Data Management in Peer-to- Peer Systems Qi Sun Beverly Yang.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman:
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Peer-to-Peer Content Sharing. P2P File Sharing Benefits Why use a P2P model for a file sharing application?
Introduction to Peer-to-Peer (P2P) Systems Gabi Kliot - Computer Science Department, Technion Concurrent and Distributed Computing Course 28/06/2006 The.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
CSc 461/561 CSc 461/561 Peer-to-Peer Streaming. CSc 461/561 Summary (1) Service Models (2) P2P challenges (3) Service Discovery (4) P2P Streaming (5)
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
1 SLIC: A Selfish Link-based Incentive Mechanism for Unstructured P2P Networks Qixiang Sun Hector Garcia-Molina Stanford University.
Beyond Napster: An Overview of Peer-to-Peer Systems and Applications Sami Rollins.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Focus on Distributed Hash Tables Distributed hash tables (DHT) provide resource locating and routing in peer-to-peer networks –But, more than object locating.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
CS 640: Introduction to Computer Networks Yu-Chi Lai Lecture 18 - Peer-to-Peer.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
P2P File Sharing Systems
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network

Application Layer – Peer-to-peer UIUC CS438: Communication Networks Summer 2014 Fred Douglas Slides: Fred, Kurose&Ross (sometimes edited)
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
1 P2P Computing. 2 What is P2P? Server-Client model.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Introduction of P2P systems
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Structuring P2P networks for efficient searching Rishi Kant and Abderrahim Laabid Abderrahim Laabid.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Peer-to-Peer Systems Rodrigo Rodrigues Peter Druschel Max Planck Institute for Software Systems.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
CS 640: Introduction to Computer Networks Aditya Akella Lecture 24 - Peer-to-Peer.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
PEAR TO PEAR PROTOCOL. Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Composing Web Services and P2P Infrastructure. PRESENTATION FLOW Related Works Paper Idea Our Project Infrastructure.
Peer-to-Peer Internet Networks
EE 122: Peer-to-Peer (P2P) Networks
DHT Routing Geometries and Chord
CS 162: P2P Networks Computer Science Division
Mobile P2P Data Retrieval and Caching
Presentation transcript:

Data Management in Peer-to- Peer Systems Qi Sun Beverly Yang

2 Introduction What is P2P? Distributed nodes Equal roles and functionality Providing/exchanging resources Why now? PCs are becoming valuable resources! Computing devices becoming pervasive

3 Many Applications Grid computing e.g., Seti-at-Home Ubiquitous computing Cell phones, wireless devices, hand helds Cars, refrigerators, microwaves Preservation/Archival systems File-sharing

4 File-sharing model Data: (Title string, File blob) Query: “Find songs by Madonna” Result: : Madonna – “Vogue” : Madonna – “Beautiful Stranger” : Madonna – “Like a Prayer” : Madanna – “Vogue” How is this “search” implemented?

5 Many Approaches Napster Gnutella KaZaA OverNet BitTorrent

6 Napster “Hybrid” P2P system Server Index Peers ? A B C D E F C,E,F

7 Napster Benefits Efficient Comprehensive Can handle complex queries Disadvantages Server is single point of failure Server is performance bottleneck Server costs money to maintain!!!

8 Gnutella “Pure” P2P system TCP “Overlay network”

9 Gnutella = forward query = processed query = source = found result = forward response

10 Gnutella Benefits No server needed (cost) Robust (nodes can come and go) Can handle complex queries per node Disadvantages Not comprehensive (can miss results) Inefficient! (many messages)

11 KaZaA “Super-peer” P2P system Index

12 KaZaA “Super-peer” P2P system Index ? Like Napster Like Gnutella

13 KaZaA Change the ratio of clients to super-peers Napster: everyone (minus one) is a client Gnutella: no one is a client Combines strengths of hybrid and pure systems Leverages heterogeneity of peers e.g., bandwidth, memory, processing power Napster: everyone (minus one) is a client Gnutella: no one is a client

14 OverNet Uses all peers to build a distributed index – 2x10 6 7x10 6 – 8x10 6 X Z 3x10 6 – 4x10 6 Y W... ABC Hash(ABC)

15 OverNet: Searching Given key k, which peer has the index? Peer 0 looking for k=25 Distributed Hash Table (DHT)

16 BitTorrent Downloading of a single file Tracker Blk1 Blk2 Blk3... Blk n Peers 2, 3, 6

17 BitTorrent: Downloading Tit-for-Tat strategy Choking Mechanism Periodic un-choke Rare blocks first A: 1,2,3,4 B: 3,5 C: 2,3,4 A: 1,2,3,4 B: 3 C: 4

18 Challenges Performance, Performance, Performance! Find rare/popular files quickly Minimize maintenance cost Spread workload evenly Etc. Zillions of heuristics/variants

19 Challenges (2) Participation: Peers are selfish! Do not want to “donate” bandwidth Do not want to share their files Do not care about others Need some incentive mechanism!!

20 Challenges (3) Authenticity of data How do you know you have the right file? Bogus copies Corrupt copies Need detection/correction mechanisms

21 Techniques Performance Routing Indices Network Awareness Participation SLIC Micropayments Correctness DoS Prevention Reputation Systems

22 Routing Indices ?

23 Routing Indices (2) DB OS AI EE DB AI DBAI DB 5 OS 5,6,7 1 DB 2,4 OS 2 AI 2,3,4 EE 3 DB? 2 AI 3 4 AI 8,9 EE 10 DB 11,13 AI 11,12 EE DB

24 Routing Indices (3) Benefits Potentially reduce # messages Drawbacks Update cost (any time you have state) Size of index

25 Reputation Systems Alice Bob Who has file X? I do! File Y

26 Reputation Systems Have a “opinion list” Base on personal experience? Problem: sparse Node 0 Node 1 Node 2 Node 3 Node 4 Node 5 Node 6 Node 7 Node 8 ? ? ? ? ? ?

27 Reputation Systems Node 4Node 1Node 2Node 6 Have a “trust list” Base on personal experience? Problem: sparse Ask friends Efficient Automatic

28 Micropayments Only if you have money, will people do things for you! Like a vending machine Goods are cheap Security can’t be too expensive Micropayments

29 $ Micropayments Server is needed… Handle accounts Distribute and cash coins Security Scalability and performance bottleneck

30 Micropayments Peers can do work too! Challenge: SECURITY $

31 SLIC: Link-based Incentive Use quality of service as incentive Fragment A Fragment B A B They need each other to reach more nodes.  Can retaliate

32 SLIC (2) DCB W(A,B) W(A,C) W(A,D) A Adjust weights, and use them to reward good neighbors and to penalize bad ones

33 Network Awareness Overlay network can be poor! San Francisco Palo Alto Timbuktu Mali, Africa

34 Network Awareness (2) Form only “good” links Probe a few and pick the best San Francisco Palo Alto Timbuktu Mali, Africa

35 Network Awareness (3) “Swap” peers around San Francisco Palo Alto Timbuktu Mali, Africa

36 Denial of Service Malicious peers can flood queries on unstructured networks Rate limit Incentive Micro-payment

37 Denial of Service Malicious peers can drop queries and indices in structured networks Tracing/Audit Reorganization Alternate path

38 Concluding Remarks P2P provides a cheap infrastructure for leveraging the capacities of the masses. P2P’s “openness” is both its strength and its weakness.