Web Applications: Peer-to-Peer Networks Presentation by Michael Smathers Chapter 7.4 Internet Measurement: Infrastructure, Traffic and Applications by.

Slides:



Advertisements
Similar presentations
A Measurement Study of Peer-to-Peer File Sharing Systems Presented by Cristina Abad.
Advertisements

Peer-to-Peer and Social Networks An overview of Gnutella.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Digital Library Service – An overview Introduction System Architecture Components and their functionalities Experimental Results.
Incentives Build Robustness in BitTorrent Bram Cohen.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
1 Turning Heterogeneity into an Advantage in Overlay Routing Gisik Kwon Dept. of Computer Science and Engineering Arizona State University Published in.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman:
Application Layer Overlays IS250 Spring 2010 John Chuang.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Peer-to-Peer Intro Jani & Sami Peltotalo.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Analyzing Peer-to-Peer Traffic Across Large Networks Jia Wang Joint work with Subhabrata Sen AT&T Labs - Research.
Measurements of Peer-to-Peer Systems Pradnya Karbhari Nov 25 th, 2003 CS 8803: Network Measurements Seminar.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
Presentation by Manasee Conjeepuram Krishnamoorthy.
P2P File Sharing Systems
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 Proceeding the Second Exercises on Computer and Systems Engineering Professor OKAMURA Laboratory. Othman Othman M.M.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
P2P Architecture Case Study: Gnutella Network
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)

Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
1 P2P Computing. 2 What is P2P? Server-Client model.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Introduction of P2P systems
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Chapter 2: Application layer
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
HUAWEI TECHNOLOGIES CO., LTD. Page 1 Survey of P2P Streaming HUAWEI TECHNOLOGIES CO., LTD. Ning Zong, Johnson Jiang.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.
Peer-to-Peer File Sharing Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Click to edit Master title style Multi-Destination Routing and the Design of Peer-to-Peer Overlays Authors John Buford Panasonic Princeton Lab, USA. Alan.
1 Overlay Networks. 2 Routing overlays –Experimental versions of IP (e.g., 6Bone) –Multicast (e.g., MBone and end-system multicast) –Robust routing (e.g.,
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Peer-to-Peer and Social Networks
Early Measurements of a Cluster-based Architecture for P2P Systems
A Measurement Study of Peer-to-Peer File Sharing Systems
A Scalable content-addressable network
CS 162: P2P Networks Computer Science Division
Transport Layer Identification of P2P Traffic
Presentation transcript:

Web Applications: Peer-to-Peer Networks Presentation by Michael Smathers Chapter 7.4 Internet Measurement: Infrastructure, Traffic and Applications by Mark Crovella, Balachander Krishnamurthy, Wiley, 2006

P2P >> Overview Network built and sustained by resources of each participant Peers act as both client and server Centralized/decentralized models Issues: volatility, scalability, legality

P2P >> Motivation P2P networks generate more traffic than any other internet application 2/3 of all bandwidth on some backbones

P2P >> Motivation Wide variety of protocols and client implementations; heterogeneous nodes Encrypted protocols, hidden layers Difficult to characterize; node, path instability Indexing, searching Legal ambiguity, international law

P2P >> Network Properties Proportion of total internet traffic; growth patterns Protocol split; content trends Location of entities; grouping/performance Access methods; search efficiency Response latency; performance Freeriding/leeching; network health Node availability; performance

P2P >> Network Properties CacheLogic P2P file format analysis (2005) Streamsight used for Layer-7 Deep Packet Inspection

P2P >> Protocols Napster –Pseudo-P2P, centralized index –Tailored for MP3 data –Brought P2P into mainstream, set legal precedence

P2P >> Protocols Gnutella (Bearshare, Limewire) –De-centralized algorithm –Distributed searching; peers forward queries –UDP queries, TCP transfers –Issues: Scalability, indexing

P2P >> Protocols Kademlia (Overnet, eDonkey) –De-centralized algorithm –Distributed Hash Table for node communication –Uses XOR of node keys as distance metric –Improves search performance, reduces broadcast traffic

P2P >> Protocols Fasttrack (Kazaa) –Uses supernodes to improve scalability, establish hierarchy –Uptime, bandwidth –Closed-source –Uses HTTP to carry out download –Encrypted protocol; queuing, QoS

P2P >> Protocols Bittorrent –Simultaneous upload/download –Decentralized network, external traffic coordination; trackers –DHT –Web-based indexes, search –Eliminates choke points –Encourages altruism at protocol level

P2P >> Protocols Bittorrent - file propagation

P2P >> Protocol Trends Trends in P2P Protocols ( )

P2P >> Protocol Trends Worldwide market share of major P2P technologies (2005)

P2P >> Challenges Lack of peer availability Unknown path, URL Measuring latency Encrypted/hidden protocol ISP/middleware blocks

P2P >> Challenges Hidden Layers –Query diameter –Query translation/ parsing; response could be subset of query –Node selection

P2P >> Measurement Tools Characterization - Active –P2P crawlers Map network topology Identify vulnerable nodes Joins network, establish connections with nodes, record all available network properties (routing, query forwarding, node info)

P2P >> Visualizing Gnutella Gnutella topology mapping

P2P >> Visualizing Gnutella Minitasking - Visual Gnutella client Legend: –Bubble size ~ = Node library size (# of MB) –Transparency ~ = Node distance (# of hops Displays query movement/propagation

P2P >> Measurement Tools Passive measurement –Router-level information; examine netflow records –Locate “heavy-hitters”; Find distribution of cumulative requests and responses for each IP –Graph-based examination; each node has a degree (# of neighbor nodes) and a weight (volume of data exchange between nodes)

P2P >> Architecture Examination Difficulty: Heterogeneous nodes, scalability Node hierarchy –nodes with the highest uptime and bandwidth becoming ‘supernodes’ –cache valuable routing information Capacity awareness –Maintain state information; routing cache, edge latency, etc… Towards a more robust search algorithm…

P2P >> Network-specific tools Decoy prevention –checksum clearinghouse Freeriding/leeching –protocol-level solutions to P2P fairness

P2P >> State of the art High-level characterization –Experiment #1: Napster, Gnutella, Spring 2001 –Java-based crawlers, 4-8 day data collection window –Distribution of bottleneck bandwidths, degree of cooperation, freeriding phenomenon –Findings: Extremely heterogeneous; degree of sharing Top 7% of nodes offer more files than remaining 93% combined

P2P >> State of the art High-level characterization –Experiment #1: Napster, Gnutella, Spring 2001 –Napster measurements: Latency and Lifetime; send TCP SYN packets to nodes (RST = inactive) Bandwidth approximation; measure peer’s bottleneck bandwidth –Findings: 30% of Napster clients advertise false bandwidth

P2P >> State of the art Alternative Architectures –Experiment #2: Gnutella, Summer 2001 –Used modified client to join network in multiple locations –Logged all routing messages –Proposed a network-aware cluster of clients that are topologically closer –Clusters select delegates, act as directory server –Found nearly half of queries across clusters are repeated and are candidates for caching –Simulation showed much higher fraction of successful queries in a cluster-based structure –Number of queries grow linearly, unlike Gnutella’s flooding

P2P >> State of the art Experiment #3: ISP/Router data –Used netflow records, 3 weeks –Filtered for specific ports –Found that signaling traffic is negligible next to data flow; 1% of IP addresses contributed 25% of signaling traffic.

P2P >> Peer Selection Challenge: Quickly locate better connected peers Lightweight, active probes; –ping (RTT) –nettimer (bottleneck bandwidth) –Trace + live measurement

P2P >> Other uses P2P-based Web search engine Flash crowd; streaming video, combine with multicast tree P2P support for networked games

P2P >> State of the Art eDonkey –Tfcpdump-based study, August 2003 –3.5 million TCP connections, 2.5 million hosts (12 days) –300 GB transer, averaged 2.5 MB download stream, 17 Kb for signalling traffic Bittorrent –Tracker log study, several months, 2003 –180,000 clients, 2 GB Linux distro –Flash crowd simulation, 5 days –Longer client duration; 6 hours on average –Nodes prioritize least-replicated chunks –Average download rate: 500 kb/s