Evolution of Peer-to-Peer Systems



Similar documents
An Introduction to Peer-to-Peer Networks

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

How To Make A Network Overlay More Efficient

HollyShare: Peer-to-Peer File Sharing Application

Network Applications

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Chord - A Distributed Hash Table

SuperViz: An Interactive Visualization of Super-Peer P2P Network

Peer to peer networks: sharing between peers. Trond Aspelund

Multicast vs. P2P for content distribution

Peer-to-Peer Networks Organization and Introduction 1st Week

Peer-to-Peer Computing

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

System Models for Distributed and Cloud Computing

Interoperability of Peer-To-Peer File Sharing Protocols

Architectures and protocols in Peer-to-Peer networks

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT

Using Peer to Peer Dynamic Querying in Grid Information Services

Introduction Chapter 1. Uses of Computer Networks

Peer-to-Peer Systems: "A Shared Social Network"

Introduction: Why do we need computer networks?

PEER TO PEER FILE SHARING USING NETWORK CODING

Introduction to Computer Networks

Peer-to-Peer Networks

Unit 3 - Advanced Internet Architectures

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Virtual machine interface. Operating system. Physical machine interface

P2P Characteristics and Applications

Peer-to-Peer File Sharing

Advanced Peer to Peer Discovery and Interaction Framework

Client/server and peer-to-peer models: basic concepts

A Review on Efficient File Sharing in Clustered P2P System

A Survey of Peer-to-Peer Network Security Issues

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November ISSN

Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure

Distributed Systems. REK s adaptation of Prof. Claypool s adaptation of Tanenbaum s Distributed Systems Chapter 1

CSCI-1680 CDN & P2P Chen Avin

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

File sharing using IP-Multicast

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Improving Gnutella Protocol: Protocol Analysis And Research Proposals

Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

How To Create A P2P Network

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

A distributed system is defined as

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

Mobile Devices: Server and Management Lesson 05 Service Discovery

Simulating a File-Sharing P2P Network

QoE-Aware Multimedia Content Delivery Over Next-Generation Networks

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

5. Peer-to-peer (P2P) networks

Use of Context-Awareness in Mobile Peer-to-Peer Networks

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network

PEER-TO-PEER NETWORK

SUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER

How To Understand The Power Of A Content Delivery Network (Cdn)

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

Web DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)

A Survey of Peer-to-Peer File Sharing Technologies

LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

8 Conclusion and Future Work

Professor Yashar Ganjali Department of Computer Science University of Toronto.

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

p2p: systems and applications Internet Avanzado, QoS, Multimedia Carmen Guerrero

NETWORKS AND THE INTERNET

A Reputation Management System in Structured Peer-to-Peer Networks

Distributed Systems. 2. Application Layer

PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries

Towards a Peer-to-Peer Extended Content Delivery Network

PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

A Success and Failure Factor Study of Peer-to-Peer File Sharing Systems. Christian Lüthold, Marc Weber

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

Transcription:

EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor s Text, 2005 1 2 Client-Server vs. P2P Architectures What is Peer to Peer Computing? Overlay Network C-S is server-oriented, a well established practice, while P2P is client-oriented, yet to become mature, and Grid is supercomputer-oriented, still taking a long way to go. Peers are autonomous, self-organizing, and thus less structured, less secure, and less controllable than Client-Server or Grid architectures. The P2P operation relies on a good reputation system to keep all the peers happy and trustworthy. 3 In a P2P system, every node acts as both client and server and provides part of the overall recourses. No central coordination or no central database available and no peer has a global view of the entire system. Taylor, Fig.2.6 also 4

Definition P2P Systems (Ross, et al 2004) Broader P2P Definitions 5 6 Typical P2P Applications and Example P2P Systems File sharing for digital content (music, video, etc.) delivery, file exchanges, safe storage, and anonymous information retrieval Collaboration include MSN chatting, instant messaging, design, etc. SETI provides 25 Tflops computing power over 3 million Internet hosts Platforms support naming, discovery, communication, security, and resource aggregation P2P applications Unstructured P2P Systems: Data is distributed randomly over the peers Fully decentralized control No or constrained broadcasting mechanisms, Flooding queries to entire network generating heavy traffic, No guarantee of determinate search results TTL limit on query message reaching the entire network Source: M. Hofmann and L. Beaumont, Content Networking, Chap.6, P2P Content Networks, Kaufman 2005 7 8

Structured P2P Systems: Structured routing mechanisms in overlays Application-level overlays are added over the peers Reduce routing hops, Avoid flooding and eliminate hotspots, Guarantee search results, Provide load balancing, Scalability and fault tolerance, Preserve data locality, Promote self-organization, Enhance security protection, Support node heterogeneity, etc. Fundamental Challenges in P2P Computing Lack of Trust among the peers who are strangers to each other, security and privacy are major worries to hold back the peer participation Hardware Heterogeneity Too many models with different architectures Software Heterogeneity OS and software environment differences Network Heterogeneity Different network connections and protocols Scalability System scaling related to performance and bandwidth Location Data locality, network proximity, and interoperability Fault Tolerance Failure management and load balancing Performance Routing efficiency, self-organization, applications 9 10 Virtual Overlay Network at application level Application-Layer Overlays : 11 12

Desired Overlay Graph Properties Easy to perform join, lookup search, and update operations Gnutella: An unstructured P2P protocol specification without any centralized elements. The software running on each Gnutella peer is called a servent, which was developed and distributed by several companies including, BearShare (www.bearshare.com), LimeWire (www.limewire.com), and ToadNode (www.toadnode.com) 13 14 Gnutella Protocol in P2P Application Gnutella search by flooding Generating too much traffic on the network Source: M. Hofmann and L. Beaumont, Content Networking, Chap.6, P2P Content Networks, Kaufman 2005 15 16

Generating too much traffic on the network Peer-To-Peer Operations in Gnutella Meeting Peers Searching Peers Source: M. Hofmann and L. Beaumont, Content Networking, Chap.6, P2P Content Networks, Kaufman 2005 17 18 Peer Communications in Gnutella The servent software running on each Gnutella peer communicate with each other using TCP/IP. Distributed File sharing or Content Storage and Delivery in P2P Networks. 19 20

Killer Applications in Existing P2P Networks 21 22 References for P2P Networks : 1. K. Ross and D. Rubestein, P2P Systems, Slide Presentation in Tutorial, Infocom, 2004, Hong Kong. ( Class web site) 2. Distributed Search Solutions, The Gnutella Protocol Specification v.4.0, www.contentnetworking.com/papers/gnutella-protocol-04.pdf 3. Ian Taylor, From P2P to Web Services and Grids, Springer, 2005 (Chapters 2 and 6 ) 4. M. Hofmann and L. Beaumont, Content Networking, Chap.6, P2P Content Networks, Kaufman 2005 (Class web site) 23 24