrastructure: Peer-to-Peer
More informationTORA : Temporally Ordered Routing Algorithm
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control
More informationPeer to peer networks: sharing between peers. Trond Aspelund
Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server
More informationLab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
More informationDG Forwarding Algorithm
DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router
More informationOutline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
More informationInternet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More information20. Switched Local Area Networks
20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationUsing Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
More informationSystem Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationChakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationIP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
More informationDecentralized supplementary services for Voice-over-IP telephony
Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.
More informationThe Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public
The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationInterconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationProfessor Yashar Ganjali Department of Computer Science University of Toronto. yganjali@cs.toronto.edu http://www.cs.toronto.
Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Announcements Programming assignment 2 Extended Deadline: Fri.
More informationCS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 Important: No cheating will be tolerated. No extension. CS 5480 total points = 32 CS 6480 total
More informationArchitectures and protocols in Peer-to-Peer networks
Architectures and protocols in Peer-to-Peer networks Ing. Michele Amoretti [amoretti@ce.unipr.it] II INFN SECURITY WORKSHOP Parma 24-25 February 2004 Contents - Definition of Peer-to-Peer network - P2P
More informationSANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationExercise 4 MPLS router configuration
Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.
More informationFirst Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationN6Lookup( title ) Client
CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding
More informationSimple Solution for a Location Service. Naming vs. Locating Entities. Forwarding Pointers (2) Forwarding Pointers (1)
Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address
More informationPSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries
PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries Jyoti Ahuja, Jun-Hong Cui, Shigang Chen, Li Lao jyoti@engr.uconn.edu, jcui@cse.uconn.edu, sgchen@cise.ufl.edu, llao@cs.ucla.edu
More informationInternet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
More informationClient/server and peer-to-peer models: basic concepts
Client/server and peer-to-peer models: basic concepts Dmitri Moltchanov Department of Communications Engineering Tampere University of Technology moltchan@cs.tut.fi September 04, 2013 Slides provided by
More informationNetworks and the Internet A Primer for Prosecutors and Investigators
Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()
More information