Review of Free Riding on Gnutella Eytan Adar and Bernardo Huberman Shreeram Sahasrabudhe.

Slides:



Advertisements
Similar presentations
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
Advertisements

Peer-to-peer and agent-based computing P2P Algorithms.
Peer-to-Peer and Social Networks An overview of Gnutella.
Intelligent File System Changgyu Oh 04/02/02. Problem Domain(1) Scalability of Current Decentralized P2P Networks similar to Gnutella –A total number.
PEER-TO-PEER Is a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures,
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Name Services Jessie Crane CPSC 550. History ARPAnet – experimental computer network (late 1960s) hosts.txt – a file that contained all the information.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Free-rider problem in peer-to- peer networks Sumitra Ganesh.
A Measurement Study of Peer-to- Peer File Sharing Systems Sariou, Gummadi, and Gribble.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Peer-to-peer: an overview Selo TE P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission.
CPSC 441: DNS1 Instructor: Anirban Mahanti Office: ICT Class Location: ICT 121 Lectures: MWF 12:00 – 12:50 Notes derived.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Analyzing Peer-to-Peer Traffic Across Large Networks Jia Wang Joint work with Subhabrata Sen AT&T Labs - Research.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Peer-2-Peer File Sharing Kenie Moses TECH621Social Internet Spring 2011.
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
P2P File Sharing Systems
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 10 Omar Meqdadi Department of Computer Science and Software Engineering University.
Gnutella2: A Better Gnutella?

DNS: Domain Name System
DNS: Domain Name System People: many identifiers: – SSN, name, Passport # Internet hosts, routers: – IP address (32 bit) - used for addressing datagrams.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 2: Application layer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
1 Peer-to-Peer Communication Research Project Presentation 2002 – Sukmin Kim – Srikara Hrushikesh CIS 585.
GNUTELLA PEER-TO-PEER NETWORKING. GNUTELLA n What is Gnutella n Relation to the World Wide Web n How it Works n Sites / Links / Information.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Exercises for Chapter 10: Peer-to-Peer Systems Peer-to-Peer Systems
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
CPSC 441: DNS 1. DNS: Domain Name System Internet hosts: m IP address (32 bit) - used for addressing datagrams m “name”, e.g., - used by.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
CS 3830 Day 10 Introduction 1-1. Announcements r Quiz #2 this Friday r Program 2 posted yesterday 2: Application Layer 2.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:
Unit - III. Providing a Caching Proxy Server (1) A caching proxy server is software that stores (caches) frequently requested internet objects such as.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Web Server Administration Chapter 4 Name Resolution.
Peer to Peer Networking. Network Models => Mainframe Ex: Terminal User needs direct connection to mainframe Secure Account driven  administrator controlled.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
1. Internet hosts:  IP address (32 bit) - used for addressing datagrams  “name”, e.g., ww.yahoo.com - used by humans DNS: provides translation between.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
1 Gnutella. 2 Overview r P2P search mechanism r Simple and straightforward r Completely decentralized r Creates overlay network r Different applications.
BitTorrent Vs Gnutella.
Peer-to-Peer and Social Networks
A Measurement Study of Peer-to-Peer File Sharing Systems
Presentation transcript:

Review of Free Riding on Gnutella Eytan Adar and Bernardo Huberman Shreeram Sahasrabudhe

Jargon Gnutella -Protocol created by nullsoft guys (Winamp), network followed -Decentralized and Peer- to-Peer -Anonymity maintained -Limewire, Morpheus etc. use this protocol Free Riding 1> Peers that only download files without ever providing files for others 2> Peers providing files but not contributing to the desirable content on the network

What it [paper] speaks? Presents an extensive experimental analysis to illustrate and caution us about the effects of free riding in the Gnutella Network. Argues that Free Riding leads to –System Degradation –Adds Vulnerability to the system First proves that Free Riding does occur Gives three hypothesis (confirms by experiments) 1. A significant portion of Gnutella peers are free riders 2. Free riders are distributed evenly across different domains (and by bandwidth) 3. Peers that provide files for download are not necessarily those from which files are downloaded

Experiment Setup –Java based Furi client [Fu00] (A Gnutella Client) was modified to log messages flowing through. –Executed for 24hr period –Logged the ping (are you there?), pong (IP, port, # of files shared and the total size) and Query Response Messages (IP, port, ClientID, other location info) –Also considers effects NAT based peers some of which can report the same address. –33,335 hosts sharing 3,100,464 files, 87,668 query response messages

Experiment 1 (Free Riding) Approximately 69% (inc NAT based peers) of the peers share no files and 73% share ten or less files. Top 1% represent approximately 37 percent of the total files shared. This quickly escalates to the top 20% sharing 98% of the files. 63% of those sharing files never provided a query response. Again top 1% provides 47% answers. Sorted by the number of files they offer Hosts providing NO files

Experiment 2 (Free Distribution) Domains can function as a proxy for bandwidth Filtered the test set to 26,014 peers with IP  hostnames Peer count linearly related to files shared Even distribution of free riders TLD (top-level domain e.g (edu, net, org..)

Concentrated queries on particular topics Number of queries answered is not necessarily proportional to the number of files offered. Experiment 3 (“quality” vs. quantity)

Effect(s) Network – Two Factors Cause: Ultimately few individuals will contribute anything that is new and high quality. (The Tragedy of the Digital Commons) Solutions: Uploading files Peers participating actively in the protocol  Search Horizon Increases - Hosts can become unreachable  Saturation - Peers have limited number of connections Vulnerability The few providers begin to appear as a centralized server consisting of several peers. Prosecuting Agencies like RIAA can target top-serving peers Loss of anonymity Collapse

Solution - Free Riding FreeNet –Forces caching of downloaded files Users must know -> Identifiers for files Can replicate harmful / illegal data and taint hosts Napster –Defaults download directory to be the upload directory Spawn – buy & sell; public  private Usenet - Reduce the personal storage and BW cost