Peer-to-peer and agent-based computing P2P Algorithms & Issues.

Slides:



Advertisements
Similar presentations
Chapter 5 Transfer of Training
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
Analysis of Computer Algorithms
© Ravi Sandhu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
Chapter 1: The Database Environment
Distributed Systems Architectures
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
An Overview of Peer-to-Peer Sami Rollins
Multihoming and Multi-path Routing
Introduction to HTML, XHTML, and CSS
1 Term 2, 2004, Lecture 9, Distributed DatabasesMarian Ursu, Department of Computing, Goldsmiths College Distributed databases 3.
So far Binary numbers Logic gates Digital circuits process data using gates – Half and full adder Data storage – Electronic memory – Magnetic memory –
Peer-to-peer and agent-based computing Scalability in P2P Networks.
Peer-to-peer and agent-based computing P2P Algorithms.
Peer-to-peer and agent-based computing Freenet. peer-to-peer and agent-based computing 2 Plan of lecture Freenet Architecture –Goals and Properties Searching.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
Communicating over the Network
George Anadiotis, Spyros Kotoulas and Ronny Siebes VU University Amsterdam.
Database Systems: Design, Implementation, and Management
Peer-to-Peer and Social Networks An overview of Gnutella.
SE-292 High Performance Computing
CP2073 Networking Lecture 5.
Configuration management
Chapter 1: Introduction to Scaling Networks
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
1 Contract Inactivation & Replacement Fly-in Action ( Continue to Page Down/Click on each page…) Electronic Document Access (EDA)
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
Peter R. Pietzuch Peer-to-Peer Computing – or how to make your BitTorrent downloads go faster... Peter Pietzuch Large-Scale Distributed.
Computer networks Fundamentals of Information Technology Session 6.
Services Course Windows Live SkyDrive Participant Guide.
Executional Architecture
Global Analysis and Distributed Systems Software Architecture Lecture # 5-6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN BCMSN Module 1 Lesson 1 Network Requirements.
25 seconds left…...
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
44212: Web-site Development
Services Course Windows Live SkyDrive Participant Guide.
SE-292 High Performance Computing Memory Hierarchy R. Govindarajan
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Peer-to-Peer Computing
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Jay Sheth P2P Basics Jay Sheth CE, UMBC. Jay Sheth P2P Agenda What is P2P Why P2P Components and algorithms Characteristics Different P2P systems Future.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
P2P File Sharing Systems
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
1 Client Server Architecture over the Internet Week - 2.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Distributed Systems: Concepts and Design Chapter 1 Pages
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Peer-to-Peer Computing Mrs. Tugba Taskaya-Temizel 13/February/2006.
P2P Computing MIRA YUN September 16, Outline What is P2P P2P taxonomies Characteristics Different P2P systems Conclusion.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Peer to Peer Network Design Discovery and Routing algorithms
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Presentation transcript:

peer-to-peer and agent-based computing P2P Algorithms & Issues

peer-to-peer and agent-based computing – wamberto vasconcelos 2 P2P: algorithms P2P systems have algorithms to control activities among peers. The algorithm specifies the workings of the system: what happens and when. Lets look at 3 models used in algorithms: –Centralised directory model –Flooded request model –Document routing model

Centralised directory model 1.Peers connect to the central directory and inform the contents they offer for sharing 2.Upon request from a peer, the central index will find the best peer in the directory that matches the request (best = cheapest, nearest, fastest, or most reliable) 3.The requesting peer, in possession of the best match for a peer, will contact this peer and, if agreed, a file exchange will take place peer-to-peer and agent-based computing – wamberto vasconcelos 3 P2P: models

peer-to-peer and agent-based computing – wamberto vasconcelos 4 P2P: models (Contd) Centralised directory model Requires infrastructure for directory server If we have lots of peers –A more powerful server must be used, AND –More storage is needed for the directory that is, scalability issues… This is the model used by Napster –In spite of the theoretical limitations above, the model is robust and efficient. –It scaled up very well, with 6 million peers at some points.

peer-to-peer and agent-based computing – wamberto vasconcelos 5 P2P: models (Contd) Flooded requests model Pure P2P: –No central servers –No advertisements of resources

peer-to-peer and agent-based computing – wamberto vasconcelos 6 P2P: models (Contd) Flooded requests model A peers request is flooded, that is, broadcast to its directly connected peers A request is flooded until –it is answered OR –a maximum number of flooding steps (5 to 9, typically) is reached

peer-to-peer and agent-based computing – wamberto vasconcelos 7 P2P: models (Contd) Flooded requests model A peers request is flooded, that is, broadcast to its directly connected peers A request is flooded until –it is answered OR –a maximum number of flooding steps (5 to 9, typically) is reached download

peer-to-peer and agent-based computing – wamberto vasconcelos 8 P2P: models (Contd) Flooded requests model Advantages: –No central point of failure –Limited per-node state Drawbacks: –Requires a lot of bandwidth Efficient in small communities: –A company Intranet, for instance. This is the model used by Gnutella

peer-to-peer and agent-based computing – wamberto vasconcelos 9 P2P: models (Contd) Document routing model Most recent approach Also pure P2P – no central servers Each peer that joins the system is assigned a random ID number Each peer knows a number of peers

peer-to-peer and agent-based computing – wamberto vasconcelos 10 P2P: models (Contd) Document routing model Publication: 1.When documents (resources) are published (shared), an ID is assigned to it based on a hash of the documents contents and name. 2.Each peer will route the document towards the peer with the most similar ID 3.This process is repeated until nearest peer ID is the current peers ID Each routing operation ensures that a copy of the document is kept

peer-to-peer and agent-based computing – wamberto vasconcelos 11 P2P: models (Contd) Document routing model Request: 1.When a peer requests a document from the system, the request goes to the peer with most similar ID 2.This process is repeated until a copy of the document is found 3.The document is transferred back to the requesting peer 4.Every peer participating in the routing will keep a local copy of the document

peer-to-peer and agent-based computing – wamberto vasconcelos 12 P2P: models (Contd) Document routing model Very efficient for large, global communities However, –Document ID must be known before posting a request and searches are hence more complex –Network partitioning may lead to islanding, whereby a community splits into two separate sub-communities without links to each other

peer-to-peer and agent-based computing – wamberto vasconcelos 13 Main Server Launched 1996, aims at scientific experiment Uses idle processors of connected computers to Search for Extraterrestrial Intelligence (SETI) Distributes a screen saver–based application to users Applies signal analysis algorithms different data sets to process radio-telescope data. Over 3 million users, provided over a million years of CPU time to date 1. Install Screen Server Radio-telescope Data 2. SETI client (screen saver) starts 3. SETI client gets data from server and runs 4. Client sends results back to server

peer-to-peer and agent-based computing – wamberto vasconcelos 14 P2P: issues Decentralisation Scalability Anonymity Self-organisation Cost of ownership Ad-hoc connectivity Performance Security Transparency and Usability Fault resilience Interoperability

peer-to-peer and agent-based computing – wamberto vasconcelos 15 P2P: issues Decentralisation DIS still retain some degree of centralisation –Servers that receive requests from clients Centralised systems are ideal for some scenarios: –Management of access rights and security is easier However, –Topology leads to inefficiencies, bottlenecks –Centralised resources must be set up and managed, thus requiring human expertise and time

peer-to-peer and agent-based computing – wamberto vasconcelos 16 P2P: issues Decentralisation In pure P2P systems –Emphasis is on users ownership and control of resources –As there is no central server the implementation of a model is more complex –No global view of the system Hybrid P2P systems like Napster try to balance two opposite design forces: –Decentralised, distributed model, BUT with –Global view of resources

peer-to-peer and agent-based computing – wamberto vasconcelos 17 P2P: issues Scalability How many components can be catered for? Decentralisation improves scalability: –Synchronisation/coordination not necessary –No global states to look after Pure P2P copes with larger systems, BUT –No guarantees about the time it takes for a search to complete –No guarantees about unsuccessful searches A certain amount of centralisation goes a long way…

peer-to-peer and agent-based computing – wamberto vasconcelos 18 P2P: issues Anonymity People should have access to resources without fears (legal, social, etc.) Censorship of digital content should not be possible Three kinds of anonymity: –Sender anonymity –Receiver anonymity –Mutual anonymity Different techniques to ensure anonymity: –E.g., identity spoofing, covert paths

peer-to-peer and agent-based computing – wamberto vasconcelos 19 P2P: issues Self-organisation Systems that change their organisation without any previously agreed policy. P2P: self-organisation is essential for –Scalability –Fault resilience –Cost of ownership Self-organisation in P2P occurs when –Peers appear/disappear continuously –The topology (who knows who) changes to reflect this –Resources appear/disappear or are copied

peer-to-peer and agent-based computing – wamberto vasconcelos 20 P2P: issues Cost of ownership It is expensive to own a resource: –File space, CPU time, bandwidth In P2P systems ownership is shared: –Peers offer file space and time for downloading –Peers inform about updates –Peers offer computing time to process tasks

peer-to-peer and agent-based computing – wamberto vasconcelos 21 P2P: issues Ad-hoc connectivity Some components of a large system may not be available at (crucial) times… In P2P, this is the usual scenario: –In content sharing systems, users expect resources to be available intermittently Ad hoc effect can be reduced: redundancy

peer-to-peer and agent-based computing – wamberto vasconcelos 22 P2P: issues Performance P2P systems aim at improving performance: –Storage capacity (Napster, Gnutella) –Computing cycles Performance is influenced by –Processing power, storage capacity, bandwidth In pure P2P, performance is affected by bandwidth (traffic of lots of messages) –This seriously limits scalability Approaches to improving performance: –Replication/caching, intelligent routing

peer-to-peer and agent-based computing – wamberto vasconcelos 23 P2P: issues Security P2P systems have the same needs as distributed systems: –Informal trust among components –Encryption and signatures, –Etc. New needs for P2P systems, though: –Multi-key encryption (anonymity of peers) –Sandboxing (execution of code in peers) –Reputation and accountability

peer-to-peer and agent-based computing – wamberto vasconcelos 24 P2P: issues Transparency and Usability P2P software should not require significant set up or configuration of networks or devices Self-updateable software is desirable in P2P P2P systems should be network and device transparent/independent: –Internet, intranets, high-speed or dial-up Users can enjoy P2P systems as: –User of services via a web interface (JXTA) –Wrapped around non P2P applications –Locally installed P2P software (SETI, Napster)

peer-to-peer and agent-based computing – wamberto vasconcelos 25 P2P: issues Fault resilience Ability to carry on when things break down Some P2P systems allow computations to carry on where they were left: –Relay nodes in Groove ( –This is particularly important when peers are mobile and dis/re-connection is more likely to happen Resources may go missing if peer is disconnected: –Replication of resources (as in Gnutella)

peer-to-peer and agent-based computing – wamberto vasconcelos 26 P2P: issues Interoperability Many existing P2P systems, but they dont interoperate Some issues that ought to be solved are: –Which protocol to be used? –How do requests take place? –What about models that are too different?

peer-to-peer and agent-based computing – wamberto vasconcelos 27 P2P: some existing applications JXTA (jxta.kenai.com)jxta.kenai.com Groove ( Gnutella ( We should look at these from the following perspective: how can this technology be used as part of an integrated solution for a distributed information system?

peer-to-peer and agent-based computing – wamberto vasconcelos 28 Reading List Peer-to-Peer Computing, D. S. Milojicic, et al., Tech. Report, HP Labs, Intel's Peer-to-Peer Computing Web-page The future of peer-to-peer computing, A. Loo, Comm. of the ACM, Vol. 46(9). Sep JXTA Web-site ( Intel Philantropic Peer-to-Peer Program. Course Information Page Internet 2 P2P workgroup

peer-to-peer and agent-based computing – wamberto vasconcelos 29 Exam Questions Explain the three models of peer-to-peer systems, listing their advantages and disadvantages. (8) Explain what the Flooded Request Model for Peer- to-Peer computing is and discuss two of its disadvantages. (5)