The application of P2P technology. Team Member: LIU Chang, ZHANG jianing Presentation: LIU Chang.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

Computer networks Fundamentals of Information Technology Session 6.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Towards a mobile content delivery network with a P2P architecture Carlos Quiroz.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
Introduction to client/server architecture
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Network Topologies.
P2P File Sharing Systems
Chapter 2, slide: 1 CS 372 – introduction to computer networks* Monday June 28 Announcements: r Lab 1 is due today r Lab 2 is posted today and is due next.
For more notes and topics visit:
Introduction Widespread unstructured P2P network
Computer Network By Tahir Saad. Introduction to computer networking Content : The definitions of networking Use of network Network classification.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
GNUTELLA PEER-TO-PEER NETWORKING. GNUTELLA n What is Gnutella n Relation to the World Wide Web n How it Works n Sites / Links / Information.
Scalable Web Server on Heterogeneous Cluster CHEN Ge.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Distributed Systems and Algorithms Sukumar Ghosh University of Iowa Spring 2011.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
CHAPTER 5: MULTIMEDIA DATABASE MANAGEMENT SYSTEM ARCHITECTURE TOPIC : 5.1 DISTRIBUTED MULTIMEDIA DATABASE MANAGEMENT SYSTEM ARCHITECTURE GROUP MEMBERS:
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
Ethernet. Ethernet  Ethernet is the standard communications protocol embedded in software and hardware devices, intended for building a local area network.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Communications & Networks National 4 & 5 Computing Science.
Overlay Networks : An Akamai Perspective
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
An example of peer-to-peer application
Introduction to client/server architecture
Comparison of LAN, MAN, WAN
Distributed computing deals with hardware
InfoShare A Distributed P2P Information Storage & Retrieval System
Distributed Systems and Algorithms
Presentation transcript:

The application of P2P technology

Team Member: LIU Chang, ZHANG jianing Presentation: LIU Chang

Introduction This article discusses the peer-to-peer technologies in common use today and takes a look at possible future applications in this area. The architectures and protocols are examined in enough detail to give a basic understanding of their pros and cons and to highlight the difficulties that must be overcome for future generations of peer-to-peer.

The comparison between traditional C/S and P2P model A client does not share any of its resources, but requests a server's content or service function. Clients therefore initiate communication sessions with servers which await incoming requests.

P2P model: These shared resources are available to every computer in the network. Each computer acts as both the client and the server which means all the computers on the network are equals, that is where the term peer-to-peer comes from.

The comparison between traditional C/S and P2P model :  ( 1 ) On the one hand, all data is stored on the servers, which generally have far greater security controls than most clients.  ( 2 ) On the other hand, as the number of simultaneous client requests to a given server increases, the server can become overloaded. According to the following picture, we can see the some of mainly differences between C/S and P2P: P2PC/S Data publishGoodBad Data receiveOrdinaryGood Data securityBadGood Data updateGoodBad Data qualityOrdinaryGood Data coverageBadGood Data cost controlGoodBad Data manageBadGood

The P2P technology in Cloud Computing 1.Cloud computing has become a hot buzzword recently. Infrastructure construction and operation cost is high. Google, Microsoft, yahoo, Amazon have spent large sums of money into this market. 2.Google's cloud computing services such as Gmail and Amazon’s S3 and Microsoft's AZURE are very large. Due to the scale of these services is very huge, so your problems easily can lead to the end user, and then the quality of cloud services will be doubted. In view of this, the ancient P2P technology together with this new technology revealed its unique advantages, show a new vitality for the development of cloud computing.

Together with P2P and Cloud Computing technology, we have something called P2P Cloud:  (1) P2P is a great fit for Cloud storage systems offering the much needed reliability.  (2) Another area where P2Pcan play a major role is Content Delivery Networks (CDN) which is usually offered as an extension to Cloud storage offerings. major role

The advantages of a P2P Cloud  Improved reliability than the “client-server” cloud.  Much more cost effective because there is no need to build expensive datacenters.  The very fact that expensive datacenters are not needed means even startups can be Cloud infrastructure players. This eliminates the possibility of few players holding the monopoly control over Cloud infrastructure services.  Easy scalability. ( Well, P2P based Cloud is a realistic possibility but it is not clear if it will be more effective than the current “client- server” model. However, its reliability cannot be questioned and Skype is a good example for this. The technology is still inside the academic labs and it is a long way to go before we see its adoption on the commercial side. )

The application of P2P in File Sharing The widely use of P2P file sharing system, such as Gnutella and Napster, is a hot buzzword recently. As a result, a lot of research has been done in the area of architectures. There are two types of P2P systems:  1. One is the centralized peer-to-peer. Such as Napster and  2. The other one is decentralized Peer –to- Peer. The main representatives of this structure are Freenet and GNUtella.

Application layer security technology solutions We will choose GNUtella as a typical example to explain how P2P file sharing system is worded. 1.GNUtella's architecture is similar to Freenet's in that it is completely decentralized and distributed. (meaning that there are no central servers and that all computations and interactions happen between clients.) 2. All connections on the network are equal. (When a client wishes to connect to the network they run through a list of nodes that are most likely to be up or take a list from a website and then connect to how ever many nodes they want. This produces a random unstructured network.)

Routing 1. When a search request arrives into a client that client searches itself for the file and broadcasts the request to all its other connections 2. all packets on the network start with a TTL (time to live)

How to download a file 1. Sending a HTTP packet requesting the file 2. The client with the file interprets this and sends a standard HTTP response. To download a file the client creates a direct connection to the client with the file it wants

Mobile host as a serve In P2P data networks, the mobile can be as a server that can be accessed by other peers. Hence, several problems attributed to wireless and mobile environment have to be solved differently. Company Logo

Solution--Role reversal The problem of mobile host as a server primarily impacts connections either when the mobile host uses PSM or when the mobile host moves. Essentially, for both the problems in this category, the TCP connection ‘‘suffers‘‘ due to delays or disruptions, and the impact of the delays or disruptions can have a non-trivial impact even on the overall performance of the connection, especially when the file size or the remaining file size is small. Company Logo

Under role reversal, a mobile host acting as a server, upon detecting a connect request delayed by the PSM or a hand-off, explicitly issues a TCP-Reset to the corresponding peer for previous connection. Further, the mobile host re-initiates a new connection to that same peer, thus acting as the client. Once the new connection is setup, because of the bi-directional nature of the application semantics and the bi- directional nature of the TCP connection, the mobile host can serve the content as a server Company Logo

Failure of incentives While P2P data networks heavily rely on incentives based mechanisms to encourage peers to contribute to the network, such mechanisms are not tailored for the unique characteristics of wireless and mobile environments. Specifically, the problems of upload-download self-contention and identity loss after mobility fall under this category of problems. Company Logo

Incentive aware operations The problem of failure of incentives stems from the two distinct conditions of the self-contention in a wireless link and mobility-related identity loss. The incentive-aware operations principle in wP2P is used to address both problems. Company Logo

Essentially, one technique under incentive aware operations in wP2P involves the adaptation of the upload rate in order to find the smallest upload rate possible to achieve the maximum download rate. While this value for the upload rate is trivial to determine in a wired setting, a more sophisticated algorithm is required in a wireless environment. Company Logo

Thank you