1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing P2P Algorithms.
Advertisements

1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
A P RESENTATION O N R ESOURCE D ISCOVERY I N T HE P EER- T O- P EER N ETWORK by Aravind Renganathan.
1 Gnutella and JXTA Based on Ivkovic’s paper “Improving Gnutella Protocol”. Also based on Docs and Tutorials at
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Measuring and Analyzing the Characteristics of Napster and Gnutella Hosts S. Saroiu, P. Gummadi, and S. Gribble Multimedia Systems Journal Volume 8, Issue.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
A Measurement Study of Peer-to- Peer File Sharing Systems Sariou, Gummadi, and Gribble.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
DNS: Revising the Current Protocol Matt Gustafson Matt Weaver CS522 Computer Communications University of Colorado, Colorado Springs.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Review of Free Riding on Gnutella Eytan Adar and Bernardo Huberman Shreeram Sahasrabudhe.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Presentation by Manasee Conjeepuram Krishnamoorthy.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Unstructured P2P networks by example:Gnutella 0.4,Gnutella 0.6 张旭彤 杨蕊鸿 马骕 林晔.
1 A Collaboration Scheme for Making Peer-to-Peer Anonymous Routing Resilient Authors: X. Wang and J. Luo Source: 12th International Conference on Computer.
COCONET: Co-Operative Cache driven Overlay NETwork for p2p VoD streaming Abhishek Bhattacharya, Zhenyu Yang & Deng Pan.
Gnutella2: A Better Gnutella?
Survey of Peer to Peer Technologies Authors: Bratislav Milić, Jelena Krunić, Veljko Milutinović,
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
1 Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme Authors: C. Lin and R. C. Roberto Source: IEEE Communications.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
1 A peer mutual authentication method on super peer based peer-to- peer network Authors: Byeong-Thaek Oh, Sang-Bong Lee, and Ho-Jin Park Source: IEEE International.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Partition and multi-path transmission-An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network Author: X. X. Ma, and Z. G.
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
Peer-to-Peer By Rui Zhang, Chen Teng, Li Dong, Quanshuan He & Yongzheng Zhang.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
1 Signature Protocol for Peer-to- peer Massively Multiplayer Online Games Speaker: Shu-Fen Chiou ( 邱淑芬 )
Peer-to-peer systems (part I) Slides by Indranil Gupta (modified by N. Vaidya)
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Evaluation GUESS and Non-Forwarding Peer-to-Peer search ICDCS paper Beverly Yang Patrick Vinograd Hector Garcia-Molina Computer Science Department, Stanford.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
1 SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks Authors: Xiaowei Chen, Kaiyong Zhao, and Xiaowen Chu Source: Autonomic and Trusted.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Presented by Edith Ngai MPhil Term 3 Presentation
A Measurement Study of Peer-to-Peer File Sharing Systems
Improving Performance in the Gnutella Protocol
Peer-to-Peer Information Systems Week 6: Performance
Peer-to-Peer Information Systems Week 2: File Sharing
Peer-to-Peer Information Systems Week 2: File Sharing
Presentation transcript:

1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source: Computer Communications, vol. 31, pp. 240 – 256, 2008 Speaker: Shu-Fen Chiou ( 邱淑芬 )

2 Outline Introduction Gnutella Free rider Proposed scheme P2P Connection Management Protocol (PCMP) Simulation result Attacks Conclusion Comments

3 Introduction Gnutella (Host Cache) It is a pure P2P protocol in contrast with Napster It is a broadcast-type network The core of the protocol consists of 5 descriptors PING, PONG, QUERY, QUERY HIT and PUSH A Peer needs to connect to 1 or more other Gnutella Peers in order to participate in the network Gnutella Network N Server p QUERY 1 QUERY HIT 2 Server p2

4 Introduction Find Hosts Gnutella

5 Introduction Ping Gnutella

6 Introduction Pong Gnutella

7 Introduction Pong Gnutella

8 Introduction Pong Gnutella

9 Introduction Query Gnutella

10 Introduction Query TTL=2 Gnutella

11 Introduction queryQuery TTL=3 Gnutella

12 Introduction Query Hit Gnutella

13 Introduction Download File Gnutella

14 Free rider Download File Query Free rider

15 Proposed scheme Proposed two connection types. Proposed a P2P Connection Management Protocol (PCMP). Benefits: The connectivity of free riders to the contributing peers can be reduced. In some situations, free riders can be totally isolated from the contributors. The connectivity among contributor peers can be increased. The workload of a contributor peer can be reduced, since it will not serve many free riders anymore.

16 General P2P connection

17 Two connection types IN-connection and OUT-connection Limiting the numbers of connection. IN-connection OUT-connection

18 P2P Connection Management Protocol (PCMP) 2 IN-connections, 2 OUT-connections A B Download file C D IN-connection Requester (Downloader) Responder (Uploader) A According download times(C-PCMP) or update time (T-PCMP) IN-connection B OUT-connection Ping Pong

19 P2P Connection Management Protocol (PCMP) 4 IN-connections, 4 OUT-connections TTL=2 Contributor F1, F3 F2 Query F1

20 P2P Connection Management Protocol (PCMP) Contributor F1, F3 F2 Query F2

21 Simulation results 900 peers

22 Attacks Malicious peer refuse to add a contributor to its list of IN-connections after downloading file. Contributors establish OUT-connections only with other contributors. This attack will not affect.

23 Attacks A malicious peer replies with a faked Query Hit. In PCMP, the connection between two peers is established after a file is download. If the file is wrong, the downloader will not send Pong message.

24 Attacks A malicious peer behaves as a new- comer to gain more OUT-connections. Try to reduce this attack according others ’ methods.

25 Conclusion Proposed a novel approach and a P2P Connection Management Protocol (PCMP).

26 Comments Prevent the third attack. Increase its OUT-connections by: Increasing answering power. Increasing the number of edges. Increasing the amount of capacity used to service neighbors ’ queries. Increasing the length of period for servicing neighbors ’ queries.