2-Hop TorrentSmell A distributed tracking algorithm name:Raynor Vliegendhart date:July 10, 2009 event:Tribler Dev Meeting.

Slides:



Advertisements
Similar presentations
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Advertisements

The BitTorrent Protocol
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
Incentives Build Robustness in BitTorrent Author: Bram Cohen Presenter: Brian Liao.
Incentives Build Robustness in BitTorrent Bram Cohen.
End-to-end Publishing Using Bittorrent. Bittorrent Bittorrent is a widely used peer-to- peer network used to distribute files, especially large ones It.
Ln -s /usr/timtimmah /usr/kevinstanonik. TORRENT BASICS  You want to get a file to other people.  BUT you don’t have the bandwidth to have everyone.
Cameron Dale and Jiangchuan LiuA Measurement Study of Piece Population in BitTorrent Introduction BitTorrent Experiment Results Simulation Discussion A.
BitTorrent Join the swarm! BY: Joe Petruska. What is BitTorrent? a peer-to-peer file sharing protocol used for distributing large amounts of data.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
RBAC and JXTA 1 Role Based Access Control and the JXTA P2P Framework Mark Stamp Dept. of Computer Science San Jose State University
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Basic Computer Networks Configurations (cont.) School of Business Eastern Illinois University © Abdou Illia, Spring 2006 Week 2, Thursday 1/19/2006)
1 Incentives Build Robustness in BitTorrent? Analysis on Bit Torrent Client performance By Jimmy Wong.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
The Bittorrent Protocol
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Leveraging Social Networks for Increased BitTorrent Robustness Wojciech Galuba, Karl Aberer EPFL, Switzerland Zoran Despotovic, Wolfgang Kellerer Docomo.
Virtual Communities and Gossiping in Social-Based P2P Systems
1 Vehicular Networks - Content distribution and data retrieval Slides are integrated from researchers at UCLA.
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
BitTorrent Internet Technologies and Applications.

BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
P2P Investigation PEDRO GALLEGOS. Topics  Overview of P2P  Direct vs Hearsay  Investigation Steps  Analysis Gnutella Protocol  RoundUp.
File Sharing Prepared By: Mahmud Gabareen Eyal Biber Itamar Arie Lecturer Iris Reinhartz-Berger.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
1 BitTorrent System Efrat Oune Bar-Ilan What is BitTorrent? BitTorrent is a peer-to-peer file distribution system (built for intensive daily use.
Do incentives build robustness in BitTorrent? Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani.
11/10/20151 A Standalone Content Sharing Application for Spontaneous Communities of Mobile Handhelds Authors: Amir Krifa –
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
1 Slides from Richard Yang with minor modification Peer-to-Peer Systems: DHT and Swarming.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Draft-gu-ppsp-peer-protocol-02 Presenter : Gu Yingjie IETF-81, Quebec, July, 2011.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Architecture Models. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
Experience Sharing in Mobile Peer Communities EPI Planete, INRIA International Consortium Meeting (Oulou) 10 June, 2009.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Bruce Hammer, Steve Wallis, Raymond Ho
Research data management using Globus ESIP Summer Meeting 2015 Rachana Ananthakrishnan University of Chicago
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Usage of PPSP System draft-zhang-ppsp-usage-00 Fei Song, Hongke Zhang, Di Wu and Mi IETF 90.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
End-to-end Publishing Using Bittorrent. Bittorrent Bittorrent is a widely used peer-to- peer network used to distribute files, especially large ones It.
© 2016 A. Haeberlen, Z. Ives CIS 455/555: Internet and Web Systems 1 University of Pennsylvania Decentralized systems February 15, 2016.
P2P Streaming Protocol (PPSP) Requirements draft-zong-ppsp-reqs-02 Ning Zong Yunfei Zhang Victor Pascual Carl Williams.
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
An example of peer-to-peer application
The Hidden Locality in Swarms
Copyright notice © 2008 Raul Jimenez - -
Introduction to BitTorrent
Decentralized peer discovery performance in swarm-protocols
Decentralized peer discovery performance in swarm-protocols
Copyright notice © 2008 Raul Jimenez - -
Comparison of LAN, MAN, WAN
PEER TO PEER BitTorrent.
Angelo Sapello University of Delaware
DATA RETRIEVAL IN ADHOC NETWORKS
Pure P2P architecture no always-on server
#02 Peer to Peer Networking
Lin Xiao David A. Bryan Yingjie Gu Xuan Tai
Presentation transcript:

2-Hop TorrentSmell A distributed tracking algorithm name:Raynor Vliegendhart date:July 10, 2009 event:Tribler Dev Meeting

Research Question How to decentralize Peer Discovery Functionality with hooks for Security and Scalability? 2

Central Tracker 3 Request Peerlist

Central Tracker 4 Peer List

Central Tracker 5 Connect to Download Swarm

Central Tracker 6 Keep in touch with tracker to 1.discover new peers; 2.announce your presence.

Distributed Tracking How do we… track peers in the swarm? find the distributed trackers tracking the swarm? 7

Distributed Tracking Algorithm How do we… track peers in the swarm? RePEX find the distributed trackers tracking the swarm? Extended Remote Content Search 8 2-Hop TorrentSmell

Peer Exchange 9 Modern BitTorrent clients can exchange their neighbourhood sets through Peer Exchange (PEX)

Peer Exchange 10 Modern BitTorrent clients can exchange their neighbourhood sets through Peer Exchange (PEX)

Peer Exchange 11 Modern BitTorrent clients can exchange their neighbourhood sets through Peer Exchange (PEX) ,

RePEX Reconnect to PEX peers encountered before. Discover new and reliable peers. Goal: Each peer has a local list of peers in the swarm. 12

Which swarms to track? How often? How many peers to store? RePEX Research Questions 13

Which swarms to track? Last 25 downloads, since we have been in those swarms before How often? How many peers to store? Yet unknown; Measurements needed to determine churn, online status, connectivity, etc. RePEX Research Questions 14

Remote Content Search Currently implemented in Tribler: 15 “Obama”

Remote Content Search 16 obama.mp3 SHA1 obama.avi SHA1 X Tribler peers respond with matching torrent files

Extended Remote Content Search + RePEX 17 “Obama” RePEX Tribler Peer

Extended Remote Content Search + RePEX 18 RePEX Tribler Peer obama.mp3 SHA1 obama.avi SHA1 X , , … A RePEX peer includes swarm peers in the response

2-Hop TorrentSmell 19 Tribler peers already announce their download profile through BuddyCast We can use this to further extend Remote Content Search

2-Hop TorrentSmell 20 “Obama” The user issues a query as normally

2-Hop TorrentSmell The responding Tribler peer knows who has downloaded obama.avi obama.avi SHA1 +RePEX: , …

2-Hop TorrentSmell So the user can reissue the query to that peer “Obama”

2-Hop TorrentSmell Finally, the RePEX peer responds with a list of swarm peers obama.avi SHA1 +Swarm: , , …

Algorithm Summary 24 2 Hops needed using Extended RCS RePEX used for tracking

Research Questions Recap How often do we have to revisit swarms? How many peers should we store per swarm? What’s the churn rate? Etc… 25

Additional Research Questions But also: Do peers lie about PEX capabilities? What’s the PEX “response time” of non-Tribler peers? 26