Peer to peer INF 123 – Software Architecture 1.

Slides:



Advertisements
Similar presentations
Peer-to-Peer and Social Networks An overview of Gnutella.
Advertisements

INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Applied Architecture & Styles Not all problems can be solved by following a simple, uniform design solution. Most will require some invention or innovation.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
P2P File Sharing Systems
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
P2P Architecture Case Study: Gnutella Network
Information-Centric Networks05b-1 Week 5 / Paper 2 A survey of peer-to-peer content distribution technologies –Stephanos Androutsellis-Theotokis, Diomidis.
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Introduction of P2P systems
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Skype P2P Kedar Kulkarni 04/02/09.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Chapter 2: Application layer
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
QQ peer-to-peerAnswer 1Each peer is neither client nor server to other peers. True or False? 2Pros and cons of P2P 3What are the 2 main concerns about.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
1 Peer-to-Peer Systems r Application-layer architectures r Case study: BitTorrent r P2P Search and Distributed Hash Table (DHT)
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
P2P Computing MIRA YUN September 16, Outline What is P2P P2P taxonomies Characteristics Different P2P systems Conclusion.
An analysis of Skype protocol Presented by: Abdul Haleem.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
By Jonathan Drake.  The Gnutella protocol is simply not scalable  This is due to the flooding approach it currently utilizes  As the nodes increase.
Copyright © Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. Applied Architectures, Part 2 Software Architecture Lecture.
NETE4631 Network Information Systems (NISs): Peer-to-Peer (P2P) Suronapee, PhD 1.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
1P2P4mm workshop, Vico Equense 6. June 2008 Information Society Technologies VICTORY – a multimodal, cross-platform and distributed multimedia repository.
Peer-to-peer systems (part I) Slides by Indranil Gupta (modified by N. Vaidya)
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Peer to Peer Networking. Network Models => Mainframe Ex: Terminal User needs direct connection to mainframe Secure Account driven  administrator controlled.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Advanced Computer Networks: Part 1
BitTorrent Vs Gnutella.
Peer-to-Peer and Social Networks
Unstructured Routing : Gnutella and Freenet
#02 Peer to Peer Networking
Presentation transcript:

Peer to peer INF 123 – Software Architecture 1

Outline Some theory Napster Gnutella/torrents Skype Sensor networks I won’t talk about – NAT punching/Firewall (ICE, STUN, TURN) – Distributed system algorithms/graph walks 2

SOME THEORY 3

Peer to peer Identical components running independently on different networked hosts Similar to distributed systems – The topology can change – Many paths from A to B Each peer is client and server to other peers Each peer provides resources: data, code, CPU, … 4

Peer 1 Peer 4Peer 2 Peer 3 Peer 4Peer 2 Peer 3 now later 5

Pros and cons Pros – Scaling: each node provides CPU and storage – Robust if one node fails Cons – Complex protocols for resource discovery – Security, trust management 6

Examples Skype Sensor networks (house, environment, …) DNS caching File sharing 7

NAPSTER: HYBRID CS AND P2P 8

Napster Open source Resource location – Client-server – Custom protocol on top of TCP Resource retrieval – P2P – HTTP GET 9

Communication diagram 10 Peer APeer B Content Directory 1) I have Gangnam Style 2) Who has Gangnam Style? 3) A has Gangnam Style 4) Give me Gangnam Style 5) Here is Gangnam Style

Behind Firewall? Sequence diagram 11

Protocol: I have a song “filename”, md5, size (B), bitrate (kbps), frequency (Hz), time (s) “C:\music\OMGPSY\gangnam.mp3” 9e107d9d372bb6826bd81d3542a419d To class: why md5? 12

Protocol: Search query [FILENAME CONTAINS "artist name"] MAX_RESULTS [FILENAME CONTAINS "song"] [LINESPEED ] [BITRATE " "] [FREQ " "] [WMA-FILE] [LOCAL_ONLY] MAX_RESULTS 100 FILENAME CONTAINS “Gangnam Style” BITRATE “AT LEAST” “128” MAX_RESULTS # browse To class: query for songs from Psy? 13

Achilles’ heel Server = bottleneck Swamped with requests for the location of a popular song – Answer location requests slowly Heavy load if the only owner is behind a Firewall – Cap number of simultaneous transfers 14

Achilles’ heel #2 Server = single point of failure Without it, the peers are blind and useless Shutdown mandated by court order 15

GNUTELLA: FULL P2P 16

Gnutella Open source Resource retrieval – P2P – HTTP GET Resource location, peer discovery, … – P2P! – Custom over TCP Purely distributed/decentralized search engine Peer also called servent (server + client) 17

Flooding 18

Flood prevention Every message has a Time to Live flag (TTL) Decreased by 1 every hop When 0, don’t forward 19

Peer discovery Send ping When receiving ping – Send pong where it came from – And forward the ping to other nodes 20

Search query Query message payload Response: QueryHit message payload 21

Query hit 22

Seeds How do I find peers when I join for the first time? – Aka bootstrapping, seeding Need a reliable list of nodes/seeds – Same idea as web page seeds for web crawlers Ship the list in the software Also: IRC, mailing lists, websites with seeds 23

SKYPE: OVERLAY P2P 24

25

Skype supernodes Promote “strong” peers to supernodes – Based on topology, bandwidth, … – Trade secret Directory distributed and replicated in supernodes – Robust and scalable directory 26

Privacy and security Calls relayed through supernodes – Proprietary protocol – Encrypted for privacy Closed-source client – Very hard to inspect the code – Even harder to hack it – Therefore: no malicious peers

SENSOR NETWORKS 28

Basic idea 29

Constraints Each node can – Sense – Compute – Communicate with its neighbors Non-functional properties – Low energy consumption – Fault-tolerance – Scalability – Low latency 30

Usage Home automation Army communication Forest fire, tsunami, or tornado detection Airport weather conditions … 31

London Heathrow Airport 32

33 Base Station (aka sink or gateway) Analog-Digital Converter Deployment architecture System architecture

Communication: routing Flat Hierarchical (super nodes) Location-based Depends on network topology 34

Communication: protocol Multipath – Send data through multiple paths – Good fault-tolerance, but high energy cost Query-based – The gateway sends a query to the network – A node with the data answers the query Quality of Service-based – Balance energy consumption and data quality 35

Read more -of-sensors/article-view/-/blogs/advanced- sensor-networks-developed-for-heathrow- airport -of-sensors/article-view/-/blogs/advanced- sensor-networks-developed-for-heathrow- airport Routing Techniques in Wireless Sensor Networks: A Survey, Al-Karaki et al.,