Survey of Peer to Peer Technologies Authors: Bratislav Milić, Jelena Krunić, Veljko Milutinović,

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Advertisements

P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Scalable Content-Addressable Network Lintao Liu
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Freenet A Distributed Anonymous Information Storage and Retrieval System Ian Clarke Oskar Sandberg Brandon Wiley Theodore W.Hong.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
Wide-area cooperative storage with CFS
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
P2P File Sharing Systems
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
F REENET UDAYA S PISIPATI 02/26/08. C ONTENTS  Introduction  Design goals  Architecture  Basic model  Keys in searching  Retrieving data  Storing.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
1 1.Freenet Architecture a)Goals b)Properties 2.Searching a network a)Searching/Routing algorithm b)Adaptive behaviour c)Differences with other algorithms.
Introduction of P2P systems
Colin J. MacDougall.  Class of Systems and Applications  “Employ distributed resources to perform a critical function in a decentralized manner”  Distributed.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
 A P2P IRC Network Built on Top of the Kademlia Distributed Hash Table.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Ian Clarke, Oskar Sandberg, Brandon Wiley,Theodore W. Hong Presented by Zhengxiang.
Freenet File sharing for a political world. Freenet: A Distributed Anonymous Information Storage and Retrieval System I. Clarke, O. Sandberg, B. Wiley,
GNUTELLA PEER-TO-PEER NETWORKING. GNUTELLA n What is Gnutella n Relation to the World Wide Web n How it Works n Sites / Links / Information.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Freenet Ubiquitous Computing - Assignment Guided By: Prof. Niloy Ganguly Department of Computer Science and Engineering Submitted By: o Parin Deepak Cheda.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Freenet: Anonymous Storage and Retrieval of Information
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Company LOGO Freenet By Yogesh Kalyani. OUTLINE  Introducing P2P  Overview of Freenet  Key’s  Protocol  Security Analysis  Improvement  Strength.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Malugo – a scalable peer-to-peer storage system..
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Unstructured Routing : Gnutella and Freenet
Freenet.
InfoShare A Distributed P2P Information Storage & Retrieval System
Presentation transcript:

Survey of Peer to Peer Technologies Authors: Bratislav Milić, Jelena Krunić, Veljko Milutinović,

2/35 Introduction What is P2P? When was it created? (Bell vs. Fanning)

3/35 What Is It Used for? Sharing of computer resources and services between systems Exchanging information, processing cycles, cache storage, and disk storage for files

4/35 P2P Features All peers in a P2P network are the same Data and computation are decentralized Search for data in real time Peers and their connections are volatile

5/35 P2P Applications File sharing applications Process sharing applications Collaborative applications

6/35 File Sharing Applications Napster It is not P2P in the strictest sense Created for sharing MP3 files Centralized server holds file indexes and other metadata Peers query the central server Sued by recording companies

7/35 File Sharing Applications Gnutella Similar purpose as Napster Decentralized Flooding (peer sends PING to all its neighbors, each of these will PING all its neighbors, and so on; radius of the flood is 5-7) A Gnutella node needs a server (or a set of servers) to “start-up” Gnutellahosts.Com

8/35 File Sharing Applications Free-rider problem Peers that do not share files Majority of participants act as free riders P2P system devolves into a client/server system Sharers of desirable content are overloaded

9/35 Process Sharing Applications Search for extraterrestrial intelligence (SETI) Scientific experiment that started in year 2000 Downloads and analyzes radio telescope data

10/35 Process Sharing Applications How does work? A special kind of screensaver Large calculations are easily divided into completely independent parts (about 340kbytes per work-unit) Connects only when transferring data 4 million users Average CPU time per work-unit 11h

11/35 Process Sharing Applications Free software that runs “in the background” on your computer Processes information for drug discovery Uses idle processor cycles www. fightaidsathome.org

12/35 Process Sharing Applications Examining the folding of proteins Simulation of protein folding for the first time Simulate timescales thousands to millions of times longer than previously achieved Over users

13/35 Communication Applications ICQ I seek you (ICQ) Free download You can see when your friends are also online, in real time Instant messaging, virtual meetings, shared whiteboards, teleconferencing

Freenet project

15/35 Freenet Project - Introduction Based on paper written by Ian Clarke “A Distributed Decentralized Information Storage and Retrieval System” Open standard Development under GPL (GNU Public Licence)

16/35 Freenet Project – Basic Ideas Lack of privacy on the Internet – Lots of information can be collected about people who are using Internet (WWW, mail, FTP, etc.) Lack of anonymity on Internet Censorship Copyright problems

17/35 Freenet Project - Features All nodes are basically the same No central control or administration Anonymity for users Dynamic duplication of data Transfer of data Encrypted data – no one can be held responsible for the data on it’s node

18/35 Freenet Project – Routing Each node holds data and information about nodes Node communicates with near nodes. Search in the Freenet network is based on passing the message to the node that mostly likely has the searched information. Ad-hoc networks as an ETF tutorial

19/35 Freenet Project – Routing

20/35 Freenet Project – Information Removal Data duplication and data transfer create multiple copies of same data Storage space is limited Some data must be deleted LRU algorithm Caching effect but not a cache Inserting of “junk” data cannot destroy data in the Freenet

21/35 Freenet Project – Message Types Like it has been mentioned, nodes can behave differently, but they must use the same communication protocol. Four message types for communication: Data request Data reply Request failed Data insert Each message has TTL (Time to Live) and pseudo unique ID

22/35 Freenet Project – Message Types It is sent in order to search for some data TTL indicates how many hops it should have before it fails Each node stores message ID that passes through it In the case of Data request with ID that has been seen, sender must be notified (to avoid loops) Data request

23/35 Freenet Project – Message Types It should be sent to the node that sent Data request Node should keep the data in order to speed up future queries Data reply

24/35 Freenet Project – Message Types Data insert Node sends Data insert to nodes that contain similar data TTL for Data insert Messages should be low If it isn’t, node that receives Data insert message can reduce TTL to lower level In the case of loop, receiver sends non-backtracking Request Failed When TTL reaches zero, Request Failed is sent to notify the sender that operation is complete

25/35 Freenet Project – Message Types Node sends Data insert message to itself If the key is occupied, user receives notification TTL typically low. If it is high, the node can reduce it. Data is inserted on nodes that are “close” to the data key.

26/35 Freenet Project – Message Types Data request and replies – example *Adapted from Ian Clarke’s paper A B E F C D Data requests Request Failed Data reply D

27/35 Freenet Project – Search Keys Users search files under their names/descriptions Each file has its key To create key 160bit SHA-1 hash function is used Keys used in Freenet: Keyword Signed Key (KSK) Signed Subspace Key (SSK) Content Hash Key (CHK)

28/35 Freenet Project – Search Keys Author defines short description of the data Deterministic generation of public/private key pair from the description Public part is hashed to create key Private is used to sign the file Problems: Flat namespace (duplicates problem) Dictionary attack Keyword Signed Key

29/35 Freenet Project – Search Keys Each user generates random key pair to identify their namespace Private part of random key is used to sign the data User places both public key and description Signed Subspace Key Public keyDescription XOR SHA-1

30/35 Freenet Project – Search Keys Content Hashed Keys are useful for splitting and updating data, but will not be described here Remains problem of finding the key Web crawlers Individual compilations of favorite keys

31/35 Freenet Project – Adding A New Node New node joins network by discovering address of an already existing node (not through Freenet) Requests allow that new node learns about network Network cannot learn of new nodes through requests Announcement message

32/35 Freenet Project - Conclusion Completely decentralized Anonymity for both writers and readers No censorship High fault tolerance Adaptive routing saves bandwidth (in contrast to broadcast requests) No guaranties for QoS

33/35 Future JXTA Sun Microsystem's peer-to-peer initiative Juxtapose (JXTA) – to put things next to each other Open, generalized peer-to-peer protocols that allow any connected device (cell phone to PDA, PC to server) on the network to collaborate

34/35 Conclusion Problem: individual users Problem: QoS Benefit: flexibility Benefit: scalability Benefit: fault resistance Final conclusion: useful technology that has to be improved in order to show all its good sides

Survey of Peer to Peer Technologies Bratislav Milić, Jelena Krunić, Veljko Milutinović,