Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.

Slides:



Advertisements
Similar presentations
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Advertisements

Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
2: Application Layer P2P applications and Sockets.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
Peer-to-Peer Intro Jani & Sami Peltotalo.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Conclusions in Peer-to-Peer Systems Παρουσίαση: Τάσος Καραγιάννης, Σπυριδούλα Μαργαρίτη, Κώστας Στεφανίδης, Θοδωρής Τσώτσος.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
P2P File Sharing Systems
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
P2P Architecture Case Study: Gnutella Network
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.

BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
1 P2P Computing. 2 What is P2P? Server-Client model.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Introduction of P2P systems
Skype P2P Kedar Kulkarni 04/02/09.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Chapter 2: Application layer
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.
Peer-to-Peer File Sharing Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
An example of peer-to-peer application
Distributed Systems CS
CHAPTER 3 Architectures for Distributed Systems
Peer to Peer Information Retrieval
Distributed Systems CS
Presentation transcript:

Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University

Agenda  P2P overview  The Three Paradigms  Kazaa and BitTorrent  Conclusion  Q & A

What is P2P?  Tradition dictates a client-server model  P2P is alternative to client-server model  Peers send/receive information from each other  Utilize the bandwidth of all users  3 paradigms…

Centralized Directory  Central server  Advantages: Simple Simple Easy to maintain Easy to maintain  Disadvantages Single point of failure Single point of failure Single point of prosecution Single point of prosecution Bottleneck effect Bottleneck effect Source: Kurose and Ross, 2003

Decentralized Directory  AKA Super decentralized network  No central server  Advantages Distributed contents Smaller databases Harder to track  Disadvantages Bootstrap node Complex protocol Peers are ranked Source: Kurose and Ross, 2003

Query Flooding  AKA Equal decentralized network  All are created equal  Advantages Flat Flat No central directory No central directory  Disadvantages Scalability Scalability Does not search entire network Does not search entire network Source: Kurose and Ross, 2003

Kazaa Overview  3 million users  Definitive decentralized network  No central agent  No central agent means no need for a central point of management  At one point Kazaa held 76% of all the P2P traffic

Kazaa Screen Shot Source: HowStuffWorks.com

Kazaa Screen Shot Source: atFile.com

How does Kazaa achieve decentralization?  Users are categorized into two categories:  Ordinary Nodes (ON)  Super Nodes (SN)  Users are designated as ON or SN based on their system capabilities  Network connection  Bandwidth  Processing capabilities  Designation process is done without users knowledge  Result is that users do not know if they have been designated ON or SN

Super Decentralized (Revisted) Source: Kurose and Ross, 2003

Super Nodes  Kazaa has approximately 30,000 SNs  Each SN is like a traffic hub that processes requests from ONs  Each SN serves approximately ONs at a time  Each SN keeps a database of all the files that it’s ONs are sharing

User Requests  User requests are propagated to the SN which communicates with other SNs  Those other SNs communicate with their ONs with a search depth of 7 (similar to TTL)  When correct file is located the transfer occurs directly between the two nodes without SN intervention

Kazaa Network Topology Source: HowStuffWorks.com

User Request in detail  Query containing keywords is sent out over a TCP connection from ON to its SN  For each match the SN returns the IP address and metadata of the matching node  SNs will maintain a TCP connection between SNs creating an overlay network  Query is sent to one or more of the directly connected nodes between SNs  SNs will shuffle their directly connected nodes every 10 minutes in order to allow for a larger area of the network to be reached

Kazaa’s competion: BitTorrent  Kazaa is declining in popularity while BitTorrent is rising rapidly in popularity.  BitTorrent: User receives data from multiple sources at once  Data is split up into chunks  Each chunk is received from source with the best connection  Chunks are received randomly but can be reassembled  Separate channel available for uploading, even while downloading  Kazaa: User receives data from node that it has established connection with  Data is split up into chunks  Data is received in order

Topology of BitTorrent Source: BitTorrent.com

Looking for Torrents

BitTorrent Screen Shot Source: Sciencemedia.com

BitTorrent In Action

Conclusion  Centralized approach offers easy maintenance but too many legal and performance issues  Decentralized approach has a longer lifetime and more reliable service