Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.

Slides:



Advertisements
Similar presentations
The Index Poisoning Attack in P2P File Sharing Systems Keith W. Ross Polytechnic University.
Advertisements

Peer-to-Peer and Social Networks An overview of Gnutella.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
NDN in Local Area Networks Junxiao Shi The University of Arizona
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
Skype & Network Management Taken from class reference : An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning Schulzrinne.
1 An Analysis of the Skype Peer-to- Peer Internet Telephony Protocol Speaker : zcchen.
Review of a research paper on Skype
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman Baset and Henning Schuzrinne INFOCOMM 2006 Presenter - Bob Kinicki Presenter -
No Class on Friday There will be NO class on: FRIDAY 1/30/15.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
More about Skype. Overview Any node with a public IP address having sufficient CPU, memory and network bandwidth is a candidate to become a super node.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Peer-to-Peer Intro Jani & Sami Peltotalo.
1 School of Computing Science Simon Fraser University CMPT 880: Peer-to-Peer Systems Mohamed Hefeeda 17 January 2005.
Skype & its protocol Aaron Loar CPE 401. Introduction Skype’s Background Topology 3 Node Types Questions.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
CONTROLLING P2P APPLICATIONS VIA ADDRESS HARVESTING: THE SKYPE STORY Anat Bremler-Barr Omer Dekel Ran Goldschmidt Hanoch Levy Interdisciplinary Center.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Analyzing Peer-to-Peer Traffic Across Large Networks Jia Wang Joint work with Subhabrata Sen AT&T Labs - Research.
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
Presentation by Manasee Conjeepuram Krishnamoorthy.
P2P File Sharing Systems
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
ON THE STABILITY OF SKYPE SUPER NODES Anat Bremler-Barr Ran Goldschmidt Interdisciplinary Center Herzliya Haifa University
P2P Architecture Case Study: Gnutella Network
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and.
Architecture of Software Systems – Lecture 8 Massively Distributed Architectures Reliability, Failover … and failures Martin Rehák.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
How the Internet Works. The Internet and the Web The Web is actually just one of many computer applications that run on the Internet Among others are.
1 P2P Computing. 2 What is P2P? Server-Client model.
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
Introduction of P2P systems
Skype P2P Kedar Kulkarni 04/02/09.
Chapter 2: Application layer
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
1 CS 425 Distributed Systems Fall 2011 Slides by Indranil Gupta Measurement Studies All Slides © IG Acknowledgments: Jay Patel.
An Experimental Study of the Skype Peer-to-Peer VoIP System Saikat Guha, Cornell University Neil DasWani, Google Ravi Jain, Google IPTPS ’ 06 Presenter:
1 Peer-to-Peer Systems r Application-layer architectures r Case study: BitTorrent r P2P Search and Distributed Hash Table (DHT)
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
An analysis of Skype protocol Presented by: Abdul Haleem.
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Lecture 10. P2P VoIP D. Moltchanov, TUT, Fall 2014
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer-to-peer systems (part I) Slides by Indranil Gupta (modified by N. Vaidya)
1 School of Computing Science Simon Fraser University CMPT 765/408: P2P Systems Instructor: Dr. Mohamed Hefeeda.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Peer-to-Peer Networks - Skype Hongli Luo CEIT, IPFW.
Skype.
05 - P2P applications and Sockets
Instructor Materials Chapter 10: Application Layer
© 2002, Cisco Systems, Inc. All rights reserved.
Peer-to-Peer and Social Networks
Early Measurements of a Cluster-based Architecture for P2P Systems
Skype P2P communication
A Scalable content-addressable network
Part 4: Peer to Peer - P2P Applications
Presentation transcript:

Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.

Purpose of Measurement Study Try to understand highly successful file-sharing system –Overlay topology and dynamics –Peer selection –Index management

Big Picture of Overlay Two layer hierarchy –Ordinary Node (ON) –Super Node (SN) SNs are generally more powerful machines (CPU, network bw) and they are NOT behind NATs

FastTrack architecture Each ON has a parent SN node For each shared file, ON uploads to parent SN: –Filename, ContentHash, file descriptors (metadata) Parent SN provides ON with “SN refresh list” –Up to 200 alive SNs, then stored at ON cache –For each SN, the list includes: IP address, port number, SN workload (defined as ?), freshness, and timestamp SNs also exchange SN refresh lists Each SN maintains local index for all children ONs Each SN maintains TCP connections with other SNs –Overlay net If an SN cannot answer a query, it forwards query to other SN peers –TTL-limited flooding Actual file transfer is directly between peers (not through overlay) using HTTP All signaling traffic is encrypted

Measurement Apparatus KaZaA Sniffing Platform KaZaA Probing Tool

KaZaA Sniffing Platform Poly (Ethernet) Home (cable modem)

KaZaA Probing Tool Campus & home based probing –Probe arbitrary SNs –Retrieve their SN refresh lists –Obtain workload of probed SN

Signaling Protocol ON-SN session initial (repeat for 5 SNs) SN-SN session initial

TCP Connections Evolution at instrumented SN node Poly campus 4 – 6 hour measurement Cable modem 7-11 hour measurement

Some basic calculations Estimate total number of SNs, assuming about 3M users (typical in 2004) About SNs Estimate probability of SN-SN link About 0.1%

Signaling Sessions Lifetime Measured over a period of 12 hours Avg duration: 34mins (ON-SN) and 11mins (SN-SN) 30-40% of connections (both types) last for less than 30 seconds! What causes short-lived ON-SN connections? What causes short-lived SN-SN connections?

Parent selection Recall that ON receives a list of 200 SNs from its parent SN –Then, it can select a new parent How would you select the parent SN?

SN workload vs # of connections hours TCP connections evolution hours workload values evolution

Peer Selection: the workload of the SN clearly matters

Locality in Peer Selection: (graphs show percentage of SNs in the SN list having common prefix with child ON and parent SN)

Peer Selection: it appears that RTT also matters: 40% of ON-SN connections have RTT<5ms 60% of SN-SN connections have RTT<50ms

Index Management: 1) No index exchange between SNs 2) SN purges metadata of ON as soon as that child disconnects from parent 3) Highly skewed contribution of metadata by different peers

Summary of Results 20,000 ~ 40,000 active supernodes Each SN connects to approx. 0.1% of other SNs Highly dynamic connections: over 35% SN- SN durations are less than 30 sec.

Summary of results Peer selection uses IP prefix match, workload, RTT and freshness No index exchange between SNs, but query forwarding Skewed content distribution: 20% peers provide 70% metadata for sharing