On the Economics of P2P Systems Speaker Coby Fernandess.

Slides:



Advertisements
Similar presentations
E-Commerce Based Agents over P2P Network Arbab Abdul Waheed MSc in Smart Systems Student # Nov 23, 2008 Artificial Intelligence Zhibing Zhang.
Advertisements

A Robust and Efficient Reputation System for Active Peer-to-Peer Systems Dominik Grolimund, Luzius Meisser, Stefan Schmid, Roger Wattenhofer Computer Engineering.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Game Theory. Games Oligopolist Play ▫Each oligopolist realizes both that its profit depends on what its competitor does and that its competitor’s profit.
The Role of Prices in Peer-Assisted Content Distribution Christina Aperijis Michael J. Freedman Ramesh Johari Presented by: Kyle Chauvin and Henry Xie.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
1 On Death, Taxes, & the Convergence of Peer-to-Peer & Grid Computing Adriana Iamnitchi Duke University “Our Constitution is in actual operation; everything.
Algoritmi per Sistemi Distribuiti Strategici
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Towards a mobile content delivery network with a P2P architecture Carlos Quiroz.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
CMPT 401 Summer 2007 Dr. Alexandra Fedorova Lecture XV: Real P2P Systems.
Lecture 1 - Introduction 1.  Introduction to Game Theory  Basic Game Theory Examples  Strategic Games  More Game Theory Examples  Equilibrium  Mixed.
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
Peer-to-Peer Technology and Security Issues By Raul Rodriguez, Arash Zarrinbakhsh, Cynthia Roger and Phillip Shires College of Business Administration.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Peer-to-Peer Computing
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Introduction  What is an Operating System  What Operating Systems Do  How is it filling our life 1-1 Lecture 1.
1/29 A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Bobby Bhattacharjee Jonathan Katz Ruggero Morselli University of Maryland (Work.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Peer-to-peer: an overview Selo TE P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission.
# Idowu Samuel O. # Kashif Shahzad # Arif Kamal M7001E - Multimedia systems [ltu.se] ©2011.
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
Agent Based Modeling and Simulation
A Game Theoretic Framework for Incentives in P2P Systems --- CS. Uni. California Jun Cai Advisor: Jens Graupmann.
Web 2.0 Technology & Social Media 1. Web 2.0 Space Some of them are technological components (e.g., AJAX, RIA‘s, and XML/DHTML) Some are principles (e.g.,
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Quality Attributes of Web Software Applications – Jeff Offutt By Julia Erdman SE 510 October 8, 2003.
Yitzchak Rosenthal P2P Mechanism Design: Incentives in Peer-to-Peer Systems Paper By: Moshe Babaioff, John Chuang and Michal Feldman.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.
INFORMATION AND COMMUNICATION SYSTEMS MERIT 2008 Research Symposium Melbourne Engineering Graduates Look to the Future System Architecture An internetworking.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Ivan Osipkov Fighting Freeloaders in Decentralized P2P File Sharing Systems.
Autonomous Replication for High Availability in Unstructured P2P Systems Francisco Matias Cuenca-Acuna, Richard P. Martin, Thu D. Nguyen
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
A Peer-to-Peer Approach to Resource Discovery in Grid Environments (in HPDC’02, by U of Chicago) Gisik Kwon Nov. 18, 2002.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Network Economics -- Lecture 2: Incentives in P2P systems and reputation systems Patrick Loiseau EURECOM Fall 2012.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
How to Analyse Social Network? : Part 2 Game Theory Thank you for all referred contexts and figures.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Introduction1 From P2P to Web Services and Grids MM Lab. Catholic University of Daegu Ian J. Taylor.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Computer Science and Engineering 1 Mobile Computing and Security.
1 NETWORKING 2012 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 22, 2012 Reducing the History in Decentralized.
Bruce Hammer, Steve Wallis, Raymond Ho
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Peer-to-Peer Networks 15 Game Theory Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Topologies and behavioral properties of the network Yvon Kermarrec Based on tml.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Lecture XV: Real P2P Systems
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLOUD COMPUTING
An example of peer-to-peer application
Distributed Systems CS
Determining the Peer Resource Contributions in a P2P Contract
Distributed Systems CS
Presentation transcript:

On the Economics of P2P Systems Speaker Coby Fernandess

Internet Internet became a major force of change on civilization. The Internet itself is the largest distributed computer system. – Client Server Web browsers servers. Relational database servers. As computer networks evolve into more complex system, there is a growing demand for scalable and reliable system architecture.

Network Games Algorithms, games, and the internet. [Papa STOC01] The most significant characteristic of the internet is its social-economic complexity. The Internet is built, operated, and used by entities with diverse economic interests. – Surfers, ISP, Infrastructure provider., Web companies. The mathematical tools and the insights most appropriate for understanding the Internet may come from game theory.

Peer-to-Peer Systems Connectivity between computers shifts from centralized to highly distributed and symmetric systems. Initiated by the phenomenal popularity of p2p file sharing applications. – Napster, Gnutella and BitTorrent. Introduce pure symmetric (server-less) distributed systems. “web-communities" On the internet, where peers voluntary share resources.

Example - Content Distribution Next Popular File-sharing facilities such as, BitTorrent and Emule. Source may become choked with a “flash crowd”.

Collaborative Content Distribution Now, leave me alone!

Objective Incentives for Cooperation Design and implement distributed systems that encourage user cooperation: – incentive compatible p2p systems; inducing cooperation from strategic peers. I.e. prevent or limit “Free Riders”: – Users who attempt to benefit from the community resources without sharing their own resources. Characteristics: – Peers rational autonomous and unreliable. – No central authority. – Highly dynamic membership, (a.k.a. high turnover)

Monetary payments schemes Service consumers pay the service providers. Incentive compatibility: – Distributed Algorithmic Design Mechanism. Impractical since they require an infrastructure for accounting and payments. – Decentralized payment schemes. – Ad hoc networks.

Trust and Reputation System Trust is required for multiple entities to co- operate and share resources. Otherwise, either parties refuse to interact – increased costs. Trust and reputation play an important role in most disciplines, including sociology, economics and computer science. – Trust is the subjective expectation a node has about another node's future behavior, based on their history – Reputation is the perception a node creates through past actions about its intentions and norms.

Trust-Based Schemes Users can always base their actions on their own personal history – E.g., if A previously cooperated with me, I will now cooperate with A Numerous drawbacks to this approach – Repeated interactions with same peer may be infrequent – System boot-up. – Integration of new users.

Reputation-Based Schemes Information about parties’ past behavior can be disseminated through the network – Decisions about future actions no longer based on personal history alone. Newcomers: (Sybil attack) Desirable for network growth, but allows misbehaving users escape the consequences. – Irreplaceable pseudonyms requires central authority. – Penalty to newcomers. – Collusive behavior.

Robust Incentive Techniques for Peer-to- Peer Networks Generalized Prisoner’s Dilemma (GDP) in client/server encounter. The GPD payoff matrix satisfies: – Mutual cooperation has highest total payoff. – Defection (weakly) dominates cooperation.

Reputation System Use subjective reputation to deal with collusion. Max-flow algorithm works well (constant mean time version which doesn’t scale)

Decision Function Decision Function: – Use client ‘s reputation. – Require converge to cooperation – Robust against defection strategies and collision. – Generosity Cooperate with entity X with probability:

"Third of humanity has not yet made a phone call."