Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman:

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Peer to Peer and Distributed Hash Tables
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Naming Computer Engineering Department Distributed Systems Course Asst. Prof. Dr. Ahmet Sayar Kocaeli University - Fall 2014.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #06: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #12: Naming/DNS: SOLUTIONS Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #11 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar 1 ECSE-4670: Computer Communication Networks (CCN) Network Layer Shivkumar.
Introduction to Peer-to-Peer (P2P) Systems Gabi Kliot - Computer Science Department, Technion Concurrent and Distributed Computing Course 28/06/2006 The.
Based on last years lecture notes, used by Juha Takkinen.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 (Solutions) Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 SOLUTIONS Time: 60 min (strictly enforced) Points: 50 YOUR.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Storage management and caching in PAST PRESENTED BY BASKAR RETHINASABAPATHI 1.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
P2P File Sharing Systems
Introduction Widespread unstructured P2P network
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
1 P2P Computing. 2 What is P2P? Server-Client model.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Introduction of P2P systems
Overlay network concept Case study: Distributed Hash table (DHT) Case study: Distributed Hash table (DHT)
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #03 SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Network Computing Laboratory Scalable File Sharing System Using Distributed Hash Table Idea Proposal April 14, 2005 Presentation by Jaesun Han.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Lecture 12 Distributed Hash Tables CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #02 SOLUTIONS (part I) Shivkumar Kalyanaraman: GOOGLE:
CSE 486/586, Spring 2014 CSE 486/586 Distributed Systems Distributed Hash Tables Steve Ko Computer Sciences and Engineering University at Buffalo.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #09: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Malugo – a scalable peer-to-peer storage system..
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Peer-to-Peer (P2P) and Sensor Networks Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Introduction to BitTorrent
ECSE-6600: Internet Protocols
CHAPTER 3 Architectures for Distributed Systems
EE 122: Peer-to-Peer (P2P) Networks
DHT Routing Geometries and Chord
Outline Ganesan, D., Greenstein, B., Estrin, D., Heidemann, J., and Govindan, R. Multiresolution storage and search in sensor networks. Trans. Storage.
InfoShare A Distributed P2P Information Storage & Retrieval System
#02 Peer to Peer Networking
Presentation transcript:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI” Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 2 P2P and Sensor Networks (Slide set #14): Informal Quiz

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 3 P2P and Sensor Networks T F  The goal of P2P networks is limited to using the storage capacity of a large number of PCs.  P2P networking happens at Layer 3 in the OSI hierarchy  A central problem in P2P networks is to map the name of an object to its location.  Napster uses a distributed directory and distributed object storage architecture  Overlays are often used as an economical deployment strategy when barriers exist for deployment at lower layers (eg: for multicast etc)  MP3 downloading accounts for the largest fraction of web traffic in  P2P traffic accounts for roughly 40-60% of all internet traffic in 2006  Flooding is the only way to implement lookup in a distributed directory.  The basic gnutella protocol is decentralized, but not scalable because it depends upon flooding for query routing.  Flooding-based systems are efficient in finding popular objects, but inefficient in locating rare objects.  Bittorrent decentralizes the file download process in addition to the location- service process.  Leechers in bittorrent are nodes that have the entire file.  Bittorrent includes an unchoking method to reduce load on individual nodes; and ensure fair participation by all nodes.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 4 P2P and Sensor Networks  DHT involves a hash space to which both node-IDs and object-IDs map to and nodes maintain different pieces of the hash space, with links to a set of neighbors for content routing.  DHTs are not robust to node failure.  DHTs involve multiple application-level hops before arriving at the node containing the key-to-value mapping.  CAN uses a circle to organize its hash-space.  In the post-internet age, distributed systems involve very-large-scale systems, and typically with weaker semantics.  The current internet infrastructure implements a host-centric architecture  Users access the web in a data-centric manner: they don’t care about the location/host where the object is stored; and only care about the object itself.  DHTs allow scalable, data-centric lookups using flat-IDs.  Data independence matters when the environment changes faster than the high-level application interface.  Hierarchical indirection structures like DNS are inflexible and do not offer data independence.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5 P2P and Sensor Networks  Sensor networks involve networking meeting sensors, actuators and embedded systems.  Sensor networking can allow collaborative sensing of previously unobservable phenomena  Sensornets are inherently data-centric: users don’t know or care which sensor(s) hold the data they want.  Energy efficiency is a key consideration in sensornets; communication is also often very expensive compared to computation  The challenge in sensornets is to come up with a new set of layered protocols rather than stove-piped custom solutions for specific problems  In-network processing (like active networking) is a common feature of sensornets  Sensornets worry not only about connectivity, but also network lifetime and cumulative sensing coverage of the sensor field  Distributed compression, multi-resolution signal processing and pattern- triggered data collection are features unique to sensor networks compared to p2p and internet.  The sensor net can be viewed as a kind of distributed database.