CS 360 Internet Programming



Similar documents
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

A Measurement Study of Peer-to-Peer File Sharing Systems

On the Penetration of Business Networks by P2P File Sharing

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

P2P: centralized directory (Napster s Approach)

Professor Yashar Ganjali Department of Computer Science University of Toronto.

An Introduction to Peer-to-Peer Networks

Three short case studies

The Gnutella Protocol Specification v0.4

Security in Structured P2P Systems

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Copyright (Infringing File Sharing) Amendment Bill further glossary of terms relating to File Sharing and the Digital Environment

Improving Gnutella Protocol: Protocol Analysis And Research Proposals

How To Make A Network Overlay More Efficient

Skype characteristics

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

LANDesk Management Suite 8.7 Extended Device Discovery

Active Directory Group Policy. Administrator Reference

GregSowell.com. Mikrotik Security

Scalable Internet Services and Load Balancing

Scalable Internet Services and Load Balancing

CSCI-1680 CDN & P2P Chen Avin

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

2015 Internet Traffic Analysis

Information Searching Methods In P2P file-sharing systems

Detecting rogue systems

Project 2: Firewall Design (Phase I)

Avaya P330 Load Balancing Manager User Guide

Lecture 2 CS An example of a middleware service: DNS Domain Name System

Peer-to-Peer Networks Organization and Introduction 1st Week

SiteCelerate white paper

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

HollyShare: Peer-to-Peer File Sharing Application

Bit Chat: A Peer-to-Peer Instant Messenger

S&C IntelliTeam CNMS Communication Network Management System Table of Contents Overview Topology

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits

CSE 123b Communications Software

Internet Content Distribution

Interoperability of Peer-To-Peer File Sharing Protocols

Internet Filtering Appliance. User s Guide VERSION 1.2

P2P File Sharing: BitTorrent in Detail

Cid Santos Luis Matos. Introduction to AllJoyn

DNS and P2P File Sharing

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Multicast vs. P2P for content distribution

Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)

Monitor Solution Best Practice v3.2 part of Symantec Server Management Suite

PEER-TO-PEER NETWORK

Managing (VoIP) Applications DYSWIS

PEER TO PEER FILE SHARING USING NETWORK CODING

Understanding DNS (the Domain Name System)

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Middleware and Distributed Systems. Peer-to-Peer Systems. Martin v. Löwis. Montag, 30. Januar 12

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems*

Debugging With Netalyzr

Apple Remote Desktop Focus on Task Server

co Characterizing and Tracing Packet Floods Using Cisco R

RELOAD Usages for P2P Data Storage and Discovery

Chapter 8 Security Pt 2

CS5412: TIER 2 OVERLAYS

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide

Application Description

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

The BitTorrent Protocol

AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape

Accelerating Your Distributed Environment with LANDesk Systems Management

Technical Support Information Belkin internal use only

Measurements on the Spotify Peer-Assisted Music-on-Demand Streaming System

SuperLumin Nemesis. Administration Guide. February 2011

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Understanding Slow Start

LifeSize UVC Access Deployment Guide

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with

Best Practices for Controlling Skype within the Enterprise. Whitepaper

How To Understand and Configure Your Network for IntraVUE

How to set FTP Server (IIS)

Guideline for setting up a functional VPN

Avaya P333R-LB. Load Balancing Stackable Switch. Load Balancing Application Guide

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Chapter 25 Domain Name System Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

What communication protocols are used to discover Tesira servers on a network?

Denial of Service Resilience in Peer to Peer. D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Chapter 6 Virtual Private Networking Using SSL Connections

ICP. Cache Hierarchies. Squid. Squid Cache ICP Use. Squid. Squid

Transcription:

Peer-to-Peer Networking File Sharing, and Computer Science Brigham Young University

1 Peer-to-Peer File Sharing with Ultrapeers

Overview Peer-to-Peer File Sharing with Ultrapeers peer-to-peer peers exchange data with each other peers act as both clients and servers file sharing exchanging files between users usually requires searching to find an available peer who has the file you want, then downloading that file

Peer-to-Peer Problems with Ultrapeers bootstrapping: finding peers to connect to peer discovery: finding other peers in the system content location: finding a peer with the desired content content delivery: downloading the content from a selected peer or peers

Peer-to-Peer File Sharing with Ultrapeers bootstrapping, peer discovery: centralized server content location tell server your IP address, filenames send query to server, it returns list of peers with matching files content delivery: download file directly from a single peer

Copyright Law Peer-to-Peer File Sharing with Ultrapeers copyright: owner has exclusive rights to reproduce, adapt, publicly distribute, perofrm, and display their work direct infringement: copying part or all of a copyrighted work without authorization vicariaous liability: operator has (1) the right and ability to control users and (2) a direct financial benefit from allowing their acts of piracy. contributory infringement: requires (1) knowledge of the infringing activity and (2) a material contribution actual assistance or inducement to the alleged piracy.

Fair Use Peer-to-Peer File Sharing with Ultrapeers use or copying of all or a portion of a copyrighted work without permission of the owner, e.g. for criticism, comment, news reporting, teaching, scholarship, or research courts consider: purpose and character of use (commercial vs non profit) nature of work amount and substantiality of portion used (including size and quality) the effect of use on market for or value of copyrighted work

in Court Peer-to-Peer File Sharing with Ultrapeers claims they are not infringing copyright because they are not storing any songs shutdown by court injunction because case against them was likely to succeed users likely guilty of direct copyright infringement - copying of a work by another likely to be guilty of contributory infringement because they learned of infringement and failed to purge the materials from its system likely to be guilty of vicarious infringement because they supervised or controlled the party engaging in infringing activity and had a financial interest in the activities see Wikipedia for background information

Promotional Power of Free Music with Ultrapeers record companies have claimed that free downloads supress sales some proof of the opposite effect April 2000: tracks from Radiohead s Kid A album on three months before CD release millions of downloads by the time the record is released number one spot on the charts in debut week, had never been in the top 20 before beat many other heavily marketed artists this example doesn t excuse piracy, but it does indicate that file sharing can provide a marketing opportunity for new bands

version 0.4 with Ultrapeers demise of : copyright infringment (centralized solution makes it easy to find someone to sue) : completely decentralized solution bootstrapping first time: connect to a peer you heard about outside the system for example, in a chat room keep a cache of all peers discovered and use for bootstrapping next time peer discovery try to always be connected to a fixed number of peers (TCP) send a Ping message to existing neighbors, which is flooded to their neighbors other peers respond to Ping with one or more Pong messages, containing IP address, port number, number of files sharing, number of KB sharing

version 0.4 with Ultrapeers content location send a query to your neighbors neighbors flood query, limited by a TTL query includes minimum speed in kb/s for responding peers, search criteria (a string) peers may respond with a query hit, listing IP address, port, number of hits, speed, result set (file name, size) query hits sent along reverse path

version 0.4 with Ultrapeers content delivery direct download from a peer if peer is behind a firewall, ask it to open a connection to you if you are both behind a firewall, you are out of luck problems with no explicit rate limit on ping frequency or query frequency - quickly leads to overload slow peers can hinder faster peers

Use Hierarchy To Scale with Ultrapeers use peers with high bandwidth as group leaders low-bandwidth peers connect to a group leader group leaders cache pointers to content at children queries sent among only the group leaders

Ultrapeer Election with Ultrapeers self-nominate if eligible not firewalled suitable operating system sufficient bandwidth sufficient uptime leaf connects to an ultrapeer: drop all 0.4 connections leaf connects to an existing leaf: leaf re-routes to ultrapeer leaf connects to a leaf that cannot find an ultrapeer: allow 0.4 connection ultrapeer connects to an ultrapeer if both have leaf nodes: make connection if one has no leaf connections and too many ultrapeers: tell it to be a leaf leaves should connect to at most 3 ultrapeers, really really should not allow more than 10 ultrapeeres

Ultrapeer Query Routing with Ultrapeers leaves hash file names into a hash table with a present flag also hash shortened names (to remove plurals) leaves send a compressed hash table to the ultrapeer ultrapeers route queries using version 4 flooding, but only send queries to client nodes if hash table hits

version 0.6 with Ultrapeers ultrapeers pong caching network crawling query hit includes estimate of upload speed may deny downloads if too busy bye message for closing connections, debugging arbitrary protocol extensions parallel download tree hash exchange - verify blocks of a file HUGE - persistent, location independent names (URNs) LAN multicast