Peer-to-Peer Computing

Slides:



Advertisements
Similar presentations
Data Storage Solutions Module 1.2. Data Storage Solutions Upon completion of this module, you will be able to: List the common storage media and solutions.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer-to-Peer (P2P) Distributed Storage 1Dennis Kafura – CS5204 – Operating Systems.
On the Economics of P2P Systems Speaker Coby Fernandess.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Other File Systems: AFS, Napster. 2 Recap NFS: –Server exposes one or more directories Client accesses them by mounting the directories –Stateless server.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
CSE331: Introduction to Networks and Security Lecture 14 Fall 2002.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Peer-to-peer: an overview Selo TE P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Jay Sheth P2P Basics Jay Sheth CE, UMBC. Jay Sheth P2P Agenda What is P2P Why P2P Components and algorithms Characteristics Different P2P systems Future.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Information-Centric Networks05b-1 Week 5 / Paper 2 A survey of peer-to-peer content distribution technologies –Stephanos Androutsellis-Theotokis, Diomidis.
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.

Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Peer To Peer Applications
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Colin J. MacDougall.  Class of Systems and Applications  “Employ distributed resources to perform a critical function in a decentralized manner”  Distributed.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Peer-to-Peer Computing Mrs. Tugba Taskaya-Temizel 13/February/2006.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
P2P Computing MIRA YUN September 16, Outline What is P2P P2P taxonomies Characteristics Different P2P systems Conclusion.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
POND: THE OCEANSTORE PROTOTYPE S. Rea, P. Eaton, D. Geels, H. Weatherspoon, J. Kubiatowicz U. C. Berkeley.
Peer to Peer Network Design Discovery and Routing algorithms
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Data Communications and Networks Chapter 9 – Distributed Systems ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Bruce Hammer, Steve Wallis, Raymond Ho
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Naming in Content-Oriented Architectures 1. select produce Data publishing RWINameKey Data own certify 2.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
Building Distributed Educational Applications using P2P
InfoShare A Distributed P2P Information Storage & Retrieval System
Presentation transcript:

Peer-to-Peer Computing Objectives What Does Peer-to-Peer Mean? Taxonomy Characteristics of P2P Systems P2P Systems Distributed Computing, File Sharing, Collaboration, and Platforms Strength and Weaknesses of P2P systems Non-Technical Challenges

What Does Peer-to-Peer Mean? Characterization from CFP of IPTPS 2004: decentralized self-organizing distributed systems in which all or most communication is symmetric

Benefits of P2P Systems Improving scalability There is no dependency on centralized points Eliminating the need for costly infrastructure Direct communication is enabled Enabling public resource aggregation

Introduction characteristics peer-to-peer client-server manageability self-organized managed configurability ad-hoc configured organization mesh hierarchy functionality discovery lookup nature mobile static dependency independent lifetime server dependencies components custom naming DNS-based

Computer Systems Taxonomy Centralized systems Distributed systems (e.g. mainframes,SMPs,workstations) Client-Server Peer-to-Peer Flat Hierarchical Pure Hybrid

distributed computing P2P Systems Taxonomy P2P Systems file sharing distributed computing collaborations platforms (e.g. Napster) (e.g. SETI@home) (e.g. Jabber,Groove) (e.g. JXTA,.Net)

Characteristics of P2P Systems Decentralization emphasis on user’s ownership and control of data and resources makes implementation of P2P model a challenge hybrid P2P (e.g. Napster) versus pure P2P (e.g. Gnutella) Scalability peers directly interact with other Napster was able to scale up to 6 million users at the peak of its time focusing on a task that is parallel SETI@home has over 3.5 million users so far

Characteristics of P2P Systems Anonymity multicasting can be used as a technique for Publisher anonymity identity spoofing can also be used for Publisher anonymity encryption, splitting files into shares, and splitting keys are techniques used for document anonymity Self-Organization it is essential for P2P systems to have self-organization since P2P systems are fluctuating environments

Characteristics of P2P Systems 128.59.16.12 128.119.40.186 multicast group 226.17.30.197 128.34.108.63 128.34.108.60 multicast group concept: use of indirection hosts addresses IP datagram to multicast group routers forward multicast datagrams to hosts that have “joined” that multicast group

Characteristics of P2P Systems Cost of Ownership shared ownership reduces the cost of owning the systems, the content, and the cost of maintenance SETI@home is faster than the fastest supercomputer in the world, but only at a fraction of its cost: 1% Ad-Hoc Connectivity variable-size pool of resources ad-hoc nature of content sharing ad-hoc nature of connectivity

Characteristics of P2P Systems Performance replication reduces the distance between requester and provider copes with the disappearance of peers caching reduces the path length required to fetch a file/object caching replicas can be used for load balancing intelligent routing and network organization sending requests to closely located peers group peers based on common interest improve performance by proactively moving data

Characteristics of P2P Systems Security P2P share most of their security needs with common distributed systems session key exchange, encryption, digital signatures, etc. sandboxing safety properties such that the external code will not crash the host box enforcing security properties to prevent sensitive data from leakage to malicious peers digital rights management protecting the authors from having their intellectual property stolen watermarking

P2P Systems Strengths P2P has more decentralized control and data P2P supports systems whose parts come and go cost of ownership is distributed among the peers peers can be anonymous due to the higher decentralization nature of P2P systems scalability, performance, and self-organization can be better satisfied

P2P Systems Weakness Security Interoperability sufficient guarantees of additional trust has to be established among the peers Need to model trust Interoperability is a matter of investment as development proceeds, more interoperability may evolve getting P2P applications to interoperate with each other is possible For example, implementing common protocols or using standardized messaging formats based on XML while P2P applications may be closer to talking with one another, they are still separate applications with their own baggage, consuming their own share of resources

P2P Systems Weakness Non-altruism in Gnutella 70% of all users do not share files 50% of all requests are satisfied by the top 1% sharing hosts incentive mechanisms are needed reputation-based incentives economic-based incentives Service-quality-based incentives The success of P2P systems depends on altruism

Non-Technical Challenges Acceptance and Use peers rely on one another freeloaders peers are not alike Fragmentation of user base the overall utility of P2P systems is limited because of fragmentation interoperability seems to be the only solution Release of control Recording Industry Association of America’s (RIAA) lawsuit against Napster