Peer-to-Peer Computing D. Milojicic, V. Kalogeraki, R. Lukose, K. Nagaraja, J. Pruyne, B. Richard, S. Rollins and Z. Xu Technical Report HPL-2002-57 HP.

Slides:



Advertisements
Similar presentations
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
Advertisements

Peer-to-peer and agent-based computing P2P Algorithms & Issues.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Peer-to-Peer Computing
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Introduction to client/server architecture
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Jay Sheth P2P Basics Jay Sheth CE, UMBC. Jay Sheth P2P Agenda What is P2P Why P2P Components and algorithms Characteristics Different P2P systems Future.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Lesson 3: Introduction to Internet Technology
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.

Survey of Peer to Peer Technologies Authors: Bratislav Milić, Jelena Krunić, Veljko Milutinović,
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
File Sharing Prepared By: Mahmud Gabareen Eyal Biber Itamar Arie Lecturer Iris Reinhartz-Berger.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
Sun’s Project JXTA Technical Overview Presented by Sergei Kovalenko Red Team: Janhavi James A. Davis Fernando D. Diaz.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
徐晨桓 李柏穎.  Definition  Introduction  History  Example - Napster  Example - Gnutella 徐晨桓 李柏穎 2/27.
1 A P2P Collaborative System Using JXTA Hosei Graduation School ITPC 02R3315 Katsuhiro CHIBA.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Colin J. MacDougall.  Class of Systems and Applications  “Employ distributed resources to perform a critical function in a decentralized manner”  Distributed.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Peer-to-Peer Computing Mrs. Tugba Taskaya-Temizel 13/February/2006.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
P2P Computing MIRA YUN September 16, Outline What is P2P P2P taxonomies Characteristics Different P2P systems Conclusion.
Internet Architecture and Governance
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Malugo – a scalable peer-to-peer storage system..
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLOUD COMPUTING
Introduction to client/server architecture
Lesson 3: Introduction to Internet Technology
Presentation transcript:

Peer-to-Peer Computing D. Milojicic, V. Kalogeraki, R. Lukose, K. Nagaraja, J. Pruyne, B. Richard, S. Rollins and Z. Xu Technical Report HPL HP Laboratories, Palo Alto March 2002

Introduction Peer-to-Peer (P2P) employ distributed resources to perform function in a decentralized manner –Resource can be: computing, storage, bandwidth… –Function can be: computing, data sharing, collaboration … The goal of this paper is to describe what is P2P and what is not P2P P2P gained visibility during Napster –But was here before (Doom, Internet telephony) –But has moved beyond (KaZaa, Gnutella) –And includes more Simple definition is it include sharing – giving and obtaining from peer community

Taxonomy of Computer Systems Centralized Client-Server Peer-to-Peer Simplified Architecture

What’s New and What’s Not

Taxonomy of P2P Systems

Degree of Centralization Initial communication is centralized (Tough to get around. For example, how to find peers?) Pure: Gnutella, Freenet Hybrid: Napster Intermediate: KaZaa (super peers) “Hybrid”

Decentralization and Taxonomy

Outline Introduction(done) Components and Algorithms(next) Systems Case Studies Summary

P2P Components (Specific applications here) (Overcome dynamic nature of peers) (Find and move data among) (Robust when peers autonomous) (Different data types)

P2P Algorithms – Centralized Index Search central index, download content from peer –Popular with Napster Need representation for “best” peer –Cheapest, closest, most available

P2P Algorithms – Flooded Requests Each request flooded (broadcast) to directly connected peers –Repeat until answered or too many hops (5-9) Uses lots of network capacity Revise with –“Super-Peer” to concentrate most requests –Caching of recent requests

P2P Algorithms – Document Routing When document published, generate hash based on name and content Move document node with ID closest to hash Requests also migrate to such node –Note, requires knowing document name ahead of time, so harder to do search

Outline Introduction(done) Components and Algorithms(done) Systems(next) Case Studies Summary

P2P Systems Historical Distributed Computing File Sharing Collaboration

Historical (1 of 2) Most early distributed systems were P2P –Examples: (on top of SMTP peers) Usenet News (on top of NNTP peers) –Local servers communicated with peers File Transfer (via FTP) centralized –But since many ran own server, similar to today’s file sharing –Indexing system named “Archie” to query across FTP servers Exactly like Napster

Historical (2 of 2) Prior to continuously connected computers (Internet) had UUNet and Fidonet –Would periodically dial-up and exchange information ( and bboard) –Message routing Similar to Gnutella In “modern” area, first widely used P2P was instant messaging P2P interest shift came because of legal ramifications (Napster) –(MLC: plus traffic! See next paper.)

P2P Systems Historical Distributed Computing File Sharing Collaboration

Distributed Computing Clusters –Inexpensive PCs plus open source software  super computer NASA’s Beowulf project, MOSIX, … –Issues include delegation and migration Grid computing –Connect distributed computers so can use idle cycles –Transparent way to add jobs, have work executed, results returned

Distributed Computing Historical –January 1999, 10k computers broke RSA challenge in less than 24 hours Users realized the power of Internet PCs Recent and –Realize a teraflop

How it Works Parallelizable job –Split into subtasks PCs agree to participate Centralized dispatcher When PCs idle (screensaver), subtasks work Send results to centralized DB P2P?

Application Area Examples Financial –Complex market simulations (pricing, portfolios, credit, …) –Run-during night, but real-time important –Plus, larger so only big institutions –Use P2P – speedup 15 hours to 30 minutes, and available to smaller companies Biotechnology –Colossal amounts of data (3 billion sequences in human genome dbase) –Only high-perf clusters and approximation –But using P2P can do exact and used by smaller companies

P2P Systems Historical Distributed Computing File Sharing Collaboration

File Sharing One of the most successful Features –Large, when otherwise could not store Multimedia content inherently large files –Available, from multiple sources –Anonymity to protect publisher and reader –Manageability for better performance (download from close hosts) Issues: bandwidth consumption, search, and security

File Sharing Examples Napster –Centralized index, single peer download –Since centralized does not scale well, performance may suffer Morpheus –Simultaneous downloads from multiple peers –Encryption for privacy KaZaa –Distribute centralized among SuperNodes –Use “intelligent” selection for peers –MD5 checksums to verify content

P2P Systems Historical Distributed Computing File Sharing Collaboration

Instant messaging to chat to online games Finding location of peers still a challenge Use centralized server for peer location –NetMeeting, GameSpy, … Use out-of-band system to identify peers –Ie- call on telephone and give IP

Outline Introduction(done) Components and Algorithms(done) Systems(done) Case Studies(next) Summary

Case Studies Avaki(distributed computing) (distributed computing) Groove(collaboration) Magi(collaboration) FreeNet(file sharing) Gnutella(file sharing) JXTA(platforms).Net(platforms)

Search for Extraterrestrial Intelligence Background –Search through massive amounts of radio telescope data to look for signals –Build huge virtual computer by using idle cycles on Internet computer Runs computation as part of screen saver –Old enough project so robust tools Features –Fault resilience – since clients can stop at anytime, use checkpointing every 10 minutes –Scalability – horizontal, but vertical (to db) could still be a bottleneck (still, many users) Lessons –Can apply this technology to real problems –Expected 100k participants, but have 3 million

Magi (1 of 2) P2P infrastructure for building secure, collaborative applications –Started as research project from UC Berkeley 1998, commercial release 2001 Uses standard technology: HTTP, XML, WebDAV –"Web-based Distributed Authoring and Versioning“ - extensions to HTTP to allow collaborative edits at remote web servers Was largest non-Sun Java project

Magi (2 of 2) Core is micro-Apache server Users could build modules over Magi services Uses DNS to find Magi servers No fault resilience JVM and Server means maybe tough for PDA Existing standards makes highly interoperable

FreeNet File sharing with primary design is to make system anonymous –Read, Publish, Store Completely decentralized –File location based on hash (and on path in-between) –Hash generated automatically –Users find hash names by out-of-band source (ie- posted on Web page) Nodes cache until full, then LRU Nodes do “search” to announce presence to others Scales to O(log n) Available as open source Lessons: issues of anonymity (good for discourse, bad for intellectual property rights)

.NET More than P2P (c#, tools, Web servers), but “My Services” has a lot of P2P stuff Microsoft introduced in 2000 Goals is to enable Web servers to variety of devices. Focus on user data. “Passport” login gives puid. That used for services. Cons: - only Windows?

Summary As P2P matures, infrastructure will improve –Increased interoperability –More robust software Will remain an important technology because: –Scalability a concern, especially with global connections –Ad-hoc, disconnected networks lend themselves to P2P –Some applications inherently P2p

Future Work Algorithms –Scalable, anonymity, connectivity Applications –Beyond music and movie sharing Platforms –Tools to build better, newer P2P systems