Christina Aperjis, Michael J. Freedman and Ramesh Johari Presented By Vidya Nalan Chakravarthy.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
Incentives Build Robustness in BitTorrent Bram Cohen.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
A Lightweight Currency-based P2P VoD Incentive Mechanism Presented by Svetlana Geldfeld by Chi Wang, Hongbo Wang, Yu Lin, and Shanzhi Chen.
The Role of Prices in Peer-Assisted Content Distribution Christina Aperijis Michael J. Freedman Ramesh Johari Presented by: Kyle Chauvin and Henry Xie.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Resource Pooling A system exhibits complete resource pooling if it behaves as if there was a single pooled resource. The Internet has many mechanisms for.
Towards Efficient Simulation of Large Scale P2P Networks
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Technical Architectures
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Service Differentiated Peer Selection An Incentive Mechanism for Peer-to-Peer Media Streaming Ahsan Habib, Member, IEEE, and John Chuang, Member, IEEE.
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Transaction Processing IS698 Min Song. 2 What is a Transaction?  When an event in the real world changes the state of the enterprise, a transaction is.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Distributed-Dynamic Capacity Contracting: A congestion pricing framework for Diff-Serv Murat Yuksel and Shivkumar Kalyanaraman Rensselaer Polytechnic Institute,
Wide-area cooperative storage with CFS
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Definition of terms Definition of terms Explain business conditions driving distributed databases Explain business conditions driving distributed databases.
On-Demand Media Streaming Over the Internet Mohamed M. Hefeeda, Bharat K. Bhargava Presented by Sam Distributed Computing Systems, FTDCS Proceedings.
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
DATABASE MANAGEMENT SYSTEMS 2 ANGELITO I. CUNANAN JR.
Distributed Databases
P2P File Sharing Systems
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
Michael Sirivianos Xiaowei Yang Stanislaw Jarecki Presented by Vidya Nalan Chakravarthy.
Presenter: Dipesh Gautam.  Introduction  Why Data Grid?  High Level View  Design Considerations  Data Grid Services  Topology  Grids and Cloud.
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
Do incentives build robustness in BitTorrent? Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani.
Data Communications & Computer Networks, Second Edition1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Checking Accounts. What is a checking account? A bank account that allows easy access to the funds. You can use your checking account to pay bills. With.
Topic: P2P Trading in Social Networks: The Value of Staying Connected The purpose of this paper is to propose a P2P incentive paradigm named Networked.
Chapter 10: MANs and WANs. Topics What is MAN, WAN? How are they different from LANs? Subnet and three different switched-networks Connection-oriented.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Ch. 11 General Equilibrium and the Efficiency of Perfect Competition
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
William Stallings Data and Computer Communications
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
An example of peer-to-peer application
Distributed Systems CS
ISP and Egress Path Selection for Multihomed Networks
An Introduction to Computer Networking
Goals Introduce the Windows Server 2003 family of operating systems
Distributed computing deals with hardware
Software models - Software Architecture Design Patterns
Distributed Systems CS
Types of topology. Bus topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly.
Towards Predictable Datacenter Networks
Presentation transcript:

Christina Aperjis, Michael J. Freedman and Ramesh Johari Presented By Vidya Nalan Chakravarthy

Abstract Role of prices Price – based multilateral exchange User Incentives Hierarchical network model PACE – Peer Assisted Content Exchange Simulation Analysis Conclusions

Introduction P2P systems - Bit torrent Bilateral barter content exchange mechanism Problems Resource allocation Incentive mechanisms Bilateral barter Exchange between well-suited pairs Implicit encoded prices through rate reciprocation mechanism Slow stable peering Hard to find a good reciprocation Altruistic behavior critical to provide content availability

Multilateral Exchange System matches user demand with available supply at other peers in the network Explicit pricing Helps identify files to disseminate Identify location of resource congestion Useful content providers

Bilateral Vs Multilateral exchange

Multilateral exchange Equilibrium exists Efficient under general conditions Robust to collusive behavior Bilateral Equilibrium fails to exist if exchange is restricted May be inefficient if it exists May fail to be robust to collusive behavior

PACE Effectively and practically realizes multilateral exchange Exchange currency using market based mechanism Single price per peer System specifies algorithmic buy and sell behavior Shield honest users and prevents malicious users from damaging system operation Gives incentives to contribute

PACE Features Price Management Decentralized to user clients Easily discoverable price information One price per peer Incentive Benefits Use of currency “market power” is transient

PACE Features Dynamic adaptation of resource constraints Identify network congestion Strong incentive to local transfers Uses explicit pricing Flexible

Pricing Pricing schemes for multilateral exchange 1. one price per peer (PP) 2. one price per file (PF) 3. one price per file per peer (PFP)

Pricing Comparing schemes through equilibrium or static settings PP is the most desirable PF,PP and PFP are equal if only upload capacity restricts transfers PF is worse than PP if network topology is non trivial PF and PFP yield equivalent equilibrium

Advantages of PP scheme Leads to simpler price dynamics Unpopular files with rare requests Serves requests sequentially without preemption

Dynamics Difficult to determine system’s equilibrium prices or allocation in advance Need to consider dynamic issues Issues related to dynamics Peer discovery Price discovery Service discipline

Peer Discovery Faster peer discovery for explicit per-peer prices Long discovery time for implicitly priced systems E.g. Bit Torrent’s rate based exchange ratios System performs a brute force search across peers

Price Discovery Update price of peers and links based on excess demand If demand > supply, increase price In PP scheme Demand = sum of all received rate requests Supply = upload capacity of access link In PFP, excess demand calculation is complex Excess demand for each file separately Supply is based on prices Optimal for peer to upload his most expensive file

Store and Exchange of currency Advantages Peers can trade before equilibrium prices are reached Reach rate allocation by decentralized trading Issues Complicated Exchange and credit balance need to be secured

PACE System design Multilateral exchange through Currency and Per-peer pricing scheme Peers and links are priced Peers requests download rates of other peers

PACE System design To download, peer pays Uploading peer and All the links traversed by its traffic Payment to links is rebated equally among peers Requests are served sequentially without preemption Prices are updated based on excess demand

User Incentives Efficient use of resources in large peer to P2P systems Users are given incentives To contribute high percentage of upload capacity To share high-value content Currency is stored over time Users are paid for delivered rates

User Incentives Network links are priced to reflect congestion Market Power Generally transient Market manipulation cannot increase profit Issue if few users have a file

User Incentives

Hierarchical Network Model Associating price with every link Infeasible due to 1. lack of network topology and routing information 2. inaccurate bandwidth estimation and 3. computational complexity Hierarchical model Prices bottlenecks restricting supply separately

Model Description Network is divided into local clusters Types of links Immediate (local) links Access links Transient congestion at access links Capturing rare bottlenecks

Hierarchical Network Model

Constraints Nodes within a cluster share high capacity links Transmission across wide area involves shared, lower capacity access links

PACE client mechanisms Not directly exposed to end users Serves as algorithmic devices to ensure efficient exchange Exposes a simple interface to users Users’ software computes buy and sell behavior Mechanisms Buy client and Sell client

Sell Client User declares Files to upload Total upload capacity Sell client maintains two prices – P 0 s, P 1 s Update Rule Demand > Supply => price increases Supply > Demand => price decreases

Pricing Scarce Resources Update P 1 s Demand = total requested download rate at remote buy client offering the least P 1 s Supply = upload capacity of access link of sell client Update P 0 s Demand = local requests + minimum of remote requests Supply = upload bandwidth on sell client of immediate link

Service Disciplines Requests are served in the order of arrival No incentives to queue requests per peer pricing

Buy Client User chooses Files of (Ti) to download Savings rate – η% of current balance saved for future use Steps : 1. order given sell clients (j) by total price 2. buy client spends budget committed 3. if j’s upload capacity is exhausted, move to next sell client 4. budget exhausted - buy client stops 5. unused budget is split between files(Ti - f) evenly

Buy Client Tradeoff between user’s experience and personalizing utility function Simplicity Vs descriptive power

PACE functionalities 1. Resource discovery 2. Network friendliness 3. User management 4. Transactions and currency security

PACE Architecture Trade content for virtual currency Rendezvous service Network price service Centralized currency mechanism Secures transactions and currencies Logically separate services Rendezvous is file specific Banks are currency specific Network prices are independent of files and currency

Resource and Price Discovery Rendezvous service stores single prices Input to rendezvous service File identifier Buy client information Output to rendezvous service set of IP addresses with minimal cost Determine latest prices Allocate budget and prioritize transfers

Network Friendliness Avoid expensive network links For wide area traversal, network price λ is added to P s Methods to determine network prices 1. using third party service 2. explicit ISP input Rendezvous service and network service may be: 1. loosely coupled 2. tightly coupled

Managing Users Collusion PACE is robust to collusion (consequence of multilateral exchange) Aggregate wealth of clients cannot increase by combining trade Bootstrapping new users Grant money upon joining or Ability to download for free

Managing Users User registration Protect against sybil attacks PACE maintains currency as stored value Bootstrapping occurs only at start and not at every transfer

Securing Transactions Security through logically centralized banks Exchanges should be Є – fair Buy client pays for content received Sell client receives payment with an Є of content transmitted for the agreed price

Securing Transactions Failure during the transaction after i/k th of content transfer and Є = 1/k, buy client pays [(i-1)/k] * P <= P’ <= [i/k] * P Clients cannot Forge system currency Spend more than the current balance

Securing Transactions At the beginning of transfer Buy client ‘b’ send cryptographic signature ‘σ’ and certified public key to ‘s’ for verification To deposit payment Bank verifies ‘σ’ of b and checks for replay then it checks the cryptographic hash Proceeds with the transaction “double-entry book keeping” One signature verification One cryptographic hash

Securing currency and balances Logically centralized banks are easily scalable Currency is virtual PACE uses local banks to aggregate local transactions and reduce load

Securing currency and balances Content provider acts as Bank to manage currency and User registration authority Public/Private key pairs identify users Signed certificate is issued to new user Bank refreshes certificates of active clients For each registered user, bank stores 1. hash of its public key 2. current balance 3. counter c last

Securing currency and balances Preventing deposit replays C t > C last of buy client If deposit succeeds, C last is set to C t Preventing overdraw on accounts Minimize aggregation of payments Minimize buy client’s certificate expiry time Sell client performs online check at start Negative balance is penalized

Simulation Analysis - I

File prices reflect resource constraints Local links are cheaper than remote links Once chunks are disseminated, local prices drop

Simulation Analysis - II

Contributing upstream capacity improves user’s performance Non free loaders download chunks faster than free loaders

Simulation Analysis - III

Local transmissions are preferred over remote in PACE Bit torrent makes poor use of locality

Simulation Analysis - IV

Conclusions Simple pricing mechanisms are sufficient for efficient allocations PACE is a system for currency-backed system exchange PACE’s algorithmic mechanism Hides complexity from users Provides robustness Incorporates network friendliness Prevents cheating

Future Work Long term money management Role of prices in server provisioning