P2P Application Classes and the IETF What do we have? : What are we missing? David Bryan P2PSIP WG co-chair Polycom July 28, 2011.

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Advertisements

P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
NAT Traversal for P2PSIP Philip Matthews Avaya. Peer X Peer Y Peer W 2. P2PSIP Network Establishing new Peer Protocol connection Peer Protocol messages.
Comparison between Skype and SIP- based Peer-to-Peer Voice-Over-IP Overlay Network Johnson Lee EECE 565 Data Communications.
Scope Discussion Seems to be a good deal of interest in moving this toward a working group If we want to work toward this, we need to have a clearly defined.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman:
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Protocols By Rakesh Chukkapalli CS 484.  Peer-to-Peer = P2P  The term peer-to-peer was coined as far as back in the mid-1980s by LAN vendors to describe.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Object Naming & Content based Object Search 2/3/2003.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
IETF P2P Mechanisms Wes Eddy / TSV AD MTI Systems TSVAREA IETF 81 – Quebec City, July 2011.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 Tracker Protocol Proposal.
Draft-gu-ppsp-protocol-00 PPSP Session IETF 77, Anaheim March 22, 2010.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)

PPSP Tracker Protocol draft-gu-ppsp-tracker-protocol PPSP WG IETF 82 Taipei Rui Cruz (presenter) Mário Nunes, Yingjie Gu, Jinwei Xia, David Bryan, João.
P2PSIP Charter Proposal Many people helped write this charter…
Throughput: Internet scenario
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
The application of P2P technology. Team Member: LIU Chang, ZHANG jianing Presentation: LIU Chang.
Chapter 2: Application layer
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 PPSP Protocol Considerations.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
TELECOM ITALIA GROUP P2P-TV Workshop Torino, Jan 2011 Application-Layer Traffic Optimization How did we get here? Where are we going? Enrico Marocco
PPSP Problem Statement Y.Zhang, N.Zong, G.Camarillo,J.Seng,R.Yang Maastricht July 27,2010.
ECEN “Internet Protocols and Modeling”, Spring 2012 Slide 2.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
HUAWEI TECHNOLOGIES CO., LTD. Page 1 Survey of P2P Streaming HUAWEI TECHNOLOGIES CO., LTD. Ning Zong, Johnson Jiang.
PPSP Peer Protocol draft-gu-ppsp-peer-protocol PPSP WG IETF 82 Taipei Rui Cruz (presenter) Yingjie Gu, Jinwei Xia, Mário Nunes, David Bryan, João Taveira.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Peer-to-Peer Systems Rodrigo Rodrigues Peter Druschel Max Planck Institute for Software Systems.
Problem Statement of Peer to Peer Streaming Protocol (PPSP) Yunfei Zhang Ning Zong Gonzalo Camarillo David Byran Hirold Liu Yingjie Gu.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Content distribution and “protocol”: from hierarchical trees to distributed graphs Jason Gaedtke November 7, 2007.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
SIPeerior Technologies A superior way to connect Emerging IETF Standards Work on P2PSIP David A. Bryan.
PPSP BAR BOF meeting 74th IETF – San Francisco, CA, USA March, 2009 P2P Streaming Protocol (PPSP) Requirements Ning Zong,Huawei Technologies Yunfei Zhang,China.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Requirements for Peer protocol draft-jiang-p2psip-peer-protocol-requirement-00.txt Jiang XingFeng (Johnson) P2PSIP WG, IETF #68.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
P2P Streaming Protocol (PPSP) Requirements draft-zong-ppsp-reqs-02 Ning Zong Yunfei Zhang Victor Pascual Carl Williams.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
DECADE Requirements draft-gu-decade-reqs-05 Yingjie Gu, David A. Bryan, Y. Richard Yang, Richard Alimi IETF-78 Maastricht, DECADE Session.
Multicast in Information-Centric Networking March 2012.
Skype.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
Peer to peer Internet telephony challenges, status and trend
Challenges with developing a Commercial P2P System
draft-gu-ppsp-peer-protocol-01
Presentation transcript:

P2P Application Classes and the IETF What do we have? : What are we missing? David Bryan P2PSIP WG co-chair Polycom July 28, 2011

Introduction Cover major classes of P2P applications – History of them, big problems, how they touch the IETF What I mean here by “P2P” – P2P isn’t new. Using the modern sense of the word P2P between clients, includes hybrid architectures – Excluding early things like SMTP, BGP This is a very simplistic and incomplete view – Many other P2P things out there, touching on major ones High level here – major common tasks of P2P apps 2

Outline Cover major classes of applications – Discussion of transport considerations of each What are the major “tasks” P2P applications perform, and which application classes use each? – Where do we have an existing IETF protocol for each task? – Where is work going on that could address the task? 3

File Sharing This was where the “new” P2P got started – Napster, Kazaa, Gnutella, etc. Have been a variety of approaches – (semi)-central server, direct data exchange Napster (index server), BitTorrent (tracker) – Fully decentralized, flood based Gnutella – Structured, DHT (Distributed Hash Table) based Not widely used in “commercial” file sharing Originally music, most volume now video. Many uses Major transport considerations: large volumes of data between endpoints, often “odd” techniques to game transport 4

Video Streaming/P2PTV Some fuzzy lines with file sharing – Some P2P VoD works like file sharing (not real time) – True streaming share live, real-time video – Many services offer both PPLive, Octoshape, Joost (early) Major transport considerations: fairly tight real-time constraints, often many simultaneous participants 5

Communications Skype – Directly connects end users for voice, video – Massive scale (170m users, 207b minutes) Cisco Intercompany Media Engine – Uses a structured P2P approach to connect enterprises to complete calls – Based on P2PSIP RELOAD and ViPR work Major transport considerations: need for bi- directional media, very tight real-time constraints, relay considerations 6

Other Applications P2P CDNs – Either P2P is used in the back, or hybrid P2P and CDN (Pando) P2P “money” – BitCoin is a decentralized currency Interesting aspects are primarily crpyto/computational (proof-of-work), not networking Clients do connect with a P2P structure to authenticate coins and exchange information P2P DNS 7

IETF Efforts What are some common P2P functions (“tasks”), and where/are these addressed in the IETF? – Broader uses for the application-specific P2P groups (PPSP, P2PSIP) products – Applicability of the generic P2P groups (ALTO, DECADE, LEDBAT) – Non-P2P protocols that are being reused – Future work that might be applicable (if WGs go that way) How do the tasks and IETF P2P efforts (mostly now in TSV) touch these application classes? 8

Task: Forming/Maintaining an Overlay Overlay structures actually differ quite a bit – DHTs – Broadcast Tree – Unstructured meshes, etc. Common to all apps is a need to learn about and exchange information about other peers Today’s situation – Applications use many different structures – Most use proprietary on-the-wire encoding 9

Forming/Maintaining an Overlay RELOAD in P2PSIP – Designed generically, targeting DHTs Modularity of DHTs considered, pluggable Standardized mechanism for exchanging messages – Attempted to support unstructured overlays in design To date, has not been tried PPSP Peer Protocol proposals – WG looking at connecting peers for streaming – May use RELOAD, may build a new (lighter?) protocol May also only cover information exchanged (not address organization of the peers themselves) WG still debating direction 10

Task: Search (Peer and Data Location) Again, cross-application need to locate peers Method can have large impact on network (flood) Locating using DHT (structured search) – RELOAD supports DHT hash-based search – No explicit support for other forms of search Central index server / learn from peers – PPSP is considering a tracker/index server protocol to locate peers Unstructured search – PPSP also considering allowing peers to learn from other peers in peer protocol Again, PPSP work is early – unclear how modular or what will actually be work items 11

Task: Exchanging Data Most significant implications for transport Many apps applications use naïve (or harmful) mechanisms today (i.e. many simultaneous HTTP streams) Efforts in IETF to address this: – LEDBAT: provide efficient data exchange without adding delay – DECADE: provide generic in-network storage to minimize last-mile traffic – ALTO: Locate optimal peers/hosts to obtain data from candidates Need to identify which mechanism/protocols are appropriate for applications to transfer data – DECADE currently plans to consider existing mechanisms – Can that effort be used generically? – Should the IETF provide guidance based on transfer patterns? 12

Task: Identity, Reputation and Security Strong need to identify peers, verify identity, decide who to trust, and secure connections Some specific P2P work in IETF – RELOAD (P2PSIP): provide a centrally-issued certificate identity system for overlays – DECADE: mechanism to centrally issue tokens used to authorize access to data in other locations – ViPR group is working on a very specific identity problem (P2P proof of phone number ownership) To date, no IETF P2P-work on reputation – Is there work in security area? New work to be done? Many non-P2P efforts of IETF applicable – TLS etc. 13

Task: NAT Traversal Today, P2P NAT traversal is generally either tunneling or uses IETF suite Work on this issue is being done in IETF, but not in P2P specific group – Problem is exacerbated by, but not uniquely P2P 14

What is the IETF missing? Some “pieces” that we don’t currently have solutions for – Places where work is underway that might be used for this (depending on what WG does) Clearly agreed upon mechanism to exchange data between peers – DECADE planning to identify mechanism for their use Protocol for non-DHT peer structures – Current work on PPSP Peer Protocol might address this Protocol for central tracker/index server – PPSP Tracker Protocol looks likely to address this issue One-to-many transport issues (multicast systems for streaming video) More distributed identity solutions, reputation systems – Some of this is still not well understood (research issues) 15

Conclusion IETF is addressing many critical issues to P2P Transport related issues are very important in design of P2P protocols Still lots of work before one could make a complete P2P solution using IETF pieces 16

Conclusion P2P is a set of techniques/implementation approach, not an application per-se Some work at IETF on generic P2P techniques, some on specific applications that happen to be P2P We are assembling a suite of protocols that can be used in P2P applications for more rapid development, better interoperability 17