Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park 2006. 11. 29.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Speaker: Cathrin Weiß 11/23/2004 Proseminar Peer-to-Peer Information Systems.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion StoicaRobert Morris David Liben-NowellDavid R. Karger M. Frans KaashoekFrank.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Stoica et al. Presented by Tam Chantem March 30, 2007.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Peer-to-Peer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
EPFL-I&C-LSIR [P-Grid.org] Workshop on Distributed Data and Structures ’04 NCCR-MICS [IP5] presented by Anwitaman Datta Joint work with Karl Aberer and.
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
Security Considerations for Structured p2p Peng Wang 6/04/2003.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Introduction of P2P systems
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
1 Peer-to-Peer Systems. 2 Introduction What is peer One that of equal standing with another Peer-to-peer A way of structure distributed applications Each.
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Lecture 2 Distributed Hash Table
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Peer-to-peer systems (part I) Slides by Indranil Gupta (modified by N. Vaidya)
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Peer-to-peer Systems All slides © IG.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
A Scalable Peer-to-peer Lookup Service for Internet Applications
EE 122: Peer-to-Peer (P2P) Networks
DHT Routing Geometries and Chord
P2P Systems and Distributed Hash Tables
MIT LCS Proceedings of the 2001 ACM SIGCOMM Conference
Presentation transcript:

Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park

2 / 26 Contents  Introduction to P2P  Structured scheme  Unstructured scheme  Conclusion

3 / 26 Introduction to P2P  Peer to Peer Server-client?

4 / 26 Introduction to P2P  Overlay?

5 / 26 Introduction to P2P  Peer-to-peer overlay network Distributed systems No hierarchical organization No centralized control Overlayed on the IP Robust wide-area routing Efficient searching Storing, Selecting, Scalability, …

6 / 26 Introduction to P2P (cont’d)

7 / 26 Introduction to P2P (cont’d)  Distributed hash table Decentralized Scalability Fault tolerance

8 / 26 Introduction to P2P (cont’d)  Structured P2P overlay networks Network topology is tightly controlled Use distributed hash table as a substrate  Unstructured P2P overlay networks Each peers doesn’t know about whole network topology

9 / 26 Contents  Introduction to P2P  Structured scheme Pastry Chord P-Grid  Unstructured scheme  Conclusion

10 / 26 Structured scheme Pastry  General substrate of p2p application  Self-organizing, decentralized, scalable  128-bit node ID for each node  ┌ Log 2^b N ┐ step routing

11 / 26 Structured scheme Pastry – Node state  Routing table Entry (n,i) shares first n digits and (n+1)th digit is i  Leaf set Numerically closest of nodeID  Neighborhood set Closest in IP network

12 / 26 Structured scheme Pastry – Routing, Join, Failure  Routing Leaf set matching Longest prefix matching in routing table  Join Assumption : new peer A knows a nearby peer X Join message routed to numerically closest peer Z  Each row of routing table constructed along the path  Leaf of Z is almost same as that of A  Neighbor of X is almost same as that of A  Failure or Departure Recursive recovery

13 / 26 Structured scheme Chord  Scalable, distributed, self-organizing  Node and keys are distributed on the identifier circle  Node/Key identifier : hashing  Consistent hashing

14 / 26 Structured scheme Chord – Identifier circle / finger table  Key identifiers are stored in its successor node Lookup on successors  Finger table provides faster lookup Keep entry of 2 n th successors Add scalability A Chord identifier circle with 3 nodes (0, 1, 3) and 3 keys (1, 2, 6) A Chord finger table for previous identifier circle

15 / 26 Structured scheme Chord – join / stablization  Join Initialize finger and predecessor Update other nodes’ fingers  Stabilization A problem with inconsistent finger table may arise when concurrent join occurs Predecessor and Successor of each node will be corrected by stabilization

16 / 26 Structured scheme P-Grid  Scalable access structure for P2P apps  Perfectly decentralized  Tree structure  Every nodes is responsible for an interval in the key space There may be replica

17 / 26 Structured scheme P-Grid – access structure  Search can be started at any peer Prefix-based routing

18 / 26 Structured scheme P-Grid – construction  Construction is locally executed Nodes meet each other in many ways  Access structure, other operations, and so on Exact join operation is based on the shared prefix  Same prefix : divide coverage  Prefix relationship : extends shorter prefix  Share prefix : reference exchange

19 / 26 Contents  Introduction to P2P  Structured scheme  Unstructured scheme Napster Gnutella FastTrack  Conclusion

20 / 26 Unstructured scheme Napster  1 st generation of P2P network Purpose to share ‘Music’ files  Centralized search Single index server (no data in the server) File transfer is distributed (p2p)  Copyright?

21 / 26 Unstructured scheme Napster S S S P P PP P P Client machines (“Peers”) napster.com Servers Store their own files Store a directory, i.e., filenames with peer pointers Figure from the slides of I. Gupta

22 / 26 Unstructured scheme Gnutella  Flat topology, Decentralized  Join No specification in the protocol Pre-existing address, cached or known server, IRC, ….  Search Query flooding Flooding range : TTL  File transfer HTTP GET request

23 / 26 Unstructured scheme Gnutella  Message Randomly generated identifier Cached to drop duplicated messages  Message type Group membership (Ping and Pong) Search (Query and QueryHit) File transfer for Filewalled servant (Push)

24 / 26 Unstructured scheme FastTrack  Super-peer High bandwidth and computing power Collects meta-data Process queries  HTTP file transfer Directly from other peer Hash may be used to receive files from multiple sources

25 / 26 Conclusion  Various P2P network schemes Many improved aspects from traditional server-client model Structured – Pastry, Chord, P-grid, … Unstructured – Gnutella, Napster, … Legal issue?

26 / 26 References  Eng Keong Lua, et el., A survey and comparison of peer- to-peer overlay network schemes, IEEE COMM. Survey and tutorial on 2004  K. Aberer, P-Grid : A self-organizing access structure for P2P information systems, Proc. of 6 th CoopIS  A. Rowstron, P. Druschel, Pastry : Scalable, decentralized object location and routing for large-scale peer-to-peer systems, Proc. of 18 th ICDSP  I. stoica, et el., Chord : A scalable peer-to-peer lookup service for internet applications, SIGCOMM ’01   The Gnutella Protocol Specification v0.4  And so on…