Peer-to-Peer Data Management
|
|
|
- Patrick Riley
- 10 years ago
- Views:
Transcription
1 Peer-to-Peer Data Management Wolf-Tilo Balke Sascha Tönnies Institut für Informationssysteme Technische Universität Braunschweig
2 11. Content Distribution 1. Reliability in Distributed Hash Tables 2. Storage Load Balancing in Distributed Hash Tables 1. Power of Two Choices 2. Virtual Server 3. Content Distribution 1. Swarming 2. Bit Torent VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 2
3 11.1 Stabilize Function The Stabilize Function corrects inconsistent connections Remember: Periodically done by each node n n asks its successor for its predecessor p n checks if p equals n n also periodically refreshes random finger x by (re)locating successor Successor-List to find new successor If successor is not reachable use next node in successor-list Start stabilize function But what happens to data in case of node failure? VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 3
4 11.1 Reliability of Data in Chord Original No Reliability of data Recommendation Use of Successor-List The reliability of data is an application task Replicate inserted data to the next f other nodes Chord informs application of arriving or failing nodes
5 11.1 Properties Advantages After failure of a node its successor has the data already stored Disadvantages Node stores f intervals More data load After breakdown of a node Find new successor Replicate data to next node More message overhead at breakdown Stabilize-function has to check every Successor-list Find inconsistent links More message overhead VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 5
6 11.1 Multiple Nodes in One Interval Fixed positive number f Indicates how many nodes have to act within one interval at least Procedure First node takes a random position A new node is assigned to any existing node Node is announced to all other nodes in same interval Node
7 11. 1Multiple Nodes in One Interval Effects of algorithm Reliability of data Better load balancing Higher security Node
8 11.1 Reliability of Data Insertion Copy of documents Always necessary for replication Less additional expenses Nodes have only to store pointers to nodes from the same interval Nodes store only data of one interval
9 11.1 Reliability of Data Reliability Failure: no copy of data needed Data are already stored within same interval Use stabilization procedure to correct fingers As in original Chord Node
10 11.1 Properties Advantages Failure: no copy of data needed Rebuild intervals with neighbors only if critical Requests can be answered by f different nodes Disadvantages Less number of intervals as in original Chord Solution: Virtual Servers VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 10
11 11.1 Fault Tolerance Replication Each data item is replicated K times K replicas are stored on different nodes Redundancy Each data item is split into M fragments K redundant fragments are computed Use of an "erasure-code (see e.g. V. Pless: Introduction to the Theory of Error- Correcting Codes. Wiley-Interscience, 1998) Any M fragments allow to reconstruct the original data For each fragment we compute its key M + K different fragments have different keys VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 11
12 11.2 Storage Load Balancing in DHT Suitable hash function (easy to compute, few collisions) Standard assumption 1: uniform key distribution Every node with equal load No load balancing is needed Standard assumption 2: equal distribution Nodes across address space Data across nodes But is this assumption justifiable? Analysis of distribution of data using simulation VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 12
13 11. 2 Storage Load Balancing in DHT Analysis of distribution of data Example Parameters 4,096 nodes 500,000 documents Optimum ~122 documents per node Optimal distribution of documents across nodes No optimal distribution in Chord without load balancing VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 13
14 11.2 Storage Load Balancing in DHT Number of nodes without storing any document Parameters 4,096 nodes 100,000 to 1,000,000 documents Some nodes without any load Why is the load unbalanced? We need load balancing to keep the complexity of DHT management low VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 14
15 11.2 Definitions Definitions System with N nodes The load is optimally balanced, Load of each node is around 1/N of the total load. A node is overloaded (heavy) Node has a significantly higher load compared to the optimal distribution of load. Else the node is light VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 15
16 11.2 Load Balancing Algorithms Problem Significant difference in the load of nodes Several techniques to ensure an equal data distribution Power of Two Choices (Byers et. al, 2003) Virtual Servers (Rao et. al, 2003) Thermal-Dissipation-based Approach (Rieche et. al, 2004) A Simple Address-Space and Item Balancing (Karger et. al, 2004) VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 16
17 11.2 Overview Algorithms Power of Two Choices (Byers et. al, 2003) Virtual Servers (Rao et. al, 2003) John Byers, Jeffrey Considine, and Michael Mitzenmacher: Simple Load Balancing for Distributed Hash Tables in Second International Workshop on Peerto-Peer Systems (IPTPS), Berkeley, CA, USA, VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 17
18 11.2 Power of Two Choices Idea One hash function for all nodes h 0 Multiple hash functions for data h 1, h 2, h 3, h d Two options Data is stored at one node only Data is stored at one node & other nodes store a pointer VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 18
19 11.2 Power of Two Choices Inserting Data Results of all hash functions are calculated h 1 (x), h 2 (x), h 3 (x), h d (x) Data is stored on the retrieved node with the lowest load Alternative: other nodes store pointer The owner of the item has to insert the document periodically Prevent removal of data after a timeout (soft state) VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 19
20 11.2 Power of Two Choices Retrieving Without pointers Results of all hash functions are calculated Request all of the possible nodes in parallel One node will answer With pointers Request only one of the possible nodes. Node can forward the request directly to the final node VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 20
21 11.2 Power of Two Choices Advantages Simple Disadvantages Message overhead at inserting data With pointers Additional administration of pointers lead to even more load Without pointers Message overhead for every search VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 21
22 11.2 Overview Algorithms Power of Two Choices (Byers et. al, 2003) Virtual Servers (Rao et. al, 2003) Ananth Rao, Karthik Lakshminarayanan, Sonesh Surana, Richard Karp, and Ion Stoica Load Balancing in Structured P2P Systems in Second International Workshop on Peer-to-Peer Systems (IPTPS), Berkeley, CA, USA, VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 22
23 11.2 Virtual Server Each node is responsible for several intervals "Virtual server" Example Chord Chord Ring [Rao 2003] VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 23
24 11.2 Rules Rules for transferring a virtual server From heavy node to light node 1. The transfer of an virtual server makes the receiving node not heavy 2. The virtual server is the lightest virtual server that makes the heavy node light 3. If there is no virtual server whose transfer can make a node light, the heaviest virtual server from this node would be transferred VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 24
25 11.2 Virtual Server Each node is responsible for several intervals log (n) virtual servers Load balancing Different possibilities to change servers One-to-one One-to-many Many-to-many Copy of an interval is like removing and inserting a node in a DHT Chord Ring VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 25
26 11.2 Scheme 1: One-to-One One-to-One Light node picks a random ID Contacts the node x responsible for it Accepts load if x is heavy H L L H L L HL L [Rao 2003] VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 26
27 11.2 Scheme 2: One-to-Many One-to-Many Light nodes report their load information to directories Heavy node H gets this information by contacting a directory H contacts the light node which can accept the excess load L 1 D 1 H 1 L 2 L 3 L 5 H 3 L 4 D 2 H 2 Light nodes Directories Heavy nodes [Rao 2003] VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 27
28 11.2 Scheme 2: Many-to-Many Many-to-Many Many heavy and light nodes rendezvous at each step Directories periodically compute the transfer schedule and report it back to the nodes, which then do the actual transfer L 1 L 2 D 1 H 1 L 3 L 5 H 3 L 4 D 2 H 2 Light nodes Directories Heavy nodes [Rao 2003] VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 28
29 11.2 Virtual Server Advantages Easy shifting of load Whole Virtual Servers are shifted Disadvantages Increased administrative and messages overhead Maintenance of all Finger-Tables Much load is shifted [Rao 2003] VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 29
30 11.2 Simulation Scenario 4,096 nodes (comparison with other measurements) 100,000 to 1,000,000 documents Chord m= 22 bits. Consequently, 222 = 4,194,304 nodes and documents Hash function sha-1 (mod 2m) random Analysis Up to 25 runs per test VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 30
31 11.2 Results Without load balancing Power of Two Choices Virtual server + Simple + Original Bad load balancing + Simple + Lower load Nodes w/o load + No nodes w/o load Higher max. load than Power of Two Choices VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 31
32 11.3 Content Distribution Sometimes large amounts of data have to be distributed over networks Software updates, video on demand, etc. Early approaches: Napster/Gnutella/Fasttrack Download whole file from one peer If download fails: repeat search, resume download from alternative source Issues No load distribution Poor performance due to asymmetric uplink/downlink bandwidth (ADSL) Low reliability (except for small files) VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 32
33 11.3 Swarming Approach Idea: Chunks Split large files into small chunks Identify/protect chunks via hash values Parallelization 0x9A3C 0x7C23 0x194F 0xDE6A Download different chunks from different sources Utilize upload capacity of multiple sources Sources: Destination: VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 33
34 11.3 Swarming Properties Advantages Peer failures: no loss of files, only chunks Increased throughput Strategies Chunk selection Avoid scarcity Best overall availability? Fairness Free-Riding Bandwidth allocation Systems BitTorrent Microsoft Avalanche VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 34
35 11.3 BitTorrent Overview Bittorrent or BitTorrent Torrent = big stream Author: Bram Cohen, 2003 Only for file distribution, no search features Designed for Content providers Flash crowds Central components Web server for search Tracker for peer coordination VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 35
36 11.3 BitTorrent Definitions Peers Torrent Contains metadata about the files Contains the address of a tracker Swarm Specification of backup trackers possible All peers sharing a torrent are called a swarm Tracker Keeps track of which peers are in a swarm Coordinates communication between the peers VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 36
37 11.3 BitTorrent Joining a Torrent new leecher torrent 1 website 2 join peer list 3 tracker data request 4 seed/leecher Peers divided into: seeds: have the entire file leechers: still downloading 1. obtain the torrent 2. contact the tracker 3. obtain a peer list (contains seeds & leechers) 4. contact peers from that list for data VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 37
38 11.3 BitTorrent Exchanging Data leecher B leecher A I have! seed leecher C Verify pieces using hashes Download sub-pieces in parallel Advertise received pieces to the entire peer list Look for the rarest pieces VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 38
39 11.3 Torrent A Torrent file Passive component Files are typically fragmented into 256KB pieces Typically hosted on a web server Metadata file structure Describes the files in the torrent URL of tracker File name File length Piece length SHA-1 hashes of pieces Allow peers to verify integrity Creation date VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 39
40 11.3 Tracker Peer cache IP, port, peer id State information Completed Downloading Clients report status periodically to tracker Returns random list 50 random leechers/seeds Client first contacts of them and more if some do not respond VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 40
41 11.3 Tracker VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 41
42 11.3 Tracker-less approaches Tracker issues Single point of failure Scalability Piratebay tracker nearly overloaded (>5 Mio. Peers) Decentralized tracker Replace with DHT (Kademlia) Does not tackle distributed search Currently not widely used VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 42
43 11.3 Chunk Selection Which chunk next? 1. Strict Priority Finish active chunks 2. Rarest First Improves availability of rare chunks Delays download of common chunks 3. Random First Chunk Get first chunk quickly (rarest chunk probably slow to get) 4. Endgame Mode Send requests for last sub-chunks to all known peers End of download not stalled by slow peers VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 43
44 11.3 Game Theory Basic Ideas of Game Theory Studies situations where players choose different actions in an attempt to maximize their returns Studies the ways in which strategic interactions among rational players produce outcomes with respect to the players preferences The outcomes might not have been intended by any of them Game theory offers a general theory of strategic behavior Described in mathematical form Plays an important role in Modern economics Decision theory Multi-agent systems VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 44
45 11.3 Game Theory Developed to explain the optimal strategy in two-person interactions. von Neumann and Morgenstern Initially: zero-sum games John Nash Works in game theory and differential geometry Nonzero-sum games Nash equilibrium 1994 Nobel Prize in Economics Harsanyi, Selten Incomplete information VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 45
46 11.3 Definitions Games Situations are treated as games. Rules The rules of the game state who can do what And when they can do it. Player's Strategies Plan for actions in each possible situation in the game Player's Payoffs Is the amount that the player wins or looses in a particular situation Dominant Strategy If players best strategy doesn t depend on what other players do VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 46
47 11.3 Prisoner's Dilemma Famous example of game theory A and B are arrested by the police They are questioned in separate cells Unable to communicate with each other. They know how it works If they both resist interrogation and proclaim their mutual innocence, they will get off with a three year sentence for robbery. If one of them confesses to the entire string of robberies and the other does not, the confessor will be rewarded with a light, one year sentence and the other will get a severe eight year sentence. If they both confess, then the judge will sentence both to a moderate four years in prison VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 47
48 11.3 Prisoner's Dilemma B Confess Not Confess A Confess 4 years each 1 year for A and 8 years for B Not Confess 8 years for A and 1 year for B 3 years each VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 48
49 11.3 A s Decision Tree There are two cases to consider If B Confesses A If B Does Not Confess A Confess Not Confess Confess Not Confess 4 Years in Prison 8 Years in Prison 1 Year in Prison 3 Years in Prison Best Strategy Best Strategy The dominant strategy for A is to confess No matter what B does, confessing is better choice Nash equilibrium: both A and B will confess VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 49
50 11.3 Repeated Games A repeated game Game that the same players play more than once Differ from one-shot games because people's current actions can depend on the past behavior of other players. Cooperation is encouraged Book recommendation Thinking strategically by A.Dixit and B Nalebuff German translation: Spieltheorie für Einsteiger VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 50
51 11.3 Tit for Tat Tit for tat Highly effective strategy An agent using this strategy will initially cooperate Then respond in kind to an opponent's previous action If the opponent previously was cooperative, the agent is cooperative. If not, the agent is not. Dependent on four conditions Unless provoked, the agent will always cooperate If provoked, the agent will retaliate The agent is quick to forgive The agent must have a good chance of competing against the opponent more than once VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 51
52 11.3 Choking Choking Temporary refusal to upload Downloading occurs as normal Connection is kept open No Setup costs TCP congestion control Choking mechanism Ensures that nodes cooperate Eliminates the free-rider problem Cooperation involves uploaded sub-pieces that you have on your peer Based on game-theoretic concepts Tit-for-tat strategy in repeated games VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 52
53 11.3 Unchoking leecher B leecher A seed leecher D leecher C Periodically calculate data-receiving rates Upload to (unchoke) the fastest downloaders Optimistic Unchoking Each BitTorrent peer has a single optimistic unchoke which is uploaded regardless of the current download rate from it This peer rotates every 30 sec Reason: To discover currently unused connections that are better than the ones being used VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 53
54 11.3 Choking Details BitTorrent Details A peer always unchokes a fixed number of its peers Default of 4 Choking decision based on current download rates Evaluated on a rolling 20-second average Choking evaluation performed every 10 seconds Prevents wastage of resources by rapidly choking/unchoking peers VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 54
55 11.3 Anti-Snubbing Choking policy When over a minute has gone by without receiving a single sub-piece from a particular peer, do not upload to it except as an optimistic unchoke Problem A peer might find itself being simultaneously choked by all its peers that it was just downloading from Download will lag until optimistic unchoke finds better peers Solution If choked by everyone, increase the number of simultaneous optimistic unchokes to more than one VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 55
56 11.3 Choking for Seeds Open issue: upload-only choking Once download is complete, a peer has no download rates to use for comparison nor has any need to use them The question is, which nodes to upload to? Policy Upload to those with the best upload rate. Advantages Ensures that pieces get replicated faster Peers that have good upload rates are probably not being served by others VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 56
57 11.3 BitTorrent Summary Optimized file transfer system No file search, no fancy GUI, etc. Very effective High throughput & scalability Nearly perfect utilization of bandwidth Fairness and load distribution not optimal, but good enough Commercially successful Distribution of RedHat distribution BBC evaluates the distribution of TV content (not in real-time) Centralized Easier to take down than other approaches VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 57
58 11.3 Swarming Summary Solves the problem of efficient file distribution Scalable Handles flash crowds Areas for optimization Incentive models Tracker-less approaches Further endgame improvements Next step: content streaming Real-time constraints Chunk order VDMS und P2P Wolf-Tilo Balke Institut für Informationssysteme TU Braunschweig 58
The BitTorrent Protocol
The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions
Lecture 6 Content Distribution and BitTorrent
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent
Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe
Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent
P2P File Sharing: BitTorrent in Detail
ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering [email protected] TG406 2
Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
Incentives Build Robustness in BitTorrent
Incentives Build Robustness in BitTorrent Bram Cohen [email protected] May 22, 2003 Abstract The BitTorrent file distribution system uses tit-fortat as a method of seeking pareto efficiency. It achieves
Seminar RVS MC-FTP (Multicast File Transfer Protocol): Simulation and Comparison with BitTorrent
Seminar RVS MC-FTP (Multicast File Transfer Protocol): Simulation and Comparison with BitTorrent Dominic Papritz Universität Bern Overview > Related work > MC-FTP > BitTorrent > Future work > References
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S.
BitTorrent Technology How and why it works SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. Kartik Krishnan 1 Abstract BitTorrent
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
The Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
BitTorrent Peer To Peer File Sharing
BitTorrent Peer To Peer File Sharing CS290F: Networking for Multimedia Mini PhD Major Area Exam I) Introduction Content distribution is an important topic in networking and has been evolving from the start
Load Balancing in Structured P2P Systems
1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica ananthar, karthik, sonesh, karp, istoica @cs.berkeley.edu Abstract Most P2P systems
Java Bit Torrent Client
Java Bit Torrent Client Hemapani Perera, Eran Chinthaka {hperera, echintha}@cs.indiana.edu Computer Science Department Indiana University Introduction World-wide-web, WWW, is designed to access and download
CNT5106C Project Description
Last Updated: 1/30/2015 12:48 PM CNT5106C Project Description Project Overview In this project, you are asked to write a P2P file sharing software similar to BitTorrent. You can complete the project in
CS5412: TORRENTS AND TIT-FOR-TAT
1 CS5412: TORRENTS AND TIT-FOR-TAT Lecture VI Ken Birman BitTorrent 2 Today we ll be focusing on BitTorrent The technology really has three aspects A standard tht BitTorrent client systems follow Some
Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004
-to-peer filetransfer protocols and IPv6 János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004 Motivation IPv6 traffic is
CSCI-1680 CDN & P2P Chen Avin
CSCI-1680 CDN & P2P Chen Avin Based partly on lecture notes by Scott Shenker and John Jannotti androdrigo Fonseca And Computer Networking: A Top Down Approach - 6th edition Last time DNS & DHT Today: P2P
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
Chord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
Content Distribution Network (CDN)
Content Distribution Network (CDN) Amir H. Payberah ([email protected]) Fatemeh Rahimian ([email protected]) 1 GOAL What is Content Distribution Network (CDN)? The solutions for CDN. CDN applications File Sharing
Enhance Load Rebalance Algorithm for Distributed File Systems in Clouds
Enhance Load Rebalance Algorithm for Distributed File Systems in Clouds Kokilavani.K, Department Of Pervasive Computing Technology, Kings College Of Engineering, Punalkulam, Tamil nadu Abstract This paper
MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with
MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican
Lab 5: BitTorrent Client Implementation
Lab 5: BitTorrent Client Implementation Due: Nov. 30th at 11:59 PM Milestone: Nov. 19th during Lab Overview In this lab, you and your lab parterner will develop a basic BitTorrent client that can, at minimal,
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
Middleware and Distributed Systems. Peer-to-Peer Systems. Martin v. Löwis. Montag, 30. Januar 12
Middleware and Distributed Systems Peer-to-Peer Systems Martin v. Löwis Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers)
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems (Scalable and Efficient Keyword Searching) Anh-Tuan Gai INRIA Rocquencourt [email protected] Laurent Viennot INRIA Rocquencourt
Should Internet Service Providers Fear Peer-Assisted Content Distribution?
Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis, UC Riverside Pablo Rodriguez, Microsoft Research Cambridge Konstantina Papagiannaki, Intel Research Cambridge
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent
Load Balancing in Dynamic Structured P2P Systems
Load Balancing in Dynamic Structured P2P Systems Brighten Godfrey Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica {pbg, karthik, sonesh, karp, istoica}@cs.berkeley.edu Abstract Most P2P
Revisiting P2P content sharing in wireless ad hoc networks
Revisiting P2P content sharing in wireless ad hoc networks Mohamed Karim SBAI, Chadi BARAKAT EPI Planète, INRIA, France Email: {mksbai, cbarakat}@sophia.inria.fr Abstract. Classical content sharing applications
The Advantages and Disadvantages of Network Computing Nodes
Big Data & Scripting storage networks and distributed file systems 1, 2, in the remainder we use networks of computing nodes to enable computations on even larger datasets for a computation, each node
Achieving Resilient and Efficient Load Balancing in DHT-based P2P Systems
Achieving Resilient and Efficient Load Balancing in DHT-based P2P Systems Di Wu, Ye Tian and Kam-Wing Ng Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, N.T., Hong
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
q Admin and recap q Case studies: Content Distribution o Forward proxy (web cache) o Akamai o YouTube q P2P networks o Overview
Outline CS433/533 Computer Networks Lecture 13 CDN & P2P for Scalability q Admin and recap q Case studies: Content Distribution o Forward proxy (web cache) o Akamai o YouTube q P2P networks o Overview
apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates
apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates authors: Cameron Dale, Jiangchuan Liu presented by: Cameron Dale Simon Fraser University Burnaby, BC, Canada [email protected]
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
Architectures and protocols in Peer-to-Peer networks
Architectures and protocols in Peer-to-Peer networks Ing. Michele Amoretti [[email protected]] II INFN SECURITY WORKSHOP Parma 24-25 February 2004 Contents - Definition of Peer-to-Peer network - P2P
Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent
Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha PIPCA Programa de Pós-Graduação em Computação Aplicada
IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst
The Internet is Flat: A brief history of networking over the next ten years Don Towsley UMass - Amherst 1 What does flat mean? The World Is Flat. A Brief History of the Twenty-First Century, Thomas Friedman
Top Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May 2014. Copyright 2014 Permabit Technology Corporation
Top Ten Questions to Ask Your Primary Storage Provider About Their Data Efficiency May 2014 Copyright 2014 Permabit Technology Corporation Introduction The value of data efficiency technologies, namely
Security in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,
Tornado: A Capability-Aware Peer-to-Peer Storage Network
Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao [email protected] Chung-Ta King* [email protected] Department of Computer Science National Tsing Hua University Hsinchu,
Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
A Comparison of Mobile Peer-to-peer File-sharing Clients
1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics
SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD
International Journal of Advances in Applied Science and Engineering (IJAEAS) ISSN (P): 2348-1811; ISSN (E): 2348-182X Vol-1, Iss.-3, JUNE 2014, 54-58 IIST SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE
Chord. A scalable peer-to-peer look-up protocol for internet applications
Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction
Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2
CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol
Methods & Tools Peer-to-Peer Jakob Jenkov
Methods & Tools Peer-to-Peer Jakob Jenkov Peer-to-Peer (P2P) Definition(s) Potential Routing and Locating Proxy through firewalls and NAT Searching Security Pure P2P There is no central server or router.
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY
[Kavita, 2(4): April, 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Histogram Based Live Streaming in Peer to Peer Dynamic Balancing & Clustering System
Join and Leave in Peer-to-Peer Systems: The DASIS Approach
Join and Leave in Peer-to-Peer Systems: The DASIS Approach Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer {kenoa@inf, rarnold@inf, mgaehwil@student, wattenhofer@inf}.ethz.ch Department
HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
How To Predict Bittorrent Eta
University of Warsaw Faculty of Mathematics, Computer Science and Mechanics VU University Amsterdam Faculty of Sciences Joint Master of Science Programme Piotr Powałowski Student no. 209403 (UW), 1735543
PEER TO PEER CLOUD FILE STORAGE ---- OPTIMIZATION OF CHORD AND DHASH. COEN283 Term Project Group 1 Name: Ang Cheng Tiong, Qiong Liu
PEER TO PEER CLOUD FILE STORAGE ---- OPTIMIZATION OF CHORD AND DHASH COEN283 Term Project Group 1 Name: Ang Cheng Tiong, Qiong Liu 1 Abstract CHORD/DHash is a very useful algorithm for uploading data and
Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System
Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Debarghya Das Cornell University, Ithaca, NY 14850 [email protected] Abstract Most cloud storage platforms today offer a centralized
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Game Theory 1. Introduction
Game Theory 1. Introduction Dmitry Potapov CERN What is Game Theory? Game theory is about interactions among agents that are self-interested I ll use agent and player synonymously Self-interested: Each
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Peer-to-peer networking with BitTorrent
Peer-to-peer networking with BitTorrent Jahn Arne Johnsen [email protected] Lars Erik Karlsen [email protected] Sebjørn Sæther Birkeland [email protected] Department of Telematics, NTNU - December
Effective Load Balancing in P2P Systems
Effective Load Balancing in P2P Systems Zhiyong Xu Suffolk University [email protected] Laxmi Bhuyan University of California, Riverside [email protected] Abstract In DHT based P2P systems, various issues
AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 63-68 Impact Journals AUTOMATED AND ADAPTIVE DOWNLOAD
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Data Deduplication in BitTorrent. Thesis to obtain the Master of Science Degree in Information Systems and Computer Engineering
Data Deduplication in BitTorrent João Pedro Amaral Nunes Thesis to obtain the Master of Science Degree in Information Systems and Computer Engineering Examination Committee Chairperson: Prof. Nuno João
Ant-based Load Balancing Algorithm in Structured P2P Systems
Ant-based Load Balancing Algorithm in Structured P2P Systems Wei Mi, 2 Chunhong Zhang, 3 Xiaofeng Qiu Beijing University of Posts and Telecommunications, Beijing 876, China, {miwei985, zhangch.bupt., qiuxiaofeng}@gmail.com
Measurement Study of Wuala, a Distributed Social Storage Service
Measurement Study of Wuala, a Distributed Social Storage Service Thomas Mager - Master Thesis Advisors: Prof. Ernst Biersack Prof. Thorsten Strufe Prof. Pietro Michiardi Illustration: Maxim Malevich 15.12.2010
Load Re-Balancing for Distributed File. System with Replication Strategies in Cloud
Contemporary Engineering Sciences, Vol. 8, 2015, no. 10, 447-451 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.5263 Load Re-Balancing for Distributed File System with Replication Strategies
Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms
Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes
Giving life to today s media distribution services
Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of
Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer
CS 557- Project 1 A P2P File Sharing Network
Assigned: Feb 26, 205 Due: Monday, March 23, 205 CS 557- Project A P2P File Sharing Network Brief Description This project involves the development of FreeBits, a file sharing network loosely resembling
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
