CS254 Network Technologies



Similar documents
ACE-1/onearm #show service-policy client-vips




H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct



1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).

3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4.







proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters->







PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB


Campus Sustainability Assessment and Related Literature



EM EA. D is trib u te d D e n ia l O f S e rv ic e


Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management


Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management


SCO TT G LEA SO N D EM O Z G EB R E-



i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner


AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL P. A. V a le s, Ph.D.

I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y

w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, , K a s h iw a z a, A g e o C ity, S a ita m a



Voxeo CXP Analyzer Report Samples

S y ste m s. T h e D atabase. D atabase m anagem e n t sy ste m


Thuraya XT-LITE Simple. Reliable. Affordable.


Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage

B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, ±3 7 8

How To Be A Successful Thai

Public Health is Like..

Overview of Spellings on



Put the human back in Human Resources.


Farmers attitudes toward and evaluation and use of insurance for income protection on Montana wheat farms by Gordon E Rodewald

M P L S /V P N S e c u rity , C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.


1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování

<?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv="

Online Department Stores. What are we searching for?

Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1

R e t r o f i t o f t C i r u n i s g e C o n t r o l



How To Manage A Large Amount Of Information From A Computer To A Computer

How To Know If You Are A Good Or Bad Person

The SmartView Tracker

W h a t is m e tro e th e rn e t

RELEASE OF LIABILITY, WAIVER OF CLAIMS, ASSUMPTION OF RISKS AND INDEMNITY AGREEMENT

CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile , C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.


NAMA FILM Aleksinackih rudara 39A Beograd, Serbia Tel/Fax: Mobile: princip@eunet.rs

CUSTOMER INFORMATION SECURITY AWARENESS TRAINING

Software Quality Requirements and Evaluation, the ISO Series

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o

Opis przedmiotu zamówienia - zakres czynności Usługi sprzątania obiektów Gdyńskiego Centrum Sportu




GlasCraft Air Motor Repair Kits

B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m


California Treasures Phonics Scope and Sequence K-6

Bewährte Six Sigma Tools in der Praxis

LEADING TECHNOLOGICAL INNOVATION & PRODUCTIVITY IMPROVEMENT ACROSS THE SUPPLY CHAIN

Ma teria ls to fix p osters to the b oa rd s will b e p rovid ed b y the organization at the Conference site.

B rn m e d s rlig e b e h o v... 3 k o n o m i S s k e n d e tils k u d o g k o n o m is k frip la d s... 7 F o r ld re b e ta lin g...


Connecticut Energy Efficiency Fund Commercial and Industrial Programs: Helping Connecticut Businesses Control and Reduce their Energy Costs


A Comparison of Jolly Phonics and Jolly Grammar with the Six Phases of Letters and Sounds

CREATE SHAPE VISUALIZE

Transcription:

CS254 Network Technologies Lecture 9: Peer-to-Peer Networks I James Salter Department of Computing University of Surrey Autumn 2006 What is P 2 P C o m p u tin g? Everybody seems to have a different idea F il e sharing D istribu ted c omp u ting I nter- c onnec ted c ommu nities of u sers B otn ets O p p osite of c l ient/ server netw ork T hese are al l val id definitions 1

C l ie n t/ S e r v e r A r c hite c tu r e Clients send requests to / v ia a c entra l serv er S m a ll # m essa g es S ing le p o int o f f a ilure P u r e P e e r - to - P e e r A r c hite c tu r e N o c entra l serv er R esilient Clients c o nnec ted to o ne o r m o re p eers L a rg e # m essa g es 2

H y b r id P e e r - to - P e e r N e tw o r k s S o m e no des a c t a s g ro up m a na g ers/ ro uters M o re ro b ust th a n c lient/ serv er P o tentia lly lo w er # m essa g es th a n p ure P 2 P C har ac te r istic s o f a P 2 P N e tw o r k N odes c an ac t as c l ients and servers N o c entral ised server/ au thority (in pure P2P networks) N etw ork is hig hl y dynamic N od es j oin a nd l ea v e reg ul a rl y L arg e- sc al e Potentia l l y m il l ions of nod es N odes are au tonomou s B ut c o- opera te to sh a re/ retriev e resourc es 3

O v e r l ay s C reates a virtu al netw ork : netw ork overl ay C onnec tions betw een nodes defined by ap p l ic ation, not by p hysic al c onnec tions P rimaril y c onc erned w ith nodes: ig nore rou ters, bridg es, other netw ork ing devic es O verl ay c an have l ittl e rel ation to u nderl ying netw ork c onnec tions N eed l essl y send d a ta a c ross th e I nternet instea d of th roug h a L A N? O v e r l ay s A C B 4

R e so u r c e D isc o v e r y P r o b l e m F il es/ resou rc es stored at the edg e of the netw ork N o sing l e l oc ation hosts resou rc es R esou rc es c an be shared by anybody H ow do w e k now w hether the resou rc e w e w ant ex ists? H ow do w e k now w here to find the resou rc e w e w ant? N ap ste r ( 1 9 9 9-2 0 0 2 ) A l l nod es c onnec ted to th e N a pster Master Index serv er N od es send a l ist of f il es th ey a re wil l ing to sh a re to serv er S erv er h osts a m a ster ind ex of f il es a v a il a b l e on th e network, a nd wh ic h Track1.mp3 Music.mp3 CDRip.mp3 m a c h ines h ol d wh a t 5

N ap ste r : D o w n l o ad in g a F il e S end q uery to N a pster serv er S erv er returns a d d resses of m a c h ines h osting f il e S et up a d irec t c onnec tion with m a c h ine to d ownl oa d : f il e d oes not pa ss th roug h N a pster serv er N ap ste r : A d v an tag e s/ P r o b l e m s S mal l nu mber of messag es to find a fil e G u aranteed to find fil e if it ex ists I ndex server is a sing l e p oint of fail u re: B ottl enec k potentia l l im it to sc a l a b il ity A tta c ks a ttra c t D enia l of S erv ic e a tta c ks, etc. C ontrol sing l e entity c a n d ec id e to sh ut d own L eg a l a l l q uery tra f f ic pa sses th roug h sing l e m a c h ine: owners c a nnot d eny knowl ed g e of wh a t network is b eing used f or 6

G n u te l l a N od es d irec tl y c onnec ted N o c entra l serv er Q uery f l ood ed f rom nod e to nod e T im e- T o- L iv e (T T L ) c ounter prev ents inf inite q uery f orwa rd ing : Decremented at each no de Q u ery di s carded w hen T T L = 0 Gnutella: Query Forwarding Query Horizon START TTL=4 7

Gnutella: A dv antages / P rob lem s No single point of failure or central controller D ifficult/ im possib le to sh ut d ow n L arge v olum es of q uery traffic: q uery m ust b e sent to ev ery nod e ind iv id ually W asted m essages: som e nod es receiv e q uery m ultiple tim es Q uery h oriz on ( T T L lim it) : cannot guarantee to find file in netw ork Gnutella2 c o o 2 h u b u b p c o o f l o h u b u b h o l o f f l h o h l c o u b b h o Leaves: standard no des nnec ted to 1 r s H s: su er no des nnec ted to 1 0 0 s eaves and several th er s H s d i ndex i es el d n eac eaf no de nnec ted to th em H s sh are i ndex es etw een eac th er 8

Gnutella2 : S earc h o h u b q u f o l h o f l u b f o q u o h u b w h f l f o u f p o p u l f l w o u l o o o l k y f f l C ntac t : ery rw arded to no des i sted i n i ndex as sti ng i e H rw ards ery to th er s ere i e i s nd i n th ei r i ndex C an i nd ar i e i th t adi ng th e netw rk M re i el to i nd rare i es? B itt orrent N o h m h N o p o u k w l o c o o f f l c o f l o p l u o f k k l o f m h c u y w o f l searc ec ani sm erm anent netw rk M st no ati n. to rrent i e. to rrent ntai ns i e i nf s U R L a trac er T rac er sends i st ac i nes rrentl do nl adi ng i e.torrent 9

p B itt orrent F i l e i s sp l i t i nto p i ec es ( ty p i c al l y ¼ M b ).torrent D o w nl o ad di f f erent p i ec es f ro m eac h eer S h are th e p i ec es al ready do w nl o aded S everal tec h ni q u es f o r p ri o ri ti si ng o rder M u st h ave seed m ac h i ne w i th c o m p l ete c o p y o f f i l e S truc tured P 2 P A v oid rand om v isiting of nod es to find content U tilise an ind ex sim ilar to Napster S plit ind ex and d istrib ute ov er entire netw ork M ust k now w h ere to find each piece of th e ind ex organisation of nod es M ore efficient ( less h ops) : req uests alw ay s routed towards content 10

H as h T ab les H ash functions m ap d ata k ey s to b uck ets K ey s are stored in b uck ets in ind ex tab le E x am p l e: f(x) = x mod 6 f(15) = 15 mod 6 = 3 f(36) = 36 mod 6 = 0 D istrib uted H ash T ab les 0 1 2 3 4 5 12, 24, 30 19, 61 20, 26, 56 3, 9 10, 16, 28, 34 23, 35, 65 E ach nod e h osts part of th e ind ex ( one or m ore b uck ets) C h ord E ac h no de h as a u ni q u e I D nu m b er N o des arrang ed 73 1 7 nu m eri c al l y i n a ri ng 70 F i l e nam es h ash ed to g enerate f i l e I D F i l es h o sted o n no de 52 22 w i th c l o sest I D Lo o k u p : p ro vi de k ey, retu rns val u e 48 41 34 28 11

C h ord: S earc h ing N o des h o st sm al l ro u ti ng tab l es E ac h entry i n tab l e p o i nts f u rth er aw ay 73 1 7 f ro m c u rrent no de 70 A l l o w s q u ery to b e f o rw arded q u i c k l y th ro u g h ri ng D i stanc e b etw een 52 22 c u h h rrent no de and targ et al ved eac step 48 41 34 28 D etai l s nex t w eek Comparison with Unstructured Nets Guaranteed to find resource if it exists No TTL counters/query Horizon N o w asted m essag es: l ook up sent tow ards answ er Query m a y v isit sa m e nod e m ul tip l e tim es in G nutel l a M ore scal ab l e l ook up costs D HTs typ ica l l y O ( l og N) v s G nutel l a O ( N) C an onl y l ook up v al ue associated w ith k ey No sup p ort f or com p l ex q ueries ( e. g. sea rch w ith in f il e) M ust reg ul arl y m aintain routing inform ation No/l ittl e m a intena nce necessa ry in G nutel l a 12

S P2P Applications File sharing D ist rib u t ed c o m p u t ing I nst ant m essaging M ed ia st ream ing/ d ist rib u t io n W eb serv ic es W o rk gro u p s N et w o rk ed d ev ic es R e se ar ch Ar e as R esource discov ery / search ing E f f iciency, m ore p ow erf ul q ueries R ob ustness/ stab il ity C a n th e netw ork op era te und er h ig h ch urn? I ncentiv es W h y sh oul d I p rov id e a s w el l a s consum e? R ep utation/ Q ual ity How g ood /rel ia b l e a re p eers in th e netw ork? ecurity M a l icious/suicid a l p eers, a tta ck s on th e netw ork 13

F u r th e r R e ad ing O ram, A., Peer- t o - Peer: H a rn es s i n g t h e Po w er o f D i s ru p t i v e T ec h n o l o g i es, C hap t er 1 : A N et w o rk o f P eers. Free d o w nlo ad f ro m : ht t p : / / w w w. o reilly. c o m / c at alo g/ p eert o p eer/ c hap t er/ c h0 1. ht m l ht t p : / / en. w ik ip ed ia. o rg/ f o r p eer- t o - p eer, G nu t ella ( o riginal and su b seq u ent v ersio ns), N ap st er, et c. 14