Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
|
|
|
- Kory Randall
- 10 years ago
- Views:
Transcription
1 Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes University of Manitoba Winnipeg, Manitoba Canada April 9, 2003
2 Introduction Although traditional network file systems like NFS provide a reliable way for users on a LAN to pool and share data, Internet-wide file sharing is still in its infancy. Software developers and researchers are struggling to find new ways to reliably, efficiently and securely share data across wide area networks that are plagued by high latency, bottlenecks, and unreliable or malicious nodes. This paper will focus on decentralized file sharing networks that allow free Internet-wide participation with generic content. A decentralized network has no central authority, which means that it can operate with freely running nodes alone (peer-to-peer, or P2P). Much of the current research into file sharing focuses on such systems, after the repeated failure of commercially-oriented networks such as Napster and Morpheus demonstrated that centralized and purely multimedia-based systems were unsuitable for long-term use by the general Internet public. Building a useful decentralized file sharing network is no small feat, but an effective system will be a remarkable accomplishment for the modern Internet. A robust, massive content distribution network will have a multitude of uses. The huge amount of accessible data (already into hundreds of terabytes on existing networks) and enormous transfer capacity at little or no cost to individual participants demonstrates the value of such a system, which may soon become a core Internet technology akin to the World Wide Web. Such large, anonymous networks seem quite natural for the Internet, as they demonstrate the epitome of pooling resources for the mutual benefit of all users. The first major project to delve into decentralized file sharing was Gnutella, developed by the Nullsoft team (also developers of the Winamp media player). After being posted in 2000, the software was quickly removed from the web site by Nullsoft's owners, America Online Inc., and the plans to release the specification of the protocol were abandoned. Nevertheless, other developers were able to reverse engineer the protocol and publicly released the specification. The publication of a well defined protocol specification (currently Gnutella v0.6) proved to be extremely useful, as different developers were able to contribute their own Gnutella-compliant software that could inter-operate. Another prominent decentralized file sharing system is Freenet, an open source implementation of a system described by Ian Clarke in Freenet differs from Gnutella in that its primary purpose is to create an uncensorable and secure global information storage system. The Freenet architecture is designed with special consideration for anonymity and fault-tolerance. This paper will investigate the architecture and protocol details of the Gnutella and Freenet systems. Real-world considerations and practical extensions such as firewall compatibility are also examined.
3 Gnutella 0.6 architecture Gnutella is a decentralized peer-to-peer system, consisting of hosts connected to one another over TCP/IP (default TCP port: 6346) and running software that implements the Gnutella protocol. This connection of individual hosts (or nodes) forms a network of computers exchanging Gnutella traffic, consisting of: queries, replies to queries, and other control messages used to discover nodes. This network allows the participating hosts to share arbitrary resources. For example, resources may be mappings to other resources, meta-information, or other kinds of pointers. Current implementations focus almost exclusively on data files, meaning any given host can offer local files for others to download, and can also download files that others are sharing on their computers. Each node is controlled by a user running the application software, who participates in the network by: Explicitly specifying a list of local files to share across the network Searching for files existing somewhere on the network Downloading files from other nodes A node that wishes to participate in the network must join the Gnutella network by connecting to any existing node. Currently, mechanisms known as host caches allow new nodes to easily participate in the network by connecting to a random node's IP address provided via DNS or script running on a web site. The new node opens a TCP/IP connection to the existing node and performs a handshake (note that this is at the Application layer; this is all over TCP). Part of the handshake includes an exchange of client and server capabilities, since different clients may choose to implement different features. The handshake is modeled after HTTP and familiar features such as the User-Agent header and response codes exist. If the server decides to refuse a new client (e.g., with the 503 Busy response), it is encouraged to provide an X-Try: header that recommends other IP/port addresses to try connecting to. A node typically connects to multiple existing Gnutella nodes to be able to reach more total Gnutella nodes. Once a node has connected to the network, it communicates with its neighboring nodes by sending and receiving Gnutella protocol messages and accepts incoming connections from new nodes that wish to join the network (it listens for connections on the appropriate TCP port). The main network messages are summarized in the table below.
4 Type Ping Pong Push Query Query Hit Description A request for information about another node(s) A reply carrying information about a node (e.g., number of files shared) A mechanism that allows a firewalled node to share data A request for a resource (e.g., searching for a file) A response identifying an available resource (e.g., a matching file) Table 1: Gnutella protocol messages ('Bye' excluded) Gnutella is a broadcast-type network, in which Pings and Queries are duplicated and relayed to multiple other nodes. To reduce network resource consumption, nodes cache Pongs and supply them as responses to Pings when they can. Pongs and Query Hits are routed by each node back along the path needed to reach the destination. In this respect, requests are very inefficient (due to the broadcast or flood nature) but replies are directed back to unique nodes rather efficiently. The Ultrapeer is an important concept that was not specified in the original Gnutella protocol, but which has now become a prominent feature of the Gnutella network. The Ultrapeer scheme improves network efficiency and scalability by categorizing nodes into regular clients and super nodes. A super node is a reliably connected host with plenty of network bandwidth that can act as a proxy for a large number of connecting clients. The super node removes the burden of extensive network message routing from the client, which may be a low bandwidth modem user. In such a case, the modem user (a leaf node) uses the well connected super node as an entry point into the network. When used in such a hierarchal fashion, the Ultrapeer concept lets the Gnutella network scale quite well since it vastly reduces the number of nodes actually involved in message routing. With this scheme, the Gnutella network mimics the Internet itself: low bandwidth nodes are connected to larger routers (the super nodes) that transmit the majority of the data over high bandwidth backbones. Figure 1: Actual Gnutella node map. Super nodes (solid) act as proxy for many leaf nodes (hollow, some not shown)
5 Freenet architecture Freenet has a similar network topology to Gnutella, except that its primary purpose is to create a secure global information storage system. Key here is the term storage system. Freenet nodes not only route messages around the network, but also store various files that don't belong to themselves. In this way, the Freenet creates a very large, distributed file storage system that has plenty of redundancy. The network is quite fault-tolerant, since many nodes store the same data. The high level architecture of the Freenet resembles that of Gnutella. Individual nodes are connected together by TCP/IP connections, and a new node connecting to the network needs to know about existing node(s) in order to successfully connect. Because there is no central authority, clients must find the first node on their own using a host cache or knowledge from a friend. The user who controls the Freenet software can interact with the network by: Explicitly specifying disk storage space that will be used to store some unknown network data Sending an insert message to add a new file to the network (starts distributed storage) Sending a request message with a key to retrieve a specific file from the network This is quite different from Gnutella, since a user can not actually access any of the encrypted data stored locally. Nor can they request content from specific nodes; all they can do is send a request into the network and wait for some node to return the desired data. Furthermore, users can not search the network for arbitrary files. They must already know the key describing the desired file (perhaps supplied by a friend). The Freenet architecture may seem quite strange, but its purpose is to create a secure network. Each node only knows about its immediate neighbors ( worms eye view ), so it is impossible for a node to determine where on the greater network the desired data is actually stored. In this respect, the network is very resistant to tampering and censorship. Freenet extensively uses one-way secure hashes such as SHA1, meaning that a unique identifying hash (fixed size) can be generated for any file, but given only the hash it is computationally infeasible to determine what data it represents. Nodes route and store these hashes, so they are not aware of the actual data contents the hashes represent. Furthermore, data stored on each node is encrypted with a key that is not available to the node. Thus, each node is completely ignorant of the nature of the content they are storing for the network. This is an essential feature of the secure system.
6 Searching Gnutella Users on the Gnutella network can search for content by sending arbitrary queries into the system. The node that wishes to begin the search sends a Query message to all nodes connected directly to it. Each of these nodes will in turn replicate and send the Query message to its own neighbors, except the node that originated the query. This process continues, flooding (or broadcasting) the query to every node within some radius. Because queries occupy so much of the Gnutella network bandwidth, the specification restricts the maximum size of a Query message to 256 bytes. Additional measures are in place to make sure that the queries do not uselessly and endlessly traverse the network. Gnutella messages have associated TTL (Time To Live) values, which are decremented at each hop (much like in IP networks). Nodes silently drop the queries once the TTL field reaches 0. Nodes are also responsible for dropping queries that they see twice. Queries include a minimum speed field, which directs nodes to reply to the query only if they can satisfy the minimum transfer speed for file transfers. The Query also consists of a search criteria field and extensions block, allowing clients to search for files based on a number of criteria, sometimes client-specific. The generic query is based on a series of keywords, meant to locate files that match all keywords (e.g., slackware, iso matches slackware-9.0.iso ). Additionally, a special type of query exists which requests a list of all files served by a node. A node replies with a Query Hit message when it has content that can satisfy the request. Most importantly, the Query Hit contains an IP address and port number where this specific node can be reached via TCP connection for the actual file transfer. These Query Hit messages are only sent along the same path that carried the incoming Query message. Searching Freenet As mentioned earlier, Freenet differs from Gnutella in that a node can not search for arbitrary files. A node that wishes to find content must already know what file it wants (via a SHA1 generated key that uniquely identifies that file). To retrieve a file, the user sends a request message into the Freenet that contains the globally unique identifier (GUID) key and waits for the data to arrive. Freenet avoids the wasteful broadcast-style search method that Gnutella uses by relying instead on a steepest-ascent hill-climbing search. Each node forwards queries to the neighboring node it thinks is closest to the target. This type of decision making is achieved via a routing table maintained
7 (privately) by each node. This table lists the addresses of other nodes and the GUID keys they may be storing. When a node sees a reply to a GUID key, it records the nodal direction the reply came from. Data storage locations are not absolute; the network search is interested in the direction to go in order to find data. Nodes that pass replies to requests may also store the data locally, themselves becoming future sources for that data. Request failed messages may be passed back to the sender if dead-ends are encountered. Given such signals, nodes that are routing requests will try their next best guesses for directions in which to search. Throughout this process, each node updates its routing table to record the next node to go to when trying to find a certain key. In this respect the Freenet is quite intelligent compared to Gnutella, since a request homes in closer with each hop. And since nodes remember past search results, subsequent queries for similar keys will be directed along paths that are more likely to quickly find the key. The Freenet learns how to efficiently locate files through this training process. Gnutella file transfer Once a node receives a Query Hit message that satisfies its request, it knows where to find the file it wants. An important point about Gnutella is that files are downloaded out-of-network: the two hosts involved in the transfer connect over TCP/IP and transfer the data directly, instead of wasting the Gnutella network capacity with bytes from files. The file download protocol is HTTP/1.0 or HTTP/1.1, the standard protocol for downloading files from web servers. The details of HTTP are beyond the scope of this paper, and can be found in RFCs 1945 and 2616 for versions 1.0 and 1.1, respectively. The node wanting to download a file makes a TCP/IP connection to the serving host at the IP address and port number specified, then makes a standard HTTP request. This scheme is modified slightly if the serving host is firewalled. Freenet file transfer While Gnutella saves network bandwidth by transferring files out-of-network, the Freenet does transfer the files entirely within the network. This is primarily for security reasons, since the Freenet aims to protect the actual sources of the data from being discovered. Each node only knows the Freenet as far as its neighboring nodes. So the actual files could be coming directly from one of the node's neighbors, or they could be coming from X hops away from its neighbors. There is no way to know for certain.
8 Large files on the Freenet can be split into multiple pieces. Each file piece has an associated content-hash key (CHK) that can be used to verify integrity of the file data. After transferring a file, or a piece of the file, the receiving node hashes the contents of the file with SHA1 and ensures that the result matches the original CHK. The original CHK is known for certain because this is the actual key used to request the file in the first place. Thus after performing a download and verifying that the file hashes match, a user can be absolutely certain that (according to all modern cryptographic knowledge) the received file is an unaltered copy of the one requested. Considerations and practical extensions This section addresses real-world considerations and practical extensions that are used by just about every modern peer-to-peer file sharing program. One of the remaining challenges for P2P software is ensuring that different clients use the extensions in a compatible way. Firewall-friendliness is a difficult problem to solve, because Internet users who are behind firewalls can not accept incoming TCP connections from the outside world. They can certainly join P2P networks by connecting to other hosts, and they can exchange network messages over the established TCP connections. However, they can not themselves allow other Internet hosts to connect to them in order to join the network, which challenges the growth of P2P networks in the long term. File transfers can be a problem if two hosts have to contact each other directly. If the host serving the file is behind a firewall, other nodes can not connect to it in order to download the file. A partial solution offered by Gnutella is the Push message. The node that wants to download data from a firewalled host sends a push message through the Gnutella network to that host. The firewalled host then receives the message, and originates a TCP/IP connection back to the requesting node. Provided the node wanting the file is itself not behind a firewall, the file transfer can then proceed. File Hashing is a solution that can ensure perfect file transfers. Known hashes (e.g., MD5 or SHA1) can be advertised for files before transfer. The received file is hashed after transfer and compared to the known hash; if the values agree, the file is virtually guaranteed to be error-free. Transfer recovery and multi-source downloads go hand in hand to offer more flexible downloads. If the transfer protocol includes a mechanism to reference offsets within files (as HTTP/1.1 does), then a client can request a missing part of a file to resume a download. A client can also simultaneously request distinct parts of a file from several serving hosts, resulting in a particularly high data transfer rate. This is sometimes referred to as swarming.
9 References Cable News Network. (2000). Open source Napster-like product disappears after release. Available on the World Wide Web at Clarke, I., Hong, T. W., and Sandberg, O. (2002). Protecting Free Expression Online with Freenet. (IEEE) Computer, Jan/Feb 2002: pp Freenet Project Inc. (2003). The Free Network Project. Available on the World Wide Web at Gnutella Developer Forum. (2003). The Gnutella Developer Forum (GDF). Wide Web at Available on the World Klingberg, T. and Manfredi, R. (2002). Gnutella 0.6. Retrieved from the World Wide Web at
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
SANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
CS 360 Internet Programming
Peer-to-Peer Networking File Sharing, and Computer Science Brigham Young University 1 Peer-to-Peer File Sharing with Ultrapeers Overview Peer-to-Peer File Sharing with Ultrapeers peer-to-peer peers exchange
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
Interoperability of Peer-To-Peer File Sharing Protocols
Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
2015 Internet Traffic Analysis
2015 Internet Traffic nalysis Computer Networks Sandvine s Global Internet Phenomena Report: https://www.sandvine.com/trends/global-internet-phenomena/ Lecture 8: Content Delivery Infrastructure: Peer-to-Peer
Improving Gnutella Protocol: Protocol Analysis And Research Proposals
Improving Gnutella Protocol: Protocol Analysis And Research Proposals Igor Ivkovic Software Architecture Group (SWAG) Department of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1 Canada
ICP. Cache Hierarchies. Squid. Squid Cache ICP Use. Squid. Squid
Caching & CDN s 15-44: Computer Networking L-21: Caching and CDNs HTTP APIs Assigned reading [FCAB9] Summary Cache: A Scalable Wide- Area Cache Sharing Protocol [Cla00] Freenet: A Distributed Anonymous
HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
HollyShare: Peer-to-Peer File Sharing Application
HollyShare: Peer-to-Peer File Sharing Application ICS 243A Class Project Songmei Han Bijit Hore Ilya Issenin Sean McCarthy Shannon Tauro HollyShare Project: Final Report 1 INTRODUCTION...3 SURVEY...5 Architecture
Peer-to-Peer File Sharing
The Effects of File Sharing on a Service Provider's Network An Industry White Paper Copyright July 2002, Sandvine Incorporated www.sandvine.com 408 Albert Street Waterloo, Ontario Canada N2L 3V3 Executive
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.
Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol
Connecting Computers Networks Computers use networks to communicate like people use telephones or the postal service Requires either some sort of cable point-to-point links connect exactly 2 computers
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany [email protected] Abstract. Network infrastructures are nowadays
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Attacks Against Peer-to-peer Networks and Countermeasures
Attacks Against Peer-to-peer Networks and Countermeasures Lin Wang Helsinki University of Technology [email protected] Abstract Peer-to-peer (P2P) networks have many distinct aspects that are different from
Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004
-to-peer filetransfer protocols and IPv6 János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004 Motivation IPv6 traffic is
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
How To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
The Gnutella Protocol Specification v0.4
The Gnutella Protocol Specification v0.4 Clip2 Distributed Search Services http://dss.clip2.com [email protected] Gnutella (pronounced "newtella") is a protocol for distributed search. Although the
File sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: [email protected] Abstract: File sharing systems cause a huge portion
The Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
A Measurement Study of Peer-to-Peer File Sharing Systems
CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University
A Survey of Peer-to-Peer File Sharing Technologies
Athens University of Economics and Business The ebusiness Centre (www.eltrun.gr) A Survey of Peer-to-Peer File Sharing Technologies White Paper Page 1 of 1 A Survey of Peer-to-Peer File Sharing Technologies
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University
CITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
On the Penetration of Business Networks by P2P File Sharing
On the Penetration of Business Networks by P2P File Sharing Kevin Lee School of Computer Science, University of Manchester, Manchester, UK. +44 () 161 2756132 [email protected] Danny Hughes Computing,
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:
The Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
Counteracting free riding in Peer-to-Peer networks q
Available online at www.sciencedirect.com Computer Networks 52 (2008) 675 694 www.elsevier.com/locate/comnet Counteracting free riding in Peer-to-Peer networks q Murat Karakaya *, _ Ibrahim Körpeoğlu,
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
Scalable Internet Services and Load Balancing
Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
Communications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
Acknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts:
Acknowledgements Peer to Peer File Storage Systems CS 699 Some of the followings slides are borrowed from a talk by Robert Morris (MIT) 1 2 P2P File Systems Target Uses File Sharing is one of the most
Peer-to-Peer Networks Organization and Introduction 1st Week
Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/
The ABCs of Spanning Tree Protocol
The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,
Simple Solution for a Location Service. Naming vs. Locating Entities. Forwarding Pointers (2) Forwarding Pointers (1)
Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems*
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems* Alexander Klemm a Christoph Lindemann a Mary K. Vernon b Oliver P. Waldhorst a ABSTRACT This paper characterizes the query behavior
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
First Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
The necessity of multicast for IPTV streaming
The necessity of multicast for IPTV streaming ARIANIT MARAJ, ADRIAN SHEHU Telecommunication Department Faculty of Information Technology, Polytechnic University of Tirana Tirana, Republic of Albania [email protected],
Skype network has three types of machines, all running the same software and treated equally:
What is Skype? Why is Skype so successful? Everybody knows! Skype is a P2P (peer-to-peer) Voice-Over-IP (VoIP) client founded by Niklas Zennström and Janus Friis also founders of the file sharing application
Peer to Peer and SPAM in the Internet
Networking Laboratory Department of Electrical and Communications Engineering Helsinki University of Technology Peer to Peer and SPAM in the Internet Report based a Licentiate Seminar on Networking Technology
Scalable Linux Clusters with LVS
Scalable Linux Clusters with LVS Considerations and Implementation, Part I Eric Searcy Tag1 Consulting, Inc. [email protected] April 2008 Abstract Whether you are perusing mailing lists or reading
Peer to peer networks: sharing between peers. Trond Aspelund
Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses
Lecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
Best Practices for Controlling Skype within the Enterprise. Whitepaper
Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Client/server and peer-to-peer models: basic concepts
Client/server and peer-to-peer models: basic concepts Dmitri Moltchanov Department of Communications Engineering Tampere University of Technology [email protected] September 04, 2013 Slides provided by
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype
Peer to Peer Networks Common P2P Examples Napster Morpheus Gnutella Freenet BitTorrent Skype 1 2 Uses of P2P Client-Server Architecture File sharing Instant messaging Voice communication Collaboration
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Chakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3
WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Exhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
