Peer-to-Peer System Ali Ghodsi Swedish Institute of Computer Science Royal Institute of Technology (KTH)

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Name Services Jessie Crane CPSC 550. History ARPAnet – experimental computer network (late 1960s) hosts.txt – a file that contained all the information.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Other File Systems: AFS, Napster. 2 Recap NFS: –Server exposes one or more directories Client accesses them by mounting the directories –Stateless server.
Based on last years lecture notes, used by Juha Takkinen.
Adaptive Directory Services for Highly Dynamic Environments Fabio Kon Department of Computer Science University of São Paulo, Brazil
Background Info The UK Mirror Service provides mirror copies of data and programs from many sources all over the world. This enables users in the UK to.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Signing and Encrypting With the Thawte Web of Trust CSU Professional Development Institute January 8, 2009 Steve Lovaas.
Conclusions in Peer-to-Peer Systems Παρουσίαση: Τάσος Καραγιάννης, Σπυριδούλα Μαργαρίτη, Κώστας Στεφανίδης, Θοδωρής Τσώτσος.
Reduce your costs Without reducing your effectiveness.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Symmetric Replication in Structured Peer-to-Peer Systems Ali Ghodsi, Luc Onana Alima, Seif Haridi.
Web Based Applications
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Chapter 7: Using Windows Servers to Share Information.
Describe the following features of LAN’s, WAN’s, and the internet: transmission media, bandwidth, geographical spread and functions. Description of a.
Module 5: Managing Public Folders. Overview Managing Public Folder Data Managing Network Access to Public Folders Publishing an Outlook 2003 Form Discussion:
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Scalability Terminology: Farms, Clones, Partitions, and Packs: RACS and RAPS Bill Devlin, Jim Cray, Bill Laing, George Spix Microsoft Research Dec
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
CLIENT SERVER VS PEER TO PEER Networks. Lesson objectives Candidates should understand the advantages and disadvantages of: client server networks peer.
NETWORK SERVERS Oliver Topping (with a little help from my Mum)
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
1 © Copyright IBM Corporation 2000 TPF in a Distributed World Stuart Waldron October 16, 2000 Any references to future plans are for planning purposes.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
ONE® Pages Training Presentation North York General Hospital.
Chap 7: Consistency and Replication
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Communications & Networks National 4 & 5 Computing Science.
Distributed Computing Systems CSCI 4780/6780. Scalability ConceptExample Centralized servicesA single server for all users Centralized dataA single on-line.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
CITA 310 Section 3 Additional Topics. Common IPv4 Classes ClassFirst numberSubnet maskNumber of networks Number of addresses Class A0 – ,777,216.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Bruce Hammer, Steve Wallis, Raymond Ho
Peer-to-peer systems ”Sharing is caring”. Why P2P? Client-server systems limited by management and bandwidth P2P uses network resources at the edges.
2 nd lecture Presented by Dr. Sarah Mustafa Eljack.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Objectives.  is short for electronic mail.  It allows you to quickly send a message to anyone else in the world as long as they have their.
Napster and Gnutella Protocols English micro-project Guillaume CASSIN May 31, 2001.
Composing Web Services and P2P Infrastructure. PRESENTATION FLOW Related Works Paper Idea Our Project Infrastructure.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
CONFIGURING A MICROSOFT EXCHANGE SERVER 2003 INFRASTRUCTURE
TYPES OF SERVER. TYPES OF SERVER What is a server.
IBM WEBSPHERE MESSAGE QUEUE online Training | IBM WEBSPHERE MQ Training
Cloud system.
Network Media, models and number systems
Administering Your Network
Communications & Computer Networks Resource Notes - Introduction
Online software and backups
Windows Server Administration Fundamentals
LO3 – Understand Business IT Systems
Presentation transcript:

Peer-to-Peer System Ali Ghodsi Swedish Institute of Computer Science Royal Institute of Technology (KTH)

Definition What is a distributed system? Leslie Lamport ”You know you have a distributed system when the crash of a computer you have never heard of stops you from getting any work done.” We counteract this definition!

Distributed Systems Example of distributed systems: –File systems –Web servers –Mail servers –Databases Frequently, an organization stores all its files on a centralized distributed file server If it fails, no one can access their files Webb servers often become overloaded and fail The central mail server crashes, no one can read their !

Our effort Build on an 30-year old idea Arpanet, the precursor of Internet, was built for: –Military survivability If some part stops working, the rest should continue to function Internet has been quite successful so far… –No fail-stop yet But the effort stopped here…

Peer-to-Peer System We want to build –Services –Servers –Applications That are self-managed Achieved by peer-to-peer techniques!

Peer-to-Peer Middleware After several years of research –Built a middleware: DKS Provides: –Routing services –Directory services –Name-based messaging (multicast/publish/subscribe)

Peer-to-Peer System DKS is self-managing Automatic managent: –Adding servers/resources –Removing servers/resources –Crash of servers/resources –Load balancing of data/nodes –Security

Peer-to-Peer? How is it different from: –KaZaa –Napster –Gnutella –Skype These are so called unstructured p2p systems –Limited applicability (file sharing) –Inefficient (wastes bandwidth) Our focus is on structured p2p systems –Chord/CAN/Pastry (USA) –DKS/P-Grid (Europe)

What can we do with DKS? Three concrete applications: –P2P Web server –P2P Backup –P2P File system

P2P Web Works like an ordinary web server Differences: –It is distributed –Automatic data replication –Load-balancing of users Too much load –Add another server Publish your web pages Gets stored on the DKS Store it here Store a new copy here Store a copy here

P2P Backup Initialization –Install a client on your computer –Decide on amount of space to share –Choose files for backup Regular backup –Data is encrypted –Always accessible

Conclusion Structured Peer-to-Peer system –Self-organizing Automatic fault-tolerance Automatic addition of nodes/resources Automatic removal of nodes/resources Automatic load-balancing Many interesting applications –File systems –Backup –Web –M.m. Cost-saving for companies –Save money on administration