A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.

Slides:



Advertisements
Similar presentations
Rarest First and Choke Algorithms Are Enough
Advertisements

Rarest First and Choke Algorithms are Enough Arnaud LEGOUT INRIA, Sophia Antipolis France G. Urvoy-Keller and P. Michiardi Institut Eurecom France.
The BitTorrent Protocol
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
Incentives Build Robustness in BitTorrent Author: Bram Cohen Presenter: Brian Liao.
Incentives Build Robustness in BitTorrent- Bram Cohen Presented by Venkatesh Samprati.
The BitTorrent protocol A peer-to-peer file sharing protocol.
Incentives Build Robustness in BitTorrent Bram Cohen.
Peer-to-Peer (P2P) Networks
Bit Torrent (Nick Feamster) February 25, BitTorrent Steps for publishing – Peer creates.torrent file and uploads to a web server: contains metadata.
Presented by: Su Yingbin. Outline Introduction SocialSwam Design Notations Algorithms Evaluation Conclusion.
End-to-end Publishing Using Bittorrent. Bittorrent Bittorrent is a widely used peer-to- peer network used to distribute files, especially large ones It.
Stochastic Analysis of File Swarming Systems The Chinese University of Hong Kong John C.S. Lui Collaborators: D.M. Chiu, M.H. Lin, B. Fan.
The BitTorrent content distribution system CS217 Advanced Topics in Internet Research Guest Lecture Nikitas Liogkas, 5/11/2006.
Clustering and Sharing Incentives in BitTorrent Systems Arnaud Legout 1, Nikitas Liogkas 2, Eddie Kohler 2, Lixia Zhang 2 1 INRIA, Projet Planète, Sophia.
CS 554. Peer-to-Peer Systems Faithfulness in Internet Algorithms Haridimos Kondylakis
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
CMPT 401 Summer 2007 Dr. Alexandra Fedorova Lecture XV: Real P2P Systems.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Improving ISP Locality in BitTorrent Traffic via Biased Neighbor Selection Ruchir Bindal, Pei Cao, William Chan Stanford University Jan Medved, George.
Peer-Assisted Content Distribution Networks: Techniques and Challenges Pei Cao Stanford University.
Modeling and analysis of BitTorrent-like P2P network Fan Bin Oct,1 st,2004.
呂駿逸 呂學儒 施旻宏 指導教授 鍾添曜. 1. Introduction 2. Related work 3. System design 4. Experiment 5. Future work 6. References.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Modeling and Performance Analysis of Bitorrent-Like Peer-to-Peer Networks Dongyu Qiu and R. Srikant University of Illinois, 2004 Presented by : Ran Zivhon.
1 Incentives Build Robustness in BitTorrent? Analysis on Bit Torrent Client performance By Jimmy Wong.
A P2P file distribution system ——BitTorrent Fan Bin Sep,25,2004.
Incentives Build Robustness in BitTorrent 1st Workshop on Economics of Peer-to-Peer Systems 2003 Bram Cohen
BitTorrent Background. Common Scenario Millions want to download the same popular huge files (for free) –ISO’s –Media (the real example!) Client-server.
CSE 461 University of Washington1 Topic Peer-to-peer content delivery – Runs without dedicated infrastructure – BitTorrent as an example Peer.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
The Bittorrent Protocol
Content Overlays (Nick Feamster) February 25, 2008.
Bit Torrent (Nick Feamster) February 25, BitTorrent Steps for publishing – Peer creates.torrent file and uploads to a web server: contains metadata.
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
University of Bologna, Italy How to cheat BitTorrent and why nobody does Simon Patarin and David Hales University of Bologna ECCS 2006,
BitTorrent.
BitTorrent Internet Technologies and Applications.
Application Layer – Peer-to-peer UIUC CS438: Communication Networks Summer 2014 Fred Douglas Slides: Fred, Kurose&Ross (sometimes edited)
GPS: A General Peer-to-Peer Simulator and its Use for Modeling BitTorrent Weishuai Yang Nael Abu-Ghazaleh
1 BitTorrent System Efrat Oune Bar-Ilan What is BitTorrent? BitTorrent is a peer-to-peer file distribution system (built for intensive daily use.
Securing Data Authentication with Cryptographic Signatures in BitTorrent Du Wei cc.hut.fi / Supervisor : Professor Jukka Manner Instructor.
BitTorrent Dr. Yingwu Zhu. Bittorrent A popular P2P application for file exchange!
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Chapter 2: Application layer
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Do incentives build robustness in BitTorrent? Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Peer-to-Peer File Sharing Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Peer-to-Peer File Sharing
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
Peer to Peer Networking. Network Models => Mainframe Ex: Terminal User needs direct connection to mainframe Secure Account driven  administrator controlled.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
PEAR TO PEAR PROTOCOL. Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change.
End-to-end Publishing Using Bittorrent. Bittorrent Bittorrent is a widely used peer-to- peer network used to distribute files, especially large ones It.
Traffic Localization with Information Guidance of Pseudo Peer Agent on BT-P2P Network 學生 : 楊宏昌 指導教授 : 曾黎明教授 在 BT 同儕通訊上利用參與者訊息引導對外流量之區域化節約.
November 19, 2016 Guide:- Mrs. Kale J. S. Presented By:- Hamand Amol Sambhaji. Hamand Amol Sambhaji. Pardeshi Dhananjay Rajendra. Pardeshi Dhananjay Rajendra.
Lecture XV: Real P2P Systems
An example of peer-to-peer application
Introduction to BitTorrent
BitTorrent Vs Gnutella.
Angelo Sapello University of Delaware
The BitTorrent Protocol
Content Distribution Networks + P2P File Sharing
PEER-TO-PEER SYSTEMS.
Chapter 2 Application Layer
Content Distribution Networks + P2P File Sharing
Presentation transcript:

A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208

Outline 1 What is it 2 Why do we need BitTorrent 3 Architecture And Operation 4 Why does it work so well 5 Strengths & Shortcomings 6 Conclusion

Overview Peer 2 Peer File transfer Protocol Works over public Internet. Critical components – Web Server (MetaInfo Server) – MetaData file (.torrent) –Central Tracker – End User Peers

Critical Elements 1 A web server –To provide the ‘metainfo’ file by HTTP –For example: Web Server Snakes on the Plane torrent US open final torrent

Critical Elements 2 The.torrent file –Static ‘metainfo’ file to contain necessary information : Name Size Checksum IP address of the Tracker Matrix.torrent

Critical Elements 3 A BitTorrent tracker –Non-content-sharing node –Track peers –For example:

Critical Elements 4 An end user (peer) –Guys who want to use BitTorrent must install corresponding software or plug-in for web browsers. –Downloader (leecher) : Peer has only a part ( or none ) of the file. –Seeder: Peer has the complete file, and chooses to stay in the system to allow other peers to download

Outline 1 What is it 2 Problem And BitTorrent Solution 3 Architecture And Operation 4 Why does it work so well 5 Strengths & Shortcomings 6 Conclusion

Problems Traditional Client/Server Sharing –Performance deteriorates rapidly as the number of clients increases Free-riding in P2P network –Free riders only download without contributing to the network.

BitTorrent Scalability of BitTorrent is very good. Even more peers means better performance. Strong incentives to prevent free-riding. –Priority downloading –High availability of downloads

Outline 1 What is it 2 Why do we need BitTorrent 3 Architecture And Operation 4 Why does it work so well 5 Strengths & Shortcomings 6 Conclusion

Connectivity Web ServerJohn Doe Tracker Matrix.torrent Downloader: Joe Seeder: Mike Downloader: Michelle

Piece A file is cut into pieces of fixed size, typically 256Kb Each downloader reports to all of its peers what pieces it has. To verify data, Hash codes are used for all the pieces, included in.torrent files.

A trivial example Seeder: John Downloader Mike {1,2,3,4,5,6,7,8,9,10} {} {1,2,3} Downloader Joe {} {1,2,3} {1,2,3,4} {1,2,3,5} {1,2,3,4,5}

Messages Peer – Peer messages –TCP Sockets Peer – Tracker messages –HTTP Request/Response B-encoding –The "B" encoding is identical to the "BASE64" encoding defined by RFC 1521.

Tracker Function Peer cache –IP, port, peer id State information –Completed –Downloading Returns random list

Peer Functions File space allocated Connect to peers Bitfield –have(1) and not have(0) Have –Advertise pieces Interest /Not_interested –Expressing interest in the pieces published by the peer Requesting for a chunk –Request

Outline 1 What is it 2 Why do we need BitTorrent 3 Architecture And Operation 4 Why does it work so well 5 Strengths & Shortcomings 6 Conclusion

Peer Selection Built-in incentive mechanism (where all the magic happens): –Choking Algorithm –Optimistic Unchoking –Anti-snubbing

Choking Algorithm Choking is a temporal refusal to upload Choking evaluation is performed every 10 seconds. Each peer unchokes a fixed number of peers (default = 4) The decision on which peers to un/choke is based solely on download rate, which is evaluated on a rolling, 20-second average

Reasons for Choking TCP congestion control. To ensure the peers to get a consistent download rate. Joe mike Choked

Optimistic Unchoking a BitTorrent peer has a single ‘optimistic unchoke’ which is uploaded regardless of the current download rate from it. This peer rotates avery 30s Reason: –To discover currently unused connections are better than the ones being used

Anti-snubbing When a peer received no data in 60s, we assume it is choked by all other peers, and refuse to upload to it except for the optimistic unchoking. Reason – It may cause several concurrent optimistic unchokes.

Example mike Downloader: Albert Downloader: Rob Downloader: Ron Downloader: Kelly 40kb/s 30kb/s 10kb/s 100kb/s 20kb/s 70kb/s 15kb/s 10kb/s 70kb/s 110kb/s 70kb/s 5kb/s Downloader Joe

Strengths Better bandwidth utilization –Never before speeds. Up to 7 MB/s from the Internet. Limit free riding – tit-for-tat Limit leech attack – coupling upload & download Spurious files not propagated Ability to resume a download

Shortcomings Small files – latency, overhead Random list of peers - naive Scalability –Millions of peers – Tracker behavior (uses 1/1000 of bandwidth) –Single point of failure Robustness –System progress dependent on altruistic nature of seeds (and peers) –Malicious attacks and leeches.

Conclusion BitTorrent is a well thought-out protocol that embraces aspects of cooperation and self-optimizing mechanisms. BitTorrent propose solutions for current optimization and scalability problems

References [1] Bram Cohen, Incentives build robustness in Bittorrent, May 2003 [2] Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble, A Measurement Study of Peer-to-Peer File sharing Systems, Jan 2002 [3] Bram Cohen, Bitconjurer.org, BitTorrent Protocol Specification [4] J R. Douceur, The Sybil Attack [5] A W Tucker, Prisoner’s Dilemma, Serendip.com [6] V Vishnumurthy, S Chandrakumar, EG Sirer, KARMA : A Secure Echonomic Framework for Peer-to-Peer Resource Sharing. [7] E. Adar and B.A. Huberman, Free Riding on Gnutella. [8]