Peer-to-Peer Computing Mrs. Tugba Taskaya-Temizel 13/February/2006.

Slides:



Advertisements
Similar presentations
Peer-to-Peer Infrastructure and Applications Andrew Herbert Microsoft Research, Cambridge
Advertisements

An Overview of Peer-to-Peer Sami Rollins
Peer-to-peer and agent-based computing P2P Algorithms & Issues.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
1 On Death, Taxes, & the Convergence of Peer-to-Peer & Grid Computing Adriana Iamnitchi Duke University “Our Constitution is in actual operation; everything.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
An Overview of Peer-to-Peer. What is Peer-to-Peer (P2P)?
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
CSE331: Introduction to Networks and Security Lecture 14 Fall 2002.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Peer-to-Peer Computing
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Jay Sheth P2P Basics Jay Sheth CE, UMBC. Jay Sheth P2P Agenda What is P2P Why P2P Components and algorithms Characteristics Different P2P systems Future.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Information-Centric Networks05b-1 Week 5 / Paper 2 A survey of peer-to-peer content distribution technologies –Stephanos Androutsellis-Theotokis, Diomidis.
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Peer To Peer Applications
Introduction of P2P systems
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Colin J. MacDougall.  Class of Systems and Applications  “Employ distributed resources to perform a critical function in a decentralized manner”  Distributed.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
P2P Computing MIRA YUN September 16, Outline What is P2P P2P taxonomies Characteristics Different P2P systems Conclusion.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Peer-to-Peer Data Management
EE 122: Peer-to-Peer (P2P) Networks
Unstructured Routing : Gnutella and Freenet
Mobile P2P Data Retrieval and Caching
An Overview of Peer-to-Peer
Presentation transcript:

Peer-to-Peer Computing Mrs. Tugba Taskaya-Temizel 13/February/2006

Peer-to-Peer Networks Definition The sharing of computer resources and services by direct exchange between systems [ The Intel P2P working group ]. The sharing of computer resources and services by direct exchange between systems [ The Intel P2P working group ]. Peers depend on each other for getting information, computing resources, forwarding requests, etc. which are essential for the functioning of the system as a whole. Peers depend on each other for getting information, computing resources, forwarding requests, etc. which are essential for the functioning of the system as a whole.

Peer-to-Peer Networks Goals Cost sharing/reduction Cost sharing/reduction Resource aggregation and interoperability Resource aggregation and interoperability Improved scalability/reliability Improved scalability/reliability Increased autonomy Increased autonomy Anonymity/privacy Anonymity/privacy Dynamism Dynamism

Peer-to-Peer Networks Algorithms: Centralised directory model Central Directory Peers search download Peers publish information about the content they want to share to a central directory. A peer sends a request. The central directory will match the request with the best matching peer. The files are exchanged between the requester and the matching peer. Application: Napster Disadvantage: scalability

Peer-to-Peer Networks Algorithms: Flooded Requests Model search download A peer’s request is broadcasted to the directly connected peers, which themselves flood their peers until the request is answered or a maximum number of flooding steps (5 to 9) occur. Application: Gnutella Disadvantage: requires a lot of bandwidth, does not guarantee reachability.

Peer-to-Peer Networks Algorithms: Document Routing Model Each peer is assigned a random ID and each knows a certain number of its peers. An ID is generated based on the hash of the requested document content and name. Each peer sends the file to a peer that has a similar ID. It is repeated until the peer’s ID is identical to the document ID. The file is transferred between the peers. Application: FreeNet Disadvantage: Document IDs should be known, islanding problem. File id=0009File id=0030 File id=0010 File id=0005 Algorithms implemented: Chord, CAN, Tapestry, Pastry

Peer-to-Peer Networks Characteristics: Decentralisation User’s ownership and control of data and resources User’s ownership and control of data and resources Difficulty: finding the network, insertion of new nodes Difficulty: finding the network, insertion of new nodes

Peer-to-Peer Networks Characteristics: Scalability Limited by factors such as Limited by factors such as The amount of centralised operations The amount of centralised operations The amount of state that needs to be maintained The amount of state that needs to be maintained The inherent parallelism an application exhibits The inherent parallelism an application exhibits Programming model Programming model Scalability ~ Communication/Computation Scalability ~ Communication/Computation

Peer-to-Peer Networks Characteristics: Anonymity Goals: Goals: To allow people to use systems without concern for legal or other ramifications. To allow people to use systems without concern for legal or other ramifications. To guarantee that censorship of digital content is not possible. To guarantee that censorship of digital content is not possible. Types of anonymity: server, receiver, mutual Types of anonymity: server, receiver, mutual

Peer-to-Peer Networks Characteristics: Anonymity (Techniques) Multicasting : Multicasting : Broadcasting group Entity subscribes Entity document request sends request The identities of requester and sender are not known to the group.

Peer-to-Peer Networks Characteristics: Anonymity (Techniques) Spoofing the sender’s address: Spoofing the sender’s address: Message can be enforced by spoofing the sender’s IP address. Message can be enforced by spoofing the sender’s IP address. Problem: ISPs do not accept messages from invalid IP addresses. Problem: ISPs do not accept messages from invalid IP addresses. Identity Spoofing Identity Spoofing Cover paths: Two parties communicate through some middle nodes. Cover paths: Two parties communicate through some middle nodes.

Peer-to-Peer Networks Characteristics: Anonymity (Techniques) Intractable aliases: such as Lucent Personalised Web Assistant (LPWA) Intractable aliases: such as Lucent Personalised Web Assistant (LPWA) Send user name and secret Generate a set of consistent alias username, password, e- mail address in each time the user sends the same information Send the generated info

Peer-to-Peer Networks Characteristics: Anonymity (Techniques) Non-voluntary placement: A publisher forces a document onto a hosting node. Because the placement is non-voluntary, the host cannot be held accountable for owning the document. Non-voluntary placement: A publisher forces a document onto a hosting node. Because the placement is non-voluntary, the host cannot be held accountable for owning the document.

Peer-to-Peer Networks Characteristics: Self-Organisation P2P systems can scale unpredictably in terms of the number of systems, number of users, and the load. P2P systems can scale unpredictably in terms of the number of systems, number of users, and the load. Adaptation is required to handle the changes caused by peers connecting and disconnecting from the P2P systems. Adaptation is required to handle the changes caused by peers connecting and disconnecting from the P2P systems. For example in the FastTrack system, more powerful computers automatically become SuperNodes and act as search hubs. Any client can become a SuperNode if it meets processing and networking criteria (bandwidth and latency). For example in the FastTrack system, more powerful computers automatically become SuperNodes and act as search hubs. Any client can become a SuperNode if it meets processing and networking criteria (bandwidth and latency).

Peer-to-Peer Networks Characteristics: Cost of Ownership Shared ownership reduces the cost of maintaining the system and owning the systems. Shared ownership reduces the cost of maintaining the system and owning the systems. For example, in Napster, the users contributed to the pool of music files. is faster than the fastest computer in the world. For example, in Napster, the users contributed to the pool of music files. is faster than the fastest computer in the world.

Peer-to-Peer Networks Characteristics: Ad-hoc Connectivity Peers are not available at all times. Hence, P2P systems need to be aware of this ad- hoc nature. Peers are not available at all times. Hence, P2P systems need to be aware of this ad- hoc nature. P2P systems need to tolerate disconnection and ad-hoc additions to groups of peers. P2P systems need to tolerate disconnection and ad-hoc additions to groups of peers.

Peer-to-Peer Networks Characteristics: Performance P2P systems aim to improve performance by aggregating distributed storage capacity. P2P systems aim to improve performance by aggregating distributed storage capacity. Performance is influenced by: Performance is influenced by: Processing, storage and networking Processing, storage and networking Approaches to optimise performance: Approaches to optimise performance: Replication, caching, intelligent routing Replication, caching, intelligent routing

Peer-to-Peer Networks Characteristics: Security Multi-key encryption Multi-key encryption Sandboxing Sandboxing Digital rights management Digital rights management Reputation and accountability Reputation and accountability Firewalls Firewalls

Peer-to-Peer Networks Characteristics: Transparency and Usability End-to-end transparency: TCP/IP End-to-end transparency: TCP/IP Naming transparency Naming transparency Network and device transparency Network and device transparency Automatic and transparent authentication of users Automatic and transparent authentication of users

Peer-to-Peer Networks Characteristics: Fault Resilience P2P systems should deal with: P2P systems should deal with: Disconnections/unreachability Disconnections/unreachability Partitions Partitions Node failures Node failures Solutions: Solutions: Replication of crucial resources Replication of crucial resources Relays Relays Queuing messages Queuing messages

Peer-to-Peer Networks Characteristics: Interoperability Standards: IEEE standards for Ethernet, token ring and wireless Standards: IEEE standards for Ethernet, token ring and wireless Common specifications: Object Management Group Common specifications: Object Management Group Open source: Linux Open source: Linux De facto standards: Windows, Java De facto standards: Windows, Java P2P Working Group is an attempt to gather the community. P2P Working Group is an attempt to gather the community.

Peer-to-Peer Networks Comparison with Grid Computing Target communities and incentives Target communities and incentives Resources Resources Applications Applications Scale and failure Scale and failure Services and infrastructure Services and infrastructure

Peer-to-Peer Networks Comparison with Grid Computing Target communities and incentives: Target communities and incentives: Grids address the needs of scientific collaborations and commerce. Grids address the needs of scientific collaborations and commerce. P2P has been used mostly for file sharing and highly parallel computing applications. The communities comprise anonymous individuals. P2P has been used mostly for file sharing and highly parallel computing applications. The communities comprise anonymous individuals.

Peer-to-Peer Networks Comparison with Grid Computing Resources: Resources: Grid systems integrate resources that are more powerful, more diverse and better connected than P2P resource. Grid systems integrate resources that are more powerful, more diverse and better connected than P2P resource. The resources are aggregated within administrative domains via technologies such as Condor. The resources are aggregated within administrative domains via technologies such as Condor. Grid resources are more powerful than P2P resources. Grid resources are more powerful than P2P resources. P2P systems deal with intermittent participation and highly variable behaviour. P2P systems deal with intermittent participation and highly variable behaviour.

Peer-to-Peer Networks Comparison with Grid Computing Applications: Applications: Grid applications are dominantly scientific applications. Grid applications are dominantly scientific applications. P2P deal with specialised resource-sharing problems: current ones share either compute cycles or files. P2P deal with specialised resource-sharing problems: current ones share either compute cycles or files. Grid applications are far more data intensive. Grid applications are far more data intensive.

Peer-to-Peer Networks Comparison with Grid Computing Scale and failure: Scale and failure: Grid communities involve moderate number of participants, whereas P2P communities involve millions of users. However, the amount of activity in P2P is not larger than Grid communities. Grid communities involve moderate number of participants, whereas P2P communities involve millions of users. However, the amount of activity in P2P is not larger than Grid communities.

Peer-to-Peer Networks Comparison with Grid Computing Services and infrastructure: Services and infrastructure: There is an effort to standardise Grid technologies (OGSA). There is an effort to standardise Grid technologies (OGSA). P2P systems have tended to focus on the integration of simple resources via protocols designed to provide specific functionality. P2P systems have tended to focus on the integration of simple resources via protocols designed to provide specific functionality.

References Foster,I. and Iamnitchi,A. On Death, Taxes, and the Convergence of Peer-to-Peer and Grid Computing. Foster,I. and Iamnitchi,A. On Death, Taxes, and the Convergence of Peer-to-Peer and Grid Computing. Shirky,C. What is P2P… and What isn’t? hirky1-whatisp2p.html Shirky,C. What is P2P… and What isn’t? hirky1-whatisp2p.html hirky1-whatisp2p.html hirky1-whatisp2p.html Milojijic,D.S., Kalogeraki,V.,Lukose,R. Peer-to-Peer Computing, d05/papers/p2p-tutorial.pdf Milojijic,D.S., Kalogeraki,V.,Lukose,R. Peer-to-Peer Computing, d05/papers/p2p-tutorial.pdf