Design considerations for P2P Stefan Saroiu, Krishna Gummadi, Steve Gribble Department of Computer Science and Engineering University of Washington

Slides:



Advertisements
Similar presentations
SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Microsoft Research.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Towards a Logic for Wide-Area Internet Routing Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Kunal.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Presented by Elisavet Kozyri. A distributed application architecture that partitions tasks or work loads between peers Main actions: Find the owner of.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
King : Estimating latency between arbitrary Internet end hosts Krishna Gummadi, Stefan Saroiu Steven D. Gribble University of Washington Presented by:
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Presented by.
PSMC Proxy Server-based Multipath Connection CS 526 Advanced Networking - Richard White.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Microsoft Research.
OSD Metadata Management
SERVER LOAD BALANCING Presented By : Priya Palanivelu.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Anycast Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Object Naming & Content based Object Search 2/3/2003.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Routing as a Service Karthik Lakshminarayanan (with Ion Stoica and Scott Shenker) Sahara/i3 retreat, January 2004.
Wide-area cooperative storage with CFS
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
What Can Databases Do for Peer-to-Peer Steven Gribble, Alon Halevy, Zachary Ives, Maya Rodrig, Dan Suciu Presented by: Ryan Huebsch CS294-4 P2P Systems.
A Scalable, Commodity Data Center Network Architecture.
Structured P2P Network Group14: Qiwei Zhang; Shi Yan; Dawei Ouyang; Boyu Sun.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks IPTPS Feb. 25, 2005 Byung-Gon Chun, Ben Y. Zhao, and John Kubiatowicz.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Chapter 2 ARCHITECTURES.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Network Computing Laboratory Scalable File Sharing System Using Distributed Hash Table Idea Proposal April 14, 2005 Presentation by Jaesun Han.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
DISTRIBUTED COMPUTING Introduction Dr. Yingwu Zhu.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Peer to Peer Network Design Discovery and Routing algorithms
CSE 486/586, Spring 2014 CSE 486/586 Distributed Systems Distributed Hash Tables Steve Ko Computer Sciences and Engineering University at Buffalo.
Bruce Hammer, Steve Wallis, Raymond Ho
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Peer-to-Peer (P2P) File Systems. P2P File Systems CS 5204 – Fall, Peer-to-Peer Systems Definition: “Peer-to-peer systems can be characterized as.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
CSE 486/586 Distributed Systems Distributed Hash Tables
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Peer-to-Peer Information Systems Week 12: Naming
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
CSE 486/586 Distributed Systems Distributed Hash Tables
CHAPTER 3 Architectures for Distributed Systems
A Measurement Study of Napster and Gnutella
CSE 486/586 Distributed Systems Distributed Hash Tables
Peer-to-Peer Information Systems Week 12: Naming
Presentation transcript:

Design considerations for P2P Stefan Saroiu, Krishna Gummadi, Steve Gribble Department of Computer Science and Engineering University of Washington

IPTPS 2002Saroiu, Gummadi, Gribble What this talk is about Peer-to-Peer systems have arrivedPeer-to-Peer systems have arrived – but, are they here to stay? – many things work well, but many things are still missing Goals of this talk:Goals of this talk: – to argue that current P2P designs are missing crucial properties – to show how specific architectural decisions have led to the loss of these properties – to encourage this community to recapture these properties in their designs, so that our systems are practical and successful

IPTPS 2002Saroiu, Gummadi, Gribble The Good and the Bad P2P systems have achieved several goalsP2P systems have achieved several goals – decentralized and symmetric infrastructure – evenly sharing resources and responsibilities among participants But, some things are still missingBut, some things are still missing – we’ve lost a few “ilities”: securability: more vulnerable to malicious attack composability: can’t transparently compose functionality into the system predictability and controllability: cannot easily engineer system to provision for performance, reliability, workload or value

IPTPS 2002Saroiu, Gummadi, Gribble How to show why this has happened Start with a well understood distributed system that is known to have all of the “ilities”Start with a well understood distributed system that is known to have all of the “ilities” – the WWW Compare its architecture to a representative P2P systemCompare its architecture to a representative P2P system – Chord/CFS [but we could use any of CAN, Pastry, Tapestry, …] Figure out the differences, and draw implicationsFigure out the differences, and draw implications – show how the difference lead to loss of the properties Convince you that we need to recapture back these “ilities”Convince you that we need to recapture back these “ilities”

NameAddressRoutingLookupTopology WWWURLIP Address- based DNS Physical, arbitrary The Architecture of the Web

NameAddressRoutingLookupTopology WWWURLIP Address- based DNS Physical, arbitrary Chord/CFS Chord ID Chord ID-based, implicit, deterministic Logical, deterministic, random Contrasting the Web with P2P

IPTPS 2002Saroiu, Gummadi, Gribble Collapsing name and address space A name is an addressA name is an address – the ability to create an address implies control over certain names – lose controllability: cannot separately grant authority over names and addresses must engineer other (higher level) mechanisms The name of content dictates the node that must manage itThe name of content dictates the node that must manage it – inserting content into the system forces others to do work on my behalf, and others can force me to do work – lose securability: denial of service attacks are possible

IPTPS 2002Saroiu, Gummadi, Gribble Collapsing routing and lookup Name-based routingName-based routing – lack of explicit lookup system removes a level of indirection lose composability: harder to make replication transparent to the client Servers must now be routers: roles are not separableServers must now be routers: roles are not separable – cannot have different levels of trust Web: core routers typically more trustworthy than web servers P2P: lose controllability, cannot engineer trust according to role – failure of routing and content serving is intertwined Web: failure of server doesn’t affect routing to other servers P2P: lose controllability, isolation of failures is lost

IPTPS 2002Saroiu, Gummadi, Gribble Topology is deterministic Chord IDs of participants dictates overlay topologyChord IDs of participants dictates overlay topology – lose securability: possible to attack system by choosing content/server address can hijack content by choosing appropriate address can surround and “monitor” a node in system by choosing address – lose controllability: harder to do policy-based routing set of routes available is dictated by nodes that participate

IPTPS 2002Saroiu, Gummadi, Gribble Topology is randomized Hashing spreads mapping of overlay to physical linksHashing spreads mapping of overlay to physical links – lose controllability and predictability: can’t predict the nodes or physical links involved with content cannot do local provisioning for hotspots, high value content content provider must trust strangers to provide high quality of service – randomness amplifies bad local properties of system, but not good a 1000 node Chord overlay with 20% modems has >80% slow paths

IPTPS 2002Saroiu, Gummadi, GribbleSummary Architectural decisions have several implicationsArchitectural decisions have several implications – helped to simplify systems and achieve many good properties – but, have also lost several crucial “ilities” composability: transparently compose functionality into system securability: prevent certain classes of attacks –e.g., denial of service by forcing others to do work predictability: anticipate which nodes/links are involved with content –randomness diffuses local properties globally, and amplifies the bad controllability: ability to engineer roles, resources, and responsibilities –e.g., don’t want to have to depend on others for quality of my content

IPTPS 2002Saroiu, Gummadi, Gribble Moving Forward To mature P2P systems into a practical application infrastructure, we need to recapture the “ilities”To mature P2P systems into a practical application infrastructure, we need to recapture the “ilities” – ability to enforce: who publishes, who participates – ability to engineer according to: specific load, value of content – ability to delegate and engineer responsibilities by: trustworthiness, capability of contributing resources Otherwise, our systems will fail for reasons that are incidental to the current design goalsOtherwise, our systems will fail for reasons that are incidental to the current design goals – why? because these are the pragmatic, engineering reasons that world needs to make a system successful in practice