Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman:
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Peer-to-Peer Technology and Security Issues By Raul Rodriguez, Arash Zarrinbakhsh, Cynthia Roger and Phillip Shires College of Business Administration.
Peer-to-Peer Content Sharing. P2P File Sharing Benefits Why use a P2P model for a file sharing application?
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Data Management in Peer-to- Peer Systems Qi Sun Beverly Yang.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Peer-to-Peer Networks & JXTA by Madhurasmitha Chakravarthy & Priti Sabadra.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Introduction Widespread unstructured P2P network
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
1 P2P Computing. 2 What is P2P? Server-Client model.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Structuring P2P networks for efficient searching Rishi Kant and Abderrahim Laabid Abderrahim Laabid.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
Othman Othman M.M., Koji Okamura Kyushu University 1.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Bruce Hammer, Steve Wallis, Raymond Ho
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Malugo – a scalable peer-to-peer storage system..
Peer-to-peer systems ”Sharing is caring”. Why P2P? Client-server systems limited by management and bandwidth P2P uses network resources at the edges.
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
Distributed Systems Architectures. Topics covered l Client-server architectures l Distributed object architectures l Inter-organisational computing.
An example of peer-to-peer application
CHAPTER 3 Architectures for Distributed Systems
Prof. Leonardo Mostarda University of Camerino
PEER-TO-PEER SYSTEMS.
Presentation transcript:

Clayton Sullivan PEER-TO-PEER NETWORKS

INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System Types Advantages and Disadvantages Bittorrent Protocol Conclusion

WHAT IS IT? A peer-to-peer network is a distributed network architecture composed of participants that make a portion of their resources, such as processing power, disk storage or network bandwidth directly to network participants without the need for central coordination instances. Used largely for sharing of content files such as audio, video, data or anything in a digital format. There are many p2p protocols such as Ares, Bittorrent, or eDonkey. Can be very large Can also be used for business solutions for relatively small companies that may not have resources available to implement a server solution.

A PEER Peers are both suppliers and consumers while in the traditional client-server model, the server supplies while the client only consumes.

PEER-TO-PEER VS CLIENT-SERVER

NETWORK ARCHITECTURE Typically they are ad-hoc networks, where the addition and the removal of nodes have no significant impact on the network. This distributed architecture allows peer-to-peer systems to provide enhanced scalability and service robustness. Often, implemented as an application layer overlay network that is placed on top of native or physical network. These are used for peer discovery and indexing.

APPLICATION OVERLAY NETWORK P2P applications like Bittorrent create these overlay networks over the existing internet in order to perform indexing and peer collection functions. Overlay networks have no control over physical networks or have any information on physical networks. Weak resource coordination, as well as weak response to fairness of resource sharing.

STRUCTURED VS. UNSTRUCTURED Structured Connections in the overlay are fixed DHT Indexing Unstructured No algorithm for organization or optimization Connections in the overlay are created arbitrarily Centralized Central server is used for indexing functions Bittorrent Hybrid Two groups of clients: client and overlay eMule, Kazaa Pure Equipotent peers, all peers have equal amount of power Gnutella, Freenet

STRUCTURED-DHT Employ globally consistent protocol to ensure that any node can efficiently route a search to some peer that has a desired file. This guarantee necessitates a more structured pattern of overlay links. The most common form is Distributed Hash Tables(DHT). DHT is a lookup service, that allows any participating node to efficiently retrieve the value associated with a given key whether the file is new or older/rarer. Maintaining the mappings from keys to values is handled by nodes that any change in the amount of participants causes minimal amount of disruption Allows for continual node arrival and departure, fault tolerant

UNSTRUCTURED Overlay links are established arbitrarily When a peer wants to find the file, the request must be flooded through network to find as many peers as possible that share the data. This flooding creates a large amount of signal traffic. No guarantee that file will be found especially when the file is older or rare Very poor search efficiency Most popular p2p networks are unstructured networks

ADVANTAGES The more nodes that are part of the system, demand increases and total capacity of the system also increases. Where in client-server network architectures as more clients are added to the system, the system resources decreases. There is no single point of failure, due to robustness of the system. All clients provide to the system

DISADVANTAGES Security is a major concern, not all shared files are from benign sources. Attackers may add malware to p2p files as an attempt to take control of other nodes in the network. Heavy bandwidth usage Anti-P2P companies have introduced faked chunks into shared files that rendered shared files useless upon completion of the download. ISP throttling of P2P traffic Potential legal/moral concerns

BITTORENT One of many forms of p2p protocols for file-sharing. Created in 2001 Estimated to account for 43% of all Internet traffic Many clients that work on bittorrent protocol Utorrent, Vuze, Bittorrent Most are of the Unstructured p2p network architecture Centralized tracker Most clients have started to implement DHT functions

BITTORRENT Creates an application overlay network over existing internet infrastructure Peers when trying to download file, make request to the network and attempt to get the most possible peers connected to download file Resources are not optimized and fairness is a concern Clients have started to implement DHT as a better way to connect to peers in order to download files more efficiently. When new files are added to the, small data requests are carried out over TCP connections to different machines in order to share the load of initial file sharer. Trackers assist in the communication between peers DHT would remove need for trackers

CONCLUSION What are peer-to-peer networks What is a peer Application Overlay Networks Structured Vs. Unstructured Advantages/Disadvantages Bittorrent

QUESTIONS?