P2P Characteristics and Applications

Size: px
Start display at page:

Download "P2P Characteristics and Applications"

Transcription

1 P2P Characteristics and Applications Lecture for the Project Group A Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi graffi@mail.upb.de Fachgruppe Theorie verteilter Systeme Fakultät für Elektrotechnik, Informatik und Mathematik Universität Paderborn Fürstenallee 11, D Paderborn, Deutschland Tel , Fax UPB SS2011 PG-Framework Lecture-02 P2P-Characteristics-Applications.ppt This slide set is based on the lecture "Communication Networks 2" of Prof. Dr.-Ing. Ralf Steinmetz at TU Darmstadt 20. April 2011

2 Some relevant books Monitoring and Management of Peer-to-Peer Systems Kalman Graffi Handbook of P2P Networking Xuemen Shen, Heather Yu, John Buford, Mursalin Akon Peer-to-Peer Systems and Applications Ralf Steinmetz, Klaus Wehrle (Editors) /content/g6h805426g7t H( m y data ) = 3107? berkeley.edu planet-lab.org peer-to-peer.info Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 2

3 Overview 1 Challenges in Data Management & Retrieval 1.1 Approach I: Central Index 1.2 Approach II: Search 1.3 Search Mechanisms: Flooding 1.4 Search Mechanisms: Expanding Ring 1.5 Search Mechanisms: Rendezvous Point 1.6 Approach III: Routing (Distributed Indexing) 2 Peer-to-Peer Networking 2.1 Definition of P2P 2.2 Nine Characteristics of P2P Systems 2.3 Major Query Types 3 Evolution of Internet Computing Paradigms 4 Success of P2P Networking Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 3

4 1 Challenges in Data Management & Retrieval? I have item D. Where to place D? D? Data item D distributed system I want item D. Where can I find D?? berkeley.edu planet-lab.org peer-to-peer.info Essential challenges Location of a data items at distributed systems Where shall the item be stored by the provider? How does a requester find the actual location of an item? Scalability to keep the complexity for communication and storage scalable Robustness and resilience in case of faults and frequent changes The content of this slide has been adapted from Peer-to-Peer Systems and Applications, ed. By Steinmetz, Wehrle Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 4

5 Strategies for Data Retrieval? I have item D. Where to place D? D? Data item D distributed system I want item D. Where can I find D?? peer-to-peer.info berkeley.edu planet-lab.org Strategies to store and retrieve data items in distributed systems Central server (central indexing) Flooding search (local indexing) Routing (distributed indexing) Index Information where data items lie Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 5

6 1.1 Approach I: Central Index A stores D Server S 2 Where is D? Node B 3 A stores D 4 Transmission: D Node B Node A 1 A stores D Simple strategy: Central server stores information about locations 1 Node A (provider) tells server that it stores item D 2 Node B (requester) asks server S for location of D 3 Server S tells B that node A stores item D 4 Node B requests item D from node A Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 6

7 Approach I: Central Server Advantages Search complexity of O(1) just ask the server Complex and fuzzy queries are possible Simple and fast But overall, Best principle for small and simple applications Challenges No intrinsic scalability O(N) network and system load of server Single point of failure or attack Non-linear increasing implementation and maintenance cost in particular for achieving high availability and scalability Central server not suitable for systems with massive numbers of users Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 7

8 1.2 Approach II: Search 1 B searches D 2 3 Node B I have D? & Transmission: D Node B 2 Node A 4 I store D Distributed Indexing Approach No information about location of data at intermediate systems Necessity for broad search 1 Node B (requester) asks neighboring nodes for item D 2-4 Nodes forward request to further nodes (breadth-first search / flooding) 5 Node A (provider of item D) sends D to requesting node B The content of this slide has been adapted from Peer-to-Peer Systems and Applications, ed. By Steinmetz, Wehrle Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 8

9 Approach II: Search Fully Distributed Approach Central systems: vulnerable, do not scale Unstructured P2P overlays No global information available about location of a item Content only stored at respective node providing it Retrieval of data No routing information for content Necessity to ask sufficiently many nodes Search mechanisms in P2P overlays Broadcast Expanding Ring Random Walk Rendezvous Idea Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 9

10 1.3 Search Mechanisms: Flooding Query Query Query Query Query Query Breadth-first search (BFS) Use system-wide maximum TTL to control communication overhead Send a message to all neighbors except the one who delivered the incoming message Store message identifiers of routed messages or use non-oblivious ( nicht zu vergessende ) messages to avoid retransmission cycles Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 10

11 Example increasing hop count source peer destination peer Overhead Large, here 43 messages sent Length of the path: 5 hops Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 11

12 1.4 Search Mechanisms: Expanding Ring Mechanism Successive floods with increasing TTL Start with small TTL If no success increase TTL.. etc. Properties Improved performance if objects follow Zipf law popularity distribution and are located accordingly Message overhead is high Zipf-law example Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 12

13 Search Mechanisms: Random Walk Random walks Forward the query to a randomly selected neighbor Message overhead is reduced significantly Increased latency Multiple random walks (k-query messages) reduces latency generates more load Termination mechanism TTL-based Periodically checking requester before next submission Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 13

14 Example increasing hop count source peer destination peer Random walk with n=2 (each incoming message is sent twice out) Overhead Smaller, here e.g. 30 messages sent until destination is reached Length of the path found e.g. 7 hops Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 14

15 1.5 Search Mechanisms: Rendezvous Point Storing node green on right side propagates content on all nodes within a predefined range Requesting node violet on left side propagates his query to all neighbors within predefined range A query hit can be found at the Rendezvous Point (black) Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 15

16 1.6 Approach III: Routing (Distributed Indexing) B searches D 1 Calculates ID ID = Hash(D) = 45 Node B [00,10[ Fully Decentralized Approach Construction of an Overlay Each node responsible for certain range of the ID space ID are calculated using hash functions (e.g. SHA1, MD5) Routing is done as follows 1 Node B (requester) calculates ID of D 2 [10,15[ Node A [40,47[ 2,3 Node B sends request to neighbor with responsibility interval closest to ID 4 [27,33[ [15,22[ [22,27[ [33,40[ I am responsible for ID 45 4 Nodes A is responsible for ID 45 an sends requested item D to node B 3 [53,00[ [47,53[ The content of this slide has been adapted from Peer-to-Peer Systems and Applications, ed. By Steinmetz, Wehrle Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 16

17 Approach III: Routing (Distributed Indexing) Advantages No single point of failure Scalable Efficient way for retrieving content Challenges Maintenance of ID Space necessary Reliable routing Load balancing Replication of data Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 17

18 Requirements for Overlay Networks Fault-tolerance Resilience of the connectivity when failures are encountered Due to faulty behavior Heterogeneity Supporting variations in physical capabilities and peer behavior Fairness Workload equal on all peers Workload proportional to peer capability or to peer demands Security Ability of a system to manage, protect and distribute sensitive information Privacy Degree to which a system or component supports anonymous transactions Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 18

19 2 Peer-to-Peer Networking A huge number of nodes participating in the network Have resources to share Have demands towards the use of resources which may not be satisfied easily and by single nodes??? Main question Which of the nodes provides the resources Which instance of a resource shall be provided (exactly)? Approach: Peer-to-Peer (P2P) P2P offers mechanisms to find / look up what is wanted P2P builds overlay network(s) Mode of operation After locating the node providing the desired service: Interact directly from peer to peer Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 19

20 2.1 Definition of P2P P2P (Peer-to-Peer): A distributed system and A communications paradigm Notion of Distributed Systems (very general) it consists of multiple autonomous computing devices that communicate through a computer network computing devices interact with each other in order to achieve common goals Focus of the lecture: Systems with loosely coupled (no fixed relationship) autonomous devices Devices have their own semi-independent agenda Comply to some general rules but local policies define their behavior (At least) limited coordination and cooperation needed Strategies to find peer providing desired content Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 20

21 2.2 Nine Characteristics of P2P Systems Overlay Network Service Delivery Overlay Connection IP Network (Underlay) Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 21

22 Detailed Characteristics Service Delivery Overlay Network Overlay Connection Resources (location, sharing) IP Network (Underlay) 1. relevant resources located at nodes (peers) at the edges of a network 2. peers share their resources (voluntarily, not forced by contracts) 3. resource locations widely distributed most often largely replicated Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 22

23 Detailed Characteristics Service Delivery Overlay Network Overlay Connection Networking 4. variable connectivity is the norm support of dial-up users with variable IP addresses operating outside the domain name system (DNS) often operating behind firewalls or NAT gateways peers are often active only for a limited time period IP Network (Underlay) Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 23

24 Detailed Characteristics Service Delivery Overlay Network Overlay Connection Interaction of Peers 5. combined client and server functionality SERVer + client = SERVENT minimal demands of the underlying infrastructure services provided by end systems IP Network (Underlay) 6. direct interaction (provision of services, e.g. file transfer) between peers (= peer to peer ) Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 24

25 Detailed Characteristics Service Delivery Overlay Network Overlay Connection Management 7. peers have significant autonomy and mostly similar rights IP Network (Underlay) 8. no central control or centralized usage/provisioning of a service 9. self-organizing system Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 25

26 Peer-to-Peer: 9 Properties 1. relevant resources located at nodes ( peers ) at the edges of a network 2. peers share their resources 3. resource locations widely distributed most often largely replicated 4. variable connectivity is the norm 5. combined Client and Server functionality 6. direct interaction (provision of services, e.g. file transfer) between peers (= peer to peer ) 7. peers have significant autonomy and mostly similar rights 8. no central control or centralized usage/provisioning of a service 9. self-organizing system Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 26

27 P2P Systems Unstructured vs. Structured Unstructured P2P Structured P2P Centralized P2P Pure P2P Hybrid P2P DHT-Based Hybrid P2P 1. All features of Peerto-Peer included 2. Central entity is necessary to provide the service 3. Central entity is some kind of index/group database Examples: Napster 1. All features of Peerto-Peer included 2. Any terminal entity can be removed without loss of functionality 3. no central entities Examples: Gnutella 0.4 Freenet 1. All features of Peerto-Peer included 2. Any terminal entity can be removed without loss of functionality 3. dynamic central entities Examples: Gnutella 0.6 Fasttrack edonkey 1. All features of Peer-to-Peer included 2. Any terminal entity can be removed without loss of functionality 3. No central entities 4. Connections in the overlay are fixed Examples: Chord CAN Kademlia 1. All features of Peerto-Peer included 2. Peers are organized in a hierarchical manner 3. Any terminal entity can be removed without loss of functionality Examples: RecNet Globase.KOM from R.Schollmeier and J.Eberspächer, TU München Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 27

28 Peer-to-Peer Architectures centralized decentralized Content distribution centralized Client-Server hybrid Peer-to-Peer with Centralized Indexing decentralized Pure Peer-to-Peer with Decentralized Indexing Content indexing Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 28

29 Structured and Unstructured P2P Networks Unstructured P2P Networks objects have no special identifier location of desired object a priori not known each peer is only responsible objects it submitted Structured P2P Networks peers and objects have identifiers objects are stored on peers according to their ID: responsiblefor(objid) = PeerID distributed indexing points to object location Search: Find all (or some) objects in the P2P network which fit to given criteria Lookup / Addressing: Retrieve the object which is identified with a given identifier Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 29

30 2.3 Major Query Types Lookup Key-Value lookup as known from hash tables Given: Key Return: Single value Full Text Search Given: sequence of word (search term) Return: all entries / articles matching the search terms Range Query Given: Range [ X, Y] Return: all stored entries within range Location based search Matching Query Given: logical condition (A && B C) Return: all entries fulfilling logical condition Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 30

31 Look up vs. Searching Distributed Hash Tables (DHT) look up objects by addressing them with their unique name (cf. URLs in web) Traditional P2P file sharing networks find objects by searching with keywords that match object s description (cf. Google) Pros Each object uniquely identifiable Object location can be made efficient Cons Need to know unique name Need to maintain structure required by addresses Pros No need to know unique names Cons Hard to make efficient Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 31

32 Metrics, Searching and Addressing Probability of success structured protocols guarantee results, if target exists assuming absence of malicious peers unstructured protocols require exhaustive search Protocol metrics Average number of messages per node Visited nodes Peak number of messages Congestion Quality of results Completeness (are all results returned) Correctness (are all returned entries valid) Operation latency (time needed to solve the query) Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 32

33 3 Evolution of Internet Computing Paradigms 1st generation (since the beginning of the Internet): permanent IP addresses, always connected static domain name system (DNS) mapping limited specialized applications, protocols: Telnet, FTP, Gopher,... World Wide Access 2nd generation (since 90s): WWW & graphical browsers dynamic IP addresses / NAT / firewalls heterogeneous applications, asymmetric server based services protocol: HTTP,.. World Wide Web Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 33

34 Evolution of Internet Computing Paradigms (2) 3rd generation (since 2000): more collaboration and personalized applications powerful edge devices (peers), instant networking protocols/applications: Napster, Gnutella Emule/Edonkey/MLDonkey, Fasttrack (KaZaA), Freenet,.. Chord, 4th generation (since 2010) Cloud computing Centralized provision of all resources Users access only as clients Overlay Connection 5th generation (???) P2P cloud services? All resources provided by user devices? Service Delivery Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 34

35 Client / Server Model vs. P2P Technology Situation: 1 server, n * clients Issue:??? E.g. on which server is the information wanted? Solution: Look it up on another server (or google, which does this for you) Advantages: Reliable, well known behavior Drawbacks: Server need to provide (almost) all resources Client / Server model is not P2P: Communication only between clients and server, not between clients and clients Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 35

36 Client / Server Model vs. P2P Technology Client-Server Peer-to-Peer 1.Server is the central entity and only provider of service and content. Network managed by the Server 2.Server as the higher performance system 3.Clients as the lower performance system 1.Resources are shared between the peers 2.Resources can be accessed directly from other peers 3.Peer is provider and requestor (Servent concept) Example: WWW from R.Schollmeier and J.Eberspächer, TU München Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 36

37 GRID Computing vs. P2P Technology Similar idea, similar concept as in P2P High performance data processing centers needed for scientific applications but expensive to provide often do not offer enough performance Solution: GRID to interconnect the existing data processing centers to Virtual Organization and operate it as distributed processing center (the GRID) History Participation Typical Transfer Volume Typical Service Typical Problems P2P Sharing MP3 files & illegal content Voluntarily Small (MP3) to medium (video) File Sharing Hugh number of users cause scalability issues GRID Saving costs for data processing centers By contract Huge (often terabytes) Processing Sharing Transferring huge amounts of data Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 37

38 Cloud Computing vs. P2P Technology Cloud and P2P Access to a distributed pool of resources Resources: storage, bandwidth, computational power Cloud computing Resource providers: companies Controlled environment No malicious providers No (/minimal) churn Homogenous devices Selective centralized structures OK Accounting, monitoring Single access point Centralized updates P2P systems Resource providers: user devices Uncontrolled environment Churn, malicious providers Heterogeneous devices Uncertainty / unpredictability Distributed access points Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 38

39 Essential Aspects of Cloud Computing On-demand self-service resources (e.g., server time, network storage) are automatically provided to a customer when required Rapid elasticity underlying infrastructure is able to adapt to changing requirements (e.g., number of concurrent users) allows for dynamic up-/down-scaling Measured Service metering of resource and service consumption to provide elastic pricing and billing models e.g., pay-per-use Resource pooling resources are provided/assigned dynamically in a multi-tenant way Broad network access capabilities are available worldwide over standard network mechanisms What s in a Cloud? Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 39

40 P2P vs. Cloud Computing Cloud Service Models Software as a Service provides applications and services representing business functions and make use of Cloud platforms and infrastructures themselves e.g., Google Docs, Salesforce CRM Platform as a Service provides a platform for application and service development and hosting e.g., Google App Engine, Windows Azure (Platform) Infrastructure as a Service provides storage, computing and network capabilities e.g., Amazon S3, Amazon EC2, SQL Azure Software as a Service (SaaS) Platformas a Service (PaaS) Infrastructureas a Service (IaaS) Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 40

41 Others vs. P2P Technology Ad hoc Networks: No communication infrastructure available Nodes provide bandwidth for common goal to enable communications main issue: routing More Hop2Hop than Peer2Peer Web 2.0 Users interact with Website Users-to-user interaction over Website Friend-of-a-friend Federation of personal webservers Linking to trusted friends Distributed Systems: Transparent distribution Distributed System act as a local machine P2P is not transparent Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 41

42 Challenges for Quality of P2P Systems Distributed character Distributed solutions and overlays needed Undefined scale From tens to several millions Peer fluctuation (churn) Peers join / leave the system autonomously Peer heterogeneity Varying capacities and connectivity Static configurations are insufficient Requirements known when system is deployed Updates are difficult Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 42

43 4 Success of P2P Networking One of the newest buzzwords in networking is Peer-to-Peer (P2P) Is it only a hype? initially 40 million Napster users in 2 years integrated into commercial systems, e.g., Microsoft P2P SDK Advanced Networking Pack for Windows XP open source, e.g., JXTA (Sun) with Protocols & Services strong presence at international networking conferences Above logos copied from the respective web page Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 43

44 P2P Traffic P2P traffic is the major traffic source, since at least 2003 of overall Internet traffic more than ~50% is P2P traffic and P2P traffic in the Internet 60% 80% P2P file sharing traffic on backbones P2P generates most traffic in all regions Source: Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 44

45 Ipoque Internet Study 2008/ Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 45

46 Dominant P2P Applications 2003: Sandvine Study in Europe (France, Germany,..) predominant EDonkey/EMule in USA 2005: predominant KaZaA/Fastrack BitTorrent most successful file sharing P2P application Skype dominates in IP Telephony KaZaA more and more irrelevant edonkey largely replaced by emule using an extended but compatible protocol 2009: Wuala P2P-based storage service KaZaA and emule almost dead PPLive P2P-based Video Streaming Platform Mostly used in Asia BBC IPlayer Vuze Former Azureus P2P-based Video-on-demand platform >2012: Distributed Social Communities Cloudy like p2pcloud Social. like LifeSocial, PeerSon, Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 46

47 Enabling Effects File sharing: highly attractive and cheap content users share their content with other users attractive content copyrights are usually not respected (problem!) cheap content Publishing: exploding amount of data 2 x 1E+18 Bytes are produced per year 3 x 1E+12 Bytes are published per year only 1.3x1E+8 websites indexed by search engines like Google see Gong: JXTA: A Network Programming Environment, IEEE Computing 2001 Unused resources at the edges more processing power, memory, bandwidth, storage available 1 TB hard disk for letters? 100 Mbit/s for sending s? new compression mechanisms (mp3, mpeg), no problem for CPUs assume e.g. a Small-Medium Enterprise (SME) with 100 desktop computers: spare storage space: 100 x 1 TB = 100 TB spare processing power: 100 x 2 x 2 GHz x 5 ops/cycle = 2 trillion ops/sec Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 47

48 P2P in Business World New services at the edge of the network P2P overlay networks make it relatively easy to deploy new services Group collaboration superior for business processes grow organically, non-uniform and highly dynamic largely manual, ad-hoc, iterative and document-intensive work often distributed, not centralized no single person/organization understands the entire process from beginning to end Cost effectiveness reduces centralized management resources optimizes computing, storage and communication resources rapid deployment P2P applications/protocols tailored for user s needs Napster s success depended to a great amount on its ease of use Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 48

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Organizational Information Organisational matters Lecturer Jun.-Prof.

More information

Distributed Framework for Social Networks

Distributed Framework for Social Networks Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi graffi@mail.upb.de Tel. +49 5251 606730 Fachgebiet Multimedia Kommunikation Prof. Dr. Christian Scheideler Fakultät für Elektrotechnik,

More information

Online Social Networks and Network Layers

Online Social Networks and Network Layers Online Social Networks and Network Layers Lecture for the Project Group A Distributed Framework for Social Networks UPB SS2011 PG-Framework Lecture-01 Online-Social-Networks-Network-Layer.ppt Dr.-Ing.

More information

Healthy P2P Systems Overview

Healthy P2P Systems Overview Monitoring and Management of Peer-to-Peer Systems Project Group A Distributed Framework for Social Networks www.p2pframework.com UPB SS2011 PG-Framework Lecture-04 Monitoring-and-Management.ppt Dr.-Ing.

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

Peer-to-Peer Networks Organization and Introduction 1st Week

Peer-to-Peer Networks Organization and Introduction 1st Week Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/

More information

Client/server and peer-to-peer models: basic concepts

Client/server and peer-to-peer models: basic concepts Client/server and peer-to-peer models: basic concepts Dmitri Moltchanov Department of Communications Engineering Tampere University of Technology moltchan@cs.tut.fi September 04, 2013 Slides provided by

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

Project Group NODES - Offering Dynamics to Emerging Structures www.peerfact.org

Project Group NODES - Offering Dynamics to Emerging Structures www.peerfact.org PeerfactSim: A Simulation Framework for Peer-to-Peer Systems (and more) Project Group NODES - Offering Dynamics to Emerging Structures www.peerfact.org UPB SS2011 PG-Nodes Lecture-06 P2P-Simulations.ppt

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype

Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype Peer to Peer Networks Common P2P Examples Napster Morpheus Gnutella Freenet BitTorrent Skype 1 2 Uses of P2P Client-Server Architecture File sharing Instant messaging Voice communication Collaboration

More information

Evolution of Peer-to-Peer Systems

Evolution of Peer-to-Peer Systems EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor

More information

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

More information

CHAPTER 8 CLOUD COMPUTING

CHAPTER 8 CLOUD COMPUTING CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks Chapter 1: Introduction Jussi Kangasharju Chapter Outline Course outline and practical matters Peer-to-peer (P2P) overview Definition of P2P What is P2P and how it is different from

More information

Architectures and protocols in Peer-to-Peer networks

Architectures and protocols in Peer-to-Peer networks Architectures and protocols in Peer-to-Peer networks Ing. Michele Amoretti [amoretti@ce.unipr.it] II INFN SECURITY WORKSHOP Parma 24-25 February 2004 Contents - Definition of Peer-to-Peer network - P2P

More information

Chord - A Distributed Hash Table

Chord - A Distributed Hash Table Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing

More information

How To Analyse The Edonkey 2000 File Sharing Network

How To Analyse The Edonkey 2000 File Sharing Network The edonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universität Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock,

More information

Peer-to-Peer Systems: "A Shared Social Network"

Peer-to-Peer Systems: A Shared Social Network Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology hanguyen@cc.hut.fi Abstract In the last few years, the success of the Napster online music sharing program

More information

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004. Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support

More information

p2p: systems and applications Internet Avanzado, QoS, Multimedia 2006-2007 Carmen Guerrero carmen.guerrero@uc3m.es

p2p: systems and applications Internet Avanzado, QoS, Multimedia 2006-2007 Carmen Guerrero carmen.guerrero@uc3m.es p2p: systems and applications Internet Avanzado, QoS, Multimedia 2006-2007 Carmen Guerrero carmen.guerrero@uc3m.es Dpto. Ingeniería Telemática Index Introduction Taxonomy Classification of p2p overlay

More information

Unit 3 - Advanced Internet Architectures

Unit 3 - Advanced Internet Architectures Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma

More information

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Attacks Against Peer-to-peer Networks and Countermeasures

Attacks Against Peer-to-peer Networks and Countermeasures Attacks Against Peer-to-peer Networks and Countermeasures Lin Wang Helsinki University of Technology lwang@cc.hut.fi Abstract Peer-to-peer (P2P) networks have many distinct aspects that are different from

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

From Internet Data Centers to Data Centers in the Cloud

From Internet Data Centers to Data Centers in the Cloud From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

How To Create A P2P Network

How To Create A P2P Network Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised

More information

Data Management in P2P Systems: Challenges and Research Issues. Timos Sellis National Technical Univ. of Athens

Data Management in P2P Systems: Challenges and Research Issues. Timos Sellis National Technical Univ. of Athens Data Management in P2P Systems: Challenges and Research Issues Timos Sellis National Technical Univ. of Athens What is P2P? Client Server Architecture Peer-to-Peer Architecture Timos Sellis-NTUA Data Management

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Peer-to-Peer File Sharing

Peer-to-Peer File Sharing The Effects of File Sharing on a Service Provider's Network An Industry White Paper Copyright July 2002, Sandvine Incorporated www.sandvine.com 408 Albert Street Waterloo, Ontario Canada N2L 3V3 Executive

More information

N6Lookup( title ) Client

N6Lookup( title ) Client CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding

More information

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves

More information

8 Conclusion and Future Work

8 Conclusion and Future Work 8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the

More information

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Aleksander Bu lkowski 1, Edward Nawarecki 1, and Andrzej Duda 2 1 AGH University of Science and Technology, Dept. Of Computer Science,

More information

PEER-TO-PEER NETWORK

PEER-TO-PEER NETWORK PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Politehnica University of Timisoara. Distributed Mailing System PhD Report I

Politehnica University of Timisoara. Distributed Mailing System PhD Report I Politehnica University of Timisoara PhD Report I Patrik Emanuel Mezo Prof. Dr. Ing. Mircea Vladutiu PhD Student PhD Coordinator ABSTRACT This PhD Report describes the research activity carried on as part

More information

An Introduction to Cloud Computing Concepts

An Introduction to Cloud Computing Concepts Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC ahmed.gamal.eldin@itida.gov.eg

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Cloud Computing Today David Hirsch April 2013 Outline What is the Cloud? Types of Cloud Computing Why the interest in Cloud computing today? Business Uses for the Cloud Consumer Uses for the Cloud PCs

More information

LifeSocial A P2P-based Online Social Network

LifeSocial A P2P-based Online Social Network LifeSocial A P2P-based Online Social Network Project Group A Distributed Framework for Social Networks www.p2pframework.com UPB SS2011 PG-Framework Lecture-05 LifeSocial-a-P2P-based-OSN.ppt Dr.-Ing. Kalman

More information

CLOUD COMPUTING An Overview

CLOUD COMPUTING An Overview CLOUD COMPUTING An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this

More information

Cloud Computing: The Next Computing Paradigm

Cloud Computing: The Next Computing Paradigm Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com,

More information

Analytical Survey Model on Consumption of Cloud Service Models

Analytical Survey Model on Consumption of Cloud Service Models Analytical Survey Model on Consumption of Cloud Service Models Om Prakash Karada, Abhishek Pipliya, Parul Thakur & Neha Kamdar Malwa Institute of Technology, Indore E-mail : opkarada@gmail.com, aadeepipliya@gmail.com,

More information

Interoperability of Peer-To-Peer File Sharing Protocols

Interoperability of Peer-To-Peer File Sharing Protocols Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and

More information

Scalable Internet/Scalable Storage. Seif Haridi KTH/SICS

Scalable Internet/Scalable Storage. Seif Haridi KTH/SICS Scalable Internet/Scalable Storage Seif Haridi KTH/SICS Interdisk: The Big Idea 2 Interdisk: The Big Idea I: 3 Interdisk: The Big Idea I: Internet is global data communication 4 Interdisk: The Big Idea

More information

SANE: A Protection Architecture For Enterprise Networks

SANE: A Protection Architecture For Enterprise Networks Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

Amazon Web Services. 18.11.2015 Yu Xiao

Amazon Web Services. 18.11.2015 Yu Xiao Amazon Web Services 18.11.2015 Yu Xiao Agenda Introduction to Amazon Web Services(AWS) 7 Steps to Select the Right Architecture for Your Web Applications Private, Public or Hybrid Cloud? AWS Case Study

More information

High Performance Computing Cloud Computing. Dr. Rami YARED

High Performance Computing Cloud Computing. Dr. Rami YARED High Performance Computing Cloud Computing Dr. Rami YARED Outline High Performance Computing Parallel Computing Cloud Computing Definitions Advantages and drawbacks Cloud Computing vs Grid Computing Outline

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

5. Peer-to-peer (P2P) networks

5. Peer-to-peer (P2P) networks 5. Peer-to-peer (P2P) networks PA191: Advanced Computer Networking I. Eva Hladká Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Autumn 2015 Eva Hladká (FI MU) 5. P2P networks Autumn 2015

More information

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

The Challenges of Stopping Illegal Peer-to-Peer File Sharing The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:

More information

System Models for Distributed and Cloud Computing

System Models for Distributed and Cloud Computing System Models for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Classification of Distributed Computing Systems

More information

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33 CLOUD COMPUTING NEW TECHNOLOGIES 1 Gokul krishnan. 2 M, Pravin raj.k, 3 Ms. K.M. Poornima 1, 2 III MSC (software system), 3 Assistant professor M.C.A.,M.Phil. 1, 2, 3 Department of BCA&SS, 1, 2, 3 Sri

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

21/09/11. Introduction to Cloud Computing. First: do not be scared! Request for contributors. ToDO list. Revision history

21/09/11. Introduction to Cloud Computing. First: do not be scared! Request for contributors. ToDO list. Revision history Request for contributors Introduction to Cloud Computing https://portal.futuregrid.org/contrib/cloud-computing-class by various contributors (see last slide) Hi and thanks for your contribution! If you

More information

Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at

Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

Chapter 11 Cloud Application Development

Chapter 11 Cloud Application Development Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How

More information

Planning the Migration of Enterprise Applications to the Cloud

Planning the Migration of Enterprise Applications to the Cloud Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction

More information

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Cloud Computing and Amazon Web Services. CJUG March, 2009 Tom Malaher

Cloud Computing and Amazon Web Services. CJUG March, 2009 Tom Malaher Cloud Computing and Amazon Web Services CJUG March, 2009 Tom Malaher Agenda What is Cloud Computing? Amazon Web Services (AWS) Other Offerings Composing AWS Services Use Cases Ecosystem Reality Check Pros&Cons

More information

Public Cloud Offerings and Private Cloud Options. Week 2 Lecture 4. M. Ali Babar

Public Cloud Offerings and Private Cloud Options. Week 2 Lecture 4. M. Ali Babar Public Cloud Offerings and Private Cloud Options Week 2 Lecture 4 M. Ali Babar Lecture Outline Public and private clouds Some key public cloud providers (More details in the lab) Private clouds Main Aspects

More information

Auto-Scaling, Load Balancing and Monitoring As service in public cloud

Auto-Scaling, Load Balancing and Monitoring As service in public cloud IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 4, Ver. I (Jul-Aug. 2014), PP 39-46 Auto-Scaling, Load Balancing and Monitoring As service in public

More information

Network Applications

Network Applications Computer Networks Network Applications Based on Computer Networking, 3 rd Edition by Kurose and Ross Network applications Sample applications E-mail Web Instant messaging Remote login P2P file sharing

More information

Peer-to-Peer Computing

Peer-to-Peer Computing Quang Hieu Vu Mihai Lupu Beng Chin Ooi Peer-to-Peer Computing Principles and Applications Springer 1 Introduction 1 1.1 Peer-to-Peer Computing 1 1.2 Potential, Benefits, and Applications 3 1.3 Challenges

More information

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany tim@c-lab.de Abstract. Network infrastructures are nowadays

More information

CSCI-1680 CDN & P2P Chen Avin

CSCI-1680 CDN & P2P Chen Avin CSCI-1680 CDN & P2P Chen Avin Based partly on lecture notes by Scott Shenker and John Jannotti androdrigo Fonseca And Computer Networking: A Top Down Approach - 6th edition Last time DNS & DHT Today: P2P

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

How To Run A Cloud Computer System

How To Run A Cloud Computer System Cloud Technologies and GIS Nathalie Smith nsmith@esri.com Agenda What is Cloud Computing? How does it work? Cloud and GIS applications Esri Offerings Lots of hype Cloud computing remains the latest, most

More information

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer

More information

How To Use A Phone Over Ip (Phyto) For A Phone Call

How To Use A Phone Over Ip (Phyto) For A Phone Call SIP and VoIP Skype an example VoIP client 1 SIP / VoIP: what are these? Voice over IP (VoIP) Session Initiation Protocol (SIP) Control channel Known in telephone world as signaling channel Does call setup:

More information

Using Peer to Peer Dynamic Querying in Grid Information Services

Using Peer to Peer Dynamic Querying in Grid Information Services Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

TOWARDS AN EFFICIENT DISTRIBUTED CLOUD ARCHITECTURE PRAVEEN KHETHAVATH

TOWARDS AN EFFICIENT DISTRIBUTED CLOUD ARCHITECTURE PRAVEEN KHETHAVATH TOWARDS AN EFFICIENT DISTRIBUTED CLOUD ARCHITECTURE BY PRAVEEN KHETHAVATH Bachelor of Engineering in Electronics and Communication Engineering Osmania University Hyderabad, AP, INDIA 2006 Master of Science

More information

A distributed system is defined as

A distributed system is defined as A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency

More information

for my computation? Stefano Cozzini Which infrastructure Which infrastructure Democrito and SISSA/eLAB - Trieste

for my computation? Stefano Cozzini Which infrastructure Which infrastructure Democrito and SISSA/eLAB - Trieste Which infrastructure Which infrastructure for my computation? Stefano Cozzini Democrito and SISSA/eLAB - Trieste Agenda Introduction:! E-infrastructure and computing infrastructures! What is available

More information

Peer-to-peer (P2P) telephony and communications

Peer-to-peer (P2P) telephony and communications 02jennings/bryan-p36 4/21/06 9:42 AM Page 2 P2P For Communications: Beyond File Sharing Cullen Jennings and David A. Bryan Dr. Cullen Jennings is a Distinguished Engineer with Cisco Systems specializing

More information

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks

JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks Bernard Traversat tra@jxta.org JXTA Chief Architect Sun Microsystems 2005 JavaOne SM Conference Session 7208 Extended and

More information

Systems. P2P Principle. Definition of P2P. Grid scope

Systems. P2P Principle. Definition of P2P. Grid scope Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 What is Peer-to to-peer? Peer-to to-peer Systems What does the word peer mean? Merriam-Webster: one that is of equal standing with another : EQUAL;

More information

Emerging Technology for the Next Decade

Emerging Technology for the Next Decade Emerging Technology for the Next Decade Cloud Computing Keynote Presented by Charles Liang, President & CEO Super Micro Computer, Inc. What is Cloud Computing? Cloud computing is Internet-based computing,

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

More information

Cloud Infrastructure Planning. Chapter Six

Cloud Infrastructure Planning. Chapter Six Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services

More information

Methods & Tools Peer-to-Peer Jakob Jenkov

Methods & Tools Peer-to-Peer Jakob Jenkov Methods & Tools Peer-to-Peer Jakob Jenkov Peer-to-Peer (P2P) Definition(s) Potential Routing and Locating Proxy through firewalls and NAT Searching Security Pure P2P There is no central server or router.

More information