1/30/2002Collaborative Computing in Higher Education1 Design Choices in P2P Infrastructure Wes Felter IBM Austin Research Lab

Slides:



Advertisements
Similar presentations
Peer-to-Peer Infrastructure and Applications Andrew Herbert Microsoft Research, Cambridge
Advertisements

2/15/2001O'Reilly P2P Conference Characterizing P2P Infrastructure Wesley Felter Editor, Hack the Planet
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Scalable Content-Addressable Network Lintao Liu
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric Petar Mayamounkov David Mazières A few slides are taken from the authors’ original.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman:
Peer to Peer Discovery Nate Thrasher. Peer to Peer Discovery ● 2 Basic Categories – Hardware Discovery – Information Discovery ● JXTA (
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Peer-to-Peer Computing
Part 1: Overview of Web Systems Part 2: Peer-to-Peer Systems Internet Computing Workshop Tom Chothia.
Data Management in Peer-to- Peer Systems Qi Sun Beverly Yang.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
Jay Sheth P2P Basics Jay Sheth CE, UMBC. Jay Sheth P2P Agenda What is P2P Why P2P Components and algorithms Characteristics Different P2P systems Future.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
CS 640: Introduction to Computer Networks Yu-Chi Lai Lecture 18 - Peer-to-Peer.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Introduction Widespread unstructured P2P network
P2P Taxonomy and Security Concerns Ryan Lackey CTO, HavenCo, Ltd. RSA Conference 2002 San Jose
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.
Peer To Peer Applications
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Naming Examples UUID (universal unique ID) – 128 bit numbers, locally generated, guaranteed globally unique Uniform Resource Identifier (URI) URL (uniform.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Vincent Matossian September 21st 2001 ECE 579 An Overview of Decentralized Discovery mechanisms.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
University of Würzburg Distributed Systems Prof. Dr. P. Tran-Gia An Application-level Active Networks Based Architecture for the Performance Management.
Kaleidoscope – Adding Colors to Kademlia Gil Einziger, Roy Friedman, Eyal Kibbar Computer Science, Technion 1.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 24 - Peer-to-Peer.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
Seminar on Service Oriented Architecture Distributed Systems Architectural Models From Coulouris, 5 th Ed. SOA Seminar Coulouris 5Ed.1.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Project JXTA Kaarthik Sivashanmugam. JXTA..? JXTA is a set of open, generalized peer-to-peer (P2P) protocols that allow any connected device on the network.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Composing Web Services and P2P Infrastructure. PRESENTATION FLOW Related Works Paper Idea Our Project Infrastructure.
Peer-to-Peer Information Systems Week 12: Naming
BitTorrent Vs Gnutella.
CASCADE: AN ATTACK-RESISTANT DHT WITH MINIMAL HARD STATE
Peer-to-Peer Data Management
CHAPTER 3 Architectures for Distributed Systems
PROGRAM STUDI TEKNIK INFORMATIKA FAKULTAS ILMU KOMPUTER
Chapter 9 Web Services: JAX-RPC, WSDL, XML Schema, and SOAP
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Peer-to-Peer Information Systems Week 6: Performance
An Overview of Peer-to-Peer
Peer-To-Peer Data Management
InfoShare A Distributed P2P Information Storage & Retrieval System
Consistent Hashing and Distributed Hash Table
Peer-to-Peer Information Systems Week 12: Naming
Kademlia: A Peer-to-peer Information System Based on the XOR Metric
Presentation transcript:

1/30/2002Collaborative Computing in Higher Education1 Design Choices in P2P Infrastructure Wes Felter IBM Austin Research Lab

1/30/2002Collaborative Computing in Higher Education2 P2P Infrastructure Choices common to many P2P systems –Locations vs. Names –Network vs. App-Level Routing –RPC vs. Asynchronous Messaging –Lookup –Specialization –Incentives Common Ground?

1/30/2002Collaborative Computing in Higher Education3 Locations vs. Names Applies to peers, data, services Locations = URLs, Names = URNs Locations are simpler, faster, but inhibit replication –Used by Napster, Gnutella Names require directory service and namespace management –Used by Freenet, Mojo Nation, OceanStore

1/30/2002Collaborative Computing in Higher Education4 Network vs. App-level routing Network routing is “free”, minimizes latency –Used by Napster, Mojo Nation App-level routing can optimize for different metrics (e.g. privacy), provide multicast and replication –Used by Freenet, OceanStore Hybrids can work –Gnutella routes queries, but sends data direct

1/30/2002Collaborative Computing in Higher Education5 Network Routing

1/30/2002Collaborative Computing in Higher Education6 Application-Level Routing

1/30/2002Collaborative Computing in Higher Education7 Application-Level Routing 2

1/30/2002Collaborative Computing in Higher Education8 RPC vs. Async Messaging RPC has easy programming model, but: –Usually requires threads –Can encourage ignoring failures Asynchronous messaging –A different programming model (maybe) –Use event loops instead of threads –Design protocols as state machines

1/30/2002Collaborative Computing in Higher Education9 The Lookup Problem Map keys to values Minimize memory/storage use Minimize network round trips Be reliable (despite unreliable peers) Have an infinite “horizon” Resist attacks

1/30/2002Collaborative Computing in Higher Education10 Specialization All peers can perform exactly the same services –Freenet Or peers can specialize –Simple case: Sharing or not –More sophisticated: Gnutella Reflector, Mojo Nation index “trackers” –Some systems automatically elect “super-peers” based on their resources

1/30/2002Collaborative Computing in Higher Education11 An Unsolved Problem: Incentives Many P2P systems ask users to provide resources Why should they? Freeloading  Tragedy of the commons Don’t prohibit what you can’t prevent Reputations? Money? Real or Play?

1/30/2002Collaborative Computing in Higher Education12 Is there a common ground? Naming –SHA-1 is already popular Messaging –HTTP and XML protocols (XML-RPC, SOAP) –Sun’s JXTA is trying, with little adoption Directories

1/30/2002Collaborative Computing in Higher Education13 Moving Up a Level We know the primitives Are architectural models useful? –Data-oriented –Event-oriented –?

1/30/2002Collaborative Computing in Higher Education14 The End Wes Felter