Lecture XV: Real P2P Systems

Slides:



Advertisements
Similar presentations
P2P Streaming Protocol Pro- incentive Parameters draft-zeng-ppsp-protocol-pro-incentive-para-01 IETF79 Meeting Wenjun (Kevin) Zeng & Yingjie Gu Huawei.
Advertisements

Layered Video for Incentives in P2P Live Streaming
Neighbour selection strategies in BitTorrent- like Peer-to-Peer systems L.G. Alex Sung, Herman Li March 30, 2005 for CS856 Web Data Management University.
Cope with selfish and malicious nodes
Rarest First and Choke Algorithms Are Enough
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
Incentives Build Robustness in BitTorrent- Bram Cohen Presented by Venkatesh Samprati.
Incentives Build Robustness in BitTorrent Bram Cohen.
Bit Torrent (Nick Feamster) February 25, BitTorrent Steps for publishing – Peer creates.torrent file and uploads to a web server: contains metadata.
Presented by: Su Yingbin. Outline Introduction SocialSwam Design Notations Algorithms Evaluation Conclusion.
Voice over IP Skype.
Review of a research paper on Skype
Free-riding in BitTorrent Networks with the Large View Exploit Michael Sirivianos, Jong Han Park, Rex Chen and Xiaowei Yang University of California, Irvine.
CS 554. Peer-to-Peer Systems Faithfulness in Internet Algorithms Haridimos Kondylakis
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
CMPT 401 Summer 2007 Dr. Alexandra Fedorova Lecture XV: Real P2P Systems.
No Class on Friday There will be NO class on: FRIDAY 1/30/15.
Improving ISP Locality in BitTorrent Traffic via Biased Neighbor Selection Ruchir Bindal, Pei Cao, William Chan Stanford University Jan Medved, George.
More about Skype. Overview Any node with a public IP address having sufficient CPU, memory and network bandwidth is a candidate to become a super node.
Freeriding Seminar WS 05/06 Lukas Oertle Departement Computer Science.
Peer-to-Peer Intro Jani & Sami Peltotalo.
A P2P file distribution system ——BitTorrent Fan Bin Sep,25,2004.
P2P File Sharing Systems
Introduction Widespread unstructured P2P network
Content Overlays (Nick Feamster) February 25, 2008.
Bit Torrent (Nick Feamster) February 25, BitTorrent Steps for publishing – Peer creates.torrent file and uploads to a web server: contains metadata.
University of Bologna, Italy How to cheat BitTorrent and why nobody does Simon Patarin and David Hales University of Bologna ECCS 2006,

1 BitTorrent System Efrat Oune Bar-Ilan What is BitTorrent? BitTorrent is a peer-to-peer file distribution system (built for intensive daily use.
DNS: Domain Name System People: many identifiers: – SSN, name, Passport # Internet hosts, routers: – IP address (32 bit) - used for addressing datagrams.
BitTorrent Dr. Yingwu Zhu. Bittorrent A popular P2P application for file exchange!
A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Do incentives build robustness in BitTorrent? Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
An analysis of Skype protocol Presented by: Abdul Haleem.
Incentives for Sharing in Peer-to-Peer Networks By Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
Peer to Peer Networking. Network Models => Mainframe Ex: Terminal User needs direct connection to mainframe Secure Account driven  administrator controlled.
PEAR TO PEAR PROTOCOL. Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change.
© 2016 A. Haeberlen, Z. Ives CIS 455/555: Internet and Web Systems 1 University of Pennsylvania Decentralized systems February 15, 2016.
Skype.
Traffic Localization with Information Guidance of Pseudo Peer Agent on BT-P2P Network 學生 : 楊宏昌 指導教授 : 曾黎明教授 在 BT 同儕通訊上利用參與者訊息引導對外流量之區域化節約.
1 Gnutella. 2 Overview r P2P search mechanism r Simple and straightforward r Completely decentralized r Creates overlay network r Different applications.
05 - P2P applications and Sockets
By Asma Hamad Alharbi.
An example of peer-to-peer application
NGS data transmission, A point view from a user
Copyright notice © 2008 Raul Jimenez - -
Introduction to BitTorrent
tit-for-tat algorithm
CS 3700 Networks and Distributed Systems
Economics and Computation Week 7: The economics of P2P file sharing
SCHOOL OF ELECTRICAL ENGINEERING AND TELECOMMUNICATIONS
Part 4: Peer to Peer - P2P Applications
Managing Inter-domain Traffic in the Presence of BitTorrent File-Sharing Srinivasan Seetharaman and Mostafa Ammar School of Computer Science Objective:
Do incentives build robustness in BitTorrent?
Simplified Explanation of “Do incentives build robustness in BitTorrent?” By James Hoover.
The BitTorrent Protocol
Content Distribution Networks + P2P File Sharing
Game Theory Fall Mike Shor Topic 5.
Pure P2P architecture no always-on server
Chapter 2 Application Layer
Content Distribution Networks + P2P File Sharing
Game Theory Spring Mike Shor Topic 5.
Presentation transcript:

Lecture XV: Real P2P Systems CMPT 401 2008 Dr. Alexandra Fedorova

Outline Skype BitTorrent

Skype IP telephony system Allows users to make phone calls to Skype users to regular phone users Calls are routed via Skype nodes Central login server Super-nodes Nodes that know about location of other nodes

Skype P2P Network Super-nodes are nodes with powerful CPU and network bandwidth One has to qualify to become a super-node Super-nodes know about locations of other nodes Ordinary nodes contact super-nodes to place calls

Skype Components Skype client – the client program used to make phone calls Host cache – list of other known Skype users, maintained at each Skype client Skype login server – a centralized component. Processes account information, authentication

Skype Bootstrap Procedure Skype client depends on host cache to find other users How does a new Skype client populate its host cache? There is a list of bootstrap supernodes hard-coded into the Skype client Skype client contacts them to Find the login server Find names of other Skype peers Skype client continues maintaining and refreshing its host cache throughout its lifetime It’s a good idea to let Skype running for a while before making a phone call!

Skype User Search Procedure A Skype client making a phone call needs to find other users It contacts super-nodes from its host cache, asking them to help find the user Super-nodes return a list of nodes to contact The client contacts those nodes If unsuccessful, the client asks for more nodes Guarantees to find any user that has logged in within the last 72 hours Not much specific information on Skype protocol is available…

Outline Skype BitTorrent

BitTorrent Overview Website allowing peers to share music, video and other media files Central server helps users find initial set of peers that have pieces of the file Tracker server keeps track of peers possessing content of individual files Users download the file by participating in exchange: They exchange pieces that they have for pieces that they don’t have Therefore, for the system to work, users must have incentive to give Users who just get, but do not give are called free riders Protocol must discourage free riding

BitTorrent Download Mechanism Peers download pieces they need and upload pieces they have Keep track of download rates from all links Keep those with highest rate Keep uploading to those peers Choke the others (stop upload) fatter link = higher rate

Selective Unchoking Once in a while selectively unchoke one of the links Allow some time (30 sec.) to see if the download rate will increase If the download rate becomes greater than the rate at one of the existing links, choke the slowest of the existing links

Game Theory on Exchange Two traders A and B simultaneously exchange goods They have to decide whether to participate in the exchange without knowing the other person’s decision If a trader makes the exchange, he cooperates If a trader does not make the exchange, he defects Possible outcomes: A cooperates, B cooperates – both benefit from receiving the other trader’s good A cooperates, B defects – B benefits by receiving A’s good, by not giving away his own good A defects, B defects – none receives the other trader’s good, but each gets to keep his own good

Incentives P – payoff P(C) – payoff to cooperating player P(D) – payoff to defecting player Cooperate Defect P(C) = 3, P(C) = 3 P(C) = 0, P(D) = 5 P(D) = 5, P(C) = 0 P(D) = 1, P(D) = 1

Strategies Encouraged By Incentives Cooperate Defect P(C) = 3, P(C) = 3 P(C) = 0, P(D) = 5 P(D) = 5, P(C) = 0 P(D) = 1, P(D) = 1 Best individual strategy is to defect But if both traders defect they are worse off than if they both co-operated So the best strategy is to co-operate, but only if the other player co-operates

Winning the Exchange Game: TIT-FOR-TAT Repeat rounds of exchanges with other players Remember what other players did in previous rounds Goal: maximize personal payoff The winning strategy: TIT-FOR-TAT Cooperate in the first round In subsequent rounds do that which the other player did Properties of the winning player: Nice – he begins by cooperating Retaliatory – he won’t cooperate with players that do not cooperate with him Forgiving – will cooperate again if bad players fix their behavior Clear – clearly communicates his intentions

Analogy With BitTorrent Goods exchange: exchange the piece of file that you have for the piece that you don’t have Cooperate: upload the piece you have in exchange for downloading the piece you need Defect: download the piece you need, but don’t upload (free riding) Payoff: The piece you download minus the cost of uploading the file

Is BitTorrent Using the Winning Strategy? Is BitTorrent player NICE? No, it may choke an existing link upon finding a faster one Is BitTorrent player RETALIATORY? No, it uses optimistic unchoking Is BitTorrent player FORGIVING? Not necessarily – unchoked links are chosen arbitrarily Is BitTorrent player CLEAR? No, unchoked links are chosen arbitrarily

Improved Incentive Mechanism For each link, maintain: Download amount d Upload amount u Upload to the peer as long as: u – d ≤ f * c c – the fragment size f – some constant If u – d is large, the other peer is not cooperating So you stop cooperating in return d u

Comparison of the Mechanisms Old mechanism: everyone experiences the same download time, regardless of the upload rate they provide New mechanism: nodes that upload more enjoy faster completion time

Comparison of the Mechanisms (cont.) FO – free riders + old players FN – free riders + new players FNO – free riders + new players + old players

Summary Skype BitTorrent IP telephony system Relies on super-nodes, recorded in host cache Skype client learns about initial super-nodes from bootstrap super-nodes Centralized login server BitTorrent Media sharing network File location is found in a centralized fashion (central server + tracker) File download is P2P System must encourage co-operation, discourage free riding The right incentive mechanism is key