Peer-to-Peer Networks Organization and Introduction 1st Week



Similar documents
Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

An Introduction to Peer-to-Peer Networks

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

P2P: centralized directory (Napster s Approach)

Information Searching Methods In P2P file-sharing systems

Improving Gnutella Protocol: Protocol Analysis And Research Proposals

HollyShare: Peer-to-Peer File Sharing Application

Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

Architectures and protocols in Peer-to-Peer networks

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning

Middleware and Distributed Systems. Peer-to-Peer Systems. Martin v. Löwis. Montag, 30. Januar 12

A Survey of Peer-to-Peer File Sharing Technologies

Peer-to-Peer Systems: "A Shared Social Network"

Professor Yashar Ganjali Department of Computer Science University of Toronto.

A Survey of Peer-to-Peer Network Security Issues

5. Peer-to-peer (P2P) networks

Peer-to-Peer Computing

Denial of Service Resilience in Peer to Peer. D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik

Three short case studies

2015 Internet Traffic Analysis

Peer-to-peer networking. Jupiter Research

How To Create A P2P Network

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

PEER-TO-PEER NETWORK

Interoperability of Peer-To-Peer File Sharing Protocols

Attacks Against Peer-to-peer Networks and Countermeasures

Multicast vs. P2P for content distribution

State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center

P2P Characteristics and Applications

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Peer to peer networks: sharing between peers. Trond Aspelund

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Peer-to-Peer File Sharing

Evolution of Peer-to-Peer Systems

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

A Study on the novel tool to retort P2P security issues

CSCI-1680 CDN & P2P Chen Avin

A Measurement Study of Peer-to-Peer File Sharing Systems

Computer Networks and the Internet

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Seminar Algorithms of the Internet

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

Network Applications

On the Penetration of Business Networks by P2P File Sharing

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf

Unit 3 - Advanced Internet Architectures

Analysis of traffic demographics in Broadband networks

A Seminar report on Peer to peer Network

Decentralized supplementary services for Voice-over-IP telephony

Title: P2P Networks for Content Sharing

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network

p2p: systems and applications Internet Avanzado, QoS, Multimedia Carmen Guerrero

Peer-to-Peer Networks

Peer-to-Peer Networks for Content Sharing

Methods & Tools Peer-to-Peer Jakob Jenkov

Best Practices for Controlling Skype within the Enterprise. Whitepaper

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems

Best Practices for Controlling Skype within the Enterprise > White Paper

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems*

Exploiting P2P Systems for DDoS Attacks

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

A Survey of Peer-to-Peer Content Distribution Technologies

Peer-to-Peer Botnets. Chapter Introduction

Client/server and peer-to-peer models: basic concepts

LOOKING UP DATA IN P2P SYSTEMS

CS 360 Internet Programming

PEER TO PEER FILE SHARING USING NETWORK CODING

Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems

DNS and P2P File Sharing

How To Use A Phone Over Ip (Phyto) For A Phone Call

The Gnutella Protocol Specification v0.4

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004

DDoS Vulnerability Analysis of Bittorrent Protocol

Transcription:

Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1

Peer-to-Peer Networks Organization 2 2

Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/ peer-to-peer-s08/index.html Lecture Tuesday, 11am-1pm, building 101, room 00-010/14 Wednesday, 11am-12am, building 101, room 00-010/14 Exercise Arne Vater Wednesday, 12am-1pm, building 101, room 00-010/14 3 3

Exercises Exercise class Wednesday, 12am-1pm, building 101, room 00-010/14 start: 30.04.2008 Exercises appear every Wednesday on the web-pages should be solved by students are the bases for the oral exam solutions of the exercises are discussed in the following week 4 4

Exam Dates by appointment possible dates are presented in the last four lectures - probably first week after the lecture and in the middle of the lecture free summer Contact me during the lecture or send an E-Mail to Oral exam based on the lecture and the exercises Mandatory registration Students of computer science register at the secretary of exams (Prüfungssekretariat) 5 5

Materials Slides appear before the lecture on the web-page Book at least 70% of the lecture can be found in Mahlmann, Schindelhauer, Peer-to-Peer-Netzwerke Methoden und Algorithmen, Springer 2007 Further Literature Research papers will be presented during the lecture on the slides and on the web-page 6 6

Peer-to-Peer Networks Motivation 7 7

P2P Share Germany 2007 Source: Ipoque 2007 8 8

P2P Systems Germany 2007 by Volume Source: Ipoque 2007 9 9

What Germans Download 2007 by Volume Source: Ipoque 2007 10 10

Global Internet Traffic Shares 1993-2004 CacheLogic Research Trends of Internet Protocols 1993-2004 70 60 Share of Internet traffic 50 40 30 20 10 0 E-Mail FTP Peer-to-Peer Web 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 11 Source: CacheLogic 2005 11

P2P Share June 2004 Source: CacheLogic 12 12

Global Internet Traffic 2007 Ellacoya report (June 2007) worldwide HTTP traffic volume overtakes P2P after four years continues record Main reason: Youtube.com P2P 37% gaming 2% non-http video streaming 3% Newsgroups 9% VoIP 1% rest 2% HTTP 46% 13 13

Milestones P2P Systems Napster (1st version: 1999-2000) Gnutella (2000), Gnutella-2 (2002) Edonkey (2000) later: Overnet usese Kademlia FreeNet (2000) Anonymized download JXTA (2001) Open source P2P network platform FastTrack (2001) known from KaZaa, Morpheus, Grokster Bittorrent (2001) only download, no search Skype (2003) VoIP (voice over IP), Chat, Video 14 14

Milestones Theory Distributed Hash-Tables (DHT) (1997) introduced for load balancing between web-servers CAN (2001) efficient distributed DHT data structure for P2P networks Chord (2001) efficient distributed P2P network with logarithmic search time Pastry/Tapestry (2001) efficient distributed P2P network using Plaxton routing Kademlia (2002) P2P-Lookup based on XOr-Metrik Many more exciting approaches Viceroy, Distance-Halving, Koorde, Skip-Net, P-Grid,... Recent developments Network Coding for P2P Game theory in P2P Anonymity, Security 15 15

What is a P2P Network? What is P2P NOT? a peer-to-peer network is not a client-server network Etymology: peer from latin par = equal one that is of equal standing with another P2P, Peer-to-Peer: a relationship between equal partners Definition a Peer-to-Peer Network is a communication network between computers in the Internet - without central control - and without reliable partners Observation the Internet can be seen as a large P2P network 16 16

Contents Short history First Peer-to-Peer Networks Napster Gnutella CAN Chord Pastry und Tapestry Hop optimal networks Internet and hole-punching Game theory P2P traffic Codes P2P in the real world 17 17

Peer-to-Peer Networks The First P2P-Network Napster 18 18

Napster Shawn (Napster) Fanning published 1999 his beta version of the now legendary Napster P2P network File-sharing-System Used as mp3 distribution system In autumn 1999 Napster has been called download of the year Copyright infringement lawsuit of the music industry in June 2000 End of 2000: cooperation deal between Fanning and Bertelsmann Ecommerce Since then Napster is a commercial file-sharing platform 19 19

How Did Napster Work? Client-Server Server stores Client Index with meta-data - file name, date, etc table of connections of participating clients Client Client table of all files of participants Query client queries file name server looks up corresponding clients server replies the owner of the file querying client downloads the file from the file owning client Client Client Server Reply Client Query Client Client direct download 20 20

Discussion of Napster Advantages Napster is simple Files can be found fast and effective Disadvantages Central structure eases censorship, hostile attacks and vulnerability against technical problems - e.g. denial of service (DOS) attack Napster does not scale - i.e. increasing number of participants implies a decline in performance - bandwith and memory of the server is limited Conclusion Napster is not an acceptable P2P network solution Except the download part Napster is not a real P2P network 21 21

Peer-to-Peer Networks The First Real P2P- Network Gnutella 22 22

History of Gnutella Gnutella was released in March 2000 by Justin Frankel and Tom Pepper from Nullsoft Since 1999 Nullsoft is owned by AOL File-Sharing system Same goal as Napster But without any central structures 23 23

Gnutella Connecting Ping Ping Neighbor lists Gnutella connects directly with other clients the client software includes a list of usually online clients the clients checks these clients until an active node has been found an active client publishes its neighbor list the query (ping) is forwarded to other nodes the answer (pong) is sent back neighbor lists are extended and stored Ping Ping Ping Ping Ping Pong Pong Pong Pong Pong Pong Pong the number of the forwarding is limited (typically: five) 24 24

Gnutella Connecting Ping Ping Protokoll Ping - participants query for neighbors Ping Ping Ping Pong - are forwarded according for TTL steps (time to live) Pong Ping Ping Pong Pong Pong - answers Ping - is forwarded backward on the query path - reports IP and port adress (socket pair) Pong Pong Pong - number and size of available files 25 25

Gnutella Graph Structure Graph structure constructed by random process underlies power law 10 3 Gnutella 12/28/2000 exp(6.04022)*x**(!1.42696) 10 3 Random grap 10 2 10 2 occurences 10 1 10 1 10 0 10!1 10 0 10 1 10 2 10 3 out-degree 26 10 0 10 0 10 1 Gnutella snapshot in 2000 (a) Gnutella 12/28/00( r = 0.94) (b) Random Graph 26

Gnutella Query Query Query File Query are sent to all neighbors Neighbors forward to all neighbors Query Query Query until the maximum hop distance has been reached - TTL-entry (time to live) Query querying peer QueryHit Protocol Query QueryHit - for file for at most TTL hops Query-hits - answers on the path backwards If file has been found, then initiate direct download QueryHit QueryHit querying peer direct download 27 querying peer 27

Gnutella - Discussion Advantages distributed network structure scalable network Disadvantages bounded breadth depth search leads to implizit network partition this reduces success probability long paths, slow latency Suggested improvements random walks instead broadcasting passive replikation of index information 28 28

FastTrack & Gnutella2 Hybrid Structure high bandwidth node are elected as P2Pservers, aka. super-nodes super-nodes are connected using the original Gnutella protocol client nodes are connected only to supernodes Used in FastTrack Gnutella 2 Advantages improved scalabilty smaller latency Disadvantages still unreliable and slow peers decline to serve as super-nodes 29 29

Peer-to-Peer Networks End of 1st Week Department of Computer Science 30