INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric Petar Mayamounkov David Mazières A few slides are taken from the authors’ original.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Searching in Unstructured Networks Joining Theory with P-P2P.
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
CSE 461 University of Washington1 Topic Peer-to-peer content delivery – Runs without dedicated infrastructure – BitTorrent as an example Peer.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
1 P2P Computing. 2 What is P2P? Server-Client model.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Introduction of P2P systems
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
 A P2P IRC Network Built on Top of the Kademlia Distributed Hash Table.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
1 Slides from Richard Yang with minor modification Peer-to-Peer Systems: DHT and Swarming.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric
Peer to Peer Network Design Discovery and Routing algorithms
Kademlia: A Peer-to-peer Information System Based on the XOR Metric.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Bruce Hammer, Steve Wallis, Raymond Ho
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
PEAR TO PEAR PROTOCOL. Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Peer-to-peer Systems All slides © IG.
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
An example of peer-to-peer application
Peer-to-Peer Data Management
EE 122: Peer-to-Peer (P2P) Networks
DHT Routing Geometries and Chord
Prof. Leonardo Mostarda University of Camerino
Kademlia: A Peer-to-peer Information System Based on the XOR Metric
#02 Peer to Peer Networking
Presentation transcript:

INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1

Introduction Client-servers will be discussed next week Peer to Peer this week. 2 Server Clients Simultaneous Server/Clients

Introduction First instance of peer-to-peer file sharing dates back to December 1987 Wayne Bell created WWIVnet Still exists: Other systems now exist. 3

P2P Networks Internet users that are ready to share their resources become peers and form a network When a peer in the network has a file to share, it makes it available to the rest of the peers An interested peer can connect itself to the computer where the file is stored and download it. 4

Centralised Network Hybrid P2P Network Directory system (listing peers and what they offer) located on a central server (client-server paradigm) Storage and downloading occurs via P2P paradigm Peer queries central server Server sends IP address of nodes holding files Peer then downloads files from those nodes Directory constantly updated as nodes join and leave network. 5

Centralised Network Maintenance of directory very simple Drawbacks Directory vulnerable to attack Whole system fails if servers go down Original Napster used centralised Network Made them liable for copyright breaches New Napster a legal pay per music site. 6

Figure 29.1: Centralised network 7

Decentralised Network Peers arrange themselves into an overlay network Logical network on top of the physical network Can be classified as Unstructured Networks Structured Networks. 8

Unstructured Network Nodes linked randomly Queries need to flood network Can result in high traffic ie not efficient Examples include Gnutella Freenet. 9

Gnutella Unstructured decentralised P2P network Directory randomly distributed between nodes Node A sends query (request for file location) to a known neighbour node (eg W) If Node W knows location of requested data Sends location of data back to Node A If Node W doesn’t know Sends queries to all its known neighbours Eventually info gets back to A (if it exists) and Node A can get copy of file. 10

Gnutella Queries flood the network and can cause a large amount of traffic NB each node must have at least 1 neighbour On initial software install, a list of peers are included Later the commands 'ping' and 'pong’ used to query if nodes 'alive' Unstructured networks do not scale well Gnutella uses a tiered system (ultra nodes and leaves) as well as Query Routing Protocol and Dynamic Querying to reduce overhead. 11

Structured Network Predefined set of rules to link nodes Queries are resolved effectively and efficiently Distributed Hash Table (DHT) most common technique used Domain Name System (DNS) BitTorrent. 12

Distributed Hash Table (DHT) Distributes data among a set of nodes according to some predefined rules Each peer in a DHT-based network becomes responsible for a range of data items DHT-based networks allow each peer to have partial knowledge about whole network Avoids flooding overhead found in unstructured P2P networks. 13

Address Space Each data item and responsible peer mapped to a point in a large address space of size 2 m Uses modular arithmetic Points in address space distributed evenly on a circle with 2 m points (from 0 to 2 m – 1) Most DHT implementations use m = 160 (~1.5x10 48 points) Textbook uses m = 5, 2 5 = 32 in examples for simplification. 14

Figure 29.2: Address space 15

Hashing Identifiers Peers added to address space ring Usually use a hash function to encode IP address hash function is any function that can be used to map digital data of arbitrary size to digital data of fixed size node ID = hash (Peer IP address) Name of object (eg filename) also hashed and added to address space ring key = hash (Object name) 16

Storing Objects Two strategies Direct Object stored (on original peer) closest to key Indirect Peer keeps object, reference to object stored on another peer close to key Most common strategy. 17

Example 29.1 For Figure 29.3, assume several peers already joined Node N5 (IP address ) has file 'Liberty’ to share with peers Node makes hash of filename, 'Liberty' to get key = 14 Closest node to key 14 is node N17 N5 creates reference to filename (key), its IP address, and the port number etc, then sends reference to be stored in node N17 ie file stored in N5, key of file is k14 (a point in the DHT ring), but reference to file stored in node N17. 18

Figure 29.3: Example

Distributed Hash Table (DHT) Main function is to route a query to node responsible for storing reference to an object Different routing strategies are used by different systems All involve nodes that have partial knowledge of the ring to route queries to node closest to responsible nodes All implementations need to handle departures and arrivals of peers in their networks. 20

P2P Networks Three P2P protocols that use DHT Chord protocol Simple and elegant approach to routing queries Pastry protocol More complex than chord Kademila protocol Similar to Pastry, different distance measuring protocol. 21

Chord Published by Stoker in 2001 Used in several applications Collaborative File System (CFS) ConChord Distributive Domain Name System (DDNS). 22

Pastry Another popular protocol in the P2P paradigm Designed by Rowstron and Druschel in 2001 Uses DHT Some fundamental differences between Pastry and Chord in identifier space and routing process. 23

Pastry Used in some applications PAST Distributed file system SCRIBE Decentralised publish/subscribe system. 24

Kademlia Another DHT peer-to-peer network Designed by Maymounkov and Mazières in 2002 Similar to Pastry, routes messages based on the distance between nodes Address space based on a binary tree Interpretation of the distance metric uses bitwise XOR function to measure distances. 25

Kademlia 26

BitTorrent Designed by Bram Cohen (2001) for sharing large files among a set of peers Based on Kademlia Sharing different from other file-sharing protocols Instead of one peer allowing another peer to download the whole file, a group of peers take part in process to give all peers in the group a copy of file File sharing a collaborative process called a torrent. 27

BitTorrent with a Tracker Original BitTorrent Another entity in a torrent, called 'the tracker’ Central server tracks seeds and peers in swarm Seeds Peer with whole file Leeches Peer with part data (downloading more). 28

29 Figure 29.12: Example of a torrent

Trackerless BitTorrent Original BitTorrent design If tracker fails, new peers cannot connect to network and updating interrupted New implementations of BitTorrent eliminate need for centralised tracker. 30

End 31