Peer-to-Peer Protocol (P2PP)

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Address Settlement by Peer to Peer (ASP) Jonathan Rosenberg Cullen Jennings Eric Rescorla.
Review of a research paper on Skype
Addressing the P2P Bootstrap Problem for Small Overlay Networks David Wolinsky, Pierre St. Juste, P. Oscar Boykin, and Renato Figueiredo ACIS P2P Group.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
No Class on Friday There will be NO class on: FRIDAY 1/30/15.
Outline  Introduction to Application Layer  Peer-to-peer paradigm  Client-server paradigm  Domain Name System (DNS)  Flat-naming vs hierarchical-naming.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
More about Skype. Overview Any node with a public IP address having sufficient CPU, memory and network bandwidth is a candidate to become a super node.
Transport Layer3-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Internet Networking Spring 2002 Tutorial 13 Web Caching Protocols ICP, CARP.
SIMULATING A MOBILE PEER-TO-PEER NETWORK Simo Sibakov Department of Communications and Networking (Comnet) Helsinki University of Technology Supervisor:
P2P File Sharing Systems
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 Tracker Protocol Proposal.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
1 Next Few Classes Networking basics Protection & Security.
Access Control List (ACL)
1 End-user Protocols, Services and QoS. 2 Layering: logical communication application transport network link physical application transport network link.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Ch 2. Application Layer Myungchul Kim
1 Figure 3-27: Use of TCP and UDP Port Number Client From: :50047 To: :80 SMTP Server Port 25 Webserver.
Problems in using HIP for P2PSIP Philip Matthews Avaya
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Transport Layer 3-1 Chapter 3 Outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP.
S2C7 – Novell NetWare IP and IPX Services. Novell Protocols Transport Layer –TCP/IP –SPXInternetwork Packet Exchange Network Layer –NLSP (Netware Link.
P2P Group Meeting (ICS/FORTH) Monday, 28 March, 2005 A Scalable Content-Addressable Network Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp,
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Requirements for Peer protocol draft-jiang-p2psip-peer-protocol-requirement-00.txt Jiang XingFeng (Johnson) P2PSIP WG, IETF #68.
Click to edit Master title style Multi-Destination Routing and the Design of Peer-to-Peer Overlays Authors John Buford Panasonic Princeton Lab, USA. Alan.
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
The eXtensible Peer Protocol (XPP) Emil Ivov - Enrico Marocco –
RELOAD draft-bryan-p2psip-reload-01 draft-lowekamp-p2psip-reload-security-01 Bruce Lowekamp David Bryan Jim Deverick Marcia Zangrilli.
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
Midterm Review. Chapter 1 Internet Concepts Applications, End-hosts, Routers, Switches, Communication Links Overall architecture How they are organized.
Draft-ietf-p2psip-base-08 Cullen Jennings Bruce Lowekamp Eric Rescorla Salman Baset Henning Schulzrinne March 25, 2010.
Ch 2. Application Layer Myungchul Kim
Peer-to-Peer Protocol (P2PP) Salman Baset, Henning Schulzrinne Columbia University.
Transport Layer3-1 Transport Layer Never take life seriously. Nobody gets out alive anyway.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
NAT Traversal in HIP Xiang LIU TML/HIIT 1.
Introduction To Application Layer
PEER-TO-PEER NETWORK FAMILIES
Copyright notice © 2008 Raul Jimenez - -
Peer to peer Internet telephony challenges, status and trend
Administrative Things
IETF 82 BFCPBIS WG Meeting
Interconnection topologies
Kris, Karthik, Ansley, Sean, Jeremy Dick, David K, Frans, Hari
LOCSER + HIP draft-hautakorpi-p2psip-peer-protocol-00
CHAPTER 3 Architectures for Distributed Systems
Server-client vs. P2P: example
P2PS: a Peer-to-Peer Development Platform
Internet Networking recitation #12
OpenVoIP An Open Peer-to-Peer VoIP and IM System
P2P-SIP Using an External P2P network (DHT)
Chat Refs: RFC 1459 (IRC).
Prof. Leonardo Mostarda University of Camerino
Part 4: Peer to Peer - P2P Applications
Jiang XingFeng (Johnson) P2PSIP WG, IETF #68
draft-ietf-p2psip-base-03
Domain Name System: DNS
Presentation transcript:

Peer-to-Peer Protocol (P2PP) Binary-based, type-length-value (TLV) objects No DHT specific detail Simple state-machine each request generates a response Request routing recursive vs. iterative parallel requests Transport TCP vs. UDP links between peers API Transport -tradeoffs between the use of TCP and UDP for recursive and iterative routing -TCP or UDP for overlay maintenance

P2PP Functionality DHT commonalities, performance enhancements are incorporated in the protocol Capabilities (such as b/w, connection state) exchange Logical separation for overlay maintenance resource manipulation diagnostics Overlay maintenance join, leave, keep-alive, routing-peer-lookup, replicate, update, query Resource manipulation insert, lookup, remove Connection state: behind a NAT or a firewall

To SIP or not to SIP SIP guidelines document allows to register AOR but not a service STUN or TURN service Bandwidth estimation service Overlay maintenance is an active operation Nodes come and go Routing-neighbor information needs to be exchanged SIP is not a distributed system maintenance protocol Overloading meaning of SIP headers is not a good practice

Definitions Resource vs. service Peer vs. client There is no difference between resource and a service. What can be a better name for client?