COSC 4213: Computer Networks II

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Peer to Peer and Distributed Hash Tables
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Some slides are in courtesy of J. Kurose and K. Ross Review of Previous Lecture Electronic Mail: SMTP, POP3, IMAP DNS Socket programming with TCP.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
P2P File Sharing Systems
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 10 Omar Meqdadi Department of Computer Science and Software Engineering University.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
CS 3214 Computer Systems Godmar Back Lecture 24 Supplementary Material.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
1 P2P Computing. 2 What is P2P? Server-Client model.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
DP&NM Lab. CSE, POSTECH - 1/25 - Peer-to-Peer Algorithms and System CS600 Assignment #5 Nov Byungchul Park DPNM Lab., Dept.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Introduction of P2P systems
Chapter 2: Application layer
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 Peer-to-Peer Systems r Application-layer architectures r Case study: BitTorrent r P2P Search and Distributed Hash Table (DHT)
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Lecture 2 Distributed Hash Table
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Peer-to-peer systems ”Sharing is caring”. Why P2P? Client-server systems limited by management and bandwidth P2P uses network resources at the edges.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Peer-to-Peer Information Systems Week 12: Naming
Introduction to Technology Infrastructure
CS 3214 Computer Systems Networking.
PEER-TO-PEER NETWORK FAMILIES
Peer to peer Internet telephony challenges, status and trend
Administrative Things
CSE 486/586 Distributed Systems Distributed Hash Tables
Peer-to-Peer Data Management
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
CS 3214 Computer Systems Networking.
Application Layer Functionality and Protocols
EECS 3214: Computer Networks Protocols and Applications
Introduction to Technology Infrastructure
Chapter 2 Introduction Application Requirements VS. Transport Services
Chapter 2 Application Layer
Early Measurements of a Cluster-based Architecture for P2P Systems
Chapter 4 Core TCP/IP Protocols
CSE 4213: Computer Networks II
EE 122: Peer-to-Peer (P2P) Networks
A Scalable content-addressable network
Part 4: Peer to Peer - P2P Applications
The University of Adelaide, School of Computer Science
ECE 4450:427/527 - Computer Networks Spring 2017
Computer Networks Protocols
Peer-to-Peer Information Systems Week 12: Naming
Part II Application Layer.
Chapter 2 Application Layer
Presentation transcript:

COSC 4213: Computer Networks II Suprakash Datta datta@cs.yorku.ca These slides are adapted from Keith Ross’ slides. 5/21/2019 COSC 4213 - S.Datta

Chapter 2: Application layer 2.1 Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P file sharing 2.7 Socket programming with TCP 2.8 Socket programming with UDP 2.9 Building a Web server 5/21/2019 COSC 4213 - S.Datta

P2P services File sharing – Napster, Gnutella, Kazaa…. Communication – Instant messaging, VoIP (Skype) Computation seti@home DHTs – Chord, CAN, Pastry, Tapestry…. Applications built on emerging overlays Planetlab P2P file systems – Past, Farsite Wireless Ad-hoc Networking? 5/21/2019 COSC 4213 - S.Datta

Overlay graphs Edges are TCP connections or pointer to an IP address Edges maintained by periodic “are you alive” messages. Typically new edge established when a neighbor goes down New nodes BOOTSTRAP Structured vs Unstructured 5/21/2019 COSC 4213 - S.Datta

Structured overlays Edges arranged in a preplanned manner. DNS is an example of a structured overlay (but not P2P) Mostly still in the research stage – so has not made it to the textbook! 5/21/2019 COSC 4213 - S.Datta

Challenge: locating content Gnutella-type search – expensive, no guarantee, need many cached copies for technique to work well. Directed search – assign particular nodes to hold particular content (or pointers to it). - Problems: Distributed Handling join/leave 5/21/2019 COSC 4213 - S.Datta

Distributed hash tables Introduce a hash function to map objects to identifiers. E.g. h(“Britney Spears”) = 111 Distribute the range of the hash function among all nodes Each node must “know about” at least one copy of each object that hashes within its range (when one exists) 5/21/2019 COSC 4213 - S.Datta

Now… Switch to the tutorial by Prof. Ross. We will only cover a small portion on DHTs in this lecture 5/21/2019 COSC 4213 - S.Datta

Major problems User issues Security Viruses Community/Network issues Polluted files Flash crowds Freeloading 5/21/2019 COSC 4213 - S.Datta

Thought questions Is success due to massive number of servers or simply because content is free? Copyright infringement issues: direct vs indirect. 5/21/2019 COSC 4213 - S.Datta